The Privacy, Data Protection and Cybersecurity Law Review Edition 7
The Privacy, Data Protection and Cybersecurity Law Review Edition 7
Protection and
Cybersecurity
Law Review
Seventh Edition
Editor
Alan Charles Raul
lawreviews
Editor
Alan Charles Raul
lawreviews
© 2020 Law Business Research Ltd
PUBLISHER
Tom Barnes
ACCOUNT MANAGERS
Olivia Budd, Katie Hodgetts, Reece Whelan
RESEARCH LEAD
Kieran Hansen
EDITORIAL COORDINATOR
Gavin Jordan
PRODUCTION EDITOR
Claire Ancell
SUBEDITOR
Martin Roach
The publisher acknowledges and thanks the following for their assistance
throughout the preparation of this book:
ALLENS
ASTREA
BOMCHIL
BTS&PARTNERS
CLEMENS
K&K ADVOCATES
nNOVATION LLP
NOERR
SANTAMARINA Y STETA, SC
SK CHAMBERS
i
© 2020 Law Business Research Ltd
CONTENTS
Chapter 2 EU OVERVIEW��������������������������������������������������������������������������������������������������������������������5
William RM Long, Francesca Blythe and Alan Charles Raul
Chapter 4 ARGENTINA����������������������������������������������������������������������������������������������������������������������56
Adrián Furman and Francisco Zappa
Chapter 5 AUSTRALIA������������������������������������������������������������������������������������������������������������������������67
Michael Morris and Emily Cravigan
Chapter 6 BELGIUM���������������������������������������������������������������������������������������������������������������������������82
Steven De Schrijver and Olivier Van Fraeyenhoven
Chapter 7 BRAZIL��������������������������������������������������������������������������������������������������������������������������������97
Ricardo Barretto Ferreira, Lorena Pretti Serraglio, Juliana Gebara Sene Ikeda, Isabella de
Castro Satiro Aragão, Camilla Lopes Chicaroni and Beatriz Canhoto Lima
Chapter 8 CANADA���������������������������������������������������������������������������������������������������������������������������110
Shaun Brown
Chapter 9 CHINA������������������������������������������������������������������������������������������������������������������������������125
Hongquan (Samuel) Yang
Chapter 10 CROATIA��������������������������������������������������������������������������������������������������������������������������148
Sanja Vukina
Chapter 11 DENMARK�����������������������������������������������������������������������������������������������������������������������166
Tommy Angermair, Camilla Sand Fink and Søren Bonde
iii
© 2020 Law Business Research Ltd
Contents
Chapter 12 ESTONIA��������������������������������������������������������������������������������������������������������������������������184
Risto Hübner
Chapter 13 GERMANY������������������������������������������������������������������������������������������������������������������������195
Olga Stepanova and Julius Feldmann
Chapter 15 HUNGARY�����������������������������������������������������������������������������������������������������������������������224
Tamás Gödölle and Márk Pécsvárady
Chapter 16 INDIA��������������������������������������������������������������������������������������������������������������������������������236
Aditi Subramaniam and Sanuj Das
Chapter 17 INDONESIA���������������������������������������������������������������������������������������������������������������������250
Danny Kobrata, Bhredipta Socarana and Rahma Atika
Chapter 18 JAPAN��������������������������������������������������������������������������������������������������������������������������������263
Tomoki Ishiara
Chapter 19 MALAYSIA������������������������������������������������������������������������������������������������������������������������283
Shanthi Kandiah
Chapter 20 MEXICO���������������������������������������������������������������������������������������������������������������������������300
César G Cruz Ayala, Diego Acosta Chin and Marcela Flores González
Chapter 21 NETHERLANDS�������������������������������������������������������������������������������������������������������������316
Herald Jongen, Nienke Bernard and Emre Yildirim
Chapter 22 PORTUGAL����������������������������������������������������������������������������������������������������������������������330
Joana Mota Agostinho and Nuno Lima da Luz
Chapter 23 RUSSIA������������������������������������������������������������������������������������������������������������������������������344
Vyacheslav Khayryuzov
Chapter 24 SINGAPORE���������������������������������������������������������������������������������������������������������������������354
Yuet Ming Tham
Chapter 25 SPAIN���������������������������������������������������������������������������������������������������������������������������������372
Leticia López-Lapuente and Reyes Bermejo Bosch
iv
© 2020 Law Business Research Ltd
Contents
Chapter 26 SWITZERLAND��������������������������������������������������������������������������������������������������������������387
Jürg Schneider, Monique Sturny and Hugh Reeves
Chapter 27 TURKEY����������������������������������������������������������������������������������������������������������������������������409
Batu Kınıkoğlu, Selen Zengin and Kaan Can Akdere
v
© 2020 Law Business Research Ltd
Chapter 1
GLOBAL OVERVIEW
Privacy, like everything else in 2020, was dominated by the covid-19 pandemic. Employers
and governments have been required to consider privacy in adjusting workplace practices to
account for who has fever and other symptoms, who has travelled where, who has come into
contact with whom and what community members have tested positive or been exposed.
As a result of all this need for tracking and tracing, governments and citizens alike have
recognised the inevitable trade-offs between exclusive focus on privacy versus exclusive focus
on public health and safety.
Even the European Data Protection Board (EDBP) conceded that data protection
measures like GDPR ‘do not hinder measures taken in the fight against the coronavirus
pandemic. The fight against communicable diseases is a valuable goal shared by all nations
and … [i]t is in the interest of humanity to curb the spread of diseases and to use modern
techniques.’ Accordingly, the EDPB agreed that an ‘[e]mergency is a legal condition
which may legitimise restrictions of [privacy and data protection] freedoms provided these
restrictions are proportionate and limited to the emergency period.’
And while privacy is not considered an absolute right in any jurisdiction, it is important
to acknowledge that no democratic country has taken the position, or acted in a manner,
suggesting that individual privacy is irrelevant or dispensable – even during the pandemic
emergency. To the contrary, privacy rights have been taken into account in fighting the virus
nearly everywhere.
But covid-19 was not the only shock to the privacy system in 2020. On 16 July, the
Court of Justice of the European Union (CJEU) invalidated the Privacy Shield framework
agreed between the EU Commission and the US Commerce Department to facilitate data
flows to the United States. While the CJEU upheld the validity of using ‘standard contractual
clauses’ to transfer personal data to countries not yet deemed ‘adequate’ by the EU (such as
the United States), the CJEU imposed considerable new obligations on organisations looking
to transfer data and for data protection authorities to consider when approving such transfers.
Specifically, the Court agreed with Austrian privacy advocate Max Schrems that there is
a theoretical possibility that users of social media networks could have their communications
secretly transferred to the US National Security Agency (NSA) without the benefit of privacy
protections available in Europe.
Never mind that there is no proof or reason to believe that the NSA is interested in
collecting communications to or from average European social media users – in other words,
from anybody other than a terrorist, spy or hostile actor. And never mind that the privacy
protections and legal redress opportunities under US surveillance laws are considerably
1
© 2020 Law Business Research Ltd
Global Overview
stronger than those EU Member States accord their own citizens. In fact, Presidential Policy
Directive 28 requires the NSA and other US agencies involved in signals intelligence to
protect the privacy of persons outside the United States in a manner reasonably comparable
to the protections US citizens receive. And, notably, the independent Privacy and Civil
Liberties Oversight Board (PCLOB) provided a thorough assessment of the implementation
of PPD-28 on 16 October 2018.
Remarkably, the CJEU deemed US surveillance safeguards and remedies to be less than
‘essentially equivalent’ to those of the EU without comparing EU Member State surveillance
laws or practices to those of the US at all! While the Court’s assessment of US surveillance
safeguards was superficial and woefully incomplete, its treatment of EU surveillance was
entirely absent. CJEU did not so much as ask whether any EU Member State has an oversight
body to examine and judge the privacy or civil rights implications of electronic surveillance
the way PCLOB and Foreign Intelligence Surveillance Court do – with full national security
clearance to access the deepest secrets of signals intelligence.
Though the CJEU’s decision may seem frivolous (to say nothing of dangerous) to many
observers, its potential impact on trillions of dollars of transatlantic trade is anything but.
The EU Commission and US Commerce Department are publicly committed to solving this
judicial conundrum. In the meantime, companies are going through a metaphysical process
of trying to demonstrate (to themselves, data protection authorities, and ultimately maybe
Max Schrems) that, under the Schrems decision, they can transfer personal data to the United
States – and other non ‘adequate’ countries – without such data being disproportionately
accessible to national security surveillance by the data importing country. In other words,
there are no real standards at all.
In contrast, the United States provided a model for international comity and respect
for the rule of law in the 2018 CLOUD Act. The Act authorises US communications service
providers to produce the contents of electronic communications they store outside the
United States in response to US legal requests, and to do the same for foreign governments
that have entered into executive agreements with the United States (which only the UK has
done so far, effective July 2020).
Importantly, the CLOUD Act requires foreign governments wishing to enter into such
agreements to demonstrate their respect for the rule of law and for international human
rights, privacy, free speech rights, data minimisation (equivalent to what the United States
applies under the Foreign Intelligence Surveillance Act), the principles of non-discrimination,
accountability, transparency, independent oversight, and numerous other detailed safeguards.
Moreover, where the requested data concerns a non-US person who is outside the United
States, the relevant communications service provider is authorised to file a motion in federal
court to quash the government request. The provider may do so if it believes the laws of
the US and of the foreign government conflict – including privacy laws – with respect to
the government’s demand for the communications of its customers. Once the motion has
been filed, the court must conduct a detailed ‘comity’ analysis to resolve the conflict of
international laws concerning data privacy rights.
The legal standards for such comity analysis are set forth with considerable specificity in
the CLOUD Act. Courts must consider the nature of the legal conflict at stake, the materiality
of the alleged violation of the foreign law, the respective interests of the two countries in the
matter at hand, the contacts of the service provider and the individual in question with the
United States, and the importance of the individual’s information to the criminal or national
security interest at issue.
2
© 2020 Law Business Research Ltd
Global Overview
The thoughtful nature of this comity analysis required by the CLOUD Act is not
reciprocated in the CJEU’s Schrems decision or the EU’s General Data Protection Regulation.
Europe, and the rest of the world, would be well served to study the US model of
safeguards, checks and balance, independent oversight and international comity for
government access to electronic communications.
In any event, privacy developments in the United States have not been all about
government access to information. In this past year and a half, US regulators and litigators
have obtained the largest fines and legal awards ever collected for alleged violations of privacy
and data security requirements.
The Federal Trade Commission has obtained a US$5 billion settlement and imposed
unprecedented corporate governance requirements following an investigation of the
Cambridge Analytica affair. And private plaintiffs have obtained a settlement of over half
a billion dollars in connection with alleged violation of state biometric information privacy
law. The FTC and state attorneys general (and in some cases, private plaintiffs) have collected
hundreds of millions of dollars in financial recoveries concerning data breaches as well as
alleged violations of the Children’s Online Privacy Protection Act. Significantly, many of
these proceedings are predicated on the theory that the data ‘controller’ is legally responsible
for the allegedly invasive or abusive practices of third parties that operate on or through the
‘controller’s’ platform. This trend towards extended responsibility is well worth watching.
Even the US Securities and Exchange Commission (SEC) is increasingly focused on
digital practices and risks. The SEC is now actively enforcing the accuracy and reliability of
privacy and cybersecurity disclosures by public companies. Companies could face regulatory
action if they materially understate their digital risks – or avoid discussing significant
incidents they have already experienced – or if they publicly overstate their data security or
privacy practices. As a result, many companies – especially tech companies – are considerably
expanding their discussion of how US and international privacy laws like GDPR or the newly
effective Brazilian privacy law (LGPD) are affecting or could affect their global regulatory risk
profile, or the economic viability of their current and future business models.
But perhaps the most important US privacy development is the new California
Consumer Privacy Act (CCPA). It took effect in 2020, and as of 1 July, may be enforced by
the State’s Attorney General.
Not only does the CCPA require privacy disclosures, grant privacy rights, and impose
privacy restrictions comparable to GDPR. But, in typical American fashion, the CCPA
dangles the prospect of statutory damages (regardless of actual injury) to incentivise lawyers
to file litigation over data breaches affecting the personal information of California residents –
but only if the breach results from a company’s failure to implement and maintain ‘reasonable
security’.
Even the CCPA, however, may not be enough for California. Its progenitor, real estate
executive Alastair Mactaggart, has already advanced a new privacy initiative that will replace
and go beyond the CCPA – the California Privacy Rights Act. CPRA will be placed before
the state’s voters as part of the November 2020 election (bypassing the state’s legislature
entirely).
In the end, as groundbreaking for the United States as the CCPA has been, its most
consequential impact may be to impel other states to act, and perhaps then the US Congress
will finally enact a comprehensive national privacy law.
The most reasonable outcome for America would be the establishment of stable, federal
privacy and security standards that identify and target actual injuries caused by abusive
3
© 2020 Law Business Research Ltd
Global Overview
data practices. If covid-19 has taught us anything about privacy, it is that there can be real
trade-offs (for health, safety, innovation, the economy and security), on the one hand, as
well as real harm (for pocketbooks, and personal dignity and autonomy), on the other, from
regulating either too much or too little.
4
© 2020 Law Business Research Ltd
Chapter 2
EU OVERVIEW
I OVERVIEW
In the EU, data protection is principally governed by the EU General Data Protection
Regulation (GDPR),2 which came into force on 25 May 2018 and is applicable in all EU
Member States. The GDPR repealed the Data Protection Directive 95/46/EC (Directive),3
regulates the collection and processing of personal data across all sectors of the EU economy
and introduced new data protection obligations for controllers and processors alongside new
rights for EU individuals.
The GDPR created a single EU-wide law on data protection and has empowered
Member State data supervisory authorities (DSAs) with significant enforcement powers,
including the power to impose fines of up to 4 per cent of annual worldwide turnover or €20
million, whichever is greater, on organisations for failure to comply with the data protection
obligations contained in the GDPR.
In March 2019, the European Data Protection Board’s (EDPB) published its first
overview on the implementation of the GDPR. The overview provided statistics on the
consistency mechanism, the cooperation mechanism and enforcement under the GDPR. In
particular, as at the time of publication the total number of cases reported by DSAs from 31
EEA countries totalled 206,326 with 94,622 of these constituting complaints and 64,684
initiated as a data breach notification. In addition, DSAs from 11 EEA countries reported
imposing administrative fines under the GDPR totalling €55,955,871. In May 2019, the
European Data Protection Board’s (EDPB) published further statistics noting that DSAs had
logged over 144,000 queries and complaints, and over 89,000 data breaches.
In 2020, the EDPB published various guidelines including on consent under the
GDPR as well as the processing of location and health data in the context of covid-19.
Importantly, in a decision with significant implications for international trade and
cross-border data flows, the EU’s highest court – the Court of Justice of the European Union
(CJEU) ruled on 16 July 2020 in the Schrems II case that a key legal mechanism (called
the EU–US Privacy Shield programme) used to enable transfers of personal data from the
1 William RM Long and Alan Charles Raul are partners and Francesca Blythe is a senior associate at Sidley
Austin LLP.
2 Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the
protection of natural persons with regard to the processing of personal data and on the free movement of
such data, and repealing Directive 95/46/EC (General Data Protection Regulation).
3 European Parliament and Council Directive 95/46/EC of 24 October 1995 on the protection of
individuals with regard to the processing of personal data and on the free movement of such data.
5
© 2020 Law Business Research Ltd
EU Overview
European Union was invalid, while also potentially requiring additional protections to be
implemented when another key transfer mechanism, the Standard Contractual Clauses, is
used.
Set out in this chapter is a summary of the main provisions of the GDPR. We then
cover guidance provided by the EU’s former Article 29 Working Party (which has, since
25 May 2018, been replaced by the EDPB) on the topical issues of cloud computing and
whistle-blowing hotlines. We conclude by considering the EU’s Network and Information
Security Directive (the NIS Directive).
II THE GDPR
The GDPR imposes a number of obligations on organisations processing the personal data of
individuals (data subjects). The GDPR also provides several rights to data subjects in relation
to the processing of their personal data.
Failure to comply with the GDPR and Member State data protection laws enacted to
supplement the data protection requirements of the GDPR can amount to a criminal offence
and can result in significant fines and civil claims from data subjects who have suffered as a
result.
Although the GDPR sets out harmonised data protection standards and principles, the
GDPR grants EU Member States the power to maintain or introduce national provisions to
further specify the application of the GDPR in Member State law.
6
© 2020 Law Business Research Ltd
EU Overview
a controller: any natural or legal person who alone or jointly with others, determines
the purpose and means of processing personal data. Interestingly, a recent decision
from the CJEU (decided under the former Directive) considered the question of joint
controllership. In particular, the CJEU held that for there to be a relationship of joint
control, the parties do not need to share responsibility equally, nor do they have to have
access to the personal data processed. Unfortunately the ruling does not address the
question of liability between the parties;
b processor: a natural or legal person who processes personal data on behalf of the
controller;
c data subject: an identified or identifiable individual who is the subject of the personal
data;
d establishment: the effective and real exercise of activity through stable arrangements in
a Member State;6
e filing system: any structured set of personal data that is accessible according to specific
criteria, whether centralised or decentralised or dispersed on a functional or geographical
basis, such as a filing cabinet containing employee files organised according to their
date of joining or their names or location;
f personal data: any information that relates to an identified or identifiable individual
who can be identified, directly or indirectly, by reference to an identifier such as a name,
identification number, location data, an online identifier or to one or more factors
specific to the physical, physiological, genetic, mental, economic, cultural or social
identity of that individual. In practice, this is a broad definition including anything
from someone’s name, address or national insurance number to information about
taste in clothes. Additionally, personal data that has undergone pseudonymisation,
where the personal data has been through a process of de-identification so that a coded
reference or pseudonym is attached to a record to allow the data to be associated to a
particular data subject without the data subject being identified, is considered personal
data under the GDPR; and
g processing: any operation or set of operations performed upon personal data, whether
or not by automated means, such as collection, recording, organisation, structuring,
storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission,
dissemination or otherwise making available, alignment or combination, restriction,
erasure or destruction. This definition is so broad that it covers practically any activity
in relation to personal data.
7
© 2020 Law Business Research Ltd
EU Overview
8
© 2020 Law Business Research Ltd
EU Overview
monitoring of its employees. The controller is required to carry out a DPIA, which assesses
the impact of the envisaged processing on the personal data of the data subject, taking into
account the nature, scope, context and purposes of the processing.
Article 35(3) of the GDPR provides that a DPIA must be conducted where the
controller engages in:
a a systematic and extensive evaluation of personal aspects relating to data subjects
which is based on automated processing, including profiling, and produces legal effects
concerning the data subject or similarly significantly affecting the data subject; or
b processing on a large scale special categories of personal data under Article 9(1) of the
GDPR, or of personal data revealing criminal convictions and offences under Article
10 of the GDPR; or
c a systematic monitoring of a publicly accessible area on a large scale.
Article 35(4) of the GDPR requires the DSA to publish a list of activities in relation to which
a DPIA should be carried out. If the controller has appointed a Data Protection Officer
(DPO), the controller should seek the advice of the DPO when carrying out the DPIA.
Importantly, Article 36(1) of the GDPR states that where the outcome of the DPIA
indicates that the processing involves a high risk, which cannot be mitigated by the controller,
the DSA should be consulted prior to the commencement of the processing.
A DPIA involves balancing the interests of the controller against those of the data
subject. Article 35(7) of the GDPR states that a DPIA should contain at a minimum:
a a description of the processing operations and the purposes, including, where applicable,
the legitimate interests pursued by the controller;
b an assessment of the necessity and proportionality of the processing operations in
relation to the purpose of the processing;
c an assessment of the risks to data subjects; and
d the measures in place to address risk, including security and to demonstrate compliance
with the GDPR, taking into account the rights and legitimate interests of the data
subject.
The EDPB noted in its guidelines on DPIAs that the reference to the ‘rights and freedoms’
of data subjects under Article 35 of the GDPR while primarily concerned with rights to data
protection and privacy also includes other fundamental rights such as freedom of speech,
freedom of thought, freedom of movement, prohibition on discrimination, right to liberty
and conscience and religion.12
The EDPB introduced the following nine criteria that should be considered by
controllers when assessing whether their processing operations require a DPIA, owing to
their inherent high risk13 to data subjects rights and freedoms:
12 Article 29 Working Party, Guidelines on Data Protection Impact Assessment (DPIA) and determining
whether processing is ‘likely to result in a high risk’ for the purposes of Regulation 2016/679, WP 248, as
last revised and adopted on 4 October 2017, page 6.
13 Article 29 Working Party, Guidelines on Data Protection Impact Assessment (DPIA) and determining
whether processing is ‘likely to result in a high risk’ for the purposes of Regulation 2016/679, WP 248, as
last revised and adopted on 4 October 2017, pages 9–11.
9
© 2020 Law Business Research Ltd
EU Overview
10
© 2020 Law Business Research Ltd
EU Overview
This is because the use of such technology can involve novel forms of data collection
and usage, possibly with a high risk to data subjects’ rights and freedoms. Furthermore,
the personal and social consequences of the deployment of a new technology may be
unknown; and
i when the processing in itself ‘prevents data subjects from exercising a right or using a
service or a contract’. This includes processing operations that aim to allow, modify or
refuse data subjects’ access to a service or entry into a contract. An example of this is
where a bank screens its customers against a credit reference database in order to decide
whether to offer them a loan.
Additionally, the EDPB noted that the mere fact the controller’s obligation to conduct a
DPIA has not been met does not negate its general obligation to implement measures to
appropriately manage risks to the rights and freedoms of the data subject when processing
their personal data.14 In practice, this means controllers are required to continuously assess
the risks created by their processing activities in order to identify when a type of processing is
likely to result in a high risk to the rights and freedoms of the data subject.
The EDPB recommends that as a matter of good practice, controllers should
continuously review and regularly reassess their DPIAs.15
DPOs
Article 37 of the GDPR requires both controllers and processors to appoint a DPO where:
14 Article 29 Data Protection Working Party Guidelines on Data Protection Impact Assessment (DPIA) and
determining whether processing is ‘likely to result in a high risk’ for the purposes of Regulation 2016/679,
WP 248, as last revised and adopted on 4 October 2017, page 6.
15 Article 29 Data Protection Working Party Guidelines on Data Protection Impact Assessment (DPIA) and
determining whether processing is ‘likely to result in a high risk’ for the purposes of Regulation 2016/679,
WP 248, as last revised and adopted on 4 October 2017, page 14.
16 EDPB Guidelines 4/2019 on Article 25 Data Protection by Design and by Default.
11
© 2020 Law Business Research Ltd
EU Overview
a the processing is carried out by a public authority or body, except where courts are
acting in their judicial capacity;
b the core activities of the controller or processor consist of processing operations that,
by virtue of their nature, scope or purpose, require regular and systematic monitoring
of data subjects on a large scale; or
c the core activities of the controller or processor consist of processing on a large scale
special categories of personal data pursuant to Article 9 of the GDPR or personal data
about criminal convictions and offences pursuant to Article 10 of the GDPR.
The EDPB, in its guidance on DPOs, noted that ‘core activities’ can be considered key
operations17 required to achieve the controller or processor’s objectives. However, it should
not be interpreted as excluding the activities where the processing of personal data forms an
‘inextricable’ part of the controller or processor’s activities. The EDPB provides the example
of the core activity of a hospital being to provide healthcare. However, it cannot provide
healthcare effectively or safely without processing health data, such as patients’ records.18
Any DPO appointed must be appointed on the basis of their professional qualities and
expert knowledge of data protection law and practices.19 The EDPB note personal qualities
of the DPO should include integrity and high professional ethics, with the DPO’s primary
concern being enabling compliance with the GDPR.20
Staff members of the controller or processor may be appointed as a DPO, as can a
third-party consultant. Once the DPO has been appointed, the controller or processor must
provide their contact details to their DSA.21
A DPO must be independent, whether or not he or she is an employee of the respective
controller or processor and must be able to perform his or her duties in an independent
manner.22 The DPO can hold another position but must be free from a conflict of interests.
For example, the DPO could not hold a position within the controller organisation that
determined the purposes and means of data processing, such as the head of marketing, IT or
human resources.
Once appointed, the DPO is expected to perform the following, non-exhaustive list
of tasks.
a inform and advise the controller or processor and the employees who carry out the
processing of the GDPR obligations and relevant Member State data protection
obligations;
b monitor compliance with the GDPR, and other relevant Member State data protection
obligations, and oversee the data protection policies of the controller or processor in
relation to the protection of personal data, including the assignment of responsibilities,
awareness-raising and training of staff involved in the processing operations and the
related audits;
17 Article 29 Working Party, Guidelines on Data Protection Officers (DPOs), WP 243, as last revised and
adopted on 5 April 2017, page 20.
18 Article 29 Working Party Guidelines on Data Protection Officers (‘DPOs’), WP 243, as last revised and
adopted on 5 April 2017, page 7.
19 Article 37(5) of the GDPR.
20 Article 29 Working Party Guidelines on Data Protection Officers (‘DPOs’), WP 243. as last revised and
adopted on 5 April 2017, page 12.
21 Article 37(7) of the GDPR.
22 Recital 97 of the GDPR.
12
© 2020 Law Business Research Ltd
EU Overview
The GDPR also provides the option, where controllers or processors do not meet the
processing requirements necessary to appoint a DPO, to voluntarily appoint one.24
The EDPB recommends in its guidance on DPOs that even where controllers or
processors come to the conclusion that a DPO is not required to be appointed, the internal
analysis carried out to determine whether or not a DPO should be appointed should be
documented to demonstrate that the relevant factors have been taken into account properly.25
Personal data that relates to a data subject’s racial or ethnic origin, political opinions, trade
union membership, religious or philosophical beliefs, and the processing of genetic data,
biometric data for the purpose of uniquely identifying a natural person, data concerning
health or data concerning a natural person’s sex life or sexual orientation (special categories
of personal data) can only be processed where both a lawful ground under Article 6 and
a condition under Article 9 are satisfied. The Article 9 conditions that are most often
relevant to a business are where the data subject has explicitly consented to the processing
or the processing is necessary for the purposes of carrying out its obligations in the field of
employment and social security and social protection law.
The EDPB states in its guidance on consent, that where controllers intend to rely on
consent as a lawful ground for processing, they have a duty to assess whether they will meet
all of the GDPR requirements to obtain valid consent.27 Valid consent under the GDPR is
13
© 2020 Law Business Research Ltd
EU Overview
a clear affirmative act that should be freely given, specific, informed and an unambiguous
indication of the data subject’s agreement to the processing of their personal data. Consent
is not regarded as freely given where the data subject has no genuine or free choice or is
not able to refuse or withdraw consent without facing negative consequences. For example,
where the controller is in a position of power over the data subject, such as an employer, the
employee’s consent is unlikely to be considered freely given or a genuine or free choice, as to
choose to withdraw consent or refuse to give initial consent in the first place could result in
the employee facing consequences detrimental to their employment.
As the EDPB notes, consent can only be an appropriate lawful ground for processing
personal data if the data subject is offered control and a genuine choice with regard to
accepting or declining the terms offered or declining them without negative effects.28 Without
such genuine and free choice, the EDPB notes the data subject’s consent becomes illusory
and consent will be invalid, rendering the processing unlawful.29
Provision of information
Certain information needs to be provided by controllers to data subjects when controllers
collect personal data about them, unless the data subjects already have that information.
Article 13 of the GDPR provides a detailed list of the information required to be provided
to data subjects either at the time the personal data is obtained or immediately thereafter,
including:
a the identity and contact details of the controller (and where applicable, the controller’s
representative);
b the contact details of the DPO, where applicable;
c the purposes of the processing;
d the lawful ground for the processing;
e the recipients or categories of recipients of the personal data;
f where the personal data is intended to be transferred to a third country, reference to the
appropriate legal safeguard to lawfully transfer the personal data;
g the period for which the personal data will be stored or where that is not possible, the
criteria used to determine that period;
h the existence of rights of data subjects to access, correct, restrict and object to the
processing of their personal data;
i the right to lodge a complaint with a DSA; and
j whether the provision of personal data is a statutory or contractual requirement or a
requirement necessary to enter into a contract.
In instances where the personal data are not collected by the controller directly from the data
subject concerned, the controller is expected to provide the above information to the data
subject, in addition to specifying the source and types of personal data, within a reasonable
time period after obtaining the personal data, but no later than a month after having received
the personal data or if the personal data is to be used for communication with the data
subject, at the latest, at the time of the first communication to that data subject.30 In cases
of indirect collection, it may also be possible to avoid providing the required information
28 ibid.
29 ibid.
30 Article 14(3) of the GDPR.
14
© 2020 Law Business Research Ltd
EU Overview
15
© 2020 Law Business Research Ltd
EU Overview
Additionally, controllers are required, with the assistance of the processors, where applicable,
to report personal security breaches that are likely to result in a risk to the rights and
freedoms of the data subject, to the relevant DSA without undue delay and, where feasible,
not later than 72 hours after having first become aware of the personal data breach. Where
the processor becomes aware of a personal data breach it is under an obligation to report
the breach to the controller. Upon receiving notice of the breach from the processor, the
controller is then considered aware of the personal data breach and has 72 hours to report the
breach to the relevant DSA.
The EDPB notes in its guidance on personal data breaches that the controller should
have internal processes in place that are able to detect and address a personal data breach.37
The EDPB provides the example of using certain technical measures such as data flow and
log analysers to detect any irregularities in processing of personal data by the controller.38
Importantly, the EDPB notes that once a breach is detected it should be reported upwards
to the appropriate level of management so it can be addressed and contained effectively.
These measures and reporting mechanisms could, in the view of the EDPB, be set out in the
controller’s incident response plans.39
Exceptions
Controllers are exempted from notifying a personal data breach to the relevant DSA if it is
able to demonstrate that the personal data breach is unlikely to result in a risk to the rights
and freedoms of data subjects. In assessing the level of risk, the following factors should be
taken into consideration:
a Type of personal data breach: is it a confidentiality, availability, or integrity type of
breach?
b Nature, sensitivity and volume of personal data: usually, the more sensitive the data,
the higher the risk of harm from a data subject’s point of view. Also, combinations of
personal data are typically more sensitive than single data elements.
c Ease of identification of data subjects: the risk of identification may be low if the data
were protected by an appropriate level of encryption. In addition, pseudonymisation
can reduce the likelihood of data subjects being identified in the event of a breach.
d Severity of consequences of data subjects: especially if sensitive personal data are
involved in a breach, the potential damage to data subjects can be severe and thus the
risk may be higher.
37 Article 29 Data Protection Working Party Guidelines on Personal Data Breach Notification under
Regulation 2016/679, WP 250, as last revised and adopted on 6 February 2018, page 12.
38 ibid.
39 ibid.
16
© 2020 Law Business Research Ltd
EU Overview
e Special characteristics of the data subjects: data subjects who are in a particularly
vulnerable position (e.g., children) are potentially at greater risk if their personal data
are breached.
f Number of affected data subjects: generally speaking, the more data subjects that are
affected by a breach, the greater the potential impact.
g Special characteristics of the controller: for example, if a breach involves controllers
who are entrusted with the processing of sensitive personal data (e.g., health data), the
threat is presumed to be greater.
h Other general considerations: assessing the risk associated with a breach can be far
from straightforward. Therefore the EDPB, in its guidance on personal data breach
notifications, refers to the recommendations published by the European Union Agency
for Network and Information Security (ENISA), which provides a methodology
for assessing the severity of the breach and that may help with designing breach
management response plans.40
40 Article 29 Data Protection Working Party Guidelines on Personal Data Breach Notification under
Regulation 2016/679, WP 250, as last revised and adopted on 6 February 2018, page 26.
41 The EEA consists of the 28 EU Member States together with Iceland, Liechtenstein and Norway.
42 Article 45 of the GDPR.
17
© 2020 Law Business Research Ltd
EU Overview
order to receive personal data from organisations in the EU.43 On 11 June 2018, members of
the European Parliament’s Committee on Civil Liberties, Justice and Home Affairs (MEPs),
voted in favour of the suspension of the Privacy Shield until the US is in full compliance with
the data protection requirements contained in the Privacy Shield. In July 2018, the European
Parliament adopted the resolution and called on the US to comply with the requirements of
the Privacy Shield by 1 September 2018, such as the appointment of an ombudsman to deal
with complaints by data subjects in relation to the Privacy Shield and to remove organisations
who fail to comply with data protection requirements contained in the Privacy Shield.
The second annual review of the functioning of the Privacy Shield was published by the
European Commission on 19 December 2018, also asking the US to appoint a permanent
Privacy Shield ombudsman by 28 February 2019. On 18 January 2019, the US announced
its intention to appoint Keith Krach as the Privacy Shield’s first permanent ombudsman.
Mr Krach’s nomination was confirmed by the US Senate on 20 June 2019. The validity of
the Privacy Shield has also been challenged before the CJEU by the French digital privacy
rights advocacy group, La Quadrature du Net, claiming the Privacy Shield is incompatible
with EU data protection laws, given the potential access to the transferred personal data by
US surveillance agencies. On 16 July 2020, in the Schrems II case, the CJEU invalidated
the Privacy Shield. According to the CJEU, the alleged lack of effective judicial or other
independent redress for EU residents regarding the data collection and surveillance activities
by US national security agencies materially diminishes the privacy protections afforded to
individuals whose personal data had been transferred to the US by organisations that had
certified to the Privacy Shield programme. In turn, the CJEU concluded that the privacy
protections afforded to individuals under the Privacy Shield programme were not ‘essentially
equivalent’ to privacy rights afforded to such individuals under EU law. Accordingly,
organisations that were relying on their Privacy Shield certification (including data transfers
to affiliates, customers and vendors) need to identify and implement an appropriate alternate
legal transfer mechanism (for example, model contracts, Binding Corporate Rules, or perhaps
even reliance on informed consent from relevant data subjects or other exemptions under the
GDPR, such as for performance of a contract). The European Commission and the US
government have already announced their intention to develop a successor programme to the
Privacy Shield that addresses the CJEU’s findings in Schrems II.
Where transfers are to be made to countries that are not deemed adequate, other
exceptions may apply to permit the transfer.44 The European Commission has approved EU
standard contractual clauses that may be used by controllers and processors when transferring
personal data from the EU to non-EEA countries (a model contract).45 There are two forms
of model contract: one where both the data exporter and data importer are controllers; and
another where the data exporter is a controller and the data importer is a data processor.
Personal data transferred on the basis of a model contract will be presumed to be adequately
protected. However, model contracts have been widely criticised as being onerous on the
parties. This is because they grant third-party rights to data subjects to enforce the terms of
the model contract against the data exporter and data importer, and require the parties to the
model contract to give broad warranties and indemnities. The clauses of the model contracts
also cannot be varied and model contracts can become impractical where a large number of
18
© 2020 Law Business Research Ltd
EU Overview
data transfers need to be covered by numerous model contracts. However, the status of model
contracts is currently uncertain, as following questions as to the validity of model contracts
from the Irish DSA, the Irish High Court referred the questions to the CJEU for a preliminary
ruling to determine the legal status of model contracts. In its decision on 16 July 2020,46 the
CJEU confirmed the validity of model contracts. However, as explained in the EDPB FAQ
published on 23 July 2020, organisations using model contracts to transfer personal data to a
country that does not provide an adequate level of data protection will need to assess, taking
account the circumstances of the transfer, whether they need to implement supplementary
measures. Organisations will need to carry out a case-by-case assessment on whether or
not they can transfer personal data to a data importer in a third country on the basis of
model contracts. In making this assessment, organisations will need to take into account
the circumstances of the transfers and determine whether any supplementary measures are
required to be implemented to ensure that the law of the recipient country does not impinge
on the level of protection guaranteed by the model contracts. Where such assessment reveals
that appropriate safeguards would not be ensured, organisations are required to suspend
transfers of personal data or notify the relevant supervisory authority that it wishes to
continue transferring data. Separately, the European Commission recently announced that
it is working to modernise model contracts and to take into account the Schrems II decision.
An alternative means of authorising transfers of personal data outside the EEA is the
use of binding corporate rules. This approach may be suitable for multinational companies
transferring personal data within the same company, or within a group of companies. Under
the binding corporate rules approach, the company would adopt a group-wide data protection
policy that satisfies certain criteria and, if the rules bind the whole group, then those rules
could be approved by the relevant DSA as providing adequate data protection for transfers
of personal data throughout the group. The EDPB has published various documents47 on
binding corporate rules, including a model checklist for the approval of binding corporate
rules,48 a table setting out the elements and principles to be found in binding corporate
rules,49 an explanatory document on processor binding corporate rules, recommendations on
the standard application for approval of controller and processor binding corporate rules,50
46 Case C-311/18 – Data Protection Commissioner v Facebook Ireland Ltd and Maximillian Schrems.
47 WP 133 – Recommendation 1/2007 on the Standard Application for Approval of Binding Corporate
Rules for the Transfer of Personal Data adopted on 10 January 2007; WP 154 – Working Document
setting up a framework for the structure of Binding Corporate Rules adopted on 24 June 2008; WP
155 – Working Document on Frequently Asked Questions (FAQs) related to Binding Corporate Rules
adopted on 24 June 2008 and last revised on 8 April 2009; WP 195 – Working Document 02/2012
setting up a table with the elements and principles to be found in Processor Binding Corporate Rules
adopted on 6 June 2012; WP 195a – Recommendation 1/2012 on the standard application form for
approval of Binding Corporate Rules for the transfer of personal data for processing activities adopted on
17 September 2012; WP 204 – Explanatory Document on the Processor Binding Corporate Rules last
revised and adopted on 22 May 2015.
48 WP 108 – Working Document establishing a model checklist application for approval of binding corporate
rules adopted on 14 April 2005.
49 WP 153 – Working Document setting up a table with the elements and principles to be found in binding
corporate rules adopted on 24 June 2008.
50 WP 264 – Recommendation on the Standard Application form for Approval of Controller
Binding Corporate Rules for the Transfer of Personal Data – Adopted on 11 April 2018; WP 265 –
Recommendation on the Standard Application form for Approval of Processor Binding Corporate Rules
for the Transfer of Personal Data – Adopted on 11 April 2018.
19
© 2020 Law Business Research Ltd
EU Overview
Under the right of access to personal data, the controller is required to provide a copy of the
personal data undergoing processing.
This right is not absolute, but subject to a number of limitations, including the right
to obtain a copy of the personal data shall not adversely affect the rights and freedoms of
others.51 According to Recital 63 of the GDPR, these rights may include trade secrets or other
20
© 2020 Law Business Research Ltd
EU Overview
21
© 2020 Law Business Research Ltd
EU Overview
c where the controller is able to demonstrate that it is not in a position to identify the
data subject, it can refuse to comply with a data subject’s request to access their personal
data.58
However, the right of erasure is not absolute and is subject to certain restrictions or limitations:
a the data subject’s right of erasure will not apply where the processing is necessary for
exercising the right of freedom and expression and information;
b where complying with a legal obligation which requires processing by Union or
Member State law;
c reasons of public interest in the area of public health in accordance with Article 9(2)(h)
and (i);
d for archiving purposes in the public interest, scientific, historical research or statistical
research purposes;
e for the establishment, exercise or defence of legal claims;
f where the controller is able to demonstrate that the data subject’s request for rectification
of their personal data the controller holds is manifestly unfounded or excessive because
of its repetitive nature, the controller can refuse to comply with the data subject’s
request;65
g where the controller has reasonable doubts concerning the identity of the data subject
making the request, the controller can request the provision of additional information
necessary to confirm the identity of the data subject;66 and
22
© 2020 Law Business Research Ltd
EU Overview
h where the controller is able to demonstrate that it is not in a position to identify the
data subject, it can refuse to comply with a data subject’s request to access his or her
personal data.67, 68
The right of the data subject to request the restriction of the processing of their personal data
is not absolute and is qualified:
a where the controller is able to demonstrate that the data subject’s request for rectification
of their personal data the controller holds is manifestly unfounded or excessive because
of its repetitive nature, the controller can refuse to comply with the data subject’s
request;69
b where the controller has reasonable doubts concerning the identity of the data subject
making the request, the controller can request the provision of additional information
necessary to confirm the identity of the data subject;70 and
c where the controller is able to demonstrate that it is not in a position to identify the
data subject, it can refuse to comply with a data subject’s request to access his or her
personal data.71
23
© 2020 Law Business Research Ltd
EU Overview
Article 20(2) of the GDPR limits the requirement for a controller to transmit personal
data to a third-party data controller where this is ‘technically feasible’. The EDPB has
published guidance on the right to data portability, stating that a transmission to a third-party
data controller is ‘technically feasible’ when ‘communication between two systems is possible,
in a secured way, and when the receiving system is technically in a position to receive the
incoming data’.72
In addition, the EDPB guidance recommends that controllers begin developing
technical tools to deal with data portability requests and that industry stakeholders and trade
associations should collaborate to deliver a set of interoperable standards and formats to
deliver the requirements of the right to data portability.73
The guidance also clarifies which types of personal data the right to data portability
should apply to, specifically:
a that the right applies to data provided by the data subject, whether knowingly and
actively as well as the personal data generated by his or her activity;74
b the right does not apply to data inferred or derived by the controller from the analysis
of data provided by the data subject (e.g., a credit score);75 and
c the right is not restricted to data communicated by the data subject directly.76
The right of the data subject to object to the processing of their personal data is not absolute:
a where the data subject can demonstrate compelling legitimate grounds for the
processing which overrides the interests, rights and freedoms of the data subject or
where the processing is necessary for the establishment, exercise or defence of legal
claims;77 or
72 Article 29 Working Party, Guidelines on the right to data portability, WP 242, adopted on
13 December 2016 (as last revised and adopted on 5 April 2017), page 16.
73 Article 29 Working Party, Guidelines on the right to data portability, WP 242, adopted on
13 December 2016 (as last revised and adopted on 5 April 2017), page 3.
74 Article 29 Working Party, Guidelines on the right to data portability, WP 242, adopted on
13 December 2016 (as last revised and adopted on 5 April 2017), page 10.
75 Article 29 Working Party, Guidelines on the right to data portability, WP 242, adopted on
13 December 2016 (as last revised and adopted on 5 April 2017), page 10.
76 Article 29 Working Party, Guidelines on the right to data portability, WP 242, adopted on
13 December 2016 (as last revised and adopted on 5 April 2017), page 3.
77 Article 21(1) of the GDPR.
24
© 2020 Law Business Research Ltd
EU Overview
b where the processing is necessary for research purposes, there is an exemption to the
right of data subjects to object where the processing is necessary for the performance of
a task carried out for reasons of public interest.78
25
© 2020 Law Business Research Ltd
EU Overview
In determining whether the processing falls within this scope, the EDPB has published
guidance stating that DSAs will interpret ‘substantially affects’ on a case-by-case basis taking
into account:
a the context of the processing;
b the type of data;
c the purpose of the processing and a range of other factors, including, for example,
whether the processing causes, or is likely to cause, damage, loss or distress to data
subjects; or
d whether it involves the processing of a wide range of personal data.
Assuming a controller is engaged in cross-border processing, it will need to carry out the
main establishment test. If a controller has establishments in more than one Member State,
its main establishment will be the place of its ‘central administration’ (which is not defined
in the GDPR) unless this differs from the establishment in which the decisions on the
purposes and means of the processing are made and implemented, in which case the main
establishment will be the latter.79
For processors, the main establishment will also be the place of its central administration.
However, to the extent a processor does not have a place of central administration in the
EU, the main establishment will be where its main processing activities are undertaken. The
EDPB in its guidance on lead supervisory authorities, make it clear that the GDPR does not
26
© 2020 Law Business Research Ltd
EU Overview
permit ‘forum shopping’80 and that where a company does not have an establishment in the
EU, the one-stop-shop mechanism does not apply and it must deal with DSAs in every EU
Member State in which it is active.81
Importantly under Article 60 of the GDPR, other concerned DSAs can also be involved
in the decision-making for a cross-border case. According to the GDPR, a concerned DSA
will participate where:
a the establishment of the controller or processor subject to the investigation is in the
concerned DSA’s Member State;
b data subjects in the concerned DSA’s Member State are substantially or are likely to be
substantially affected by the processing of the subject of the investigation; or
c a complaint has been lodged with that DSA.82
In the case of a dispute between DSAs, the EDPB shall adopt a final binding decision.83 The
GDPR also promotes cooperation among Member State DSAs by requiring the lead DSA
to submit a draft decision on a case to the concerned DSA, where they will have to reach a
consensus prior to finalising any decision.84
EDPB
The EDPB is an independent EU-wide body, which contributes towards ensuring the
consistent application of the GDPR across all EU Member States, and promotes cooperation
between EU DSAs. The EDPB is comprised of representatives from all EU DSAs, the
European Data Protection Supervisor, the EU’s independent data protection authority, and
a European Commission representative, who has a right to attend EDPB meetings without
voting rights.
Since the coming into force of the GDPR, the EDPB has been fairly active in publishing
GDPR guidance and for the most part this has been well received by companies. In addition
to the GDPR guidance published by the former Article 29 Working Party and adopted by the
EDPB, the EDPB has finalised guidelines on codes of conduct and certification mechanisms.
The EDPB has also published a variety of draft guidelines including addressing the territorial
scope of the GDPR and video surveillance. We expect to see further guidance published in
the coming year.
Enforcement rights
The GDPR provides data subjects with a multitude of enforcement rights in relation to the
processing of their personal data:
a Right to lodge a complaint with the DSA: Article 77 of the GDPR provides data
subjects with the right to lodge a complaint with a DSA, in the Member State of the
80 Article 29 Working Party, Guidelines for identifying a controller or processor’s lead supervisory authority,
WP244, adopted on 13 December 2016 and revised on 5 April 2017, page 8.
81 Article 29 Working Party, Guidelines for identifying a controller or processor’s lead supervisory authority,
WP244, adopted on 13 December 2016 and revised on 5 April 2017, page 10.
82 Article 4(22) of the GDPR.
83 Article 65(1) of the GDPR.
84 Article 60 of the GDPR.
27
© 2020 Law Business Research Ltd
EU Overview
data subject’s habitual residence, place of work or place of the alleged infringement of
the GDPR, where the data subject considers that the processing of his or her personal
data infringes the data protection requirements of the GDPR.
b Right to an effective judicial remedy against a controller or processor: Article 79 of the
GDPR provides data subjects with the right to bring a claim against a controller or a
processor before the courts of the Member State where the controller or processor is
established in, or where the data subject has his or her habitual residence, unless the
controller or processor is a public authority of a Member State acting in the exercise of
its public powers.
c Right to compensation and liability: Article 82 of the GDPR provides data subjects
with the right to receive compensation from the controller or processor where the data
subject has suffered material or non-material damage as a result of an infringement of
the GDPR.
Administrative fines
Notably, Article 83 of the GDPR grants DSAs the power to impose substantial fines on
controllers or processors for the infringement of the GDPR. The GDPR provides a two-tier
structure for fines, where the following will result in fines of up to €10 million or 2 per cent
of annual turnover, whichever is greater:
a failure to ensure appropriate technical and organisational measures are adopted when
determining the means of processing the personal data in addition to the actual
processing itself;
b failing to comply with the Article 28(3) of the GDPR, where any processing of personal
data must be governed by a written data processing agreement;
c maintaining records as a controller of all processing activities under its responsibility;
d conducting data protection impact assessments; and
e notifying personal data breaches to the data subject and data supervisory authorities,
respectively.85
The GDPR states that certain infringements of the GDPR merit a higher penalty and will
be subject to higher fines of up to €20 million or 4 per cent of annual turnover, whichever is
the greater.86 These include:
a infringements of the basic principles of processing personal data, including conditions
for obtaining consent;
b failing to comply with data subjects’ rights requests; and
c failing to ensure there are appropriate safeguards for the transfer of personal data
outside the EEA.
These extensive penalties represent a significant change in the field of data protection that
should ensure that businesses and governments take data protection compliance seriously.
28
© 2020 Law Business Research Ltd
EU Overview
DSAs are not limited to enforcement and investigative powers, but also have corrective87 and
authorisation and advisory88 powers.
29
© 2020 Law Business Research Ltd
EU Overview
Relevant in the context of health data is Article 9(2)(j) of the GDPR, which includes the
legal ground regarding where the processing is necessary for scientific research purposes. To
rely on this legal ground the processing must comply with Article 89(1) of the GDPR, which
requires that the processing be subject to appropriate safeguards to ensure technical and
organisational measures are in place and in particular, to comply with the principle of data
minimisation.
30
© 2020 Law Business Research Ltd
EU Overview
communications will require the recipient’s prior consent or can be sent without prior consent
unless recipients have indicated that they do not wish to receive such communications (i.e.,
consent on an opt-out basis).92
The ePrivacy Directive imposes requirements on providers of publicly available
electronic communication services to put in place appropriate security measures and to notify
subscribers of certain security breaches in relation to personal data.93 The ePrivacy Directive
was also amended in 200994 to require that website operators obtain the informed consent of
users to collect personal data of users through website ‘cookies’ or similar technologies used for
storing information. There are two exemptions to the requirement to obtain consent before
using cookies: when the cookie is used for the sole purpose of carrying out the transmission
of a communication over an electronic communications network; and when the cookie is
strictly necessary for the provider of an information society service explicitly requested by the
subscriber or user to provide the service.95
The former Article 29 Working Party published an opinion on the cookie consent
exemption96 that provides an explanation on which cookies require the consent of website
users (e.g., social plug-in tracking cookies, third-party advertising cookies used for
behavioural advertising, analytics) and those that fall within the scope of the exemption
(e.g., authentication cookies, multimedia player session cookies and cookies used to detect
repeated failed login attempts). Guidance on how to obtain consent has been published at a
national level by various data protection authorities.97
In July 2016, the former Article 29 Working Party issued an opinion on a revision of
the rules contained in the ePrivacy Directive.98
On 10 January 2017, the European Commission issued a draft of the proposed
Regulation on Privacy and Electronic Communications (the ePrivacy Regulation) to replace
the existing ePrivacy Directive.99 The ePrivacy Regulation will complement the GDPR and
provide additional sector-specific rules, including in relation to marketing and the use of
website cookies.
The key changes in the proposed ePrivacy Regulation will:
a require a clear affirmative action to consent to cookies;
b attempt to encourage the shifting of the burden of obtaining consent for cookie use to
website browsers; and
c ensuring that consent for direct marketing will be harder to obtain and must meet the
standard set out in the Regulation; however, existing exceptions, such as the exemption
where there is an existing relationship and similar products and services are being
marketed, are likely to be retained.
31
© 2020 Law Business Research Ltd
EU Overview
The European Commission’s original timetable for the ePrivacy Regulation was for it to apply
in EU law and have direct effect in Member State law from 25 May 2018, coinciding with
the GDPR’s entry into force. However, the text is still to be adopted. On 3 June 2020, the
Presidency of the Council of European Union published a progress report indicating that
substantial progress on the draft ePrivacy Regulation has been as limited due to the covid-19
pandemic.100 The ePrivacy Regulation is now not expected to come into force until 2021 at
the earliest.
IV CLOUD COMPUTING
In its guidance on cloud computing adopted on 1 July 2012,101 the EU’s WP29 states that
the majority of data protection risks can be divided into two main categories: lack of control
over the data; and insufficient information regarding the processing operation itself. The
lawfulness of the processing of personal data in the cloud depends on adherence to the
principles of the now repealed Directive that are considered in the WP29 opinion, and some
of which are summarised below. It would be reasonable to expect that the EDPB will issue
new guidance on cloud computing and data protection to reflect new requirements under
the GDPR. For the purposes of this section, references to the Directive should be read as
references to the GDPR.
iii Security103
Under the Directive, a controller must have in place adequate organisational and technical
security measures to protect personal data and should be able to demonstrate accountability.
The WP29 opinion comments on this point, reiterating that it is of great importance that
concrete technical and organisational measures are specified in the cloud agreement, such
as availability, confidentiality, integrity, isolation and portability. As a consequence, the
agreement with the cloud provider should contain a provision to ensure that the cloud
100 Council of the European Union, ePrivacy Regulation Progress Report, accessible at https://data.consilium.
europa.eu/doc/document/ST-8204-2020-INIT/en/pdf.
101 WP 196 – Opinion 5/2012 on Cloud Computing.
102 Article 6(b) of the Data Protection Directive.
103 Article 17(2) of the Data Protection Directive.
32
© 2020 Law Business Research Ltd
EU Overview
provider and its subcontractors comply with the security measures imposed by the client. It
should also contain a section regarding the assessment of the security measures of the cloud
provider. The agreement should also contain an obligation for the cloud provider to inform
the client of any security event. The client should also be able to assess the security measures
put in place by the cloud provider.
iv Subcontractors
The WP29 opinion indicates that sub-processors may only be commissioned on the basis
of a consent that can be generally given by the controller in line with a clear duty for the
processor to inform the controller of any intended changes in this regard, with the controller
retaining at all times the possibility to object to the changes or to terminate the agreement.
There should also be a clear obligation on the cloud provider to name all the subcontractors
commissioned, as well as the location of all data centres where the client’s data can be hosted.
It must also be guaranteed that the cloud provider and all the subcontractors shall act only
on instructions from the client. The agreement should also set out the obligation on the part
of the processor to deal with international transfers, for example, by signing contracts with
sub-processors, based on the EU model contract clauses.
v Erasure of data104
The WP29 opinion states that specifications on the conditions for returning the personal data
or destroying the data once the service is concluded should be contained in the agreement.
It also states that data processors must ensure that personal data are erased securely at the
request of the client.
viii Confidentiality
The WP29 opinion recommends that an agreement with the cloud provider should contain
confidentiality wording that is binding both upon the cloud provider and any of its employees
who may be able to access the data.
33
© 2020 Law Business Research Ltd
EU Overview
V WHISTLE-BLOWING HOTLINES
The WP29 published an Opinion in 2006 on the application of the EU data protection
rules to whistle-blowing hotlines107 providing various recommendations under the now
repealed Directive, which are summarised below. It would be reasonable to expect that the
EDPB will issue new guidance on whistle-blowing hotlines to reflect new requirements under
the GDPR. For the purposes of this section, references to the Directive should be read as
references to the GDPR.
107 WP 117 – Opinion 1/2006 on the application of EU data protection rules to internal whistle-blowing
schemes in the fields of accounting, internal accounting controls, auditing matters, fight against bribery,
banking and financial crime.
34
© 2020 Law Business Research Ltd
EU Overview
matters and reporting as well as the fight against bribery, banking and financial crime,
or insider trading, might be seen as serving a legitimate interest of a company that
would justify the processing of personal data by means of such schemes.
35
© 2020 Law Business Research Ltd
EU Overview
Where there is a substantial risk that such notification would jeopardise the ability of the
company to effectively investigate the allegation or gather evidence, then notification to the
incriminated person may be delayed as long as the risk exists.
The whistle-blowing scheme also needs to ensure compliance with the individual’s right,
under the Directive, of access to personal data on them and their right to rectify incorrect,
incomplete or outdated data. However, the exercise of these rights may be restricted to
protect the rights of others involved in the scheme and under no circumstances can the
accused person obtain information about the identity of the whistle-blower, except where the
whistle-blower maliciously makes a false statement.
viii Security
The company responsible for the whistle-blowing scheme must take all reasonable technical
and organisational precautions to preserve the security of the data and to protect against
accidental or unlawful destruction or accidental loss and unauthorised disclosure or access.
Where the whistle-blowing scheme is run by an external service provider, the EU controller
needs to have in place a data processing agreement and must take all appropriate measures
to guarantee the security of the information processed throughout the whole process and
commit themselves to complying with the data protection principles.
36
© 2020 Law Business Research Ltd
EU Overview
of management of the company concerned. In this case, data must only be communicated
under confidential and secure conditions to the competent organisation of the recipient
entity, which provides equivalent guarantees as regards management of the whistle-blowing
reports as the EU organisation.
VI E-DISCOVERY
The former Article 29 Working Party published a working document providing guidance to
controllers in dealing with requests to transfer personal data to other jurisdictions outside the
EEA for use in civil litigation108 and to help them to reconcile the demands of a litigation
process in a foreign jurisdiction with EU data protection obligations.
The main suggestions and guidelines include the following:
a Possible legal bases for processing personal data as part of a pretrial e-discovery procedure
include consent of the data subject and compliance with a legal obligation. However,
the former Article 29 Working Party states that an obligation imposed by a foreign
statute or regulation may not qualify as a legal obligation by virtue of which data
processing in the EU would be made legitimate. A third possible basis is a legitimate
interest pursued by the data controller or by the third party to whom the data are
disclosed where the legitimate interests are not overridden by the fundamental rights
and freedoms of the data subjects. This involves a balance-of-interest test taking into
account issues of proportionality, the relevance of the personal data to litigation and the
consequences for the data subject.
b Restricting the disclosure of data if possible to anonymised or redacted data as an initial
step and after culling the irrelevant data, disclosing a limited set of personal data as a
second step.
c Notifying individuals in advance of the possible use of their data for litigation purposes
and, where the personal data is actually processed for litigation, notifying the data
subject of the identity of the recipients, the purposes of the processing, the categories
of data concerned and the existence of their rights.
d Where the non-EEA country to which the data will be sent does not provide an
adequate level of data protection, and where the transfer is likely to be a single transfer
of all relevant information, then there would be a possible ground that the transfer is
necessary for the establishment, exercise or defence of a legal claim. Where a significant
amount of data is to be transferred, the WP29 previously suggested the use of binding
corporate rules or the Safe Harbor regime. However, Safe Harbor was found to be
invalid by the CJEU in 2015 and was effectively replaced on 12 July 2016 by the
Privacy Shield. In the absence of any updates from the EDPB to the former Article
29 Working Party’s e-discovery working document, it can be assumed that the use of
Privacy Shield is also an appropriate means of transferring significant amounts of data.
It also recognises that compliance with a request made under the Hague Convention
would provide a formal basis for the transfer of the data.
It would be reasonable to expect that the EDPB will issue new guidance on e-discovery, in
light of the entry into force of Article 48 of the GDPR.
108 WP 158 – Working Document 1/2009 on pretrial discovery for cross-border civil litigation adopted on
11 February 2009.
37
© 2020 Law Business Research Ltd
EU Overview
Article 48 of the GDPR facilitates the transfer of personal data from the EU to a third
country on the basis of a judgment of a court or tribunal or any decision of an administrative
authority of a third country where the transfer is based on a mutual legal assistance treaty
(MLAT) between the requesting third country and the EU Member State concerned.109 As
MLATs between EU Member States and third countries are not widespread, there is a further
exception for data controllers to rely on. The GDPR states that the restrictive requirements
in which a judicial or administrative request from a third country to transfer personal data
from the EU to that third country is only permissible on the basis of an MLAT, is ‘without
prejudice to other grounds for transfer’ in the GDPR.
Accordingly, this enables controllers in the EU facing e-discovery requests to transfer
personal data to a jurisdiction outside of the EU to rely on transfer mechanisms such as
EU standard contractual clauses and binding corporate rules. In the absence of a transfer
mechanism, the GDPR provides certain derogations for several specific situations in which
personal data can in fact be transferred outside the EEA:
a where the data subject has explicitly consented to the proposed transfer, after having
been informed of the possible risks of such transfers for the data subject due to the
absence of an adequacy decision and appropriate safeguards;
b the transfer is necessary for the performance of a contract between the data subject and
the controller;
c the transfer is necessary for the conclusion or performance of a contract concluded in
the interest of the data subject;
d the transfer is necessary for important reasons of public interest under EU law or the
law of the Member State in which the controller is subject;
e the transfer is necessary for the establishment, exercise or defence of legal claims;
f the transfer is necessary to protect the vital interests of the data subject, where the data
subject is physically or legally incapable of giving consent; and
g the transfer is made on the basis of compelling legitimate interests of the controller,
provided the transfer is not repetitive and only concerns a limited number of data
subjects.110
38
© 2020 Law Business Research Ltd
EU Overview
ii Cooperation network
The competent authorities in EU Member States, the European Commission and ENISA
will form a cooperation network to coordinate against risks and incidents affecting network
and information systems.115 The cooperation network will exchange information between
authorities and also provide early warnings on information security risks and incidents, and
agree on a coordinated response in accordance with an EU–NIS cyber-cooperation plan.
Member States had until May 2018 to implement the NIS Directive into their national laws.
39
© 2020 Law Business Research Ltd
EU Overview
Organisations should review the provisions of the NIS Directive and of any relevant
Member State implementing legislation and take steps as applicable to amend their
cybersecurity practices and procedures to ensure compliance.
VIII OUTLOOK
The GDPR came into force over two years ago and while it appears the immediate panic
surrounding it seems to have subsided, the legislation remains a hot topic and one many
companies continue to grapple with. The GDPR continues to evolve with new guidance
being published at an EU and national level. At the same time there have been a number of
enforcement actions and cases dealing with the requirements of the GDPR that companies
will need to carefully consider. Dealing with the GDPR has been made more difficult by
the lack of consistency in approach taken at a national level by EU Member States and this
remains the case in spite of guidance being published by the EDPB at an EU-level. The
developments on international data transfers with the Schrems II decision will also require
many international companies to closely examine their data transfers from the EU and
consider how best to deal with these transfers going forward. It is likely that further guidance
on Schrems II will be published by the European Data Protection Board and national Data
Protection Authorities.
40
© 2020 Law Business Research Ltd
Chapter 3
APEC OVERVIEW
I OVERVIEW
The Asia-Pacific Economic Cooperation (APEC) is a regional economic forum established in
1989 to enhance economic growth and prosperity in the region. It began with 12 Asia-Pacific
economies as an informal ministerial-level dialogue group, and has grown to include the
following 21 economies as of August 2020: Australia, Brunei, Canada, Chile, China, Hong
Kong, Indonesia, Japan, Korea, Malaysia, Mexico, New Zealand, Papua New Guinea, Peru,
the Philippines, Russia, Singapore, Taiwan, Thailand, the United States and Vietnam.2
Because APEC is primarily concerned with trade and economic issues, the criterion for
membership is being an economic entity rather than a nation. For this reason, its members
are usually described as ‘APEC member economies’ or ‘APEC economies.’ Collectively,
APEC’s 21 member economies account for more than half of world real GDP in purchasing
power parity and over 44 per cent of total world trade.3
The main aim of APEC is to fulfil the goals established in 1994 at the Economic Leaders
Meeting in Bogor, Indonesia of free and open trade and investment in the Asia-Pacific area
for both industrialised and developing economies. Towards that end, APEC established a
framework of key areas of cooperation to facilitate achievement of these ‘Bogor Goals’. These
areas, also known as the three pillars of APEC, are the liberalisation of trade and investment,
business facilitation, and economic and technical cooperation.
In 1999, in recognition of the exponential growth and transformative nature of
electronic commerce, and its contribution to economic growth in the region, APEC
established an Electronic Commerce Steering Group (ECSG), which began to work towards
the development of consistent legal, regulatory and policy environments in the Asia-Pacific
1 Ellyce R Cooper and Alan Charles Raul are partners and Sheri Porath Rockwell is an associate at Sidley
Austin LLP. The current authors wish to thank Catherine Valerio Barrad, who was the lead author for the
original version of this chapter and made substantial contributions to prior updates. She was formerly a
partner at Sidley and is now university counsel for San Diego State University.
2 The current list of APEC member economies can be found at www.apec.org/About-Us/About-APEC/
Member-Economies.
3 See www.apec.org/FAQ.
41
© 2020 Law Business Research Ltd
APEC Overview
area.4 Soon thereafter, in 2003, APEC established the Data Privacy Subgroup under the
ECSG to address privacy and other issues identified in the 1998 APEC Blueprint for Action
on Economic Commerce.5
The work of the Data Privacy Subgroup led to the creation and implementation, in
2005, of the APEC Privacy Framework.
The Framework consists of a set of privacy principles and implementation guidelines
designed to balance APEC’s goals of protecting privacy and facilitating the free flow of
information among APEC economies to ensure continued trade and economic growth
in the APEC region.6 This principles-based approach allows for ‘consistent rather than
identical’ privacy protections that reconcile the need for consumer privacy with business
and commercial interests, while also recognising the ‘cultural and other diversities’ that exist
within the member economies.7 The Framework was modelled upon the OECD’s Guidelines
on the Protection of Privacy and Trans-Border Flows of Personal Data,8 and updated in
2015.9
Unlike other privacy frameworks, APEC does not impose treaty obligation requirements
on its member economies. Instead, the cooperative process among APEC economies relies
on non-binding commitments, open dialogue and consensus. Member economies undertake
commitments on a voluntary basis. Consistent with this approach, the APEC Privacy
Framework is advisory only and thus has few legal requirements or constraints.
APEC’s Cross-Border Privacy Rules (CBPR) system implements the APEC Framework
as it applies to the flow of personal information across APEC member economies.
Specifically, it is a government-backed data privacy certification that data controllers trading
within APEC member economies can join to demonstrate their compliance with the APEC
Privacy Framework’s privacy principles. In 2015, APEC developed the Privacy Recognition
for Processors (PRP) system, a corollary to the CBPR system for data processors. APEC
continues to work with the EU to study the potential interoperability of the APEC and
the EU’s General Data Protection Regulation (GDPR), building upon the issuance in 2014
of a joint referential document mapping requirements of APEC and the EU’s former data
protection regime.
The APEC Privacy Framework, the CBPR and PRP systems, the cooperative privacy
enforcement system and APEC–EU collaborative efforts are all described in more detail
below.
4 The ECSG was originally established as an APEC senior officials’ special task force, but in 2007 was
realigned to the Committee on Trade and Investment. This realignment underscores the focus within the
ECSG, and its Data Privacy Subgroup, on trade and investment issues.
5 APEC endorsed the Blueprint in 1998 to ‘develop and implement technologies and policies, which build
trust and confidence in safe, secure and reliable communication, information and delivery systems, and
which address issues including privacy’. See APEC Privacy Framework (2005), Paragraph 1 (available at
https://www.apec.org/Publications/2017/08/APEC-Privacy-Framework-(2015)).
6 APEC Privacy Framework (2015), Forword.
7 APEC Privacy Framework., Preamble, Paragraph 6.
8 https://www.apec.org/Publications/2017/08/APEC-Privacy-Framework-(2015).
9 https://www.apec.org/Publications/2017/08/APEC-Privacy-Framework-(2015).
42
© 2020 Law Business Research Ltd
APEC Overview
43
© 2020 Law Business Research Ltd
APEC Overview
44
© 2020 Law Business Research Ltd
APEC Overview
and information that is ‘legally obtained and accessed from government records that are
available to the public, journalistic reports, or information required by law to be made
available to the public’.22
Principle II – notice
The notice principle is designed to both provide transparency about the personal information
collected about individuals and how it is being used and to also inform individuals about the
choices and means they have to limit the use and disclosure of, and to access and correct, their
personal information, including how to contact the controller about its personal information
practices.24 Towards that end, this principle directs that such disclosures be made at or before
the time of collection, or as soon thereafter as is practicable, so that individuals can ‘make
an informed decision’ about interacting with the controller.25 Yet, it also recognises there are
situations in which such notice is not necessary, such as in the exchange of business cards in
the context of a business relationship where the parties would not expect to be given notice.26
45
© 2020 Law Business Research Ltd
APEC Overview
Principle V – choice
The choice principle directs that, where appropriate, individuals be provided with
mechanisms to exercise choice in relation to the collection, use and disclosure of their personal
information, and that such choices be ‘clearly worded’ to make it easily understandable to
particular audiences (e.g., providing in relevant languages or using age-appropriate language),
and are displayed ‘clearly and conspicuously’.29 This principle also contemplates that, in
some instances, consent is neither necessary (e.g., when contact information exchanged in a
business-to-business context) nor practicable (e.g., employers giving employees the choice to
use their personal information for HR purposes).30
46
© 2020 Law Business Research Ltd
APEC Overview
denials. This principle includes exceptions when the burden of access or correction outweighs
the risks to individual privacy, the information is subject to legal or security holds, or where
the privacy rights of other individuals would be violated.31
Principle IX – accountability
This principle requires that a data controller be accountable for complying with measures
that give effect to the nine principles. When transferring personal information to another
person or organisation, whether domestically or internationally, this principle states the
controller should either obtain consent of the individual or exercise due diligence to ensure
that recipients also protect the information in a manner that is consistent with the principles.
Obtaining consent or conducting such due diligence is not required when domestic laws
require disclosures of personal information.
This has often been described as the most important innovation in the APEC Privacy
Framework and it has been influential in encouraging other privacy regulators to consider
similar accountability processes tailored to the risks associated with specific data.
Unlike other international frameworks, the APEC Privacy Framework neither restricts
the transfer of data to countries without APEC-compliant data protection laws nor requires
such a transfer to countries with APEC-compliant laws. Instead, APEC adopted the
accountability principle in lieu of data import and export limitations as being more consistent
with modern business practices and the stated objectives of the Privacy Framework.
47
© 2020 Law Business Research Ltd
APEC Overview
that need further consideration or where the privacy protections are in ‘draft’ form.35 IAPs
are posted on the webpage of APEC’s Digital Economy Steering Group.36 As of 2020, 14
member economies have IAPs.37
Without a central enforcement authority, though, it appears that most economies are
not placing a high priority on updating their IAPs. As of August 2020, with the exception of
Canada, none of the plans on APEC’s webpage had been updated in the last five years, and
several of the IAPs dated back to 2006 (including the US plan).38
Thus, the APEC Privacy Framework contemplates variances in implementation across
member economies. It encourages member economies to share information, surveys and
research and to expand their use of cooperative arrangements (such as the Cross-Border
Privacy Enforcement Arrangement (CPEA) to facilitate cross-border cooperation in
investigation and enforcement.39
35 See APEC Information Privacy Individual Action Plan – Canada (August 2019) at footnotes 1-4
(instructions for completing template Action Plan chart) found at https://www.apec.org/Groups/
Committee-on-Trade-and-Investment/Digital-Economy-Steering-Group/Data-Privacy-Individual-Action-
Plan.
36 https://www.apec.org/Groups/Committee-on-Trade-and-Investment/Digital-Economy-Steering-Group/
Data-Privacy-Individual-Action-Plan.
37 See https://www.apec.org/Groups/Committee-on-Trade-and-Investment/
Digital-Economy-Steering-Group/Data-Privacy-Individual-Action-Plan
38 https://www.apec.org/Groups/Committee-on-Trade-and-Investment/Digital-Economy-Steering-Group/
Data-Privacy-Individual-Action-Plan.
39 See APEC Privacy Framework, Paragraphs 57–64.
40 See https://www.apec.org/About-Us/About-APEC/Fact-Sheets/APEC-Privacy-Framework.aspx.
41 Hredzack, Tammy L and Gómez, Azul Ogazón, ‘Enabling Electronic Commerce: The Contribution of
APEC’s Data Privacy Framework’, APEC Policy Support Unit (October 2011) at pages 7–8.
42 Hredzack, Tammy L and Gómez, Azul Ogazón, ‘Enabling Electronic Commerce: The Contribution of
APEC’s Data Privacy Framework’, APEC Policy Support Unit (October 2011), pages 10–11.
43 http://cbprs.org/business/.
48
© 2020 Law Business Research Ltd
APEC Overview
having privacy practices and procedures that meet APEC standards that are independent
of individual national privacy regimes. The CBPR system adopts an ‘accountability-based’
approach whereby organisations are held to comply with CBPR principles, rather than comply
with top-down regulation that may be ill-suited to an organisation’s unique circumstances.44
As of August 2020, nine APEC economies participate in the CBPR system – Canada, Japan,
Mexico, South Korea, Singapore, the United States, Australia, Taiwan and the Philippines.45
In general, the CBPR system requires organisations to adopt policies and procedures
regarding the transfer of personal data across borders that meet or exceed the standards in the
APEC Privacy Framework. Organisations that seek to participate in the CBPR system must
have their privacy practices and policies evaluated by an APEC-recognised accountability
agent to assess compliance with the programme. If the organisation is certified, its privacy
practices and policies will then become subject to enforcement by an accountability agent or
privacy enforcement authority.46
The CBPR system is governed by the Data Privacy Subgroup, which administers the
programme through the Joint Oversight Panel, an entity whose members are nominated
representatives of participating economies in addition to members of working groups the
Panel may establish. The Joint Oversight Panel operates according to the Charter of the APEC
Cross-Border Privacy Rules and Privacy Recognition for Processors Systems Joint Oversight
Panel and the Protocols of the APEC Cross-Border Privacy Rules System Joint Oversight
Panel.47 CBPR’s website (cbprs.org) includes general information about the system, charters
and protocols, lists of current participants and certified entities, submissions and findings
reports and template forms.48
44 http://cbprs.org/wp-content/uploads/2019/05/Benefits-of-CBPR-System-Guide_Jan-2019_FINAL.pdf.
45 http://cbprs.org/government/.
46 A privacy enforcement authority is ‘any public body that is responsible for enforcing Privacy Law, and that
has powers to conduct investigations or pursue enforcement proceedings.’ ‘Privacy Law’ is further defined
as ‘laws and regulations of an APEC Economy, the enforcement of which have the effect of protecting
personal information consistent with the APEC Privacy Framework’. APEC Cross-Border Privacy Rules
System, Policies, Rules and Guidelines, at 10.
47 See APEC Cross-Border Privacy Rules System Policies, Rules and Guidelines, at http://cbprs.org/
documents/.
48 See www.cbprs.org.
49 http://cbprs.org/business.
50 See http://cbprs.org/government/economies-requirements/ and linked Template Notice of Intent to
Participate in CBPR System, Annex B.
49
© 2020 Law Business Research Ltd
APEC Overview
b submission of a letter of intent to participate addressed to the chairs of the APEC ECSG,
the Data Privacy Subgroup and the CBPR system Joint Oversight Panel providing:
• confirmation of CPEA participation;
• identification of the APEC CBPR system-recognised accountability agent that
the economy intends to use;
• details regarding relevant domestic laws and regulations, enforcement entities
and enforcement procedures; and
• submission of the APEC CBPR system programme requirements enforcement
map.
The Joint Oversight Panel of the CBPR issues a findings report that addresses whether the
economy has met the requirements for becoming an APEC CBPR system participant. An
applicant economy becomes a participant upon the date of a positive findings report.51
Accountability agents
The CBPR system uses third-party accountability agents to certify organisations as
CBPR-compliant. Accountability agents can be either public or private entities and may also
be a privacy enforcement authority. Under certain circumstances, an APEC economy may
designate an accountability agent from another economy.
All accountability agents must be approved by the Electronic Commerce Steering
Group or ECSG. The approval process begins with the submission by the proposed agent of
an application and supporting documentation to the relevant authorities in the supporting
economy in which the proposed agent intends to operate. The relevant authority will provide
a preliminary review of the organisation and, if the authority supports the application, it
will forward it to the chairs of the ECSG, the ECSG’s Data Privacy Subgroup, and the Joint
Oversight Panel. The Joint Oversight Panel then considers the application and will vote,
by simple majority, on whether to recommend that the organisation be recognised as an
accountability agent.52
The proposed agent must meet the CBPR’s requirements for accountability agents,
which include:
a being subject to the jurisdiction of a privacy enforcement authority in an APEC
economy participating in the CBPR system;
b satisfying the accountability agent recognition criteria;
c agreeing to use the CBPR intake questionnaire to evaluate applicant organisations (or
otherwise demonstrate that propriety procedures meet the baseline requirements of the
CBPR system); and
d completing and signing the signature and contact information form.53
51 http://cbprs.org/government/economies-requirements/.
52 http://cbprs.org/accountability-agents/new-agent-process/.
53 See http://cbprs.org/accountability-agents/cbprs-requirements.
50
© 2020 Law Business Research Ltd
APEC Overview
APEC member economy may review the recommendation of any proposed accountability
agent and present objections, if any, to the ECSG. Once an application has been approved
by the ECSG, the accountability agent is deemed ‘recognised’ and may begin to certify
businesses. Complaints about a recognised accountability agent are reviewed by the Joint
Oversight Panel, which has the discretion to request investigative or enforcement assistance
from the relevant privacy enforcement authority in the APEC economy where the agent is
located.
Accountability agents are responsible for conducting initial certifications of
organisations that want to participate in the CBPR system, and are also tasked with
monitoring continued compliance with the APEC CBPR system standards. Towards that
end, CBPR-certified organisations must submit annual attestations of compliance to their
designated accountability agent. Accountability agents are responsible for ensuring that
any non-compliance is remedied in a timely fashion and reported, if necessary, to relevant
enforcement authorities. Accountability agents must publish their certification standards and
promptly report all newly certified entities, as well as any suspended or terminated entities,
to the relevant privacy enforcement authorities and the CBPR Secretariat.54
If only one accountability agent operates in an APEC economy and it ceases to
function as an accountability agent for any reason, then the economy’s participation in the
CBPR system will be suspended and all certifications issued by that accountability agent
for businesses will be terminated until the economy once again fulfils the requirements for
participation and the organisations complete another certification process.
The CBPR system website contains a chart of recognised accountability agents, their
contact information, date of recognition, approved APEC economies for certification
purposes and links to relevant documents and programme requirements.55 As of August
2020, the CBPR system recognises seven accountability agents: TRUSTe, Schellman &
Company, NCC Group, HITRUST for the United States; Infocomm Media Development
Authority for Singapore; Korea Internet and Security Agency; and the Japan Institute for
Promotion of Digital Economy and Community.56 Accountability agents for other countries
have yet to be designated.
54 http://cbprs.org/accountability-agents/ongoing-requirements/.
55 See http://cbprs.org/documents/.
56 http://cbprs.org/business/
51
© 2020 Law Business Research Ltd
APEC Overview
have been certified as of August 2020.57 Certifications often encompass subsidiaries that are
located in countries other than the certifying country. Certified companies must undergo
annual recertification, which the accountability agent reviews.
PRP system
Because the CBPR system (and the APEC Framework) applies only to data controllers,
APEC member economies and data controllers encouraged the development of a mechanism
to help identify qualified and accountable data processors. This led, in 2015, to the APEC
PRP programme, a mechanism by which data processors can be certified by an accountability
agent.59 The PRP programme does not change the fact that data controllers are responsible
for processors’ practices, and there is no requirement that data controllers engage only
PRP-recognised processors.60 The PRP certification, which is conducted by approved PRP
accountability agents, is designed to assure that processing is, at a minimum, consistent with
the data processing requirements that data controllers are required to observe under CBPR
rules.61
The Joint Oversight Panel of the CBPR administers the PRP programme pursuant to
the Charter of the APEC Cross-Border Privacy Rules and Privacy Recognition for Processors
Systems Joint Oversight Panel and the Protocols of the APEC Joint Oversight Panel with
Regard to the Privacy Recognition for Processors System.62 The rules governing certification
52
© 2020 Law Business Research Ltd
APEC Overview
of economies and accountability agents closely track the CBPR framework, requiring the
Joint Oversight Panel to engage in a similar evaluative process (e.g., issuing a findings report)
as it does pursuant to CBPR rules.63
As of August 2020, two APEC economies have joined the PRP system – the United
States and Singapore and PRP-certified accountability agents have been certified from each
country.64 Sixteen processors have been certified under the programme, all of which are based
in the United States.65
The CPEA was endorsed by the APEC ministers in 2009 and commenced in 2010 with five
participating economies: Australia, China, Hong Kong China, New Zealand and the United
States. Any privacy enforcement authority from any APEC member economy may participate
and each economy may have more than one participating privacy enforcement authority. As of
August 2020, CPEA participants included over two dozen Privacy Enforcement Authorities
from 11 APEC economies.67
Under the CPEA, any privacy enforcement authority may seek assistance from a privacy
enforcement authority in another APEC economy by making a request for assistance. The
receiving privacy enforcement authority has the discretion to decide whether to provide such
assistance.
Participation in the CPEA is a prerequisite to participation by an APEC economy in the
CBPR system. As a result, each participating APEC economy must identify an appropriate
regulatory authority to serve as the privacy enforcement authority in the CBPR system. That
privacy enforcement authority must be ready to review and investigate a CBPR complaint if
63 https://www.apec.org/~/media/.../APEC%20PRP%20Rules%20and%20Guidelines.pdf.
64 http://cbprs.org/documents/.
65 http://cbprs.org/compliance-directory/prp/.
66 www.apec.org/Groups/Committee-on-Trade-and-Investment/Digital-Economy-Steering-Group/
Cross-border-Privacy-Enforcement-Arrangement.
67 www.apec.org/Groups/Committee-on-Trade-and-Investment/Digital-Economy-Steering-Group/
Cross-border-Privacy-Enforcement-Arrangement.
53
© 2020 Law Business Research Ltd
APEC Overview
it cannot be resolved by the certified organisation or the relevant accountability agent, and
take whatever enforcement action is necessary and appropriate. As more member economies
join the CBPR system, this enforcement responsibility is likely to become more prominent.
IV INTEROPERABILITY
Given the global nature of personal information flows, APEC’s Data Privacy Subgroup has
been involved in collaborative efforts with other international organisations with the goal of
improving trust and confidence in the protection of personal information and, ultimately,
to enable the associated benefits of electronic commerce to flourish across the APEC region.
While privacy regimes such as the APEC Privacy Framework are drafted at the level of
principles, there are often very significant differences in the legal and policy implementation
of those principles in different economies around the world. In an effort to bridge those
differences and find commonality between the two largest privacy systems, APEC has been
cooperating with the EU since 2012 to study the interoperability of the APEC and EU data
privacy regimes, focusing on mechanisms that can be used to facilitate cross-border data flows
and data protection enforcement between the APEC region and the EU.68
In February 2019, the EU released an extensive study on data protection certification
mechanisms, which included a comparative analysis of the certification criteria under GDPR
and APEC’s CBPR system.69 The study found that the CBPR system was a ‘good example’
of how to set up certification oversight mechanisms, yet concluded that the CBPR’s data
transfer rules and redress mechanisms did not correspond to GDPR certification standards.70
Future interoperability discussions will need to take into account the impact of the July 2020
Schrems II decision in the European Court of Justice, which cast doubt on mechanisms to
transfer personal data from Europe to the United States, but has implications for all countries
that receive personal data from the EU.
68 www.apec.org/Groups/Committee-on-Trade-and-Investment/Digital-Economy-Steering-Group/
Data-Privacy-Subgroup-Meeting-with-European-Union.
69 https://ec.europa.eu/info/sites/info/files/data_protection_certification_mechanisms_study_publish_0.pdf.
70 https://ec.europa.eu/info/sites/info/files/data_protection_certification_mechanisms_study_publish_0.pdf.
71 https://www.privacy.gov.ph/2019/09/ph-joins-apec-privacy-system/.
72 http://cbprs.org/documents/.
73 http://cbprs.org/compliance-directory/cbpr-system/.
74 http://cbprs.org/compliance-directory/prp/.
54
© 2020 Law Business Research Ltd
APEC Overview
Also in 2020, APEC’s CBPR system was recognised in the United States–Mexico–
Canada Agreement as ‘a valid mechanism to facilitate cross-border information transfers
while protecting personal information’.75
No CBPR enforcement actions were brought in 2020, as governments in affected
regions focused on matters relating to the global covid-19 crisis. Additionally, the planned
2019 APEC Summit in Chile was cancelled owing to political unrest in the region.76
Although the APEC CBPR system covers the world’s largest and most dynamic
marketplace, and promises to provide the opportunity to promote data flow across the world’s
largest single platform of its kind, the system has been described as ‘an underperformer’77 in
comparison with, for instance, the GDPR. Part of the reason for this ‘underperformance’ is
that, as outlined above, APEC member economies are not under any binding commitment to
legislate domestically to adopt the APEC CBPR framework. Owing to the voluntary nature
of the arrangements made by APEC, inevitably, member economies tend to take different
approaches to data protection, especially since APEC member economies come from diverse
cultures, histories as well as systems. Further, the trend of data localisation in Asia-Pacific, as
represented by China and Vietnam, also undermines regional and international cooperative
efforts on data privacy protection. As a result of these factors, adoption of the APEC CBPR
system is progressing slowly. Looking ahead, as many international and regional efforts
are stalled as a result of the covid-19 pandemic, we do not anticipate much significant
development in APEC’s data privacy protection efforts in the coming year.
55
© 2020 Law Business Research Ltd
Chapter 4
ARGENTINA
I OVERVIEW
Data protection was introduced to the Argentine legal system following the 1994
constitutional reform, with the incorporation of the habeas data procedure.2 With this
constitutional reform, data protection rights in Argentina acquired constitutional protection
and, thus, are considered fundamental rights that cannot be suppressed or restricted without
sufficient cause.
In October 2000, Congress passed Law No. 25,326 (the Data Protection Law),
which focused directly on data protection. The Data Protection Law defined several data
protection-related terms and included general principles regarding data collection and storage,
outlining the data owner’s rights and setting out the guidelines for the processing of personal
data. It is an omnibus law largely based on the EU Data Protection Directive 95/463 in force
at that time, and the subsequent local legislation issued by the European countries (mainly
Spain). Moreover, on 30 June 2003, the European Union issued a resolution establishing that
Argentina had a level of protection consistent with the protection granted by the Directive
with respect to personal data.
In 2014, Law No. 26,951 (the Do-Not-Call Law) created the do-not-call registry and
expanded the protection of data owner’s rights. This regulation allows the data owner to block
contact from companies advertising, selling or giving away products and services. Companies
offering products and services by telephonic means must register with the Agency and consult
the list of blocked numbers on a monthly basis before engaging in marketing calls.
The Agency of Access to Public Information (the Agency)4 is the enforcement authority
in charge of applying the Data Protection Law and the Do-Not-Call Law. Among other
responsibilities, the Agency is in charge of administrating the do-not-call registry, assisting
individuals regarding their rights, receiving claims and carrying out inspections of companies
to assess their compliance with the Data Protection Law.
1 Adrián Furman is a partner and Francisco Zappa is an associate at Bomchil. The authors wish to thank
Catalina Malara, former associate at Bomchil, for her contribution to writing this chapter.
2 Section 43, Paragraph 3 of the National Constitution states that, ‘Any person can file this action to obtain
access to any data referring to himself or herself, registered in public or private records or databases,
intended to supply information; and in the case of false data or discriminatory data, to request the
suppression, rectification, confidentiality or updating of the same. The secret nature of the source of
journalistic information shall not be impaired.’
3 Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection
of individuals with regard to the processing of personal data and on the free movement of such data.
4 The Agency of Access to Public Information was created by Decree 746 dated 26 September 2017, which
amended the Ministries Law No. 26.951.
56
© 2020 Law Business Research Ltd
Argentina
57
© 2020 Law Business Research Ltd
Argentina
they comply with their duty of professional secrecy. Moreover, the Ministry of Health and
the Provincial Ministries are allowed to collect, process and transfer between themselves
covid-related data without the data owner’s consent.
The guideline for the use of geo-tracking tools in the context of the pandemic
establishes that geo-tracking data is personal data protected by the Data Protection Law. As
such, it can only be processed with the data owner’s consent or through any of the specific
exemptions for obtaining consent established by the Personal Data Protection Law (i.e., state
entities can use these tools without the data owners’ consent provided they act within their
functions). All data protection principles (data quality, data minimisation) and rights (i.e.,
access, rectification and suppression rights and right to revoke consent) should be respected
when using geo-tracking tools.
58
© 2020 Law Business Research Ltd
Argentina
Another important obligation for database owners is the obligation for registration with
the Agency. To file the registration, the company or individual responsible for the database
must provide information regarding the location of the database, its characteristics and
purpose, specifications of the data provided, origin, means of collection, etc. The registration
process is free and the information provided to the Agency must be updated periodically.
59
© 2020 Law Business Research Ltd
Argentina
owner’s prior and informed consent. Consent shall be deemed as granted by the data owner
if the data collector includes signs indicating the existence of these cameras, the purpose
of the data collection, the person responsible for the processing and the relevant contact
information. A template of this sign is included in the Disposition. The relevant database
must be registered and the data collector must implement a manual for its use. Additionally,
Disposition 4/2019 approved best practice guidelines for individuals to exercise the access
right regarding data obtained through closed circuit television cameras.
v Technological innovation
The Data Protection Law has not been amended recently. For that reason, several technological
innovations fall outside its scope.
The use of cookies, for example, was not included in the legislation. Nevertheless,
by application of the Data Protection principles, companies trying to obtain information
through them must obtain the user’s consent to collect information.5
The use of Big Data, on the other hand, presents a much deeper issue. Through Big
Data, companies collect large amounts of information and its different uses are not always
clearly determinable since data is often reused – so violating one of the Data Protection Law’s
main principles, which is specifying to the data owner the purpose of the data collection.
Moreover, data processed must be accurate, true and not excessive in relation to the purpose.
In many cases, it is not possible to assess that all information is accurate. Because of the large
volume of information provided, some of it is bound to be inaccurate.6 The Data Protection
Law has fallen behind in regulating the use of Big Data. The collection of excessive amounts
of information is only of benefit to the user, and regulation of Big Data must recognise this
new and useful way of processing data and always respect the user’s rights.
The Agency has enacted several regulations aimed at reducing the technological gap
generated between the enactment of the Data Protection Law and the present day. For
example, Disposition 10/2015 establishes that companies using closed-circuit television
cameras must implement a policy that includes the means of data collection, a reference to the
place, dates and hours of operation of the cameras, technical and confidentiality mechanisms
to be used, ways of exercising the data owner’s rights and, if applicable, reasons that justify
obtaining a picture of the individuals entering the facilities.
Moreover, Disposition 18/2015 establishes ‘best practice guidelines for data collection
through apps’. In addition to explaining specifically how data protection principles operate
in this matter, the Disposition establishes that the privacy policy should be clear and easily
accessible for users. Moreover, the privacy policy for apps designed for use on phones or
tablets must be shown in a useful way for users, bearing in mind the size restrictions that apply
to these devices. The use of icons, pictures, distinctive colours and sounds is recommended;
extra care is requested when the app is suitable for children or teenagers.
Lastly, Disposition 20/2015 regulates the collection of photos, films, sounds or any
other data in digital format through VANTs or drones.
5 Osvaldo Alfredo Gozaini, Habeas Data, Protection of Personal Data (Rubinzal-Culzoni), p. 325.
6 Luciano Gandola, ‘Conflicts between Big Data and the Data Protection Law’, Infojus.
60
© 2020 Law Business Research Ltd
Argentina
7 See footnote 3.
8 Section 12 of the Data Protection Law.
61
© 2020 Law Business Research Ltd
Argentina
62
© 2020 Law Business Research Ltd
Argentina
After the inspection is finalised, the inspector will issue a final report with the outcome
of the inspection. If the database owner has complied with the law, the proceeding is finalised.
If it has not complied with the regulations, it is granted 15 days to remedy its non-fulfilment,
otherwise sanctioning proceedings will begin.
63
© 2020 Law Business Research Ltd
Argentina
9 Federal Court of Appeals on Contentious Administrative Matters, Docket No. 49,482/2016, ‘Torres Abad,
Carmen C/En JGM s/habeas data’, 3 July 2018.
64
© 2020 Law Business Research Ltd
Argentina
citizens or if their data handling activities have any effect on or are connected in any way
with, the Argentine territory. However, if such foreign company does not have affiliates in
Argentina or assets of any kind, the enforcement authority of the Agency will be impaired,
in practice.
Consequently, on a theoretical level, what triggers the need to comply with the
Argentine regime for personal data protection is the collection or processing of personal data
from Argentine residents. On a practical level, the need to comply with Argentine regulations
is triggered by the presence of the foreign company in Argentina by way of affiliates, assets or
registrations in the Public Registry of Commerce.
65
© 2020 Law Business Research Ltd
Argentina
Finally, on 27 July 2018, the Agency enacted Resolution 47/18, which contains the
recommended security measures for the processing of personal data through computerised
and non-computerised means. Among its dispositions, this resolution recommends data
handlers to notify the Agency upon a data breach or security incident.
Despite the lack of any specific regulation included in the Data Protection Law, it does
set forth a generic obligation for the data handlers to adopt all technical and organisational
measures needed to guarantee the security and confidentiality of the personal data.
Registration of personal data in files, registers or banks that do not meet technical conditions
of integrity and security is prohibited.
Based on this generic obligation, the Agency started an investigation regarding a security
breach suffered by an email provider (made public by the company), which had exposed
personal data of its users. During the investigation, the Agency’s technical area determined
that the company had not taken the technical measures needed to prevent data breaches and
therefore sanctioned the company with a fine. The Agency’s decision is not final and can be
judicially challenged.
X OUTLOOK
The future landscape in Argentina regarding personal data protection includes the need to
enact a new law, in line with the new technologies that have emerged since the year 2000 and
following the legislative changes brought by the GDPR. The Draft was aimed at fulfilling
such objective, but the unsuccessful conclusion of its legislative process brings uncertainty
regarding the future protection of personal data in Argentina. If no advances are made in
the near future, it is possible for the European Union to strike down its adequacy decision
regarding Argentina’s level of personal data protection.
In the meantime, many local companies processing European citizens’ personal data
had to adjust their procedures and processing of personal data to the provisions of the GDPR.
66
© 2020 Law Business Research Ltd
Chapter 5
AUSTRALIA
I OVERVIEW
The principal legislation protecting privacy in Australia is the federal Privacy Act 1988 (the
Privacy Act). The Privacy Act establishes 13 Australian privacy principles (APPs), which
regulate the handling of personal information by many private sector organisations and by
federal government agencies.
The body responsible for enforcing the Privacy Act is the Office of the Australian
Information Commissioner (OAIC). In practice, the Information Commissioner (the
Commissioner) is responsible for the majority of the privacy-related functions of the OAIC,
including the investigation of complaints made by individuals.
Substantive amendments to the Privacy Act came into effect on 12 March 2014. In
particular, from that date, substantial monetary penalties (currently, up to A$420,000 for
individuals or A$2.1 million for corporations) can be imposed for ‘serious’ or ‘repeated’
interferences with the privacy of individuals. In 2019, the government proposed increasing
penalties for corporations to the greater of A$10 million, three times the value of any benefit
gained through the misuse of personal information, or 10 per cent of the entity’s annual
domestic turnover (bringing it further in line with European privacy penalties). However, the
government has yet to propose legislation to this effect.
Although this chapter is principally concerned with the Privacy Act, each Australian
state and territory has also passed legislation that protects information held about individuals
by state and territory government organisations.
Privacy also receives some protection through developments to the common law,
particularly developments in the law relating to confidential information.2 To date the
Australian courts have not recognised a specific cause of action to protect privacy, although
there has been judicial suggestion that such a development may be open.3 In July 2019,
the Australian Competition and Consumer Commission recommended the introduction
of a statutory tort for serious invasions of privacy as part of its Digital Platforms Inquiry.
Although the federal government’s response to this recommendation was neutral (i.e., it
neither supports nor does not support the recommendation), the federal government has
indicated that it will consider the recommendation through a general review of the Privacy
Act (see Section X for more information about this general review of the Privacy Act).
There is no general charter of human rights in Australia, and as such there is no
general recognition under Australian law of privacy being a fundamental right. However,
67
© 2020 Law Business Research Ltd
Australia
some jurisdictions within Australia, being the Australian Capital Territory, Victoria and
Queensland, have enacted a form of human rights act. These Acts recognise the protection of
privacy as a human right.4
4 Human Rights Act 2004 (ACT) Section 12; Charter of Human Rights and Responsibilities Act 2006 (Vic)
Section 13; Human Rights Act 2019 (Qld) Section 25.
5 Available at https://www.oaic.gov.au/about-us/our-corporate-information/annual-reports/oaic-annual-
reports/annual-report-2018-19/.
6 Available at: www.homeaffairs.gov.au/cyber-security-subsite/files/cyber-security-strategy-2020.pdf.
7 Section 6D.
8 Section 16 of the Privacy Act.
9 Section 7B(4) of the Privacy Act.
10 Section 7C(1) of the Privacy Act.
68
© 2020 Law Business Research Ltd
Australia
There is a broad exemption11 from the application of the Privacy Act for acts or practices
that are directly related to a current or former employment relationship and that involve
an employee record held by the employer. In practice, this means that many activities of
organisations with respect to their own employees are exempted from the Privacy Act.
There is a limited exemption from the application of the Privacy Act for the sharing
of personal information (other than sensitive information) between companies in the same
corporate group.12 However, the rules regarding the disclosure of personal information outside
Australia continue to apply even where the information is shared between group companies.
Generally, an organisation must not collect sensitive information about an individual unless
the individual has consented to the collection and the personal information is reasonably
necessary for one or more of the organisation’s functions or activities. An organisation
may collect sensitive information about an individual without consent in certain limited
circumstances; for example, where collection is required by Australian law.
69
© 2020 Law Business Research Ltd
Australia
Where personal information is not collected directly from the individual, an organisation
must take reasonable steps to make sure the individual is informed of the same matters in
respect of its indirect collection.
In the case of sensitive information, the secondary use or disclosure under item (a) above
must be directly related to the primary purpose.
70
© 2020 Law Business Research Ltd
Australia
13 ‘Guide to securing personal information: ‘Reasonable steps’ to protect personal information: January 2015’,
available at www.oaic.gov.au/agencies-and-organisations/guides/guide-to-securing-personal-information.
71
© 2020 Law Business Research Ltd
Australia
14 Section 7.11, Privacy Guidelines, ‘Chapter 7: Australian Privacy Principle 7 – Direct marketing: Version
1.1, 22 July 2019’ available at www.oaic.gov.au/images/documents/privacy/applying-privacy-law/
app-guidelines/chapter-7-app-guidelines-v1.pdf.
72
© 2020 Law Business Research Ltd
Australia
While individuals do not currently have an express legal right to require the removal
or erasure of their personal information, entities have a general obligation to take reasonable
steps to de-identify or destroy personal information where it is no longer needed for any
purpose for which it may be lawfully used or disclosed by the entity under the APPs (see
APP 11.2).
Individuals do not have a direct cause of action against entities to seek redress for
breaches of the APPs. However, an individual may complain to the Commissioner who can
make a determination that compensation be paid to the individual. This is explained in more
detail in Section VII.
On 1 August 2019, legislation was passed to effect a ‘consumer data right’. This will
facilitate data portability for individuals across the banking industry initially, with the
energy sector to follow (the Australian Competition and Consumer Commission is currently
progressing this). It is expected that the ‘consumer data right’ will then be rolled out across
other industries, for example the telecommunications sector.
The consent required by APP 8 has to be an informed consent and in many cases its
requirements are likely to be difficult to satisfy in practice. Further, in many cases the overseas
recipient will not be subject to a similar overseas law that is enforceable by the individual.
Accordingly, in most cases, the organisation must take ‘reasonable steps’ to ensure that the
overseas recipient does not breach the APPs prior to disclosing that information to the
overseas recipient. The Guidelines indicate that taking reasonable steps usually involves the
organisation obtaining a contractual commitment from the overseas recipient that it will
handle the personal information in accordance with the APPs.
73
© 2020 Law Business Research Ltd
Australia
The Commissioner has published in its Guidelines further information as to its expectations
with respect to the contents of the privacy policy.
Aside from the specific obligation to have and maintain a privacy policy, APP 1.2
requires an organisation to take such steps as are reasonable in the circumstances to implement
practices, procedures and systems relating to the organisation’s functions or activities that will
ensure that the organisation complies with the APPs.
This is an overarching obligation applying to organisations in Australia and is generally
understood as requiring organisations in Australia to implement the principles of ‘privacy by
design’. Guidance as to what the Commissioner expects organisations to do to comply with
this general obligation was published by the Commissioner in May 2015.15
15 ‘Privacy management framework: enabling compliance and encouraging good practice’, available at www.
oaic.gov.au/privacy/guidance-and-advice/privacy-management-framework-enabling-compliance-
and-encouraging-good-practice/.
74
© 2020 Law Business Research Ltd
Australia
In the case of Australian legal proceedings, APP 6.2(b) allows disclosure if the disclosure
is ‘required or authorised by or under an Australian law or a court/tribunal order’. This will
allow disclosures that are required or authorised under Australian rules of court.
In addition, Section 16A(i)(4) of the Privacy Act allows disclosure where it is ‘reasonably
necessary for the establishment, exercise or defence of a legal or equitable claim’. Disclosures
of information in the course of legal proceedings where the disclosures are necessary to either
assert or defend a claim will accordingly be permitted. Section 16A(i)(5) allows disclosure
where it is reasonably necessary for the purposes of a ‘confidential alternative dispute
resolution process’. This will permit disclosures in the course of confidential mediations and
the like. However, these exceptions do not apply to the disclosure of information to someone
outside Australia and so would not be available for claims being pursued in foreign courts.
To disclose information in response to the order of a foreign government or court
the disclosure will have to comply with both APP 6 and APP 8 (the cross-border disclosure
principle). There has been no binding Australian legal decision on the consequences of a
person receiving in Australia an order from a foreign court requiring the disclosure of personal
information outside Australia. To satisfy both APP 6 and APP 8, the party seeking disclosure
of the information outside Australia is likely to have to apply under a relevant international
treaty (such as the Hague Convention), to which Australia is a party and which has been
implemented in Australian local law. If these conditions can be satisfied, then the disclosure
of the information outside Australia will be ‘required or authorised by or under an Australian
law’ and so will be permitted under both APP 6.2(b) and APP 8.2(c).
Another option that might be available in some circumstances would be to redact all
personal information from the relevant document before the document is disclosed outside
Australia. Whether a document that has been redacted in this way will still comply with the
orders of the foreign court will depend on the circumstances.
With respect to disclosures outside Australia, Section 13D(1) provides that acts done
outside Australia do not interfere with privacy if the act is required by an applicable law of a
foreign country. This exception may be of use where relevant personal information is already
located outside Australia and, pursuant to the legal process in the place where it is located, it
has to be disclosed to someone in that place. The exception will not be available with respect
to information that is located in Australia.
75
© 2020 Law Business Research Ltd
Australia
76
© 2020 Law Business Research Ltd
Australia
Commissioner and steps it had taken to respond to the Commissioner’s concerns. Under
the terms of the undertaking, Optus was required to appoint an independent third party
to conduct reviews of the additional security measures Optus adopted in response to the
privacy incident and its vulnerability detection processes concerning the security of personal
information.
Enforceable undertaking from the Australian Red Cross following inadvertent disclosure
by a third-party contractor17
On 5 September 2016, a file containing personal information of approximately 550,000
individuals was inadvertently posted to a publicly accessible section of the Australian Red
Cross (the Red Cross) website by a third-party contractor. This included ‘personal details’ and
identifying information such as names, gender, addresses and sexual history.
17 ‘Australian Red Cross Blood Service: enforceable undertaking’, available at: www.oaic.gov.au/privacy/
privacy-decisions/enforceable-undertakings/australian-red-cross-blood-service-enforceable-undertaking/.
77
© 2020 Law Business Research Ltd
Australia
The Red Cross was only made aware of this breach after an unknown individual notified
the Red Cross through multiple intermediaries on 25 October 2016. Upon notification, the
Red Cross took a number of immediate steps to contain the breach. This included notifying
affected individuals, undertaking a risk assessment of the information compromised and
conducting a forensic analysis on the exposed server.
The Commissioner found that the Red Cross did not breach the obligation relating to
unauthorised disclosure of personal information, as it did not disclose personal information,
this was done by a third-party employee. In addition, it was found that although the
Red Cross did not physically hold the personal information, it retained ownership of the
information because of the terms of its contract with the third-party contractor. Because of
its ownership of the personal information, the Red Cross had an obligation to protect this
personal information against unauthorised access or disclosure. The Commissioner concluded
that the Red Cross had breached this obligation by failing to properly assess the adequacy
of its third-party contractor’s security practices and by failing to include control measures to
mitigate the risks of contracting with a third party in its contractual arrangements.
The Red Cross accepted an enforceable undertaking on 28 July 2017 to engage
an independent review of its third-party management policy and standard operating
procedure. The third-party contractor also entered into an enforceable undertaking with the
Commissioner’s office to establish a data breach response plan and update its data protection
policy.
78
© 2020 Law Business Research Ltd
Australia
and APP 11. The Department also undertook, 12 months later, to engage an external body
to audit the recommendations implemented from the first review. The Department provided
the Commissioner with copies of both reports.
iv Private litigation
In general, privacy legislation is only enforceable in Australia by the relevant authority.
However, some limited private rights of action do exist, particularly a general right under the
Privacy Act for anyone to seek an injunction to restrain conduct that would be a contravention
of the Act.19
79
© 2020 Law Business Research Ltd
Australia
X OUTLOOK
On 28 August 2020, the OAIC released its Corporate Plan 2020–2021.25 The Corporate
Plan indicates that the OAIC’s strategic priorities for the coming year are as follows:
a advancing online privacy protection for Australians;
b influencing and upholding privacy and information access rights frameworks;
c encouraging and supporting the proactive release of government-held information; and
d taking a contemporary approach to regulation.
More broadly, it seems likely that privacy regulation in Australia will be strengthened in the
coming years. Although draft legislation has not yet been introduced, the federal government
has proposed amendments to the Privacy Act, including:
a the increase of penalties for serious or repeated interferences with privacy to the greater
of A$10 million, three times the value of any benefit gained by the entity through
misusing personal information, or 10 per cent of the entity’s annual domestic turnover;
and
b the granting of new powers to the Commissioner to allow the latter to issue infringement
notices of up to A$63,0000 where entities fail to cooperate with efforts to resolve minor
breaches (this would not require a court application).
25 Available at www.oaic.gov.au/about-us/our-corporate-information/corporate-plans/corporate-plan-202021/.
80
© 2020 Law Business Research Ltd
Australia
Further, in July 2019, the Australian Competition and Consumer Competition highlighted
consumer concerns around current data practices and released a number of sweeping
recommendations relating to privacy in Australia as part of its Digital Platforms Inquiry.
Such recommendations include requiring consent for secondary uses of information, the
introduction of strengthened notification requirements, and the introduction of protections
for de-identified data. Such recommendations passing into law will be a significant tightening
of privacy law in Australia. In December 2019, the government committed to conducting a
review of the Privacy Act to consider whether reform is necessary to protect consumers and
best serve the Australian economy.
In addition, and as noted above, we now have open banking in Australia, with the
introduction of the ‘consumer data right’. Although still at an early stage, the consumer data
right will allow individuals to require their banks to disclose their data to certain third parties.
The energy sector is next to be regulated, and it is expected that the telecommunications
sector will follow.
Finally, the introduction of the EU’s General Data Protection Regulation (GDPR)
means that an additional layer of privacy regulation applies to many Australian entities. This
is because the GDPR has extraterritorial effect; Australian entities that offer goods or services
to individuals in the EU, or monitor individuals in the EU, may be bound by the GDPR.
81
© 2020 Law Business Research Ltd
Chapter 6
BELGIUM
I OVERVIEW
The Belgian legislative and regulatory approach to privacy, data protection and cybersecurity
is quite comprehensive. The most important legal provisions can be found in the following:
a Article 22 of the Belgian Constitution, which provides that everyone is entitled to the
protection of his or her private and family life;
b the Act of 28 November 2000 on Cybercrime;
c the Act of 13 June 2005 on Electronic Communications (the Electronic Communications
Act);
d d Book XII (Law of the Electronic Economy) of the Code of Economic Law, as
adopted by the Act of 15 December 2013;
e the Act of 3 December 2017 on the establishment of the Data Protection Authority;
f the General Data Protection Regulation 2016/679 (GDPR), which is the EU regulation
on data protection and privacy;
g the Act of 30 July 2018 on the Protection of Natural Persons with regard to the
Processing of Personal Data (the Data Protection Act) (which replaced the former
Belgian Data Protection Act of 8 December 1992 with effect as of 5 September 2018). It
concerns the further implementation of the GDPR and Directive 2016/680 regarding
the processing of data by competent authorities for the purposes of the prevention,
investigation, detection or prosecution of criminal offences; and
h the Act of 7 April 2019 establishing a framework for the security of networks and
information systems of general Interest for public security (and the Royal Decree of
12 July 2019, which specifies certain provisions of this Act).
Belgium, as a member of the European Union, is subject to European Union law including
the GDPR. The right to privacy is embedded in the Belgian constitution and privacy and data
protection rules offer strong safeguards to Belgian citizens and foreigners living in Belgium.
In addition, Article 8 on the right to respect for private and family life of the European
Convention on Human Rights and Fundamental Freedoms, as well as Article 7 on the right
to respect for private and family life and Article 8 on the right to protection of personal data
of the Charter for Fundamental Rights of the European Union, apply directly in Belgium.
82
© 2020 Law Business Research Ltd
Belgium
This contribution will set out the most important Belgian laws relating to privacy and
data protection. It will look into the Belgian implementation of the GDPR and its first
results, including some of the most important fines that were delivered by the Belgian DPA
as of May 2019 (when it became fully operational).
Given that the GDPR applies directly in all EU Member States, its content will not be
reviewed in detail.
83
© 2020 Law Business Research Ltd
Belgium
The Belgian legislator has also included specific exceptions to data subject rights for processing
for journalistic, academic, artistic or literary purposes, as well as for archiving in the public
interest or for scientific or historical research or statistical purposes, whereby some of the
articles of the GDPR such as consent, information obligation, right to restrict processing
and right to object do not apply. It is noteworthy that disclosure of the register, personal data
breach notifications and the duty to cooperate with the DPA also do not apply if they would
jeopardise an intended publication or constitute a prior control.
84
© 2020 Law Business Research Ltd
Belgium
85
© 2020 Law Business Research Ltd
Belgium
supervision on these choices in his or her role as DPO. Hence, the DPA found that a person
cannot combine the role of DPO and head of a(ny) department within the same organisation,
as this role cannot be exercised independently.
86
© 2020 Law Business Research Ltd
Belgium
On 3 May 2019, the Belgian Network and Information Security Act (the NIS Act) entered
into force, transposing the EU Network and Information Security Directive 2016/1148 (the
NIS Directive). In addition to the specific data protection rules above, the NIS Act adds a
legal basis for higher cybersecurity standards in respect of certain ‘essential’ services.
Pursuant to the Act, authorised government entities on two different levels, with
separate functions, are in charge of ensuring compliance with the NIS Act. A national public
entity (the Centre for Cybersecurity Belgium) is charged with monitoring compliance and
coordination of the implementation of this Act. On a sectoral level, sectoral authorities
are charged with monitoring compliance for their respective sectors. A Royal Decree of
12 July 2019 provides a legal framework for its powers as well as for the notification and
processing of incidents.
The NIS Act applies in particular to operators of essential services (OESs). OESs can
be found in the following industries:
a energy (electricity, oil and gas);
b transportation (air, rail, water and road);
c banking and financial market infrastructure;
d health and drinking water supply and distribution; and
e digital infrastructure (including digital services such as online sales platforms, online
search engines and cloud computing services).
To ensure an adequate level of network and information security in these sectors and to
prevent, handle and respond to incidents affecting networks and information systems, the
NIS Act sets out the following obligations for these OESs:
a the obligation to take appropriate technical and organisational measures to manage the
risks posed to their network and information systems, and to prevent or minimise the
impact in the event of a data breach; and
b the obligation to notify the competent authority, without undue delay, of all incidents
with a ‘significant impact’ on the security of the core services provided by these
operators. To assess the impact of an incident, the following criteria should be taken
into account: (1) the number of users affected; (2) the duration of the incident; (3) the
geographical spread with regard to the area affected by the incident; and (4) in relation
to certain OESs, the disruption of the functioning of the service and the extent of the
impact on economic and societal activities.
The notification obligations, preventive actions and sanctions under the NIS Act should
increase transparency regarding network and information security and heighten awareness of
cybersecurity risks in the above-mentioned essential services.
The Act foresees in the identification of OES and establishes the safety requirements
both on a national and sectoral level, as well as how this is monitored through internal and
external audits, and sanctions for non-compliance (e.g., fines).
Concerning computer security incidents, computer security incident response teams are
established on a national and sectoral level, as well as the procedures regarding the reporting
of safety incidents.
87
© 2020 Law Business Research Ltd
Belgium
Electronic marketing
Electronic marketing and advertising is regulated by the provisions of Book XII (Law of the
Electronic Economy) of the Code of Economic Law, which has transposed Directive 2002/58/
EC of the European Parliament and the Council of 12 July 2002, as adopted by the Act of
15 December 2013, as well as the Royal Decree of 4 April 2003 providing for exceptions. The
Belgian DPA has provided a lengthy recommendation (No 1/2020 of 17 January 2020) in
which it discusses the most pressing direct marketing questions and provides useful guidance.
88
© 2020 Law Business Research Ltd
Belgium
Camera surveillance
The Camera Surveillance Act of 21 March 2007 regulates the placement and use of camera
surveillance in Belgium.
A surveillance camera falls within the scope of this Act if it involves a fixed (temporarily
or permanent) or mobile observation system, with as purpose to survey and guard certain
areas which processes images for this purpose.
The purpose is further elaborated in Article 3 of the Camera Surveillance Law as being
either of the following:
a prevention, ascertaining or investigation of crimes against persons or goods; or
89
© 2020 Law Business Research Ltd
Belgium
To install camera surveillance, it is required that the police, rather than the DPA, be informed.
This takes place via an online application.
The data controller must keep a separate record concerning the processing of these data.
Further details on this record will be determined by Royal Decree.
It is also required for data controllers who install a surveillance camera in ‘publicly
accessible venues’ to indicate the existence thereof with a visible sign in proximity of the
camera, as well as the provision in proximity of the camera of a screen that displays the images
being recorded.
The use of surveillance cameras regulated by other special legislation or by public
authorities does not fall within the scope of the Camera Surveillance Law. If surveillance
cameras are used merely to monitor the safety, health, protection of the assets of the company
and monitoring of the production process and the labour by the employee, the Camera
Surveillance Law is not applicable. However, if the surveillance cameras are also used for one
of the purposes listed above in accordance with Article 3 of the Camera Surveillance Law, the
Camera Surveillance Law will apply and precede any other legislation.
Employee monitoring
Employee monitoring is strictly regulated under Belgian law. Apart from the rules embedded
in the Camera Surveillance Act of 16 April 2018, which will apply if the surveillance of
employees would fall within its scope as discussed above, the monitoring of employees
by means of surveillance cameras in particular is subject to the provisions of Collective
Bargaining Agreement No. 68 of 16 June 1998. Pursuant to this Agreement, surveillance
cameras are only allowed in the workplace for specific purposes:
a the protection of health and safety;
b the protection of the company’s assets;
c control of the production process; and
d control of the work performed by employees.
In the latter case, monitoring may only be on a temporary basis. Employees must also be
adequately informed of the purposes and the timing of the monitoring.
With respect to monitoring of emails and internet use, Collective Bargaining
Agreement No. 81 of 26 April 2002 imposes strict conditions. Monitoring cannot be carried
out systematically and on an individual basis. A monitoring system of emails and internet
use should be general and collective, which means that it may not enable the identification
of individual employees. The employer is only allowed to proceed with the identification
of the employees concerned if the collective monitoring has unveiled an issue that could
bring damage to the company or threaten the company’s interests or the security of its IT
infrastructure. If the issue only relates to a violation of the internal (internet) policies or
the code of conduct, identification is only allowed after the employees have been informed
of the fact that irregularities have been uncovered and that identification will take place if
irregularities occur again in the future.
90
© 2020 Law Business Research Ltd
Belgium
Finally, GPS monitoring in company cars is only allowed under Belgian law with
respect to the use of the company car for professional reasons. Private use of the company car
(i.e., journeys to and from the workplace and use during private time) cannot be monitored.
91
© 2020 Law Business Research Ltd
Belgium
b is necessary for the performance of a contract with, or in the interests of, the data
subject;
c is necessary or legally required on important public interest grounds or for legal claims;
d is necessary to protect the vital interests of the data subject; or
e is made from a public register.
92
© 2020 Law Business Research Ltd
Belgium
93
© 2020 Law Business Research Ltd
Belgium
In May 2020, the DPA fined a social media platform because it allowed its members
to invite their friends to register for the platform by uploading all contact data and sending
invitations by email to these persons. This meant that the personal data of non-users was
being processed without any lawful basis as they did not give consent and because this form
of processing did not pass the legitimate interest test. A fine of €50,000 was imposed.
The highest fine yet was imposed by the DPA on Google in July 2020 and amounted
to €600,000 for failing to remove search results of a publicly known person (right to be
forgotten) that showed his past political affiliations and a complaint for bullying that was
filed against him in the past.
94
© 2020 Law Business Research Ltd
Belgium
With respect to data breach notifications, Article 114/1, Section 2 of the Electronic
Communications Act requires companies in the telecommunications sector to notify
immediately (within 24 hours) personal data breaches to the DPA, which must transmit a
copy of the notification to the Belgian Institute for Postal Services and Telecommunications.
If there is a breach of personal data or the privacy of individuals, the company must also
notify the data subjects affected by the breach. The NIS Act additionally provides for a
detailed procedure regarding breaches for operators of essential services (see above).
Article 33 of the GDPR provides for a duty for the data controller to report personal
data breaches to the DPA without undue delay, and where feasible, not later than 72 hours
after having become aware of it. This notification must describe the nature, communicate the
details of the DPO or other contacts where more information can be obtained, describe the
likely consequences of the breach and describe the measures taken or proposed to be taken by
the controller to address the breach. A communication to the data subject can in some cases
also be necessary, if there is a high risk to their rights and freedoms. It must be noted that
the DPA stresses that, in the event of public incidents, the DPA must be informed within 48
hours of the causes and damage. Although the concept of a ‘public incident’ is not explained
in greater detail, this could refer to an incident in which a breach has occurred that is likely
to become known to the public or the DPA via, for example, the media, the internet, or
complaints from individuals. In the period between May 2019 and May 2020, the DPA has
been informed of the existence of 937 data breaches.
X OUTLOOK
The Belgian DPA needed a year to sufficiently organise itself and could only commence
the exercise of its tasks in May 2019. Despite this late start, it has already delivered a few
important decisions in the second year following the entry into force of the GDPR. The
DPO and Google decisions show that the DPA is handling complex cases with significant
consequences and with ever larger fines. Certainly, more decisions are expected to follow.
The enormous growth of GDPR fines across the European Union may, however, lead to
a divergence in interpretation of the Regulation’s provisions. Given that effective enforcement
is indispensable to any legislation, but should not lack legal certainty, it must be made sure
that the principles of sanctioning are harmonised across the European Union, for instance by
the publication of EDPB guidelines on fining under the GDPR – pursuant to the German
DPA’s, which introduced their own national guidelines (a sign of divergence on its own).
In addition, the European Commission concluded in its review of the GDPR’s
implementation on the occasion of its second anniversary that national DPAs have not yet
made full use of the tools the GDPR provides, such as joint operations that could lead to
joint investigations. Stronger cooperation could lead to a further strengthening of the privacy
of European citizens, as cross-border cases are more likely to involve a large number of data
subjects.
95
© 2020 Law Business Research Ltd
Belgium
The Schrems II decision, which has invalidated the EU–US Privacy Shield but upheld
the validity of standard contractual clauses under certain circumstances, means that transfers
of data to the United States will have to be treated more carefully and that standard contractual
clauses will gain importance.
Unfortunately, it is not clear when the ePrivacy Regulation, which will override the
GDPR and provide for more clarity regarding specific issues that may arise concerning privacy
in connection with online interactions, will be agreed upon. The ongoing negotiations only
mean that its implementation will again be delayed until 2023 or later.
For the time being, covid-19 will remain the most important privacy risk as countries
will be carefully balancing the right of privacy against the protection of public health. The
further introduction of tracking apps and a more organised state system to monitor cases and
trace contacts in a second wave of covid-19 will require national DPAs’ strong supervision
more than ever, as even in the light of a severe pandemic the importance of privacy and data
protection of individuals should not be disregarded.
96
© 2020 Law Business Research Ltd
Chapter 7
BRAZIL
Ricardo Barretto Ferreira, Lorena Pretti Serraglio, Juliana Gebara Sene Ikeda,
Isabella de Castro Satiro Aragão, Camilla Lopes Chicaroni and Beatriz Canhoto Lima1
I OVERVIEW
The concept and protection of privacy is not an innovation in Brazil. The privacy, private life,
honour, and image of individuals were considered inviolable as well as a fundamental right by
the Brazilian Federal Constitution of 1988 (the Brazilian Federal Constitution).2
After many years of legislative discussions, in 2018, the Brazilian General Data
Protection Act (Law No. 13,709/2018 – LGPD) was enacted.3 This law is considered the
most important data protection law in our jurisdiction, and represents a big advance and
an important step for Brazil, to guarantee the protection of individuals, define limits to data
processing for companies and enable the expansion of Brazil’s digital economy.
The LGPD is not yet in force, owing to the covid-19 pandemic and a legislative race
that will be addressed further on in this chapter.
The rights given in Article 5 of the Federal Constitution are classified as fundamental
rights. As described above, privacy is considered a fundamental right, but data protection
is not included in this list, even though there is a legislative initiative – a constitutional
amendment proposal – to insert data protection as a constitutional fundamental right (PEC
No. 17/19)4 that is currently being voted at the House of Representatives.
1 Ricardo Barretto Ferreira is a senior partner, Lorena Pretti Serraglio and Juliana Gebara Sene Ikeda are
senior associates and Isabella de Castro Satiro Aragão, Camilla Lopes Chicaroni and Beatriz Canhoto Lima
are associates at Azevedo Sette Advogados. The authors would like to thank the following for contributing
to this chapter: Danielle Chipranski Cavalcante and Juliana Petrella Hansen, senior associates, and Camila
Sabina Del Sasso, associate, at Azevedo Sette Advogados.
2 Brazilian Federal Constitution of 1988 (CF/1988). Available at: http://www.planalto.gov.br/ccivil_03/
constituicao/constituicao.htm.
3 Brazilian General Data Protection Act (Law No. 13.709/2018). Available at: http://www.planalto.gov.br/
ccivil_03/_ato2015-2018/2018/lei/L13709.htm.
4 Proposal of Constitutional Amendment No. 17/2019. Available at: https://www.camara.leg.br/
propostas-legislativas/2210757.
97
© 2020 Law Business Research Ltd
Brazil
98
© 2020 Law Business Research Ltd
Brazil
Furthermore, there are other sectoral laws related to the privacy and protection of personal
data, including, but not restricted to:
a Law No. 8,078/199017 (the Consumer Protection Code), which sets out data protection
principles in consumer relations;
b Law No. 9,472/199718 (the Telecommunications Act), which guarantees measures
related to privacy and protection of personal data of telecommunication services users;
99
© 2020 Law Business Research Ltd
Brazil
c Law No. 10,406/200219 (the Civil Code), which grants the inviolability of the private
life of the natural person; and
d Law No. 12,414/201120 (the Positive Credit Registry Act), which is responsible for the
formation and consultation of databases with data on credit history, of natural or legal
persons.
100
© 2020 Law Business Research Ltd
Brazil
to the data subject, within the periods and under the terms as provided in the regulation,
by Article 18, paragraph 5 of the LGPD. Among other things, the LGPD provides for the
rights to:
a confirmation of the existence of the processing;
b access to data and information concerning the processing of data subjects, which must
be made available in a clear, adequate and ostensible manner;
c correction of incomplete, inaccurate or outdated data;
d anonymisation, blocking or erasure of unnecessary or excessive data or data processed
in non-compliance with the provisions of LGPD;
e portability of the data to another service or product provider, through an express
request and subject to commercial and industrial secrecy;
f erasure of the personal data processed with the consent of the data subject, when
permissible; and
g information about public and private entities with which the controller has shared
data.23
23 Article 18 of LGPD.
24 Brazilian Central Bank. Resolution No. 4,658/2018. Available at: https://www.bcb.gov.br/pre/normativos/
busca/downloadNormativo.asp?arquivo=/Lists/Normativos/Attachments/50581/Res_4658_v1_O.pdf.
25 Self-Regulatory Code for E-mail Marketing Practice. Available at: https://abemd.org.br/codigo-de-autorr
egulamentacao-para-pratica-de-e-mail-marketing.
26 Superintendence of Private Insurance. Resolution No. 382/2020. Available at: http://www.in.gov.br/web/
dou/-/resolucao-n-382-de-4-de-marco-de-2020-247020888.
27 National Agency for Supplementary Health Services. Act No. 443/19. Available at: http://www.ans.gov.br/
component/legislacao/?view=legislacao&task=TextoLei&format=raw&id=MzY3MQ==.
101
© 2020 Law Business Research Ltd
Brazil
v Technological innovation
Developers of new technologies must incorporate privacy and data protection in their design.
The concept of privacy by design is based on the LGPD principles that ensure technical,
administrative and security measures to protect personal data, as well as the effectiveness of
such measures in observance of personal data protection rules.
Behavioural advertising
Although there is no specific legislation, the Consumer Protection Code28 contains provisions
that grant overall consumer protection against fraudulent and abusive advertising, coercive
or unfair commercial methods, as well as against unfair or imposed practices and terms in
the supply of products and services. Also, there is a Code of Self-Regulation that addresses
email marketing practices (CAPEM). Besides this, the Internet Management Committee in
Brazil (CGI.br) has developed a website that contains guidelines for best practices to inform
the user and network administrator about spam, its implications and ways to protect against
and combat it.29 Furthermore, the Brazilian Advertising Self-regulation Code30 regulates the
ethical rules applicable to advertising and propaganda.
Artificial intelligence
At the beginning of 2020, a request for a public audience about artificial intelligence was
approved by the Commission of Science, Technology, Innovation, Communication and
Informatics. The objective is to instruct two bills: one of these introduces the National Policy
on Artificial Intelligence (Bill No. 5,691/2019)32 and the other sets out the principles for the
use of artificial intelligence in Brazil (Bill No. 5,051/2019).33
102
© 2020 Law Business Research Ltd
Brazil
The LGPD’s Article 33 provides that international transfer of personal data to foreign
countries or international organisations of which the country is a member is only allowed
when:
a it is to countries or international organisations that provide a level of protection of
personal data that is adequate to the LGPD’s provisions;
b the controller offers and proves guarantees of compliance with the principles and the
rights of the data subject and the regime of data protection provided by the LGPD, in
the form of:
• specific contractual clauses for a given transfer;
• standard contractual clauses;
• global corporate rules; or
• regularly issued stamps, certificates and codes of conduct;
c the transfer is necessary for international legal cooperation between public intelligence,
investigative and prosecutorial agencies, in accordance with the instruments of
international law;
d the transfer is necessary to protect the life or physical safety of the data subject or a
third party;
e the national authority authorises the transfer;
f the transfer results in a commitment undertaken through international cooperation;
g the transfer is necessary for the execution of a public policy or legal attribution of
public service, which shall be publicised;
h the data subject has given their specific and highlighted consent for the transfer, with
prior information about the international nature of the operation, with this being
clearly distinct from other purposes; or
34 Article 3 of LGPD.
103
© 2020 Law Business Research Ltd
Brazil
i it is necessary for the controller to comply with a legal or regulatory obligation, for the
execution of a contract or preliminary procedures related to a contract of which the
data subject is a party (at the request of the data subject) or for the regular exercise of
rights in judicial, administrative or arbitration procedures.
The level of data protection in the foreign country or international organisation shall be
evaluated by the Brazilian’s National Authority (ANPD). Furthermore, the definition of
the content of standard contractual clauses, as well as the verification of specific contractual
clauses for a particular transfer, global corporate rules or stamps, certificates and codes of
conduct will be carried out by the ANPD.
104
© 2020 Law Business Research Ltd
Brazil
According to Article 22 of the aforementioned Law, any interested party may request
a judge to order the entity responsible for keeping the records to provide the connection or
access logs to internet applications, for the purpose of creating evidence in civil or criminal
legal procedures. This request should contain, under penalty of inadmissibility:
a justified evidence of the occurrence of the offence;
b motivated justification of the usefulness of the requested records for investigation; and
c the period of time to which the records correspond.
It is important to highlight that the judge needs to take the necessary measures to ensure
confidentiality of received information, as well as the preservation of intimacy, private life,
honour and image of the data subject. The judge may determine the secrecy of justice,35
including with respect to requests for record retention.
Furthermore, the Brazilian Code of Criminal Procedure (Law No. 3,689/1941)36 states
that judges may request information, including personal data, during criminal investigations
and criminal proceedings. Pursuant to Article 3-B, XI, items (a) and (b), examining
judges have the power to decide on requests to disclose personal data of users of electronic
communications services, including internet, email, telephone and financial data.
Regarding the interception of telephone communications, this may be determined for
evidence in criminal investigations and proceedings by the examining judge, ex officio or upon
request of the competent police authority or the representative of the public prosecution. The
interception should comply with the provisions of Law No. 9,296/1996,37 and will depend
on an order of the competent judge of the main action,38 under the secrecy of justice.
35 ‘Secrecy of justice’ refers to a situation in which judicial procedures or policial investigations, usually
available to the public, are kept under secrecy. This usually happens when there is a risk of exposure of
private information related to the defendant or investigated; or when the procedure has confidential
documents, such as bank statements or phone tapping, for example.
36 Law No. 3,689/1941. Available at: http://www.planalto.gov.br/ccivil_03/decreto-lei/del3689.htm.
37 Law No. 9,296/1996. Available at: http://www.planalto.gov.br/ccivil_03/LEIS/L9296.htm.
38 The ‘main action’ is the action in the procedure that brings the main purpose of the litigation. This main
action is independent, i.e., it exists by itself.
39 Law No. 13,853/2019. Available at: http://www.planalto.gov.br/ccivil_03/_ato2019-2022/2019/lei/
l13853.htm.
105
© 2020 Law Business Research Ltd
Brazil
Besides this, the ANPD is still not working. Some small steps were taken after its creation,
such as the nomination of a few members, but the ANPD has not been fully formed and is
not in operation.
It is important to mention that other government authorities are acting on behalf of the
data protection principles, although the LGPD is not in force. To illustrate that, the major
consumer defence body in Brazil (Procon) and public prosecution (Special Unit of Data
Protection and Artificial Intelligence – Espec)40 are notifying, investigating and even applying
fines41 to companies that act in an unlawful or abusive manner, based on other laws, such as
the Brazilian Consumer Code.
40 Brazilian Special Unit of Data Protection and Artificial Intelligence. Available at: https://www.mpdft.
mp.br/portal/index.php/conhecampdft-menu/nucleos-e-grupos/espec.
41 The Face App case. Available at: https://www.procon.sp.gov.br/aplicativo-de-envelhecimento-2/ and https://
www.uol.com.br/tilt/noticias/redacao/2019/08/30/procon-sp-multa-google-e-apple-por-forma-como-
disponibilizaram-o-faceapp.htm.
42 For additional information about the case, access: https://www.procon.sp.gov.br/aplicativo-
de-envelhecimento-2/.
43 For additional information about the case, access Consultor Jurídico Journal, available at: https://www.
conjur.com.br/2019-dez-30/governo-multa-facebook-compartilhamento-dados.
44 For additional information about the case, access: http://www.stf.jus.br/portal/cms/verNoticiaDetalhe.
asp?idConteudo=442902.
106
© 2020 Law Business Research Ltd
Brazil
107
© 2020 Law Business Research Ltd
Brazil
arguing that the data processing was performed outside Brazil. To avoid this kind of problem,
these recent legal provisions reiterate that any action involving personal data from Brazilian
subjects or from individuals located in Brazil shall trigger the application of Brazilian laws.
108
© 2020 Law Business Research Ltd
Brazil
Regarding data retention, there are no specific time periods provided; however, the LGPD54
establishes that the ANPD may provide standards in relation to the retention period of
records, especially considering the need for the data and for transparency to the data subjects.
Also, there are many diverse specifications related to the retention period of records in sectoral
laws, such as the legal obligation of storage of connection records by connection providers for
one year and the storage of access records by application providers for six months, according
to the Brazilian Internet Law,55 for example.
As regards data breach reporting requirements, the LGPD56 establishes that the
controller should communicate to ANPD and the data subject the occurrence of any security
incident that may cause risk or relevant harm to data subjects. This activity may be executed
by the data protection officer (DPO), as the DPO is the person indicated by the controller
to act as a communication channel between the controller, the data subjects and the ANPD.
This notification should be made in a reasonable period of time (which will be defined by the
ANPD in the future) and should contain, at a minimum:
a a description of the nature of the affected personal data;
b information on the data subjects involved;
c an indication of the technical and security measures used to protect the data, subject to
commercial and industrial secrecy;
d the risks related to the incident;
e the reasons for delay, in cases in which the communication was not immediate; and
f measures that were or will be adopted to reverse or mitigate the effects of the damage.
Finally, the Computer Emergency Response Team Brazil (CERT.br) presents guidelines and
recommendations for the notification of security incidents, what to notify, who to notify and
formats for the notification, among other instructions.57
X OUTLOOK
The entry into force of the EU’s General Data Protection Regulation (GDPR)58 in 2018
contributed to the endorsement of the LGPD in the same year in Brazil, as the same way as it
has already had a significant impact on Brazilian companies that process the personal data of
persons located in the European Union, or that transfer data internationally. In this regard,
the free flow of data between EU countries and Brazil is conditioned by the level of adequacy
of data protection, which must be similar to the one in the EU. Furthermore, Brazilian
companies have been conducting adaptation projects to comply with the data protection
legislation, through the adoption of best practices for processing personal data grounded on
LGPD authoritative hypotheses and personal data protection principles.
The entry into force of Brazilian General Data Protection Act, as well as the establishment
of the National Authority, are expected in the near term.
54 Article 40 of LGPD.
55 Article 15 of Brazilian Internet Law.
56 Article 48 of LGPD.
57 Computer Emergency Response Team Brazil. Available at: https://www.cert.br/docs/whitepapers/
notificacoes/.
58 EU’s General Data Protection Regulation. Available at: https://gdpr-info.eu/.
109
© 2020 Law Business Research Ltd
Chapter 8
CANADA
Shaun Brown1
I OVERVIEW
Privacy in Canada is regulated through a mix of constitutional, statutory and common law.
The most fundamental protection is provided by Section 8 of the Charter of Rights and
Freedoms, which states that ‘everyone has the right to be secure against unreasonable search
or seizure’. This ensures a reasonable expectation of privacy for citizens in relation to the state.
There are also laws that apply to the collection, use and disclosure of personal
information by organisations in the public and private sectors at the federal, provincial and
territorial levels. Finally, organisations in both sectors are increasingly required to defend
privacy-related lawsuits based on statutory and common law torts.
This chapter focuses on the aspects of Canadian privacy law that apply to private sector
organisations.
110
© 2020 Law Business Research Ltd
Canada
5 Alberta: Personal Information Protection Act, SA 2003, c P-6.5; British Columbia: Personal Information
Protection Act, SBC 2003, c 63; Quebec: An Act respecting the Protection of Personal Information in
the Private Sector, RSQ, c P-39.1. PIPEDA also does not apply to the collection, use and disclosure
of personal health information by personal health information custodians that are subject to the New
Brunswick Personal Health Information Privacy and Access Act, SNB 2009, c P-7.05, the Newfoundland
and Labrador Personal Health Information Act, SNL 2008, c P-7.01 or the Ontario Personal Health
Information Protection Act, 2004, SO 2004, c 3, Sch A. Manitoba has passed private-sector privacy
legislation – the Personal Information Protection and Identity Theft Prevention Act, CCSM c P33.7) – that
is generally similar to the laws in Alberta and British Columbia; however, it has neither been proclaimed in
force nor deemed substantially similar to PIPEDA.
6 CAN/CSA-Q830-96; published March 1996; reaffirmed 2001.
111
© 2020 Law Business Research Ltd
Canada
In the context of OBA, given the fact that the purpose behind collecting information is to create
profiles of individuals that in turn permit the serving of targeted ads; given the powerful means
available for gathering and analysing disparate bits of data and the serious possibility of identifying
affected individuals; and given the potentially highly personalised nature of the resulting advertising,
it is reasonable to take the view that the information at issue in behavioural advertising not only
implicates privacy but also should generally be considered ‘identifiable’ in the circumstances. While
such an evaluation will need to be undertaken on a case-by-case basis, it is not unreasonable to
generally consider this information to be ‘personal information’.11
7 Dagg v. Canada (Minister of Finance) [1997] 2 SCR, dissenting, 403 at Paragraph 68.
8 Morgan v. Alta Flights Inc (2006) FCA 121, affirming (2005) FC 421.
9 Canada (Information Commissioner) v. Canada (Transportation Accident Investigation and Safety Board),
2006 FCA 157, Paragraph 34.
10 PIPEDA Case Summary #2009-010 – Report of Findings: Assistant Commissioner recommends Bell
Canada inform customers about Deep Packet Inspection.
11 Office of the Privacy Commissioner of Canada, ‘Policy Position on Online Behavioural Advertising’,
6 June 2012, www.priv.gc.ca/en/privacy-topics/advertising-and-marketing/behaviouraltargeted-advertising/
bg_ba_1206.
112
© 2020 Law Business Research Ltd
Canada
There are few precedents in Canadian law that have restrained this expansive approach to
interpreting personal information.
To varying degrees, privacy laws contain exceptions for business contact information,
including the name, title and contact information for a person in a business context. As of
June 2015, ‘business contact information’, including the ‘position name or title, work address,
work telephone number, work fax number or work electronic address’ of an individual was
excluded from PIPEDA.
Principle 1 – accountability
‘An organisation is responsible for personal information under its control and shall designate
an individual or individuals who are accountable for the organisation’s compliance with the
following principles.’
Accountability speaks to the obligations of organisations to establish privacy-related
policies and procedures, and to designate staff who are responsible for ensuring that an
organisation is compliant with privacy legislation. Organisations are also expected to provide
employees with privacy training.
The accountability principle imposes obligations on organisations to ensure that
personal information is adequately protected when transferred to a third party for processing.
Accordingly, organisations that rely on service providers to process personal information
on their behalf (e.g., payroll services) must, through contractual means, ensure that
personal information will be handled and protected in accordance with privacy legislation.
This requirement applies regardless of whether personal information is transferred to an
organisation within or outside Canada.
Principle 3 – consent
‘The knowledge and consent of the individual are required for the collection, use, or disclosure
of personal information, except when inappropriate.’
Of the 10 principles, consent is possibly the single most important and complex
requirement. As a general rule, organisations are required to have consent before collecting,
113
© 2020 Law Business Research Ltd
Canada
using or disclosing personal information. For consent to be valid under PIPEDA, it must
be reasonable to expect that the individual would understand the nature, purposes and
consequences of the collection, use or disclosure of his or her personal information.
Consent can either be express or implied. Although the concept is somewhat flexible,
‘express consent’ generally means that a person provides some form of affirmative indication
of their consent. It is for this reason that express consent is often equated with ‘opt-in’ consent.
Alternatively, as stated in the CSA Model Code, ‘implied consent arises where consent may
be reasonably inferred based on the action or inaction of the individual’.
Whether consent can be express or implied depends on a few factors. Express consent is
almost always required whenever ‘sensitive’ personal information is involved. This includes, for
example, information pertaining to a person’s race or ethnicity, health or medical condition,
or financial information (e.g., income, payment information).
The concept of ‘primary purpose and secondary purposes’ is also relevant to the form of
consent required. A primary purpose is one that is reasonably necessary to provide a product
or service; for example, the collection and use of an individual’s address may be necessary
to deliver a product ordered online. In this case, consent would be implied to collect and
disclose an individual’s mailing address to a delivery company.
However, marketing or advertising is almost always considered a secondary purpose. For
example, an organisation would require express consent to collect and disclose an individual’s
mailing address to a third party for the purpose of sending marketing materials.12
Note that organisations are prohibited from requiring an individual to consent to the
collection, use or disclosure of personal information for a secondary purpose as a condition
of providing a product or service.13
A third form of consent, which is sometimes viewed as falling between express and
implied consent, is ‘opt-out’ consent. Opt-out consent means that an individual is provided
with notice and the opportunity to express non-agreement to a given collection, use or
disclosure. Otherwise, consent will be assumed. The Privacy Commissioner has held that it is
acceptable to rely on opt-out consent so long as the following conditions are met:
a the personal information is demonstrably non-sensitive in nature and context;
b the context in which information is shared is limited and well-defined as to the nature
of the personal information to be used or disclosed and the extent of the intended use
or disclosure;
c the organisation’s purposes are limited and well defined, stated in a reasonably clear
and understandable manner, and brought to the individual’s attention at the time the
personal information is collected;
d the organisation obtains consent for the use or disclosure at the time of collection, or
informs individuals of the proposed use or disclosure, and offers the opportunity to opt
out, at the earliest opportunity; and
12 An exception to this rule is PIPEDA Case Summary #2009-008 – Report of Findings into the Complaint
Filed by the Canadian Internet Policy and Public Interest Clinic (CIPPIC) against Facebook Inc under
the Personal Information Protection and Electronic Documents Act, in which the Assistant Privacy
Commissioner of Canada held that because revenues from advertising allow Facebook to offer a free service,
the collection, use and disclosure of personal information for advertising is therefore a ‘primary purpose’,
and ‘persons who wish to use the service must be willing to receive a certain amount of advertising’. As
such, it is acceptable for Facebook to require users to consent to certain forms of adverts as a condition of
using the site.
13 This is often referred to as ‘refusal to deal’.
114
© 2020 Law Business Research Ltd
Canada
There are a number of exceptions to the need to obtain consent for the collection, use or
disclosure of personal information, including the following:
a for a purpose that is clearly in the interest of the individual and consent cannot be
obtained in a timely way (e.g., emergencies);
b for purposes related to law enforcement activities, or to comply with warrants or court
orders;
c where personal information is ‘publicly available’ as defined under privacy legislation;15
and
d in business transactions (e.g., sale of a business), provided that the parties agree to
only use and disclose personal information for purposes related to the transaction,
protect the information with appropriate security safeguards, and return or destroy the
information where the transaction does not go through.
115
© 2020 Law Business Research Ltd
Canada
Principle 6 – accuracy
‘Personal information shall be as accurate, complete and up to date as is necessary for the
purposes for which it is to be used.’
Organisations have an obligation to ensure that personal information is accurate and up
to date; however the degree of accuracy may depend on the purpose for which the information
is used. For example, there may be a heightened obligation to ensure the accuracy of credit
information given that this information forms the basis of significant financial decisions
about an individual.16
Despite this general obligation, organisations are prohibited from routinely updating
personal information where it is unnecessary to do so.
Principle 7 – safeguards
‘Personal information shall be protected by security safeguards appropriate to the sensitivity
of the information.’
Organisations are required to implement physical, administrative and technical
measures to prevent the loss, theft, and unauthorised access, disclosure, copying, use or
modification of personal information.
Canadian law is not prescriptive with respect to safeguards. Moreover, specific measures
can depend on certain factors, such as the sensitivity of information involved, foreseeable risks
and harms, and the costs of security safeguards. That said, the Privacy Commissioner expects
that organisations implement certain measures – such as: the use of encryption technologies
whenever possible, and especially where sensitive personal information is involved; limiting
access to personal information to those employees who require access and who are required to
sign an oath of confidentiality; and maintaining audit logs of databases containing personal
information.
Principle 8 – openness
‘An organisation shall make readily available to individuals specific information about its
policies and practices relating to the management of personal information.’
As stated above, the openness principle is closely related to Principle 2 – identifying
purposes. Essentially, this Principle requires organisations to provide privacy policies (or
notices). Privacy policies are expected to meet the following requirements:
a provide a full description of what information is collected, used and disclosed, and for
what purposes;
b be easily accessible, accurate and easily understood by the average person;
c inform an individual of his or her right to access and to request corrections of his or her
personal information, and how to do so;
d generally describe the security measures in place to protect personal information;
e inform individuals if personal information is transferred to foreign jurisdictions; and
f provide contact information for the organisation’s privacy officer or other person who
can respond to inquiries about the organisation’s information handling practices.
16 The Federal Court emphasised this obligation in Nammo v. TransUnion of Canada Inc, 2010 FC 1284,
in which the applicant was denied a loan as a result of information provided by TransUnion that was
described as ‘grossly inaccurate’. The Court awarded damages of C$5,000.
116
© 2020 Law Business Research Ltd
Canada
The Privacy Commissioner also emphasises the value of augmenting privacy notices with
other forms of notice, including ‘just in time’ notices (e.g., through pop-ups and interstitial
pages) and layering notices to provide further information about more complex issues for
those who seek such information and icons where applicable (e.g., the ‘Ad Choices’ icon for
OBA).
In 2013, the Privacy Commissioner participated in the Global Privacy Enforcement
Network Internet Privacy Sweep, which looked at privacy policies on 326 websites in Canada
and 2,186 websites worldwide. The Commissioner noted concerns in almost half of the
Canadian websites.17 In an example of ‘naming and shaming’, the Commissioner called out
specific examples of privacy policies that he considered constituted the ‘good, the bad and
the ugly of privacy policies’.18
17 Office of the Privacy Commissioner of Canada, ‘Global Internet Sweep finds significant privacy
policy shortcoming’ (Ottawa: 13 August, 2013), online: www.priv.gc.ca/en/opc-news/news-and-
announcements/2013/nr-c_130813.
18 Office of the Privacy Commissioner of Canada, ‘Initial Results from our internet privacy sweep: the
good, the bad, the ugly’ (Ottawa: 13 August 2013), online: http://blog.priv.gc.ca/index.php/2013/08/13/
initial-results-from-our-internet-privacy-sweep-the-good-the-bad-and-the-ugly/.
117
© 2020 Law Business Research Ltd
Canada
However, one technology that has proven particularly challenging is OBA. After years
of uncertainty about how Canadian privacy law applies to OBA,19 the Privacy Commissioner
decided to address the issue by publishing its Policy Position on Online Behavioural
Advertising (Policy Position).20
As described above, the Privacy Commissioner considers much of the information used
for OBA purposes to be personal information. Thus, according to the Privacy Commissioner,
PIPEDA (and other privacy legislation) applies to OBA.
The Policy Position is generally positive – it signals that the Privacy Commissioner is
willing to accept some form of opt-out consent as sufficient for organisations that use OBA.
This position is more lenient towards business interests in comparison to the strict opt-in
approach adopted by the European Union.
The Office of the Privacy Commissioner (OPC) has adapted its opt-out consent
framework to OBA, defining the following as a list of conditions:
a individuals are informed about OBA in a clear and understandable manner at or before
the time of collection;
b organisations should rely on online banners, layered policies and interactive tools.
Purposes must be obvious and cannot be ‘buried’ in privacy policies. This includes
information about various parties involved in OBA (e.g., networks, exchanges,
publishers and advertisers);
c individuals can easily opt out, ideally at or before the time of collection;
d the opt-out takes effect immediately and is persistent;
e information is limited to non-sensitive information, to the extent practicable;21 and
f information is destroyed as soon as possible or effectively de-identified.
Consistent with past guidance on the issue, the OPC emphasises the need for clear and
understandable descriptions of OBA, given the challenges of clearly explaining such a
complex issue.
19 For the purposes of this chapter, OBA refers generally to the delivery of advertisements to web browsers
that are targeted based on a user’s behaviour online, and the collection, use and disclosure of data for those
purposes.
20 Office of the Privacy Commissioner of Canada, ‘Policy Position on Online Behavioural Advertising’,
6 June 2012, www.priv.gc.ca/en/privacy-topics/advertising-and-marketing/behaviouraltargeted-advertising/
bg_ba_1206.
21 In early 2014, the Privacy Commissioner found that Google had violated PIPEDA by using sensitive
personal information to target and serve through its AdSense service. Google had allowed its customers
to serve targeted adverts for Continuous Positive Airway Pressure devices to internet users identified as
suffering from sleep apnoea. Although the Privacy Commissioner has stated that companies can rely on a
form of opt-out, implied consent for OBA, adverts targeted at sleep apnoea suffers did not qualify for this
approach given that this involves the collection and use of sensitive, health-related personal information.
See Privacy Commissioner of Canada, PIPEDA Report of Findings #2014-001 – Report of Findings:
Use of sensitive health information for targeting of Google ads raises privacy concerns, 14 January 2014,
www.priv.gc.ca/en/opc-actions-and-decisions/investigations/investigations-into-businesses/2014/
pipeda-2014-001.
118
© 2020 Law Business Research Ltd
Canada
The OPC has published research and guidance in recent years that considers the
application of privacy law to other technologies and issues, including facial recognition,22
wearable computing,23 drones24 and genetic information.25
22 Office of the Privacy Commissioner of Canada, ‘Automated Facial Recognition in the Public and Private
Sectors: Report prepared by the Research Group of the Office of the Privacy Commissioner of Canada’,
March 2013, www.priv.gc.ca/en/opc-actions-and-decisions/research/explore-privacy-research/2013/
fr_201303.
23 Office of the Privacy Commissioner of Canada, ‘Wearable Computing – Challenges and opportunities
for privacy protection: Report prepared by the Research Group of the Office of the Privacy Commissioner
of Canada’, January 2014, www.priv.gc.ca/en/opc-actions-and-decisions/research/explore-privacy-
research/2014/wc_201401.
24 Office of the Privacy Commissioner of Canada, ‘Will the proliferation of domestic drone use in
Canada raise new concerns for privacy?’: Report prepared by the Research Group of the Office of the
Privacy Commissioner of Canada, March 2013, www.priv.gc.ca/en/opc-actions-and-decisions/research/
explore-privacy-research/2013/drones_201303.
25 Office of the Privacy Commissioner of Canada, ‘Genetic Information, the Life and Health Insurance
Industry and the Protection of Personal Information: Framing the Debate’, December 2012, www.priv.
gc.ca/en/opc-actions-and-decisions/research/explore-privacy-research/2012/gi_intro.
119
© 2020 Law Business Research Ltd
Canada
26 Subject to limited exceptions, public-sector bodies in British Columbia and Nova Scotia are required to
ensure that personal information in their custody or control is only stored or accessed in Canada; see the
Freedom of Information and Protection of Privacy Act, RSBC 1996, Chapter 165, s 30.1, and the Personal
Information International Disclosure Protection Act, SNS 2006, c 3, s 5. These laws can pose challenges
for service providers located outside Canada that seek to do business with public sector bodies in those
jurisdictions.
27 Office of the Privacy Commissioner of Canada, Guidelines for Processing Personal Data Across Borders,
January 2009, www.priv.gc.ca/media/1992/gl_dab_090127_e.pdf.
28 ibid.
29 ibid.
30 Personal Information Protection Act, SA 2003, c P-6.5, s 6(1).
31 ibid., s 13.1(1).
120
© 2020 Law Business Research Ltd
Canada
i General
Organisations should:
a establish detailed internal privacy policies for ensuring compliance with privacy
legislation that address things such as who is responsible for compliance with privacy
legislation;
b establish the various types of personal information collected, used and disclosed, and
for what purposes;
c provide training for employees;
d establish administrative, physical and technical security measures for the protection of
personal information;
e record transfers of personal information;
f record retention periods and the destruction of personal information;
g record the outsourcing of and third-party access to personal information;
h respond to requests for access to personal information;
i respond to inquiries and complaints about information handling practices; and
j identify and respond to security breaches.
ii Privacy notices
Organisations must have privacy notices for communicating privacy-related information to
the public. This typically consists of an online privacy policy but can be combined with
other means such as written pamphlets, layered privacy notices and just-in-time notifications
provided at the point of sale, online and in mobile applications.
121
© 2020 Law Business Research Ltd
Canada
There are also other laws that permit transfers to foreign agencies for specific purposes,
including the Proceeds of Crime (Money Laundering) and Terrorist Financing Act,33 the
Department of Immigration and Citizenship Act,34 and the Canadian Security Intelligence
Service Act.35
Foreign governments cannot directly compel an organisation located in Canada to
disclose information. However, personal information about Canadians can be accessed
by foreign governments once transferred to those jurisdictions. Canada does not have any
‘blocking statutes’ or specific procedures for resisting access by foreign governments to
personal information about Canadians.
ii Private litigation
Privacy-related litigation has become more common in recent years, as courts are increasingly
willing to recognise privacy as a compensable cause of action.
The following four provinces have established a statutory tort for invasion of privacy:
British Columbia,37 Manitoba,38 Newfoundland and Labrador,39 and Saskatchewan.40 A
common law tort for invasion of privacy was explicitly recognised for the first time in Ontario
in 2012 in Jones v. Tsige.41 The court awarded relatively modest damages at C$10,000 in that
33 SC 2000, c 17.
34 SC 1994, c 31.
35 RSC, 1985, c C-23.
36 Chitrakar v. Bell TV, 2013 FC 1103.
37 Privacy Act, RSBC 1996, c 373.
38 Privacy Act, RSM 1987, c P125.
39 Privacy Act, RSN 1990, c P-22.
40 Privacy Act, RSS 1978, c P-24.
41 2012 ONCA 32.
122
© 2020 Law Business Research Ltd
Canada
case, stating that damages for privacy invasions should be generally limited to a maximum
of C$20,000. In a controversial 2017 decision, a small claims court in Ontario rewarded a
plaintiff C$4,000 for intrusion upon seclusion.42 In 2016, the Ontario Superior Court cited
a new tort referred to as the ‘public disclosure of embarrassing facts’ in a case arising out of
the non-consensual publication of intimate images on the internet.43 The Court awarded
damages of C$100,000, which is by far the largest award in a privacy-related case involving
a single plaintiff to date.
There have been a growing number of data breach-related class actions in the past few
years, involving defendants such as:
a Home Depot;44
b Bank of Nova Scotia;45
c Human Resources and Skills Development Canada;46
d Health Canada;47
e Durham Region Health;48 and
f Rouge Valley Health System.49
Although case law involving privacy breach class actions remains limited, precedents arising
from class certification and settlement approval proceedings suggest that some courts are
sceptical of class actions based on vague allegations of potential harm. For example, in the
class action against Home Depot, the court reduced the fees to class counsel previously agreed
by the parties, with the court stating that: ‘The case for Home Depot being culpable was
speculative at the outset and ultimately the case was proven to be very weak.’50 However,
settlements may be much higher where plaintiffs can provide more specific evidence of harm
resulting from a breach.51
123
© 2020 Law Business Research Ltd
Canada
X OUTLOOK
Organisations doing business in Canada should pay close attention to developments in
Quebec, which appears set to establish several GDPR-like requirements, and which could
create a new baseline for privacy legislation in Canada. Also, while a relatively slow-moving
process, it will be important to watch as the federal government works to amend PIPEDA in
ways that could also make that law more closely aligned with the GDPR.
124
© 2020 Law Business Research Ltd
Chapter 9
CHINA
I OVERVIEW
At present, there is no omnibus privacy and data protection law in China, with the current
provisions on privacy and data protection mainly found in laws and the industry-specific
regulations.
In 2012, the Standing Committee of the National People’s Congress (NPC) issued the
Decision on Strengthening Internet Information Protection, which provides some general
principles for network service providers to protect the personal electronic information of
Chinese citizens. Based on these principles, various departments under the State Council issued
administrative regulations regulating the collection and processing of personal information
in their respective fields. For example, the Ministry of Industry and Information Technology
(MIIT) issued the Provisions on Protecting the Personal Information of Telecommunications
and Internet Users in 2013, the State Post Bureau released the Provisions on the Security
Management of Personal Information of Users of Posting and Delivering Services in 2014,
and the People’s Bank of China released the Implementing Measures for the Protection of
Financial Consumers’ Rights and Interests in 2016.
On 7 November 2016, the Cybersecurity Law (CSL) was issued and it took effect on
1 June 2017. The official implementation of the CSL marks the gradual formation of China’s
new legal framework for cybersecurity and data protection. Among other things, the CSL
covers the following aspects:
a personal information protection;
b general network protection obligations of the network operators and the multi-level
protection scheme (MLPS);
c enhanced protection for the critical information infrastructure (CII);
d data localisation and security assessment for the cross-border transfer of personal
information and important data; and
e security review of the network products and services.
On 28 May 2020, the NPC passed the Civil Code of the People’s Republic of China (the
Civil Code), which contains provisions on the protection of privacy and personal information
and some high-level principles that are similar to those in the CSL.
As both the CSL and Civil Code are high-level laws and do not provide practical
guidelines, China has been drafting a series of related implementation regulations and
national standards.
125
© 2020 Law Business Research Ltd
China
These implementation regulations and national standards, together with the CSL
and the Civil Code, constitute China’s legal regime for cybersecurity and data protection.
According to the 2020 legislative work plan of the NPC Standing Committee, several draft
laws, such as the Personal Information Protection Law and the Data Security Law, will be
submitted for deliberation.
126
© 2020 Law Business Research Ltd
China
g In July 2020, the NISSTC released the Network Security Standard Practice Guidelines
– Self-Assessment Guidelines for Apps to Collect and Use Personal Information for
App operators to have self-assessment.
127
© 2020 Law Business Research Ltd
China
China’s legal regime on cybersecurity and data protection also includes the judicial
interpretations made by the Supreme People’s Court and the Supreme People’s Procuratorate,
such as:
a Interpretation of several issues regarding application of law to criminal cases of
infringement of citizen’s personal information handled by the Supreme People’s Court
and the Supreme People’s Procuratorate; and
b Provisions of the Supreme People’s Court on application of laws to cases involving civil
disputes over infringement upon personal rights and interests by using information
networks.
National standards are another key part of the cybersecurity and data protection legal regime.
Though they are not compulsory, they are generally regarded as best practice by enterprises.
Important national standards (including draft versions) include:
a Information Security Technology – Personal Information Security Specification;
b Information Security Technology – Guidelines for Personal Information Protection
Within Information System for Public and Commercial Services;
c Information Security Technology – Guidelines for Data Cross-Border Transfer Security
Assessment (Draft) (draft for comment);
d Information Security Technology – Guide to De-Identifying Personal Information
(draft for comment);
e Information Security Technology – Security Impact Assessment Guide of Personal
Information (draft for comment);
f Information Security Technology – Security Requirements for Data Exchange Service
(Draft for Comment); and
g Information Security Technology – Risk Assessment Specification for Information
Security (draft for comment); etc.
The CSL defines the terms ‘network operator’ and ‘personal information’. Under the CSL, a
network operator refers to the owner or manager of a network or the provider of a network
service; personal information refers to various information that is recorded in electronic or
any other form and used alone or in combination with other information to recognise the
identity of a natural person, including but not limited to their name, date of birth, ID
number, personal biological identification information, address and telephone number of the
natural person.
The Civil Code defines ‘personal information’ as all kinds of information recorded by
electronic or otherwise that can be used to independently identify or be combined with other
information to identify specific natural persons, including the natural persons’ names, dates
of birth, ID numbers, biometric information, addresses, telephone numbers, email addresses,
health information, whereabouts, etc.
128
© 2020 Law Business Research Ltd
China
129
© 2020 Law Business Research Ltd
China
c solicitation for consent: it shall explicitly specify the purposes, manners, scope and
rules in respect of the processing of personal information, and seek their authority and
consent;
d minimum sufficiency: it shall merely process the minimum categories and amount of
personal information necessary for achieving the purpose authorised and consented to
by personal information subjects. It shall delete the personal information in a timely
manner as agreed once this purpose is achieved;
e openness and transparency: it shall make public the scope, purposes, rules, etc., in
respect of the processing of personal information in an explicit, easily understandable
and reasonable manner, and accept public oversight;
f guarantee of security: it shall be capable of ensuring security to a degree corresponding
to the security risks it faces, and take sufficient management measures and technological
approaches to safeguard the confidentiality, completeness and availability of personal
information; and
g involvement of personal information subjects: it shall provide personal information
subjects with opportunities to access, modify and delete their own personal information
and to withdraw their consent and cancel their own account and make complaints.
Network operators shall abide by the ‘lawful, justifiable and necessary’ principles to collect and use
personal information by announcing rules for collection and use, expressly notifying the purpose,
methods and scope of such collection and use, and obtain the consent of the person whose personal
information is to be collected. No network operator may collect any personal information that is
not related to the services it provides. It shall collect and use, and process and store personal the
information in the light of laws and administrative regulations and agreement with the users.
The principles for personal information protection in the Civil Code are similar to those in
the CSL. Article 1035 of the Civil Code provides that:
The processing of personal information shall be subject to the principle of legitimacy, rightfulness and
necessity, with no excessive processing, and shall meet the following conditions:
(a) Obtaining the consent of the natural person or the guardian thereof, unless otherwise provided by
laws or administrative regulations;
(b) Disclosing rules on processing information;
130
© 2020 Law Business Research Ltd
China
(c) Expressly stating the purpose, method and scope of information to be processed; and
(d) Not violating the provision of the laws and administrative regulations and the agreement of both
parties.
Processing of personal information includes the collection, storage, use, processing, transmission,
provision and disclosure of personal information, etc.
As for the right of the personal information subject, Article 43 of the CSL provides that:
Each individual is entitled to require a network operator to delete his or her personal information
if he or she founds that collection and use of such information by such operator violate the laws,
administrative regulations or the agreement by and between such operator and him or her; and
is entitled to require any network operator to make corrections if he or she founds errors in such
information collected and stored by such operator. Such operator shall take measures to delete the
information or correct the error.
A natural person may consult or copy his or her personal information with any information processor
in accordance with the law; if any error is found in the information, the natural person has the
right to raise an objection and request the information processor to take necessary measures such as
corrections in a timely manner.
Where a natural person discovers that an information processor has processed his or her personal
information in violation of the provisions of laws and administrative regulations or the agreement
between both parties, he or she shall have the right to request that the information processor promptly
delete the information.
The Specification provides more specific provisions on the collection and use of personal
information.
131
© 2020 Law Business Research Ltd
China
The Specification specifies that explicit consent means the act of a personal information
subject granting authority for the processing of his or her personal information, either
through making voluntary (either electronic or written) statements such as a written or oral
statement or his or her voluntary affirmative action, with the affirmative action including
voluntarily ticking or clicking the ‘agree’, ‘register’, ‘send’, ‘dial’, or voluntarily filling in or
providing their personal information, etc. by personal information subjects.
132
© 2020 Law Business Research Ltd
China
will be stored, its data security capability, and particulars of its sharing, transferring and
public disclosure of personal information), and obtain the authority and consent of
personal information subjects.
b Suspension of personal information controllers’ operation. If a personal information
controller suspends operation in regard to its products or services, it shall serve a notice
of suspended operation on each personal information subject or publicly release an
announcement for this purpose.
c Sharing and transfer of personal information. The personal information controller
shall inform personal information subjects of the purposes for which their personal
information will be shared or transferred, categories of data recipients and the possible
consequence of the sharing and transfer, and obtain the authority and consent of
personal information subjects in advance. Before sharing or transferring personal
sensitive information, it shall also inform what categories of personal sensitive
information are involved, identities of data recipients and their data security capability,
and shall obtain explicit consent of each personal information subject.
d Transfer of personal information in acquisitions, mergers, restructuring and bankruptcy.
e Public disclosure of personal information. The personal information controller
shall inform personal information subjects of the purposes for which their personal
information will be publicly disclosed and what categories of information will be
publicly disclosed, and obtain the authority and consent of personal information
subjects in advance. Before publicly disclosing personal sensitive information, it shall
also inform them of what personal sensitive information will be involved.
f Joint personal information controllers. The personal information controller shall
determine and inform personal information subjects explicitly of, what requirements
in respect of personal information security shall be fulfilled, and the respective duties
and obligations of itself and the third party in respect of personal information security,
in a contract or otherwise.
g Security incidents. A personal information controller is required to promptly notify
each affected personal information subject of the particulars of the security incident, by
means of emails, letters, calls or pushed notifications. Where it is difficult to notify all
affected personal information subjects one by one, it shall issue alerts in relation to the
general public in a reasonable and effective manner; the content of a notification shall
include but not be limited to (1) what the security incident is and its impact; (2) what
measures it has taken or will take to deal with the incident; (3) advice on what actions
could be taken by personal information subjects themselves to avoid the impact and
reduce risks; (4) remedial measures available for personal information subjects; and (5)
contact information of the head in charge of personal information protection and the
agency in charge of personal information protection.
Each individual is entitled to require a network operator to delete his or her personal information
if he or she founds that collection and use of such information by such operator violate the laws,
administrative regulations or the agreement by and between such operator and him or her; and
133
© 2020 Law Business Research Ltd
China
is entitled to require any network operator to make corrections if he or she founds errors in such
information collected and stored by such operator. Such operator shall take measures to delete the
information or correct the error.
134
© 2020 Law Business Research Ltd
China
personal information subject requires it to delete the information, it shall cease the
public disclosure of the information immediately, and issue a notice to require related
recipients to delete the information concerned.
135
© 2020 Law Business Research Ltd
China
the above-mentioned monitoring measures, as well as the employee information they collect,
are for a legitimate purpose and are necessary for business operations, and avoid collecting or
monitoring any employee information during non-working hours and outside the workplace.
Second, the type, purpose, manner of collection and protective measures of the information
collected should be notified to the employee, and the employee’s written consent should be
obtained.
Children’s privacy
According to the Provisions on Cyber Protection of Personal Information of Children,
network operators that collect, use, transfer or disclose personal information of children
shall, in a notable and clear way, notify children’s guardians of their practices, and obtain the
consent from children’s guardians.
Biometric information
The Specification also provides guidance on collection and use of personal biometric
information. According to the Specification, personal biometric information includes
personal gene, fingerprint, voiceprint, palmprint, auricle, iris, facial recognition features, etc.
Before collecting personal biometric information, personal information controller should
serve a separate notice to the personal information subject of the purpose, method and scope
of the collection and use of the personal biometric information, as well as the storage period
and other processing rules and obtain the personal information subject’s explicit consent. In
principle, personal biometric information should not be shared or transferred. If it is truly
necessary to share or transfer personal biometric information owing to business needs, the
personal information controller should separately inform the personal information subject of
the purpose of the sharing and transfer, the category of the personal biometric information
involved, the identity and data security capacity of the data recipient, and obtain the personal
information subject’s explicit consent.
The Specification also emphasises that personal biometric information should be stored
separately from personal identity information. In principle, the original personal biometric
information (such as samples, images, etc.) should not be stored. The measures that can be
taken include but are not limited to:
a storing only the summary information of personal biometric information;
b using personal biometric information directly in the collection terminal; and
136
© 2020 Law Business Research Ltd
China
c deleting the original image, which can extract personal biometric information after
using facial recognition features, fingerprint, palmprint, iris to identify, authenticate
and other functions.
Financial privacy
The Notice of the People’s Bank of China on Urging Banking Financial Institutions to Do
a Good Job in Protecting Personal Financial Information and the Notice of the People’s
Bank of China on Issuing the Implementation Measures of the People’s Bank of China for
Protecting Financial Consumers’ Rights and Interests provides the obligations that banking
and financial institutions should fulfil. According to the two notices, personal financial
information includes personal identity information, personal property information, personal
account information, personal credit information, personal financial trading information,
derivative information and other personal information obtained and preserved in the
process of establishing a business in relation with a person. In protecting personal financial
information, banking financial institutions should strictly abide by the legal provisions,
establish and improve the internal control by-laws, improve the information security
technology prevention measures, strengthen the training of the professionals and intensify
professionals’ awareness of personal financial information security. Provision of personal
financial information collected inside China abroad is not allowed unless otherwise required
by laws and regulations and the People’s Bank of China.
v Technological innovation
For the use of cookies, the Guide to the Self-Assessment of Illegal Collection and Use of
Personal Information by Apps provides that, ‘For the collection of personal information by
using cookies and similar technologies (including scripts, clickstreams, web beacon, flash
cookie, embedded web links, SDK, etc.), the purposes and types of personal information
collected shall be clearly presented to the users.’4 For the use of cookies, generally companies
will describe such use in the privacy policy, rather than setting up a separate pop-up on the
webpage.
For profiling or automated decision-making, the Specification stipulates that where
the information system used by the personal information controller in business operations
has an automatic decision-making mechanism and can have a significant impact on the
rights and interests of personal information subjects (for example, automatically determining
the subject’s credit status and the quota of credit loans available to the subject, or used for
automated screening of interviewers), the personal information controller shall:
a carry out the personal information security impact assessment in the planning and
design stage or before the first use, and take effective measures to protect the personal
information subject according to the assessment results;
b carry out the personal information security impact assessment regularly (at least once a
year) during use, and improve the measures to protect the personal information subject
according to the assessment results; and
4 Item 21, part 2 of the Guide to the Self-Assessment of Illegal Collection and Use of Personal Information
by Apps.
137
© 2020 Law Business Research Ltd
China
Apart from obtaining explicit consent from the personal information subject, the current law
in China does not impose any other restrictions on using the personal sensitive information.
It is possible that the forthcoming Personal Information Protection Law will provide more
details on those controversial personal information techniques (such as facial recognition
technique).
138
© 2020 Law Business Research Ltd
China
139
© 2020 Law Business Research Ltd
China
conditions. Article 23 of the DSL stipulates that ‘The state exercises export control over data
pertaining to controlled items related to fulfilling international obligations and maintaining
national security.’
The DSL does not list the data types of items subject to export control. It remains to be
seen whether the legislature will continue to revise the provisions of the DSL, which restrict
the cross-border flow of data, or whether it will formulate relevant supplementary regulations
to implement the DSL.
As for the forensics of cross-border electronic data evidence, Article 4 of the Law on
International Criminal Judicial Assistance provides that:
If an overseas law enforcement agency requests access to the data stored in the People’s Republic of
China, the relevant organisations and individuals shall report to the relevant competent authorities
and provide the data only after obtaining authorities’ approval. If the international treaties and
agreements concluded or acceded to by the People’s Republic of China have provisions on the access of
domestic data by foreign law enforcement agencies, such provisions shall prevail.
When carrying out data activities, a whole process data security management system shall be
established and improved in accordance with the provisions of laws, administrative regulations and
the mandatory requirements of national standards, education and training on data security shall be
organised, and corresponding technical measures and other necessary measures shall be taken to ensure
data security. The processor of important data shall set up a person in charge of data security and a
management organisation to implement the responsibility of data security protection.
The CSL provides some high-level generic network security requirements. For example,
under the CSL network operators should formulate internal security management systems
and operating instructions, determine the persons responsible for cybersecurity, and
implement the responsibility for cybersecurity protection. In addition, network operators
shall formulate contingency plans for cybersecurity incidents, and promptly deal with system
bugs, computer viruses, network attacks and intrusions and other security risks; network
operators shall adopt technical measures and other necessary measures to ensure the security
of the personal information they have collected and prevent such information from being
140
© 2020 Law Business Research Ltd
China
divulged, damaged or lost. If personal information has been or may be divulged, damaged or
lost, it is necessary to take remedial measures immediately, inform users promptly according
to the provisions and report the same to the relevant competent departments.
The Specification provides that a personal information controller is required to fulfil
the requirements as below:
a it shall make clear that its legal representative or the chief in charge of the controller
shall undertake the overall leadership responsibility for personal information, including
guaranteeing the human resources, financial resources and materials needed for the
work to ensure personal information security;
b it shall appoint a head in charge of personal information protection and set up an
agency in charge of personal information protection;
c it shall establish, maintain, and update records of processing activities of personal
information being collected and used;
d it shall establish a system for personal information security impact assessment, and
assess the personal information security impact regularly (at least once a year);
e it shall develop its data security capability and put into place necessary managerial
and technical measures in accordance with the rules specified in applicable national
standards, to avoid personal information being leaked, destroyed, lost or tampered
with;
f it shall pay attention to the personnel management and training, such as entering
into a confidentiality agreement with personnel who are in the position of personal
information processing and conducting a background review for personnel who are
exposed to large amounts of personal sensitive information, making clear the security
duties of each internal post in relation to the processing of personal information, and
having in place the mechanism to impose punishments when a security incident arises;
g offering specialised training programmes and assessment for personal information
security to personnel who are in posts concerning the processing of personal
information, either on a regular basis (once a year) or when there are drastic changes to
its privacy policies, etc.; and
h it shall audit the effectiveness of its privacy policies, relevant rules and processes, and
security measures.
It is noteworthy that the Specification elaborates on the content of a privacy policy and also
provides a privacy policy template for enterprises to refer to:
a basic information about this personal information controller, including name and
contact method of the controller;
b business functions for which personal information will be collected and used, and
categories of personal information collected under various business functions (if
personal sensitive information is involved, it shall be clearly marked or highlighted);
c rules on the processing of personal information, including how this information
will be collected and how long this information will be stored, and information on
cross-border data transfer;
d purposes for which personal information is shared with, transferred to, or publicly
disclosed among, external parties, categories of personal information concerned,
categories of third parties that receive the personal information, and the legal liability
borne by them;
141
© 2020 Law Business Research Ltd
China
e the rights of personal information subjects and the mechanism to exercise these rights,
such as how to access, modify and delete their own personal information, how to cancel
the account, how to withdraw their consent, how to obtain a copy of their own personal
information, and how to make complaints against the result by the information system’s
automatic decision-making;
f likely security risks after personal information subjects have provided their personal
information, and potential impacts that may arise if they refuse to provide such
information;
g what basic principles it observes for the security of personal information, what capacity
it has for data security and what safeguards it has taken to ensure the security of
personal information. Certificates of compliance related to data security and personal
information protection can be published when necessary; and
h in what ways and under what mechanisms enquiries and complaints filed by personal
information subjects will be handled, and the department in charge of handling external
disputes and its contact information.
telecommunications business operators and internet service providers shall provide technical interface,
decryption and other technical support and assistance for the prevention and investigation of terrorist
activities conducted by public security authorities and national security authorities in accordance
with the law.
In addition, the Specification stipulates that in principle personal information shall not be
publicly disclosed. When the personal information controller is authorised by law or has
reasonable grounds for public disclosure, it should meet the following requirements:
a conduct a personal information security impact assessment in advance and take effective
measures to protect the personal information subject based on the assessment results;
b inform the subject of personal information of the purpose for the public disclosure and
categories of personal information to be disclosed, and obtain the explicit consent of
the subject of personal information in advance;
c before publicly disclosing personal sensitive information, the subject of personal
information should also be informed of the content of personal sensitive information
involved;
d accurately record and store the public disclosure of personal information, including the
date, scale, purpose and scope of public disclosure;
e bear the corresponding responsibility for the damage caused by the public disclosure
of personal information to the legitimate rights and interests of personal information
subjects;
f personal biometric information should not be publicly disclosed; and
g analysis results of personal sensitive data such as race, ethnicity, political views and
religious beliefs of citizens should not be publicly disclosed.
However, a personal information controller need not seek the authority and consent of
personal information subjects in advance where:
142
© 2020 Law Business Research Ltd
China
Therefore, if for the purpose mentioned above, government agencies may require personal
information controllers to publicly disclose personal information.
Information disclosure required by foreign government agencies shall comply with
Article 4 of the Law on International Criminal Judicial Assistance.
143
© 2020 Law Business Research Ltd
China
in the network security inspection work.9 At the same time, local telecommunications
authorities usually notify enterprises that fail to implement their network security obligations.
For example, on 12 July 2018, the Shanghai Communication Administration notified four
internet enterprises that their network security requirements had not been implemented
effectively.10
The MPS is mainly responsible for the protection of cybersecurity levels. For example,
it issued the Regulation on Network Security Graded Protection (Draft for Comment) in
June 2018 and the Provisions on Internet Security Supervision and Inspection by Public
Security Organs in September 2018. At the same time, the MPS has launched the campaign
‘Network Clearance Campaign’ to punish illegal activities on the internet.11
In recent years, with the frequent occurrence of security incidents on mobile internet,
China has established the App Special Governance Panel, an organisation formed by the
NISSTC and three other associations to assist government in investigating and evaluating
unlawful collection and use of personal information by Apps.
In addition, the competent authorities of various industries also have the right to
supervise violations in their industries. For instance, the Notice of the People’s Bank of
China on Issuing the Implementation Measures of the People’s Bank of China for Protecting
Financial Consumers’ Rights and Interests provides that ‘A financial consumer shall, when
having any dispute on financial consumption with a financial institution, file the complaint
with the financial institution first in principle. If the financial institution refuses to accept
the complaint or fails to handle the complaint within a certain time limit, or the financial
consumer is of the opinion that the financial institution’s handling result is irrational, the
financial consumer may file a complaint with the PBC branch at the place where the financial
institution is located, the disputes occur or the contract is signed.’
Critical information infrastructure operators shall store personal information and important data
gathered and produced during operations within the territory of the PRC. Where it is really necessary
to provide such information and data to overseas parties due to business requirements, a security
assessment shall be conducted in accordance with the measures formulated by the national cyberspace
administration authority in concert with the relevant departments under the State Council. Where
the laws and administration regulations have other provisions, those provisions shall prevail.
9 MIIT, the Circular on Doing a Good Job in the Administrative Inspection of Network Security in the
Telecommunications and Internet Industries in 2019. http://www.miit.gov.cn/n1146285/n1146352/
n3054355/n3057724/n3057729/c6983820/content.html.
10 MIIT, The Shanghai communication administration notified four Internet companies that the
implementation of network security requirements was inadequate. http://www.miit.gov.cn/n1146285/
n1146352/n3054355/n3057724/n3057733/c6254778/content.html.
11 The MPS notification of launching the 2018 ‘Net Action’ campaign, http://www.mps.gov.cn/n2254536/
n2254544/n2254552/n6422073/index.html; The MPS notification of typical cases of launching the2019
‘Net Action’ campaign, http://www.mps.gov.cn/n2254536/n2254544/n2254552/n6528162/index.html.
144
© 2020 Law Business Research Ltd
China
However, since the promulgation of the CSL, there have been no clear definitions for the
terms CII and ‘important data’. It is difficult for foreign organisations to predict whether they
will fall under the strict data localisation rules.
Nevertheless, a number of industries have also enacted restrictions on specific data
localisation, as described below.
i Banking
The Notice of the People’s Bank of China on Urging Banking Financial Institutions to Do a
Good Job in Protecting Personal Financial Information and the Notice of the People’s Bank of
China on Issuing the Implementation Measures of the People’s Bank of China for Protecting
Financial Consumers’ Rights and Interests both provide that personal financial information
acquired inside China shall be stored, processed and analysed inside China and no personal
financial personal information acquired inside China should be transferred abroad, except as
otherwise required by law, regulation or provisions.
ii Insurance
Article 82 of the Standards for the Financial and Accounting Work of Insurance Companies
(2012) requires that ‘the business and financial data in the financial information system of
an insurance company shall be stored inside the territory of China and backed up off-site.’
145
© 2020 Law Business Research Ltd
China
vii Map
Article 34 of the Regulation on Map Management provides that an internet map service
entity should set the server storing map data inside China.
146
© 2020 Law Business Research Ltd
China
According to the Article 21 of the CSL, all network operators in China are obligated to
participate in the multiple-level protection scheme (MLPS). From late 2018 to May 2019,
the MPS and other departments jointly issued several national standards on the MLPS. These
standards include network infrastructure, important information systems, large internet
websites, big data centres, and cloud computing platforms, ‘internet of things’ systems,
industrial control systems, and public service platforms. In addition, these standards put
forward new security expansion requirements for new technologies of cloud computing,
internet of things, mobile internet, industrial control and big data.
Article 40 of Chapter IV Network Information Security provides that ‘Network
operators shall strictly keep confidential users’ personal information that they have collected,
and establish and improve the users’ information protection system.’ Article 55 of the CSL
provides that ‘[f ]or the occurrence of cybersecurity incidents, it is necessary to activate
contingency plans for cybersecurity incidents immediately, investigate and assess such
incidents, require network operators to take technical measures and other necessary measures
to eliminate potential security hazards, prevent expansion of the harm, and promptly issue
warning information in relation to the public to society.’
X OUTLOOK
With the promulgation of the CSL and Civil Code, the Chinese data protection and
cybersecurity legal regime has taken shape rapidly. A separate Data Security Law and a
Personal Information Protection Law are expected to be passed soon. These new laws will
also be an important part of China’s legal regime of cybersecurity and data protection.
147
© 2020 Law Business Research Ltd
Chapter 10
CROATIA
Sanja Vukina1
I OVERVIEW
The Croatian Constitution, which entered into force on 22 December 1990, established
privacy and protection of personal data as fundamental rights, stipulating legal protection of
personal and family life, home, dignity, reputation and honour2 and in addition guaranteeing
the security and confidentiality of personal data.3 Pursuant to the wording of the Constitution,
personal data may be processed and used only with the data subject’s consent or in accordance
with the conditions prescribed by law. Additionally, the use of personal data contrary to the
established purpose of their collection is prohibited.4
The Constitution established protection of personal data as a fundamental right.
However, the implementation and further development of personal data protection legislation
was lacking until 2003 when the Croatian parliament, under the influence of the Directive
95/46/EC5 and the Council of Europe Treaty 108,6 adopted the Personal Data Protection
Act,7 which established the Croatian Data Protection Agency (CPDPA), and until 2018
represented the general fundamental framework law regulating the field of data protection
in Croatia.8
Since Croatia joined the EU on 1 July 2013, the EU acquis communautaire also became
a part of the Croatian legal system. Particularly important is the Charter of Fundamental
Rights of the European Union9 (the Charter) which has foreseen the protection of personal
data as a fundamental right, therefore stipulating that personal data may be processed only
if ‘processed fairly for specified purposes and on the basis of the consent of the person
148
© 2020 Law Business Research Ltd
Croatia
concerned or some other legitimate basis laid down by law’.10 Moreover, the Charter has also
envisaged as fundamental rights the right to access and the right to rectify one’s own personal
data in addition to the obligation that an independent authority supervise compliance
with the data protection rules. In May 2016, what is known as the EU data protection
package,11 that is, Regulation (EU) 2016/67912 (GDPR) and Directive (EU) 2016/68013
(DPLED), was adopted and alongside the Directive 2002/58/EC14 (the ePrivacy Directive),
which established a harmonised framework in the EU for the protection of online privacy,
represents a fundamental data protection legal framework in the EU. At the time of writing,
the ePrivacy Regulation15 has still not been adopted.
In order to comply with the GDPR and DPLED, the Croatian parliament adopted the
General Data Protection Regulation Implementation Act16 (the Implementation Act), which
entered into force on the same day as the GDPR, and the Act on the protection of natural
persons with regard to the processing and exchange of personal data for the purposes of the
prevention, investigation, detection or prosecution of criminal offences or the execution of
criminal penalties (the DPLED Implementation Act)17 entering into force shortly afterwards.
The provisions of the ePrivacy Directive were transposed in the Croatian legal system through
the Croatian Electronic Communications Act (ECA).18
Despite the general framework regarding the protection of personal data established by
GDPR together with the Implementation Act, sector-specific acts (e.g., the Labour Act, ECA,
Act on Data and Information in Health Care, Insurance Act) still provide data protection
particularities generally regarding the means of processing or processing purpose.
10 Charter of Fundamental Rights of the European Union, OJ C 326, 26 October 2012, p. 391–407, Article
8(2).
11 https://ec.europa.eu/info/law/law-topic/data-protection/data-protection-eu_en, accessed 4 July 2019.
12 Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the
protection of natural persons with regard to the processing of personal data and on the free movement
of such data, and repealing Directive 95/46/EC (General Data Protection Regulation) (Text with EEA
relevance), OJ L 119, 4 May 2016, p. 1–88.
13 Directive (EU) 2016/680 of the European Parliament and of the Council of 27 April 2016 on the
protection of natural persons with regard to the processing of personal data by competent authorities for
the purposes of the prevention, investigation, detection or prosecution of criminal offences or the execution
of criminal penalties, and on the free movement of such data, and repealing Council Framework Decision
2008/977/JHA.
14 Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning
the processing of personal data and the protection of privacy in the electronic communications sector
(Directive on privacy and electronic communications), OJ L 201, 31 July 2002, p. 37–47, amended
by: Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006, OJ L
105, 13 April 2006, p. 54, Directive 2009/136/EC of the European Parliament and of the Council
of 25 November 2009, OJ L 337, 18 December 2009, p. 11, corrected by Corrigendum, OJ L 241,
10 September 2013, p. 9.
15 Proposal for a Regulation of the European Parliament and of the Council Concerning the Respect for
private life and the protection of personal data in electronic communications and repealing Directive
2002/58/EC (Regulation on Privacy and Electronic Communications) COM/2017/010 final – 2017/03
(COD), https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:52017PC0010, accessed on
11 July 2019.
16 Official Gazette 42/2018.
17 Official Gazette 68/2018.
18 Official Gazette 73/2008, 90/2011, 133/2012, 80/2013, 71/2014, 72/2017.
149
© 2020 Law Business Research Ltd
Croatia
150
© 2020 Law Business Research Ltd
Croatia
Pursuant to GDPR, two types of personal data exist, personal data and special categories
of personal data (i.e., sensitive data).
Personal data is defined as ‘any information relating to an identified or identifiable
natural person (“data subject”); an identifiable natural person is one who can be identified,
directly or indirectly, in particular by reference to an identifier such as a name, an identification
number, location data, an online identifier or to one or more factors specific to the physical,
physiological, genetic, mental, economic, cultural or social identity of that natural person’.25
Personal data ‘revealing racial or ethnic origin, political opinions, religious or
philosophical beliefs, or trade union membership, and the processing of genetic data,
biometric data for the purpose of uniquely identifying a natural person, data concerning
health or data concerning a natural person’s sex life or sexual orientation’26 are considered
as sensitive data and generally the processing of such data is prohibited, except when done
pursuant to the exceptions prescribed in the GDPR and under certain conditions if they
are prescribed by national legislation. As prescribed by the GDPR, national legislation may
particularly ‘introduce further conditions, including limitations, with regard to the processing
of genetic data, biometric data or data concerning health’.27 The Implementation Act has
introduced further conditions regarding the processing of the foregoing.
Under the GDPR and the Implementation Act the entity (natural or legal person)
that determines the purpose and means of processing of personal data is considered
a ‘controller’,28 while the entity that processes on behalf of the controller is considered a
‘processor’.29 Processing ‘means any operation or set of operations which is performed on
personal data or on sets of personal data, whether or not by automated means, such as
collection, recording, organisation, structuring, storage, adaptation or alteration, retrieval,
consultation, use, disclosure by transmission, dissemination or otherwise making available,
alignment or combination, restriction, erasure or destruction’.30
The Implementation Act prescribed that the CPDPA shall act as a supervisory authority
under the GDPR and DPLED and also as an accreditation body under the Regulation (EC)
No. 765/2008,31 the internal requirements and scope of work of the CPDPA, the CPDPA’s
rules of procedure and legal remedies against the CPDPA’s decision, additional requirements
for the processing of personal data regarding children, genetic data, biometric data, processing
data by video surveillance and processing data for statistical purposes.
151
© 2020 Law Business Research Ltd
Croatia
32 ibid., Article 3.
33 Treaty on European Union, OJ C 326, 26 October 2012, p. 13–390, consolidated version.
34 GDPR, Article 2.
35 ibid., Article 5 and 6.
152
© 2020 Law Business Research Ltd
Croatia
g inform the data subject of all the relevant information (as applicable in Articles 13
and 14 of the GDPR) regarding the processing of the data subject’s personal data in a
way that would not deceive or mislead data subjects regarding the processing of their
personal data (the ‘transparency principle’ and ‘fairness principle’).
When an entity acts as a controller, he or she must be able to demonstrate compliance with
all the aforementioned principles applicable when processing data subject’s personal data (the
‘accountability principle’).36
Particularly important for complying with the GDPR is the controller’s obligation to
notify the data subject regarding the processing of his or her personal data. Notifications
to the data subject should contain information understandable to the data subject, inter
alia, regarding the identity of the controller, contact details of the data protection officer,
purposes of processing and intended legal basis of processing, categories of personal data,
recipients of personal data, intention regarding the transfer of personal data to recipients in
third countries, existence and enforcement of the data subject’s rights and others as prescribed
under Articles 13 or 14 of the GDPR.
Furthermore, under the GDPR, a record of processing activities must be established
by controllers employing 250 or more persons or when processing is not occasional and shall
likely result in a risk to rights or freedoms of the data subject or when sensitive data are being
processed.
Controllers and processors that process personal data carried out by a public authority
or body, except for courts acting in their judicial capacity shall have the obligation to designate
a data protection officer (DPO) when their core activities consist of:
a processing operations that by virtue of their nature, scope or purpose, require regular
and systematic monitoring of data subjects on a large scale; or
b processing sensitive data and personal data relating to criminal convictions and offences
on a large scale.37
Even though the DPO may be a staff member of the controller or processor, or fulfil the
tasks on the basis of a service contract, the DPO should also have professional qualities and,
in particular, expert knowledge of data protection law.38 DPOs directly report to the highest
management level of the controller or the processor; however, in performing their task they
do not receive any instructions regarding the exercise of their tasks from the controller or
processor.39 DPOs, inter alia, inform and advise the controller or the processor regarding their
obligations under the law, monitor compliance with respective data protection provisions and
internal data protection policies, providing advice where requested on the data protection
impact assessment and communicate with the supervisory authority.40
36 ibid., Article 5.
37 ibid., Article 37.
38 ibid.
39 ibid., Article 38.
40 ibid., Article 39.
153
© 2020 Law Business Research Ltd
Croatia
Pursuant to the previous Croatian Data Protection Act, controllers had the obligation to
establish a personal data database and deliver to the CPDPA records regarding personal data
databases;41 however this obligation has been removed under the GDPR and Implementation
Act.
154
© 2020 Law Business Research Ltd
Croatia
Company law
The Amendments to the Company Act implemented the EU Directive (EU) 2017/1132,44
and added provisions regarding the processing of personal data of joint stock companies’
stockholders, which shall enter into force on 1 January 2021. The relevant provision
prescribed that the company and the intermediaries are entitled to process stockholders’
personal data for the purposes of identifying, communicating, exercising stockholders’ rights
and cooperating with shareholders.45 However, since the foregoing provision shall enter into
force on 1 January 2021, joint stock companies and intermediaries until that time shall
have to collect personal data on another legal basis pursuant to the GDPR. In addition,
the Amendments to the Company Act have not foreseen a similar provision regarding the
processing of personal data of shareholders of other types of companies; therefore, companies
must find an appropriate legal basis for processing the personal data of their shareholders and
appropriately inform their shareholders.
Consumer protection
Regarding the protection of personal data in the context of consumers, the Implementation
Act did not prescribe any additional requirements; however, the Croatian Consumer
Protection Act contains a provision stating that ‘the retailer shall be prohibited from providing
155
© 2020 Law Business Research Ltd
Croatia
personal data to any third party without the prior consent of the consumer, in accordance
with the law governing the protection of personal data’.46 In regard to the aforementioned
and since the GDPR expressly stipulates that ‘the free movement of personal data within the
Union shall be neither restricted nor prohibited for reasons connected with the protection
of natural persons with regard to the processing of personal data’,47 the applicability and the
extent of the aforementioned provision of the Consumer Protection Act is currently not clear.
However, it may be observed that business entities have largely relied solely on the provisions
of the GDPR rather than on the provision of the Consumer Protection Act.
Credit institutions
The Amendments to the Croatian Credit Institutions Act, which entered into force on
25 April 2020, allowed and regulated the transfer of personal data between credit institutions
and the Croatian Register of Credit Liabilities for the purpose of assessing the creditworthiness
of consumers. Namely, pursuant to the Consumer Housing Credit Act48 and the Consumer
Credit Act,49 credit institutions are obliged to assess the creditworthiness of consumers before
concluding a credit agreement, among other things, by inspecting the available credit registers.
Since the Croatian Register of Credit Liabilities suspended the exchange of data on credit
obligations for citizens on 21 May 2018, the foregoing amendments provide legal certainty
in the exchange of information that credit institutions exchange directly or through a separate
legal entity in order to assess creditworthiness of consumers. It also stipulates the obligation
of a credit institution to exchange, on request, with other credit institutions a minimum
coverage of information related to customer obligations, including the customer’s personal
data, for the purpose of creditworthiness assessment and credit risk management. However,
credit institutions still have a duty to inform the consumers regarding the processing of their
personal data by way of transferring their personal data to the Croatian Register of Credit
Liabilities and other credit institutions in accordance with GDPR.
Electronic marketing
Pursuant to ECA, the use of automatic calling or communication system without human
intermediation, telefax devices or emails, including SMS and MMS messages, is allowed for
the purpose of direct marketing and sale only with prior consent of subscribers or users, save
as when the subscriber or the user is a legal entity. However, business entities, including both
natural and legal entities, in the event that the consumer has not previously rejected such use
of personal data, may use email addresses collected from its consumers when selling products
and services only for direct marketing and sale of similar products and services, provided
that such consumers have a clear and unambiguous possibility of free and simple objection
to such use of email address in time of collection of their email address and each subsequent
receipt of such email.50
46 Consumer Protection Act, Official Gazette 41/2014, 110/2015, 14/2019, Article 11.
47 GDPR, Article 1(3).
48 Official Gazette, No. 101/2017.
49 Official Gazette, No. 75/2009, 112/2012, 143/2013, 147/2013, 9/2015, 78/2015, 102/2015, 52/2016.
50 ECA, Article 107.
156
© 2020 Law Business Research Ltd
Croatia
On 19 April 2019, CPDPA issued its opinion51 regarding the processing of personal
data for the purpose of marketing in which it stated that under ECA relevant business entities
may process personal data on basis of consent and legitimate interest in accordance with the
foregoing rules provided in ECA. Furthermore, CPDPA particularly pointed out that it is
not allowed to subsequently use the basis of legitimate interest in processing if there were
problems with the validity of consent.
Regarding the validity of the consent, CPDPA expressly stated that consent must be a:
voluntarily, in particular, informed and unambiguous expression of the wishes of the data subject
regarding the processing of his/her personal data, such as by declaration or clear confirmation, which
could include marking the checkmark field when visiting web pages, selecting technical information
service provider’s settings or other statements or behaviours that clearly indicate in that context
that the data subject accepts the proposed processing of his/her personal data. Silence, a pre-ticked
checkmark, or lack of activity, should therefore not be considered as consent.
Moreover, in the foregoing opinion CPDPA stated that official business email and official
business mobile phones numbers are considered as official business data, however if it is
possible to directly or indirectly identify a particular natural person using the structure of the
official email (web protocol address), it shall also be considered as not only official business
data, and in that case the provisions of the GDPR shall apply. However, according to the
respective opinion, CPDPA is of the stance that an official business email and official business
mobile phone number may be used exclusively for the purpose of official (business) contact
with a legal entity and may not be used for other purposes.
Employment law
Regarding the processing of personal data in the context of employment the Croatian Labour
Act (CLA)52 prescribes that an employee’s personal data may be collected, processed, used and
delivered to third parties only if this is provided by CLA or other law or, if necessary, for the
purpose of exercising the rights and obligations arising from the employment relationship.53
The foregoing shall be prescribed in advance in the employment rulebook, containing
information regarding which personal data shall be collected, purposes of processing and
third parties which may receive employees’ personal data. Also, personal data may be delivered
to third parties only by the employer or a person specifically authorised by the employer.
Incorrect personal data must be corrected immediately and personal data for which legal or
factual reasons do no longer exist must be deleted or otherwise removed.54
In addition, an employer employing at least 20 employees is obliged to appoint a trustee
who enjoys the trust of the employees (employee trustee) and who, except for the employer,
is authorised to supervise if the collection, processing, usage and delivery of personal data to
third parties are in accordance with the law.55 To appoint the employee trustee, prior approval
51 https://azop.hr/misljenja-agencije/detaljnije/obrada-osobnih-podataka-u-svrhe-marketinga, CPDPA
Opinion dated 19 April 2019, accessed on 11 July 2019.
52 Official Gazette 93/2014, 127/2017.
53 CLA., Article 29.
54 ibid.
55 ibid.
157
© 2020 Law Business Research Ltd
Croatia
from the works council is necessary.56 In other words, the employee trustee and the DPO is
not always the same person since the employee trustee must be a person who enjoys the trust
of employees and was approved by the work’s council prior to his appointment.
The employer, the employee trustee and any other person who, in the performance of
his or her duties, shall have access to the personal data of employees, must keep such data
permanently confidential.57
Moreover, pursuant to the CLA, prior to making a decision important for the position
of the employees, the employer must consult with the works council on the intended decision
and must provide the works council with information relevant to the decision making and
the perception of its impact on the position of the employees. In case the employer does
not comply with the foregoing obligation to consult with the works council the decision
shall be pursuant to the CLA null and void.58 Such consultations may be necessary in
case the processing of employees’ personal data is done in an intrusive way, such as when
systematically monitoring employee emails, online logs of websites visited or 24-hour
tracking of the movement of an employee’s official vehicle or when using biometric employee
data.59 In relation to the aforementioned, the Implementation Act explicitly permits that
controllers (employers) having establishment or offering services in Croatia may process
employees’ biometric data for the purpose of recording of working hours and for entering
and leaving the official premises, provided that the employee has explicitly consented to
such processing of biometric data in accordance with the provisions of the GDPR. However,
it is not entirely clear if employers should always consult with the works council prior to
processing employees’ biometric data.
Additionally, the Implementation Act prescribed that employees’ personal data may
be processed by means of video surveillance, except in premises intended as spaces of rest,
personal hygiene and dressing rooms, only if the employees have been adequately informed,
and if all the provisions laid down by regulations governing occupational safety and health
care and the Implementation Act have been fulfilled.60
Health privacy
On 15 February 2019, the Act on Data and Information in Health Care (ADH)61 entered
into force, regulating the processing of health data and health information. Pursuant to ADH,
health data is considered as data regarding the physical or mental health of an individual,
including the data on provided health services in the Croatian health system, and health
information is considered information generated by processing of health data for the purpose
of its further use in the health system or for the needs of the system connected with the health
system.62 Both health data and health information may be considered sensitive data, or at
least as personal data under the GDPR. Furthermore, ADH prescribes additional provisions,
inter alia, regarding the quality, accessibility, data minimisation and transfer of health data
and health information, also including the processing of personal data through the Central
158
© 2020 Law Business Research Ltd
Croatia
Health Care Information System and National Public Health Care Information System.
Following from the foregoing, it would be advisable that entities providing health services,
when informing their clients regarding the processing of health data and health information,
also reflect in their privacy notices the applicable provisions of ADH regarding the processing
of the data subject’s personal data.
Insurance
The amendments to the Insurance Act,63 which entered into force on 22 December 2018,
explicitly prescribe that insurance companies are allowed to process health personal data
when it is necessary to process health personal data to conclude and execute an insurance
contract and enforcement of legal rights of the insured. From the wording of the relevant
provision it may be concluded that the processing of health personal data regarding insurance
contracts may be done on the legal basis of contract; however, under GDPR, the processing
of sensitive data is generally prohibited, save as prescribed by Article 9(2) of the GDPR.
The Final Proposal of the Act Amending the Insurance Act set forth a rationale stating
that insurance activities may be considered as activities of public interest since they aim to
preserve life conditions in the event of insured risk occurrence.64 Furthermore, the Insurance
act prescribed that, inter alia, insurance companies may process the national identification
number and collect a copy of the identification document or bank card for the purpose of
concluding and executing an insurance contract, and store personal data until the expiry of
the respective statute of limitations period.65
Additionally, the Implementation Act prohibited, including on basis of data subject’s
consent, the processing of genetic data for calculating the chances of illnesses or other
health conditions of data subjects when concluding or executing life insurance contracts or
contracts including survivorship clause.66 The foregoing applies when data subjects conclude
the respective contracts in Croatia with controllers having establishment or offering services
in Croatia.67
Video surveillance
Processing of personal data by means of video surveillance pursuant to the Implementation
Act is allowed only for the purpose necessary and only when justified for protecting natural
persons and property.68 Controllers may conduct video surveillance for this purpose on
the premises, parts of the premises, the outer surface of an object as well as inside public
transport.69 When using video surveillance, an object must be designated with an easily
intelligible picture containing text about the controller, contact details and information that
the object is under video surveillance, visible by the time a person enters into the recording
perimeter. Additionally, a notice containing all the relevant information under Article 13
of the GDPR must also be accessible to the data subjects (usually by stating the respective
159
© 2020 Law Business Research Ltd
Croatia
web address below the easily intelligible picture).70 Records acquired by means of video
surveillance may be stored for no longer than six months, unless prescribed otherwise by law,
or if those records are evidence in a court or another equivalent proceeding.71 The CPDPA,
in its Opinion issued on 7 June 2019, stated that livestreaming of public spaces by means of
webcams, where the films are not stored or there is no possibility to retroactively access the
films, are not subject to the GDPR, since the latter only applies to the processing of personal
data wholly or partly by automated means that form a part of a filing system or are intended
to form part of a filing system.72
Furthermore, the Implementation Act additionally prescribes that to conduct video
surveillance in residential or business and residential buildings, approval of those owning at
least two-thirds of the building is required.73
v Technological innovation
Biometric data
Processing of biometric data, pursuant to the Implementation Act, is subjected to different
provisions depending if the processing is done by bodies of public authority or entities
carrying out business activities in the private sector. Public authority bodies may process
biometric data only if it is prescribed by law and if it is necessary for protection of people,
property, classified data and business secrets; however, entities acting in the private sector
may process biometric data if it is prescribed by law or if it is necessary for protection of
people, property, classified data, business secrets or safe identification of a user.74 Therefore,
entities acting in the private sector are free to choose any of the prescribed legal bases under
the GDPR for such processing, save as for safe identification of a user in which case explicit
consent must be obtained.75
The Act on Processing of Biometric Data76 entered into force on 4 January 2020. It
prescribes which authorities and for what purposes may process the biometric personal data
of data subjects.
Use of cookies
The ECA implemented Directive 2009/136/EC,77 which amended the ePrivacy Directive in
relation to the use of cookies. The ECA prescribed that the usage of electronic communication
network for storing or accessing stored data in the terminal equipment of the subscriber
or user is generally allowed only with prior consent after receiving a clear and complete
notification pursuant to data protection regulations, particularly including the purpose of
such processing.78 However, such processing without explicit consent is allowed in cases
(1) when storing technical data or accessing data in terminal equipment is required for
160
© 2020 Law Business Research Ltd
Croatia
the sole purpose of carrying out the transmission of a communication over an electronic
communications network or (2) in order for the provider of an information society service to
provide the service explicitly requested by the subscriber or user.79
79 ibid.
80 GDPR, Article 1(3) and Article 44.
81 ibid., Articles 44–49.
82 ibid., Article 44.
161
© 2020 Law Business Research Ltd
Croatia
the CDPCA adopted the decision on establishing and publicly announcing the list of types
of processing proceedings for which a privacy impact assessment must be undertaken,83 in
which it prescribed that a privacy impact assessment, inter alia, must be undertaken for:
a processing of personal data for systematic and extensive profiling or automated decision
making for making conclusions which substantially effect or may affect the data
subject’s right of access to a service or benefit;
b processing of special categories of personal data for profiling or automated decision
making;
c processing biometric or genetic data when at least one additional criteria from the
Guidelines on Data Protection Impact Assessment (DPIA) (WP 248 rev 01) are
fulfilled; and
d processing of employee personal data by applications or tracking systems.
83 https://azop.hr/aktualno/detaljnije/odluka-o-uspostavi-i-javnoj-objavi-popisa-vrsta-
postupaka-obrade-koje-podli, accessed on 12 July 2019.
84 Guidelines on Article 49 of Regulation 2016/679, https://ec.europa.eu/newsroom/article29/item-detail.
cfm?item_id=614232, accessed on 11 July 2019.
85 DPLED Implementation Act, Article 3(2).
162
© 2020 Law Business Research Ltd
Croatia
personal data on the request of natural or legal entities and (6) order administrative monetary
fines under the GDPR. Notwithstanding the foregoing under the GDPR, the CPDPA also
acts as an advisory body regarding the processing of personal data.
Any persons who consider that their rights guaranteed under the GDPR and the
Implementation Act are violated may submit a request to establish a violation of data
subject’s rights before the CPDPA. The CPDPA has the power to carry unannounced and
announced investigations regarding their tasks and competences, pursuant to the CPDPA’s
director’s order.86 Moreover, if deemed necessary, the CPDPA is entitled to copy, seal and
temporarily seize the storage systems or equipment.87 When a breach of the GDPR or the
Implementation Act is established, the CPDPA may issue warnings, reprimands, order the
controller or processor to comply with the data subject’s requests, impose a temporary or
definitive limitation including a ban on processing, order a fine of up to €20 million and
order an erasure regarding the processed personal data. An administrative lawsuit may be
initiated before the administrative court against the decisions, orders and other acts of the
CPDPA.88
163
© 2020 Law Business Research Ltd
Croatia
the Croatian Civil Procedure Act,90 particular entities may file a lawsuit for the protection of
collective interests and rights – a type of lawsuit similar to a class action – but there has been
no significant public interest regarding such a lawsuit.
90 Official Gazette 53/1991, 91/1992, 112/1999, 129/2000, 88/2001, 117/2003, 88/2005, 2/2007,
96/2008, 84/2008, 123/2008, 57/2011, 25/2013, 89/2014.
91 Cybernetic Security Act, Article 15.
92 www.cert.hr/zks-incident, accessed on 13 July 2019.
93 Cybernetic Security Act, Article 21 and 24.
94 Cybernetic Security Ordinance, Article 6, 9, 10 and 37.
95 GDPR, Article 33.
164
© 2020 Law Business Research Ltd
Croatia
possible adverse effects, and should communicate the name and details of the DPO.96 Where
the personal data breach is likely to result in high risk to the rights and freedom of natural
persons, the controller should also notify the data subject.97
X OUTLOOK
Since the outbreak of the covid-19 pandemic, the CPDPA has focused their attention on the
legality and proportionality of collecting and transferring personal data for the purpose of
preventing further covid-19 infections. The Croatian legislator has not yet enacted detailed
laws and regulations that would provide legal certainty regarding the processing of personal
data in various fields.
96 ibid.
97 ibid., Article 34.
165
© 2020 Law Business Research Ltd
Chapter 11
DENMARK
I OVERVIEW
Similar to other countries in Europe, Denmark has passed legislation designed to supplement
the requirements of the EU General Data Protection Regulation (GDPR),2 which came into
force on 25 May 2018. In Denmark, the main regulation concerning processing of personal
data is the GDPR and the Danish supplementary act, the Data Protection Act,3 which came
into force on 23 May 2018.
In addition to the rules of the GDPR, the Data Protection Act and national practice
implements certain derogations concerning the processing of personal data, especially in
respect of processing of personal data within the employment sector and the processing of
national registration numbers. The Danish Act on Processing Personal Data that implemented
Directive 95/46 EC came into force in 2002. But despite the fact that the Danish data
protection regulation is more than 15 years old, not much attention was paid to data
protection in Denmark until the GDPR was passed in 2016. The term ‘data protection’ was
basically unheard of in the general Danish population and in most companies before 2017–
2018. Thus, the GDPR has been the dominant topic in recent years in terms of compliance.
Since the implementation of the GDPR, Danish companies have generally continuously
invested substantial resources in data protection compliance, mainly for commercial and legal
risk management reasons.
Since 25 May 2018, the Danish and other European supervisory authorities have
issued multiple guidelines and decisions concerning the interpretation of the GDPR and
the national supplementary legislation, which has allowed Danish companies to conduct
substantially more targeted and resource efficient compliance efforts. Denmark has been
trailing most other EU Member States, in particular Germany and France, in terms of data
protection awareness and compliance. In our opinion, this situation is mostly attributable
to the relatively high level of trust in the Danish society. However, Denmark seems to have
caught up with most Member States in recent years, mainly because of drastically increased
public and corporate awareness of data protection rules as well as massive countrywide
corporate resource allocations since 2016.
1 Tommy Angermair is a partner, Camilla Sand Fink is a senior associate and Søren Bonde is an associate at
Clemens.
2 Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the
protection of natural persons with regard to the processing of personal data and on the free movement of
such data, and repealing Directive 95/46/EC (General Data Protection Regulation).
3 Act No. 502 of 23 May 2018 on supplementary provisions to the regulation on the protection of natural
persons with regard to the processing of personal data and on the free movement of such data.
166
© 2020 Law Business Research Ltd
Denmark
4 The DPA’s guidelines are only published in Danish and available at https://www.datatilsynet.dk/
presse-og-nyheder/nyhedsarkiv/2020/mar/hvordan-er-det-med-gdpr-og-coronavirus. The EDPB
guidelines are published in English and available at https://edpb.europa.eu/sites/edpb/files/files/file1/
edpb_statement_2020_processingpersonaldataandcovid-19_en.pdf.
5 The standard contractual clauses are published in Danish and English and available at https://edpb.europa.
eu/our-work-tools/consistency-findings/register-for-decisions.
6 The podcast-guidelines are available in Danish at https://www.datatilsynet.dk/generelt-om-databeskyttelse/
podcast.
7 Case C-311/18 Schrems II.
8 Section 1(3) of the Data Protection Act.
167
© 2020 Law Business Research Ltd
Denmark
In line with the GDPR, the Data Protection legislation applies to the processing
of personal data as part of the activities carried out on behalf of a controller or processor
established in Denmark, regardless of whether the processing takes place in the EU.
The DPA has published several hands-on guidelines describing how companies must
adhere to the Data Protection legislation.9 Despite the guidelines are not legally binding they
are generally taken very seriously in the public and private sector given the DPA’s role as
primary regulator and enforcer of the data protection rules in practice.
168
© 2020 Law Business Research Ltd
Denmark
169
© 2020 Law Business Research Ltd
Denmark
170
© 2020 Law Business Research Ltd
Denmark
In addition to the Data Protection legislation, the rules of the Danish Marketing Act
limit the processing of personal data in connection with direct marketing.16 Direct marketing
means when personal data is used to make direct contact with the data subject, for example
via email, SMS or a letter.
In particular, a controller may not contact the data subject by use of electronic means
for direct marketing purposes unless such processing is based on the consent of the data
subject.
A data subject has the right to withdraw the consent to the processing of personal data
for direct marketing purposes. If the data subject withdraws his or her consent, the personal
data may no longer be used for marketing purposes.
Furthermore, a controller is not entitled to disclose personal data collected for marketing
purposes without explicit consent from the data subject.
This prohibition does not apply in the case of ‘general customer information’, which
is the basis of categorisation into customer categories, and the interest of the data subject
does not exceed the interest of the trader. In this case, the controller must make sure that the
consumer has not made inquiries for marketing purposes via the CPR. General customer
information does not include detailed information on the data subject’s consumption habits,
such as information on the data subject’s purchase of a car on credit or what goods the data
subject has purchased.
v Technological innovation
Cookies
The use of cookies, namely, a piece of text stored on the end user’s medium (e.g., tablet or
computer, which may collect and transmit data), is subject to the rules of the Personal Data
Legislation if the data stored or collected by the cookie includes personal data. Regardless of
whether the collected data includes personal data, the placement and functionality of cookies
are governed by the Cookie Act.17
In accordance with the CJEU’s ruling in the Planet49 case,18 data controllers are – apart
from strictly necessary cookies – prohibited from using pre-checked checkboxes on consent
banners to collect and process personal data. Furthermore, scrolling and continued browsing
or cookie walls (forced consent) does not constitute a valid consent. Thus, the only valid form
of consent for processing personal data is an explicit, specific and actively given consent in
accordance with the rules in the GDPR.
Social media
Social media is increasingly becoming an important part of business worldwide, especially
in terms of marketing and collection and disclosure of personal data. With multiple
international providers and billions of data subjects using different services worldwide, data
breaches such as the ‘Cambridge Analytica scandal’ persistently emphasise the importance
of data protection in terms of social media. Thus, there is an increasing number of cases
171
© 2020 Law Business Research Ltd
Denmark
regarding the processing of personal data related to social media. According to the CJEU,
data controllers collecting personal data via social platforms may be considered as a joint
controller with the social media provider.19
Furthermore, the DPA has recently announced an ex officio investigation regarding the
legal grounds and security measures with regard to processing personal data in the TikTok
app.
Surveillance
With effect from 1 July 2020, the Video Surveillance Act20 has been amended. According
to the Video Surveillance Act, private surveillance of publicly accessible areas is prohibited.
However, a number of companies, including banks, petrol stations, shopping malls,
wholesalers and restaurants are exempt from this ban, as they have the right to monitor their
own entrances and facades. In addition, these companies have access to monitor areas that
are directly adjacent to the company’s entrances and facades at a distance of up to 30 metres.
In this context, however, surveillance must be ‘clearly necessary’ and have the purpose of
preventing and combating crime.
Companies monitoring publicly accessible areas must be registered in the Danish Police
Camera Register (POLCAM). The registration must be made within ‘reasonable time’, and
any subsequent significant changes must be registered in POLCAM.
In addition to the rules on notifying the data subject in accordance with Articles 13–14
of the GDPR, the controller conducting television surveillance must clearly communicate
that surveillance activities take place by signage or similar. Recordings containing personal
data originating from surveillance for crime prevention purposes must generally be deleted
no more than 30 days after the recording.
Furthermore, data handlers using video surveillance must be able to redact other
individuals and personal data from the surveillance material while adhering to the right of
access by the data subject in Article 15 of the GDPR.
Monitoring of employees is not prohibited; however, such processing of personal data
is subject to the data protection legislation and the employer must comply with the GDPR,
including the rules on notification in Article 13 of the GDPR.
19 C-210/16.
20 Act No. 1190 of 10 November 2007.
21 The European Economic Area includes all EU countries, Iceland, Liechtenstein and Norway.
172
© 2020 Law Business Research Ltd
Denmark
European Commission has decided that the third country, a territory or one or more specified
sectors within that third country, or the international organisation in question ensures an
adequate level of protection.
In the time of writing, the European Commission has recognised the following countries
as providing adequate protection: Andorra, Argentina, Canada (commercial organisations),
the Faroe Islands, Guernsey, Israel, the Isle of Man, Japan, Jersey, New Zealand, Switzerland
and Uruguay. Furthermore, adequacy talks are ongoing with South Korea.22
The United States was, until recently, limited to the EU–US Privacy Shield adequacy
decision recognised by the European Union for providing adequate protection, but the
adequacy decision was invalided by the CJEU on 16 July 2020.
In the absence of an adequacy decision, a controller or processor may transfer personal
data to a third country or international organisation, if the controller or processor has
provided appropriate safeguards that enforceable data subject rights and effective remedies
are available.
In relation to international data transfers between private companies or organisations
it is common that appropriate safeguards are provided by standard contractual clauses or
binding corporate rules. Binding corporate rules only include international data transfers
between group companies, and application of the rules requires that the competent supervisory
authority (DPA) approves the rules. Furthermore, the work related to adopting binding
corporate rules is extensive and hence exclusively recommended for large international groups.
As opposed to binding corporate rules, standard contractual clauses require no approval from
the DPA and may be used to transfer personal data between group companies as well as
between external companies. The CJEU has recently validated the European Commission’s
standard contractual clauses allowing the transfer of personal data from the EU to importers
established outside the EU.23
Furthermore, the standard contractual clauses may be included in other contractual
material, such as data-processing agreements or trade agreements provided that no changes
are made to the clauses. There are three types of standard contractual clauses, all of which are
available on the European Commission’s website.24
Appropriate safeguards may also be provided between private parties by an approved
code of conduct or an approved certification mechanism, both together with binding and
enforceable commitments of the controller or processor in the third country to apply the
appropriate safeguards. Such certifications and codes of conducts will probably be important
contributions to more transparent access to conduct international data transfers. However,
at the time of writing neither codes of conduct nor certifications have been approved in
Denmark.
Finally, appropriate safeguards may be provided between private parties by ad hoc
contractual clauses between the controller or processor in Denmark and the controller or
processor in the third country, subject to DPA approval.
22 The European Commission’s list of approved countries at any given time is available on the European
Commission’s website: https://ec.europa.eu/info/law/law-topic/data-protection/international-dimension-
data-protection/adequacy-decisions_en.
23 Case C-311/18 Schrems II.
24 https://ec.europa.eu/info/law/law-topic/data-protection/international-dimension-data-protection/
standard-contractual-clauses-scc_en.
173
© 2020 Law Business Research Ltd
Denmark
174
© 2020 Law Business Research Ltd
Denmark
25 Bek nr. 1148 af 09-12-2010 om krav til information og samtykke ved lagring af eller adgang til oplysninger
i slutbrugerens terminaludstyr (The Cookie Order) implementing Directive 2002/58/EC (the ePrivacy
Directive).
175
© 2020 Law Business Research Ltd
Denmark
In addition to the minimum documentation and procedures listed above, the below
documentation and procedures are recommended regarding the processing of personal data
relating to applicants, present and former employees:
a privacy policy regarding the processing of personal data in the recruitment process
including statutory information according to Articles 13–14 of the GDPR;
b procedures for collecting applicant consent for retaining application material for a
specific period after the end of recruitment for future relevant vacancies. Retention
of the application post-recruitment requires consent from the applicant, except if the
purpose for further processing is the defence of a legal claim;
c procedures for erasure of application material after the end of the outlined retention
period, which is most commonly a period of six to 12 months from the end of
recruitment or time of receipt of unsolicited applications;
d internal privacy policy regarding the processing of HR-related personal information
including statutory information pursuant to Articles 13–14 of the GDPR;
e internal guidelines and procedures regarding surveillance, for example, GPS tracking,
video monitoring, website logging, mobile device tracking etc.;
f employee consent to process photographs or videos of employees at the company
website, social media relating to employees’ contact information at the company
website and to marketing material, posts, brochures etc.;
g procedures for closing (and erasing) employee email accounts as soon as possible after
the end of employment as discussed in Section III.iv; and
h procedures for erasure of the employee’s personal file after expiry of the outlined
retention period, typically five years after the end of employment based on DPA case
law and the limitation period of five years as set out in the Danish Limitation Act
regarding claims arising from an employment relationship.
In addition to the minimum documentation and procedures listed above, the following
documentation and procedures are recommended regarding the processing of personal data
relating to private costumers:
a procedures for collecting consent to approach anyone by means of electronic mail, an
automated calling system or fax for the purpose of direct marketing26 and consent to
approach consumers by telephone for the purpose of direct marketing;27
b internal guidelines and procedures for collecting and processing personal data in CRM
systems;
c procedures and company rules on processing personal data in relation to digital
marketing tools, the use of social media etc. (e.g., in relation to Google Analytics,
26 According to the Danish Marketing Act, Article 10, a trader may not approach anyone by means of
electronic mail, an automated calling system or fax for the purpose of direct marketing unless the party
concerned has given his or her prior consent.
27 According to the Danish Consumer Act, a trader may not approach consumers by means of telephone for
the purpose of direct marketing unless the consumer has given his or her prior consent.
176
© 2020 Law Business Research Ltd
Denmark
28 Lov 2018-11-14, nr. 1284 Retsplejeloven (the Danish Administration of Justice Act).
177
© 2020 Law Business Research Ltd
Denmark
29 The European Parliament and Council Directive 95/46/EC of 24 October 1995 on the protection of
individuals with regard to the processing of personal data and on the free movement of such data.
30 The Clarifying Lawful Overseas Use Of Data Act, 23 March 2018 (The US CLOUD Act).
31 Bek. nr. 462 af 23. maj 2016 om persondatasikkerhed i forbindelse med udbud af offentlige elektroniske
kommunikationstjenester.
32 Datatilsynets årsrapport 2018, p. 10.
33 Datatilsynets årsrapport 2019, p. 11.
178
© 2020 Law Business Research Ltd
Denmark
and the DPA has now announced a number of planned written and physical audits regarding
different business areas and different data protection subjects twice a year. For example,
the DPA plans to audit data processors’ security measures and use of sub-processors and
employers’ surveillance of employees.34 Furthermore, the DPA also perform a number of
audits based on the DPA’s own initiative, complaints etc., but it seems that such audits also
are notified to the controller or processor being audited prior to the audit. The DPA has not
published the number of actual raids or unannounced audits after the GDPR came into
force, but it seems to be quite few if any at all.
According to Article 58 of the GDPR, the DPA also has a number of corrective and
sanctioning powers, including the power to issue warnings about intended processing
operations likely to infringe the Data Protection legislation; to issue reprimands where
processing activities have infringed the Data Protection legislation; to order processing
operations brought into compliance with the GDPR and to impose temporary or definitive
limitations including bans on processing activities.
The Danish legal system does not provide for administrative fines, which means that
the processing activity infringing the Data Protection legislation is reported to the police
by the DPA with an indicated fine, after which the prosecution will build a case against
the defendant. The procedure is subject to the general rules of criminal procedure set out
in the Danish Administration of Justice Act, which governs all aspects of civil and criminal
proceedings. In Denmark, any fine for infringement of the Data Protection legislation is
therefore imposed by the courts of Denmark.
Private companies and persons infringement of the GDPR (and the Data Protection
Act) is subject to fines up to €10 million or in the case of an undertaking, up to 2 per cent
of the total worldwide annual turnover of the preceding financial year, whichever is higher,
regarding among other things infringement of the provisions regarding children’s consent in
relation to information society services (GDPR, Article 8), Data protection by design and by
default (GDPR Article 25) and codes of conduct and certification (GDPR, Articles 41–43).
Private companies and persons infringement of the GDPR (and the Data Protection
Act) is subject to fines up to €20 million or in the case of an undertaking, up to 4 per
cent of the total worldwide annual turnover of the preceding financial year, whichever is
higher, regarding among others infringement of the provisions regarding the basic principles
and legal grounds (GDPR Articles 5–7 and 9), data subject rights (GDPR, Articles 12–22),
international transfer of personal data (GDPR, Articles 44–49) and the Data Protection
Agency’s corrective orders (GDPR, Article 58).
Any infringement of the Data Protection legislation by Danish public authorities and
institutions is subject to a fine of up to 4 per cent of the annual operating grant up to a
maximum of 16 million kroner.
The DPA registered 15,681 cases in 2019, including hearings regarding the drafting of
laws and executive orders of importance for the protection of privacy, investigations, audits,
security breaches and international cases, as opposed to 5,024 registrations in 2017 and
12,205 in 2018.35
Data protection and privacy did not have great importance in Denmark before
25 May 2018, and the most obvious reason for this is without a doubt that infringement of
34 The DPA’s published audit plans for the first half of 2019: https://www.datatilsynet.dk/presse-og-nyheder/
nyhedsarkiv/2019/jan/planlagte-tilsyn-i-foerste-halvaar-af-2019/.
35 The DPA’s annual report for 2019, p. 11.
179
© 2020 Law Business Research Ltd
Denmark
the data protection regulation was subject to none or hardly any sanctions pre-GDPR. This
is emphasised by the fact that the highest fine issued in Denmark prior to 25 May 2018 was
25,000 kroner.
It is safe to say that post-GDPR, data protection has been taken seriously by Danish
companies and public authorities, which is largely as a result of the DPA’s increased activities
as discussed above. In 2019 and 2020, the DPA has issued a series of reprimands, bans
and warnings, and in three cases the DPA has reported a private company to the police
for infringement of the GDPR with indicated fines of 1.5 million, 1.2 million kroner and
1.1 million kroner respectively, all three regarding infringement of Article 5(1)(e) of the
GDPR, because said companies stored personal data for longer periods than necessary for the
purposes for which the data was processed.
180
© 2020 Law Business Research Ltd
Denmark
181
© 2020 Law Business Research Ltd
Denmark
DPA upon request. The documentation should provide evidence of general compliance,
including but not limited to education of employees, policies, retention, risk assessments and
the technical and organisational measures
Furthermore, it is recommended that data handlers implement efficient management
and control procedures to adhere to the deadlines in the GDPR, for example, responding to
personal data breaches within 72 hours or replying to data subject access requests within 30
days.
The main purpose of the strategy is to ensure that Danish citizens, companies and authorities
are able to handle digital risks should they occur.
Denmark ranks 11th in the latest update of the international National Cybersecurity
Index (NCSI), which is a fall from seventh in 2019.36 The lower ranking is primarily due
to the fact that Denmark has not contributed to global cybersecurity recently; however, the
relatively high ranking does show that Denmark is generally regarded as a competent nation
in respect of cybersecurity.
Data breaches
In the case of a personal data breach, the controller shall, without undue delay and where
feasible not later than 72 hours after having become aware of it, notify the personal data
breach to the DPA, unless the personal data breach is unlikely to result in a risk to the
rights and freedoms of natural persons. All data breach notifications should be handed in
electronically via the website virk.dk.37
The DPA receives between 600 and 800 data breach notifications per month from
private and public authorities. It is, however, believed that a number of data breaches are
not reported to the DPA. Seventy per cent of all notifications concern isolated errors, where
personal data are sent to a wrong recipient; however, breaches due to phishing, malware or
hacking are gradually increasing.38
36 https://ncsi.ega.ee/.
37 https://indberet.virk.dk/myndigheder/stat/ERST/Indberetning_af_brud_paa_sikkerhed#tab1.
38 The DPAs quarterly report on personal data breaches: Anmeldelser af brud på persondatasikkerheden,
Fjerede kvartal 2019, February 2020.
182
© 2020 Law Business Research Ltd
Denmark
X OUTLOOK
The GDPR has probably had more effect on Danish society in general, including the Danish
business community and public authorities than any other legislation ever implemented in
Denmark. Most companies still have comprehensive compliance work ahead, and many have
still not commenced their compliance work even though more than two years have now
passed since the GDPR came into force. In the years to come, DPA sanctioning and the
pending criminal cases in Denmark as well as in Europe will form applicable case law and
guidelines, both regarding the sanctioning level and, for example, specific retention periods;
the extent of the legal grounds in the Data Protection legislation and will hopefully answer
many of the unanswered key questions arising from the GDPR.
183
© 2020 Law Business Research Ltd
Chapter 12
ESTONIA
Risto Hübner1
I OVERVIEW
A globally unique feature about Estonia is that in Estonia about 99 per cent of public services
are accessible online. Owing to such high level of digitalisation of the state, Estonia is widely
known as one of the world’s most advanced digital societies or the world’s first digital state,
and therefore often called ‘e-Estonia’.2
Almost all Estonian residents hold a government granted electronic ID (eID),
which enables digital signing that is legally equivalent to a handwritten signature, digital
authentication and file encryption. As an example, there are currently more than 5,000 public
and private services in Estonia where individuals can digitally identify themselves by using
the eID. Furthermore, while the entire population of Estonia is only about 1.3 million, about
20 million digital transactions are made each month with the ID card, it being only one of
the three main carriers of the eID (the other two being mobile-ID and Smart-ID) in Estonia.3
Owing to high level of digitalisation, critical services and personal data being accessible
online, the Estonian government has, over the years, put significant focus and investment in
cybersecurity related initiatives. In fact, many of the Estonian cybersecurity initiatives were
caused by a major cyberattack against Estonia back in 2007 when Estonia became a target of
the largest coordinated and politically motivated cyberattack against a single country.4
The Estonian focus on cybersecurity is also demonstrated by the fact that it was
decided to locate both the NATO Cooperative Cyber Defence Centre of Excellence and
the EU IT Agency in the capital of Estonia, Tallinn. Furthermore, Estonia was elected as a
non-permanent member of the United Nations Security Council in 2020–21 and one of its
main objectives is ensuring cybersecurity. In this respect, the Estonian Ministry of Foreign
Affairs has stated that:
1 Risto Hübner is the managing partner at Estonian law firm Advokaadibüroo Nordx Legal.
2 Overview of e-Estonia, available at https://e-estonia.com/.
3 The 2020 yearbook of the Information System Authority, page 9, available at https://www.ria.ee/sites/
default/files/content-editors/ria_aastaraamat_2020_48lk_eng.pdf.
4 See, for example, ‘Analysis of the 2007 Cyber Attacks against Estonia from the Information Warfare
Perspective’, Rain Ottis, available at https://ccdcoe.org/library/publications/analysis-of-the-2007-cyber-
attacks-against-estonia-from-the-information-warfare-perspective/.
184
© 2020 Law Business Research Ltd
Estonia
We wish to start a cybersecurity discussion among the members of the Security Council with the aim
of raising their awareness of cybersecurity norms and how to apply existing international law in
cyberspace.5
The following sections of this chapter will describe in more detail the relevant legislative
framework, as well as some of the most important and recent developments in the Estonian
privacy, data protection and cybersecurity landscape.
185
© 2020 Law Business Research Ltd
Estonia
of the GDPR.12 According to this result, Estonia was among the five EU Member States with
the lowest level of awareness concerning the GDPR. Furthermore, the same survey revealed
that only 28 per cent of Estonian respondents knew what the GDPR is about.13
As at the time of writing, the level of awareness about the GDPR remains low in
Estonia. For example, privacy lawyers in Estonia are well aware that many companies in
Estonia have not started any data protection compliance activities, and only minimum steps
have been taken towards GDPR compliance. This is often the case even with companies that
are processing special categories of personal data (e.g., biometric data or health data) and
whose data processing poses a high risk to individuals. Not complying with the rules on data
protection is often also seen as a low risk by Estonian entrepreneurs.
In addition to the general lack of awareness about applicable legal requirements, a
reason for data protection being a low priority to many Estonian entrepreneurs is also the lack
of GDPR enforcement – as of July 2020, no fines have been imposed for GDPR violations in
Estonia. Lack of enforcement in Estonia can at least partly be explained by lack of resources
in the Data Protection Inspectorate (DPI),14 the Estonian regulatory authority for data
protection. For example, the Director General of the DPI stated in the DPI’s 2019 annual
report that:
The Estonian data protection authority is practically the only such institution among the members
of the European Data Protection Board that did not receive (and has still not received) additional
resources to cope with the new tasks.15
As regards enforcement, it is also important to note that Estonian legal system currently does
not allow for administrative fines as set out in the GDPR. This is also stated in Recital 151 of
the GDPR, which provides that:
The rules on administrative fines may be applied in such a manner that in … Estonia the fine is
imposed by the supervisory authority in the framework of a misdemeanour procedure, provided that
such an application of the rules in [Estonia] has an equivalent effect to administrative fines imposed
by supervisory authorities.
In particular, under the current system in Estonia, financial penalties can be imposed for
offences that, according to Estonian Penal Code, are divided into misdemeanours and criminal
offences. Liability for GDPR infringements is stipulated in the PDPA, which entered into
force in Estonia on 15 January 2019. The PDPA regulates the protection of natural persons
upon processing of personal data to the extent in which it elaborates and supplements the
provisions contained in the GDPR. According to the PDPA, GDPR infringements are
punishable in Estonia by a fine as misdemeanours.
12 Special Eurobarometer 487a Report, General Data Protection Regulation, table 14, available at https://
ec.europa.eu/commission/presscorner/detail/en/IP_19_2956.
13 id.
14 The Data Protection Inspectorate exercises administrative supervision over compliance with the
requirements provided for in the PDPA, the GDPR and also the PIA. Hence, the Estonian data protection
authority is not only focused on the protection of personal data, but also oversees the compliance with the
requirements of access to information intended for public use.
15 Estonian Data Protection Inspectorate, Annual Report 2019, Summary in English, available at https://
www.aki.ee/sites/default/files/EU/EU/aastast_peadirektori_pilgu_labi_en.pdf.
186
© 2020 Law Business Research Ltd
Estonia
However, although the PDPA also sets forth fines for GDPR violations in amounts that
are equivalent to those set forth in the GDPR, the Penal Code in Estonia provides that the
maximum fine for a legal person who commits a misdemeanour is €400,000. It is therefore
disputable if, under the current system in Estonia, it is even possible to apply the maximum
fines as set forth in the GDPR (i.e., up to €20 million, or in the case of an undertaking, up to
4 per cent of the total worldwide annual turnover of the preceding financial year, whichever
is higher). Furthermore, the current system in Estonia makes it difficult to impose fines for
GDPR infringements. This is due to various procedural requirements (e.g., a short limitation
period) with respect to misdemeanour proceedings.
Owing to such legal obstacles, the Estonian legislator is currently considering various
changes to Estonian national laws. In particular, on 6 May 2020, the Estonian Ministry
of Justice announced16 that administrative fines will be introduced in the Estonian legal
system, and a relevant concept about new administrative fine law was published.17 This new
administrative fine proposal concerns infringements in the areas of data protection, finance
and competition and is expected to become law in the first quarter of 2021.
If adopted as a law, the concept will make it possible to apply fines in Estonia as set
forth in EU law in administrative proceedings. Among the various changes that are expected
with the new administrative fine system, it should be easier in the future to hold legal entities
liable for data protection infringements. For example, in order to hold a legal entity liable
under the current system, it is necessary to establish the guilt of a specific natural person. This
will no longer be the case under the new system, which plans to introduce the principle of
organisational fault.18
Everyone is entitled to inviolability of his or her private and family life. Government agencies, local
authorities, and their officials may not interfere with any person’s private or family life, except in the
cases and pursuant to a procedure provided by law to protect public health, public morality, public
order or the rights and freedoms of others, to prevent a criminal offence, or to apprehend the offender.
Similarly, Section 33 of the Estonian Constitution sets forth that the home is inviolable.
Some other aspects of privacy can also be found in Section 42 (i.e., prohibition to
gather or store information about the beliefs of a citizen of Estonia), Section 43 (i.e., the right
to confidentiality of messages) and Section 44 (i.e., free access to information disseminated
187
© 2020 Law Business Research Ltd
Estonia
for public use). For example, Section 44 includes the right of a citizen to access information
about himself or herself held by government agencies and local authorities and in government
and local authority archives. Unless otherwise provided by law, the same right is applicable
with respect to citizens of foreign states and stateless persons in Estonia.
As regards personal data protection, the applicable law in Estonia is the PDPA. As
stated above, the PDPA applies in Estonia in addition to the GDPR and contains certain
supplementary provisions. In addition, the PDPA regulates the protection of natural persons
upon processing of personal data by law enforcement authorities in the prevention, detection
and proceedings of offences and execution of punishments.
The adoption of the PDPA in Estonia was significantly delayed because the Estonian
parliament was not able to reach an agreement on certain provisions in the first version of
the draft PDPA. In particular, the law was hotly debated in Estonia in relation to processing
of personal data for journalistic purposes, which was one of the specific grounds for personal
data processing introduced by the PDPA. This provision provides that personal data may be
processed and disclosed in the media for journalistic purposes without the consent of the data
subject (and in particular disclosed in the media) if there is public interest and is, therefore,
in accordance with the principles of journalism ethics. Such disclosure of personal data must
not cause excessive damage to the rights of any data subjects.
Among other specific provisions that were introduced by the PDPA are the processing
of personal data after the death of a data subject; processing of personal data in connection
with violation of obligation; and processing of personal data in public places. In particular,
the legislator in Estonia decided that the consent of a data subject shall remain valid during
the lifetime of the data subject and for 10 years after the death of the data subject, unless the
data subject decided otherwise. If the data subject died as a minor, his or her consent shall be
valid for the term of 20 years after the death of the data subject.
As regards the processing of personal data in connection with violation of obligation,
a special rule was introduced that provides that transmission of personal data related to
violation of any obligation to third parties and processing of the transmitted data by any
third party is permitted for the purpose of assessment of the creditworthiness of the data
subject or for any other similar purposes, and only if the controller or processor has verified
the accuracy of the data transmitted and the legal basis for transmission of personal data and
registered the data transmission.
As regards the processing of personal data in public places, the PDPA provides that,
unless otherwise provided by law, upon the creation in public places of audio or visual
recordings intended for future disclosure, the consent of data subjects shall be substituted by
an obligation to notify the data subjects in a manner that allows the persons to understand
the fact of the recording of the audio or visual images and gives the persons an opportunity
to prevent the recording of their person if they so wish. The notification obligation does not
apply in to public events, recording of which for the purposes of disclosure may be reasonably
presumed.
Finally, the Estonian legislator also decided to lower the age limit for the offering of
information society services to a child. According to the GDPR, in relation to the offer of
information society services directly to a child, the processing of the personal data of a child
shall be lawful where the child is at least 16 years old. Where the child is below the age of
16 years, such processing shall be lawful only if and to the extent that consent is given or
188
© 2020 Law Business Research Ltd
Estonia
authorised by the holder of parental responsibility over the child. Member States may provide
by law for a lower age for those purposes provided that such lower age is not below 13 years.
Accordingly, the Estonian legislator chose to lower the age limit to 13 years.
As stated above, the PDPA also stipulates the liability for GDPR infringements. In
addition, the Estonian Penal Code19 provides for a few special grounds where criminal
punishments can be imposed with respect to mishandling of personal data. For example,
Section 157 of the Penal Code makes punishable disclosure of personal data obtained in
professional activities by a person who is required by law not to disclose such information.
Also, Section 157(1) of the Penal Code provides for imprisonment if there has been disclosure
of special categories of personal data for personal gain or if significant damage was caused to
another person. Furthermore, Section 157(2) of the Penal Code provides that the illegal use
of another person’s identity is punishable by up to three years’ imprisonment.
Also important in Estonia is the PIA, which ensures that every person has the
opportunity to access information intended for public use, but at the same time includes
restrictions regarding access to information containing personal data.
Some specific but important regulation on data protection is also found in the ECA,
which inter alia transposes into Estonian law the requirements arising from the e-Privacy
Directive.20 For instance, the ECA sets forth a general obligation for communications
undertakings to maintain the confidentiality of all information that becomes known in the
process of provision of communications services and that concerns subscribers as well as other
persons who have not entered into a contract for the provision of communications services
but who use communications services with the consent of a subscriber.
The ECA also includes a specific obligation of communications undertakings to notify
to the DPI at the earliest opportunity cases of personal data breach that have taken place
in connection with the provision of communications services. Other specific rules that are
related to personal data under the ECA include, for example, the use of electronic contact
details for direct marketing, processing of location data of subscribers and roaming service
users.
19 RT I, 10.07.2020, 18.
20 Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the
processing of personal data and the protection of privacy in the electronic communications sector.
21 RT I, 09.07.2020, 4.
189
© 2020 Law Business Research Ltd
Estonia
22 RT I, 10.07.2020, 20.
190
© 2020 Law Business Research Ltd
Estonia
v Technological innovation
As one of the world’s most advanced digital societies, Estonia is constantly innovating with
the use of new technologies. Since Estonia is highly digitalised, such innovation usually also
concerns the processing of personal data. One of the most recent of such innovations is a
consent service that is currently being developed by the state.25
The idea behind the consent service is that since the state has lots of data about
individuals (e.g., medical history) in various databases, it is possible to open up such data
for the development of new services provided that individual gives his or her consent. This
approach is unique as it is currently not known that such service has been implemented
anywhere else in the world – where individual could give his or her digital consent to a third
party (e.g., a private company) so that the third party could gain access to the personal data
of the individual held in state databases.
Estonia is currently performing a legal analysis of the consent service and the prototype
of the consent service is already being developed by the state.
191
© 2020 Law Business Research Ltd
Estonia
As regards data localisation, Estonia strongly opposes it and is one of the major
proponents in the EU about free movement of data. Estonia also considered free movement
of data as one of the most important priorities for Estonia during the Estonian Presidency of
the EU from 1 July to 31 December 2017.26
26 See, for example, ‘Estonia’s EU presidency: digital Europe and the free movement of data’, available at
https://e-estonia.com/estonias-eu-presidency-digital-europe-and-the-free-movement-of-data/.
192
© 2020 Law Business Research Ltd
Estonia
According to the 2020 yearbook of the ISA,28 the CERT-EE received a total of 24,369
notifications of cyber-incidents in Estonia in 2019, while the number of such incidents in
2018 was 17,440 and in 2017 only 10,649 incidents were recorded. For 2019, this means an
average of 67 notifications per day and three notifications per hour.29
27 Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning
measures for a high common level of security of network and information systems across the Union.
28 Supra footnote 3, page 30.
29 id.
193
© 2020 Law Business Research Ltd
Estonia
As regards personal data breaches, during 2019 a total of only 115 notifications
of a breach were reported to the DPI.30 One of the most discussed breaches concerned a
local bike-sharing initiative at an Estonian local municipality. In this case, the Tartu City
government notified the DPI of a breach in which a database with the information of about
20,000 users of the bike-sharing system was publicly accessible on the internet. The database
revealed information about the users, including their names, email addresses, phone numbers,
user IDs. Furthermore, it was possible to access data about the routes taken by the users, as
well as the time of using the bikes. The DPI decided that since the security vulnerability was
quickly eliminated, it would only issue a written reprimand in this matter.31
Another personal data breach that was also widely discussed concerned an Estonian
online store, Charlot. In particular, it was revealed in July 2019 that the database of such
online store containing personal data of about 14,000 Estonians was publicly accessible on the
internet. When the breach was discovered, the manager of the company initially announced
that no breach had occurred, but later admitted the breach. As at the time of writing, no
detailed information is available about the final outcome of this incident, including what
specific measures were taken by the DPI.32
X OUTLOOK
Although Estonia has remained a country with no fines for GDPR infringements, it is likely
that this situation will change in the future, especially as Estonia is planning to introduce an
administrative fine system in the first quarter of 2021.
In the meantime, it is worth noting that the Director General of the DPI has stated
about the priorities for 2020 that:
The one common theme and keyword of 2020 will certainly be monitoring equipment, especially
video monitoring equipment. The European Data Protection Board also completed a corresponding
guide last year, the adoption of which in Estonia is one of our goals in 2020.33
We have marked the processing of data in research carried out via IT resources and the use of
information systems and environments in institutions engaged in the area of medicine and education
as our most important keywords for 2020.34
Hence, even though there is so far no GDPR enforcement in Estonia, companies should pay
attention to the priorities of the DPI and also make sure that their processing activities are in
compliance with the GDPR.
30 Estonian Data Protection Inspectorate, Annual Report 2019, available in Estonian at https://aastaraamat.
aki.ee/.
31 id.
32 ‘Toimus Eesti ajaloo suurim e-poe andemeleke: ripakil olid 14 000 eestlase isikuandmed’, 03.07.2019,
available in Estonian at https://digi.geenius.ee/rubriik/uudis/toimus-eesti-ajaloo-suurim-e-poe-andmeleke-
ripakil-olid-14-000-eestlase-isikuandmed/.
33 Supra footnote 15.
34 id.
194
© 2020 Law Business Research Ltd
Chapter 13
GERMANY
I OVERVIEW
Germany has been and still is the forerunner on privacy and data protection law. In 1970,
the German state of Hesse enacted the world’s first Data Protection Act. The other states
soon followed, and on 1 January 1978, the first German Federal Data Protection Act
(BDSG) entered into force. These acts established basic principles of data protection, such
as the requirement of a legal permission or the data subject’s consent for any processing of
personal data. In 1983, the German Federal Constitutional Court held that the individual
even has a constitutional right to ‘informational self-determination’. The background of this
groundbreaking verdict was a census planned for the year 1983, which essentially focused on
the census of the entire German population by the means of electronic data processing. The
people of Germany were anything but pleased with this idea and – as a consequence – more
than 1,600 complaints were filed at the Federal Constitutional Court against the census
law that had been specifically adopted for the census by the German parliament. Finally, in
December 1983, the German Federal Constitutional Court declared certain provisions of the
Census Act to be unconstitutional.
Over time, the German Federal Data Protection Act was subsequently amended to meet
the requirements of a society in which data processing has grown more important. Especially,
digitalisation raised a lot of questions, which needed to be handled. Keeping this in mind,
among other things the legislator passed the German Telemedia Act (TMA) in 2007, which
stipulated the duty to safeguard data protection during the operation of telemedia services.
However, since data protection law and telemedia law got increasingly intersected by the
internet, it was planned by the European legislator that the ePrivacy Regulation replacing
the TMA would also come into force at the same time as the General Data Protection
Regulation (GDPR). Whereas the GDPR has been applicable from 25 May 2018, the
ePrivacy Regulation is still subject to negotiations at the European level and will probably be
applicable in 2023. For this reason, the following text provides an overview of the current
legal situation in Germany, presenting the changes and the challenges of a new era of data
protection in connection with digitalisation.
1 Olga Stepanova is an associate and Julius Feldmann is a scientific researcher at Winheller Attorneys At Law
& Tax Advisors.
195
© 2020 Law Business Research Ltd
Germany
III BASICS
Although the GDPR maintains the main concepts of data protection as we knew them
before, or amends details of them (e.g., data processing is still prohibited if not explicitly
permitted by the data subject or a law, the legal bases for the transfer of personal data into
non-EU countries or the obligation to designate a data protection officer), the new rules also
bring some important changes. Small companies and non-profit organisations, in particular,
are unsure about how to implement the GDPR, even after the regulation has been applicable
for several months.
First and foremost, the GDPR extended its territorial scope, which means that
non-European companies may also fall within its scope, making it the first worldwide data
protection law due to globalisation. It applies to (1) all companies worldwide that target
European markets and in this context process the personal data of European Union citizens
(irrespective of where the processing takes place) and (2) those that process the data of
European citizens in the context of their European establishments.
2 https://www.datenschutzkonferenz-online.de/media/ah/20191016_bu%C3%9Fgeldkonzept.pdf.
196
© 2020 Law Business Research Ltd
Germany
Since the GDPR has tightened the requirements for obtaining valid consent to process
personal information, in practice, the relevance of the consent as legal basis has decreased
and shifted to the legitimate interest of the data controller. Companies will therefore have to
assess their processes to make sure they process personal data lawfully, and to review whether
it is advisable to refrain from seeking consent but to switch to legal justification with fewer
prerequisites and no possibility of being revoked at any time.
As a consequence, upon request of DPAs, companies have to provide prove that they
fulfil their obligations under the GDPR. The authorities do not need to investigate and prove
the infringements by themselves anymore. The GDPR also introduced mandatory privacy
impact assessments (PIAs). It requires data controllers to conduct PIAs where privacy breach
risks are high in order to minimise risks to data subjects. This means that before organisations
can begin projects involving special categories of personal data, such as health, they will have
to conduct a PIA and work with the data protection offices to ensure they are in compliance
with data protection laws as projects progress. For minimizing the uncertainty whether a PIA
should be performed the German DPAs issued ‘blacklists’ that contain processing activities
that always require a PIA.3
Additionally, the GDPR expanded liability beyond the data controllers. In the past,
only data controllers were considered responsible for data processing activities, but the GDPR
extended liability to all organisations that process personal data. The GDPR also covers any
organisation that provides data processing services to the data controller, which means that
even organisations that are purely service providers that work with personal data will need to
comply with rules such as data minimisation.
To sum it up, the increase of obligations and fines are also likely to force previously idle
organisations to rethink their positions.
IV REGULATORY FRAMEWORK
i Privacy and data protection legislation and standards
The GDPR defines personal data as ‘any information relating to an identified or identifiable
natural person’. This definition applies to all personal data handled by electronic information
and communication (telemedia) service providers.
However, all of these data are now subject to the GDPR, as the German Data
Protection Conference presented a paper in March 2019, which states that Article 95 GDPR
has to be interpreted in a way that the provisions of TMA governing the data protection shall
not be applicable anymore. Following this opinion, there is no privileged handling for data
collection via telemedia anymore, so the controllers must obey the strict rules prescribed by
the GDPR from now on. That is why a lot of websites needed to amend not only their privacy
policy, but also the cookie settings, so that i.e. for analysis cookies a consent under the strict
rules of the GDPR needs to be obtained.
3 https://datenschutz.hessen.de/sites/datenschutz.hessen.de/files/HBDI_Verarbeitungsvorg%C3%A4nge%20
-Muss-Liste%20Berlin%20%28002%29.pdf.
197
© 2020 Law Business Research Ltd
Germany
198
© 2020 Law Business Research Ltd
Germany
identifier for a server-based session, shopping cart contents or anything else that may be
accomplished through the storage of text data. The cookie is considered to be personal data
if it contains data that allow the controller to identify the data subject.
However, before the GDPR entered into force, and as long as the relevant part of
TMA was still applicable, cookies could have been placed in Germany as long as the user had
the option to object (opt out). Now, there is no such privileged treatment anymore as the
general requirements regarding a lawful data processing are applicable for cookies too. This
legal situation was further clarified by the European Court of Justice (ECJ) after the Federal
Court of Germany asked for a preliminary ruling in a case known as Planet49.6 The ECJ
decided that no valid consent was obtained by the website provider because the respective
checkbox was pre-ticked. Not even if the data subject can remove the pre-ticked checkbox
can consent be deemed valid. Rather, the consent must be given actively (opt-in). This has
also brought the ECJ closer to the question of whether the use of cookies must necessarily
be based on the consent of the data subject (Article 6 Paragraph 1(a) GDPR). The ECJ ruled
that consent is not required for necessary cookies. Rather, the placement of such cookies can
be based on the legitimate interest of the controller (Article 6 Paragraph 1(f ) GDPR). This
was already the current practice for necessary cookies, at least on most websites. In contrast to
that, controllers need to obtain consent for placing non-necessary cookies on users’ devices,
regardless of whether personal data is involved. The main point is that controllers need to
distinguish between consent in terms of the TMA with its focus on the integrity of the
user’s device and consent in terms of the GDPR, which concerns the lawful processing of
personal data. This question is actually not directly related to the GDPR but was caused by
the insufficient implementation of updated ePrivacy Directive (2002/58/EC)7 in the TMA.
In the end, the preliminary ruling was taken over by the Federal Court of Germany by
a decision dated 28 May 2020.8 Still, it remains unclear whether a technically non-necessary
cookie is always non-necessary, for example, it is debatable whether cookies that only measure
the reach of a website require consent. In any case, according to the German Data Protection
Conference, prior consent is required for the use of tracking mechanisms, which monitor the
behaviour of data subjects on the internet and create user profiles. Thus, an informed consent
within the meaning of the GDPR is required in the form of a declaration or other clearly
confirmatory action taken prior to data processing (i.e., before cookies are placed on the
user’s device).9 For example, the legitimate interest or the performance of a contract cannot
constitute a valid legal basis for the use of Google Analytics.10
The reason for this discussion and the legal uncertainty is not only the insufficient
implementation of the updated ePrivacy Directive, but especially the fact that the ePrivacy
Regulation did not enter into force on time and has not even been passed. So far, it may be
advisable to fulfil all the requirements of the GDPR, which means that consent has to be
sought before tracking the user.
6 http://curia.europa.eu/juris/liste.jsf?num=C-673/17.
7 https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:02002L0058-20091219.
8 https://www.bundesgerichtshof.de/SharedDocs/Pressemitteilungen/DE/2020/2020067.html (currently,
only press release available).
9 DSK, Orientierungshilfe der Aufsichtsbehörden für Anbieter von Telemedien, https://www.
datenschutzkonferenz-online.de/media/oh/20190405_oh_tmg.pdf.
10 https://www.datenschutzkonferenz-online.de/media/dskb/20200526_beschluss_hinweise_zum_einsatz_
von_google_analytics.pdf.
199
© 2020 Law Business Research Ltd
Germany
Social media
Social media becomes more popular each day as the number of users grows. The same applies
to the opportunities and smart solutions offered by using these media. Most social media
platforms are free of charge. Users pay with their personal data, even though many of them
are not even aware of this fact. That is why the European legislator stipulated in the principles
of processing in Article 5 GDPR that processing has to be transparent and the controller shall
be responsible for obeying this principle.
An important part of the transparency principle is providing understandable
information about the division of roles when involved parties are processing personal data, as
the ECJ on Facebook fanpages has shown (ECJ, 5 June 2018 – C-210/16). In this case the
ECJ stated that the fanpage operator and Facebook are acting as joint controllers. Although
the main responsibility for data collection lies with Facebook, it is theoretically possible for
the page operators to place cookies on the visitor’s device, even if the visitor does not have a
Facebook account. According to the ECJ, this in addition to the fact that fanpage operators
receive the visitor’s user data (even if anonymised) and can use these for parameterisation
lead to joint responsibility of the site operators. This is particularly because of the fact that
the collection of this data cannot (yet) be deactivated. Until Facebook grants this option to
its users, the common fanpage operator remains jointly responsible for the collection of user
data. Even the ECJ takes account of the significant imbalance in the use of data between
Facebook and the operators of the respective fan page insofar as the degree of responsibility
can be assessed differently in individual cases; however, in the court’s opinion, Facebook and
the fanpage operators are still joint controllers.
Facebook reacted and published a Page Insights Controller Addendum to fulfil the
requirements established by the ECJ regarding joint controllership. Nevertheless, the German
Data Protection Conference found these adjustments insufficient and therefore in violation
of the GDPR. In particular, Facebook grants itself the sole decision-making power in respect
of the processing of insights data and this is in conflict with the joint controllership pursuant
to Article 26 GDPR. Furthermore, Facebook does not describe the processing activities
regarding the fanpage in a transparent way.11
While the ECJ confirmed its findings in respect of the joint controllership in the
Jehovah’s Witnesses decision (ECJ, 10 July 2018 – C-25/17), they will be relevant in another
dispute before the ECJ involving Facebook. The Düsseldorf Higher Regional Court has asked
the ECJ, inter alia, whether a German online retailer that includes the ‘Facebook Like’ button
on its website is a joint controller alongside Facebook. The Advocate General confirmed
joint controllership and set a low threshold for assuming joint controllership (Opinion of
Advocate General Bobek, 19 December 2018 – C-40/17).
However, this decision and the German Federal Court’s decision regarding the
obligation of Facebook to provide heirs with access to the digital postbox of the decedent
(BGH, 12 July 2018 – III ZR 183/17), clearly show that social media is now being regulated
more strictly.
11 DSK, Positionierung zur Verantwortlichkeit und Rechenschaftspflicht bei Facebook Fanpages, https://
www.datenschutzkonferenz-online.de/media/dskb/20190405_positionierung_facebook_fanpages.pdf.
200
© 2020 Law Business Research Ltd
Germany
12 http://curia.europa.eu/juris/liste.jsf?language=de&num=C-311/18.
201
© 2020 Law Business Research Ltd
Germany
c the transfer is necessary for the conclusion or performance of a contract that has been
or is to be concluded in the interest of the data subject between the controller and a
third party;
d the transfer is necessary for important reasons of public interest;
e the transfer is necessary or legally required on important public interest grounds, or for
the establishment, exercise or defence of legal claims;
f the transfer is necessary to protect the vital interests of the data subject; or
g the transfer is made from a register that is intended to provide information to the
public, and that is open to consultation either by the public in general or by any person
who can demonstrate a legitimate interest, to the extent that the conditions laid down
in law are fulfilled in the particular case.
The most relevant grounds are those given in (b), namely if the transfer is necessary to perform
a contract between the data subject and the controller. This includes international monetary
transactions and distance-selling contracts as well as employment contracts. All transfers in
this respect have to be essential for the purposes of the contract.
Any consent within the meaning of (a) will only be valid if the data subject was
informed about the risks that are involved in data transfers to countries that do not have an
adequate standard of data protection. In addition, the consent has to be based on the data
subject’s free will; this may be difficult if employee data are involved.
If none of the aforementioned exceptions applies, the transfer of personal data
to third countries with an inadequate level of data protection is nonetheless possible if,
among other requirements, the competent supervisory authority authorises the transfer.
Such an authorisation will only be granted when the companies involved adduce adequate
safeguarding measures to compensate for a generally inadequate standard of data protection,
see Article 49(1)2 GDPR. However, the primary safeguarding measures are the use of
standard contractual clauses issued by the European Commission and the establishment of
binding corporate rules.
iii Brexit
The free flow of data between the EU Member States and the United Kingdom (UK) depends
on whether the UK and the EU can reach an agreement covering data protection before the
UK leaves the EU or whether the UK, after Brexit, has created a legal situation that meets
European data protection requirements and is thus able to be seen as adequate. The current
Withdrawal Agreement13 between EU Member States and the UK has created the basis for a
‘soft Brexit’. This will not initially change anything for companies. According to Article 127
Paragraph 1 in conjunction with Article 126 of the Agreement, Union law continues to apply
for a transitional period until 31 December 2020, which includes the GDPR. Thus, the UK
will not be qualified as a third country for the time being. However, it remains questionable
how the data transfer can be performed after the transition period expires. Depending on the
negotiations in 2021, the UK could be treated as a third country equivalent to, for example,
India or China from a data protection perspective. In that case, personal data could only
be transferred to UK once companies have implemented the above-mentioned safeguards,
namely standard contractual clauses or binding company rules, if no derogation pursuant
13 https://ec.europa.eu/info/european-union-and-united-kingdom-forging-new-partnership/
eu-uk-withdrawal-agreement_en.
202
© 2020 Law Business Research Ltd
Germany
to Article 49 GDPR is applicable. In the end, it remains a purely political decision to attest
that the UK has an adequate level of data protection, because it is probable that the UK will
stick with GDPR requirements as this law was applicable for a few years and companies have
already implemented it.
203
© 2020 Law Business Research Ltd
Germany
204
© 2020 Law Business Research Ltd
Germany
notified by the controller to the supervising authority within 72 hours. Therefore, controllers
have to implement an effective data protection management system to be able to meet the
deadline. Otherwise, a violation of this provision alone can be punished with a fine of up to
€10 million or in the case of an undertaking, up to 2 per cent of the total worldwide annual
turnover of the preceding financial year.
VIII OUTLOOK
Even two years after its introduction, the GDPR is still not fully understood and can often
only be interpreted teleologically. There are 18 data protection authorities in Germany,
which follow slightly different interpretations of the GDPR. This makes consultation in
data protection matters even more difficult. Therefore, it will be interesting to see how the
new laws are interpreted by German and European courts to bring consistency and legal
certainty. In a recent report, the European Commission highlighted the successes of the
GDPR, because it is open to new technologies and has proven its worth during the covid-19
pandemic. In the future, it will also constitute the basis for the European Artificial Intelligence
and Data Strategy. The European Commission still sees problems with more efficient and
coherent cooperation between national authorities. It should therefore remain exciting to see
whether this will be more successful in the future. We are also looking forward to watching
the continuing impact of the GDPR on companies, especially on social media operators,
and how European and national legislation and case law will further develop European data
protection standards.
205
© 2020 Law Business Research Ltd
Chapter 14
HONG KONG
I OVERVIEW
The Personal Data (Privacy) Ordinance (PDPO) establishes Hong Kong’s data protection
and privacy legal framework. All organisations that collect, hold, process or use personal data
(data users) must comply with the PDPO, and in particular the six data protection principles
(DPPs) in Schedule 1 of the PDPO, which are the foundation upon which the PDPO is
based. The Office of the Privacy Commissioner for Personal Data (PCPD), an independent
statutory body, was established to oversee the enforcement of the PDPO.
Hong Kong was the first Asian jurisdiction to enact comprehensive personal data
privacy legislation and to establish an independent privacy regulator. Unlike the law in several
other jurisdictions in the region, the law in Hong Kong covers both the private and public
sectors. Hong Kong issued significant new amendments to the PDPO in 2012 with a key
focus on direct marketing regulation and enforcement with respect to the use of personal
data. Further amendments to the PDPO were proposed in January 2020.
Despite Hong Kong’s pioneering role in data privacy legislation, the PCPD’s level of
activity with respect to regulatory guidance and enforcement has been relatively flat in the past
year. In addition, Hong Kong has not introduced stand-alone cybercrime or cybersecurity
legislation as other Asian countries have done. Certain sectoral agencies, notably Hong Kong’s
Securities and Futures Commission (SFC), have continued to press forward on cybersecurity
regulation for specific industries.
This chapter discusses recent data privacy and cybersecurity developments in Hong
Kong from July 2019 to June 2020. It will also discuss the current data privacy regulatory
framework in Hong Kong, and in particular, the six DPPs and their implications for
organisations, as well as specific data privacy issues such as direct marketing, issues relating to
technological innovation, international data transfer, cybersecurity and data breaches.
206
© 2020 Law Business Research Ltd
Hong Kong
Guidelines: Monitoring and Personal Data Privacy at Work,3 the June 2016 guidance note on
Proper Handling of Data Access Request and Charging of Data Access Request Fee by Data
Users,4 the January 2019 Revised Guidance on Data Breach Handling and the Giving of
Breach Notifications,5 and the March 2019 Revised Privacy Management Programme: A Best
Practice Guide.6 None of these publications are legally binding, although failure to follow the
codes of practice may give rise to negative presumptions in any enforcement proceedings.
From mid-2019 to mid-2020, the PCPD revised the Guidance on Election Activities
for Candidates, Government Departments, Public Opinion Research, Organisations and
Members of the Public7 and released a guidance note for small and medium enterprises
entitled From Principles to Practice – SME Personal Data Protection Toolkit.8
In its latest annual report, which covered the reporting year 2018–2019,9 the PCPD
stated that it received 1,878 complaints, representing a 16 per cent increase from the previous
reporting year where 1,619 complaints were received. Most of the complaints were made
against private sector organisations, with financial, property management, and transportation
companies leading the way. The most common complaints related to the improper use and
disclosure of personal data and the improper collection of personal data, which accounted
for 31 per cent and 29 per cent of the complaints respectively. The number of ICT-related
complaints more than doubled as compared to the previous reporting year. The number
of direct marketing complaints remained relatively flat (175 complaints in 2018–2019,
compared to 183 complaints in 2017–2018).10 Further, the PCPD received 113 data breach
notifications in 2018–2019.
With respect to enforcement actions in 2018–2019, of the 1,878 complaints received,
878 complaints were accepted by the PCPD for further handling. Ninety-eight complaints
were investigated. Six were referred to the Hong Kong police for criminal investigation (down
from 16 in the previous reporting year), all of which involved direct marketing violations.
The only case prosecuted during the reporting year involved Hutchison Telecommunications,
which pleaded guilty to two direct marketing-related charges under the PDPO, resulting in
a total fine of HK$20,000.11 Two enforcement notices were issued: one on Cathay Pacific
Airways12 and the other on Hong Kong Broadband Network Limited.13
The PCPD does not systematically publish decisions or reports based on the outcome
of its investigations. In 2019, the PCPD published only four investigation reports, regarding:
3 www.pcpd.org.hk/english/data_privacy_law/code_of_practices/files/Monitoring_and_Personal_Data_
Privacy_At_Work_revis_Eng.pdf.
4 www.pcpd.org.hk/english/resources_centre/publications/files/DAR_e.pdf.
5 www.pcpd.org.hk//english/resources_centre/publications/files/DataBreachHandling2015_e.pdf.
6 www.pcpd.org.hk//english/resources_centre/publications/files/PMP_guide_e.pdf.
7 www.pcpd.org.hk/tc_chi/media/media_statements/press_20200618.html (media statement available in
Chinese only).
8 www.pcpd.org.hk/tc_chi/resources_centre/publications/books/files/sme_toolkit.pdf
9 The reporting year starts on 1 April 2018 and ends on 31 March 2019.
10 www.pcpd.org.hk/english/resources_centre/publications/annual_report/files/anreport19_full.pdf.
11 www.pcpd.org.hk/english/news_events/media_statements/press_20180822.html.
12 www.pcpd.org.hk/english/media/media_statements/press_20190606.html
13 www.pcpd.org.hk/english/media/media_statements/press_20190221.html.
207
© 2020 Law Business Research Ltd
Hong Kong
Additionally, the PCPD published a compliance check report in April 2019 regarding the
personal data collection in shopping mall membership programmes and online promotion
activities, recommending the practice of the minimum collection of personal data.
In June 2019, the PCPD commenced a compliance check of the Hong Kong Hospital
Authority over its notification of a suspected data leak of its accident and emergency
information system (the A&E Incident).18 The compliance check is in progress at the time
of writing.
14 www.pcpd.org.hk/english/enforcement/commissioners_findings/investigation_reports/files/PCPD_
Investigation_Report_R19_15281_Eng.pdf.
15 www.pcpd.org.hk/english/enforcement/commissioners_findings/investigation_reports/files/
PCPD_Investigation_Report_R19-5759_Eng.pdf.
16 www.pcpd.org.hk/english/enforcement/commissioners_findings/investigation_reports/files/PCPD_
Investigation_Report_R19_5120_Eng.pdf.
17 www.pcpd.org.hk/english/enforcement/commissioners_findings/files/PCPD_Investigation_Report_
R19_17497_Eng.pdf.
18 www.pcpd.org.hk/english/media/media_statements/press_20190617.html.
19 www.police.gov.hk/ppp_en/04_crime_matters/tcd/legislation.html.
20 www.infosec.gov.hk/english/ordinances/corresponding.html.
21 www.infosec.gov.hk/en/knowledge-centre/computer-related-crime.
22 www.hkma.gov.hk/media/eng/doc/key-information/guidelines-and-circular/2016/20161221e1.pdf.
23 www.hkma.gov.hk/media/eng/doc/key-information/guidelines-and-circular/2016/20161219e1.pdf.
208
© 2020 Law Business Research Ltd
Hong Kong
the Guidelines for Reducing and Mitigating Hacking Risks Associated with Internet Trading
(the Guidelines),24 and issued two circulars to licensed corporations engaged in internet
trading, one on good industry practices for IT risk management and cybersecurity;25 the
other on the implementation of the Guidelines.26 In May 2018, the SFC issued a circular
to intermediaries on receiving client orders through instant messaging.27 In January 2019,
the HKMA issued the Update on Enhanced Competency Framework on Cybersecurity.28 In
June 2019, the Hong Kong Insurance Authority published the Guideline on Cybersecurity
(GL20),29 which specifies the minimum cybersecurity standards that all authorised insurers
(except for captive insurers and marine mutual insurers) must observe. GL20 took effect
from 1 January 2020. In the healthcare sector, the Commissioner for the Electronic Health
Record issued a Code of Practice for Using Electronic Health Record for Healthcare (effective
10 October 2019), which provides good practice and recommendations in the use of the
Electronic Health Record Sharing System,30 a government-funded information infrastructure
that enables healthcare providers to view and share electronic health records of patients. In
the public sector, the Office of the Government Chief Information Officer has also published
cybersecurity guidelines for government bureaux, departments and agencies.31
24 www.sfc.hk/web/EN/assets/components/codes/files-current/web/guidelines/guidelines-for-reducing-and-
mitigating-hacking-risks-associated-with-internet-trading/guidelines-for-reducing-and-mitigating-
hacking-risks-associated-with-internet-trading.pdf.
25 www.sfc.hk/edistributionWeb/gateway/EN/circular/intermediaries/supervision/doc?refNo=17EC74.
26 www.sfc.hk/edistributionWeb/gateway/EN/circular/intermediaries/supervision/doc?refNo=17EC72.
27 www.sfc.hk/edistributionWeb/gateway/EN/circular/intermediaries/supervision/doc?refNo=18EC30.
28 www.hkma.gov.hk/media/eng/doc/key-information/guidelines-and-circular/2019/20190110e1.pdf.
29 www.ia.org.hk/en/legislative_framework/files/Guideline_on_Cybersecurity_English.pdf
30 www.ehealth.gov.hk/filemanager/content/pdf/en/hcp/hcp_code_of_practice.pdf.
31 www.ogcio.gov.hk/en/our_work/information_cyber_security/government/.
32 Doxxing refers to an internet-based practice of researching and broadcasting private or identifiable
information about an individual or organisation.
33 www.legco.gov.hk/yr19-20/english/panels/ca/papers/ca20200120cb2-512-3-e.pdf.
209
© 2020 Law Business Research Ltd
Hong Kong
64 of the PDPO, which prohibits the disclosure of personal data obtained from a data user
without the data user’s consent.34 The first prosecution of such cases was lodged by the Hong
Kong police on 25 September 2020.35
34 It is an offence under Section 64(1) of the PDPO to disclose any personal data of a data subject that was
obtained from a data user without the data user’s consent, with an intent to obtain gain in money or
other property, whether for the benefit of the person or another person, or to cause loss in money or other
property to the data subject. Under Section 64(2) of the PDPO, it is an offence to disclose any personal
data of a subject that was obtained from a data user without the data user’s consent and the disclosure
causes psychological harm to the data subject.
35 www.pcpd.org.hk/english/media/media_statements/press_20190930.html.
210
© 2020 Law Business Research Ltd
Hong Kong
c whether it is obligatory to provide the data, and if so, the consequences of failing to
supply the data; and
d the right to request access to and request the correction of the data, and the contact
details of the individual who is to handle such requests.
211
© 2020 Law Business Research Ltd
Hong Kong
212
© 2020 Law Business Research Ltd
Hong Kong
technical controls recommended by the guidance note include encryption of the personal
data stored on the personal storage devices, and adopting systems that detect and block the
saving of sensitive information to external storage devices.
213
© 2020 Law Business Research Ltd
Hong Kong
ii Direct marketing
Hong Kong’s regulation of direct marketing deserves special attention from organisations
engaging in such activities. Unlike with violations of the DPPs, violations of the PDPO’s
direct marketing provisions are criminal offences, punishable by fines and by imprisonment.
The PCPD has demonstrated a willingness to bring enforcement actions in this area and to
refer particularly egregious violations for criminal prosecution.
214
© 2020 Law Business Research Ltd
Hong Kong
its customers that the supply of any other personal data to allow it to carry out specific
purposes, such as customer profiling and segmentation, is entirely voluntary, and obtain
written consent from its customers for such use.
Spam messages
Direct marketing activities in the form of electronic communications (other than person-to-
person telemarketing calls) are regulated by the Unsolicited Electronic Messages Ordinance
(UEMO). Under the UEMO, businesses must not send commercial electronic messages
to any telephone or fax number registered in the do-not-call registers. This includes text
messages sent via SMS, pre-recorded phone messages, faxes and emails. In addition, the
UEMO prohibits the use of unscrupulous techniques to expand the reach of commercial
electronic messages, and fraud and other illicit activities related to the sending of multiple
commercial electronic messages. Contravention of the UEMO may result in fines ranging
from HK$100,000 to HK$1 million and up to five years’ imprisonment.
There have only been two prosecutions under the UEMO.36 In early 2014, the Office of
the Communications Authority (OFCA) prosecuted a travel agency for sending commercial
facsimile messages to telephone numbers registered in the do-not-call registers. This is the
first prosecution since the UEMO came into force in 2007. The case was heard before a
magistrate’s court, but the defendant was not convicted because of a lack of evidence. In
January 2017, a commercial facsimile sender was prosecuted under the UEMO for failing to
comply with the unsubscribe requests from recipients of his commercial electronic messages.
The OFCA served an enforcement notice in October 2015, requiring the sender to cease
sending electronic messages in contravention of the UEMO. The sender failed to comply
with the enforcement notice and was ordered to pay a fine of HK$7,500 and HK$60,000 to
OFCA for the costs and expenses of the investigation.37
36 www.ofca.gov.hk/filemanager/ofca/en/content_296/eng_enf_uemo.pdf.
37 www.info.gov.hk/gia/general/201701/10/P2017011001020.htm.
38 Report on Further Public Discussions on Review of the Personal Data (Privacy) Ordinance (April 2011).
215
© 2020 Law Business Research Ltd
Hong Kong
Enforcement
Following prosecution referrals by the PCPD, Hong Kong courts handed down the first
penalties in direct marketing violations in 2015. In September 2015, the Hong Kong
Magistrates’ Court convicted the Hong Kong Broadband Network Limited (HKBN) for
violating the PDPO’s requirement that a data user cease using an individual’s personal data in
direct marketing upon request by that individual.39 The court imposed a fine of HK$30,000.
In a separate court action from September 2015, Links International Relocation Limited
pleaded guilty to a PDPO direct marketing violation for not providing required information
to a consumer before using his personal data in direct marketing.40 The court fined the
company HK$10,000.
Additional convictions and fines followed for direct marketing violations. The
most recent cases initiated by the PCPD resulting in fines and convictions involved two
telecommunications companies, SmarTone Mobile Communications Limited and Hong
Kong Broadband Network Limited (HKBN). On 12 September 2019, SmarTone Mobile
Communications Limited pleaded guilty to failing to comply with the requirement from
a data subject to cease to use her personal data in direct marketing, resulting in a fine of
HK$84,000.41 On 20 May 2020, HKBN was fined HK$12,000 for using the personal data of
a data subject in direct marketing without obtaining consent, and for failing to comply with
the requirement from the data subject to cease to use his personal data in direct marketing.42
Given the large number of criminal referrals by the PCPD with respect to direct marketing
violations, we expect direct marketing prosecutions to continue to be an active enforcement
area.
216
© 2020 Law Business Research Ltd
Hong Kong
Cloud computing
The PCPD published the information leaflet ‘Cloud Computing’ in November 2012, which
provides advice to organisations on the factors they should consider before engaging in
cloud computing. For example, organisations should consider whether the cloud provider
has subcontracting arrangements with other contractors, and what measures are in place to
ensure compliance with the PDPO by these subcontractors and their employees. In addition,
when dealing with cloud providers that offer only standard services and contracts, the data
user must evaluate whether the services and contracts meet all security and personal data
privacy protection standards they require.
On 30 July 2015, the PCPD published the revised information leaflet ‘Cloud
Computing’ to advise cloud users on privacy, the importance of fully assessing the benefits
and risks of cloud services and the implications for safeguarding personal data privacy. The
new leaflet includes advice to organisations on what types of assurances or support they
should obtain from cloud service providers to protect the personal data entrusted to them.
Employee monitoring
In April 2016, the PCPD published the revised Privacy Guidelines: Monitoring and Personal
Data Privacy at Work, to aid employers in understanding steps they can take to assess the
appropriateness of employee monitoring for their business, and how they can develop
privacy-compliant practices in the management of personal data obtained from employee
monitoring. The guidelines are applicable to employee monitoring activities whereby personal
data of employees are collected in recorded form using the following means: telephone, email,
internet and video.
Employers must ensure that they do not contravene the DPPs of the PDPO while
monitoring employees’ activities. The PDPO has provided some additional guidelines on
monitoring employees’ activities and has recommended employers to do the following:
a evaluate the need for employee monitoring and its impact upon personal data privacy.
Employers are recommended to undertake a systematic three-step assessment process:
• ‘assessment’ of the risks that employee monitoring is intended to manage and
weigh that against the benefits to be gained;
• ‘alternatives’ to employee monitoring and other options available to the employer
that may be equally cost-effective and practical but less intrusive on an employee’s
privacy; and
217
© 2020 Law Business Research Ltd
Hong Kong
Fintech
In March 2019, the PCPD published an information leaflet entitled ‘Tips for Using Fintech’,
which offers advice to users in protecting their personal data privacy in the use of fintech
and recommends good practices for fintech providers or operators.43 In May 2019, the
HKMA issued a circular on the Use of Personal Data in Fintech Development to encourage
authorised institutions to adopt and implement the Ethical Accountability Framework
(EAF) for the collection and use of personal data issued by the PCPD.44 The EAF promotes
ethical and fair processing of data through (1) fostering a culture of ethical data governance;
and (2) addressing the personal data privacy risks brought by emerging information and
communication technologies such as big data analytics, artificial intelligence and machine
learning.
43 www.pcpd.org.hk/english/resources_centre/publications/files/fintech.pdf.
44 www.hkma.gov.hk/media/eng/doc/key-information/guidelines-and-circular/2019/20190503e1.pdf.
218
© 2020 Law Business Research Ltd
Hong Kong
personal data and the classes of transferees of the data. As mentioned above, the PCPD
has published the Guidance on Preparing Personal Information Collection Statement and
Privacy Policy Statement (see Section III.i), which provides guidance for organisations when
preparing their PPS and PICS.
The Privacy Management Programme: A Best Practice Guide (see Section II.i) also
provides guidance for organisations to develop their own privacy policies and practices. In
particular, it is recommended that organisations should appoint a data protection officer to
oversee the organisation’s compliance with the PDPO. In terms of company policies, apart
from the PPS and PICS, the Best Practice Guide recommends that organisations develop key
policies on the following areas: accuracy and retention of personal data; security of personal
data; and access to and correction of personal data.
The Best Practice Guide also emphasises the importance of ongoing oversight and
review of the organisation’s privacy policies and practices to ensure they remain effective and
up to date.
The PCPD published an information leaflet in April 2019 entitled ‘Data Ethics for
Small and Medium Enterprises’ to advise small and medium-sized enterprises (SMEs) on the
core values of data ethics including respectful, beneficial and fair, and the adoption of the
ethical data impact assessment before pursing any advanced data processing activity.45
ii Disclosure
Regulatory bodies in Hong Kong, such as the Hong Kong Police Force, the Independent
Commission Against Corruption and the Securities and Futures Commission, are obliged
to comply with the requirements of the PDPO during their investigations. For example,
regulatory bodies in Hong Kong are required to provide a PICS to the individuals prior to
collecting information or documents containing their personal data during investigations.
Nevertheless, in certain circumstances, organisations and regulatory bodies are not
required to comply with DPP3 to obtain prescribed consent from the individuals concerned.
This includes cases where the personal data are to be used for the prevention or detection of
crime, and the apprehension, prosecution or detention of offenders, and where compliance
with DPP3 would be likely to prejudice the aforesaid purposes.
Notwithstanding the above, in response to the A&E incident, the PCPD stressed that
hospitals should first ask the enforcement authority requesting personal data to provide
sufficient information, including but not limited to the purpose of data collection, the nature
of the case being investigated and the relevance of the requested data to the investigation. The
45 www.pcpd.org.hk/english/resources_centre/publications/files/dataethics_en.pdf.
219
© 2020 Law Business Research Ltd
Hong Kong
enforcement authority also has the duty to inform the hospital whether the supply of data
is obligatory, or else the enforcement authority may be considered to contravene the PDPO
through misleading the hospital or on abuse of power grounds.46
Another exemption from DPP3 is where the personal data is required by or authorised
under any enactment, rule of law or court order in Hong Kong. For example, the Securities
and Futures Commission may issue a notice to an organisation under the Securities and
Futures Ordinance requesting the organisation to produce certain documents that contain its
customers’ personal data. In such a case, the disclosure of the personal data by the organisation
would be exempted from DPP3 because it is authorised under the Securities and Futures
Ordinance.
ii Private enforcement
Section 66 of the PDPO provides for civil compensation. Individuals who suffer loss as a
result of a data user’s use of their personal data in contravention of the PDPO are entitled
to compensation by that data user. It is a defence for data users to show that they took
reasonable steps to avoid such a breach.
46 www.pcpd.org.hk/english/news_events/media_statements/press_20190623.html.
220
© 2020 Law Business Research Ltd
Hong Kong
After the Amendment Ordinance came into force, affected individuals seeking
compensation under Section 66 of the PDPO may apply to the Privacy Commissioner for
assistance and the Privacy Commissioner has discretion whether to approve it. Assistance by the
Privacy Commissioner may include giving advice, arranging assistance by a qualified lawyer,
arranging legal representation or other forms of assistance that the Privacy Commissioner
may consider appropriate.
Although Hong Kong does not currently have cybersecurity legislation, the government does
support a number of organisations dedicated to responding to cyber threats and incidents.
These entities include the Hong Kong Emergency Response Team Coordination Centre
(managed by the Hong Kong Productivity Council) for coordinating responses for local
enterprises and internet users, and the Government Computer Emergency Response Team
Hong Kong (a work unit established under the Office of the Government Chief Information
Officer), which is a team charged with coordinating and handling incidents relating to both
the private and public sectors. In addition, the Hong Kong Police Force has established the
Cyber Security and Technology Crime Bureau, which is responsible for handling cybersecurity
issues and combating computer crime.
221
© 2020 Law Business Research Ltd
Hong Kong
The Hong Kong Monetary Authority announced in January 2019 that the financial
sector will be stepping up its efforts to combat cybercrime through the Cyber Resilience
Assessment Framework (C-RAF), which is a three-part assessment instrument that helps
artificial intelligence evaluate cyber resilience for the banking industry.50
ii Data breaches
There is currently no mandatory data breach notification requirement in Hong Kong
(although, as noted below, there are proposals to amend the PDPO to introduce this
requirement). In October 2015 and then again in January 2019, the PCPD revised its
Guidance on Data Breach Handling and the Giving of Breach Notifications, which provides
data users with practical steps in handling data breaches and to mitigate the loss and damage
caused to the individuals involved. Although the PCPD noted in the Guidance that there
are no statutory notification requirements, the PCPD recommended that data users strongly
consider notifying affected persons and relevant authorities, such as the PCPD. In particular,
after assessing the situation and the impact of the data breach, the data users should consider
whether the following persons should be notified as soon as practicable:
a the affected data subjects;
b the law enforcement agencies;
c the Privacy Commissioner (a data breach notification form is available on the PCPD’s
website);
d any relevant regulators; or
e other parties who may be able to take remedial actions to protect the personal data
privacy and the interests of the data subjects affected (e.g., internet companies such as
Google and Yahoo! may assist in removing the relevant cached link from their search
engines).
X OUTLOOK
Hong Kong’s data privacy and protection framework is long-standing and relatively mature,
although the Hong Kong government is working with the PCPD to introduce amendments
to the PDPO.
On 20 January 2020, the Constitutional and Mainland Affairs Bureau (CMAB)
published a discussion paper (Discussion Paper)51 outlining six key proposed amendments to
the PDPO. These include:
a the introduction of a mandatory breach notification requirement (using the test of ‘area
risk of significant harm’ as the notification threshold);
b the requirement for data users to formulate a clear data retention policy covering
(among other things) the maximum retention periods for different types of personal
data;
c increasing the level of fines under the PDPO (a proposal was to utilise a turnover-linked
penalty model similar to that under the GDPR) and empowering the PCPD to directly
impose administrative fines as a penalty for PDPO violations;
d direct regulation of data processors under the PDPO;
50 www.hkma.gov.hk/media/eng/doc/key-information/speeches/s20190124e1.pdf.
51 www.legco.gov.hk/yr19-20/english/panels/ca/papers/ca20200120cb2-512-3-e.pdf.
222
© 2020 Law Business Research Ltd
Hong Kong
If passed, these would be the first substantive amendments to the PDPO since the Amendment
Ordinance came into force in 2012.
We expect that the PCPD will continue enforcement at generally the same levels,
with continued emphasis on direct marketing violations and prosecution referrals for such
violations. In recent public statements, the PCPD has emphasised the importance of striking
a balance between privacy protection and free flow of information, engaging SMEs in
promoting the protection of and respect for personal privacy, and strengthening the PCPD’s
working relationship with mainland China and overseas data protection authorities. The
PCPD also reminded the organisations and businesses in Hong Kong to assess the potential
impact of the regulatory framework for data protection in the EU General Data Protection
Regulation (GDPR), which became effective on 25 May 2018. The GDPR’s extraterritorial
effect suggests that the organisations and businesses in Hong Kong that collect and
process personal data of EU individuals, should be prepared to comply with the GDPR’s
requirements.52 We expect that the PCPD and the Hong Kong government will continue
to emphasise the development of Hong Kong as Asia’s premier data hub and to provide
additional policy, promotional and incentive support to facilitate growth in the region.
With respect to cybercrime and cybersecurity, we do not anticipate major legislation in
the near term and expect that sectoral regulators will continue to take the lead in these areas.
52 www.pcpd.org.hk/english/data_privacy_law/eu/eu.html.
223
© 2020 Law Business Research Ltd
Chapter 15
HUNGARY
I OVERVIEW
The introduction of the European General Data Protection Regulation (GDPR) caused quite
a change in Hungary’s single legislative privacy regime a few years ago. The general rules of
the protection of personal data and freedom of information from 25 May 2018 are contained
in the GDPR and Act CXII of 2011 on Informational Self-Determination and Freedom
of Information (the Privacy Act) is secondary to the general rules that are to be applied
throughout the European Union. As of 17 July 2018, the bill for the amendment of the
Privacy Act, for the sake of GDPR compliance, was adopted by the Hungarian parliament
and was effective as of 25 August 2018.
Furthermore, the Hungarian Data Protection Authority (DPA) has been appointed
to act as a supervisory authority under the GDPR. The GDPR and the Privacy Act should
be considered as the general legislation providing rules regarding the protection of personal
data and the disclosure of public data. Beyond this scope, there are other sectoral acts
(e.g., the Labour Code, Electronic Communications Act, etc.) that provide additional data
protection-related provisions. The processing of medical, criminal, electoral and citizenship
data is regulated by other acts. To be compliant with the GDPR, more than 80 sectoral acts
were amended by the Hungarian parliament as of 1 April 2019, effective as of 26 April 2019.
The omnibus act contained fundamental amendments to the handling of personal data in
the field of labour law, security services and activities of private investigators, trade and direct
marketing.
In Hungarian data privacy regulation, the role of NGOs and self-regulatory industry
groups, as well as society or advocacy groups, is marginal, and there are no specific Hungarian
laws providing for government surveillance powers.
The government approved the National Cybersecurity Strategy, which determines the
national objectives and strategic directions, tasks and comprehensive government tools to
enable Hungary to enforce its national interests in Hungarian cyberspace, within the context
of the global cyberspace.
1 Tamás Gödölle is a partner and Márk Pécsvárady is a junior associate at Bogsch & Partners Law Firm.
224
© 2020 Law Business Research Ltd
Hungary
The Hungarian DPA has already started to impose fines on corporations that explicitly
breach the stipulations of the GDPR. One of the most notable in 2020 was the fine of DIGI,
a Hungarian telecommunication service provider (see Section VI.ii).
Furthermore, the Hungarian DPA has also issued a guideline related to lawfulness
of data processing, namely the processing of health-related personal data of employees
and contractual partners.2 In this guideline, the DPA determined that the health data of
data subjects can only be processed by authorities or by healthcare professionals; therefore,
temperature checks can only be executed if at least a healthcare professional is present and is
responsible for the respective temperature check. However, the data processors have the right
to ask the data subjects whether they have contacted any person with covid-19 or whether
they have been abroad in the past 14 days. Nevertheless, this personal data can only be
requested from data subjects if the data processor can prove the legitimate need for it.
Personal data
The GDPR and the Privacy Act apply to all data processing and technical data processing
that is carried out in Hungary or that aims at Hungarian data subjects, and that pertains to
the data of physical persons. The GDPR and the Privacy Act regulate the processing of data
carried out wholly or partially by automatic means, and the manual processing of data.
Personal data are defined in Article 3.2 of the Privacy Act as any information relating
to a data subject. For the purposes of the GDPR, the term personal data is very similar:
‘personal data’ means any information relating to an identified or identifiable natural person
(‘data subject’); the term identifiable natural person was also incorporated in the Privacy Act,
which refers to a natural person who can be identified, directly or indirectly, in particular by
reference to an identifier such as a name, an identification number, location data, an online
identifier or to one or more factors specific to the physical, physiological, genetic, mental,
economic, cultural or social identity of that natural person.
Sensitive data
The former term ‘special data’ of the Privacy Act was replaced by the term ‘sensitive data’,
which is defined as information on a data subject’s racial and national origin, political
opinion or party affiliation, religious or ideological beliefs, or membership of any special
2 See https://naih.hu/files/NAIH_2020_2586_EN.pdf.
3 The text of the Law is available at http://net.jogtar.hu/jr/gen/hjegy_doc.cgi?docid=A1100112.TV and in
English at www.naih.hu/files/Act-CXII-of-2011_EN_23June2016.pdf.
225
© 2020 Law Business Research Ltd
Hungary
interest organisations, as well as his or her state of health, pathological addictions, sex life or
criminal personal data, a definition that was made GDPR-compliant in the same way that
the definition of personal data was.4
Data controller
The GDPR defined ‘controller’ as the natural or legal person, public authority, agency or
other body which, alone or jointly with others, determines the purposes and means of the
processing of personal data; where the purposes and means of such processing are determined
by Union or Member State law, the controller or the specific criteria for its nomination may
be provided for by Union or Member State law. The definition of data controller in the
Privacy Act was also made GDPR compliant.
Data processor
The Act identifies a ‘data processor’ as any natural or legal person or organisation without
legal personality that is engaged in processing operations within the framework of and under
the conditions set out by law or binding legislation of the European Union, acting on the
controller’s behalf or following the controller’s instructions. Under the GDPR, ‘processor’
means a natural or legal person, public authority, agency or other body that processes personal
data on behalf of the controller.
Protection of consumers
The Direct Marketing Act identifies numerous obligations for marketing organisations
to ensure the protection of consumers, and particularly restricts the use of the name and
home address of natural persons for marketing purposes.6 Notably, the provisions of the
Direct Marketing Act are only applicable where the marketing materials are sent by post.
Marketing materials sent by electronic means are regulated by the Advertising Act and the
e-Commerce Act. In this regard the GDPR brings some novelties as Recital (47) contains
that the processing of personal data for direct marketing purposes may be regarded as carried
out for a legitimate interest and this implies that no consent is required as a legal basis
for such data processing, which means a significant change from the previous Hungarian
approach. The omnibus act of April 2019 brought about significant changes in the field of
direct marketing: the regulations in the Act CXIX of 1995 on the Use of Name and Address
Information Serving the Purposes of Research and Direct Marketing7 has changed so that
previously collected data of customers can only be used if the legal interest is proved, which
can be, for example, the measurement of client satisfaction.
226
© 2020 Law Business Research Ltd
Hungary
Before collecting information from an individual, the controller must indicate to the data
subject whether data processing is based on consent or relies on any other legal ground. In
addition, the data controller must provide the data subject with unambiguous and detailed
information on all the facts relating to the processing of his or her data in line with Article
13/14 GDPR.
227
© 2020 Law Business Research Ltd
Hungary
When the personal data breach is likely to result in a high risk to the rights and freedoms
of natural persons, the controller shall communicate the personal data breach to the data
subject without undue delay.
Employee monitoring
The Labour Code generally authorises employers to introduce monitoring measures.12 It
allows employers to monitor the conduct of employees; however, such measures may be taken
only in the context of employment. Further, the means used for monitoring may not violate
the human dignity of the worker. To exclude all possibility of doubt, the Labour Code also
states that the private life of the employee cannot be monitored, which is in conformity with
the practice of the European Court of Human Rights. In addition, the employer must give
notice to employees, in advance, of the use of technical means serving to control or monitor
employees’ conduct.
The previously mentioned omnibus act also brought about changes in the field of labour
law. The employer is obliged to prove to the employee the necessity, proportionality and the
purpose limitation of data handling with prior written notice. Furthermore, the employee
shall only present the official documents (e.g., ID card) necessary for the employment
228
© 2020 Law Business Research Ltd
Hungary
relationship, but the employer is not entitled to make photocopies. The three working days’,
30 or 60 days’ maximum storage periods for camera recordings were also abolished, therefore
the employer has the right to set the storage period for the recordings within the framework
of GDPR norms such as data minimisation. Furthermore, the employer also has the right to
process the biometric data of the employees (e.g., for entry purposes) if it is supported by a
data protection impact assessment in which the pecuniary interest of the employer is clearly
identified.
Restriction on cookies
In November 2009, the European Commission adopted Directive 2009/136/EC (2009
Directive), and this amendment was to be implemented in the laws of each of the European
Union Member States by 25 May 2011.
Article 3(5) of the 2009 Directive was implemented in Hungary by Section 155(4) of
the Hungarian Act on Electronic Communications, which generally provides that data may
be stored or accessed on the terminal equipment of the subject end user or subscriber after
the provision of clear and comprehensive information, including the purpose of the data
processing, if the corresponding consent of the end user or subscriber has been granted.
The HDPA issued a guideline13 related to cookies, in which the personal data related to
essential cookies, which are necessary for the operation of the website, can be processed on
the legal ground of legitimate interest. Personal data related to other types of cookies (such as
analytic or marketing cookies) can only be processed through the consent of the data subject.
13 https://www.naih.hu/files/NAIH_2018_3567_V_20180713.pdf.
14 http://felugyelet.mnb.hu/data/cms2364896/vezkorlev_4_2012.pdf.
229
© 2020 Law Business Research Ltd
Hungary
Health
The processing of health data is governed by the provisions of the Act on Medical Care (Act
CLIV of 1997) as well as by the Act on Handling and Protecting Medical Data (Act XLVII
of 1997). The processing of human genetic data (and research) is governed by the Act on the
Protection of Human Genetic Data and the Regulation of Human Genetic Studies, Research
and Biobanks.
The Act on Handling and Protecting Medical Data identifies the legal purposes for
which health data may be processed.
The Act determines the scope of persons who may lawfully process health data. The Act
also regulates the strict secrecy obligations of medical personnel providing medical treatment.
Medical institutions must store health records for 30 years and must store final reports for 50
years, after which time the documentation must be destroyed.
Patients have the right to be informed about the handling of their health data. They
also have the right to access their health data.
Electronic communications
Under the provisions of the Electronic Communications Act of 2003, service providers are
generally authorised to process the personal data of end users and subscribers, always to the
extent required and necessary:
a for their identification for the purpose of drawing up contracts for electronic
communication services (including amendments to such contracts);
b to monitor performance;
c for billing charges and fees; and
d for enforcing any related claims.
Commercial communications
Several laws address the protection of personal data in the context of commercial
communications. These laws include Act CVIII of 2001 on Electronic Commerce and on
Information Society Services (the e-Commerce Act),15 the 1995 Law on the Use of Name
and Address Information Serving the Purposes of Research and Direct Marketing (the Direct
Marketing Act), as well as the 2008 Act on the Basic Requirements and Certain Restrictions
of Commercial Advertising Activity (the Advertising Act).
In 2001, Hungary enacted the e-Commerce Act, which requires that each commercial
email clearly and unambiguously indicates that a commercial message is an electronic
advertisement, and that it provides the identity of the electronic advertiser or that of the
actual sender.16
230
© 2020 Law Business Research Ltd
Hungary
The Advertising Act provides that unsolicited marketing material may not be sent to
an individual without having obtained the prior, express, specific, voluntary and informed
consent of the individual in compliance with the applicable provisions of the Privacy Act.17
The message must contain the email address and other contact details where the individual
may request the prohibition of the transmission of electronic advertisements.18 This approach
now may be changed by the above cited Recital (47) of the GDPR, however, as of now the
situation is rather uncertain in Hungary, especially in absence of the new ePrivacy Regulation
of the EU that will clarify the rules for direct marketing and consent.
For future data transfers, the rules of the GDPR are applicable, while the rules of the Privacy
Act will remain in force for a rather narrow scope of data processing activities where the
GDPR is not applicable.
231
© 2020 Law Business Research Ltd
Hungary
– especially multinational companies who process cross-border data flows both within and
outside their company group – still introduce internal privacy policies and publish privacy
notices.
Act I of 2012 on the Labour Code (the Labour Code) also lays down the general rules
governing workplace privacy.
Under the section ‘Protection of Personal Rights’, Article 9 of the Labour Code
generally articulates that everyone shall respect the personal rights of persons covered by
the Act. Employers must provide notice to their employees on the processing of their
personal data. The Labour Code generally authorises employers to introduce monitoring
measures. The Code provides that an employer may monitor the conduct of employees;
however, such measures may be taken only in the context of employment, and the means
used for monitoring may not violate the human dignity of the worker. Restricting employee
personal rights, however, is legitimate only if it matches the requirements of necessity and
proportionality, namely if the restriction is definitely necessary because of a reason arising
from the employment relationship and if the restriction is also proportionate for achieving
its objective.
i Whistle-blowing system
Regarding the processing of employee data in whistle-blowing systems, Act CLXV of 2013
on Complaints and Public Interest Disclosure lays down the relevant rules.
The Act authorises employers to establish a system to investigate whistle-blowing
reports. Conduct that may be reported includes the violation of laws as well as codes of
conduct issued by the employer, provided that these rules protect the public interest or
significant private interests.
ii Genetic data
The processing of human genetic data is governed by Act XXI of 2008 on the Protection of
Human Genetic Data and the Regulation of Human Genetic Studies, Research and Biobanks,
which entered into effect on 1 July 2008. The general rules of the Act lay down that human
genetic data may only be used either for the purpose of human genetic research or for medical
examination. The Act guarantees the data subject’s right of information self-determination in
connection with human genetic data, as it requires the written informed consent of the data
subject for such data processing.
232
© 2020 Law Business Research Ltd
Hungary
The data protection officer shall be designated on the basis of professional qualities and, in
particular, expert knowledge of data protection law and practices and the ability to fulfil his
or her tasks, which are:
a to inform and advise the controller or the processor and the employees who carry
out processing of their obligations pursuant to this Regulation and to other Union or
Member State data protection provisions;
b to monitor compliance with this Regulation, with other Union or Member State data
protection provisions and with the policies of the controller or processor in relation
to the protection of personal data, including the assignment of responsibilities,
awareness-raising and training of staff involved in processing operations, and the
related audits;
c to provide advice where requested as regards the data protection impact assessment and
monitor its performance;
d to cooperate with the supervisory authority; and
e to act as the contact point for the supervisory authority on issues relating to processing,
including the prior consultation referred to in Article 36, and to consult, where
appropriate, with regard to any other matter.
Pursuant to the data breach rules of the GDPR and of the Privacy Act, the DPO shall manage
the data security incident register, which contains records of incidents and shall notify the
DPA or the data subjects in some cases.
Under the GDPR and the Privacy Act, the data controller, data processor and data subject are
all entitled to appeal to the court to contest an order of the DPA. Pending a final and binding
decision of the court, the data concerned must not be erased or destroyed, but processing
of the data must be suspended and the data blocked. Moreover, the general rights of appeal
under the Civil Procedure Act will still apply.
The DPA may initiate criminal proceedings with the body authorised to launch such
proceedings if it suspects that an offence has been committed during the course of the
procedure. The DPA shall initiate infringement or disciplinary proceedings with the body
authorised to launch such proceedings if it suspects that an infringement or disciplinary
violation has been committed during the course of the procedure.
233
© 2020 Law Business Research Ltd
Hungary
19 www.naih.hu/files/NAIH-2020-1160-10-hatarozat.pdf.
20 www.naih.hu.
234
© 2020 Law Business Research Ltd
Hungary
goods or services, irrespective of whether a payment of the data subject is required, to such
data subjects in the Union or (2) the monitoring of their behaviour as far as their behaviour
takes place within the Union.
IX OUTLOOK
The EU General Data Protection Regulation has brought significant changes to the
Hungarian data protection and privacy regime with effect from 25 May 2018 but taking into
consideration the short period of time since its applicability, it is hard to assess its actual short
and long-term effects.
235
© 2020 Law Business Research Ltd
Chapter 16
INDIA
I OVERVIEW
In the absence of specific legislation for data protection in India, the Information Technology
Act 2000 (the IT Act) and a collection of other statutes stand in for this purpose. In 2017,
the Indian Supreme Court ruled that Indian citizens have a fundamental right to privacy,
guaranteed primarily under Article 21 of the Indian Constitution. The Court specified that
this right includes, inter alia, the right to informational privacy. In the wake of this judgment,
and in order to give it meaning in the form of comprehensive legislation, the government
empanelled a 10-member committee under the chairmanship of Justice BN Srikrishna, a
former Supreme Court Justice. The Srikrishna committee was asked to compile an in-depth
review of existing laws relevant to the subject. In 2018, the Srikrishna committee published a
report running into over 200 pages. The Srikrishna report examined the current patchwork of
relevant laws in India, studied the statutory approach to privacy and data protection in other
jurisidctions and laid out detailed rationale for an improved legal framework. The report was
accompanied by the draft Personal Data Protection Bill 2018.
to make [the right to privacy articulated by the Supreme Court] meaningful, it is the duty of the
state to put in place a data protection framework which, while protecting citizens from dangers to
informational privacy originating from state and non-state actors, serves the common good.
The Personal Data Protection Bill 2019 envisages the formation of a data protection authority
for its enforcement, places heavy fiduciary duties on data controllers and processors and, if
enacted, will apply to a wide range of actors and stakeholders across various sectors.
1 Aditi Subramaniam is an associate principal and Sanuj Das is a managing associate at Subramaniam &
Associates.
2 http://164.100.47.4/BillsTexts/LSBillTexts/Asintroduced/373_2019_LS_Eng.pdf.
236
© 2020 Law Business Research Ltd
India
The executive scramble to mitigate the effects of the covid-19 crisis has brought various
competing interests to the fore in the context of data privacy. The most conspicuous of these
interests is the need for government surveillance in the form of contact tracing, large-scale
testing and the maintenance of public health records (symptoms and quarantine regulation)
for citizens and non-citizens across the country. India is a quasi-federal nation state. The
centre and states are currently acting together through the Integrated Disease Surveillance
Programme, which operates through a decentralised state-based surveillance system to
monitor information flows on target diseases to compile and analyse data and organise
an appropriate response. The centre has also developed and released a mobile application
that relies largely on crowd-sourcing self-reported data to identify covid-19 hotspots. This
collection and processing of data stands largely unregulated at this time.
The Information Technology Act (2000) (IT Act) and the Information Technology
(Amendment) Act 20083
The IT Act contains provisions for the protection of electronic data. The IT Act penalises
‘cyber contraventions’ (Section 43(a)–(h)), which attract civil prosecution, and ‘cyber
offences’ (Sections 63–74), which attract criminal action.
The IT Act was originally passed to provide legal recognition for e-commerce and
sanctions for computer misuse. However, it had no express provisions regarding data security.
Breaches of data security could result in the prosecution of individuals who hacked into the
system, under Sections 43 and 66 of the IT Act, but the Act did not provide other remedies
such as, for instance, taking action against the organisation holding the data. Accordingly, the
IT (Amendment) Act 2008 was passed, which, inter alia, incorporated two new sections into
the IT Act, Section 43A and Section 72A, to provide a remedy to persons who have suffered
or are likely to suffer a loss on account of their personal data not having been adequately
protected.
3 Links to pdf versions of the IT Act and Rules are available on the website of the Ministry of Electronics and
Information Technology: meity.gov.in/content/cyber-laws.
4 meity.gov.in/sites/upload_files/dit/files/GSR313E_10511(1).pdf.
237
© 2020 Law Business Research Ltd
India
The IT Rules are statutory law, and the four sets specified above were notified on 11 April 2011
under Section 43A of the IT Act. Any further references to the IT Rules in this chapter pertain
specifically to the Information Technology (Reasonable Security Practices and Procedures
and Sensitive Personal Data or Information) Rules, unless otherwise specified.
Penalties for non-compliance are specified by Sections 43 and 72 of the IT Act.
Additional legislation
In addition to the legislation described above, data protection may also sometimes occur
through the enforcement of property rights based on the Copyright Act (1957). Further,
other legislation such as the Code of Criminal Procedure (1973), the Indian Telegraph Act
1885, the Companies Act (1956), the Competition Act (2002) and, in cases of unfair trade
practices, the Consumer Protection Act (1986), would also be relevant. Finally, citizens may
also make use of the common law right to privacy, at least in theory – there is no significant,
recent jurisprudence on this.
Additionally, the Personal Data Protection Bill 2019, referred to above, may soon be
passed into law, becoming India’s first and most comprehensive cross-sectoral data protection
legislation.
Compliance regulators
CERT-In
Under Section 70B of the IT (Amendment) Act 2008, the government constituted
CERT-In, which the website of the Ministry of Electronics and Information Technology
refers to as the ‘Indian Computer Emergency Response Team’. CERT-In is a national nodal
agency responding to computer security incidents as and when they occur. The Ministry of
Electronics and Information Technology specifies the functions of the agency as follows:
a collection, analysis and dissemination of information on cybersecurity incidents;
b forecast and alerts of cybersecurity incidents;
c emergency measures for handling cybersecurity incidents;
d coordination of cybersecurity incident response activities; and
5 meity.gov.in/sites/upload_files/dit/files/GSR314E_10511(1).pdf.
6 meity.gov.in/sites/upload_files/dit/files/GSR315E_10511(1).pdf.
7 meity.gov.in/sites/upload_files/dit/files/GSR316E_10511(1).pdf.
238
© 2020 Law Business Research Ltd
India
Definitions
Current legislation does not contain a definition for ‘personal data’. The IT Rules define
personal information as any information that relates to a natural person that, either directly
or indirectly, in combination with other information available or likely to be available with a
body corporate, is capable of identifying such a person.
Further, the IT Rules define ‘sensitive personal data or information’ as personal
information consisting of information relating to:
a passwords;
b financial information, such as bank account, credit card, debit card or other payment
instrument details;
c physical, physiological and mental health conditions;
d sexual orientation;
e medical records and history;
f biometric information;
g any details relating to the above clauses as provided to a body corporate for the provision
of services; and
h any information received under the above clauses by a body corporate for processing, or
that has been stored or processed under lawful contract or otherwise.
Provided that any information is freely available or accessible in the public domain, or
furnished under the Right to Information Act 2005 or any other law for the time being in
force, it shall not be regarded as sensitive personal data or information for the purposes of
these rules.
The Personal Data Protection Bill 2019 defines ‘personal data’ as ‘data about or relating
to a natural person who is directly or indirectly identifiable, having regard to any characteristic,
8 www.cert-in.org.in.
9 https://www.meity.gov.in/writereaddata/files/The%20Cyber%20Appellate%20Tribunal%28Chairperson_
Members%29%20Rules%2C%202009.pdf.
239
© 2020 Law Business Research Ltd
India
trait, attribute or any other feature of the identity of such natural person, whether online or
offline, or any combination of such features with any other information, and shall include
any inference drawn from such data for the purpose of profiling’.
The Bill also defines ‘sensitive personal data’ as such personal data that may reveal, be
related to, or constitute, various types of information, including but not limited to financial
data, health data, official identifier, sex life, sexual orientation, biometric data, genetic data,
transgender status, intersex status, caste or tribe and religious or political belief or affiliation.
The Bill clarifies that this list is not exhaustive, and that the central government may notify
further categories of data as falling within the remit of sensitive personal data.
Unlike the IT Act and Rules, the Personal Data Protection Bill 2019 contains definitions
for ‘processing’, ‘data fiduciary’, ‘data processor’, ‘data principal’ and ‘consent’. Importantly,
the Bill renames data subjects (i.e., the natural person to whom the personal data relates) as
data principals, and any entity that determines the purpose and means of processing personal
data is referred to as a data fiduciary. For the remainder of the chapter, references to the
provisions of the Bill will retain this new nomenclature consistent with the language of the
Bill. References to existing legislation will employ only terms used in the current legislation.
Purpose limitation
The IT Rules state that any information collected by a body corporate or a person on its
behalf shall be used for the purpose for which it has been collected. The Personal Data
Protection Bill 2019 prescribes that personal data be processed only for specific, clear and
lawful purposes. It states that data shall be processed in a fair and reasonable manner that
ensures the privacy of the data principal (the person to whom the data relates) and for the
purpose consented to by the data principal. Alternatively, the purpose may be incidental to
or connected with such purpose, and for which the data principal would reasonably expect
that such personal data shall be used. It also limits the collection of personal data to such data
that is necessary for the purposes of processing.
240
© 2020 Law Business Research Ltd
India
Data retention
Section 67C of the IT Act requires that an intermediary preserve and retain information in a
manner and format and for such period of time as prescribed by the central government. The
Personal Data Protection Bill 2019 states that a data fiduciary may not retain personal data
beyond the period necessary to satisfy the purpose for which it is processed. It also states that
such data must be deleted at the end of this period. However, the Bill also allows for longer
periods of retention if required by compliance with legal obligations, or if the consent of the
data principal has been obtained, and prescribes periodic reviews by data fiduciaries for an
ongoing assessment of the continued necessity of the retention of personal data.
Registration formalities
India currently does not have any legislative requirements with respect to registration or
notification procedures for data controllers or processors. The Personal Data Protection Bill
2019 requires that based on certain criteria, the data protection authority envisaged by the
bill shall notify certain data fiduciaries as being ‘significant’. Significant data fiduciaries will
be required to register with the authority in a manner specified by it, and will also be subject
to data protection impact assessments, data audits, etc. The Bill also states that the data
protection authority may require registration by other data fiduciaries at its discretion, even
if such entities are not ‘significant’.
Rights of individuals
Access to data
Rule 5, Subsection 6 of the IT Rules mandates that the body corporate or any person on
its behalf must permit providers of information or data subjects to review the information
they may have provided. The Personal Data Protection Bill 2019 teases out this right in
more detail, providing the option for the data principal to obtain from the data fiduciary in
a clear and concise manner, confirmation of whether its personal data is being (or has been)
processed and a brief summary of processing activities. The Bill states that the data principal
shall also have the right to access in one place the identities of the data fiduciaries with whom
their personal data has been shared, along with the categories of such personal data.
241
© 2020 Law Business Research Ltd
India
Disclosure of data
Data subjects also possess rights with respect to disclosure of the information they provide.
Disclosure of sensitive personal information requires the provider’s prior permission unless
either disclosure has already been agreed to in the contract between the data subject and the
data controller; or disclosure is necessary for compliance with a legal obligation.
The exceptions to this rule are if an order under law has been made, or if a disclosure
must be made to government agencies mandated under the law to obtain information for
the purposes of verification of identity; prevention, detection and investigation of crime; or
prosecution or punishment of offences.
242
© 2020 Law Business Research Ltd
India
Recipients of this sensitive personal information are prohibited from further disclosing
the information.
Credit Information Companies (Regulation) Act 2005 and The Credit Information Companies
Regulations 200612
This legislation is essentially aimed at regulation of sharing and exchanging credit information
by credit agencies with third parties. Disclosure of data received by a credit agency is
prohibited, except in the case of its specified user and unless required by any law in force.
The regulations prescribe that the data collected must be adequate, relevant, and not
excessive, up to date and complete, so that the collection does not intrude to an unreasonable
extent on the personal affairs of the individual. The information collected and disseminated
10 http://legislative.gov.in/sites/default/files/A1983-48_0.pdf.
11 https://dea.gov.in/sites/default/files/moneylaunderingact.pdf.
12 http://legislative.gov.in/sites/default/files/A2005-30.pdf.
243
© 2020 Law Business Research Ltd
India
is retained for a period of seven years in the case of individuals. Information relating to
criminal offences is maintained permanently while information relating to civil offences is
retained for seven years from the first reporting of the offence. In fact, the regulations also
prescribe that personal information that has become irrelevant may be destroyed, erased or
made anonymous.
Credit information companies are required to obtain informed consent from individuals
and entities before collecting their information. For the purpose of redressal, a complaint can
be written to the Reserve Bank of India.
Workplace privacy
In the present scenario, employers are required to adopt security practices to protect sensitive
personal data of employees in their possession, such as medical records, financial records
and biometric information. In the event of a loss to an employee due to lack of adequate
security practices, the employee would be entitled to compensation under Section 43A of the
Information Technology Act 2000. Other than this piece of legislation, there is no specific
legislation governing workplace privacy, although, in relation to the workplace, the effect of
the Supreme Court judgment on privacy as a fundamental right remains to be seen.
Children’s privacy
Section 74 of the Juvenile Justice (Care and Protection of Children) Act 2015 mandates that
the name, address or school, or any other particular, that may lead to the identification of a
child in conflict with the law or a child in need of care and protection or a child victim or
witness of a crime shall not be disclosed in the media unless the disclosure or publication is
in the child’s best interest. The Personal Data Protection Bill 2019 provides for the protection
of personal and sensitive data of children by requiring consent of a parent or guardian and
imposing various restrictions on data fiduciaries processing such data.
13 https://rbidocs.rbi.org.in/rdocs/Publications/PDFs/86706.pdf.
14 https://fcraonline.nic.in/home/PDF_Doc/FC-RegulationAct-2010-C.pdf.
244
© 2020 Law Business Research Ltd
India
15 http://niti.gov.in/writereaddata/files/1.pdf.
245
© 2020 Law Business Research Ltd
India
personal data outside the EU unless certain measures are taken, such as requiring the data
importer to sign up to EU Model Contract Clauses. In addition, the Ministry of Information
Technology clarified via a press note released on 24 August 2011 that the rules on sensitive
data transfer described above are limited in jurisdiction to Indian bodies corporate and
legal entities or persons, and do not apply to bodies corporate or legal entities abroad. As
such, information technology industries and business process outsourcing companies may
subscribe to whichever secure methods of data transfer they prefer, provided that the transfer
in question does not violate any law either in India or in the country the data are being
transferred to. Presumably litigation in this sector – so far non-existent – will further clarify
matters.
In general, data protection laws in India apply to businesses established in other
jurisdictions as well. Section 75 of the IT Act states that the provisions of the Act would
apply to any offence or contravention thereunder committed outside India by any person
(including companies), irrespective of his or her nationality, if the act or conduct constituting
the offence or contravention involves a computer, computer system or computer network
located in India.
The draft Personal Data Protection Bill 2019 states that, subject to various conditions,
including the transfer being made pursuant to a contract or intra-group scheme approval
(which makes provisions for protection of the data principal and liability of the data fiduciary),
or the approval of the central government, sensitive personal data may be transferred outside
India. However, a copy of such data must continue to be stored in India.
1. A body corporate or a person on its behalf shall be considered to have complied with reasonable
security practices and procedures, if they have implemented such security practices and standards
and have a comprehensive documented information security programme and information security
policies that contain managerial, technical, operational and physical security control measures that
are commensurate with the information assets being protected with the nature of business. In the
event of an information security breach, the body corporate or a person on its behalf shall be required
to demonstrate, as and when called upon to do so by the agency mandated under the law, that they
have implemented security control measures as per their documented information security programme
and information security policies.
2. The international standard IS/ISO/IEC 27001 on ‘Information Technology – Security
Techniques – Information Security Management System – Requirements’ is one such standard
referred to in sub-rule (1).
3. Any industry association or an entity formed by such an association, whose members are
self-regulating by following other than IS/ISO/IEC codes of best practices for data protection as per
sub-rule (1), shall get its codes of best practices duly approved and notified by the Central Government
for effective implementation.
4. The body corporate or a person on its behalf who have implemented either IS/ISO/IEC 27001
standard or the codes of best practices for data protection as approved and notified under sub-rule
246
© 2020 Law Business Research Ltd
India
(3) shall be deemed to have complied with reasonable security practices and procedures provided that
such standard or the codes of best practices have been certified or audited on a regular basis by entities
through independent auditor, duly approved by the Central Government. The audit of reasonable
security practices and procedures shall be carried out by an auditor at least once a year or as and
when the body corporate or a person on its behalf undertake significant upgradation of its process and
computer resources.
There are no statutory registration or notification requirements for either data processors or
data controllers. The Personal Data Protection Bill 2019 provides for various transparency
and accountability measures to which the data fiduciary shall be subject. For instance, every
data fiduciary uder the Bill shall prepare a privacy by design policy, take any steps necessary to
maintain transparency in personal data processing, implement necessary security safeguards,
report breaches of personal data to the data protection authority, conduct impact assessments
when it contemplates the use of new technology or large-scale profiling and have in place
effective procedures and grievance redressal mechanisms for data principals. In addition, if
notified by the data protection authority as a significant data fiduciary, such entity must
register with the authority, appoint a data processing officer with relevant qualifications and
suitable experience, conduct annual audits of its policies and processing and maintain records
of its activities, security measures, impact assessments and other aspects of data processing.
247
© 2020 Law Business Research Ltd
India
X OUTLOOK
The several agencies performing cybersecurity operations in India, such as the National
Technical Research Organisation, the National Intelligence Grid and the National
Information Board, require robust policy and legislative and infrastructural support from the
Ministry of Electronics and Information Technology, and from the courts, to enable them to
do their jobs properly. The Personal Data Protection Bill 2019, as tabled in parliament, is a
comprehensive framework for data protection in India. Notwithstanding concerns that the
Bill does not perfectly balance the privacy of citizens with the need for occasional government
248
© 2020 Law Business Research Ltd
India
intervention, the Bill, once it is passed into law, is likely to function as a much more effective
means of data protection (and the protection of allied interests, such as free speech) than
existing legislation.
249
© 2020 Law Business Research Ltd
Chapter 17
INDONESIA
I OVERVIEW
The 1945 Constitution of the Republic of Indonesia (the Constitution) grants various rights
related to privacy. Although the right to privacy is not explicitly mentioned in the Constitution,
it is embodied in the right to personal protection, freedom of religion, freedom of expression
and other similar rights granting personal protection to the individual. These rights serve as
a foundation for the legislative and regulatory approach to respecting individuals’ privacy in
existing laws and regulations that are currently scattered within sectoral regulations.
Indonesia is currently on the verge of passing its first Personal Data Protection Act.
The Personal Data Protection Bill (the PDP Bill) is an effort to fill the void in the existing
regulatory framework on personal data protection. At present, the issues of privacy, personal
data protection and cybersecurity are embodied in array of general and sector-specific laws.
Each supervisory authority for industry specific sectors has the power to enact its own
regulations, including regulation related to privacy and personal data protection. However, no
significant enforcement has arisen from the sector-specific laws on personal data protection.
The most relevant enforcement regarding violation of personal data protection was brought
by the Indonesian National Police (the Police) under Law No. 11 of 2008 on Electronic
Information and Transaction as lastly amended by Law No. 19 of 2016 (Law 11/2008), in
conjunction with Law No. 23 of 2006 on Population Administration as lastly amended by
Law No. 24 of 2013 (Law 23/2006).2 The PDP Bill is expected to provide clear guidance on
enforcement as well as better protection of individuals’ personal data.
The submission of the PDP Bill3 and the Cybersecurity and Resilience Bill (the
Cybersecurity Bill) to the Indonesian House of Representatives (DPR’)4 signifies the
development of policies on personal data protection, privacy, and cybersecurity. Despite
the fact that discussion of the PDP Bill is prioritised over the Cybersecurity Bill (which
1 Danny Kobrata is a partner, Bhredipta Socarana is a senior associate and Rahma Atika is an associate at
K&K Advocates.
2 Haryanto A and Briantika A, ‘Polisi Tangkap Penjual Data Nasabah Dan Data Kependudukan’
(15 August 2019) https://tirto.id/polisi-tangkap-penjual-data-nasabah-dan-data-kependudukan-egmx,
accessed 20 July 2020.
3 ‘DPR Terima Surpres Jokowi Soal RUU Perlindungan Data Pribadi’ (13 February 2020) www.
cnnindonesia.com/nasional/20200204022359-32-471351/dpr-terima-surpres-jokowi-
soal-ruu-perlindungan-data-pribadi, accessed 21 July 2020.
4 ‘7 Masalah RUU KKS Yang Akan Disahkan DPR’ (26 September 2019) www.cnnindonesia.com/
teknologi/20190926152946-185-434335/7-masalah-ruu-kks-yang-akan-disahkan-dpr, accessed
18 July 2020.
250
© 2020 Law Business Research Ltd
Indonesia
is postponed until next year),5 this decision shows that the DPR is responding to public
concern on the security of their personal data following several data breach incidents that
happened recently.
Given its scope, the PDP Bill is expected to strengthen protection of the right to
privacy.6 This is because the Indonesian judicial system can only recognise and enforce
fundamental rights under the Constitution that have been transposed into effective laws.
A trial-stage court has limited authority to interpret provisions of law if it is not explicitly
written, even if the Constitution grants such rights. The similar approach is taken by law
enforcement agencies in implementing the law. When individuals believe their fundamental
rights granted by the Constitution are violated by certain provisions of a law, a judicial review
mechanism can be filed to the Constitutional Court, a specific court adjudicating conflict
between applicable laws and the Constitution.
The authority of the Constitutional Court on the protection of privacy rights
can be found in its decisions about government surveillance powers, and specifically on
government-backed interception. The Constitutional Court has revised provisions on
interception several times to protect individuals’ human rights and provide legal certainty,
and requires that interception can only be carried out by a law enforcement authority.7
The development and dynamic of regulatory framework improvement cannot
be separated from the role played by non-government entities. A number of civil society
organisations (CSOs) have advocated the interest of the public by organising a series of
public awareness activities, conducting public surveys, facilitating dialogue with government
and industry groups, and even filing lawsuits to the relevant courts. Self-regulatory industry
groups also play a significant role in bridging the gap between industries’ best practices and
regulations through creating industry codes of conduct and often meeting with regulators.
All in all, the involvement of multi-stakeholders in developing a regulatory framework
on personal data protection, privacy, and cybersecurity is significant. However, it is
indisputably important that every stakeholder educate the public on their rights, to ensure
any law pertaining to the issues can be implemented properly in practice, especially given that
the right to privacy itself is not commonly known by the majority of the public in Indonesia.
5 Andi Nugroho, ‘Baleg DPR: Komisi I Fokus RUU PDP, RUU KKS Dipindah 2021’ (1 July 2020) https://
cyberthreat.id/read/7350/Baleg-DPR-Komisi-I-Fokus-RUU-PDP-RUU-KKS-Dipindah-2021, accessed
24 July 2020.
6 Achmad Nasrudin Yahya, ‘RUU PDP Dinilai Hanya Berupaya Lindungi Data Pribadi, Bukan Warga
Negara’ (KOMPAS.com 6 February 2020) https://nasional.kompas.com/read/2020/02/06/09081831/
ruu-pdp-dinilai-hanya-berupaya-lindungi-data-pribadi-bukan-warga-negara, accessed 19 July 2020.
7 Elucidation of Law No. 11 of 2008 Preamble.
251
© 2020 Law Business Research Ltd
Indonesia
requiring most public activities to go online.8 As a result, the growth of online interaction is
inevitable, followed by an increase in public awareness of online interaction as well as increase
in the vulnerability of online security, personal data, and privacy.
However, the vulnerability of Indonesian public personal data has not only been exposed
in 2020. In July 2019, the public was surprised by the discovery of large-scale unauthorised
transactions of Indonesian ID card and Family Card information. The transactions took
place over a social media platform group, with the total amount estimated to be millions of
items of personal data owned by Indonesian individuals.9 This case was investigated by the
Police, after it was reported to Ministry of Home Affairs (MHA), the authority in charge of
protection of ID Card and Family Card information.10 The Police also arrested an individual
under allegation of selling consumer data and population data in August 2019.11
In April 2020, cybersecurity became a trending issue owing to a breach suffered by an
Indonesian Human Rights Activist on the activist’s chat messaging application.12 The breach
led to the distribution of messages from his account provoking a coup d’état and public
disorder. As a result, the activist was detained by the Police under the allegation of spreading
a ‘prohibited message’.13 It took a few days following the detention for the activist to be
released after providing sufficient evidence that the his account was compromised, and its
control taken by an unknown party.14 The Police are currently investigating the party behind
this breach.15
After series of incidents, there continued to be information breaches within the public.
Some major data breach incidents occurred in May 2020. The incidents were suffered mostly
by Indonesian marketplace platforms, exposing a significant amount of their consumers’
personal data including names, email addresses and other identifying information.16
8 Fardah F, ‘Indonesia Introduces Large-Scale Social Distancing Measures’ (17 March 2020) https://
en.antaranews.com/news/143882/indonesia-introduces-large-scale-social-distancing-measures, accessed
22 July 2020.
9 Kuwado FJ, ‘Pelaku Jual Beli Data Kependudukan Ditangkap, Ini Kronologinya’ (15 August 2019) https://
nasional.kompas.com/read/2019/08/15/19181091/pelaku-jual-beli-data-kependudukan-ditangkap-
ini-kronologinya?page=all, accessed 25 July 2020.
10 ‘Rupanya Dukcapil Sudah Lapor Jual Beli Data KTP Dan KK Ke Polisi’ (Kontan 2 August 2019) https://
insight.kontan.co.id/news/rupanya-dukcapil-sudah-lapor-jual-beli-data-ktp-dan-kk-ke-polisi?page=all,
accessed 24 July 2020.
11 Haryanto A and Briantika A, ‘Polisi Tangkap Penjual Data Nasabah Dan Data Kependudukan’ (tirto.
id 15 August 2019) https://tirto.id/polisi-tangkap-penjual-data-nasabah-dan-data-kependudukan-egmx,
accessed 21 July 2020.
12 The Jakarta Post, ‘Activists Demand Police Investigate Alleged Hacking of Government Critic Ravio Patra’s
Phone’ (25 April 2020) www.thejakartapost.com/news/2020/04/24/activists-demand-police-
investigate-alleged-hacking-of-government-critic-ravio-patras-phone.html, accessed 23 July 2020.
13 id.
14 ‘Kronologi Penangkapan Ravio Patra Versi Polri’ (27 April 2020) www.cnnindonesia.com/
nasional/20200427104309-12-497555/kronologi-penangkapan-ravio-patra-versi-polri, accessed
28 July 2020.
15 Ibrahim I, ‘Polri Beberkan Kelanjutan Kasus Peretasan Akun Aktivis Ravio Patra’ (1 July 2020) www.
tribunnews.com/nasional/2020/07/01/polri-beberkan-kelanjutan-kasus-peretasan-akun-aktivis-ravio-patra,
accessed 25 July 2020.
16 ‘Kominfo Sindir Marketplace Tak Patuh Sebabkan Kebocoran Data’ (teknologi 11 June 2020) www.
cnnindonesia.com/teknologi/20200611100814-185-512112/kominfo-sindir-marketplace-tak-patuh-
sebabkan-kebocoran-data, accessed 28 July 2020.
252
© 2020 Law Business Research Ltd
Indonesia
Separately, the personal data of 230,000 covid-19 patients was also breached,17 and the public
discovered that an Indonesian government agency left substantive amounts of Indonesian
personal data exposed to the public.18 This breach was unrelated to the PeduliLindungi app
that was launched by the government to tackle the spread of covid-19.19
There was also an allegation of personal data breach of an Indonesian public figure in
early July 2020.20 The breach was alleged to have concerned the figure’s personal data stored
by an Indonesian major telecommunications provider.21 Following the allegation, an internal
investigation discovered that the breach resulted from outsourced personnel.22 The internal
investigation was followed by the filing of an official police report by the telecommunications
provider, which lead to the arrest of the outsourced personnel by the Police.23
All such incidents drive the improvement of personal data protection, privacy, and the
cybersecurity regulatory framework. With the PDP Bill and Cybersecurity Bill on their way,
the government also recently issued Government Regulation No. 71 of 2019 on Electronic
System and Transaction Provision (GR 71/2019), which provides clearer obligations and
rights to electronic system providers,24 including on personal data processing.
17 ‘230 Ribu Data Pasien Covid-19 Di Indonesia Bocor Dan Dijual’ (teknologi 20 June 2020) www.
cnnindonesia.com/teknologi/20200620083944-192-515418/230-ribu-data-pasien-covid-19-di-indonesia-
bocor-dan-dijual, accessed 28 July 2020.
18 ‘Ini Kronologi Tersebarnya Jutaan Data KPU Yang Bocor’ (CNBC Indonesia 22 May 2020) www.
cnbcindonesia.com/tech/20200522141735-37-160286/ini-kronologi-tersebarnya-jutaan-
data-kpu-yang-bocor, accessed 28 July 2020.
19 Fachriansyah R and Syakriah A, ‘COVID-19: Indonesia Develops Surveillance App to Bolster Contact
Tracing, Tracking’ (30 March 2020) www.thejakartapost.com/news/2020/03/30/covid-19-
indonesia-develops-surveillance-app-to-bolster-contact-tracing-tracking.html, accessed 18 July 2020.
20 Wahid AB, ‘Cerita Telkomsel Investigasi Kebocoran Data Denny Siregar’ (detikinet 10 July 2020) https://
inet.detik.com/telecommunication/d-5088551/cerita-telkomsel-investigasi-kebocoran-data-denny-siregar,
accessed 25 July 2020.
21 id.
22 id.
23 id.
24 GR 71/2019 recognises two classification of electronic system provider (ESP), namely ESP for public and
ESP for private. ‘ESP for public’ means a state agency or institutions appointed by a state administrator
agency (except for electronic system providers under the supervision of financial sector authority) that
operates electronic systems. Meanwhile, ‘ESP for private’ means a private person, business entity or
community that operates electronic systems and is supervised or administered by ministries or relevant
agencies or regulated under applicable laws and regulations to provide various services to its customers (e.g.,
procurement goods or services, search engines, administration of financial services).
253
© 2020 Law Business Research Ltd
Indonesia
Primarily, the provisions on personal data protection are regulated by Law 11/2008;
GR 71/2019; and Ministry of Communication and Information Technology Regulation No.
20 of 2016 on Personal Data Protection in Electronic Systems (MCI 20/2016) (collectively
referred as the PDP Regulations). The above laws and regulations cover the general provisions
on personal data processing requirements of electronic systems.
Other personal data and privacy obligations are distributed across several laws and
sectoral regulations including, for example:
a the Criminal Code, which provides various sections that punish confidentiality breaches
and trade secrets that may implicate personal data use or disclosure; and
b Law No. 36 of 1999 on Telecommunication, which requires any telecommunication
service provider to maintain confidentiality of any receipt or information delivered by
their customers.
The current PDP Regulations do not recognise the concept of ‘data controller’ and ‘data
processor’. Both data controllers and data processors are considered as electronic system
providers (ESP),25 and theoretically share the same responsibilities regardless of whether the
organisation is considered as a controller or processor in other jurisdictions. The concept
of ‘data controller’26 and ‘data processor’27 will be recognised under the PDP Bill, bearing
similar concepts to those embedded in European Union General Data Protection Regulation
(GDPR), with the expectation of properly implementing fair information practice principles28
that are implicitly recognised by the current PDP Regulations.
Unlike GDPR, there is no classification of personal data under current PDP Regulations.
Any data or information that identifies or may identify an individual is considered as personal
data.29 However, the PDP Bill will recognise two classifications of personal data: general30 and
specific personal data.31
Separately, the PDP Regulations stipulate that an ESP’s failure to comply with PDP
Regulations may subject that ESP to administrative sanctions, namely,. written warning,
administrative fine, temporary suspension, removal from the ESP registry and access
termination. Under the PDP Bill, non-compliance may result in an administrative fine and
criminal sanctions, which also opens up the possibility of a civil claim.
25 Article 1 Paragraph (4) defines ESP as any person, state administrator, business entity, and the public that
provides, manages, or operates electronic systems individually or jointly to electronic system users for their
own purposes or for other parties’ purposes.
26 Article 1 Paragraph (3) of the PDP Bill defines ‘data controller’ as a party that determines the purposes and
means of the processing of personal data
27 Article 1 Paragraph (4) of the PDP Bill defines a data processor as a party that processes personal data on
behalf of a controller.
28 Article 14 Paragraph (1) of GR 71/2019 in conjunction with Article 2 of MCI 20/2016.
29 Article 1 Paragraph 29 of GR 71/2019 defines personal data as any data on a person that is identified or
may be identified individually or combined with other information both directly and indirectly through an
electronic system or non-electronic system.
30 The general personal data includes: full name, gender, citizenship, religion, or other combined data that can
identify an individual.
31 The specific personal data would include: health data and information, biometric data, genetics, sexual
orientation, political views, crime records, data on minors, personal finances, and other data in accordance
with the applicable laws and regulations.
254
© 2020 Law Business Research Ltd
Indonesia
To ensure compliance, the laws and regulations require an ESP to provide an audit
record on all electronic system activities that are under its management. It may be used for
the purposes of supervision, law enforcement, dispute resolution, verification, testing and
other examinations.
32 Article 14 of GR 71/2019 stipulates that personal data processing shall consist of acquisition and
collection; processing and analysis; retention; improvement and update; display, announcement, transfer,
dissemination and disclosure or deletion or destruction.
255
© 2020 Law Business Research Ltd
Indonesia
The exercise of such requests and rights should be conducted without interfering with
personal data management and should conform with the applicable laws and regulations.
Even though the PDP Regulations do not stipulate the enforcement of such right, the PDP
Bill provides that the request must be submitted in writing to the data controller.
33 Article 1(10) of Law 23/2006 defines population data as structured individual data or aggregated data
resulted from civil recordation and citizen registration activities.
256
© 2020 Law Business Research Ltd
Indonesia
v Technological innovation
There have been several innovations related to data privacy in Indonesia. However, there only
a few regulatory frameworks or standards have been fully implemented in response to the
innovations, such as use of cookies, internet of things, facial recognition and biometric data.
The PDP Regulations have no information on the use of cookies. However, the use of
cookies is recognised under the Indonesian Advertising Ethics (IAE).34 The IAE stipulates
that data collection through cookies should be informed to the individual. If cookies gather
personal data, consent is required from the data subject.
Meanwhile, regarding the internet of things, there are no provisions that specifically
address the issue of personal data protection for the internet of things. So far, regulation
relating to the internet of things is limited to the standardisation and use of radio frequencies,
specifically to the use of low power wide area (LPWA) networks as regulated under Directorate
General of Resources and Post Equipment and Informatics Regulation No. 3 of 2019 on
Technical Requirements for Telecommunication Equipment of Low Power Wide Area.
Biometrics data and facial recognition will be recognised as specific personal data under
the PDP Bill; however, it remains unclear whether specific personal data would receive any
extra protection under the PDP Bill.
Upon completion of the transfer, the ESP is required to submit a transfer report to the MCI
that contains the result of the transfer plan implementation.
The PDP Bill stipulates slightly different requirements for the cross-border transfer of
personal data. Pursuant to the PDP Bill, transfer of personal data outside of Indonesia may
be conducted under the following conditions:
a the designated country has an adequate or higher level of protection of personal data;
b the existence of a treaty between the countries;
c the existence of a contract between data controllers; and
d that consent has been obtained from the data subject.
34 IAE serves as the general advertising guidelines. It applies to any kind of advertising activities on all media,
including the internet. The IAE is a form of industry self-regulation; therefore, it is not a part of the legal
hierarchy in Indonesia. Nonetheless, it serves as a guideline on advertising activities and is adhered to
among entrepreneurs in Indonesia.
257
© 2020 Law Business Research Ltd
Indonesia
ii Data localisation
GR 71/2019 recognises two classifications of ESP: public ESP and private ESP. A public
ESP is obliged to process, manage or collect electronic systems and electronic data within the
Indonesian jurisdiction, unless the required technology to store such data is not available in
Indonesia. Unlike public ESPs, private ESPs can manage, process or store electronic systems
and electronic data outside of the Indonesian jurisdiction. However, the ESP is obliged
to provide access to the electronic system and data for supervisory purposes (i.e., to law
enforcement agencies and the relevant authorities).
The PDP Bill also stipulates similar requirements. Data controllers and data processors are
obliged to prepare and apply any necessary operational technical measures to protect the
personal data from personal data disturbance or interference, and to determine the level of
personal data security by taking into account the nature of and risks concerning the personal
data.
258
© 2020 Law Business Research Ltd
Indonesia
specific provisions on cross-border personal data transfer related to requests from foreign
governments, coordination requirements for cross-border transfer as stipulated under MCI
20/2016 may be applicable. There is no regulation on disclosure related to civil proceedings.
35 Franedya R, ‘OJK Tutup 133 Fintech Ilegal Ini, Minta Kominfo Blokir’ (10 October 2019) www.
cnbcindonesia.com/tech/20191010062344-37-105780/ojk-tutup-133-fintech-ilegal-ini-minta-kominfo-
blokir, accessed 1 August 2020.
259
© 2020 Law Business Research Ltd
Indonesia
via websites and WhatsApp accounts. Upon arresting the suspect, the police found out that
the suspect distributed 761,435 cellular phone numbers, 129,421 credit card numbers,
1,162,864 ID Card Numbers, 50,854 Family Cards and 64,164 bank account numbers. The
suspect may receive the maximum nine years’ imprisonment and a fine of 3 billion rupiahs.
Details of the investigation process and current situation have not been released to the public.
36 Article 1 (3) of Law 5/1986 defined ‘administrative decree’ as a written stipulation that is issued by an
administrative body of official, which contains an administrative legal act based on prevailing laws and
regulations, which is concrete, individual, and final and that establishes legal effect upon a person or civil
legal entity.
37 Article 1(2) of Law 5/1986 defines ‘administrative body of official’ as a body of official that undertakes
governmental affairs based on prevailing laws and regulations.
38 ‘Sidang Gugatan Rp 21,9 M Atas Facebook Indonesia Dimulai 21 Agustus’ (Kumparan 14 March 2019)
https://kumparan.com/kumparantech/sidang-gugatan-rp-21-9-m-atas-facebook-
indonesia-dimulai-21-agustus, accessed 22 July 2020.
39 Asih DN, ‘Tokopedia Tanggapi Gugatan Rp100 M Soal Data Pengguna Bocor’ (CNN Indonesia
11 June 2020) www.cnnindonesia.com/teknologi/20200611071643-185-512034/tokopedia-tanggapi-
gugatan-rp100-m-soal-data-pengguna-bocor, accessed 18 July 2020.
40 Jelita I, ‘Serius Bahas RUU PDP, DPR Targetkan Tuntas September’ (Media Indonesia 6 July 2020) https://
mediaindonesia.com/read/detail/325827-serius-bahas-ruu-pdp-dpr-targetkan-tuntas-september; accessed
14 July 2020.
260
© 2020 Law Business Research Ltd
Indonesia
this may change upon enactment of the PDP Bill. This requirement may be concerning
to various foreign organisations that have adjusted their practice to fit with the GDPR.
Notwithstanding this, the PDP Regulations apply to any organisation processing Indonesian
personal data located in Indonesia and abroad, which requires every organisation to obtain
consent to process any Indonesian personal data.
The PDP Regulations and PDP Bill have extraterritorial application. This principle, as
stated in Article 2 of Law 11/2008, stipulates that Law 11/2008, including its implementing
regulations, is applicable to any individual and any organisation located in Indonesia or
abroad that has a legal impact on Indonesian territory or abroad that is detrimental to
Indonesian interests. A similar provision is also stipulated in the PDP Bill. Accordingly, since
processing Indonesian personal data has a legal impact on Indonesian individuals, Indonesian
interests or both, the PDP Regulations and PDP Bill will also apply to foreign organisations.
Additionally, the absence of enforcement practices by authorities may pose significant
concern to foreign entities in understanding the authorities’ attitude in interpreting the
applicable laws. The degree of inconsistency and uncertainty in the interpretation of the PDP
Regulations may lead to certain provisions being interpreted vaguely or ambiguously.
261
© 2020 Law Business Research Ltd
Indonesia
b the controller’s core activities regarding the personal data require constant, regular and
systematic monitoring of the data on a large scale; or
c the core activities consist of large-scale processing of specific personal data or personal
data related to criminal offences.
iv Data retention
Generally, MCI 20/2016 stipulates that the retention period for personal data in an electronic
system be a minimum of five years if there are no specific sectoral regulations that stipulate
otherwise.
X OUTLOOK
The DPR is in the middle of finalising the PDP Bill and is aiming to enact the law by
the end of 2020. The PDP Bill will serve as an umbrella law to ensure the protection of
personal data, especially in this digital economy era with its vast development of information
and technology. The PDP Bill may provide a two-year grace period, to allow existing ESPs
that have been actively processing personal data to fully comply with all the requirements
stipulated under the PDP Bill.
The PDP Bill will play a vital role in the protection of personal data as it will encourage
and strengthen the position of the national telecommunication and technology industry,
as well as development of the Indonesian economy in general. Being the first personal data
protection law in Indonesia, the PDP Bill will provide strict conditions and obligations to
data controllers and processors regarding the collection and processing of personal data.
Compliance with the PDP Bill shall ensure protection of consumers’ data, which could
increase the element of trust that consumers have in companies. As the enactment of the PDP
Bill is only months away, companies should start to prepare for compliance with the Bill.
It is still unclear how the PDP Bill, if enacted, will interact with other jurisdictions’
personal data, especially the GDPR and the California Consumer Privacy Act (CCPA),
regarding cross-border transfers and multi-jurisdiction operations – especially with the
recent Data Protection Commission v. Facebook Ireland decision of the Court of Justice of the
European Union, which adds an extra layer of requirement on cross-border transfers from
the EU to third-party countries. Indonesia may be required to provide an adequate level
of protection before any transfer can happen, potentially hampering the multi-jurisdiction
operations of data controllers and processors. Meanwhile, for the CCPA, the impact remains
to be seen since its applicability scope is quite limited and the enforcement actions were only
initiated in July 2020.
262
© 2020 Law Business Research Ltd
Chapter 18
JAPAN
Tomoki Ishiara1
I OVERVIEW
In Japan, the Act on the Protection of Personal Information2 (APPI) primarily handles the
protection of data privacy issues. The APPI was drastically amended in 2016 and has been
in full force since 30 May 2017. Prior to the amendment, the APPI was applied solely to
business operators that have used any personal information database containing details
of more than 5,000 persons on any day in the past six months3 but this requirement was
eliminated by the amendment. Under the amendment to the APPI in 2017, the Personal
Information Protection Commission (PPC) was established as an independent agency whose
duties include protecting the rights and interests of individuals while promoting proper and
effective use of personal information. Since the amendment to the APPI in 2017, the legal
framework has been drastically changed and the PPC has primary responsibility for personal
information protection policy in Japan. Prior to the amendment, as of July 2015, 39 guidelines
for 27 sectors regarding personal information protection were issued by government agencies,
including the Ministry of Health, Labour and Welfare,4 the Japan Financial Services Agency,5
and the Ministry of Economy, Trade and Industry.6 Under the amendment to the APPI,
however, the guidelines (the APPI Guidelines)7 that prescribe in detail the interpretations and
practices of the APPI are principally provided by the PPC, with a limited number of special
guidelines provided to specific sectors (such as medical and financial ones) by the PPC and
the relevant ministries.8
263
© 2020 Law Business Research Ltd
Japan
Pursuant to the supplemental provisions of the amendment to the APPI, the APPI is to
be reviewed for any necessary update triennially.9 In 2020, as a result of the triennial review
by the PPC, the further amendment to the APPI was enacted on 12 June 2020 and will be in
effect within two years after the enactment.
9 Article 12 of the supplemental provisions of the Act on the Protection of Personal Information.
10 Strategic Headquarters for the Promotion of an Advanced Information and Telecommunications Network
Society.
11 http://japan.kantei.go.jp/policy/it/20140715_2.pdf.
12 The European Commission pointed out the lack of a data protection authority in the Japanese system in
its report: Korfe, Brown, et al., ‘Comparative study on different approaches to new privacy challenges, in
particular in the light of technological developments’ (20 January 2010).
13 Act on the Use of Numbers to Identify a Specific Individual in the Administrative Procedure (Act No. 27
of 2013). See Section II.ii.
14 Article 61 APPI.
264
© 2020 Law Business Research Ltd
Japan
Framework for promoting the use of personal data (big data issues)
The use of personal data is expected to create innovation with the multidisciplinary utilisation
of diverse and vast amounts of data, thereby creating new businesses. However, the system
under the previous APPI required consent from principals to use their personal data for
purposes other than those specified. Accordingly, providing personal data to third parties
was cumbersome for businesses, and created a barrier to the use of personal data, especially
launching new business using big data. Under the amendment to the APPI, a business
operator handling personal information may produce anonymously processed information
(limited to information constituting anonymously processed information databases, etc.) and
process personal information in accordance with standards prescribed by the PPC rules such
that it is impossible to identify a specific individual from, or de-anonymise, the personal
information used for the production.17 This amendment allows various businesses to share
with other businesses the personal data maintained by them, and so develop or foster new
business or innovation.
15 Article 24 APPI.
16 Article 23 APPI.
17 Article 36(1) APPI.
265
© 2020 Law Business Research Ltd
Japan
266
© 2020 Law Business Research Ltd
Japan
d Japan shall ensure the same level of protection in non-EU countries as the one provided
in Japan under the APPI if personal information coming from the EU is transferred
from Japan to non-EU countries; and
e for the anonymisation of personal information coming from the EU, the complete
deletion of a method of re-identification would be required.26
26 Article 36(2) APPI does not require a personal information handling business operator to delete the
information on a method of anonymisation but take actions for security control such information.
27 Article 30(5), (6) APPI.
28 Article 28(5) APPI.
29 Article 28(1), (2) APPI.
30 Article 28(4) APPI.
31 Article 23(2) APPI.
32 Article 2 (7) APPI. Prior to the amendment in 2020, the personal data that is to be deleted within six
months was not recognised as personal data retained by a business operator handling personal information.
267
© 2020 Law Business Research Ltd
Japan
a imposes an obligation to report any personal data leak incident that falls under certain
categories to be specified by the PPC;33, 34 and
b prohibits a business operator handling personal information from handling personal
data in an inappropriate way that may facilitate illegal or improper action.35
Expansion of extraterritorial application of the PPC’s order and imposition of the new
obligation on international transfer
The amendment to the PPI in 2020:
a entitles the PPC to oblige a overseas business operator handing personal information41
in connection with any product or service provided to individuals in Japan to report on
268
© 2020 Law Business Research Ltd
Japan
something designated by the PPC and to issue an order for improvement, a violation
of which may lead to the public announcement by the PPC of such violation and may
further subject to the fine sanction; and
b requires a business operator handling personal information to provide a data subject
with any information on how a foreign receiver of his or her personal data handles it in
the case of the personal data’s international transfer.42
269
© 2020 Law Business Research Ltd
Japan
Personal data51
‘Personal data’ comprises personal information constituting a personal information database,
etc. (when personal information such as names and addresses is compiled as a database, it is
personal data in terms of the APPI).
270
© 2020 Law Business Research Ltd
Japan
271
© 2020 Law Business Research Ltd
Japan
272
© 2020 Law Business Research Ltd
Japan
Correction
When a business operator handling personal information is requested by a person to correct,
add or delete such retained personal data as may lead to the identification of the person on
the ground that the retained personal data are incorrect, the business operator must make an
investigation without delay within the scope necessary for the achievement of the purpose of
use and, on the basis of the results, correct, add or delete the retained personal data, except
in cases where special procedures are prescribed by any other laws and regulations for such
correction, addition or deletion.71
273
© 2020 Law Business Research Ltd
Japan
72 The revision bill of the Number Use Act was passed on 3 September 2015. The purpose of this revision was
to provide further uses for the numbering system (e.g., management of personal medical history).
73 www.ppc.go.jp/en/aboutus/commission/.
74 Act No. 26 of 17 April 2002.
75 Act No. 57 of 4 June 1976.
76 Article 75 APPI.
274
© 2020 Law Business Research Ltd
Japan
275
© 2020 Law Business Research Ltd
Japan
83 8-4 (Human Security Control Measures) and 3-3-3 (Supervision of Employees) of the APPI Guidelines,
pp. 92, 41.
84 8-5 (Physical Security Control Measures) of the APPI Guidelines, p. 93.
85 8-6 (Technical Security Control Measures) of the APPI Guidelines, p. 96.
276
© 2020 Law Business Research Ltd
Japan
ii Disclosure
When a business operator handling personal information is requested by a person to disclose
such retained personal data as may lead to the identification of the person, the business
operator must disclose the retained personal data without delay by a method prescribed by a
Cabinet Order.86 However, in the following circumstances, the business operator may keep
all or part of the retained personal data undisclosed where disclosure:
a is likely to harm the life, person, property, or other rights or interests of the person or
a third party;
b is likely to seriously impede the proper execution of the business of the business operator
handling the personal information; or
c violates other laws and regulations.87
Main penalties89
A business operator that violates orders issued under Paragraphs 2 or 3 of Article 42
(recommendations and orders by the PPC in the event of a data security breach) shall be
sentenced to imprisonment with forced labour of not more than six months or to a fine of
not more than ¥300,000.90
A business operator that does not make a report91 as required by Articles 40 or 56 or
that has made a false report shall be sentenced to a fine of not more than ¥300,000.92
86 The method specified by a Cabinet Order under Article 28(2) APPI shall be the provision of documents (or
‘the method agreed upon by the person requesting disclosure, if any’). Alternatively, according to the APPI
Guidelines, if the person who made a request for disclosure did not specify a method or make any specific
objections, then they may be deemed to have agreed to whatever method the disclosing entity employs.
87 Article 28(2) APPI.
88 Article 44 APPI.
89 The Unfair Competition Prevention Act (Act No. 47 of 1993) prohibits certain acts (unfair competition),
including an act to acquire a trade secret from the holder by theft, fraud or other wrongful methods; and
an act to use or disclose the trade secret so acquired. For the prevention of unfair competition, the Act
provides measures, such as injunctions, claims for damages and penal provisions (imprisonment for a term
not exceeding 10 years or a fine in an amount not exceeding ¥20 million. In the case of a juridical person,
a fine not exceeding ¥1 billion (in certain cases the fine is not to exceed ¥500 million) may be imposed
(Articles 21 and 22)).
90 Article 84 APPI.
91 The PPC may have a business operator handling personal information make a report on the handling of
personal information to the extent necessary for fulfilling the duties of a business operator (Articles 40 and
56 APPI).
92 Article 85 APPI.
277
© 2020 Law Business Research Ltd
Japan
278
© 2020 Law Business Research Ltd
Japan
279
© 2020 Law Business Research Ltd
Japan
280
© 2020 Law Business Research Ltd
Japan
Finally, the Basic Act on Cybersecurity, which provides the fundamental framework of
cybersecurity policy in Japan, was passed in 2014.103
In addition, the PPC has the authority to collect reports from, or advise, instruct or give
orders to, the data controllers.105
An organisation that is involved in a data breach may, depending on the circumstances,
be subject to the suspension, closure or cancellation of the whole or part of its business
operations, an administrative fine, penalty or sanction, civil actions and class actions or a
criminal prosecution.
X OUTLOOK
i The future development of the APPI
As stated in Section II, the amendment to the APPI, which entered fully into force in May
2017, drastically changed the legal framework for the protection of personal information
in Japan. As anticipated, since the amendment, the PPC has been playing a critical role in
articulating the new privacy law and policy in Japan. Thus, continuous attention should
be paid to its activities for insight into the future development of the APPI. The PPC has
continued to hear from relevant parties for its review of the APPI every three years, and has
monitored day-to-day practice in various sectors of Japanese society. The PPC’s review and
monitoring led to the amendment of the APPI in 2020. In accordance with Article 12 of
the supplemental provisions of the APPI, the PPC will continue to monitor the handling of
281
© 2020 Law Business Research Ltd
Japan
personal information and personal data and will consider whether the current law needs to
be updated for the next three years. The PPC may propose some revisions of the APPI based
upon the above activities and achievements.
282
© 2020 Law Business Research Ltd
Chapter 19
MALAYSIA
Shanthi Kandiah1
I OVERVIEW
The Personal Data Protection Act 2010 (PDPA), which came into force on 15 November 2013,
sets out a comprehensive cross-sectoral framework for the protection of personal data in
relation to commercial transactions.
The PDPA was seen as a key enabler to strengthen consumer confidence in electronic
commerce and business transactions given the rising number of cases of credit card fraud,
identity theft and selling of personal data without customer consent. Before the PDPA, data
protection obligations were spread out among certain sectoral secrecy and confidentiality
obligations, while personal information was primarily protected as confidential information
through contractual obligations or civil actions for breach of confidence.
The PDPA imposes strict requirements on any person who collects or processes
personal data (data users) and grants individual rights to ‘data subjects’. Enforced by the
Commissioner of the Department of Personal Data Protection (the Commissioner), it
is based on a set of data protection principles akin to that found in the Data Protection
Directive 95/46/EC of the European Union (EU)2 and, for this reason, the PDPA is often
described as European-style privacy law. An important limitation to the PDPA is that it does
not apply to the federal and state governments.3
The processing of information by a credit reporting agency is also exempted from the
PDPA. In the past, credit reporting agencies did not fall under the purview of any regulatory
authority in Malaysia, drawing heavy criticism for inaccurate credit information reporting.
The Credit Reporting Agencies Act 2010, which came into force on 15 January 2014, now
provides for the registration of persons carrying on credit reporting businesses under the
regulatory oversight of the Registrar Office of Credit Reporting Agencies, a division under
the Ministry of Finance, which is charged with developing a regulated and structured credit
information sharing industry.
1 Shanthi Kandiah is a partner at SK Chambers. She was assisted in writing this chapter by Thong Xin Lin
and Nimraat Kaur.
2 The EU Data Protection Directive 95/46/EC has now been replaced with the EU General Data Protection
Regulation, which came into force on 25 May 2018.
3 There is some ambiguity about which public entities fall within this definition. It does not appear that
agencies and statutory bodies established under Acts of Parliament or state enactments to perform
specific public functions, such as Bank Negara Malaysia (BNM), the Employees Provident Fund, the
Securities Commission Malaysia and the Companies Commission of Malaysia, fall within the scope of this
exemption.
283
© 2020 Law Business Research Ltd
Malaysia
i Cybersecurity
The PDPA enumerates the security principle as one of its data protection principles.
Under this principle, an organisation must ensure both technical and organisational
security measures are well in place to safeguard the personally identifiable information that
it processes. The ISO/IEC 27001 Information Security Management System (ISMS), an
international standard, which deals with information technology systems risks such as hacker
attacks, viruses, malware and data theft, is the leading standard for cyber risk management
in Malaysia.
Sectoral regulators such as the Central Bank of Malaysia (BNM) and the Securities
Commission Malaysia have also been actively tackling issues relating to cybersecurity in
relation to their relevant sectors by issuing guidelines and setting standards for compliance
(discussed in Section IX).
The intersection between privacy and cybersecurity also manifests in the extent of the
tolerance for government surveillance activity: the PDPA does not constrain government
access to personal data, (discussed in Section VI). The reasons given to justify broad
government access and use include national security, law enforcement and the combating of
terrorism.
4 https://www.malaymail.com/news/malaysia/2020/02/12/minister-govt-to-consult-public-on-amendments-
to-personal-data-protection-l/1836984.
284
© 2020 Law Business Research Ltd
Malaysia
Cybersecurity issues have also received significant media attention during the covid-19
outbreak, where there was increased use of and reliance on technology as Malaysia faced
a movement control order. In particular, it was reported that cybersecurity cases increased
by 82.5 per cent as compared to 2019.6 Currently, Malaysia does not have a specific law
addressing cybersecurity-related offences. Enforcement agencies, such as the National Cyber
Security Agency, have to rely on existing legislation, such as the Communications and
Multimedia Act 1998 (CMA), the Defamation Act 1957 and the Sedition Act 1948, to
combat cyberthreats.7
285
© 2020 Law Business Research Ltd
Malaysia
The PDPA also sets up a co-regulatory model that emphasises the development of
enforceable industrial codes of practice for personal data protection against the backdrop of
the legal requirements of the government. Codes of Practice that have been approved and
registered by the Commissioner include the Personal Data Protection Code of Practice for
the:
a utilities sector (electricity);9
b insurance/takaful industry;10
c banking and financial sector;11
d licensees under the Communications and Multimedia Act 1998;12 and
e Malaysian aviation sector.13
Personal data
Three conditions must be fulfilled for any data to be considered as ‘personal data’ within the
ambit of the PDPA.15
First, the data must be in respect of commercial transactions. ‘Commercial transactions’
is defined under the PDPA as transactions of a commercial nature, whether contractual or
not, and includes any matter relating to the supply or exchange of goods or services, agency,
investments, financing, banking and insurance.16 There is some ambiguity as to whether an
activity must have a profit motivation to be considered a commercial transaction.
Second, the information must be processed or recorded (electronically) or recorded as
part of a filing system.
Third, the information must relate directly or indirectly to a data subject who is
identifiable from the information or other information in the possession of the data user.
A central issue for the application of the PDPA is the extent to which information can be
linked to a particular person. If data elements used to identify the individual are removed, the
remaining data becomes non-personal information, and the PDPA will not apply.17
286
© 2020 Law Business Research Ltd
Malaysia
Sensitive personal data may only be processed with the explicit consent of the data subject
and in the limited circumstances set out in the PDPA.19
Data user
‘Data user’ means a person who either alone or jointly or in common with other persons
processes any personal data or has control over or authorises the processing of any personal
data, but does not include a data processor.20 A data user under the PDPA is analogous to a
data controller under EU laws.
Data processor
‘Data processor’ means any person, other than an employee of the data user, who processes
the personal data solely on behalf of the data user, and does not process the personal data
for his or her own purposes.21 An example of a data processor would be a third-party cloud
computing service provider.
287
© 2020 Law Business Research Ltd
Malaysia
Most of the obligations under the PDPA apply to a data user. A data processor who
processes personal data solely on behalf of a data user is not bound directly by the provisions
of the PDPA.
The list of data users was expanded in 2016 to include two additional sectors: pawnbrokers
and moneylenders.23 Failure to register by these categories of data users is an offence.24
Purpose limitation
A data user may not process personal data unless it is for a lawful purpose directly related to
the activity of the data user, the processing is necessary or directly related to the purpose, and
the personal data are adequate and not excessive in relation to that purpose.
The data subject must also consent to the processing of the personal data unless the
processing is necessary for specific exempted purposes.25
Consent
The PDPA does not define ‘consent’; nor does it prescribe any formalities in terms of the
consent. However, the Personal Data Protection Regulations 2013 (the Regulations) provide
that the consent obtained must be recorded and maintained properly by the data user. The
Regulations further provide that the Commissioner or an inspection officer may require
production of the record of consent. It places the burden of proof for consent squarely on
the data user.
Some classes of data users may also refer to the codes of practice issued by the
Commissioner for the respective classes of data users on this topic. For example, the Personal
23 Personal Data Protection (Class of Data Users) (Amendment) Order 2016, which came into effect on
16 December 2016.
24 Section 16(4) of the PDPA.
25 Section 6(2) of the PDPA.
288
© 2020 Law Business Research Ltd
Malaysia
Data Protection Code of Practice for the Utilities Sector (Electricity) provides examples of
consent, whether express or implied, that must be recorded or maintained by the data user
which includes:
a signatures, or a clickable box indicating consent;
b deemed consent;
c verbal consent (verbal consent should be recorded digitally or via a written confirmation
that consent was given); and
d consent by conduct or performance. Consent is deemed given by way of conduct or
performance if the data subject does not object to the processing; the data subject
voluntarily discloses its personal data; or the data subject proceeds to use the services
of the data user.
Explicit consent
As stated above, explicit consent is one of the basis for the processing of sensitive personal
data.26 The PDPA does not specify what amounts to explicit consent, although it is likely that
the standard of obtaining such consent would be higher than obtaining consent per se. Certain
classes of data users may refer to the codes of practice issued by the Commissioner for the
respective classes of data users on this topic. For example, the Personal Data Protection Code
of Practice for the Utilities Sector (Electricity) provides the following examples of explicit
consent: where the data subject provides his or her identification card to be photocopied or
scanned by the data user; where the data subject voluntarily provides the sensitive personal
data to the data user; and the data subject provides verbal statements giving consent for the
processing of personal data that have been recorded or maintained.
Notification
Data users are obliged to notify a data subject that, among others, their personal data is being
processed by or on behalf of the data user, and the purposes for which the personal data is
being or is to be collected and further processed. For example, where a data user intends to use
personal information collected for a different purpose, such as marketing communications,
the data user must provide the affected individuals with the choice to disagree with the
purpose before doing so.
Disclosure
Data users shall not disclose personal data for any purpose other than that for which the
data was disclosed at the time of collection, or for a purpose directly related to it; or to any
party other than a third party of the class notified by the data user without a data subject’s
consent.27
Retention
Personal data should not be kept longer than necessary. Retention policies must take into
account any relevant requirements imposed by applicable legislation. However, the Standards
appear to impose organisational requirements that may be challenging for organisations to
289
© 2020 Law Business Research Ltd
Malaysia
comply with. Personal data collection forms are required to be destroyed within a period
of 14 days, unless the forms can be said to have some ‘legal value’ in connection with
the commercial transaction. It is unlikely that this time frame would be feasible for most
organisations.
A record of destruction should be properly kept and be made available when requested
by the Commissioner.
Complaint
Under the PDPA, the data subject can make a written complaint to the Commissioner about
an act, practice or request:
a specified in the complaint;
b engaged in by the data user specified in the complaint;
c that relates to personal data of which the individual is the data subject; and
d that may be in contravention of the PDPA including any codes of practice.33
iv Technological innovation
In general, the regulatory framework has not developed specific rules (outside the application
of the seven principles in the PDPA) to deal with data privacy issues created by cookies,
online tracking, cloud computing, the internet of things or big data.
290
© 2020 Law Business Research Ltd
Malaysia
Minors
Generally, the PDPA does not contain specific protection for minors (below the age of 18).
However, the Regulations provide that a data user must obtain consent from the parent,
guardian or person who has parental responsibility on the data subject if the data subject is
a minor. Further, as a ‘relevant person’ under the PDPA,36 such parent, guardian or person
who has parental responsibility is entitled to make a complaint, data access request or data
correction request for the minor.
Financial institutions
A banker’s duty of secrecy in Malaysia is statutory as is clearly provided under Section 133(1)
of the Financial Services Act 2013 (FSA). The duty is not absolute.37 Section 153 of the FSA
provides the legal basis for BNM to share a document or information on financial institutions
with an overseas supervisory authority.38
The Guidelines on Data Management and MIS39 Framework issued by BNM sets out
high-level guiding principles on sound data management and MIS practices that should
be followed by financial institutions. It is noteworthy that boards of directors and senior
management are specifically entrusted with the duty to put in place a corporate culture that
reinforces the importance of data integrity.
In January 2017, the Commissioner also released the Personal Data Protection Code of
Practice for the Banking and Financial Sector.
Healthcare
The Medical Act 1971 is silent on the duty of confidentiality. The Confidentiality Guidelines
issued by the Malaysian Medical Council in October 2011, after the PDPA was enacted, are
the most comprehensive articulation of the confidentiality obligation of health professionals.
36 Section 4 of the PDPA provides that in the case of a data subject who is below the age of 18 years, the
‘relevant person’ in relation to a data subject means the parent, guardian or person who has parental
responsibility for the data subject.
37 Schedule 11 of the FSA sets out a list of permitted disclosures.
38 See also Section 165 of the Islamic Financial Services Act 2013.
39 Management Information System.
291
© 2020 Law Business Research Ltd
Malaysia
in scope to the seven PDPA principles) for the telecommunications and multimedia sectors.40
The GCC binds all licensed service providers under the CMA and all non-licensed service
providers who are members of the Consumer Forum.41
Direct selling
The PDPA prescribes direct sellers as one of the 11 classes of data users that must register with
the Personal Data Protection Department.
The PDPA also gives consumers the right to request in writing that the direct seller stop
or not begin processing their personal data. Failure to cease using personal data for direct
marketing purposes after a data subject has objected could make the offender liable for a fine
of up to 200,000 ringgit, imprisonment for up to two years, or both.
Unlike EU laws, Malaysian law does not require transfer contracts to be made for the benefit
of third parties. Malaysia also has a doctrine of privity of contract that prevents enforcement
of third-party benefits by data subjects.
40 The GCC is currently under review and a public consultation paper was released for the revised GCC
from 3 March 2020 until 16 April 2020. In the revised GCC, it appears that the provision on protection
of personal information has been omitted. In any event, it can be argued that the PDPA still applies to
licensees of the CMA.
41 The Malaysian Communications and Multimedia Content Code also sets out privacy-related restrictions.
42 (PCP) No. 1/2017.
292
© 2020 Law Business Research Ltd
Malaysia
iv Data mapping over collection, use, sale of data, transfers, storage, etc.
There are no specific requirements relating to data mapping; however, a data user is required
to ensure the requirements of the PDPA are complied with when processing personal data.
For example, personal data must not be processed unless it is necessary for or directly related
to the purpose in which it was collected.
293
© 2020 Law Business Research Ltd
Malaysia
vii Data subject opt-in, opt-out, access, deletion and portability rights
In addition to the need for consent, the Public Consultation Paper (No. 1/2014) titled the
Guide to Dealing with Direct Marketing under the Personal Data Protection Act (PDPA)
2010 provides that an individual must be given the right to refuse the use of personal data
for direct marketing.44 In the case of direct marketing by electronic means, an opt-out right
must be made available on every subsequent marketing message. The right of portability is
not available under the PDPA.
viii Requirement for data privacy due diligence and oversight over third parties
The PDPA and the Standards require data users, in discharging the security principle, to
bind third parties contractually to ensure the safety of personal data from misuse, loss,
modification, unauthorised access and disclosure. Some organisations do take the additional
step of reserving audit rights over third parties processing personal data on their behalf, but
this is not currently mandated.
ix Privacy by design
Privacy by design has not been mandated by the Commissioner.
294
© 2020 Law Business Research Ltd
Malaysia
This power arises where the delay in obtaining a search warrant is reasonably likely to
adversely affect investigation, or where evidence runs the risk of being tampered with,
removed, damaged or destroyed.
Section 263(2) of the CMA is particularly noteworthy. Internet service providers as
licensees under the CMA must comply with the Malaysian Communications and Multimedia
Commission (MCMC) or any other authorities that make a written request for their assistance
in preventing an offence or the attempt of any crime listed under Malaysian law.
Section 263(2) is broad enough to permit authorities to gain access to telecommunications
information such as contact information and content of communications.
The Commissioner’s authorised public officers also have various powers of enforcement
under the PDPA, including:
a conducting investigations on the commission of any offence under the PDPA;
b conducting searches and seizure of data users’ computers, books, accounts, computerised
data, or documents, containing or reasonably suspected to contain information relating
to an offence as well as equipment, instruments or articles reasonably believed to furnish
evidence of the commission of an offence, with or without a warrant;
c requiring the production of computers, books, accounts, computerised data or other
documents kept by data users; and
d arresting without warrant any person who the authorised public officer reasonably
believes has committed or is attempting to commit an offence under the PDPA.
295
© 2020 Law Business Research Ltd
Malaysia
47 https://www.pdp.gov.my/jpdpv2/berita_terkini/pengguna-data-yang-telah-dikenakan-tindakan-di-
bawah-akta-perlindungan-data-peribadi-2010-akta-709/.
48 NACSA was established in February 2017 and is the national lead agency for cybersecurity matters, with
the objective of securing and strengthening Malaysia’s resilience in facing threats of cyberattacks.
49 https://www.mycert.org.my/portal/statistics-content?menu=b75e037d-6ee3-4d11-8169-
66677d694932&id=0d39dd96-835b-44c7-b710-139e560f6ae0.
50 https://www.mycert.org.my/portal/statistics-content?menu=b75e037d-6ee3-4d11-8169-
66677d694932&id=8777a7a3-fcd5-44bb-8426-f109e7fc5963.
296
© 2020 Law Business Research Ltd
Malaysia
national body established to monitor national e-security, and comes under the purview of the
Ministry of Science, Technology and Innovation. The abovementioned figures do not include
those cases that go unreported almost daily, as there is no requirement under the PDPA to
report breaches to the authorities or to customers.
In August 2018, the Commissioner issued a Public Consultation Paper (No. 1/2018)
titled the Implementation of Data Breach Notification (the DBN Consultation Paper). The
DBN Consultation Paper suggests that data users are required to, among other things, notify
the Commissioner within 72 hours of becoming aware of the data breach, provide details
of the data breach, provide details on actions taken to contain the breach and whether the
organisation’s staff has received training on data protection in the last 24 months. The 72
hours’ time frame to notify the Commissioner would mirror the data breach notification
requirement under the GDPR. However, to-date, the DBN Consultation Paper has not been
formalised.
It is worth noting, however, that one of the issues being considered under the review of
the PDPA in the PDPA Consultation Paper is mandatory reporting of data breach incidents.
The BNM issued the policy document on Risk Management in Technology (RMiT
policy document) and Electronic Know-Your-Customer (e-KYC) (e-KYC policy document)
on 19 June 2020 and 30 June 2020 respectively. The RMiT policy document, among others,
sets out the board and senior management responsibilities, the responsibilities of the chief
information security officer, the requirement for financial institutions to establish a robust
framework for managing technology projects, the requirement to conduct due diligence on
third-party service providers, the requirement to conduct risk assessment prior to conducting
cloud services, and to provide adequate and regular technology and cybersecurity awareness
training. The e-KYC policy document sets out the minimum requirements and standards
a financial institution must observe in implementing e-KYC for the identification and
verification of individuals.
The Securities Commission Malaysia also issued its Guidelines on Management of
Cyber Risk,51 which sets out, among others, roles and responsibilities of the board of directors
and management in the oversight and management of cyber risk and cyber risk policies and
procedures that should be developed and implemented by capital market entities.
i Cyber laws
In contrast to the comprehensive approach of the PDPA, Malaysia’s cyberlaws are scattered
across various pieces of legislation. Presently, the key provisions of Malaysia’s cyberlaws are
as follows.
CMA
Offences under the CMA include:
a the offence of the use of network facilities or network services by a person to transmit
any communication that is deemed to be offensive and that could cause annoyance to
another person;52
b the offence of using an apparatus or device without authority;53
297
© 2020 Law Business Research Ltd
Malaysia
c the offence of improper use of network facilities or network services – such as annoying,
abusive, threatening, harassing or obscene communications – emails (spamming), SMS
or MMS website content publishing;54
d the offence of interception and disclosure of communications;55 and
e the offence of damage to network facilities.56
X OUTLOOK
While we saw more enforcement actions by the Commissioner in the previous year, the
Commissioner continues to pursue its ‘audit’ type regulation (as opposed to prosecution) via
inspection visits and enforcement notices as the primary means of instilling awareness among
298
© 2020 Law Business Research Ltd
Malaysia
data users on their data protection obligations. The Commissioner’s Advisory, in connection
with the conditional movement restriction order, again signalled the ‘audit approach’ as the
Commissioner communicated its intention to carry out monitoring from time to time to
assess level of compliance.
The impact of covid-19 is evident not just in respect of data protection but also
cybersecurity. It was reported that some 3,906 complaints were lodged to the Cyber999
Help Centre during the movement control order period from March 18 to June 30, an
increase of more than 90 per cent compared with the same period last year. Reported cases
involved cyberbullying, fraud, intrusion, hacking attempt and spam, which mostly occurred
in urban areas with high-speed internet connection.61 Discussions were held between the
MCMC, CyberSecurity Malaysia and private entities to allow them to carry out their duties
accordingly in the fight against cybercrime.
In light of the GDPR, it appears that the Commissioner has starting taking steps to
review the PDPA by issuing the PDPA Consultation Paper earlier this year. However, as stated
above, it remains to be seen whether any headway will be made with the PDPA Consultation
Paper with the recent change of government.
299
© 2020 Law Business Research Ltd
Chapter 20
MEXICO
César G Cruz Ayala, Diego Acosta Chin and Marcela Flores González1
I OVERVIEW
The right to privacy or intimacy is contemplated in Paragraphs 1 and 12 of Article 16 of
the Mexican Constitution, and prohibits the intrusion of an individual’s person, family,
domicile, documents or belongings (including any wiretapping communication devices),
except when ordered by a competent authority supported by the applicable law. The right to
data protection is stipulated in Paragraph 2 of Article 16 of the Constitution, and seeks to set
a standard for collecting, using, storing, disclosing or transferring (collectively, processing)
of personal data (as defined below) to secure the right to privacy and self-determination.
The right to privacy and data protection are closely related fundamental rights that seek
to protect individuals’ ability to guard a portion of their lives from the intrusion of third
parties. Notwithstanding this, while a breach of privacy usually results in a breach of the
right to personal data protection, a data protection breach does not always result in a breach
of privacy.
The first formal effort to address personal data protection was introduced in 2002
when Mexican Congress approved the Federal Law for Transparency and Access to
Public Governmental Information (the Former Transparency Law). Although the Former
Transparency Law was mainly aimed at securing access to any public information in the
possession of the branches of government and any other federal governmental body, it also
incorporated certain principles and standards for the protection of personal data being
handled by those government agencies. This effort was followed by similar legislation at the
state level.
After several attempts to address data protection rights more decisively, in 2009 Congress
finally approved a crucial amendment to the Constitution that recognised the protection of
personal data as a fundamental right. Consequently, Congress enacted the Federal Law for
the Protection of Personal Data in Possession of Private Parties (the Private Data Protection
Law), which came into effect on 6 July 2010 and was followed by the Regulations of the
Private Data Protection Law on 22 December 2011.
In January 2014, Congress approved an amendment to the Constitution to create an
autonomous entity to be in charge of enforcing the Private Data Protection Law and to take
on the duties of the former Federal Institute for Access to Information and Protection of Data
(the former IFAI), which was originally created as a semi-autonomous agency separate from
the federal public administration. However, in a rather controversial move, the former IFAI
1 César G Cruz Ayala is a partner, and Diego Acosta Chin and Marcela Flores González are associates at
Santamarina y Steta, SC.
300
© 2020 Law Business Research Ltd
Mexico
amended its internal regulations so that it could assume the necessary characteristics and role
of the proposed autonomous entity. Consequently – and as a result of the new General Law
for Transparency and Access to Public Governmental Information, which annulled the effect
of the former Transparency Law – all matters previously dealt with by the former IFAI are
now being handled by the ‘new IFAI’ as an autonomous entity; and it has adopted the title
National Institute of Transparency, Access to Information and Protection of Personal Data
(INAI).
The Private Data Protection Law is an omnibus data protection law that sets the
principles and minimum standards that shall be followed by all private parties when
processing any personal data. However, the Private Data Protection Law also recognises that
standards for implementing data protection may vary depending on the industry or sector.
Accordingly, the Private Data Protection Law can certainly be complemented by sectorial
laws and self-imposed regulatory schemes, which focus on particular industry standards
and requirements, to the extent that those standards and requirements comply with the data
protection principles in the Private Data Protection Law. There have been efforts to promote
such sector-specific rules among those processing any personal data within the same industry.
On 13 December 2016, Mexican Congress approved the General Law for the Protection
of Personal Data in Possession of Governmental Entities (the Governmental Data Protection
Law, and collectively with the Private Data Protection Law, the Data Protection Laws),
which was enacted on 27 January 2017, to set forth a legal framework for the protection
of personal data by any authority, entity or organ of the executive, legislative and judicial
branches, political parties and trust and public funds operating at federal, state and municipal
level. Provided that this particular publication is intended to address issues arising from data
protection in the private sector, we will not address the governmental Data Protection Law in
detail, unless it is necessary to add context.
The INAI is in charge of promoting the rights to protection of personal data and
enforcing and supervising compliance with the Data Protection Laws and those secondary
provisions deriving from those Laws. To this end, with respect to the private sector, the INAI
has been authorised to supervise and verify compliance with the Private Data Protection Law;
interpret administrative aspects of the Data Protection Laws; and resolve claims and, inter alia,
impose fines and penalties. The INAI has been actively working through media campaigns to
raise awareness among corporations and individuals of the relevance of adequate protection
of personal data. Although the INAI has the authority to initiate enforcement activities, most
fines and penalties imposed have resulted from claims filed by data subjects. We are aware
that companies that have been fined by the INAI for breaching the Private Data Protection
Law have challenged the decisions by means of nullity claims and amparo lawsuits; however,
the relevant files are not publicly available.
301
© 2020 Law Business Research Ltd
Mexico
On 1 July 2020, the United States–Mexico–Canada Agreement entered into effect. Such
treaty includes a chapter on ‘Digital Commerce’, which imposes cross-border data protection
obligations on parties to strengthen and standardise the protection of personal data of
costumers, as well as rules to be followed for the international transfer of such data.
On 5 December 2019, Congressman Ricardo Monreal Ávila submitted a bill to modify
the Private Data Protection Law, to include the definition of digitalised personal data and the
right to be forgotten.
On 11 December 2019, Congressman José Ramón Enríquez Herrera submitted a bill
to modify the Private Data Protection Law to include that companies that are dedicated
to web based services, social networking or equivalent services shall also be deemed as data
controllers or data processors, as applicable.
On 13 February 2020, Congressman Ricardo Monreal Ávila submitted another bill
to modify the Private Data Protection Law to include that, upon the occurrence of a data
breach, the data controller must inform the INAI, and the INAI may start a verification
proceeding based on data breaches.
On 18 February 2020, Congressman Juan Manuel Fócil Pérez submitted a bill to
modify the Private Data Protection Law, to amend, among other matters, the definition
of sensitive personal data by adding concepts such as intimacy and criminal background
records, to specify that digital platforms must be considered data controllers; to include the
definition of biometric data, data profiling and content generator, to amend the definition of
data processing; and to clarify the jurisdiction of the law.
On 18 March 2020, Congresswomen Alejandra del Carmen León Gastélum submitted
a bill to modify the Private Data Protection Law to include a regulation similar to GDPR
intended to clarify that the Private Data Protection Law would apply to processing of personal
data by any data processor outside of Mexico.
As of the date of writing, approval of the aforementioned bills by Congress was still
pending. It is positive that legislators in Mexico have finally decided to modernise the
Private Data Protection Law, although some of the proposals made by these bills are not an
innovation at all (such as the clarification that digital platforms should be considered data
controllers); however, some address matters for which approval could result in positive and
necessary updates to Mexico’s data protection laws.
302
© 2020 Law Business Research Ltd
Mexico
f the Self-Regulation Parameters on Data Protection, which are applicable to the private
sector.
The Private Data Protection Law identifies data protection principles governing all processing
of personal data, as well as the obligations imposed on any private person, whether an
individual or entity, that has control over the processing of personal data (a data controller),
data processors (as defined below), third parties and any others engaged in the processing
of personal data. As set forth in the Private Data Protection Law, the Mexican executive
branch issued the Regulations of the Private Data Protection Law with the intention to clarify
the scope of those principles and obligations provided by the Private Data Protection Law.
The Regulations also set forth the rules applicable to the exercise by data subjects of their
rights in relation to data controllers and those proceedings arising from claims before the
INAI filed by data subjects in the event of a breach of the Private Data Protection Law by
a data controller. Finally, the Guidelines for Privacy Notices (the Guidelines), issued by the
Ministry of the Economy, set the standard of detail that should be met by data controllers
when drafting their own privacy notices and the scope of the language in privacy notices. The
Self-Regulation Parameters on Data Protection set forth the rules, criteria and procedures for
the development and implementation of self-regulatory schemes on data protection, which
were also issued by the Ministry of the Economy.
Both the Federal Consumer Protection Law and Federal Consumer Protection Law
for the Users of Financial Services also contain stipulations protecting consumers, whether
individuals or entities, from any processing of their information for marketing purposes.
Corporations or financial entities that wish to market products must first review the list
of consumers who do not wish to receive marketing information and record it in the
Consumer Public Registry held by the Federal Consumers Attorney’s Office (Profeco), or
the Public Registry of Individual Users, which is managed by the National Commission
for the Protection of Financial Services Users (Condusef ). Any marketing activity with any
consumers enrolled in the registries may result in fines by Profeco or Condusef, as applicable.
Key definitions
In addition to any other terms defined herein, the following terms should be taken into
consideration for a better understanding of Mexican law on the subject:
a data processor: any natural person or entity that individually or jointly with others
carries out the processing of personal data on behalf of the data controller.
b data subject: the natural person whom the personal data concerns.
c personal data: any information related to an identified or identifiable individual. The
following information would not be subject to the Private Data Protection Law:
• information collected and stored for personal use and not intended for disclosure
or distribution;
• information collected by the credit bureaux;
• information about entities;
• information about any individual when acting as a merchant or professional
practitioner; and
• information about any individual when rendering services to a legal entity or to
a merchant or professional practitioner, provided that information is limited to
303
© 2020 Law Business Research Ltd
Mexico
the subject’s name, duties or position, business address, business email, business
telephone and business facsimile, and the information is processed when
representing the merchant or professional practitioner;
d public access source: a database that may be accessed by anyone without complying
with any requirement, except for the payment of a fee;
e sensitive personal data: personal data affecting the most intimate sphere of the data
subject, or of which the misuse may be a cause for discrimination or great risk for the
data subject, such as information regarding racial or ethnic origins, political opinions,
religious beliefs, trade union membership, physical or mental health and sex life;
f transfer: any kind of communication of personal data made to a person other than the
controller, data processor or data subject; and
g remittance: any kind of communication of personal data between the data controller
and the data processor, within or outside Mexican territory.
304
© 2020 Law Business Research Ltd
Mexico
retain personal data for as long as is necessary to fulfil the specified purpose or purposes.
Regarding sensitive personal data, reasonable efforts shall be made to keep the period
of processing to a minimum.
d Purpose: processing of personal data shall be limited to the purpose or purposes
specified in the privacy notice. No database containing sensitive personal data shall be
created without justifying that the purpose for its collection is legitimate, concrete and
in compliance with those activities or explicit purposes sought by the data controller.
Any processing of personal data for a purpose that is not compatible or analogous to
what is set forth in the privacy notice shall require a new consent from the data subject.
e Proportionality: processing of personal data must be necessary, adequate and relevant
for the purpose or purposes set forth in the privacy notice.
f Loyalty: processing of personal data shall favour the interests of the data subject and a
reasonable expectation of privacy, which shall be understood as the level of confidence
that any person deposits in another where the personal data exchange between them
shall be processed as agreed between them in compliance with the Private Data
Protection Law. Its collection shall not be made through fraudulent or deceitful means.
g Transparency: data controllers shall inform data subjects, by means of a privacy notice,
about the personal data that will be subject to processing, and the purpose or purposes
for the processing. With respect to sensitive personal data. the privacy notice shall
expressly state that the information is of a sensitive nature.
h Responsibility: data controllers shall adopt the necessary measures to comply with all
data protection principles during the processing of personal data, even if the processing
is carried out by data processors or third parties. Therefore, a data controller shall
ensure full compliance with the privacy notice delivered to the data subject by that data
controller or by third parties with whom it has a legal relationship.
In addition to the aforementioned principles, all data controllers shall comply with the duties
of security and confidence, which are also applicable to data processors and third parties
receiving any personal data from a data controller, in which case the latter must verify that
these duties are observed by the third parties concerned.
Data controllers shall implement appropriate organisational, technical and physical
security measures to protect personal data against unauthorised damage, loss, modification,
destruction, access or processing. These measures shall be at least equivalent to those
implemented for their own confidential information.
Further, all personal data shall be kept confidential, even upon the termination of any
relationship with the data subject.
Compliance
INAI has ex officio authority to supervise compliance with the Private Data Protection Law.
Currently, many proceedings to verify compliance have resulted from claims filed by data
subjects; however, the INAI determined to initiate ex officio proceedings when appropriate.
305
© 2020 Law Business Research Ltd
Mexico
The drafting and delivery of the privacy notice to a data subject constitutes a key factor
in complying with the principle of transparency described above and, therefore, there are no
exemptions to the same. As a result, the privacy notice must be drafted complying with strict
standards and requirements stipulated in the Private Data Protection Law, its Regulations
and, particularly, the Guidelines. There are three types of privacy notices whose general
characteristics, terms and conditions are as follows:
a full: a full privacy notice must be used when the personal data is personally collected
from a data subject and must include all elements contained in the corresponding
provisions of the Private Data Protection Law, the Regulations and the Guidelines;
b simplified: a simplified privacy notice may be used when the personal data is collected
directly but using remote means from the data subject and must contain all elements
contained in the corresponding provisions of the Private Data Protection Law, the
Regulations and the Guidelines; and
c abbreviated: an abbreviated privacy notice may be used when personal data is directly
obtained from a data subject by printed means and when the personal data collected
is minimal. It must be drafted in accordance with Article 28 of the Regulations and
Guideline 38 of the Guidelines.
When drafting the privacy notice, data controllers must identify the different uses intended
for the personal data, and also distinguish those uses required for the legal relationship
between the data controller and data subject (necessary purposes) from those that are not
(secondary purposes). This requirement is important considering that a data subject may
choose to reject (or in the future withdraw consent for) processing those secondary purposes
without affecting his or her relationship with the data controller.
When required, consent for processing any personal data must be obtained upon the
collection of the personal data if the collection is made personally or directly from the data
subject, or before any processing, if personal data was not collected by the data controller
directly from the data subject.
The data controller shall describe the means available to the data subject to exercise
their right to access, rectify, cancel or oppose the processing of their personal data (ARCO
rights), as well as to withdraw consent (withdrawal), either in whole or in part, with respect
to the processing of personal data, and to limit the use or disclosure of personal data (data
limitation), collectively with the ARCO rights and the right of withdrawal (data claims).
Data claims shall be exercised free of charge, unless the data subject exercises the same claim
to access personal data within a period of 12 months, in which case the data controller may
charge a fee that shall not exceed three times the unit for measure and update (UMA) in
force. Unfortunately, awareness in Mexico regarding the protection of personal data is still
a major challenge, considering the lack of knowledge (and, in some cases, interest) together
with the degree of specialisation of this matter, which may be delaying proper compliance
with the Private Data Protection Law. Many data controllers are still gaining interest and
experience in these matters, which has caused inadequate implementation of privacy notices,
since this requires adequately mapping all data being processed to assess all implications.
It is still common to see data controllers drafting their privacy notices without considering
whether they are in fact processing any personal data and to what extent.
306
© 2020 Law Business Research Ltd
Mexico
Notwithstanding the above, and in addition to the ARCO rights, the data subject shall also
be entitled to withdraw consent, either in whole or in part, with respect to the processing of
personal data and may limit the use or disclosure of personal data collectively with the ARCO
rights and the right of withdrawal. Additionally, a data subject has the right to opt out or join
lists of those unwilling to receive marketing communications or materials kept by the data
controller, Profeco or Condusef.
In addition, data subjects have the right to file claims before the INAI if that data
controller fails to address a claim concerning the data subject’s ARCO rights or when the
resolution of the data controller does not satisfy the data subject. If, because of that claim, the
INAI becomes aware of a breach of the Private Data Protection Law, it may impose penalties
on a data controller. However, the Private Data Protection Law makes no provision for
remedies or financial recovery for the data subject as a result of a breach of its data protection
rights. Notwithstanding this, data subjects have the right to file a claim before civil courts to
seek indemnification resulting from moral damage.
307
© 2020 Law Business Research Ltd
Mexico
308
© 2020 Law Business Research Ltd
Mexico
d required by an agreement entered into or to be entered into between the data controller
and a third party in the interest of the data subject;
e necessary or legally required to protect the public interest or the prosecution or
enforcement of justice;
f required for the acknowledgment, exercise or defence of a right in a judicial proceeding;
or
g necessary for the preservation of, or compliance with, a legal relationship between the
data controller and the data subject.
Any international data transfer shall be evidenced by an agreement or any other document
whereby the third party assumes the same data protection obligations undertaken by the data
controller and the conditions for processing, as consented to by the data subject as detailed
in the corresponding privacy notice. International data transfers do not require the approval
of the INAI or any other Mexican regulatory agency to be completed and there is no need
to submit standard contractual clauses or comparable instruments to any of them. however,
a data controller may seek, at its sole discretion, the opinion of the INAI on whether an
international transfer complies with these applicable requirements before completing such
transfer.
309
© 2020 Law Business Research Ltd
Mexico
g implement audits;
h conduct training for those officers involved in the processing;
i have a record of the means used to store personal data; and
j put in place a procedure to anticipate and mitigate any risks arising from the
implementation of new products, services, technologies and business plans when
processing personal data.
Data controllers have the obligation to include in their privacy notice a mechanism for data
subjects to exercise their ARCO rights or withdraw consent, either in whole or in part, with
respect to the processing of personal data and to limit the use or disclosure of personal data.
Additionally, data controllers should make opt-out mechanisms or lists for those unwilling to
receive marketing communications available to data subjects. These lists are kept by the data
controller, Profeco or Condusef.
In terms of the Private Data Protection Law, while processing personal data, a data
controller must distinguish such processing based on the following:
those purposes that, based on a contractual relationship between data controller and
data subject, require the processing of personal data, in which case consent for such processing
is not required and the opt-out option would not be available; and
those secondary purposes where compliance with any commitments is not required
under any relationship between the data controller and data subject, in which case the data
subject is entitled to opt out and the data controller must provide mechanisms allowing the
data subject to opt out prior to such processing.
310
© 2020 Law Business Research Ltd
Mexico
Penalties
In the event that, during a DPP or VP, the INAI becomes aware of an alleged breach of the
Private Data Protection Law, a proceeding to impose penalties will commence assessing the
infringement. The available penalties include the following:
a a warning issued by the INAI urging a data controller to comply with the data subject’s
demands. Note that this course of action is limited to certain types of infringement;
b fines representing an amount of between 100 and 320,000 times the UMA,2 which
is published by the National Institute of Statistics and Geography, which will be
determined based on the nature of the infringement; and
c imprisonment for up to three years in certain cases, such as when someone authorised
to process any personal data causes a security breach in relation to the data under his
or her control with the purpose of obtaining a gain; or imprisonment for up to five
years when someone processes personal data with the intention of obtaining a gain by
deceiving, or taking advantage of the error of, a data subject or the person authorised
to transfer any personal data.
The penalties set out in items (b) and (c) above may be doubled if the infringement involves
sensitive personal data. Although the Private Data Protection Law does not entitle a data
subject to receive any indemnification, in light of damages suffered because of a data
controller’s breach, it does acknowledge that any of the fines or penalties indicated above
would be imposed against a data controller without prejudice to any liability that the data
controller may have in civil and criminal law.
When assessing the fine or penalty to be imposed, the INAI would consider:
a the nature of the personal data;
b the inappropriateness of the failure to comply with the claim of the data subject;
c whether the action or omission was deliberate;
d the economic capacity of the data controller; and
e any reoccurrence of the breach.
311
© 2020 Law Business Research Ltd
Mexico
Data controllers may challenge these sanctions or fines by means of a nullity claim before the
Federal Court of Tax and Administrative Justice.
In addition, Profeco and Condusef are entitled to verify the adequate use of consumer
information. If either of them finds that a corporation is engaging in unsolicited marketing to
a customer enrolled in the Public Registry of Consumers or the Public Registry of Individual
Users, or that it has used consumers’ data for a purpose other than marketing, the following
shall apply: as of 2017, Profeco may impose fines of up to 1.56 million Mexican pesos; or
Condusef may impose fines of up to 2,000 times the UMA in force.3
In recent years, the INAI has fined, inter alia, financial institutions, telecom companies
and healthcare providers. However, most of these fines have been challenged by the data
controllers concerned and the proceedings are pending resolution.
Since the enactment of the Private Data Protection Law, the INAI has been actively
advertising the importance of complying with this law and pursuing those cases in which
there are important breaches and it has imposed fines on several companies. The following
are relevant cases in recent years that are worth mentioning.
Hospital
A fine of 4.6 million Mexican pesos was imposed on Operadora de Hospitales Ángeles, S.A.
de C.V. (the hospital) on the grounds that the hospital was negligent when processing and
answering a claim filed by a data subject to request access to her clinical file. Given that the
clinical file contained sensitive personal data of the data subject, the fine was doubled.
Banorte
A fine of 32 million Mexican pesos was imposed on Banco Mercantil del Norte, S.A.,
Institución de Banca Múltiple, Grupo Financiero Banorte (Banorte). Banorte collected
sensitive personal data without the consent of the data subject and stored the data without
a legal justification in breach of the principles of information, proportionality and legality,
as it failed to deliver a privacy notice to the claimant and processed personal data of the
husband of the claimant that was not necessary, adequate or relevant for the purpose of the
data collection.
312
© 2020 Law Business Research Ltd
Mexico
Two fines that amount to 363,352 Mexican pesos were imposed on De la Mora Trajes de
Baño S.A. de C.V., a swimsuit store. The INAI’s decision to fine the store was based on the
following arguments:
a the store acted in contravention to the information, responsibility and legality principles,
since the webpage of the store did not contain the respective privacy notice; and
b the store failed to implement and disclose a privacy notice prior to the collection of
personal data.
As of the time of writing, we did not have access to any further information about the
verification proceeding that was publicly announced by the INAI on 6 April 2019 against
Cultura Colectiva for the public exposure of a database with more than 540 million records
of social media users, stored in the repository of an electronic commerce company.
As a result of the above, foreign companies must always analyse whether their activities, or the
activities of their affiliates, would result in the application of the Private Data Protection Law.
Foreign companies have also faced certain challenges considering that, under the
premise that privacy notices should be simple and easy to understand, the INAI has been
reluctant to accept privacy notices issued by multiple data controllers, even if they are part of
the same corporate group.
The Private Data Protection Law does not impose any obligation against data controller
on the location in which personal data should be stored or kept or even if whether such
should remain in Mexico. As described in Section IV, under the Private Data Protection Law,
313
© 2020 Law Business Research Ltd
Mexico
A data controller must notify each data subject upon confirmation that a data breach has
occurred, once it has taken any actions intended to assess the magnitude of the breach. The
notice shall contain at least the nature of the incident, the personal data affected, advice
on the actions that may be adopted by the data subject to protect his or her interests, the
remedial actions that were immediately carried out and the means through which the data
subject may obtain further information. In addition, the data controller would have to take
corrective and preventive actions and improve its security measures to avoid the reoccurrence
of the same breach.
The Private Data Protection Law and its Regulations do not oblige a data controller
to notify the INAI upon the occurrence of a breach or of the measures taken by the data
controller. However, failing to comply with any of the obligations mentioned above may
constitute an infraction under the Private Data Protection Law that may result in the
imposition of sanctions by the INAI.
Although this is a non-binding document, in an attempt to avoid further cyberattacks
or threats, the Cybersecurity Study includes cybersecurity recommendations for the financial
system in Mexico including:
a preparedness and governance: having one responsible body or corporate governance
body to lead information security and fraud prevention using digital means;
314
© 2020 Law Business Research Ltd
Mexico
X OUTLOOK
We are still expecting the respective bills to any intended amendments to the Private Data
Protection Law since the previous edition of this publication; however, we anticipate that a
bill will be submitted in order to harmonise the Data Protection Laws with Convention 108
and ETS 181.
Although the GDPR applicable in the European Union are not enforceable per se in
Mexico, some provisions of the GDPR are intended to address processing beyond the borders
of the EU, to the extent of the personal data of EU citizens or residents of EU Member States.
As a result of the effectiveness of the GDPR, we foresee more interest in entities that intend
to carry out any business operations in the EU (even through remote means), to comply with
the standards imposed by the GDPR; and in Mexican companies whose parent company
is headquartered in the EU, or that process personal data on behalf of EU companies or
subsidiaries.
315
© 2020 Law Business Research Ltd
Chapter 21
NETHERLANDS
I OVERVIEW
Data protection and data security are key areas for our increasingly digital society and the
digital transformation that organisations and their products, services and business models
undergo. Both areas have seen significant legal development over the past two years following
the entry into force of key European legislation such as the General Data Protection
Regulation (GDPR) and the Security of Network and Information Systems Directive (the
NIS Directive).
The GDPR applies in the Netherlands, as supplemented by the General Data Protection
Regulation Implementation Act (the Dutch Implementation Act) and various sector-specific
legislation relating to the processing of personal data.
This chapter provides a pragmatic overview of the current legal landscape in the
Netherlands and related key legal developments over the past year, including enforcement
actions by the Dutch Data Protection Authority (the Dutch DPA).
1 Herald Jongen is a shareholder and Nienke Bernard and Emre Yildirim are associates at Greenberg Traurig
LLP.
316
© 2020 Law Business Research Ltd
Netherlands
Dutch DPA put the pedal to the metal. As demonstrated by the enforcement actions discussed
throughout this chapter, the Dutch DPA does not shy away from using its enforcement
powers. It conducted a total of 110 investigations – a significant increase compared to the 20
investigations initiated in 2018. The Dutch DPA also imposed several fines on organisations.
In July 2020, for example, the Dutch DPA imposed a record fine of €830,000 on the Dutch
Credit Registration Bureau for non-compliance with the right to access.
Enforcement by the Dutch DPA is often initiated following complaints made by data
subjects, current affairs brought to public attention by politicians, or the results of investigative
journalism. Data subjects continue to find their way to the Dutch DPA with complaints. In
its annual report for 2019, the Dutch DPA notes that it received almost 28,000 complaints
from individuals, an increase of 79 per cent over the number of complaints received in 2018.2
The Dutch DPA notes that most complaints concerned a violation of a data subject’s right,
such as the right of access and the right to erasure. Organisations are, therefore, recommended
to implement robust data subjects’ rights processes and handle requests with due care.
In its agenda for 2020–2023, the Dutch DPA has specified that it will be focusing
enforcement efforts specifically on data brokering and the use of artificial intelligence and
algorithms.3 Within data brokering, the Dutch DPA will focus most strongly on the internet
of things, where it hopes to increase use of standards and certification, and profiling, where
it will focus on enforcement and behavioural advertising stimulating the creation of codes
of conduct and enforce it actively. The call for supervision of AI and algorithms is increasing
among politicians and in Dutch society. Within AI, the key focus will be the development of
a regulatory framework that the Dutch DPA will use for its supervision of AI. In February
2020, the Dutch DPA published its vision for enforcement relating to AI.4
2 https://autoriteitpersoonsgegevens.nl/nl/nieuws/jaarverslag-ap-2019-meer-focus-op-handhaving.
3 https://autoriteitpersoonsgegevens.nl/nl/over-de-autoriteit-persoonsgegevens/focus-ap-2020-2023.
4 https://www.autoriteitpersoonsgegevens.nl/nl/nieuws/toezicht-op-algoritmes.
5 Available at https://wetten.overheid.nl/BWBR0040940/2020-01-01.
317
© 2020 Law Business Research Ltd
Netherlands
As further discussed below under specific regulatory areas, various sector-specific laws
also provide rules on the processing of personal data (e.g., in the financial, telecoms and
healthcare sectors).
6 https://autoriteitpersoonsgegevens.nl/sites/default/files/atoms/files/normuitleg_gerechtvaardigd_belang.pdf.
7 https://autoriteitpersoonsgegevens.nl/nl/nieuws/boete-voor-bkr-vanwege-kosten-bij-inzage-
persoonsgegevens.
318
© 2020 Law Business Research Ltd
Netherlands
v Financial sector
Many rules applicable to financial institutions originate from EU law, either directly (such as
MiFIR) or via implementation of directives such as CRD IV and AMLD into the Financial
Supervision Act and the Money Laundering and Terrorism Financing Prevention Act and
subsequent regulations. These regulations contain a wide range of data and security related
topics, such as retention and reporting obligations under MiFID II/MiFIR, requirements
relating to cloud outsourcing under the EBA guidelines and obligations to use two-factor
authentication under PSD II. The Financial Supervision Act mandates extensive policies and
procedures with respect to business continuity, disaster recovery and information security
that are generally applicable to all regulated financial undertakings, including consumer
credit providers and advisers and offerors of financial products.
Credit institutions, operators of trading venues (regulated markets, MTFs and OTFs)
and central counterparties are designated as essential services providers under the NIS directive
(as implemented into Dutch law) with respect to the offering and settlement of payment and
securities transactions. Incident notification obligations under the Security of Network and
Information Systems Act generally apply in addition to incident notification requirements
under the Financial Supervision Act and the GDPR. With respect to data breaches under the
GDPR, the Dutch Implementation Act stipulates that financial undertakings that are subject
to the Financial Supervision Act are exempted from the obligation to communicate personal
data breaches to data subjects.
Information and cybersecurity and use of (client) data are important topics in the
supervisory policies of the financial regulators Authority for the Financial Markets and the
Dutch Central Bank. Both supervisors regularly publish guidance and good practices, such
as the ‘Principles of Information Security’ from the Authority for the Financial Markets and
the ‘Information Security Monitor’ from the Dutch Central Bank.
vi Public registers
In certain specific situations, Dutch law provides that personal data must be included in
public or semi-public registers. Examples are the Dutch Credit Registration Bureau, the
registers for board and supervisory board members of certain financial institutions with the
Authority for the Financial Markets and registers of the Employee Insurance Agency. In
addition, the register of the Chamber of Commerce may include personal data relating to
a person’s business or employment. In addition, effective 27 September 2020, most Dutch
319
© 2020 Law Business Research Ltd
Netherlands
non-listed companies are required to register their ultimate beneficial owners (UBOs) with
the Chamber of Commerce. This obligation under the UBO Register (Implementation) Act
follows from the AML Directive. The UBO register will be public, but the Chamber of
Commerce may be requested to protect the identity of the UBO in special circumstances, for
example if the shareholder is a minor or has police protective security.
vii Covid-19
The covid-19 pandemic has reignited attention to workplace privacy as the pandemic
introduced a need for organisations to process personal data (including data concerning health)
in light of the challenges brought by the pandemic. Such challenges include the processing of
health data of employees or visitors, secure remote working and videoconferencing.
In March 2020, the Dutch DPA first communicated a lenient approach on enforcing
data protection obligations during the pandemic, enabling organisations to focus their
resources on combating the pandemic. Throughout the pandemic, the Dutch DPA has
actively published guidance on various topics, including:
a privacy aspects of videoconferencing apps;
b secure remote working;
c the permissibility of temperature checks of employees and visitors;
d anonymity of aggregated telecommunication data; and
e contact tracing apps.
Biometric data
The processing of biometric data has received quite some attention in the Dutch press.
Under the Dutch Implementation Act, biometric data may be processed if it is necessary for
authentication or security purposes. In August 2019, the District Court of Amsterdam issued
a decision following a request of an employee of a retail company, Manfield Schoenen BV.10
The employee refused to provide the employer its fingerprints for authorisation purposes to
operate a cash register. The court ruled that Manfield cannot oblige the employee to use a
finger-scan authorisation system unless it is able to demonstrate that the use of this system
is necessary and complies with the principles of proportionality and subsidiarity. Manfield
8 https://autoriteitpersoonsgegevens.nl/nl/nieuws/ap-geeft-tips-voor-privacy-bij-internet-things-apparaten.
9 https://autoriteitpersoonsgegevens.nl/nl/nieuws/ap-geeft-tips-voor-privacy-bij-connected-cars.
10 https://uitspraken.rechtspraak.nl/inziendocument?id=ECLI per cent3ANL per cent3ARBAMS per
cent3A2019 per cent3A6005.
320
© 2020 Law Business Research Ltd
Netherlands
failed to do so and the court upheld the employee’s choice not to provide finger scans.
Following this decision, the retail company HEMA decided to suspend its use of finger scans
for authentication purposes.
In April 2020, the Dutch DPA imposed a fine of €725,000 against an unnamed
company for the unlawful processing of biometric data to monitor employee attendance, and
for time recording.11 The Dutch DPA concluded that the company failed to demonstrate:
a that it had obtained valid consent (which is only available in exceptional cases in an
employment context); and
b that the processing of biometric data was necessary in this case. The company challenged
the decision to impose a fine in court, and the ruling is pending.
Following signs that supermarkets were interested in using facial recognition, the Dutch
DPA reminded supermarkets of the rules for facial recognition in a letter published in June
2020.12 By providing information and intervening where necessary, the Dutch DPA intends
to prevent supermarkets from unlawfully using facial recognition. A related interesting
development is the use of artificial intelligence and machine learning to create deepfakes:
fabricated media in which an individual in an existing image or video is replaced with another
individual’s likeness.
Cookies
In the Netherlands, the use of non-strictly necessary cookies and similar technologies is
generally subject to explicit consent under the Telecommunications Act. Cookie compliance
continues to be of interest to the Dutch DPA and the Authority for Consumer and Market.
In December 2019, the Dutch DPA published the outcome of an investigation into the use
of tracking cookies.13 Of 175 websites, half utilised tracking cookies without meeting consent
requirements. The Dutch DPA stressed that the following methods of obtaining consent for
tracking cookies are non-compliant:
a omission to indicate preferences or inactivity;
b further navigating throughout the website; or
c pre-checked boxes.
The Dutch DPA also reiterated its position that websites that only provide access if they
consent to placing tracking cookies (cookie walls) are not compliant with the GDPR as they
do not provide data subjects a free choice.
11 https://autoriteitpersoonsgegevens.nl/nl/nieuws/boete-voor-bedrijf-voor-verwerken-vingerafdrukken-
werknemers.
12 https://autoriteitpersoonsgegevens.nl/nl/nieuws/ap-wijst-supermarkten-op-regels-gezichtsherkenning.
13 https://autoriteitpersoonsgegevens.nl/nl/nieuws/ap-veel-websites-vragen-op-onjuiste-wijze-toestemming-
voor-plaatsen-tracking-cookies.
321
© 2020 Law Business Research Ltd
Netherlands
– and more importantly stay – in control of its data must therefore use data protection laws
to its advantage and negotiate terms that not only comply with any requirements under the
GDPR, but also enable it to be and remain in control of its data.
There is an increasing trend of discussions between customers and cloud providers
regarding their data protection roles under the GDPR, particularly with respect to metadata.
In 2020, following negotiations with the Dutch government in 2019, Microsoft was the first
cloud provider to change its general terms for enterprise customers and internal processes,
adopting a processor role for almost all personal data processed in the context of its online
services.
14 ECJ, Case C-311/18, 16 July 2020 (Data Protection Commissioner v. Facebook Ireland Ltd and Maximilian
Schrems).
322
© 2020 Law Business Research Ltd
Netherlands
requests. Organisations that are considering adopting BCR with the Dutch DPA as their lead
authority should therefore take into account that formal approval of BCR may take longer
than anticipated and in practice will likely take upwards of two years.
The Netherlands does not have any formal laws containing specific data localisation
requirements. However, there is an increasing demand to keep (personal) data as much as
possible within the European Union.
15 https://www.rijksoverheid.nl/documenten/rapporten/2019/06/11/data-protection-
impact-assessment-windows-10-enterprise.
323
© 2020 Law Business Research Ltd
Netherlands
324
© 2020 Law Business Research Ltd
Netherlands
The Authority for Consumers and Markets is the supervisory authority charged with
enforcement of consumer protection laws and sector-specific regulation of several sectors.
The Authority for the Financial Markets, European Central Bank and Dutch Central
Bank supervise financial institutions and markets, including the strict laws relating to data
security that apply in this sector. The Dutch Central Bank is also the supervisory authority
for financial institutions that are designated as essential services providers under the Security
of Network and Information Systems Act that implements the NIS directive.
While the Dutch DPA and the Authority for the Financial Markets currently do not
have a cooperation protocol in place, both authorities participate in the Consultation Forum
of Regulatory Bodies (Markttoezichthoudersberaad), where various supervisory authorities
that (partly) focus on the functioning of markets and the behaviour of market players come
together to share knowledge and exchange experiences on cross-curricular themes. Other
participants include the Authority for Consumers and Markets and the Dutch Central Bank.
16 https://autoriteitpersoonsgegevens.nl/sites/default/files/atoms/files/press_release_in_english.pdf.
17 https://autoriteitpersoonsgegevens.nl/nl/nieuws/ap-start-onderzoek-naar-tiktok.
18 https://autoriteitpersoonsgegevens.nl/nl/nieuws/werkwijze-belastingdienst-strijd-met-de-wet-en-
discriminerend.
325
© 2020 Law Business Research Ltd
Netherlands
following wide media and political attention to possibly discriminatory practices by the Tax
and Customs Administration based on the (dual) nationality of individuals. In summary, the
Dutch DPA found three distinct processing activities by the Administration of the (dual)
nationality of applicants to be unlawful. The Dutch DPA also found that two processing
activities were discriminatory:
a the use of nationality of applicants as an indicator in a risk classification model; and
b the processing of nationality for the detection of organised fraud.
Both processing activities make a distinction based on the nationality of applicants without
any objective justification. The Dutch DPA will assess whether the Tax and Customs
Administration will be sanctioned. The Minister of Finance, the controller for the processing
of personal data by the Tax and Customs Administration, has the right to respond to the
findings of the Dutch. The Dutch DPA announced that it may announce a possible sanction
in the autumn of 2020.
Further interesting enforcement actions by the Dutch DPA include a fine of €460,000
imposed on the HagaZiekenhuis hospital in June 2019 for the absence of frequent reviews
of internal access logs to patient files and the lack of the use of two-factor authentication for
access to such files.19 In November 2019, the Dutch DPA collected a penalty of €50,000 from
the health insurance company Menzis pursuant to an order of penalty imposed on Menzis
in 2018.20 The order of penalty followed an investigation in which the Dutch DPA found,
among others, that employees of Menzis’ marketing department had unlawful access to data
relating to the health of insured individuals. In March 2020, the Dutch DPA imposed a fine
of €525,000 on the Royal Dutch Tennis Association following complaints of its members to
the Dutch DPA.21 The Dutch DPA found that the association unlawfully provided personal
data of approximately 350,000 of its members to two of its sponsors. The data were provided
to the sponsors against a fee, constituting a sale, and were intended for direct marketing
activities by the sponsors.
19 https://autoriteitpersoonsgegevens.nl/nl/nieuws/haga-beboet-voor-onvoldoende-interne-beveiliging-
patiëntendossiers.
20 https://autoriteitpersoonsgegevens.nl/nl/nieuws/sancties-voor-menzis-en-vgz-voor-overtreding-van-de-
privacywet.
21 https://autoriteitpersoonsgegevens.nl/nl/nieuws/boete-voor-tennisbond-vanwege-verkoop-van-
persoonsgegevens.
326
© 2020 Law Business Research Ltd
Netherlands
In August 2020, the interest organisation Privacy Collective launched the first
GDPR-related class action. The Privacy Collective is seeking damages from Oracle and
Salesforces for the alleged unlawful processing of personal data of Dutch internet users by
using third-party cookies for advertisement tracking and targeting.
If a controller or processor to which the GDPR applies does not have an establishment
within the European Union, it may be required to appoint a representative within the
European Union pursuant to Article 27 GDPR. In addition to GDPR requirements, foreign
organisations should be aware that strict rules apply with respect to consumer protection,
online sales and use of cookies.
22 https://autoriteitpersoonsgegevens.nl/nl/nieuws/datalekmeldingen-blijven-stijgen.
327
© 2020 Law Business Research Ltd
Netherlands
Organisations hoping to do business in the Netherlands should take into account that
information and cybersecurity, including mitigation of risks that can lead to a loss of control
or foreign state access, can be a deal-breaker when not properly addressed.
Designated operators of essential services and digital services providers are subject to
the Security of Network and Information Systems Act and secondary regulations, which
implement the NIS Directive. The supervisory authority for these organisations is the Dutch
Minister responsible for the sector that the relevant service provider operates in. Essential
and digital service providers are obligated to maintain adequate technical and organisational
procedures and measures that mitigate security risks of network and information systems and
prevent incidents. In the case of a threatened or actual incident, notification must be made
to the relevant Computer Security Incident Response Team (CSIRT), which is the National
Cybersecurity Institute for essential service providers and the CSIRT-DSP for digital service
providers.
The National Cybersecurity Institute frequently publishes White Papers and guidance
with respect to security measures. In cooperation with a Dutch university, the National Cyber
Security Centre developed the ‘Cyber Cube Method’, a framework that combines European
Union Agency for Cybersecurity (ENISA), National Institute of Standards and Technology
and George Mason University requirements to identify the required competencies of Security
Operations Centers and CSIRT personnel based on the services offered by the relevant
organisation.
The appointment of a chief information security officer and policies regarding internal
reporting lines are in some cases mandatory based on sector-specific rules, such as the
Financial Supervision Act and ENISA guidelines for digital service providers. The Dutch
Corporate Governance Code, applicable to Dutch listed companies on a ‘comply-or-explain’
basis, requires the management and supervisory boards to have sufficient expertise to identify
opportunities and risks that may be associated with innovations in business models and
technologies in a timely manner, and to implement adequate risk-management policies. In its
report on the financial year 2018, the Monitoring Committee Corporate Governance Code
identified that most companies view cybersecurity as an operational risk and urge companies
to (also) consider this risk in the context of long-term value creation of the company, which
is one of the basic principles of the Corporate Governance Code.
A notable public initiative is the Dutch Institute for Vulnerability Disclosure, an
organisation of information security experts committed to reporting vulnerabilities they find
in digital systems to people who can fix them.
X OUTLOOK
International data transfers in the post-Schrems II era will continue to keep organisations busy
in the coming year. Owing to the lack of practical guidance by supervisory authorities at the
time of writing, organisations are currently facing uncertainty with regard to the assessment
they must make on whether a third country provides an adequate level of protection. We
hope that the European Data Protection Board will publish practical guidance that will aid
organisations in making their assessments. At the same time, we expect a rise of the increasing
demand to keep data within the European Union.
As discussed above, data brokering and artificial intelligence are key focus areas of the
Dutch DPA for 2020–2023. We believe the next few years will be formative for case law and
legislation around data protection and AI; the knowledge on the technology has now become
328
© 2020 Law Business Research Ltd
Netherlands
widely dispersed and a cohort of younger and more tech savvy lawyers and politicians is
starting to weigh in on these topics. At the same time, the pace of change is reducing. This
will provide a window to formalise views on these topics. Companies in this space have an
opportunity to help shape the regulatory environment on these topics and would do well to
make use of that, while also taking care to earn the public’s trust and confidence.
329
© 2020 Law Business Research Ltd
Chapter 22
PORTUGAL
I OVERVIEW
The right to privacy is enshrined in the list of rights, freedoms and guarantees provided for
in Article 26(1) of the Constitution of the Portuguese Republic, as well as in numerous
European and international treaties. This personal right is directly linked to the guiding
principle of the Portuguese legal system: the dignity of the person based on the assumption
that citizens benefit from privacy under two different rights:
a the right to prevent third parties from having access to information on private and
family life; and
b the right for no one to disclose the information they have on the private life of others.
This translates into a real prohibition of interference in private lives by third parties, either by
access or by disclosure of information, as enshrined in Article 80(1) of the Portuguese Civil
Code:
Everyone should keep a reserve as to the intimacy of the private life of others.
The Portuguese Republic’s Constitution was redacted during political turmoil that
highlighted the need to readdress and reinforce fundamental rights, as Portugal had just
exited a four-decade long dictatorship.
For 40 years, Portugal had a political police force that prosecuted intellectual
dissidents, maintaining databases with information regarding all types of personal and private
information about whoever was suspected to be conducting activities that were harmful to
the national unity.
When the revolution happened and a new constitutional order was imposed, there was
a need to implement several fundamental rights that had been stripped from the citizens for a
long time. Article 35 (‘Use of computerised data’) established a fundamental right regarding
usage of information technology, which was considered innovative for its time compared
with other jurisdictions.
The Portuguese Constitution was subsequently amended to meet new conceptions
about personal data protection, and also revised to address the provisions of Directive 95/46/
CE.
1 Joana Mota Agostinho is a partner and Nuno Lima da Luz is a senior associate at CTSU – Sociedade de
Advogados, member of Deloitte Legal Network.
330
© 2020 Law Business Research Ltd
Portugal
However, the local supervisory authority (CNPD) issued Decision No. 494/2019 deciding
not to apply certain provisions of such law as they were considered in contradiction with
GDPR, the Portuguese Constitution and with the jurisprudence of the EU Court of Justice.
The new EU e-Privacy Regulation is also set to be enforced in Portugal. This transposition
is still undergoing the legislative process, with no definite time frame for implementation.
331
© 2020 Law Business Research Ltd
Portugal
The Portuguese Supervisory Authority imposed three fines, the biggest one being
€107,000, for violations concerning direct marketing without appropriate consent and lack
of information regarding CCTV processing. These sanctions are addressed in more detail
below.
There was also a considerable media coverage regarding data breaches, with particular
focus on one that occurred with the leading company in the energy sector, bringing more
awareness of cybersecurity. It is also worth mentioning the effect of covid-19 on the way that
companies are interacting with their employees.
332
© 2020 Law Business Research Ltd
Portugal
333
© 2020 Law Business Research Ltd
Portugal
applies to the processing of personal data in the context of the provision of publicly available
electronic communications services in public communications networks, in particular in
public communications networks supporting data collection and identification arrangements.
Law No. 34/2013 of 27 August regulates private security activities and the security
measures to be adopted by public or private entities in the scope of crime prevention. The
Portuguese Data Protection Law also has a provision in its Article 19 regarding the use of
CCTV: data collected from CCTV surveillance, such as images and videos, can only be used
for the security of people and goods and not for other purposes.
Law No. 83/2017 of 18 August establishes measures to combat money laundering and
terrorism financing, and has specific provisions regarding data protection that are already in
accordance with GDPR provisions.
v Technological innovation
Location tracking in a working environment
On 28 October 2014, the Portuguese Data Protection Authority approved Guideline No.
7680/2014, establishing the general principles in respect of the processing of personal data as
a result of the use of geolocation devices in a working environment.
This Guideline imposes several obligations to companies and public entities, in order
to guarantee the balance between business management and organisation with the employee’s
constitutional right to privacy. CNPD considers that the use of such geolocation devices
represents processing of sensitive data stipulated in Paragraph 2 of Article 20 of the Portuguese
Labour Code. According to GDPR and the Portuguese Data Protection Law, consent is not
a valid legal basis owing to the imbalance between employer and employee.
Use of cookies
According to Law No. 41/2004 of 18 August, storage of and access to cookies requires consent,
depending on the type of cookie. However, some cookies are allowed for the legitimate
purposes of the data controller. Clear and precise information should be provided about the
purposes of cookies, to ensure that users are aware of the information placed on their devices.
Data controllers must give users the opportunity to refuse the storage of cookies. The cookies
regime must be interpreted in line with Recitals 30 and 32, as well as Article 7 of GDPR.
Storage and access to information relating to cookies constitutes processing of personal
data. Therefore, a data subject’s consent should be as easy to withdraw as to give and the right
to information must be ensured. Where the processing serves multiple purposes, consent
should be given to each individual purpose.
Recently, Case C-673/17 of the CJEU brought some key considerations regarding
cookie usage: consent should be understood as a manifestation of will, which points to active
rather than passive behaviour. In other words, consent given through a pre-validated option
does not imply active behaviour on the part of the website user, so consent is not considered as
lawfully obtained. Failure to give consent to the use of cookies by the user may not condition
the use of the website under penalty of being incompatible with the requirement of free
consent (with the exception of cookies that are necessary for the operation of the website).
Consent obligations apply regardless of whether or not the information stored or consulted
on the user’s terminal equipment constitutes personal data.
334
© 2020 Law Business Research Ltd
Portugal
Biometrics
GDPR prohibits this type of data processing, since biometric data is considered a special
category of data. Nevertheless, the Regulation opens the possibility to do so on the basis of,
for example, the consent of the data subject or a law approved by the Member States. Consent
in a work context is, as a rule, not valid. Thus, the Portuguese Data Protection Law contains
a specific provision that allows the collection of biometric data following the practices already
in force in Portugal prior to the GDPR. This law establishes the legitimacy of the processing
of biometric data of employees if it is limited to attendance control and access control to the
employer’s premises. It must be ensured that only representations of biometric data are used,
and that their collection process does not allow for the reversibility of such data.
Covid-19 tracking
Recently, CNPD referred to the EDPB Guidelines 04/2020 on the use of location data and
contact-tracing tools in the context of the covid-19 outbreak.
Portuguese law does not address this particular subject, but it is understandable that,
depending on the application technical specifications, the information provided to data
subjects and the data retention policy, use of tracing apps is possible as long as it is voluntary
and not a requirement set by employers.
Several tools have been developed in Portugal to manage contact tracing, and CNPD
has published its findings regarding privacy and data protection concerns.
As we are facing a new paradigm, several actions must be taken by data controllers
in order to address their accountability regarding data protection. This includes updating
processing activities with the new health-related processing activities, indicating the specific
data retention periods associated to the processing.
There is also an increasing need for detailed information on employees regarding
temperature readings and any other covid-19 containment measures that may have impact
on a data subject’s rights.
335
© 2020 Law Business Research Ltd
Portugal
336
© 2020 Law Business Research Ltd
Portugal
337
© 2020 Law Business Research Ltd
Portugal
b from €2,000 to €2 million or 4 per cent of the total worldwide annual turnover,
whichever is higher, for SMEs; and
c from €1,000 to €500,000, for natural persons.
However, CNPD issued Decision No. 494/2019 deciding not to apply certain provisions of
Law No. 58/2019, notably the ones related to sanctions applicable to administrative offences
as they were considered to be in contradiction with GDPR.
seven fines (in a total of €430,000) under the GDPR. During this period, the DPA has also applied
other fines under the previous Data Protection Law and under the e-Privacy Law (Law 41/2004, as
amended by Law 46/2012). Most of the fines were related to the rights of the data subjects: lack of
the right to information and failure to ensure the right of access.2
In 2018, in Resolution No. 984/2018, CNPD imposed a fine of €400,000 to a public hospital
for having insufficient technical and organisational measures to ensure information security.3
According to the Resolution, the public hospital violated the principle of data
minimisation by granting access to an excessive amount of data, also violating the obligation
to take appropriate information security measures to prevent unauthorised and unsegregated
access to health data.
So far, this has been the biggest fine imposed in Portugal. It had plenty of coverage in
national media, serving as an example of how organisations, public and private, should tackle
GDPR adaptation and implementation.
In 2019, CNPD imposed four fines: one of €107,000, one of €20,000 and two of
€2,000, all under different grounds.
Resolution No. 21/2019 of 5 February 2019 imposed a fine of €20,000 on the defendant
based on a failure to comply with data subject right of access. As a brief factual framework
of this process, the data subject requested that the defendant grant him access to a copy of
phone call records with the defendant call centre – an entity subcontracted by the defendant
to manage its call centre. CNPD stated that the defendant did not mention the justification
provided by the DPO to the data subject; instead, it was mentioned that ‘a court order or
request of some entity or official body, as CNPD, police, etc.’ was needed. CNPD also noted
that the consultation implies a company’s paradigm transition of the ‘regulation by other
bodies regime (…) to self-regulation’, which should ‘ensure the legality of the processing
of personal data carried out, without any intermediation of the control authorities’, so that
the misinterpretation or ignorance of the law cannot benefit the defendant. As result of the
evidence, the Portuguese Supervisory Authority considered that the defendant had failed to
comply with the right of access of the data subject.4
2 https://edpb.europa.eu/sites/edpb/files/pt_sa_gdpr_art_97questionnaire.pdf.
3 Offence in breach of Articles (5)(1)(c)(f ) and (83)(5)(a), as well as Articles (32)(1)(b)(d) and (83)(4)(a).
4 Offence in breach of Articles (15)(f ) and (83)(5) (b) of the GDPR.
338
© 2020 Law Business Research Ltd
Portugal
In another case, a defendant was fined €2,000 based on failure to comply with the
data subject’s right of access to information (Resolution No. 207/2019 of 19 March 2019).
In summary, CNPD considered that there was a violation of the duty of information in
the course of an inspection by the public security police of a store, because they found
non-conformity with regard to the store’s signage (i.e., there was no informative warning
about video surveillance cameras). The defendant argued in its defence that, at the time
of the infraction, the commercial establishment had the necessary signs but that a cabinet
obstructed view of them, and that they had bought new signs to comply with the law. CNPD
considered that the defendant, having processed personal data through video surveillance,
should have complied with the information duty according to Articles (13)(1) and (2) of the
GDPR. As result of the evidence, the Portuguese Supervisory Authority considered that the
defendant failed to comply with the right of information of the data subject.5
Resolution 222/2019 of 25 March 2019 imposed a fine of €2,000 based on failure to
comply with the data subject right of information, under similar circumstances as Resolution
207/2019.
Resolution 297/2019 of 6 May 2019 imposed a fine of €107,000 based on the sending
of unsolicited emails for direct marketing and advertising purposes without prior consent.6
In summary, a company sent dozens of communications with unsolicited advertising content
to a person’s email address. The person was never a client of that company and had not
given consent to receive those communications. The figure of €107,000 was the result of the
imposition of a single fine of €7,000 for the practice of 46 misdemeanours in light of the law
that imposes prior consent of the employee as a ‘ground of legitimacy for the processing of
personal data consisting of the sending of unsolicited communications for direct marketing
purposes’. In addition, the defendant was given 40 fines of €2,500 each for the practice of
an equal number of administrative offences that failed to comply with the provisions of the
law, which states that consent is the only legitimate basis for this type of data processing. The
defendant also claimed that the email addresses from which the electronic communications
contained in the complaint were sent were from another entity. In its assessment, the CNPD
rejected that argument, stating that it is ‘quite common nowadays for companies to use
external entities for the development of marketing campaigns. However, this does not detract
from their qualification as a controller’.
339
© 2020 Law Business Research Ltd
Portugal
It also possible for any person to bring actions against decisions, including
misdemeanours and omissions of the CNPD, as well as civil liability actions for damages that
such acts or omissions may have caused.
The data subject may bring actions against the controller or the processor, including civil
liability actions. These legal actions shall be brought in the national courts if the controller or
processor has an establishment on national territory or if the data subject resides in Portugal.
Article 80(1) GDPR reinforces the right to class actions by giving the data subject
the right to instruct a ‘body, organisation or association’ to lodge a complaint on his or her
behalf, to exercise the rights provided for in Articles 77, 78 and 79 and to exercise the right
to compensation provided for in Article 82, if provided for by the law of the Member State.
In accordance with Article 80(2), Member States may additionally recognise the procedural
initiative of those entities irrespective of the mandate of the data subjects.
In Portugal, the right to collective actions has constitutional recognition. Article 52,
Paragraph 3 of the Portuguese Constitution provisions the right of popular action aimed at,
among others, ‘promoting the prevention, cessation or judicial pursuit of offences against
public health, consumer rights, quality of life and the preservation of the environment and
cultural heritage’.
Portugal also has legislation with specific territorial requirements regarding the localisation
process, such as data related to national security, anti-money laundering and financial records.
On 16 July 2020, the CJEU invalidated Decision No. 2016/1250 on the adequacy of
the protection provided by the EU–US Data Protection Shield.7
For that reason, any companies in the United States will have to make use of standard
contractual clauses, or other approved mechanisms, to make any international data transfers
with a Portuguese company.
7 http://curia.europa.eu/juris/document/document.jsf?text=&docid=228677&pageIndex=0&doclang=EN&
mode=req&dir=&occ=first&part=1&cid=9735251.
340
© 2020 Law Business Research Ltd
Portugal
security. Its mission is to help Portugal use cyberspace in compliance with the principles
and objectives of the National Strategy for Cyber Security 2019–2023, exercising powers of
national authority in cybersecurity matters.
The past year was marked by the continuation of the publication of standards and
benchmarks for cyberspace security, with special emphasis on the National Framework of
Reference for Cybersecurity and the Roadmap for Minimum Capacities in Cybersecurity.
The National Framework of Reference for Cybersecurity allows organisations to reduce the
risk associated with cyberthreats, providing the basis for any entity to meet the minimum
security requirements of networks and information systems.
These publications contribute to the goal of qualifying and improving the resilience
of people and entities in national cyberspace, allowing for reduction of risk associated
with cyberthreats and providing the basis for any entity to meet the minimum security
requirements of networks and information systems.
CNCS also promotes the development and application of measures towards human and
technological building of public and critical infrastructures, with the objective of preventing
and reacting to cybersecurity incidents, ensuring the assistance of entities in the following
ways:
a review of cybersecurity policies;
b recommendations for the building of computer security incident response teams;
c recommendations for carrying out internal cybersecurity audits; and
d promotion of training and awareness.
Nowadays, it is undeniable that both individuals and companies are completely reliant on the
internet. This reality has numerous advantages, but also carries certain risks.
Companies have become a target for black-hat hackers, exploiters and cybercriminals,
who aim to obtain information from their servers with the intention of using it, hijacking
it, selling it or publishing it on the internet. With this in mind, there is a growing need for
specialised and multidisciplinary teams that seek to defend companies against these types of
incidents.
Cybercrimes committed on Portuguese territory have increased in recent years.
Numbers from the Attorney General’s Office indicate that this type of crime has increased
exponentially since the beginning of the covid-19 pandemic, having grown 230 per cent in
March and 165 per cent by 16 April 2020.
Crime complaints received by the Cyber Crime Bureau have consistently increased
between 2016 and 2019, and those received up to 16 April 2020 ‘have already surpassed
those of the entire year of 2018 and are close to the total number of 2019’.8
The transposition of the NIS Directive by Law No. 46/2018 of 13 August, has shed
new light on the obligations that companies have within the legal framework of cyberspace
security. This Law applies to the public administration; to critical infrastructure operators;
to essential services operators; to digital service providers that provide online market-related
services, online search engine or cloud computing services providers with an establishment
in Portugal or, not having one, have assigned a representative established in the Portuguese
territory as long as they are providing digital services; as well as any other entity that uses
networks and information systems.
8 https://www.portugal.gov.pt/download-ficheiros/ficheiro.aspx?v=19cabc8c-e3f1-4cb2-a491-a10c8a3e4bf0.
341
© 2020 Law Business Research Ltd
Portugal
This Law also establishes that the National Cyberspace Security Strategy shall define a
state framework, as well as objectives and lines of action according to the national interests.
Law No. 46/2018 also defines security and standardisation requirements, incident
notification requirements, security requirements and incident reporting for the public
administration and infrastructure operators, for essential service operators and for digital
service providers.
It also establishes sanctions for those who violate the provisions of this Law, defined
as serious or very serious administrative offences, in accordance with Article 21 et seq., the
National Cybersecurity Center being responsible for supervising and applying the provided
sanctions. Serious offences result from failure of the obligation to notify the National
Cybersecurity Center of incidents and activities in the digital infrastructure sector. Very
serious offences result from from non-compliance with the obligation to implement security
requirements, and non-compliance with cybersecurity instructions issued by the National
Cybersecurity Center. Serious administrative offences have fines from €1,000 to €3,000 for
natural persons and fines from €3,000 to €9,000 for legal persons. Very serious administrative
offences have established fines varying between €5,000 and €25,000 for natural persons and
between €5,000 and €25,000 for legal persons.
X OUTLOOK
We took the opportunity to analyse ‘Contribution of the EDPB to the evaluation of the
GDPR under Article 97’. The European Data Protection Board (EDPB) and the individual
EEA supervisory authorities contributed to the evaluation and review of GDPR’s 20 months
of implementation for the upcoming European Commission 2020 report.9 The main takes
regarding the Portugal Supervisory Authority (CNPD) activity are as follows:
a Regarding CNPD’s full-time employees, with 27 people, Portugal is well below
the average of 136, but near the median, which is 58 full-time employees for other
Member-State supervisory authorities.
b The budgets envisaged for CNPD are also disparate (e.g., Germany has a €85,837,500
budget and Portugal’s budget is €2,385,000).
c The Portuguese Supervisory Authority declared that it did not have an adequate budget
or conditions to perform their supervisory functions as provisioned by GDPR.
d Portugal was in the middle of the table of countries below 2,500 complaints between
25 May 2018 and 30 November 2019, with 1,394 complaints reported.
e Portugal made use of corrective powers under GDPR Articles (58)(2c,d,f,g and i).
f There were 785 fines imposed, distributed among 22 control authorities (out of 30).
The majority were for infringements of GDPR Articles 5, 6, 7, 9, 12–22 and 32–34.
g Portugal had 400 data breach notifications.
h The Portuguese Supervisory Authorities promoted initiatives among SMEs. CNPD
said that they provided records of processing activities models, participated in several
clarification sessions and created FAQs and other guidance. However, thia was a
little underwhelming in comparison with other countries with the same budget and
headcount.
342
© 2020 Law Business Research Ltd
Portugal
Covid-19 has brought a lot of economic and financial uncertainty to Member-States, and to
the world altogether, which will mean some concerns being prioritised over others.
We believe that Portugal will have to refocus itself on some major issues such as
unemployment, company restructuring and public health, as every citizen expects it.
Areas like cybersecurity or data protection and privacy might get overlooked, but we
also believe that the trend is to increase awareness in data protection as whole, including
technological infrastructures and databases, whether they include personal data or not.
On 25 July 2020, the Portuguese government presented the ‘Simplex 20-21’, which
made commitments regarding the digitisation of several public administration services,
namely the service ‘My Data’, which consists of providing mechanisms for consultation and
validation of data contained in the main public administration registers and monitoring of
data sharing through a platform for the interoperability of public administration.10
10 https://www.simplex.gov.pt/app/files/b7b56a16111d4c1e05f6fbddb3cf8ec8.pdf.
343
© 2020 Law Business Research Ltd
Chapter 23
RUSSIA
Vyacheslav Khayryuzov1
I OVERVIEW
The Russian legal system is based on a continental civil law, code-based system. Both federal
and regional legislation exist; however, federal legislation takes priority in cases of conflict.
Generally, the issues of data privacy are regulated at federal level, and the regions of Russia do
not issue any specific laws or regulations in this respect.
The latest Constitution of Russia, which provides that each individual has a right to
privacy and personal and family secrets, was adopted in 1993. Each individual has a right
to keep his or her communication secret, and restriction of this right is allowed only subject
to a court decision. Collection, storage, use and dissemination of information about an
individual’s private life are allowed only with the individual’s consent. The protection of
these basic rights is regulated by special laws (e.g., on communications) and also specific
regulations enacted in relation to these laws.
In 2007, Russia adopted a major law regulating data privacy issues, Federal Law No.
152-FZ on Personal Data dated 27 July 2006 (the Personal Data Law). The Personal Data
Law covers almost all aspects of data protection, for example, what is considered personal
data, what types of data can be collected and processed, how and in what cases data can be
collected and processed, and what technical and organisational measures must be applied
by companies or individuals that collect data. Unlike European law, the Personal Data Law
does not distinguish between data controllers and data processors. Therefore, any individual
or entity working with personal data is considered a personal data operator and thus falls
under the regulation of the Personal Data Law. There are also several specific regulations,
mainly covering the technical side of data processing and to a certain extent clarifying the
provisions of the Personal Data Law. Such regulations are issued by the Russian government,
the Russian data protection authority (i.e., the Federal Service for Supervision in the Sphere
of Communication, Information Technology and Mass Communications (DPA)) or the
authorities responsible for various security issues in Russia, such as the Federal Service for
Technical and Export Control (FSTEK) or the Federal Security Service (FSB).
Since 2007, data privacy has never been a topic of intense discussion or major
enforcement. However, this changed rather dramatically in 2014. The general approach
of the government to privacy became fairly protectionist. In 2014, the Russian parliament
adopted amendments to the Personal Data Law (that then became known as the Data
Localisation Law) that require data operators that collect Russian citizens’ personal data to
store and process such personal data using databases located in Russia. The Data Localisation
344
© 2020 Law Business Research Ltd
Russia
Law was highly criticised by business and the media but nevertheless came into force on
1 September 2015. While this law generated a great deal of profit for Russian data centres,
it also created high costs for ordinary businesses, which needed to redesign their data storage
infrastructure.
In addition to the Data Localisation Law, Russia adopted amendments to the Russian
Federal Law on Information, Information Technology and Protection of Information. These
amendments require companies that provide video, audio or text communication services
(usually ‘messengers’) to register with the authorities, to store users’ messages or audio or
video calls for up to six months and to provide the security authorities with decryption keys if
the messages are encrypted. These rules have resulted in the blocking of Blackberry Messenger
and a few other messengers in Russia and in a campaign to block the Telegram messenger.
345
© 2020 Law Business Research Ltd
Russia
346
© 2020 Law Business Research Ltd
Russia
j acquaint its employees with the internal data protection processes and regulations, and
conduct training sessions on personal data security; and
k register with the DPA (unless subject to exemptions).
The above list of steps is rather standard and may apply to most data operators; however, it is
not exhaustive and the relevant measures may vary depending on the types of data collected
and the means of collection and processing. The exact list of measures must be defined on a
case-by-case basis.
v Technological innovation
Developments in Russian privacy legislation and Personal Data Law used to be very slow,
and they obviously do not yet meet the demands of the rapid changes in technological
innovation. Issues such as location tracking, Big Data, data portability, employee monitoring,
facial recognition technology, behavioural advertising and electronic marketing remain, to a
certain extent, grey areas without adequate regulation.
However, the situation is changing. For instance, the DPA and the courts currently
support the idea that technological measures such as cookies constitute personal data. This
definitely makes business operations even more complicated. In addition, the lawmakers
intend to adopt a law on big data with a potential requirement to localise all data in Russia.
347
© 2020 Law Business Research Ltd
Russia
In most cases obtaining consent would be necessary in order to transfer personal data to a
third party. The Personal Data Law also requires that the data exporter and the data importer
enter into an agreement (or at least add a provision to their agreement in the event of a
cross-border transaction) that must stipulate that the data importer will ensure at least the
same level of data protection as applied by the data exporter and certain other obligations
provided under the Personal Data Law.
348
© 2020 Law Business Research Ltd
Russia
companies. Normally, such documents are developed by external service providers that have
a state licence to provide information security services. These documents are of a technical
nature and normally cover the types of software and hardware a company should use to
protect its information systems that contain personal data.
349
© 2020 Law Business Research Ltd
Russia
Data operators may be subject to criminal, civil and administrative liability. The
individuals whose personal data has been compromised have a private right to sue, with the
right to demand compensation for losses or compensation for ‘moral harm’.
The DPA is entitled to initiate administrative proceedings in the event of a data breach
and impose administrative sanctions (fines) if the breach is proven. In addition, the DPA
may, subject to a court decision, block infringing websites or mobile applications from being
accessed in Russia.
The current maximum administrative fine is 18 million roubles for a repeated breach
of the data localisation requirement. However, data localisation fines are substantially higher
than the other administrative fines for breaching personal data protection laws. For instance,
the next highest fine is just 75,000 roubles for failure to obtain an individual’s consent to
process their personal data. In practice, the administrative fines are not multiplied by, for
example, the number of emails or employees whose data was compromised or by the number
of specific data breaches, but instead applied only once for a particular type of breach.
However, this practice may change in the near future.
Criminal sanctions can only be applied against natural persons and can never be applied
against companies. However, even those Articles of the Russian Criminal Code that could
theoretically apply to personal data breaches are never applied to such cases as far as we know.
350
© 2020 Law Business Research Ltd
Russia
Telegram’s lawyers appealed this decision without success. Since April 2018, the DPA
has tried to block Telegram from using its IP address, which has proven to be an ineffectual
strategy because Telegram was available to its users in Russia even during blocking. Surprisingly,
on 18 June 2020, the DPA announced that it would withdraw its claims against Telegram,
as the owner of Telegram, Mr Durov, apparently agreed to cooperate with the authorities
on anti-terrorism and anti-extremism requests. It is unclear, though, whether Telegram has
agreed to provide the decryption keys, since there have been no official comments on this.
Since 18 June 2020, the DPA has also removed all IP addresses related (or allegedly related)
to Telegram from the block list.
351
© 2020 Law Business Research Ltd
Russia
and responsibilities of persons holding rights of ownership or other legal rights to the facilities
for critical information infrastructure, communications providers and information systems
providing interaction with these facilities.
The elements of the critical information infrastructure are understood to be
information systems, telecommunication networks of state authorities as well as such systems
and networks for the management of technological processes that are used in state defence,
healthcare, transport, communication, finance, energy, fuel, nuclear, aerospace, mining,
metalworking and chemical industries. All these industries are considered critical for the
economy and should be protected against any cyberthreats. The law requires such industries
to implement protection measures, assign the category of protection (in accordance with
the statutes) and then register with FSTEK, which is now the supervisory authority in this
field. So far, businesses have many questions to the authorities with respect to this law,
which is very broadly drafted. The usual question is whether the law applies to a particular
business or not, since even internal LAN networks may be considered critical information
infrastructure under such general rules of the law. However, the authorities usually reply that
this is an incorrect interpretation. The lack of enforcement practice does not help to clarify
the situation.
The potential abuse of information systems for illicit purposes poses new security
risks to the government and to businesses. As a result, Russian authorities have introduced
rules requiring foreign software producers to allow the agencies certified by Russian state
authorities to review the source code of the software (in most cases security products such as
firewalls, anti-virus applications and software containing encryption) before permitting the
products to be imported and sold in the country. This is done to ensure that there are no
‘backdoors’ in the software that could be used by foreign intelligence services.
On 16 April 2019, Russia adopted the Runet Isolation Law, which came into force on
1 November 2019. Under this law, the DPA received broad powers to control the internet.
Furthermore, communications operators are now obliged to use traffic exchange points from
a specially created registry run by the DPA, which should be physically located only in the
territory of Russia. In addition, communications operators are obliged to provide the DPA
with all information about their network addresses, telecommunications message routes,
software and hardware tools used to resolve domain names and communications network
infrastructure.
Such a closed environment would make it easier to block any prohibited or unwanted
services. The general idea of this law is to keep the Russian segment of the internet technically
live even if it is switched off from the rest of the worldwide web (irrespective of whoever
decides to do this – an external force or the Russian government itself ). The blocking part also
looks fairly logical, since it is currently difficult for the authorities to enforce blocking when
illegal services are hosted by foreign-based providers. In a Russia-locked environment this
would be much easier to do as all players would be only Russian companies and individuals.
It remains to be seen how this law would affect any foreign companies doing business
in Russia. So far it does not seem that the law has had any significant effect on business.
However, in the event of a doomsday scenario where the Russian segment is switched off
from the rest of the web, it would certainly affect everyone working with Russia. From our
perspective, however, this law is a kind of loaded gun that the authorities want to have ‘just
in case’ and it does not seem likely that they would initiate the switch-off themselves.
352
© 2020 Law Business Research Ltd
Russia
X OUTLOOK
Owing to the outbreak of covid-19, it has become apparent to the authorities, businesses and
society in general that the market should move even more quickly towards total digitalisation.
Currently, there are intensified initiatives to create a proper legal basis for remote working,
electronic paperwork and digital passports for individuals, for example. It appears that the
next few years will change the Russian privacy landscape significantly.
In 2019, Russia signed the Protocol to the Council of Europe Convention No. 108.
We expected new amendments to the Personal Data Law that would harmonise the law
with Convention No. 108. However, the introduction of amendments was delayed by the
covid-19 outbreak. We still expect the introduction of the rules for breach notification and
depersonalisation of personal data owned by commercial entities (up to now, the DPA was
of the opinion that only governmental entities were allowed to perform depersonalisation).
As noted above, lawmakers introduced high fines for failure to localise personal data in
Russia The relevant fines for non-compliance include administrative fines (up to 6 million
roubles for a first violation and up to 18 million roubles for a repeated violation). The fines
have been applied only twice, against Facebook and Twitter (the fine issued was 4 million
roubles in each case), and there were reports that both companies failed to pay the fine. It
remains to be seen how the DPA will enforce the fines against Facebook and Twitter and also
against any other potential violators.
It is also expected that more court practice will appear. The number of court cases
related to data privacy is already increasing, and we expect even more enforcement actions
and court clarifications in this field.
353
© 2020 Law Business Research Ltd
Chapter 24
SINGAPORE
I OVERVIEW
In 2019 and 2020, Singapore continued to develop its data protection, cybercrime, and
cybersecurity regimes. As set out in Singapore’s Cyber Landscape 2019 report,2 the
government focused on four pillars of strategy to protect the country from cyberthreats
and reinforce Singapore’s standing as a leading information systems hub. It aimed to:
(1) build a resilient infrastructure; (2) create a safer cyberspace environment; (3) develop
a vibrant cybersecurity ecosystem; and (4) strengthen international partnerships. The key
legal components in this strategy include the Personal Data Protection Act 2012 (PDPA),
Singapore’s first comprehensive framework established to ensure the protection of personal
data, the Computer Misuse Act (CMA) to combat cybercrime and other cyberthreats,
and the Cybersecurity Act 2018 (the Cybersecurity Act), which focuses on protecting
Singapore’s Critical Information Infrastructure (CII) in 11 critical sectors and establishing a
comprehensive national cybersecurity framework.
In this chapter, we will outline the key aspects of the PDPA, CMA and the Cybersecurity
Act. The chapter will place particular emphasis on the PDPA, including a brief discussion
of the key concepts, the obligations imposed on data handlers, and the interplay between
technology and the PDPA. Specific regulatory areas such as the protection of minors, financial
institutions, employees and electronic marketing will also be considered. International data
transfer is particularly pertinent in the increasingly connected world; how Singapore navigates
between practical considerations and protection of the data will be briefly examined. We also
consider the enforcement of the PDPA in the event of non-compliance.
354
© 2020 Law Business Research Ltd
Singapore
Guide to Accountability under the PDPA and updated the PDPC’s Advisory Guidelines to
include a section on ‘Accountability Obligation’ in place of the ‘Openness Obligation’ under
Section 11 of the PDPA (which relates to, among other things, obligations on organisations to
make available information about their data protection policies and practices). Other recent
guidance includes the second edition of the Model AI Governance Framework, released
by the PDPC on 21 January 2020, which outlines an accountability-based framework and
guidelines by which organisations can deploy AI solutions responsibly. On 17 July 2019, a
new Data Protection Officer (DPO) Competency Framework and Training Roadmap was
published to clarify the core competencies and proficiency levels for a DPO.
On 17 July 2019, the PDPC announced that the Infocomm Media Development
Authority (IMDA) has been appointed as Singapore’s Accountability Agent for the Asia-Pacific
Economic Cooperation (APEC) Cross-Border Privacy Rules (CBPR) and Privacy Recognition
for Processors (PRP) Systems certifications. With this appointment, organisations can now
be certified under the APEC CBPR and PRP Systems for accountable data transfers across
borders to other certified organisations. Following this, the PDPC amended the Personal
Data Protection Regulations on 2 June 2020 to formally recognise the APEC CBPR System
and PRP System certifications as one of the accepted modes for overseas data transfers. The
PDPC also entered into a Memorandum of Understanding (MOU) with the Philippines’
National Privacy Commission and the Office of the Australian Information Commissioner
(OAIC) on 9 September 2019 and 25 March 2020 respectively. The MOUs set out, among
other things, a framework for cooperation for the mutual exchange of information and
assistance in joint investigations, and the development of compatible mechanisms to facilitate
cross-border data flows such as participation in the APEC CBPR System.
In September and October 2019, the PDPC published revisions to a number of
guidelines. This includes revisions to the PDPC’s Guide to Notification, which outlines best
practices for notifying individuals about an organisation’s personal data protection policies
and practices. The revised guide includes a section on key considerations in developing
notifications and new examples, including dynamic consent and just-in-time notifications.
The PDPC also revised Chapter 6 on ‘Organisations’ and Chapter 15 on ‘Access and
Correction Obligations’ of the Advisory Guidelines on Key Concepts in the PDPA, and
introduced a new chapter on ‘Cloud Services’ in the Advisory Guidelines on the PDPA for
Selected Topics.
As further discussed in Part X, from 14–28 May 2020, the Ministry of Communications
and Information and the PDPC launched an online public consultation on the proposed
amendments to the PDPA and related amendments to the Spam Control Act.
355
© 2020 Law Business Research Ltd
Singapore
crackers). The amendments also extended the extraterritorial reach of the CMA by covering
actions by persons targeting systems that result in, or create a significant risk of, serious harm
in Singapore, even if the persons and systems are both located outside Singapore.
In keeping with the government’s emphasis on safeguarding critical information
infrastructure, the Cybersecurity Act was enacted on 31 August 2018. The Cybersecurity Act
creates a framework for the protection of CII against cyberthreats, creates the Commissioner
of Cybersecurity with broad powers to administer the Cybersecurity Act, establishes a
licensing scheme for providers of certain cybersecurity services, and authorises measures for
the prevention, management, and response to cybersecurity incidents in Singapore.
While there have been no significant legislative developments in this area since
2018, cross-border enforcement of the Cybersecurity Act remains a challenging problem,
particularly for cloud-based service providers. Singapore has signed MOUs and entered
into cooperation arrangements with multiple foreign governments to facilitate international
collaboration to address cybersecurity. These MOUs and cooperation arrangements were with
Australia, Canada, India, France, Germany, Japan, the Republic of Korea, the Netherlands,
New Zealand, the United States and the United Kingdom.
356
© 2020 Law Business Research Ltd
Singapore
There is no prescribed list of ‘personal data’; rather, these are defined broadly as data
about an individual, whether or not they are true, who can be identified from that data or in
conjunction with other information to which the organisation has or is likely to have access.4
In addition, the PDPA does not distinguish between personal data in its different forms or
mediums. Thus, there is no distinction made for personal data that are ‘sensitive’, or between
data that are in electronic or hard copy formats. There are also no ownership rights conferred
on personal data to individuals or organisations.5 There are certain exceptions to which the
PDPA would apply. Business contact information of an individual generally falls outside the
ambit of the PDPA,6 as does personal data that is publicly available.7 In addition, personal
data of an individual who has been deceased for over 10 years8 and personal data contained
within records for over 100 years is exempt.9
Pursuant to the PDPA, organisations are responsible for personal data in their possession
or under their control.10 ‘Organisations’ include individuals in Singapore, whether or not
they are residents, local and foreign companies, associations and bodies (incorporated and
unincorporated), whether or not they have an office or a place of business in Singapore.11
The PDPA does not apply to public agencies.12 Individuals acting in a personal or domestic
capacity, or where they are an employee acting in the course of employment within an
organisation, are similarly excluded from the obligations imposed by the PDPA.13
Where an organisation acts in the capacity of a data intermediary, namely an organisation
that processes data on another’s behalf, it would only be subject to the protection and retention
obligations under the PDPA. The organisation that engaged a data intermediary’s services
remains fully responsible in respect of the data as if it had processed the data on its own.14
There is no requirement to prove harm or injury to establish an offence under the
PDPA, although this would be necessary in calculating damages or any other relief to be
awarded to the individual in a private civil action against the non-compliant organisation.15
Subsidiary legislation to the PDPA includes implementing regulations relating to the
Do Not Call (DNC) Registry,16 enforcement,17 composition of offences,18 requests for access
to and correction of personal data and the transfer of personal data outside Singapore.19
357
© 2020 Law Business Research Ltd
Singapore
There is also sector-specific legislation, such as the Banking Act, the Telecommunications
Act and the Private Hospitals and Medical Clinics Act, imposing specific data protection
obligations. All organisations will have to comply with PDPA requirements in addition to
the existing sector-specific requirements. In the event of any inconsistencies, the provisions
of other laws will prevail.20
The PDPC has released various advisory guidelines, as well as sector-specific advisory
guidelines for the telecommunications, real estate agency, education, social services and
healthcare sectors. The PDPC has also published advisory guidelines on data protection
relating to specific topics such as photography, analytics and research, data activities relating
to minors and employment. While the advisory guidelines are not legally binding, they
provide helpful insight and guidance into problems particular to each sector or area.
Consent21
An organisation may only collect, use or disclose personal data for purposes to which an
individual has consented. Where the individual provided the information voluntarily and
it was reasonable in the circumstances, the consent may be presumed. Consent may be
withdrawn at any time with reasonable notice.22 The provision of a service or product must
not be made conditional upon the provision of consent beyond what is reasonable to provide
that product or service.
An organisation may obtain personal data with the consent of the individual from a
third party source under certain circumstances. For example, with organisations that operate
in a group structure, it is possible for one organisation in the group to obtain consent to the
collection, use and disclosure of an individual’s personal data for the purposes of the other
organisations within the corporate group.23
Purpose limitation24
Organisations are limited to collecting, using or disclosing personal data for purposes that
a reasonable person would consider appropriate in the circumstances and for a purpose to
which the individual has consented.
358
© 2020 Law Business Research Ltd
Singapore
Notification25
Organisations are obliged to notify individuals of their purposes for the collection, use and
disclosure of the personal data on or before the collection. The PDPC has also released a
guide to notification to assist organisations in providing clearer notifications to consumers
on the collection, use and disclosure of personal data that includes suggestions on the layout,
language and placement of notifications.26
Accuracy30
An organisation is obliged to make a reasonable effort to ensure that the personal data
collected by or on behalf of the organisation is accurate and complete if they are likely to
be used to make a decision that affects an individual or are likely to be disclosed to another
organisation.
Protection31
An organisation is obliged to implement reasonable and appropriate security safeguards to
protect the personal data in its possession or under its control from unauthorised access or
similar risks. As a matter of good practice, organisations are advised to design and organise
their security arrangements in accordance with the nature and varying levels of sensitivity of
the personal data.32
Retention limitation33
An organisation may not retain the personal data for longer than is reasonable for the purpose
for which they were collected, and for no longer than is necessary in respect of its business or
legal purposes. Beyond that retention period, organisations should either delete or anonymise
their records.
359
© 2020 Law Business Research Ltd
Singapore
Transfer limitation34
An organisation may not transfer personal data to a country or territory outside Singapore
unless it has taken appropriate steps to ensure that the data protection provisions will be
complied with, and that the overseas recipient is able to provide a standard of protection that
is comparable to the protection under the PDPA (see Section IV).
Accountability35
Previously known as the ‘Openness Obligation’, under the ‘Accountability Obligation’, an
organisation is taken to be responsible for personal data in its possession or under its control.
To that end, it is obliged to designate one or more individuals to be responsible for ensuring
the organisation’s compliance with the PDPA, implement necessary policies and procedures
in compliance with the PDPA, and to ensure that this information is available on request.
360
© 2020 Law Business Research Ltd
Singapore
As regards social media, one issue arises where personal data are disclosed on social
networking platforms and become publicly available. As noted earlier, the collection, use and
disclosure of publicly available data is exempt from the requirement to obtain consent. If,
however, the individual changes his or her privacy settings so that the personal information is
no longer publicly available, the PDPC has adopted the position that, as long as the personal
data in question were publicly available at the point of collection, the organisation will be
able to use and disclose the same without consent.39
Financial institutions
A series of notices issued by the Monetary Authority of Singapore (MAS),43 the country’s
central bank and financial regulatory authority, require various financial institutions to,
among other things:
a upon request, provide access as soon as reasonably practicable to personal data in
the possession or under the control of the financial institution, which relates to an
individual’s factual identification data such as full name or alias, identification number,
residential address, telephone number, date of birth and nationality; and
b correct an error or omission in relation to the categories of personal data set out above
upon request by a customer if the financial institution is satisfied that the request is
reasonable.
361
© 2020 Law Business Research Ltd
Singapore
On 5 December 2019, the MAS issued two further Notices: a Notice on Cyber Hygiene44
to licensees and operators of designated payment systems and a Notice on Technology Risk
Management45 to operators and settlement institutions of designated payment systems,
pursuant to Section 102(1) of the Payment Services Act 2019. They set out, among other
things, cybersecurity requirements to protect customer information from unauthorised access
or disclosure.
In addition, legislative changes to the Monetary Authority of Singapore Act, aimed at
enhancing the effectiveness of the anti-money laundering and the countering of financing
of terrorism (AML/CFT) regime of the financial industry in Singapore, came into force on
26 June 2015.
Following the changes, MAS now has the power to share information on financial
institutions with its foreign counterparts under their home jurisdiction on AML/CFT issues.
MAS may also make AML/CFT supervisory enquiries on behalf of its foreign counterparts.
Nonetheless, strong safeguards are in place to prevent abuse and ‘fishing expeditions’. In
granting requests for information, MAS will only provide assistance for bona fide requests.
Any information shared will be proportionate to the specified purpose, and the foreign AML/
CFT authority has to undertake not to use the information for any purpose other than the
specified purpose, and to maintain the confidentiality of any information obtained.
Electronic marketing
The PDPA contains provisions regarding the establishment of a national DNC Registry and
obligations for organisations that send certain kinds of marketing messages to Singapore
telephone numbers to comply with these provisions. The PDPA Healthcare Guidelines46
provide further instructions on how the DNC provisions apply to that sector, particularly
in relation to the marketing of drugs to patients. In relation to the DNC Registry, the
obligations only apply to senders of messages or calls to Singapore numbers, and where the
sender is in Singapore when the messages or calls are made, or where the recipient accesses
them in Singapore. Where there is a failure to comply with the DNC provisions, fines of up
to S$10,000 may be imposed for each offence.
Employees
The PDPC provides that organisations should inform employees of the purposes of the
collection, use and disclosure of their personal data and obtain their consent.
Employers are not required to obtain employee consent in certain instances. For
instance, the collection of employee’s personal data for the purpose of managing or
terminating the employment relationship does not require the employee’s consent, although
employers are still required to notify their employees of the purposes for their collection,
use and disclosure.47 Examples of managing or terminating an employment relationship
can include using the employee’s bank account details to issue salaries or monitoring how
the employee uses company computer network resources. The PDPA does not prescribe the
362
© 2020 Law Business Research Ltd
Singapore
manner in which employees may be notified of the purposes of the use of their personal
data; as such, organisations may decide to inform their employees of these purposes via
employment contracts, handbooks or notices on the company intranet.
In addition, collection of employee personal data necessary for ‘evaluative purposes’,
such as to determine the suitability of an individual for employment, neither requires the
potential employee to consent to, nor to be notified of, their collection, use or disclosure.48
Other legal obligations, such as to protect confidential information of their employees, will
nevertheless continue to apply.49
Section 25 of the PDPA requires an organisation to cease to retain or anonymise
documents relating to the personal data of an employee once the retention is no longer
necessary.
Notwithstanding the above, an organisation is taken to have satisfied the latter requirement
if, inter alia, the individual consents to the transfer pursuant to the organisation providing a
summary in writing of the extent to which the personal data transferred to another country
will be protected to a standard comparable to the PDPA;53 or where the transfer is necessary
for the performance of a contract. Alternatively, if an overseas recipient is APEC CBPR
certified or APEC PRP certified (where the recipient is a data intermediary), the recipient will
be taken to be bound by legally enforceable obligations to provide a standard of protection
that is at least comparable to the PDPA.54
48 Paragraph 1(f ) Second Schedule, Paragraph 1(f ) Third Schedule and Paragraph 1(h) Fourth Schedule of the
PDPA.
49 Sections 5.14–5.16 of the PDPA Selected Topics Guidelines.
50 Section 26(1) of the PDPA. The conditions for the transfer of personal data overseas are specified within
the Personal Data Protection Regulations 2014 (PDP Regulations).
51 Regulation 9 of the PDP Regulations.
52 Regulation 10 of the PDP Regulations.
53 Regulations 9(3)(a) and 9(4)(a) of the PDP Regulations.
54 Regulation 10A of the PDP Regulations
363
© 2020 Law Business Research Ltd
Singapore
In respect of personal data that simply passes through servers in Singapore en route to
an overseas destination, the transferring organisation will be deemed to have complied with
the transfer limitation obligation.55
The PDPA Key Concepts Guidelines also provide examples to illustrate situations in
which organisations are deemed to have transferred personal data overseas in compliance
with their transfer limitation obligation pursuant to Section 26 of the PDPA, regardless of
whether the foreign jurisdiction’s privacy laws are comparable to the PDPA. An example is
when a tour agency needs to share a customer’s details (e.g., his or her name and passport
number) to make hotel and flight bookings. The tour agency is deemed to have complied
with Section 26 since the transfer is necessary for the performance of the contract between
the agency and the customer.56
An organisation is also deemed to have complied with the transfer limitation obligation
if the transfer is necessary for the performance of a contract between a Singaporean company
and a foreign business, and the contract is one that a reasonable person would consider to be
in the individual’s interest.57
Other examples given by the PDPA Key Concepts Guidelines include the transferring
of publicly available personal data, and transferring a patient’s medical records to another
hospital where the disclosure is necessary to respond to a medical emergency.
The PDPA Key Concepts Guidelines also sets out the scope of contractual clauses at
Section 19.7 for recipients to comply with the required standard of protection in relation to
personal data received so that it is comparable to the protection under the PDPA. The PDPA
Key Concepts Guidelines sets out in a table (reproduced below) the areas of protection a
transferring organisation should minimally set out in its contract in two situations: where
the recipient is another organisation (except a data intermediary); and where the recipient
is a data intermediary (i.e., an organisation that processes the personal data on behalf of the
transferring organisation pursuant to a contract).
Recipient is:
S/N Area of protection Organisation (except data
Data intermediary
intermediary)
1 Purpose of collection, use and disclosure by recipient – Yes
2 Accuracy – Yes
3 Protection Yes Yes
4 Retention limitation Yes Yes
5 Policies on personal data protection – Yes
6 Access – Yes
7 Correction – Yes
364
© 2020 Law Business Research Ltd
Singapore
ii Cookie policy
If the corporate website requires collection of personal data or uses cookies that require
collection of personal data, users ought to be notified of the purpose for the collection, use or
disclosure of the personal data, and prompted for their consent in that regard.
365
© 2020 Law Business Research Ltd
Singapore
the organisation over the data intermediaries. Where a third party is engaged to collect data
on an organisation’s behalf, the contract should specify that the collection is conducted in
compliance with the data protection provisions.
366
© 2020 Law Business Research Ltd
Singapore
in writing that it will comply with its terms in respect of the disclosed data. This obligation is
mutual, and the PDPA also authorises the PDPC to enter into a similar undertaking required
for a foreign data protection body where required.67
367
© 2020 Law Business Research Ltd
Singapore
368
© 2020 Law Business Research Ltd
Singapore
ii Cybersecurity
Singapore is not a signatory to the Council of Europe’s Convention on Cybercrime.
In Singapore, the CMA and the Cybersecurity Act are the key legislations governing
cybercrime and cybersecurity. The CMA is primarily focused on defining various cybercrime
offences, including criminalising the unauthorised accessing82 or modification of computer
material,83 use or interception of a computer service,84 obstruction of use of a computer,85 and
unauthorised disclosure of access codes.86
The 2017 amendments to the CMA added the offences of obtaining or making available
personal information that the offender believes was obtained through a computer crime87
and using or supplying software or other items to commit or facilitate the commission of a
computer crime.88
The Cybersecurity Act greatly expands national cybersecurity protections, including
by imposing affirmative reporting, auditing and other obligations on CII owners and by
appointing a new Commissioner of Cybersecurity with broad authority, including the power
to establish mandatory codes of practice and standards of performance for CII owners.
Under Section 2 of the Cybersecurity Act, ‘cybersecurity’ is defined as the state in which
a computer or system is protected from unauthorised access or attack and, because of that
state:
369
© 2020 Law Business Research Ltd
Singapore
CII is defined as computer systems, located at least partly within Singapore, that are necessary
for the continuous delivery of an essential service such that the loss of a system would have a
debilitating effect on the availability of the essential service in Singapore. The Commissioner
will designate those systems that it determines qualify as CII, and will notify the legal owner
of such systems in writing. An owner or operator of a system that has been designated as CII
must comply with various requirements set forth in the Act, including but not limited to
reporting to the Commissioner certain prescribed incidents, establishing mechanisms and
processes for detecting cybersecurity threats and incidents, reporting any material changes
to the design, configuration, security or operation of the CII, complying with all codes of
practice and standards of performance issued by the Commissioner, conducting regular
audits of compliance of the CII with the Cybersecurity Act, and participating in cybersecurity
exercises as required by the Commissioner.
Under the Cybersecurity Act, however, the Commissioner’s authority goes beyond
CII. Any organisation, even if it does not own or operate CII, must cooperate with the
Commissioner in the investigation of cybersecurity threats and incidents. In furtherance
of such investigations, the Commissioner may, among other things, require any person to
produce any physical or electronic record or document, and require an organisation to carry
out such remedial measures or cease carrying out such activities as the Commissioner may
direct. Finally, the Act establishes a licensing regime for providers of (1) services that monitor
the cybersecurity levels of other persons’ computers or systems; and (2) services that assess,
test or evaluate the cybersecurity level of other persons’ computers or systems by searching for
vulnerabilities in, and compromising, the defences of such systems. Any person who provides
a licensable cybersecurity service without a licence will be guilty of an offence.
The Cybersecurity Act represents a move away from sector-based regulation. The Act
requires mandatory reporting to the new Commissioner of Cybersecurity of ‘any cybersecurity
incident’ (which is broader than but presumably would also include data breaches) that
relates to CII or systems connected with CII. In issuing the bill, the government noted that
it had considered sector-based cybersecurity legislation but had concluded that an omnibus
law that would establish a common and consistent national framework was the better option.
However, sectorial regulators continue to play a part in regulation in this area. For example, in
December 2018, MAS launched a S$30 million Cybersecurity Capabilities Grant to enhance
cybersecurity capabilities in the financial sector and assist financial institutions in developing
local talent in the cybersecurity sector. The IMDA has also formulated Codes of Practice
to enhance the cybersecurity preparedness for designated licensees. The Codes are currently
imposed on major Internet Service Providers in Singapore for mandatory compliance.
X OUTLOOK
In keeping with its declared strategy, Singapore continues to clarify and enforce its existing data
privacy and cybersecurity regime, and future legislative developments appear forthcoming.
370
© 2020 Law Business Research Ltd
Singapore
From 14 to 28 May 2020, the Ministry of Communications and Information and the
PDPC launched a public consultation on proposed amendments to the PDPA and related
amendments to the SCA. Notable proposals include:
a the introduction of a mandatory breach notification requirement if a data breach results
in, or is likely to result in, significant harm to individuals, or is of a significant scale;
b the expansion of the definition of ‘deemed consent’ to allow greater scope for
organisations to collect, use or disclose personal data;
c the introduction of a ‘Legitimate Interests Exception’ and a ‘Business Improvement
Exception’ to allow organisations to collect, use or disclose personal data without
consent in a wider array of circumstances;
d the introduction of a data portability obligation to give individuals greater choice and
control in transferring their data to other organisations;
e the introduction of new offences relating to egregious mishandling of personal data;
and
f heavier financial penalties for non-compliance with the PDPA (up to 10 per cent of an
organisation’s annual gross turnover in Singapore or S$1 million, whichever is higher).
These amendments appear designed to align Singapore’s existing data protection regime
with international developments, with the aim of strengthening public trust and enhancing
organisational accountability.
371
© 2020 Law Business Research Ltd
Chapter 25
SPAIN
I OVERVIEW
Cybersecurity and data protection are becoming essential values for society and, consequently,
both areas have undergone significant legal development in recent years. In particular, a new
law on cybersecurity and a new national data protection law were passed in the second half
of 2018. Both laws are based on and mirror the corresponding EU Security of Network
and Information Systems Directive (the NIS Directive) and the General Data Protection
Regulation (GDPR). Nevertheless, data protection and privacy rules are more consolidated
in the EU and Spain than cybersecurity regulations, which are still in need of further
development.
Data protection and privacy are distinct rights under Spanish law, but both are deemed
fundamental rights derived from the respect for the dignity of human beings. They are
primarily based on the free choice of individuals to decide whether to share with others (public
authorities included) information that relates to them (personal data) or that belongs to their
private and family life, home and communications (privacy). Both fundamental rights are
recognised in the Lisbon Treaty (the Charter of Fundamental Rights of the European Union)
and the Spanish Constitution of 1978. Data protection rules address, inter alia, security
principles and concrete measures that are helpful to address some cybersecurity issues, in
particular, because specific cybersecurity legislation (which not only covers personal data and
private information but rather any information) is not sufficiently developed yet.
With regard to data protection, the main rules are the GDPR and Basic Law 3/2018
of 5 December on data protection and digital-rights guarantees (the Spanish Data Protection
Law). With the approval of this law, former Spanish data protection laws and regulations
were repealed.
In addition to the foregoing legal regime, there are sector-specific regulations that
also include data protection provisions, since certain categories of personal data and certain
processing activities may require specific protection such as the processing of personal data
within the financial, e-communications or health-related sectors. There are several codes of
conduct for data protection that were approved under the former Spanish data protection
regulations for various sectors. These codes are still being reviewed pursuant to the GDPR
and the Spanish Data Protection Law.
The rights to data protection and privacy are not absolute and, where applicable, must
be balanced with other fundamental rights or freedoms (e.g., freedom of information or
expression) as well as other legitimate interests (e.g., intellectual property rights, public security
1 Leticia López-Lapuente and Reyes Bermejo Bosch are lawyers at Uría Menéndez Abogados, SLP.
372
© 2020 Law Business Research Ltd
Spain
and prosecution of crimes). In the case of data protection, this balance must be primarily
assessed by the organisation and individuals, and public entities and other organisations may
challenge the assessment before the Spanish Data Protection Authority (DPA), which is in
charge of supervising the application of the regulations on data protection (see Section III.i).
Privacy infringements must be claimed before the (civil or criminal) courts.
The DPA was created in 1993, and has been particularly active in its role of educating
organisations and the general public on the value of data protection and imposing significant
sanctions. In 2019 alone, the DPA received 11,590 claims from individuals, organisations
and authorities (including authorities of other EU jurisdictions) and issued and published
112 sanctioning resolutions within the private sector. These sanctions are published on
the DPA’s website, which is used by the media (and others) as an important source of data
protection information.
373
© 2020 Law Business Research Ltd
Spain
or biomedical research. However, they generally refer to the former Spanish data protection
regulations and, now that the GDPR and Spanish Data Protection Law are in force, will
either be subject to review or should at least be reinterpreted according to the new rules.
Privacy rights are mainly regulated by the Spanish Constitution, Law 1/1982 of 5 May
on civil protection of the rights to honour, personal and family privacy, and an individual’s
own image, and by the Spanish Criminal Code.
Personal data and private data are not synonymous. Personal data are any kind of
information (alphanumeric, graphic, photographic, acoustic, etc.) concerning an identified
or identifiable natural person, irrespective of whether or not this information is private.
However, data regarding minors, political opinions, trade-union membership, religion or
philosophical beliefs, racial or ethnic origin, genetic data, biometric data, health, criminal
offences, sex life or sexual orientation are deemed more sensitive and require specific
protection. This protection is established in the GDPR in the regulation on the ‘special
categories of personal data’ or in specific and more restrictive rules for the processing of
data of minors or data related to criminal offences. In addition to this additional protection
granted in the GDPR, the Spanish Data Protection states that the processing of data related
to administrative offences also requires additional measures.
Protecting personal data is achieved by allocating specific duties to both ‘controllers’
(i.e., those who decide on the data processing purposes and means) and ‘processors’ (i.e., those
who process the data only on behalf of a controller to render a service). The DPA is the entity in
charge of supervising compliance by both controllers and processors with the data protection
duties imposed by the GDPR (fair information, legitimate ground, security, proportionality
and quality, accountability, etc.)2 and by the Spanish Data Protection Law (direct-marketing
processing activities, credit bureaus, whistle-blowing schemes, video-surveillance, etc.). The
DPA has in the past carried out and ex officio audits of specific sectors (including online
recruitment procedures, TV games and contests, hotels, department stores, distance banking,
hospitals, schools, webcams and mobile apps). More recently, in 2020, it has carried out a
specific analysis of social healthcare, 5G technologies and anti-covid technologies. However,
the DPA’s activity in terms of individual compliance investigations has significantly increased
over the past 10 years, as has the number of fines imposed. Indeed, failure to comply with the
GDPR and the Spanish Data Protection Law may result in the imposition of administrative
fines depending on the severity of the offence (and regardless of whether civil or criminal
offences are also committed, if applicable). Section VII.i below explains how the Spanish
Data Protection Law has developed the general sanctioning regime set out in the GDPR.
Neither harm nor injury is required for an administrative sanction to be imposed (i.e., the
infringement itself suffices for the offender to be deemed liable), but the lack of any harm or
injury is considered an attenuating circumstance to grade the amount of the administrative
fine. However, harm or injury will be required for data subjects to claim damages arising from
breaches of data protection rights before civil and criminal courts.
2 The data protection right is enforced by the DPA at a national level with limited exceptions. For example,
Catalonia and the Basque country are regions that have regional data protection authorities with
competence limited to the processing of personal data by the regional public sector.
374
© 2020 Law Business Research Ltd
Spain
375
© 2020 Law Business Research Ltd
Spain
purpose of its processing. Data subjects are also entitled to object to certain processing
activities that do not require their consent or are made for direct marketing purposes, as well
as to request the restriction of processing and the portability of their data.
In addition, the Spanish Data Protection Law establishes the obligation of the data
controller to block the data during a reasonable term following rectification or erasure of
the data, in order to prevent its processing but still have it available to judges and courts, the
Public Prosecution Service or the competent public authorities (including the data protection
authorities) in relation to potential liabilities derived from the processing and only during the
applicable limitation period. Once the blocking period has ended, the data controller must
delete the data.
As regards data subjects’ right to obtain compensation for damage from data controllers
or processors, the GDPR has reinforced the rights including the right of consumer
organisations to bring class actions. The Spanish Data Protection Law adds no significant
changes to the general regime provided in the GDPR.
Finally, the Spanish Data Protection Law incorporates into the Spanish legal system a
list of new rights of citizens in relation to new technologies, known as ‘digital rights’. These
digital rights, which are not data protection rights as such but independent digital rights, can
be divided into three categories:
a general rights aimed at all citizens, such as the right to the digital testament, to a digital
education or to the digital security;
b specific rights addressed to providers of information society services and social networks,
some of which seem to be a reaction to recent and significant public cases, such as the
right to rectification or update of information over the internet or the right to be
forgotten; and
c specific rights closely related to the use of technologies within the employment
relationships, such as the right to privacy in the use of digital devices, of video
surveillance and geo-localisation in the workplace.
These rights present some limitations on processing for these purposes, and employers’
obligations to inform employees about access to the information stored on digital devices
supplied by the employer to the employees, and for the use of video-surveillance systems
and geo-localisation for the purposes of controlling employees. In addition, the novel ‘digital
disconnection right’ is included, which aims to guarantee workers’ and civil servants’ break
time, leave and holidays.
376
© 2020 Law Business Research Ltd
Spain
Since the above regulations generally refer to the data protection regulations, they need to be
reinterpreted according to the GDPR and the Spanish Data Protection Law.
v Technological innovation
Technology has created specific issues in the privacy field, including:
a electronic-privacy issues, including for ISPs, online platforms, and search engines;
b online tracking and behavioural advertising: as a general rule, explicit prior consent is
required. The DPA does not generally consider that online behavioural advertising or
profiling activities can be based on the existence of a legitimate interest. In addition,
the DPA considers that profiling activities must be considered as separate processing
activities from any others, such as advertising ones, and, as such, a specific and separate
legal ground must legitimate these activities (e.g., a separate consent);
c location tracking: the Spanish Data Protection Law and the DPA consider that the
use of this technology in work environments may be reasonable and proportionate
provided that certain requirements and proportionality test are met (mainly, that
specific information has been previously provided to data subjects on the potential
monitoring of IT resources). In 2020, the DPA published documents analysing the
processing of location data (some of them in the context of covid-19);
d use of cookies: as a general rule, explicit prior consent is required for installing cookies
or similar devices on terminal equipment. In November 2019, the DPA published a
‘Guide on the use of cookies’. However, only a few months later (in July 2020) the
DPA felt it necessary to update its Guide, to mirror the Guidelines that the European
Data Protection Board issued in May 2020 on the topic of consent. The updated Guide
considers that the mere fact of continuing to view a screen, or scrolling or navigating
through a website, will under no circumstances be considered a clear affirmative action.
377
© 2020 Law Business Research Ltd
Spain
In addition, the Guide adopts a restrictive position on cookie walls. In 2019, the DPA
received 1,529 claims and issued 58 sanctioning resolutions regarding internet services
(certain of which included the use of cookies);
e biometrics: traditionally, the processing of biometric data has not been considered
‘sensitive’ and, therefore, the implementation of the GDPR in Spain implies a change
in the concept of biometrics, which are now considered especially protected data. The
DPA has recently issued some reports and guidelines regarding biometric authentication
and identification in different sectors (e.g., e-learning);
f big data analytics: in April 2017, the DPA published guidelines on how to implement
big data projects according to GDPR rules;
g anonymisation, de-identification and pseudonymisation: the DPA has adopted an
official position regarding the use of ‘anonymous’ data and open data in big data
projects. In particular, the DPA has published guidelines on the protection of personal
data related to the reuse of public-sector information, anonymisation techniques and
‘K-anonymity as a privacy measure’ and it has published guidelines on the ‘hash’ as an
pseudonymisation technique;
h internet of things and artificial intelligence: the DPA has recently published some
reports and guidelines on GDPR adequacy to artificial intelligence;
i data portability: the DPA has published a legal report on, among other issues, the
data portability right. The DPA stated that the portability right includes not only
data subjects’ current data, but also their former data (either provided by them or
inferred from the contractual relationship); however, the information obtained from
the application of profiling techniques (e.g., algorithms) would not be subject to
portability. Although the DPA’s legal reports are not binding, they are highly useful
since they reflect the DPA’s doctrinal tendency;
j right of erasure or right to be forgotten: the right to be forgotten in relation to search
engines is actively pursued both by Spanish data subjects and the DPA. Notably, Google
Spain,3 in which the CJEU’s ruling recognised the right to be forgotten, was initiated
in Spain and the Spanish DPA had a significant role in the case. There are several
DPA resolutions issued every year recognising the right of Spanish individuals to be
forgotten and also setting out certain exceptions to the applicability of the right (see
the ruling issued by the National Court on 22 November 2019 mentioned in Section
II). Also, the Spanish Constitutional Court, in its ruling dated 4 June 2018, confirmed
this approach and has recognised the right to be forgotten as a new fundamental right,
different but related to data protection rights, and this was ultimately confirmed by the
Spanish Data Protection Law, which has included the right to be forgotten as one of
its new digital rights; in addition, the DPA includes in its website a specific section of
‘right to be forgotten’ in which data subjects may obtain specific information regarding
the scope of this right as well as templates to carry out its exercise; and
k data-ownership issues: to date, there is no Spanish legislation that specifically regulates
the question of ownership of data. Notwithstanding this, several regulations exist that
may have an impact on data ownership including, among others, data protection
legislation, copyright law (which regulates rights over databases) or even unfair
competition rules.
3 Case C131/12.
378
© 2020 Law Business Research Ltd
Spain
4 The DPA’s prior authorisation is not required in the cases set out in Article 26 of EU Directive 95/46/EC.
379
© 2020 Law Business Research Ltd
Spain
iv Data mapping
As part of the mandatory risk analysis, organisations should carry out data-mapping activities
regarding the collection, use, transfer and storage of personal data. The DPA offers various
electronic tools to help organisations in this regard; however, the use of such tools is intended
for either small companies or companies that carry out simple processing activities.
v Work councils
Employee representatives − works councils and employee delegates − are entitled to issue a
non-binding report before new methods of control of work are put into place or if existing
methods are modified. Since what qualifies as a ‘method of control’ of work is sometimes
debatable and unclear, it is generally advisable to inform the employee representatives of
the implementation or modification of control methods (e.g., whistle-blowing systems or
IT acceptable-use policies) and offer them the possibility of issuing the non-binding report.
380
© 2020 Law Business Research Ltd
Spain
5 See footnote 2.
381
© 2020 Law Business Research Ltd
Spain
382
© 2020 Law Business Research Ltd
Spain
As to criminal law, the Spanish Criminal Code was amended in 2010 to implement the
Convention on Cybercrime and Council Framework Decision 2005/222/JHA on attacks
against information systems. Specifically, this entailed the introduction of two new criminal
offences:
a the discovery and disclosure of secrets – namely, the unauthorised access to data or
applications contained in an IT system – by any means and infringing implemented
security measures; and
b the intentional deletion, damage, deterioration, alteration or suppression of data,
applications and electronic documents of third parties rendering them unavailable,
as well as the intentional serious hindering or interruption of the functioning of an
information system.
383
© 2020 Law Business Research Ltd
Spain
Other criminal offences that could be related to cybercrime were also modified (computer
fraud, sexual offences, technological theft, and offences against intellectual and industrial
property). The Criminal Code was amended again in March 2015. Specifically, aligned with
European regulations on computer-related offences, the following new criminal offences are
regulated: (1) intercepting data from information systems for the discovery and disclosure of
secrets; and (2) creating computer programs or equipment for the purposes of discovering
and disclosing secrets or committing damage to IT systems. Finally, legal entities can be held
criminally liable for the above-mentioned offences.
Without prejudice to the above, there are a certain number of rules that address specific
cybersecurity issues:
In 2012, the security breach notification regime was introduced in Spain through the
GTL in line with Directive 2009/136/EC: the providers of public communications networks
or publicly available electronic communications services must notify any security breaches,
when personal data are involved, to both the data subjects and the DPA. Also, the LSSI
was amended in 2014 to establish specific obligations on cybersecurity incidents applicable
to information society services providers, domain name registries and registrars. These
obligations are twofold:
a to collaborate with the relevant computer emergency response teams to respond to
cybersecurity incidents affecting the internet network (to this end, the relevant
information – including IP addresses – must be disclosed to them, but ‘respecting the
secrecy of communications’); and
b to follow specific recommendations on the management of cybersecurity incidents,
which will be developed through codes of conduct (these have not yet been developed).
In addition to the obligations set out in Royal Decree-Law 12/2018, operators of critical
infrastructure7 (entities responsible for investments in, or day-to-day operation of, a
particular installation, network, system, physical or IT equipment designated as such by
the National Centre for Critical Infrastructure Protection (CNPIC) under Law 8/2011) are
subject to specific obligations, such as providing technological assistance to the Ministry
of Home Affairs, facilitating inspections performed by the competent authorities, and
creating the specific protection plan and the operator’s security plan. Furthermore, these
operators must appoint a security liaison officer and a security officer. The security liaison
officer requires a legal authorisation (issued by the Ministry of Home Affairs), and his or her
appointment must be communicated to this Ministry. The security officer does not need a
legal authorisation, but his or her appointment must nevertheless be communicated to the
relevant government delegation or the competent regional authority. The draft Royal Decree
that will develop Royal Decree-Law 12/2018 has included the mandatory appointment of
an information-security officer by operators of essential services. The draft provides a list
of functions and responsibilities as well as a list of requisites to be complied with by the
information security officer. The provisions included in the draft Royal Decree should prevail
over the current framework under Law 8/2011; however, no derogative provisions have been
included at this stage.
7 The following infrastructure areas have been considered critical by Law 8/2011 (which transposes Directive
2008/114/EC into Spanish law): administration, water, food, energy, space, the chemical industry, the
nuclear industry, research facilities, health, the financial and tax system, ICT and transport.
384
© 2020 Law Business Research Ltd
Spain
The agencies and bodies with competence in cybersecurity are numerous and include:
a the CCN, which is part of the National Intelligence Centre;
b the CCN Computer Emergency Response Team;
c the CNPIC;
d the Cybersecurity Coordinator’s Office (which is part of the CNPIC);
e the Secretary of State for Digitalization and Artificial Intelligence;
f the Secretary of State for Telecommunications and Digital Infrastructures; and
g INCIBE (previously known as the National Institute of Communication Technologies),
which is the public-sector company in charge of developing cybersecurity.
Finally, also related to cybersecurity and security legal duties, Spanish legislation includes
disseminated rules on data retention or deletion rules. Most of these rules are sector-specific
(e.g., AML rules establish retention duties of 10 years for certain information). However, the
scope of some of these rules is more general and applies to the vast majority of companies in
Spain, such as Article 30 of Spanish Commercial Code, which obliges companies to retain
documentation with an impact on accounting for at least six years. More recently, the New
Spanish Data Protection Law set out general retention rules, such as the one-month retention
rule applicable to video surveillance.
385
© 2020 Law Business Research Ltd
Spain
X OUTLOOK
Data protection is constantly evolving. In the past, it has been neglected by both private and
public organisations or deemed an unreasonable barrier to the development of the economy.
However, this trend has definitively changed in the past five years.
This change is mostly due to the sanctions imposed by the DPA, the role of data in
the development of the digital economy (the ‘data-driven economy’), the active voice of
users in the digital environment (developing new social interactions and not only acting
as consumers) and the fact that the European Commission and the European Parliament
have definitively embraced a strong ‘privacy mission’. Decisions of the CJEU (such as in the
Schrems I and II v. Facebook or in the Google v. Costeja cases) have also sent out a clear message
on the importance of data protection rules in Europe.
The adoption in 2016 of the GDPR constituted a significant milestone in the
construction of a new data protection environment. In Spain, the approval of the Spanish
Data Protection Law in 2018 represents a challenge for Spanish companies, which must deal
not only with the GDPR provisions but also with the new set of particularities included by the
Spanish Data Protection Law that affect specific processing activities such as those involving
solvency files, direct-marketing activities and video surveillance. Although the GDPR
provides for data protection principles that are similar to those of the repealed Directive
95/46/EC and former Spanish data protection regulations, as construed by the CJEU and
the EDPB, it also provides for new rules and standards. Spanish organisations are particularly
concerned about the fines (the applicable criteria for which would be similar to those used
in antitrust regulations – a percentage of annual worldwide turnover), the accountability
principle, the general security breach notification and the mandatory implementation of a
data protection officer. Additional requirements regarding information and consent duties set
out in the GDPR will also be a challenge for Spanish data controllers.
Also, changes in the regulation of the cybersecurity legal regime are expected to occur
in Spain in the coming months, particularly if the draft Royal Decree further developing
some of the general rules set out in Spanish Royal Decree-Law 12/2018 is approved.
386
© 2020 Law Business Research Ltd
Chapter 26
SWITZERLAND
I OVERVIEW
Data protection and data privacy are fundamental constitutional rights protected by the Swiss
Constitution. Swiss data protection law is set out in the Swiss Federal Data Protection Act
of 19 June 19922 (DPA) and the accompanying Swiss Federal Ordinance to the Federal Act
on Data Protection of 14 June 19933 (DPO). Further data protection provisions governing
particular issues (e.g., the processing of employee or medical data) are spread throughout a
large number of legislative acts. As Switzerland is neither a member of the European Union
(EU) nor of the European Economic Area (EEA), it has no general duty to implement or
comply with EU laws.4 Accordingly, Swiss data protection law has some peculiarities that
differ from the legal framework provided by the EU General Data Protection Regulation5
(GDPR). However, because of Switzerland’s location in the centre of Europe and its close
economic relations with the EU, Swiss law is in general strongly influenced by EU law, both
in terms of content and interpretation. A closer alignment of Swiss data protection law with
the GDPR is also one of the aims of the ongoing reform of the DPA, which the Swiss Federal
Council initiated in April 2015.
The Swiss Data Protection and Information Commissioner (Commissioner) is the
authority responsible for supervising both private businesses and federal public bodies with
respect to data protection matters. The Commissioner has published several explanatory
guidelines that increase legal certainty with respect to specific issues such as data transfers
abroad, technical and organisational measures, processing of data in the medical sector
and processing of employee data.6 Despite the lack of drastic sanctions in respect of data
protection under the current legislative regime, it is nonetheless a topic at the forefront of
public attention in Switzerland, especially given the active presence of the Commissioner and
the high level of media attention given to data protection matters.
1 Jürg Schneider is a partner, Monique Sturny is a managing associate and Hugh Reeves is a senior associate
at Walder Wyss Ltd.
2 Classified compilation (SR) 235.1, last amended as of 1 March 2019.
3 Classified compilation (SR) 235.11, last amended as of 16 October 2012.
4 Specific duties exist in certain areas based on international treaties. Furthermore, the GDPR, which became
effective on 25 May 2018, is not only relevant for companies located in EU and EEA Member States, but
also for Swiss companies under certain circumstances, see Section II below for more detail.
5 Regulation (EU) 2016/679 of the European Parliament and the Council of 27 April 2016 on the
protection of natural persons with regard to the processing of personal data and on the free movement of
such data, and repealing Directive 95/46/EC.
6 The guidelines are not legally binding, but do set de facto standards.
387
© 2020 Law Business Research Ltd
Switzerland
7 The draft DPA, the explanatory report of the Swiss Federal Council and the summary of the results of the
consultation process are available in German, French and Italian on the website of the Swiss Confederation
at: (in German) www.ejpd.admin.ch/ejpd/de/home/aktuell/news/2017/2017-09-150.html; (in French)
www.ejpd.admin.ch/ejpd/fr/home/aktuell/news/2017/2017-09-150.html; and (in Italian) www.ejpd.
admin.ch/ejpd/it/home/aktuell/news/2017/2017-09-150.html (all sites last visited on 29 July 2020). An
unofficial English translation of the draft DPA can be found at: https://www.dataprotection.ch/user_assets/
pdfs/Swiss_Data_Protection_Act__draft_of_September_2017__Walder_Wyss_convenience_translation_
V010.pdf?v=1507206202 (last visited on 29 July 2020).
8 Classified compilation (SR) 235.3.
388
© 2020 Law Business Research Ltd
Switzerland
requirements on the use of Standard Contractual Clauses for the transfer of personal data to
third countries.9 Any controller or processor is now bound to verify on a case-by-case basis
whether additional safeguards are necessary to ensure adequate protection of the exported
personal data (e.g., due to overly broad surveillance powers of the destination country’s
authorities). If such additional contractual measures (e.g., a common approach in the event
of requests from authorities) are not able to ensure adequate protection, the controller
or processor is required to suspend or terminate the data transfer. The judgment also has
implications for data transfers from Switzerland to abroad. As a reaction to the decision of
the CJEU, the Commissioner stated on 8 September 2020 that, in his view, the Swiss–US
Privacy Shield no longer provides for an adequate data protection level for data transfers from
Switzerland to recipients in the US (see Section IV).10
389
© 2020 Law Business Research Ltd
Switzerland
entities such as corporations, associations, cooperatives or any other legal entity, as well
as partnerships. The revised DPA is expected, however, to do away with the current
Swiss specificity and personal data relating to legal entities will no longer be protected.
b Data subject: an individual or, currently, also a legal entity whose data is being processed.
c Processing of personal data: any operation with personal data, irrespective of the means
applied and the procedure, and in particular the storage, use, revision, disclosure,
archiving or destruction of data.
d Sensitive personal data: data relating to:
• religious, ideological, political or trade union-related views or activities;
• health, the intimate sphere or racial origin;
• social security measures; and
• administrative or criminal proceedings and sanctions.
e Personality profile: a collection of data that permit an assessment of essential
characteristics of the personality of a natural person. Swiss data protection law provides
an enhanced data protection level for personality profiles, similar to the protection of
sensitive personal data. The draft of the revised DPA foresees that the term ‘personality
profile’ shall be replaced by the term ‘profiling’, bringing a closer alignment to the
corresponding definition provided for by the GDPR, though parliamentary discussions
are ongoing on the exact definition of this term, so a discrepancy compared to the
GDPR (a ‘Swiss finish’) remains possible.
f Data file: any set of personal data that is searchable by data subject. It is likely that this
term will no longer be used under the revised DPA.
g Controller of the data file: the controller of the data file is the private person or federal
body that decides on the purpose and content of a data file. The draft of the revised
DPA merely uses the term ‘controller’ instead, bringing a closer alignment to the
corresponding term used in the GDPR.
As mentioned, it is likely that some terms will change under the revised data protection
regime. In particular, the term ‘profiling’ should replace the term ‘personality profiles’ and
the revised DPA will no longer use the concepts of ‘data file’ and ‘controller of the data file’.
Moreover, as concerns data security and cybersecurity, the revised DPA, as it currently stands,
is more precise as it includes a definition of ‘data breaches’.15 However, as mentioned above,
the suggested amendments of the DPA are still subject to parliamentary discussions and it
is thus too early to give conclusive indications as to the exact wording of the revised DPA.
15 Article 4 lit. g of the revised DPA defines the data breach as ‘a breach of security leading to loss, deletion,
destruction, alteration, unauthorised disclosure of or access to personal data, irrespective of any intent or
unlawfulness’ (our translation).
16 Articles 4, 5 and 7 DPA.
390
© 2020 Law Business Research Ltd
Switzerland
Principle of proportionality
The processing of personal data must be proportionate. This means that the data processing
must be necessary for the intended purpose and reasonable in relation to the infringement of
privacy. Subject to applicable regulations on the safekeeping of records, personal data must
not be retained longer than necessary.
Principle of transparency
The collection of personal data, and in particular the purposes of its processing, must be
evident to the data subject concerned. This principle does not always lead to a specific
disclosure obligation, but it will be necessary to give notice of any use of personal data that
is not apparent to the data subject from the circumstances. For example, if personal data
are collected in the course of concluding or performing a contract, but the recipient of the
personal data intends to use the data for purposes outside the scope of the contract or for the
benefit of third parties, then this recipient of personal data must disclose those uses of the
personal data to the data subject.
Principle of lawfulness
Personal data must be processed lawfully. This means that the processing of personal data
must not violate any Swiss legislative standards, including any normative rules set forth in
acts other than the DPA that directly or indirectly aim at the protection of the personality
rights of a data subject.
391
© 2020 Law Business Research Ltd
Switzerland
In general, no justification for the processing of personal data is required if the data
subjects have made the data in question generally available and have not expressly restricted
the data processing (Article 12 Paragraph 3 DPA). In contrast, a justification is required
particularly if the processing violates one of the general data protection principles of the
DPA outlined above, if the personal data is processed against the data subjects’ express will,
or if sensitive personal data or personality profiles are disclosed to third parties for such third
parties’ own purposes (Article 12 Paragraph 2 DPA).
In cases where a justification is required for a specific data processing, possible forms
of justification are (1) consent by the data subject concerned, (2) a specific provision of
Swiss (federal, cantonal and municipal) law that provides for such data processing, or (3)
an overriding private or public interest17 in the data processing in question (Article 13
Paragraph 1 DPA).
According to Article 13 Paragraph 2 DPA, an overriding private interest of the data
handler shall be considered in particular if he or she:
a processes personal data in direct connection with the conclusion or the performance
of a contract and the personal data in question are the data of one of the contractual
parties;
b competes for business with, or wants to compete for business with, another person and
processes personal data for this purpose without disclosing the data to third parties for
such third parties’ own purposes;
c processes data that are neither sensitive personal data nor a personality profile to verify
the creditworthiness of another person, and discloses the data to third parties for the
third parties’ own purposes only if the data are required for the conclusion or the
performance of a contract with the data subject;
d processes personal data on a professional basis exclusively for publication in the edited
section of a periodically published medium;
e processes personal data for purposes that are not related to a specific person, in particular
research, planning or statistics, and the results are published in a manner that does not
permit the identification of the data subjects; or
f collects personal data about a person who is a public figure to the extent that the
personal data relates to the role of the person as a public figure.
The fact that a data handler has one of the above-listed interests in processing personal data
does not automatically lead to the result that the data handler has an overriding interest in
processing the personal data. The interest of the data handler in processing the personal data
must always be weighed against the interest of the data subject in being protected against an
infringement of his or her personality rights. The processing of personal data is only justified
in situations where the interest of the data handler outweighs the interest of the data subject.
Consent
Under Swiss data protection law, processing of personal data does not, in all instances,
require the data subject’s consent. As mentioned above, data subject consent may constitute a
possible justification for a data processing that would otherwise be unlawful (e.g., because of
17 The public interest justification must exist from a Swiss perspective. However, this does not only include
Swiss public interests. Supporting foreign concerns – depending on the circumstances – may also qualify as
a public interest from a Swiss perspective. This needs to be checked on a case-by-case basis.
392
© 2020 Law Business Research Ltd
Switzerland
Registration
Controllers of data files that regularly process sensitive personal data or personality profiles,
or regularly disclose personal data to third parties (including affiliates), must register their
data files with the Commissioner before they start processing the data (Article 11a DPA).
The Commissioner maintains a register of data files that have been registered in this manner
that is accessible online. If a controller is required to register, it becomes subject to additional
documentary obligations. There are several exceptions to the duty to register data files. Inter
alia, no registration is required if the controller of the data file is obliged by Swiss law to
process the data in question (e.g., in the case of an employer processing employee data for
Swiss social security purposes) or has nominated its own independent data protection officer
monitoring the data protection compliance of the data controller. Several further exceptions
are set forth in Article 11a Paragraph 5 DPA and Article 4 Paragraph 1 DPO.
The draft of the revised DPA (at its Article 11 draft revised DPA) foresees, instead of
a registration duty, a new documentation requirement for both controllers and processors
similar to the records of processing activities under Article 30 GDPR.
393
© 2020 Law Business Research Ltd
Switzerland
parties (Article 9 Paragraph 4 DPA). In any case, the controller of a data file must indicate
the reason for refusing, restricting or deferring access to information (Article 9 Paragraph 5
DPA), and this must take the form of a substantiated decision (Article 1 Paragraph 4 DPO).
To exercise the access right, the data subject must typically file a written request and
provide proof of their identity, though an online request is also possible if the controller
of the data file has made this available (Article 1 Paragraphs 1 and 2 DPO). The requested
information must be provided within no more than 30 days of receipt of the request. If this
is not possible, the controller of the data file must notify the applicant accordingly with an
indication of the date by which the information will be provided (Article 1 Paragraph 4
DPO). If a request for information relates to data that is being processed by a third party on
behalf of the controller of the data file, the controller must pass the request on to such third
party for processing if the controller is not able to provide the information itself (Article 1
Paragraph 6 DPO).
The exercise of the access right is, as a rule, free of charge for the data subject (Article 8
Paragraph 5 DPA). However, the controller of the data file may exceptionally levy from
the applicant an appropriate share of the costs up to a maximum of 300 Swiss francs if
the provision of information entails an unusually large amount of work, or if the applicant
has already been provided with the requested information in the 12 months prior to the
application and no legitimate interest in the further provision of information can be proven.
A legitimate interest exists in particular if the personal data has been modified without notice
being given to the data subject (Article 2 DPO).
Pursuant to Article 34 DPA, failure to provide the requested information or the
provision of false or incomplete information may lead to a fine as further explained in Section
VII.i.
394
© 2020 Law Business Research Ltd
Switzerland
Cloud computing
Cloud computing raises various data protection issues. The Commissioner has issued a guide
pointing out the risks and setting out the data protection requirements when using cloud
computing services.20
In particular, the processing of personal data may only be assigned to a cloud service
provider if the assignment is based on an agreement or on the law, if the personal data is
processed by the cloud service provider only in the manner permitted for the assignor, and if
the assignment is not prohibited by a statutory or contractual duty of confidentiality (Article
10a Paragraph 1 DPA). Furthermore, the assignor must ensure that the cloud service provider
guarantees data security (Article 10a Paragraph 2 DPA). The assignor must in particular
ensure that the cloud service provider preserves the confidentiality, availability and integrity
of the personal data by taking adequate measures against unauthorised processing through
adequate technical and organisational measures (see Article 7 DPA and Articles 8 et seq.
DPO). Additionally, if cloud computing services involve disclosures of personal data abroad,
the specific requirements for transborder data flows must be complied with (see Section IV).
Finally, the assignor must also ensure that, despite the use of a cloud service provider, the
data subjects may still exercise their right to information (Article 8 DPA), and may demand
deletion or correction of data in accordance with Article 5 DPA.
Big data
Big data offers countless opportunities for social and scientific research and for businesses. At
the same time, it may threaten privacy rights if the processed data is not or not adequately
anonymised. The DPA is not applicable to fully and completely anonymised data. In contrast,
if the processing of big data involves the processing of data that has not been fully and
completely anonymised (e.g., because it can be ‘de-anonymised’ (reidentification of the data
subject) at a later stage by merging different data), the right to privacy and the protection of
personal data need to be ensured. The use of big data that is not entirely anonymised and the
general data protection principles of the DPA are potentially conflicting, particularly with
regard to the principles of purpose limitation, proportionality and transparency (see Section
III.ii).
Cookies
Since 2007, the use of cookies has been regulated in Article 45c (b) TCA. According to this
provision, website operators have to inform users about the use of cookies and its purpose.
Furthermore, they need to explain how cookies can be rejected (i.e., how cookies can be
deactivated in the user’s browser). Switzerland in effect follows the opt-out principle.
395
© 2020 Law Business Research Ltd
Switzerland
Drones
Currently, drones of up to 30 kilograms do not require a permit, but certain restrictions apply
when flying the drones (e.g., visual contact with the drone).21 From 1 January 2021, the
revised legislation requires a specific permit for drones heavier than 25 kilograms. Pilots and
operators of drones over 250 grams (and also those under 250 grams if the drone is equipped
with a camera, microphone or other sensors that are suitable for recording personal data) will
have to register and take an online course and test. In general, drones must not fly over crowds
of people, are required to avoid airports and nature reserves and may not fly higher than 120
meters above the ground. The ‘pilot’ is required to have visual contact with the drone at all
times. Nowadays, drones are usually equipped with cameras – as a result, operators must be at
least 12 years old. Younger ‘pilots’ are allowed to fly drones if supervised.22 In addition, people
using drones equipped with cameras, need to comply with data protection regulations as
soon as they view or record identified or identifiable persons. To the extent that such viewing
or recording constitutes an unlawful breach of the personality rights of the data subjects
concerned, it needs to be justified either by the consent of the injured party, by an overriding
private or public interest or by law (Article 13 Paragraph 1 DPA).23
21 Ordinance of the Federal Department of the Environment, Transport, Energy and Communications
on special categories of aircraft of 24 November 1994, last amended as of 1 January 2019, classified
compilation (SR) 748.941.
22 ‘New drone regulation from 1 January 2021’, available at: www.bazl.admin.ch/bazl/en/home/good-to-
know/drones-and-aircraft-models/Europaeische_Drohnenregulierung_uebernommen.html (last visited
on 3 August 2020); ‘FAQs on the new drone Regulation applicable as of 1 January 2021’, available at
www.bazl.admin.ch/dam/bazl/en/dokumente/Gut_zu_wissen/Drohnen_und_Flugmodelle/faq_neue_
drohnenregulierung_2020.pdf.download.pdf/faq_neue_drohnenregulierung_2020.pdf (last visited on
3 August 2020).
23 Article 179 quater of the Swiss Criminal Code is also relevant in this context, which states that a
person who, without consent, observes with a recording device or records with an image-carrying
device information from the secret domain of another person or information from the private domain
of another person that is not readily available to everyone is criminally liable; see also Commissioner,
‘Video surveillance with drones by private persons’, available at www.edoeb.admin.ch/edoeb/de/home/
datenschutz/technologien/videoueberwachung/videoueberwachung-mit-drohnen-durch-private/
videoueberwachung-mit-drohnen-durch-private.html (status 2014; in German; no English version
available; last visited on 29 July 2020).
24 Some legal authors, however, are of the opinion that an employee may specifically and unilaterally consent
(i.e., not in the employment contract or in any other agreement with the employer) to a processing of
personal data that goes beyond Article 328b CO.
396
© 2020 Law Business Research Ltd
Switzerland
As a general rule, employers shall not read any employee emails that have private content
(even if misuse has been established). In the event of specific suspicion of a criminal offence,
evidence may, however, be saved, and the employer may refer to the criminal prosecution
authorities for further prosecution.
Whistle-blowing hotlines
The use of whistle-blowing hotlines is not specifically regulated by the DPA or the CO.
Hence, the general rules, in particular on data and employee protection, apply. In a nutshell
and from a DPA and CO perspective, whistle-blowing hotlines can be used if certain
minimum requirements are met, such as, inter alia:
a the transparent informing of employees, contractors, etc., about the existence of the
whistle-blowing hotline;
25 Ordinance 3 to the Employment Act (Healthcare) of 18 August 1993, last amended as of 1 October 2015,
classified compilation (SR) 822.113.
26 Commissioner, ‘Guide on the processing of personal data in the work area’ (status November 2014;
www.edoeb.admin.ch/edoeb/de/home/dokumentation/taetigkeitsberichte/aeltere-berichte/19-
-taetigkeitsbericht-2011-2012/buergeranfragen-zur-ueberwachung-am-arbeitsplatz.html, in German; no
English version available; last visited on 29 July 2020).
397
© 2020 Law Business Research Ltd
Switzerland
398
© 2020 Law Business Research Ltd
Switzerland
speaking for transfers of personal data relating to legal entities to EU or EEA countries.29 As
mentioned in Section III.i, the draft revised DPA does away with the Swiss specificity that
includes legal entities as data subjects; this change is broadly expected to simplify questions
of international data transfers and bring more certainty where legal entities are concerned.
If personal data are to be transferred to a country that does not provide an adequate
data protection level for the personal data being transferred, the transfer may only occur if
(Article 6 Paragraph 2 DPA):
a sufficient safeguards, in particular contractual clauses (e.g., the EU Standard Contractual
Clauses, where necessary supplemented and adapted to Swiss law requirements), ensure
an adequate level of protection abroad;
b the data subject has consented in an individual specific case;
c the processing is directly connected with the conclusion or the performance of a
contract and the personal data are that of a contractual party;
d disclosure is essential in specific cases to either safeguard an overriding public interest,
or for the establishment, exercise or enforcement of legal claims before the courts;
e disclosure is required in the specific case to protect the life or the physical integrity of
the data subject;
f the data subject has made the data generally accessible and has not expressly prohibited
its processing; or
g disclosure is made within the same company or the same group of companies, provided
those involved are subject to data protection rules that ensure an adequate level of
protection (i.e., that have adopted binding corporate rules, BCR).
In case of data transfer justified under (a) and (g) above, the Commissioner must be informed
in advance (i.e., before the transfer takes place) about the safeguards that have been taken or
the BCR that have been adopted. If the safeguards consist of EU Model Contract Clauses
adapted to Swiss law requirements or other contractual clauses explicitly accepted by the
Commissioner,30 then it is sufficient to inform the Commissioner that such clauses have been
entered into, and there is no need to actually submit the clauses to the Commissioner for
review. As regards information about BCR, it is common practice to submit a copy of the
rules to the Commissioner.
At the time of writing (10 September 2020), Switzerland and the United States are
formally parties to the Swiss–US Privacy Shield. This framework is separate from – but closely
resembles – the now-invalidated EU–US Privacy Shield (which the CJEU invalidated with
immediate effect in a judgment of 16 July 2020). The Swiss–US Privacy Shield is (legally)
not invalidated by the CJEU’s decision. However, as a reaction to the CJEU decision, the
Commissioner published a statement on 8 September 2020, according to which he deems
that US corporations self-certified under the Swiss–US Privacy Shield no longer ensure
29 It can, in our view, be reasonably argued that the fact that the EU data protection provisions (GDPR)
do not specifically protect personal data pertaining to legal entities does not per se result in an absence of
adequate protection in EU or EEA member states. The protection for such data may also be adequate based
on other legislation of EU or EEA member states. Furthermore, the transfer of personal data pertaining to
legal entities does not necessarily seriously endanger the legal entity’s personality rights.
30 See the standard contractual clauses for the transborder outsourcing of data processing accepted by the
Commissioner, available at: www.edoeb.admin.ch/edoeb/en/home/data-protection/handel-und-wirtschaft/
entreprises/anmeldung-einer-datensammlung/mustervertrag-fuer-das-outsourcing-von-datenbearbe
itungen-ins-au.html (status November 2013; last visited on 29 July 2020).
399
© 2020 Law Business Research Ltd
Switzerland
an adequate level of data protection. Even though the Commissioner’s assessment is only
indicative (as he formally does not have the competence to invalidate the Swiss–US Privacy
Shield), companies who only rely on the Swiss–US Privacy Shield should base their transfers
of personal data on EU Standard Contractual Clauses, supplemented where necessary by
additional contractual safeguards and adapted to Swiss law requirements (or, although
less frequently used, BCR). If EU Standard Contractual Clauses adapted to Swiss law are
already in place, their level of protection should be assessed on a case-by-case basis and,
where necessary, supplemented by additional contractual safeguards. In his statement dated
8 September 2020, the Commissioner further pointed out that such contractual safeguards
(even if adapted and supplemented) are not binding upon foreign authorities. Hence, the data
exporter may have to implement further technical measures (such as encryption) to prevent
special access to personal data by foreign authorities in the country of the data importer. If
such measures are not feasible, the Commissioner recommends refraining from transferring
personal data on the basis of contractual safeguards to recipients in countries that do not
provide for an adequate data protection level, such as the US.
31 Federal public controllers of data files have a similar obligation to issue a processing policy for automated
data files that contain sensitive personal data or personality files, are used by two or more federal bodies, are
disclosed to third parties or are connected to other data files (see Article 21 DPO).
400
© 2020 Law Business Research Ltd
Switzerland
In contrast to other countries’ legislation, the DPA does not require private data handlers
to appoint a data protection officer. For this reason, and until a few years ago, companies’
data protection officers have not played a very important role in Switzerland compared with
their role in other countries. However, in the past few years, more and more medium-sized
and large companies domiciled in Switzerland have chosen to appoint a data protection
officer who independently monitors internal compliance with data protection regulations
and maintains a list of the data files of the company in question. In fact, appointing such a
data protection officer is one way for private data controllers to avoid having to register data
files with the Commissioner that otherwise would have to be registered under the current
regime (see Article 11a Paragraph 3 DPA in relation to Article 11a Paragraph 5(e) DPA; see
also Section III.ii). Currently, over 1,000 companies have notified the Commissioner of their
appointment of an independent data protection officer.
BCR ensuring an adequate level of protection of personal data on a group-wide level
facilitate the cross-border disclosure of personal data among group companies (see Section IV).
Despite this fact, and until recently, BCR have not been used very frequently in Switzerland.
32 The DPA also does not apply to pending Swiss civil proceedings, pending Swiss criminal proceedings
and pending Swiss proceedings under constitutional or under administrative law, with the exception of
administrative proceedings of first instance (see Article 2 Paragraph 2(c) DPA).
33 In contrast, producing and taking evidence in purely private foreign arbitral proceedings is not subject
to Article 271 CC and therefore do not require that the parties follow the requirements of mutual
401
© 2020 Law Business Research Ltd
Switzerland
In addition to Article 271 CC, the blocking statute in Article 273 CC prohibits
industrial espionage of manufacturing and business secrets by foreign official agencies,
foreign organisations, foreign private enterprises or their agents. Accordingly, manufacturing
and business secrets with sufficient connection to Switzerland may only be released or
communicated abroad when:
a the owner of the secret relinquishes its intent to keep the information secret;
b the owner of the secret agrees to disclose this information;
c all third parties (who have a justifiable interest in keeping the information secret)
consent to such a disclosure;
d Switzerland has no immediate sovereign interest in keeping the information secret; and
e all requirements set forth by the DPA (in particular as regards cross-border transfers)
are complied with.
However, Article 273 CC does not apply in cases in which Swiss authorities have granted
mutual legal assistance and disclosure takes place in accordance with the proceedings.
Contrary to Article 271 CC, Article 273 CC can also be violated by activities taking place
outside Switzerland.
legal assistance proceedings. However, as the DPA fully applies to the processing of personal data in
foreign-based private arbitral proceedings, any cross-border disclosure must comply with the requirements
set forth in Article 6 DPA (see Section IV). For more details and exceptions, see Jürg Schneider, Ueli
Sommer, Michael Cartier, in Catrien Noorda, Stefan Hanloser (eds), E-Discovery and Data Privacy: A
Practical Guide, Kluwer Law International BV, 2011, Chapter 5.25, Switzerland.
34 The processing of personal data by cantonal and communal bodies is regulated by cantonal law. Each
canton has a cantonal data protection authority, be it a cantonal data protection officer or a commission
competent for cantonal and communal data protection matters. Some cantons have jointly appointed an
inter-cantonal data protection authority.
402
© 2020 Law Business Research Ltd
Switzerland
the Commissioner and any persons concerned by such a decision may file an appeal against
the decision with the Swiss Federal Administrative Court. The appeal decision can be brought
before the Swiss Federal Supreme Court.
In the case of recommendations to private persons, the Commissioner may refer the
case to the Swiss Federal Administrative Court for a decision. Both the Commissioner and
the addressee of such a decision may file an appeal against the decision with the Swiss Federal
Supreme Court.
The Commissioner does not have the power to issue any fines. However, based on
Article 34 DPA, the competent criminal judge may, upon complaint, sanction private persons
with a fine of up to 10,000 Swiss francs if they have wilfully breached their obligations to:
a provide information upon request of the data subject concerned under Article 8 DPA;
b provide information on the collection of sensitive personal data and personality profiles
under Article 14 DPA;
c inform the Commissioner about the safeguards and data protection rules in relation to
a transfer of personal data abroad under Article 6 Paragraph 3 DPA;
d register a database with the Commissioner; or
e cooperate with the Commissioner (Article 34 DPA).
403
© 2020 Law Business Research Ltd
Switzerland
data that in combination reveals an essential part of the personality of a data subject and
that is not relevant in assessing the creditworthiness of the person in question may not be
published without the consent of the data subject concerned. The Commissioner’s claim that
the economic information platform and credit agency’s data relating to persons registered in
the commercial registry should only be retrievable with search engines in the same manner
as data of the official Swiss Federal Commercial Registry was rejected (search engines, in
particular Google, only show search results for the Swiss Commercial Registry (i.e., www.
zefix.ch) if the search name and also the term ‘Zefix’ are entered into the search tool). The
Swiss Federal Administrative Court stated that the economic information platform and credit
agency only has limited influence on the publication of search results on search engines.
Also, the Swiss Federal Administrative Court pointed out that the possibility of finding data
via search engines may have positive effects from a data protection perspective as it increases
transparency.
Moreover, still very relevant and noteworthy is the Swiss Federal Supreme Court’s
decision of 12 January 2015 in connection with the tax dispute between certain Swiss banks
and the United States. Based on the right of access set forth in Article 8 DPA, the Court
obliged a Swiss bank to provide its employees with copies of all documents transferred to
the US Department of Justice in April 2012 containing their personal data.39 This case law
retains its importance as the Swiss Federal Supreme Court recently dealt with additional
cases arising from the abovementioned dispute between certain Swiss banks and the United
States. Indeed, the court generally validated its prior case law and, furthermore, generally
ruled that the banks who transferred to the United States their employees’ personal data to
comply with American governmental requests violated Swiss data protection legislation and
the personality rights of the employees, though this always requires a case-by-case assessment
and did not lead to valid claims for damages.40
Lastly, the Swiss Federal Supreme Court ruled, in a 13 October 2019 judgment, that
private dashcam footage does not constitute valid evidence in criminal proceedings unless it is
used as evidence to solve a serious crime (which was not the case in the matter at hand).41 On
the topic of traffic surveillance, the Swiss Federal Supreme Court moreover considered that a
cantonal police act does not constitute a sufficient legal basis for automated vehicle search and
identification and for traffic surveillance, as such behaviour may lead to a serious encroachment
on constitutional rights (personal freedom and informational self-determination). Any
records based on this practice, therefore, qualify as unlawfully-collected evidence.42
39 Swiss Federal Supreme Court decisions dated 12 January 2015, 4A_406/2014; 4A_408/2014 (BGE 141
III 119).
40 Among others, Swiss Federal Supreme Court decisions of year 2019, 4A_610/2018; 4A_588/2018;
4A_568/2018; 4A_50/2019; 4A_77/2019.
41 Swiss Federal Supreme Court decision dated 13 October 2019, 6B_1188/2018.
42 Swiss Federal Supreme Court decision dated 7 October 2019, BGE 146 I 11.
404
© 2020 Law Business Research Ltd
Switzerland
In addition, data subjects have ordinary judicial remedies available under civil law to
protect their personality rights (Article 15 DPA in relation to Article 28–28l of the Swiss
Civil Code). Data subjects may in particular request:
a that data processing be stopped;
b that no data be disclosed to third parties;
c that the personal data be corrected or destroyed;
d compensation for moral sufferings; and
e payment of damages or the handing over of profits.
However, as regards claims for damages, it is in practice often very difficult for a data subject
to prove actual damage based on breaches of data protection legislation and personality rights.
43 This, however, does not apply to public law provisions of the DPA (such as the obligation to register a data
file with the Commissioner or to inform the Commissioner of a transfer abroad) as such rules are governed
by the principle of territoriality and only apply to facts that take place in Switzerland.
44 Such as, for example, an obligation to register a data file with the Commissioner, or there may be instances
where data that before their transfer or disclosure to Switzerland were not subject to specific data protection
regulations suddenly becoming subject to the data protection regulations set forth in the DPA and the
DPO because of the fact that the DPA and DPO currently also apply to the processing of personal data
pertaining to legal entities (even if, at a later stage, the data are transferred abroad from Switzerland again).
405
© 2020 Law Business Research Ltd
Switzerland
process personal data in Switzerland (whether on one’s own or by using group companies
or third-party service providers), or before cross-border exchanges of personal data in the
context of a group of companies or otherwise.
45 ‘Guide for technical and organisational measures’ (status as of February 2016); www.edoeb.admin.ch/dam/
edoeb/en/dokumente/2016/02/leitfaden_zu_dentechnischenundorganisatorischenmassnahmendesdate.pdf.
download.pdf/guide_for_technicalandorganizationalmeasures.pdf, last visited on 29 July 2020). Additional
security requirements apply to specific sectors such as, inter alia, the financial industry and the area of
medical research. These additional requirements are set forth in separate legislative acts.
46 For certain specifically regulated areas, however, these duties may exist. This is the case, for instance, in
the banking sector where regulatory requirements call for a notification in certain cases of data breaches
(Circular 2008/21 – Operational Risks Banks, Annex 3, of the Swiss Financial Market Supervisory
Authority – FINMA, available at: www.finma.ch/de/~/media/finma/dokumente/rundschreiben-archiv/
finma-rs-2008-21---30-06-2017.pdf&sa=U&ved=0ahUKEwiZ8vetoovWAhUCshQKHeLuBeMQFgg
NMAQ&client=internal-uds-cse&usg=AFQjCNH1i9Man6e87Na3Uq4hvV8R2iGy4g, last visited on
29 July 2020).
47 For example, a data handler may have an obligation to inform its customers about a data breach based on
an explicit contractual obligation towards its customers or based on a general contractual duty of diligence.
406
© 2020 Law Business Research Ltd
Switzerland
Swiss Confederation and the cantons entered into an administrative agreement in 2001,
empowering the federal authorities to assume certain responsibilities in this area. On
1 January 2014, the Swiss national coordination unit to fight internet crime, the Cybercrime
Coordination Unit Switzerland (CYCO), commenced its activities.48 CYCO conducts an
initial analysis of incoming reports, secures the relevant data and then forwards the matter to
the competent law enforcement agencies in Switzerland and abroad.
On a Swiss federal level, the Reporting and Analysis Centre for Information Assurance
(MELANI) was established in 2004. MELANI functions as a cooperation model, inter alia,
between the Swiss Federal Finance Department and the Swiss Federal Defence Department.
It serves private computers and internet users (in particular providing them with information
about risks relating to the use of modern information and communication technologies) as well
as selected providers of critical national infrastructures (such as banks and telecommunication
services providers). MELANI has created various checklists and documentation regarding IT
security. In 2008, MELANI established GovCERT.ch, the computer emergency response
team (CERT) of the government, and the official national CERT of Switzerland, GovCERT.
ch is a member of the Forum of Incident Response and Security Teams, and of the European
Government CERTs group.
The Ordinance on Protecting against Cyber-Risks in the Federal Administration49
entered into force on 1 July 2020. It sets up the National Cyber Security Centre (NCSC),
under the direction of the Federal Cyber Security Delegate. The NCSC merges together
MELANI, Federal ICT Security and GovCERT, thereby offering a single point of contact on
the federal level for all matters pertaining to cybersecurity.
X OUTLOOK
The ongoing reform of the DPA is likely to lead to a tightening of the Swiss data protection
regime. Based on the publication of the draft of the revised DPA,50 the following aspects are
particularly noteworthy:
a transparency in data processing is increased. In particular, private sector actors will have
a duty to inform data subjects in the event of data collection and processing;
b self-regulation shall be encouraged. Professional and business associations may prepare
codes of conduct and submit them to the Commissioner for the delivery of an opinion;
c the data controller will have to perform an impact assessment whenever it appears
that the envisaged data processing may lead to an increased risk to the data subjects’
personality and fundamental rights, although some exceptions apply;
d a duty to notify the Commissioner or even the data subjects in cases of breach of data
protection will bind data controllers;
e the present rules on personality profiles will be abolished. However, they will be
replaced by new rules on profiling, the scope of which remain somewhat uncertain;
f the draft introduces the concepts of privacy by design and privacy by default. Hence,
data protection must take place from the outset (i.e., from the conception of the
processing) and the least invasive settings must be applied by default;
407
© 2020 Law Business Research Ltd
Switzerland
g the duty to declare data files to the Commissioner shall be abolished for private actors.
Data controllers and data processors must, however, keep records of their processing
activities;
h personal data relating to legal entities shall no longer be protected under the DPA;
i the Commissioner shall obtain greater powers and will in particular have the competence
to render binding decisions on data controllers and processors; and
j criminal sanctions for data protection misconduct will be increased significantly. In
fact, fines of up to 250,000 Swiss francs may be levied in cases of intentional offences
against certain provisions of the revised DPA.
The text that will eventually become law may contain deviations from the published draft.
It is nonetheless to be expected that the final revised DPA will include many of the changes
suggested in the draft of the revised DPA. Entry into force of the new, revised DPA, which
was initially expected to take place in 2018, was split into two parts. The first part entered
into force in March 2019, while the second part is tentatively expected to enter into force in
2021 or 2022 (for further details, see Section II).
408
© 2020 Law Business Research Ltd
Chapter 27
TURKEY
I OVERVIEW
The protection of personal data is recognised as a fundamental right under Article 20(3)
of the Constitution of the Republic of Turkey2 as of its amendment in 2010. Since the
aforementioned Article requires that the principles and procedures regarding the protection
of personal data shall be laid down in law; the constitutional guarantee for the protection
of personal data is intended to manage the processing of personal data on a regulatory level.
In this respect, Law on the Protection of Personal Data No. 6698 (the DP Law), which
constitutes the main legislative instrument that specifies the principles and procedures
concerning the processing and protection of personal data, has been published in the Official
Gazette on 7 April 2016 and is in effect as of this date.
The data protection authority established by the DP Law, the Personal Data Protection
Board (the Board), is currently active and has been regularly publishing secondary legislation
of the DP Law as well as principle decisions and guidance documents concerning the
application of the DP Law. Additionally, certain sector-specific data protection rules are
scattered under sector-specific laws. For example, there are certain additional data protection
related provisions provided under the Banking Law for financial services and these are
enforced by the Turkish banking authority, the Banking Regulation and Supervision Agency.
Because Turkey is currently not an EU country, in principle, EU’s General Data
Protection Regulation3 (GDPR) is not directly applicable in Turkey. However, since the
territorial scope of the GDPR applies where the personal data processing activities are related
to the offering of goods or services to data subjects that are in the Union by a controller or
processor not established in the Union, data controllers located in Turkey might be required
to comply with the GDPR.
‘Data protection’ as a concept is becoming more and more topical in the country. The
Board is continuing its work to create public awareness on the issue. On this endeavour, the
Board is organising seminars, sharing educational videos and publishing guidance documents
with regards to the implementation of the principles and procedures set forth under the DP
Law.
1 Batu Kınıkoğlu is a partner, and Selen Zengin and Kaan Can Akdere are attorneys at BTS&Partners.
2 Published in the Official Gazette No. 17844 and dated 20 October 1982. Available in English: https://
global.tbmm.gov.tr/docs/constitution_en.pdf.
3 Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the
protection of natural persons with regard to the processing of personal data and on the free movement of
such data, and repealing Directive 95/46/EC (General Data Protection Regulation), Official Journal L 119,
4 May 2016.
409
© 2020 Law Business Research Ltd
Turkey
With regard to cybersecurity, the relevant legislation is still evolving. Cybersecurity rules
are not consolidated under one legislative instrument but rather scattered under different
sector-specific regulations. Entities practising in critical sectors such as telecommunications,
energy, banking and finance, and insurance are generally subjected to cybersecurity or
information-security requirements. However, recently enacted legislation demonstrates the
sensitivity that is being shown by the government regarding cybersecurity, which we expect
to become an even more important topic for Turkey in the near future.
i Amazon.com.tr decision
One of the most important decisions given by the Board within the first half of 2020 was the
Amazon decision. In its decision summary, published on 7 May 2020, the Board announced
that it has fined Amazon’s Turkish subsidiary with an administrative fine of 1.2 million lira
in total. In its summary, the Board mentioned that it has spotted various shortcomings of
Amazon’s Turkish marketplace (amazon.com.tr) in its compliance with the DP Law, such as
(1) failure to collect prior consent from users for direct marketing activities;4 (2) invalidity
of certain consent practices;5 and (3) Amazon’s failure to comply with cross-border data
transfer requirements of the DP Law. It was the first enforcement decision of the Board
where non-compliance with cross-border data transfer rules have been explicitly stated as a
reason for finding a breach. The enforcement decision was given upon an inspection done
over amazon.com.tr and privacy documentation present on the website; which compelled
many companies to take a second look on their own e-commerce websites.
4 The complainant pointed out that Amazon Turkey currently considers all who use the Amazon service or
who browse the website as having given their consent by default to receive electronic communications from
Amazon Turkey.
5 Collecting consent via (1) Consent texts made as a precondition for provision of services; (2) consent texts
integrated into contracts; or (3) default consent (i.e., practices such as ‘by using our services you consent
us to processing of your data’) are not considered as lawful methods for collecting valid consent under law.
In its investigation, the DPA have extracted fragments of the Terms of Use and Sales and Privacy Notice
published on the website that could be interpreted as falling under the aforementioned invalid methods for
consent collection. These fragments were significant arguments in the Decision, some of which we believe
could be misinterpreted by the DPA due to translation issues (the current Turkish texts used by Amazon
Turkey appear to be originally drafted in another language).
410
© 2020 Law Business Research Ltd
Turkey
411
© 2020 Law Business Research Ltd
Turkey
The conditions for lawful data processing stated under Article 5 are:
6 Published in the Official Gazette No. 30224 and dated 28 October 2017.
7 Published in the Official Gazette No. 30286 and dated 30 December 2017.
412
© 2020 Law Business Research Ltd
Turkey
a if none of the following conditions can be met, explicit consent8 of the data subject,
b if processing is expressly permitted by any law;
c if processing is necessary in order to protect the life or physical integrity of the data
subject or another person where the data subject is physically or legally incapable of
giving consent;
d if it is necessary to process the personal data of parties of a contract, provided that the
processing is directly related to the execution or performance of the contract;
e if processing is necessary for compliance with a legal obligation which the controller is
subject to;
f if the relevant information is publicised by the data subject himself or herself;
g if processing is necessary for the institution, usage, or protection of a right; and
h if processing is necessary for the legitimate interests of the data controller, provided that
the fundamental rights and freedoms of the data subject are not harmed.
Conditions for processing ‘special categories of personal data’ are provided under Article 6
and are more restricted.
It is prohibited to process special categories of personal data without obtaining the
explicit consent of the data subject; however, special categories of personal data other than
those relating to health and sexual life, may be processed without obtaining the explicit
consent of the data subject if processing is permitted by any law.
Personal data relating to health and sexual life can only be processed without obtaining
the explicit consent of the data subject for purposes of protection of public health, operation
of preventive medicine, medical diagnosis, treatment and care services, planning and
management of health services and financing by persons under the obligation of secrecy or
authorised institutions and organisations.
Principles and procedures that must be followed when fulfilling this obligation are provided
in detail under the Communiqué on the procedures and principles to be complied with when
fulfilling obligation to inform (the Communiqué on the obligation to inform). For example,
the Communiqué on the obligation to inform requires data controllers to inform data
subjects and obtain their consent separately, and states that, when informing data subjects, a
clear, simple and understandable wording must be used.
8 ‘Explicit consent’ is defined as ‘Freely given, specific and informed consent’. Consent must be free (for
example, consent must not be made conditional for the provision of a service), informed, limited to the
relevant act of processing and have been given unambiguously by data subject acting in a way that leaves no
doubt that the data subject agrees to the processing of his or her data.
413
© 2020 Law Business Research Ltd
Turkey
Principles and procedures regarding the obligation to register with the Registry are provided
in detail under the Regulation on the Data Controller Registry. On an additional note, the
Regulation requires resident data controllers to appoint a contact person to submit requested
information to the Registry. The contact person shall be the ‘point of contact’ that will carry
out the communication with the Board and with the data subjects . Similarly, non-resident
data controllers are expected to appoint a ‘data controller representative’, which can either be
a natural person who is a Turkish citizen, or a legal entity established and operating in Turkey.
This person shall be notified to the Registry during registration.
The registration deadline has been extended to 30 September 2020 for resident and
non-resident data controllers. Having said that, for resident data controllers that have an
annual turnover less than 25 million lira and employ less than 50 employees, but whose main
area of activity is processing special categories of personal data, the registration deadline has
been extended to 31 May 2021.
What the phrase ‘all necessary technical and organisational measures’ actually means is not
explicitly defined under the data protection legislation; however, the ‘Guidebook on Personal
Data Security’ published by the Board9 provides guidance on what measures are expected to
be taken by the data controllers.
What is more, the DP Law expects additional protective measures to be taken when
handling special categories of personal data; these measures are specified under a principle
9 Guidebook on Personal Data Security (Technical and Organisational Security Measures): https://www.
kvkk.gov.tr/SharedFolderServer/CMSFiles/7512d0d4-f345-41cb-bc5b-8d5cf125e3a1.pdf.
414
© 2020 Law Business Research Ltd
Turkey
decision taken by the Board10 and include using cryptographic encryption measures, signing
NDA agreements with the personnel and setting two-stage authentication systems over the
information systems that contain personal data.
Additionally, data controllers are required to notify the relevant data subjects and the
Board if personal data is obtained by others through unlawful means (e.g., a cyberattack or
data leakage) as soon as possible.
In its decision of 15 February 2019, the Board announced the principles and procedures
to be followed when submitting personal data breach notifications to the Board in accordance
with Article 12 of the DP Law. According to the decision, data controllers are expected to
notify the Board as soon as possible and no later than 72 hours11 after they become aware of
the breach. Notifications are to be made via a template notification form and data controllers
are expected to prepare a ‘data breach response plan’ that will cover issues such as steps to
be followed within the organisation to handle breaches and responsibilities regarding such
incidents.
Additionally, the Board has issued a Board Decision specifying the minimum content
of notifications to be made to data subjects in the event of a breach incident. Accordingly,
data subject notifications must include information on the following:
a when the breach has occurred;
b categories of data affected by the breach (in a manner differentiating between categories
of personal data and special categories of personal data);
c potential impacts of the breach;
d measures taken or recommended to be taken to eliminate the adverse effects of the
breach; and
e contact details of persons to be communicated in order to obtain further information
on the incident or other methods of communication, including the website and call
centre of the data controller.
10 ‘Personal Data Protection Board’s Decision No. 2018/10 dated 31/01/2018 on Adequate Security Measures
to be Taken by Data Controllers When Processing Special Categories of Personal Data’ published on
7 March 2018: https://kvkk.gov.tr/Icerik/4110/2018-10.
11 Notably, the Board have made a reference to the 72-hour period provided under the GDPR as a basis for
this rule.
415
© 2020 Law Business Research Ltd
Turkey
h object to the occurrence of any result that is to their detriment by means of analysis of
their personal data exclusively through automated systems; and
i request compensation for the damages in case the they incur damages owing to unlawful
processing of their personal data.
Accordingly, service providers and intermediary service providers (initiating the transmission
of commercial electronic messages at the service provider’s instruction) are now required to
register to the CMMS and upload and integrate their electronic message data and system.
Service providers are under the obligation to register to the CMMS and must upload their
permissioned database until 1 September 2020. Although the Commercial Communications
Regulation does not explicitly provide for a registration requirement for non-resident service
providers, the respective regulatory authority extended the CMMS registration obligation
to also cover non-resident entities. Thus, the legal position of non-resident service providers
12 Published in the Official Gazette No. 29417 and dated 15 July 2015.
416
© 2020 Law Business Research Ltd
Turkey
in respect of the obligations for CMMS is same as that of the resident service providers, as
no distinction is made in this regard. However, further clarification is required with respect
to non-resident service providers, as to how processes concerning registration to and use of
CMMS is to be handled.
Sector-specific legislation
Although the DP Law is the main data protection instrument, there is sector-specific
legislation that governs the protection of personal data under their respective sectors and
areas such as the Regulation on Processing of Personal Data and Protection of Privacy in the
Electronic Communication Sector,13 Article 73 of the Banking Law14 about banking secrecy
and ‘customer secrets’, and the Regulation on Personal Health Data that mainly concerns the
healthcare sector.15
13 Published in the Official Gazette No. 28363 and dated 24 July 2012.
14 Published in the Official Gazette No. 25983 and dated 1 November 2005.
15 Published in the Official Gazette No. 30808 and dated 21 June 2019.
16 Council of State, 11th Chamber, Decision No. 2017/4906 dated 13 June 2017.
17 Court of Cassation, 19th Criminal Chamber, Decision number 2017/5325 dated 5 June 2017.
18 Supreme Court, application number 2013/5653. Published in the Official Gazette No. 29811 and dated
24 August 2016.
417
© 2020 Law Business Research Ltd
Turkey
the courts made a reference to the ground-breaking Google Spain judgment of the ECHR.
Consequently, it can be said that a right to be forgotten is emerging by way of case law in
Turkey.
Moreover, the Board has recently published a Board Decision19 that provides further
regulation on the right to be forgotten, as well as specific criteria to be followed by search
engines when concluding data subject requests in this regard. It is essential to underline that
although the data subject rights envisaged under the DP Law do not specifically refer to the
right to be forgotten, data subjects are entitled to request erasure of their personal data. While
explicitly determining that search engines shall be construed as data controllers, the Board
also decided that the data subjects’ right to request removal of results (containing personal
data) from the search index shall be construed as falling within the scope of data subject rights
envisaged under the DP Law.
Recent amendments to the Law on the Regulation of Broadcasts over the Internet
and Prevention of Crimes Committed Through Such Broadcasts No. 565120 (the Internet
Law) also included a provision specifically addressing the right to be forgotten. This newly
introduced provision of the Internet Law now allows:
a individuals whose personal rights are violated due to content broadcasted over the
internet to request disassociation of their name with URLs that are subject to a content
removal or access blocking decision; and
b the Access Providers’ Union to notify search engines regarding such name and URL
disassociation. Prior to this amendment, individuals or requesting parties were
instructed to directly submit a request to the related search engines for the removal of
violating content from the cache memories of search engines, as such violating content
would still be listed under the inquiry even when removed.
19 ‘Personal Data Protection Board’s Decision No. 2020/481 dated 23/06/2020 on Requests Regarding
the Removal of Results re. Queries of Persons’ Names from the Indexes of Search Engines’ published on
17 July 2020: https://kvkk.gov.tr/Icerik/6776/2020-481.
20 Published in the Official Gazette No. 31202 and dated 31 July 2020.
418
© 2020 Law Business Research Ltd
Turkey
On the other hand, the Board published a public announcement23 on 10 April 2020,
concerning local BCR. Within the scope thereof, the local BCR regime has been introduced as
an alternative tool for resident data controllers transferring personal data to their non-resident
group companies. Despite being an adaptation of the Binding Corporate Rules mechanism
acknowledged as a similar tool under the GDPR, the local BCR regime substantially diverges
from the scope thereof.
In July 2019, the Presidency of Republic of Turkey issued the Presidential Circular
on Information and Communication Security Measures (the Circular), which specifically
restricts the use of public cloud systems to store data by public sector entities. Among other
things, with a particular emphasis on data localisation, the Circular provides for the following:
a data of public institutions and organisations is not to be stored in cloud storing services,
except for the private systems of public institutions or local service providers under the
control of public institutions;
21 Minimum Content of Undertaking to be Prepared by Data Controllers When Transferring Personal Data
Abroad, Published on 16 May 2018: https://www.kvkk.gov.tr/Icerik/4236/Yurtdisina-Veri-Aktariminda-
Veri-Sorumlularinca-Hazirlanacak-Taahhutnamede-Yer-Alacak-Asgari-Unsurlar.
22 Board Announcement on Principles and Procedures to be Followed Concerning the Preparation of
Undertakings, Published on 7 May 2020: https://kvkk.gov.tr/Icerik/6741/YURT-DISINA-KISISEL-VER
I-AKTARIMINDA-HAZIRLANACAK-TAAHHUTNAMELERDE-DIKKAT-
EDILMESI-GEREKEN-HUSUSLARA-ILISKIN-DUYURU.
23 Announcement on Binding Corporate Rules, Published on 10 April 2020: https://kvkk.gov.tr/Icerik/6728/
YURT-DISINA-KISISEL-VERI-AKTARIMINDA-BAGLAYICI-
SIRKET-KURALLARI-HAKKINDA-DUYURU.
419
© 2020 Law Business Research Ltd
Turkey
b critical information and data, such as civil registration, health and communication
information as well as genetic and biometric data, shall be stored domestically in a safe
environment; and
c enterprises authorised to provide communication services are obliged to establish an
internet exchange point within Turkey. Furthermore, measures shall be taken and
implemented in order to ensure that the domestic communication traffic shall not be
taken outside of the country.
Furthermore, the data processing inventory shall be the basis for the notifications to be made
to the Registry during registration, and Article 5 of the Communiqué on the obligation to
inform states that the information provided during the fulfilment of the obligation to inform
420
© 2020 Law Business Research Ltd
Turkey
must be compliant with the information disclosed to the Registry. Therefore, the information
within the inventory is fundamental for lawfully fulfilling the obligation to register with the
registry and the obligation to inform the data subjects.
421
© 2020 Law Business Research Ltd
Turkey
conduct onsite audits. If a breach is found, the Board notifies the relevant data controller to
correct the unlawful situation. The data controller must comply with the notification without
delay and within 30 days of the notification at the latest.
Article 18 of the DP Law lists several misdemeanours concerning data protection and
the range of the administrative fines tied to them. Breach of the obligation to inform or to
ensure the security of personal data, and failure to fulfil the obligation to register with the
data controller registry or to comply with the decision given by the Board are considered
misdemeanours and are subject to separate administrative fines ranging from 5,000 to 1
million Turkish lira.
During its investigations, if the Board finds out that a particular breach is widespread,
it may issue a principle decision and publish it. It is mandatory for data controllers to
comply with principle decisions. The Board has published multiple principle decisions to
date including some concerning phonebook applications, the implementation of privacy
measures on counters and booths, and data breaches caused by data controllers’ personnel,
data breach notifications and unsolicited marketing communications. In addition to the
principle decisions, the Board is periodically publishing guidelines and videos and arranges
seminars to inform the public and data controllers about data protection issues.
In addition to the mentioned administrative sanctions, Turkish Criminal Code
lists certain crimes that are related to unlawful processing of personal data. For example,
unlawful recording, distribution or obtaining of personal data are crimes that are punished
by imprisonment of the perpetrator between one to four years.
422
© 2020 Law Business Research Ltd
Turkey
423
© 2020 Law Business Research Ltd
Turkey
for public institutions and organisations, as well as natural or legal persons. Likewise, the
Authority is responsible for performing duties delegated by the Presidency, the Ministry and
the Cyber Security Board.
Pursuant to Law No. 5809, the Authority shall take all necessary measures to prevent
public institutions and organisations, as well as natural and legal persons, against cyberattacks
and to ensure deterrence against cyberattacks. The Authority is further empowered to
obtain and assess information, documentation, data, and records from related parties as
part of its duties. Additionally, the Authority may utilise and establish communication with
archives, electronic information processing centres and communications infrastructures; and
implement other necessary measures or ensure that such measures are implemented.
Within the purposes of the Communiqué, Cybersecurity Incident Response Teams
(CIRTs) are established as teams specialised in detecting causes and effects of cybercrimes
and protecting information systems and data that are located therein against cybersecurity
attacks. In this regard, CIRTs directly operate in cooperation with the National Cybersecurity
Incident Response Centre (USOM or TR CERT),27 which has been established under the
Authority (further to the National Cybersecurity Strategy and Action Plan 2013–2014,
updated by Action Plan 2016–2019 of the Ministry).
There are multiple sector-specific regulations that require organisations from critical
sectors to employ cybersecurity measures to safeguard their information systems. For example,
their sector-specific legislation requires organisations related to capital markets (including
on-stock companies)28 and entities from sectors such as insurance,29 banking30 and payment
services31 to employ certain measures related to cybersecurity.
ii Data breaches
The most important data breach notification obligation under Turkish law is the personal
data breach notification stipulated under the DP Law. Data controllers are required to notify
the data subject and the Board ‘in case personal data is acquired by others through unlawful
means’. Data breaches that fall under this notification obligation are not categorised by their
scope, seriousness or its possible adverse effects. Thus, all data breaches where personal data is
obtained unlawfully by third parties must be notified to the data subject and the Board. The
Board has clarified that data controllers must notify the Board within 72 hours of becoming
aware of the breach, by making use of the data breach notification form published by the
Board.32
424
© 2020 Law Business Research Ltd
Turkey
X OUTLOOK
Data protection is a relatively new regulatory area for Turkey. Yet the developments that we
have observed in the area in the last three years have been fast and are not expected to slow
down in the following years. For the near term, two of the most significant developments that
are expected are the activation of the data controller registry and the publishing of the list of
countries that have an ‘adequate level of personal data protection’ by the Board. It is advisable
for the foreign entities to be on the watch for these two legal developments as these will have
significant effects for their businesses in Turkey.
The GDPR has had an impact on the Turkish entities owing to its extended territorial
scope and high level of monetary fines. Turkish businesses that are active in the European
market are mindful of the requirements brought by it. The DP Law was prepared by taking
note of the EU Data Protection Directive of 1995 and it is known that the Board is paying
close attention to the data protection developments in Europe. If the ‘Europeanisation’ trend
continues for data protection in Turkey, in the long term amendments to the DP Law that
are in line with the provisions of the GDPR should not come as a surprise.
425
© 2020 Law Business Research Ltd
Chapter 28
UNITED KINGDOM
I OVERVIEW
Like other countries in Europe, the United Kingdom (UK) passed legislation designed to
supplement the data protection requirements of the EU General Data Protection Regulation
(GDPR),2 which came into force on 25 May 2018, repealing the EU Data Protection
Directive 95/46/EC (the Data Protection Directive)3 and which regulates the collection
and processing of personal data across all sectors of the economy. The UK Data Protection
Act 2018 (DPA 2018), which came into force on 23 May 2018, repealed the UK Data
Protection Act 1998 (DPA 1998), introduced certain specific derogations that further specify
the application of the GDPR in UK law, in addition to transposing the data protection
and national security provisions of the EU Law Enforcement Directive 2016/6804 as well as
granting powers and imposing duties on the national data supervisory authority, the UK’s
Information Commissioner’s Office (ICO). Importantly, in June 2016, the UK voted to
leave the EU, leaving on 31 January 2020. Under the withdrawal agreement agreed between
the UK and the EU, EU law, and in turn the GDPR, will continue to apply until the
end of the implementation period (more commonly known as the ‘transition period’) on
31 December 2020. At the end of the transition period, the GDPR will be incorporated
into UK law as the ‘UK GDPR’. It will therefore be retained into domestic law but the UK
will have the independence to keep the framework under review and introduce additional
provisions and derogations.
1 William RM Long is a partner and Francesca Blythe is a senior associate at Sidley Austin LLP.
2 Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the
protection of natural persons with regard to the processing of personal data and on the free movement of
such data, and repealing Directive 95/46/EC (General Data Protection Regulation).
3 European Parliament and Council Directive 95/46/EC of 24 October 1995 on the protection of
individuals with regard to the processing of personal data and on the free movement of such data.
4 Directive (EU) 2016.680 of the European Parliament and of the Council of 27 April 2016 on the
protection of natural persons with regard to the processing of personal data by competent authorities for
the purposes of the prevention, investigation, detection or prosecution of criminal offences or the execution
of criminal penalties, and on the free movement of such data, and repealing Council Framework Decision
2008/977/JHA.
426
© 2020 Law Business Research Ltd
United Kingdom
5 ICO, Guide to the General Data Protection Regulation (GDPR) accessible at https://ico.org.uk/
for-organisations/guide-to-the-general-data-protection-regulation-gdpr/.
6 ICO, Data Protection at the end of the transition period accessible at https://ico.org.uk/for-organisations/
data-protection-at-the-end-of-the-transition-period/.
7 ICO, Information Commissioner’s Annual Report and Financial Statements 2019–2020 accessible at
https://ico.org.uk/media/about-the-ico/documents/2618021/annual-report-2019-20-v83-certified.pdf.
8 ICO, Regulatory approach during coronavirus, accessible at https://ico.org.uk/media/about-the-ico/
policies-and- procedures/2617613/ico-regulatory-approach-during-coronavirus.pdf.
9 Directive 2002/58/EC of the European Parliament and Council of 12 July 2002 concerning the processing
of personal data and the protection of privacy in the electronic communications sector.
427
© 2020 Law Business Research Ltd
United Kingdom
the existing ePrivacy Directive.10 The European Commission’s original timetable for the
ePrivacy Regulation was for it to apply in EU law and have direct effect in Member State law
from 25 May 2018, coinciding with the GDPR’s entry into force. However, the text is still to
be adopted. On 3 June 2020, the Presidency of the Council of European Union published a
progress report indicating that substantial progress on the draft ePrivacy Regulation has been
limited due to the covid-19 pandemic.11 The ePrivacy Regulation is now not expected to
come into force until 2021 at the earliest. As a result, it remains to be seen whether the UK
will in any case choose to introduce similar rules and obligations into domestic law since it
will not come into force before the end of the transition period.
The key changes in the proposed ePrivacy Regulation will:
a require a clear affirmative action to consent to cookies;
b attempt to encourage the shifting of the burden of obtaining consent for the use of
cookies to website browsers; and
c make consent for direct marketing harder to obtain and require it to meet the standard
set out in the GDPR; however, existing exceptions (such as the exemption that applies
where there is an existing relationship and similar products and services are being
marketed) are likely to be retained.
10 Proposal for a Regulation of the European Parliament and of the Council concerning the respect for private
life and the protection of personal data in electronic communications and repealing Directive 2002/58/EC
(Regulation on Privacy and Electronic Communications).
11 Council of the European Union, ePrivacy Regulation Progress Report, accessible at https://data.consilium.
europa.eu/doc/document/ST-8204-2020-INIT/en/pdf.
12 Section 5 of the DPA 2018.
428
© 2020 Law Business Research Ltd
United Kingdom
whether the data subject is a member of a trade union, genetic data, biometric data for
the purpose of uniquely identifying the data subject, data concerning the data subject’s
health or data concerning the data subject’s sexual life or sexual orientation.
The UK DPA 2018 does not introduce any further requirements in relation to the first data
protection principle.
429
© 2020 Law Business Research Ltd
United Kingdom
c processing is necessary for compliance with a legal obligation to which the controller
is subject;
d processing is necessary in order to protect the vital interests of the data subject or of
another individual;
e processing is necessary for the performance of a task carried out in the public interest
or in the exercise of official authority vested in the controller; and
f processing is necessary for the purposes of the legitimate interests pursued by the
controller or by a third party, except where such interests are overridden by the interests
or fundamental rights and freedoms of the data subject which require protection of
personal data, in particular where the data subject is a child.
The ICO guide on the GDPR contains guidance on the reliance of each Article 6 legal
basis.13 In particular, the ICO has also published detailed guidance on legitimate interests as
a legal basis together with a legitimate interest assessment template14 that covers three tests
controllers should conduct as part of any legitimate interest assessment:
a the purpose test – to assess whether there is a legitimate interest behind the processing;
b the necessity test – to assess whether the processing is necessary for the purpose it has
identified; and
c the balancing test – to consider the impact on data subjects’ interests and rights and
freedoms and to assess whether they override the controller’s own legitimate interests.
The ICO’s guidance on the GDPR also contains a section on consent, which makes reference
to the GDPR’s high standard for valid consent i.e., that consent be unambiguous, involve a
clear affirmative action and provide distinct or granular options to give consent for distinct
processing operations. As consent must be freely given, certain organisations in a position of
power over their data subjects may find it difficult to demonstrate valid freely given consent,
for example, consent obtained from employees by their employers is unlikely to be freely
given as such consent is not considered freely given or a genuine choice, with employees
possibly facing employment consequences as a result of failing to provide consent.
The GDPR and DPA 2018 apply a stricter regime for special categories of personal
data and criminal convictions data, where such data may only be processed on the basis of
additional conditions being fulfilled.15
13 ICO, Guide to the General Data Protection Regulation (GDPR)/ Lawful basis for processing- accessible at
https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/.
14 ICO, Sample LIA template.
15 Articles 9 and 10 of the GDPR, Sections 10 and 11 and Schedule 1 of the DPA 2018.
430
© 2020 Law Business Research Ltd
United Kingdom
Where processing special categories of personal data in reliance on a condition under the
DPA 2018 the controller will need to have in place an ‘appropriate policy document’ which
explains the controller’s procedures for securing compliance with the principles in Article 5
of the GDPR, and explains the controller’s policies as regards the retention and erasure of
special categories of personal data processed in reliance on the DPA 2018 condition.
Part 3 also permits a controller to rely on a Part 2 condition and the requirement that the
processing be in the substantial public interest can be disapplied. Where processing criminal
records and offences data in reliance on a condition under the DPA 2018 the controller will
need to have in place an ‘appropriate policy document’ as explained in Section IV(iii).
431
© 2020 Law Business Research Ltd
United Kingdom
v Health Data
Data concerning health falls within scope of the special categories of personal data under
Article 9 of the GDPR. The GDPR defines ‘data concerning health’ as ‘personal data related
to the physical or mental health of a natural person, including the provision of health care
services, which reveal information about his or her health status’.
One of the lawful processing grounds for health data is Article 9(2)(j) of the GDPR
where processing is necessary for scientific research purposes. To rely on this legal ground the
processing must comply with Article 89(1) of the GDPR which requires that the processing
be subject to appropriate safeguards which ensure technical and organisational measures are
in place in particular, to comply with the principle of data minimisation.
Article 19 of the DPA 2018 states that the processing will not meet these requirements
where:
a it is likely to cause substantial damage or distress to an individual; or
b the processing is carried out to support measures or decisions relating to a particular
individual, unless this includes purposes of approved medical research.
The DPA 2018 includes exemptions from the data subject rights for data concerning health
where:
a it is processed by a court, supplied in a report or other evidence given to a court, and
under specified rules (i.e., those relating to family and children’s hearings in the courts)
may be withheld from an individual;16
b the request is made by someone with parental responsibility for a person under the age
of 18 (or 16 in Scotland) and the data subject has an expectation that the information
would not be disclosed to the requestor or has expressly indicated should not be
disclosed.17
The DPA 2018 also includes an exemption from the subject access right to health data where
disclosure would likely cause serious harm to the physical or mental health of the individual
or another person.18
432
© 2020 Law Business Research Ltd
United Kingdom
The ICO states in its guidance on the appointment of DPOs, that regardless of whether the
GDPR requires an organisation to appoint a DPO, the organisation must ensure that it has
sufficient staff and resources to discharge its obligations under the GDPR and that a DPO
can be seen to play a key role in an organisation’s data protection governance structure and to
help improve accountability. The guidance further advises that should an organisation decide
that it does not need to appoint a DPO it is recommended that this decision be recorded to
help demonstrate compliance with the accountability principle.
The DPO must be designated on the basis of professional qualities and, in particular,
expert knowledge of data protection law and practices.20 The data controllers and data
processors who do not meet the criteria for a required appointment of a DPO may voluntarily
appoint one and are required to notify the ICO of any voluntary appointment.
Required and voluntary appointments of DPOs must be notified to the ICO in the
form of an email, which includes:
a the contact details of the DPO;
b the registration number of the controller or processor; and
c whether the appointment of the DPO was required or voluntary.
The ICO will publish the name of the DPO on the Data Protection Public Register, where
the data controller or data processor has consented to publication.
Section 71 of the DPA 2018 requires controllers to entrust their DPO with the
following non-exhaustive tasks:
a informing and advising the controller, any processor engaged by the controller, and
any employee of the controller who carries out the processing of personal data, of that
person’s obligations under the DPA 2018;
b providing advice on the carrying out of a data protection impact assessment (see below)
and monitoring compliance;
c cooperating with the ICO;
d acting as the contact point for the ICO on issues relating to processing of personal data;
e monitoring compliance with the policies of the controller in relation to the protection
of personal data; and
f monitoring compliance by the controller of Section 71 of the DPA 2018.
433
© 2020 Law Business Research Ltd
United Kingdom
carried out on behalf of controllers. The ICO has published template controller and processor
records of processing activities. Such records will have to be provided to the ICO upon
request.22
434
© 2020 Law Business Research Ltd
United Kingdom
The ICO guidance also recommends that where a controller decides not to carry out a DPIA,
the reasons for this decision are documented.24
x Second data protection principle: processing for specified, explicit and lawful
purposes (purpose limitation)
Personal data can only be obtained for specified, explicit and lawful purposes, and must not
be further processed in a manner that is incompatible with those purposes.
The UK DPA 2018 does not introduce any further requirements in relation to the
second data protection principle.
The ICO’s published guidance on GDPR includes a section on purpose limitation,25
where it requires controllers to specify the purposes of the processing to data subjects at the
outset of the processing, in the form of records of the processing activities that controllers are
required to maintain and information notices that are required to be given to data subjects
prior to the processing.
xi Third data protection principle: personal data must be adequate, relevant and
limited to what is strictly necessary (data minimisation)
A controller must ensure that the personal data it holds is adequate, relevant and limited to
what is necessary in relation to the purposes for which they are processed.
The UK DPA 2018 does not introduce any further requirements in relation to the third
data protection principle.
The ICO’s published guidance on the GDPR, contains guidance on data minimisation,26
requiring controllers to identify the minimum amount of personal data needed to fulfil its
processing purposes, noting if the processing carried out does not help the controller to
achieve its purposes the personal data held is most likely inadequate.
The ICO recommends controllers should carry out periodic reviews of their processing
in order to check that the personal data held is still relevant and adequate for its purposes,
deleting any personal data that is no longer needed.27
xii Fourth data protection principle: personal data must be accurate and where
necessary kept up to date (accuracy)
Controllers must ensure that personal data is accurate and, where necessary, kept up to
date. The ICO recommends28 controllers take reasonable steps to ensure the accuracy of any
personal data obtained, ensure that the source and status of any personal data is clear, and
carefully consider any challenges to the accuracy of information and whether it is necessary
to periodically update the information.
24 ICO, Guide to the General Data Protection Regulation (GDPR)/ Accountability and Governance-
accessible at https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/.
25 ICO, Guide to the General Data Protection Regulation (GDPR)/Principles/Purpose limitation, accessible
at https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/.
26 ICO, Guide to the General Data Protection Regulation (GDPR)/Principles/Data minimisation, accessible
at https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/.
27 ibid.
28 ICO, Guide to the General Data Protection Regulation (GDPR)/Principles/Accuracy, accessible at
https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/principles/
accuracy/.
435
© 2020 Law Business Research Ltd
United Kingdom
xiii Fifth data protection principle: personal data must be kept in a form that
permits the identification of data subjects for no longer than is necessary (storage
limitation)
Personal data must be kept in a form that permits the identification of data subjects for
no longer than is necessary for the purposes for which the personal data are processed. In
practice, this means that the controller must review the length of time it keeps personal data
and consider the purpose or purposes it holds the information for in deciding whether (and
for how long) to retain this information. Controllers must also securely delete personal data
that is no longer needed for this purpose or these purposes, and update, archive or securely
delete information if it goes out of date.
It is good practice to establish standard retention periods for different categories of
information (e.g., employee data and customer data). To determine the retention period for
each category of information, controllers should take into account and consider any legal or
regulatory requirements or professional rules that would apply.29
The ICO, in its published guidance on the GDPR, contains guidance on storage
limitation, recommending that controllers erase or anonymise personal data30 where they no
longer need it, in order to reduce the risk of the personal data becoming excessive, irrelevant,
inaccurate or out of date. This will also help controllers comply with the data minimisation
and accuracy principles, while ensuring the risk that the controller uses the personal data in
error is reduced.
The ICO also recommends in its GDPR storage limitation guidance31 that it is good
practice for controllers to adopt clear policies on retention periods and erasure, which can
help reduce the burden of dealing with questions from data subjects about retention and
access requests for the erasure of personal data.
In its GDPR guidance on individuals’ rights the ICO states that if a valid erasure request
is received and no exemption applies then a controller will have to take steps to ensure erasure
from backup systems as well as live systems. However, the ICO acknowledges that the data
will remain within the backup environment for a certain period of time until it is overwritten.
According to the ICO, the key issue is to ‘put the backup data “beyond use”, even if it cannot
be immediately overwritten’. Provided that the controller does not use the data within the
backup for any other purpose, ‘it may be unlikely that the retention of personal data within
the backup would pose a significant risk, although this will be context specific’.
xiv Sixth data protection principle: personal data must be processed in a manner that
ensures appropriate security of personal data
Personal data must be processed in a manner that ensures appropriate security of personal
data, including protection against unauthorised or unlawful processing and against accidental
loss, destruction or damage, using appropriate technical or organisational measures. Where a
controller uses a processor to process personal data on its behalf, the controller must ensure
29 ICO, Guide to the General Data Protection Regulation (GDPR)/Principles/Storage limitation, accessible at
https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/.
30 ICO, Guide to the General Data Protection Regulation (GDPR)/Principles/Storage limitation, accessible at
https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/.
31 ibid.
436
© 2020 Law Business Research Ltd
United Kingdom
that it has entered into a written contract that obliges the processor to implement appropriate
technical and organisational measures to ensure a level of security appropriate to the risk of
processing personal data.
The ICO recommends, in its published guidance on security under the GDPR,32 that
before deciding what measures are appropriate, controllers should assess the personal data
risk by carrying out an information risk assessment. A controller should review the personal
data it holds, and the way it is used to assess how valuable, sensitive or confidential the
personal data is, including assessing any potential damage or distress that may be caused if
the data is compromised.
When carrying out the assessment, the ICO recommends taking into account:
a the nature and extent of the controller’s premises and computer systems;
b the number of staff the controller has;
c the extent of the staff’s access to the personal data; and
d any personal data held or used by the processor acting on the controller’s behalf.33
In addition, the ICO recommends that controllers should aim to build a culture of security
awareness within the organisation, identifying a person with day-to-day responsibility for
information security within the organisation and ensuring the person has the appropriate
resources and authority to do their job effectively.34
The ICO considers encryption to be an appropriate technical measure owing to its
widespread availability and relatively low cost of implementation.35 However, there are other
measures, such as pseudonymisation of data and anonymisation that can also be used to
ensure the security of personal data.
The technical and organisational measures controllers have in place are also considered
by the ICO when deciding whether to impose an administrative fine on the controller for the
infringement of the GDPR and DPA 2018.
32 ICO, Guide to the General Data Protection Regulation (GDPR)/Security, accessible at https://ico.org.uk/
for-organisations/guide-to-the-general-data-protection-regulation-gdpr/.
33 ibid.
34 ibid.
35 ibid.
36 ICO, Guide to the General Data Protection Regulation (GDPR)/Accountability and governance, accessible
at https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/.
437
© 2020 Law Business Research Ltd
United Kingdom
The ICO notes that if controllers adopt a privacy management framework this can help embed
accountability measures and create a culture of privacy across the controller’s organisation.37
The framework could include:
a robust programme controls informed by the GDPR requirements;
b appropriate reporting structures; and
c assessment and evaluation procedures.
In October 2019, the ICO published an updated draft statutory code of practice on data
sharing between controllers. The draft code outlines how organisations should engage in
data-sharing activities (including the requirement to have in place a data sharing agreement
to help demonstrate accountability under the GDPR). The draft code also provides guidance
on risk management processes, best practices and misconceptions about data sharing. At the
time of writing, it is unclear when the finalised draft will be published.
37 ibid.
38 In November 2012, the ICO published a code of practice on managing data protection risks related to
anonymisation. This code provides a framework for organisations considering using anonymisation and
explains what it expects from organisations using such processes.
438
© 2020 Law Business Research Ltd
United Kingdom
The guidance has not yet been updated to take into account the entry into force of the GDPR
and DPA 2018.
39 ICO, Guidelines on Big Data and Data Protection, 28 July 2014 and revised 18 August 2017.
40 ICO, Summary of Feedback on Big Data and Data Protection and ICO Response, 10 April 2015.
41 FCA, FS16/5, Call for Inputs on Big Data in retail general insurance.
42 ICO, Guidance on AI and data protection, accessible at https://ico.org.uk/for-organisations/
guide-to-data-protection/key-data-protection-themes/guidance-on-ai-and-data-protection/.
43 ICO, Guidelines on Bring Your Own Device (BYOD), 2013.
439
© 2020 Law Business Research Ltd
United Kingdom
Organisations should also install antivirus software on personal devices, provide technical
support to the employees on their personal devices when they are used for business purposes,
and have in place a ‘BYOD acceptable-use policy’ providing guidance to users on how they
can use their own devices to process corporate data and personal data.
The guidance has not yet been updated to take into account the entry into force of the
GDPR and DPA 2018.
iv Cloud computing
The ICO, like many other data protection authorities in the EU, published guidance on
cloud computing, in 2012.44
The ICO proposes a checklist that organisations can follow prior to entering into an
agreement with a cloud provider, with questions on confidentiality, integrity, availability, and
other legal and data protection issues.45
According to the guidance, cloud customers should choose their cloud provider based
on economic, legal and technical considerations. The ICO considers it is important that, at
the very least, such contracts should allow cloud customers to retain sufficient control over
the data to fulfil their data protection obligations.
The ICO is currently updating the cloud computing guidance to reflect the entry into
force of the GDPR and DPA 2018.
440
© 2020 Law Business Research Ltd
United Kingdom
sufficient) and not implied consent; (2) granularity (the ability to consent to cookies
used for some purposes, but not others); and (3) no pre-ticked boxes or sliders set to
‘on’ (i.e., the default option for non-essential cookies must be off);
b the legitimate interest legal ground cannot be used as an alternative for consent to place
non-essential cookies on a website;
c blanket cookie walls to restrict access to websites until a user consents to the use of
cookies are unlikely to represent valid consent. The guidance confirms that statements
such as ‘by continuing to use this website you are agreeing to cookies’ is not considered
valid consent under the higher GDPR standard;
d information provided on cookies must align with the GDPR standards for transparency;
and
e if an organisation’s use of cookies changes significantly, users will need to be made aware
of these changes to allow them to make an informed choice about the new activity.
To help address the above, the ICO recommends that organisations conduct a ‘cookie audit’
which will: (1) confirm the purpose(s) of each cookie; (2) confirm the type of cookie (session
or persistent); (3) distinguish between those that are strictly necessary and non-essential; (4)
document the findings; and (5) consider follow-up actions while building in an appropriate
review period. The ICO views this as an opportunity for organisations to ‘clean up’ existing
web pages and stop using unnecessary cookies, particularly if the website has evolved since an
initial assessment was undertaken. The numbers published by the ICO on its website show a
significant increase in complaints relating to cookies, rising from 327 for Q4 2018/2019 to
1,473 in Q4 2019/2020.
The new guidance confirms that enforcement action will vary, as expected, depending on
the level of privacy intrusion and risk of harm posed by cookies and related technologies. The
current enforcement regime for PECR remains as was in effect under the DPA 1998 (except
where personal data is processed, in which case the GDPR enforcement penalties will apply).
However, it is expected that this will be brought into line with the GDPR with the introduction
of the ePrivacy Regulation, which will replace the ePrivacy Directive when finalised.47
47 See the European Union Overview chapter for more details on the proposed ePrivacy Regulation.
48 ICO, Guide to Data Protection, Key DP Themes, Age Appropriate design: a code of practice
for online services, accessible at https://ico.org.uk/for-organisations/guide-to-data-protection/
key-data-protection-themes/age-appropriate-design-a-code-of-practice-for-online-services/#:~:text=The%20
code%20is%20a%20set,designing%20and%20developing%20online%20services.
441
© 2020 Law Business Research Ltd
United Kingdom
ii Employee data
There is no specific law regulating the processing of employee data. However, the ICO has
published an employment practices code and supplementary guidance to help organisations
comply with UK data protection laws and to adopt good practices.49
The code contains four parts covering:
a recruitment and selection, providing recommendations with regard to the recruitment
process and pre-employment vetting;
b employment records, which is about collecting, storing, disclosing and deleting
employees’ records;
c monitoring at work, which covers employers’ monitoring of employees’ use of
telephones, internet, email systems and vehicles; and
d workers’ health, covering occupational health, medical testing and drug screening.
The code and supplementary guidance has not yet been updated to reflect the entry into force
of the GDPR and DPA 2018.
442
© 2020 Law Business Research Ltd
United Kingdom
On 8 June 2017, the former Article 29 Working Party adopted an opinion on data
processing at work that also addressed employee monitoring.52 This opinion is unlikely to
fundamentally change the ICO’s approach to employee monitoring in the UK. However,
it does include a number of new recommendations, including that where it is possible to
block websites rather than continually monitoring internet usage, employers should prefer
prevention to detection.
iv Whistle-blowing hotlines
The use of whistle-blowing hotlines (where employees and other individuals can report
misconduct or wrongdoing) is not prohibited by the DPA 2018 and their use is not restricted
by the ICO. The ICO published guidance on the use of whistle-blowing hotlines in June
2017,53 where it noted that employees can notify the ICO where they believe the employer
has not processed their personal data in accordance with data protection legislation. The
ICO has not published updated guidance on the use of whistle-blowing hotlines after the
entry into force of the GDPR and DPA 2018. However, organisations using whistle-blowing
hotlines in the UK will have to comply with the data-protection principles under the DPA
2018 and the GDPR.54
v Electronic marketing55
Under PECR, unsolicited electronic communications to individuals should only be sent with
the recipient’s consent.56 The only exemption to this rule is known as ‘soft opt-in’, which will
apply if the sender has obtained the individual’s details in the course of a sale or negotiations
for a sale of a product or service; the messages are only marketing for similar products; and
the person is given a simple opportunity to refuse marketing when his or her details are
collected, and if he or she does not opt out, he or she is given a simple way to do so in future
messages. These UK rules on consent do not apply to marketing emails sent to companies
and other corporate bodies, such as a limited liability partnership, Scottish partnership or UK
government body.57
Senders of electronic marketing messages must provide the recipients with the sender’s
name and a valid contact address.58
The ICO has created a direct-marketing checklist, which enables organisations to check
if their marketing messages comply with the law and which also proposes a guide to the
different rules on marketing calls, texts, emails, faxes and mail.
443
© 2020 Law Business Research Ltd
United Kingdom
In addition, the ICO has published on its website a guide on rules for businesses when
marketing to other businesses under GDPR and PECR.59 It advises that the GDPR applies
to individuals who can be identified either directly or indirectly, even when they are acting
in a professional capacity. It also notes the GDPR only applies to loose business cards where
controllers intend to file them or input the details of the card into a computer system.
The proposed ePrivacy Regulation, which is still under review and will not come into
force before 2021 at the earliest, will not have direct effect in the UK. It remains to be seen
whether similar rules and obligations will be introduced in the UK under domestic law and
any updates to PECR.
In January 2020, the ICO published a draft Direct Marketing Code of Practice (Draft
Code) for public consultation. The Draft Code is intended to update existing guidance
published pre-GDPR and provide clarity on certain important issues. The key takeaways from
the Draft Code are as follows: consent is not required under the PECR where an organisation
sends service or operational messages to individuals (e.g., a message informing a user they are
approaching their monthly data limit); where an organisation partners with a third party to
deliver electronic communications, both parties will need to comply with PECR irrespective
of who has access to the data used; the two lawful bases for direct marketing under the GDPR
are consent and legitimate interests. However, the Draft Code confirms that if consent is
required under PECR, it will also be the relevant legal basis under the GDPR. The Draft
Code also provides that ‘tell a friend schemes’ are in breach of PECR because it is impossible
for the organisation to obtain valid consent from the ‘friend’, in other words, the organisation
does not have a direct relationship with the ‘friend’.
vi Financial services
Financial services organisations, in addition to data protection requirements under the DPA
2018, also have legal and regulatory responsibilities to safeguard consumer data under rules
of the UK Financial Conduct Authority (FCA), which includes having adequate systems and
controls in place to discharge their responsibilities.
This includes financial services firms taking reasonable care to establish and maintain
effective systems and controls for countering the risk that the firm might be used to further
financial crime, such as by misuse of customer data.60
Failure to comply with these security requirements may lead to the imposition of
significant financial penalties by the FCA.
59 ICO, For organisations/Marketing/The rules around business to business marketing, the GDPR and
PECR, accessible at https://ico.org.uk/for-organisations/marketing/the-rules-around-business-to-business-
marketing-the-gdpr-and-pecr/.
60 SYSC 3.
444
© 2020 Law Business Research Ltd
United Kingdom
c a derogation from the prohibition applies (such as the data subject has explicitly
consented to the transfer).
This chapter does not consider the data protection safeguards and derogations in detail,
which are set out in the EU chapter. However, it should be noted that under the DPA
1998, controllers were allowed to determine for themselves that their transfers of personal
data outside of the EEA were adequately protected. The DPA 2018 does not contain such
a self-adequacy assessment. However, under the recent ruling by the Court of Justice of
European Union (CJEU), which invalidated the EU–US Privacy Shield as a mechanism to
legitimise the transfer of personal data from the EEA/UK to the United States, the CJEU
held that it is the responsibility of the data exporter and data importer to assess whether the
level of protection required by EU law is respected in the third country concerned in order
to determine if the guarantees provided by SCCs (and Binding Corporate Rules) can be
complied with in practice. If this is not the case then an assessment should be carried out on
whether supplementary measures can be provided to ensure an essentially equivalent level
of protection. In addition, the GDPR contains a more limited version of the DPA 1998
self-adequacy assessment, and allows transfers:
a that are not repetitive, concern only a limited number of data subjects and are necessary
for the purposes of compelling legitimate interests that are not overridden by the
interests or rights and freedoms of the data subject;
b where the controller has assessed all the circumstances surrounding the data transfer
and has, as a result, implemented suitable data protection safeguards; and
c has notified the relevant data protection authority of the transfer.
The DPA 2018 also introduces a derogation where the transfer is a necessary and proportionate
measure for the purposes of the controller’s statutory function.
In addition, the DPA 2018 also introduces further derogations for the transfer of
personal data from the UK to a country outside of the EEA where the transfer is necessary for
law enforcement purposes and is based on an adequacy decision.
If it is not based on an adequacy decision, it must be based on appropriate safeguards
where a legal instrument containing appropriate safeguards for the protection of personal
data binds the intended recipient of the personal data, or the data controller having assessed
all the circumstances surrounding the transfers of that type of personal data to that specific
country or territory outside of the EEA concludes that appropriate safeguards exist to protect
the personal data. When relying on this particular derogation, the transfer must also be
documented and such documents must be provided to the ICO upon request, including
the date and time of the transfer, the name or any other pertinent information about the
recipient, the justification for the transfer of the personal data; and a description of the
personal data transferred.
If it is not based on an adequacy decision or on there being appropriate safeguards, it
must be based on special circumstances that allow for the transfer of personal data from the
UK to a country or territory outside of the EEA, where the transfer is necessary:
a to protect the vital interests of the data subject or another person;
b to safeguard the legitimate interests of the data subject;
c for the protection of an immediate and serious threat to the public security of a Member
State or a third country;
445
© 2020 Law Business Research Ltd
United Kingdom
d in individual cases for any law enforcement purposes, (provided the controller has
not determined that fundamental rights and freedoms of the data subject override the
public interest in the transfer of personal data from the UK to a third country); or
e in individual cases for a legal purpose (provided the controller has not determined
that fundamental rights and freedoms of the data subject override the public interest
in the transfer of personal data from the UK to a third country). When relying on this
particular derogation, the transfer must also be documented and such documents must
be provided to the ICO upon request, including the date and time of the transfer, the
name or any other pertinent information about the recipient, the justification for the
transfer of the personal data, and a description of the personal data transferred.
Brexit will have fundamental implications for data protection and the ongoing flow of
personal data from the EU to the UK, and vice versa. On 31 December 2020, at the end of
the transition period, transfers from the EU to the UK will be restricted. Until the end of
the Transition Period, data transfers between the EU and the UK can continue unrestricted.
At the end of the transition period, companies will have to put in place a valid data transfer
solution to legitimise their transfers of personal data from the EU to the UK (e.g., EU
standard contractual clauses).
61 The Article 29 Working Party has, however, published a working document on this topic. See the European
Union Overview chapter for more details.
446
© 2020 Law Business Research Ltd
United Kingdom
GDPR or DPA 2018 (this may include the power of the ICO to conduct an audit,
where the assessment notice permits the ICO to enter specified premises, inspect or
examine documents, information, material and observe processing of personal data on
the premises);
c notice of intent: where, after conducting its investigation, the ICO issues a notice of
intent to fine the controller or processor in relation to a breach of the GDPR or the
DPA 2018. Such a notice sets out the ICO’s areas of concern with respect to potential
non-compliance of the GDPR or the DPA 2018 and grants the controller or processor
the right to make representations. After such representations have been carefully
considered, the ICO reaches its final decision on any enforcement action in the form
of an enforcement notice;
d enforcement notices: such notices are issued where the ICO has concluded the
controller or processor has failed to comply with the GDPR or the UK DPA 2018,
setting out the consequences of non-compliance, which could include a potential ban
on processing all or certain categories of personal data; and
e penalty notices: if the ICO is satisfied that the controller or processor has failed to
comply with the GDPR or the DPA 2018 or has failed to comply with an information
notice, an assessment notice or an enforcement notice, the ICO may, by written notice,
require a monetary penalty to be paid for failing to comply with the GDPR or the DPA
2018. Under the GDPR, such monetary penalties can amount to €20 million or 4 per
cent of annual worldwide turnover.
As the DPA 2018 came into effect on 23 May 2018, any information notices issued by the
ICO to commence possible investigations, assessment notices or enforcement notices served
pre-23 May 2018 and thus served under the DPA 1998, continue to have effect under the
DPA 2018.
In a speech at the Data Protection Practitioners’ Conference on 9 April 2018, the
Information Commissioner, Elizabeth Dunham, stated that ‘enforcement is a last resort’
and that ‘hefty fines will be reserved for those organisations that persistently, deliberately or
negligently flout the law’ and ‘those organisations that self-report, engage with us to resolve
issues and can demonstrate effective accountability arrangements can expect this to be a
factor when we consider any regulatory action’.
In addition, the ICO is responsible for promoting public awareness and in particular
raising awareness among controllers and processors, of their obligations under the GDPR
and DPA 2018.
The FCA also has enforcement powers and can impose financial penalties on financial
services organisations for failure to comply with their obligations to protect customer data.
447
© 2020 Law Business Research Ltd
United Kingdom
cyber-incident that BA notified to the ICO (as BA’s lead data protection authority) in
September 2018. The incident involved the theft from the BA website and mobile app
of personal data pertaining to customers over a two-week period; and
c on 9 July 2019, the ICO issued another statement of its intention to fine Marriott
International, Inc over £99 million in relation to a security incident affecting the
Starwood reservation database that Marriott had acquired in 2016 and discovered
in November 2018. The statement came in response to Marriott’s filing with the US
Securities and Exchange Commission that the ICO intended to fine it for breaches
of the GDPR. The UK Information Commissioner confirmed in a statement that
‘organisations must be accountable for the personal data they hold and this includes
carrying out proper due diligence when making a corporate acquisition, and putting
in place proper accountability measures to assess not only what personal data has been
acquired, but how it is protected.’
Both BA and Marriott had the opportunity to make detailed representations to the ICO as
to the proposed findings and sanctions. In early 2020, the ICO issued a statement delaying
the issuance of both GDPR fines, which had originally been expected by the end of 2019.
It is understood that the delay was agreed between both parties and the ICO respectively
in accordance with Schedule 16 of the UK Data Protection Act 2018, which provides that
the ICO must give a penalty notice to a person in reliance on a notice of intent within six
months of that notice of intent, unless that period is extended by agreement between the
ICO and that person. In light of covid-19, the notice of intent to fine in both instances has
been extended, and is expected to be announced in late 2020.
448
© 2020 Law Business Research Ltd
United Kingdom
data online, as the wrongful conduct was not so closely connected with acts that he was
authorised to do by his employer that it could be fairly regarded as carried out by him during
his ordinary course of employment.62
Further, on 19 August 2020, Martin Bryant, a technology journalist, announced he
had filed a data breach representative action in the High Court of England and Wales against
Marriott following its data breach, seeking compensation of the loss of control over his
personal data as well as on behalf of other claimants.
449
© 2020 Law Business Research Ltd
United Kingdom
Court in relation to the validity of the provisions of the DRIP Act.63 Although the ruling
concerned the DRIP Act, the IPA does little to address the criticisms of the DRIP Act in the
CJEU’s judgment and in some cases provides for even more extensive powers than under
the DRIP Act. The case was returned to the Court of Appeal, who in January 2018, issued
its judgment, ruling the DRIP Act was incompatible with EU law as the DRIP Act did not
restrict the accessing of communications data to ‘investigations of serious crime’ nor did
requests by police or other public bodies to access communications data meet independent
oversight by way of a ‘prior review by a court or independent administrative authority’. The
UK government responded that it was making amendments to the IPA to take into account
judicial criticisms of the DRIP Act. The UK High Court ruled in April 2018 that the UK
government had six months to introduce changes to the IPA to make it compatible with UK
law. On 31 October 2018 the Data Retention and Acquisition Regulations 2018 came into
force to address the UK High Court’s ruling.
UK cybersecurity strategy
In November 2011, the Cabinet Office published the UK Cyber Security Strategy: Protecting
and promoting the UK in a digital world, with four objectives for the government to achieve
by 2015:
a tackling cybercrime and making the UK one of the most secure places in the world to
do business;
b to be more resilient to cyberattacks and better able to protect our interests in cyberspace;
c to create an open, stable and vibrant cyberspace that the UK public can use safely and
that supports open societies; and
d to have the cross-cutting knowledge, skills and capability it needs to underpin all our
cybersecurity objectives.
In March 2013, the government launched the Cyber-security Information Sharing Partnership
to facilitate the sharing of intelligence and information on cybersecurity threats between the
government and industry.
The government has also developed the Cyber Essentials scheme, which aims to provide
clarity on good cybersecurity practice.
Along with the Cyber Essentials scheme, the government has published the Assurance
Framework, which enables organisations to obtain certifications to reassure customers,
investors, insurers and others that they have taken the appropriate cybersecurity precautions.
The voluntary scheme is currently open and available to all types of organisation.
In June 2015, the government launched a new online cybersecurity training course to
help the procurement profession stay safe online.
63 Case C-698/15 Secretary of State for the Home Department v. Tom Watson, Peter Brice and Geoffrey Lewis.
450
© 2020 Law Business Research Ltd
United Kingdom
In July 2015, the government announced the launch of a new voucher scheme to
protect small businesses from cyberattacks, which will offer micro, small and medium-sized
businesses up to £5,000 for specialist advice to boost their cybersecurity and protect new
business ideas and intellectual property.
In January 2016, the government announced plans to assist start-ups offering
cybersecurity solutions. Such start-ups will be given help, advice and support through the
Early State Accelerator Programme, a £250,000 programme designed to assist start-ups
in developing their products and bringing them to market. The programme is run by
Cyber London and the Centre for Secure Information Technologies, and is funded by the
government’s National Cyber Security Strategy programme.
In March 2016, the government announced that the UK’s new national cyber centre
(announced in November 2015) would be called the National Cyber Security Centre
(NCSC). The NCSC, which is based in London, opened in October 2016 and is intended
to help tackle cybercrime.
In response to the European Parliament’s proposal for a NIS Directive in March
2014, which was part of the European Union’s Cybersecurity Strategy, and proposed certain
measures including new requirements for ‘operators of essential services’ and ‘digital service
providers’, the UK government has implemented the NIS Directive into national law in the
form of the UK Network and Information Systems Regulations 2018 (the NIS Regulations),
which came into force on 10 May 2018.
The NIS Regulations have established a legal framework that imposes security and
notification of security incident obligations on:
a operators of essential services, being energy, transport, digital infrastructure, the health
sector and drinking water supply and distribution services; and
b on relevant digital service providers, being online marketplace providers, online search
engines and cloud computing service providers.
The NIS Regulations also require the UK government to outline and publish a strategy to
provide strategic objectives and priorities on the security of the network and information
systems in the UK.
The NIS Regulations also impose a tiered system of fines in proportion to the impact
of the security incident, with a maximum fine of £17 million imposed where a competent
authority decides the incident has caused or could cause an immediate threat to life or a
significantly adverse impact on the UK economy.
Controllers in the UK may in the event of a data security breach have to notify the
relevant authorities both under the GDPR and the NIS Regulations.
Data breaches
Under the GDPR controllers are required to report personal data breaches to the ICO without
undue delay, unless the breach is unlikely to result in a risk to the rights and freedoms of the
data subject. and, where feasible, no later than 72 hours after the controller becomes aware of
the breach.64 If a controller does not report the data breach within 72 hours, it must provide
a reasoned justification for the delay in notifying the ICO. The controller is also subject
to a concurrent obligation to notify affected data subjects without undue delay when the
451
© 2020 Law Business Research Ltd
United Kingdom
notification is likely to result in a high risk to the rights and freedoms of natural persons.65
Under the GDPR, processors also have an obligation to notify the controller of personal data
breaches without undue delay after becoming aware of a personal data breach.66
According to the ICO, there should be a presumption to report a breach to the ICO if a
significant volume of personal data is concerned and also where smaller amounts of personal
data are involved but there is still a significant risk of individuals suffering substantial harm.67
The ICO have stated the 72-hour deadline to report a personal data breach includes evenings,
weekends and bank holidays68 and where a controller is not able to report a breach within the
72-hour deadline, it must give reasons to the ICO for its delay.
As part of the notification, the ICO requires controllers to inform the ICO of:
a the number of data subjects affected by the personal data breach;
b the type of personal data that has been affected;
c the likely impact on the data subjects as a result of the personal data breach;
d steps the controller has taken to rectify the personal data breach and to ensure it does
not happen again; and
e the name of the DPO or another point of contact for the ICO to request further
information.
The GDPR also imposes a requirement on controllers to inform the data subject where
the personal data breach represents a high risk to their rights and freedoms. The ICO, in a
webinar in July 2018,69 stated it was of the view that the threshold is higher for informing
data subjects of the personal data breach than it is for informing the ICO of the personal
data breach. According to the ICO, this is because the aim of informing data subjects is
so that they can take action to protect themselves in the event of a personal data breach.
Therefore, informing them of every personal data breach, regardless of whether it has an effect
on the data subject, can lead to notification fatigue, where the consequences of the breach
are relatively minor.
In addition, when notification is given to the ICO of the personal data breach, the ICO
can also require the controller to inform the data subjects of the personal data breach.
In addition, under the PECR70 and the Notification Regulation,71 internet and
telecommunication service providers must report breaches to the ICO no later than 24
hours after the detection of a personal data breach where feasible.72 The ICO has published
guidance on this specific obligation to report breaches.73
452
© 2020 Law Business Research Ltd
United Kingdom
XII OUTLOOK
In light of the upcoming end to the transition period, negotiations on a UK adequacy decision
are expected to continue between the UK government and the European Commission,
with the UK government expected to set out further guidance on the UK’s data protection
framework post-Brexit.
More generally, it is expected the ICO will continue to publish guidance on the DPA
2018 and the impact of Brexit on data protection during 2020 and beyond. We also expect
a resurgence in enforcement action from the ICO in the coming months, as well as a steep
increase in consumers exercising their privacy rights and a continued growth in privacy
litigation.
453
© 2020 Law Business Research Ltd
Chapter 29
UNITED STATES
1 Alan Charles Raul is a partner, and Snezhana Stadnik Tapia is an associate, at Sidley Austin LLP. The
authors wish to thank Christopher C Fonzone, who co-authored the prior version of this chapter, for his
extensive contributions to this current version. The authors also wish to thank Vivek K Mohan, Tasha
D Manoranjan and Frances E Faircloth, who were previously associates at Sidley, for their contributions
to prior versions of this chapter. Passages of this chapter were originally published in ‘Privacy and data
protection in the United States’, The debate on privacy and security over the network: Regulation and
markets, 2012, Fundación Telefónica; and Raul and Mohan, ‘The Strength of the U.S. Commercial
Privacy Regime’, 31 March 2014, a memorandum to the Big Data Study Group, US Office of Science and
Technology Policy.
2 Samuel D. Warren & Louis D. Brandeis, The Right to Privacy, 4 Harv. L. Rev. 193 (1890). The piece
by Warren and Brandeis is the second most cited law review article of all time. See Fred R. Shapiro &
Michelle Pearse, The Most-Cited Law Review Articles of All Time, 110 Mich. L. Rev. 1483, 1489 (2012)
(noting that the most cited is R.H. Coase’s ‘The Problem of Social Cost’, which famously introduced ‘The
Coase Theorem’). It has also created an arms race among legal scholars to come up with new superlatives
to describe it: ‘monumental’, Gordon, Right of Property in Name, Likeness, Personality and History, 55 Nw.
U.L. Rev. 553, 553 (1960); an article of ‘prestige and enormous influence’, Robert C. Post, Rereading
Warren and Brandeis: Privacy, Property, and Appropriation, 41 Case W. Res. L. Rev. 647, 647 (1991); the
‘most influential law review article of all’, Harry Kalven, Jr., Privacy in Tort Law – Were Warren and Brandeis
Wrong?, 31 Law & Contemp. Probs. 326, 327 (1966); etc.; etc.
3 Warren & Brandeis, supra note 2, at 213.
454
© 2020 Law Business Research Ltd
United States
In recent years, however, privacy commentators have painted the United States in a
different light. Over the last generation, the United States has balanced its commitment to
privacy with its leadership role in developing the technologies that have driven the information
age. This balance has produced a flexible and non-prescriptive regulatory approach focused
on post hoc government enforcement (largely by the Federal Trade Commission) and privacy
litigation rather than detailed prohibitions and rules, sector-specific privacy legislation focused
on sensitive categories of information, and laws that seek to preserve an internet ‘unfettered
by Federal or State regulation’. The new technologies that have changed the day-to-day lives
of billions of people and the replication of US privacy innovations around the globe have – at
least to US regulators – long indicated the wisdom of this approach.
But there is now a growing perception that other jurisdictions have seized the privacy
leadership mantle by adopting more comprehensive regulatory frameworks, exemplified by
the European Union’s General Data Protection Regulation (GDPR). A series of high-profile
data breaches in both the public and private sectors and concerns about misinformation
and the misuse of personal information have also created a ‘crisis of new technologies’ or
‘techlash’ that is shifting popular views about privacy in the United States. In addition, the
covid-19 pandemic, and the digital innovations being developed to mitigate the spread of
the virus, have placed privacy at the forefront of public attention. Once again, it seems, the
United States is starting to undergo a period of intense privacy innovation in response to a
new technological world.
In short, the US privacy zeitgeist is shifting – and this chapter, while not providing a
comprehensive overview of the rich US privacy and cybersecurity landscape, will attempt
to show how that is the case. The chapter will begin with an overview of the existing US
regulatory and enforcement framework – which exemplifies the balance between privacy
protection and innovation described above. The chapter will then describe, with a focus on
the concrete developments over the past year, the significant shift in how the United States is
thinking about privacy and privacy regulation that appears to be underway:
a How the covid-19 pandemic – and the technological solutions being considered to help
manage it – have placed issues concerning the collection and use of personal data front
and centre in one of the biggest issues of this or any year, leading to intense discussions
over privacy regulation.
b How all three branches of the federal US government are actively taking steps to
confront the privacy and cybersecurity questions of the day.
c How the real action continues to be not in Washington DC, but rather in the 50
US states – as California’s far-reaching comprehensive privacy bill called ‘California’s
GDPR’ went into effect on 1 January 2020, and numerous other states either have
enacted or are considering substantial new privacy legislation. The locus of action may
likely shift to Washington in 2021.
d And how, not to be outdone, companies are also increasingly recognising that they
have to establish ‘digital governance’ at the board or C-suite level to address strategy
and oversight for privacy, data protection, cybersecurity, and disruptive technologies.
The chapter then concludes by detailing a very significant change in the international data
transfer framework between the EU and US, considerations for foreign organisations that
must engage with the US privacy regime, and some thoughts on how that regime may
continue to evolve going forward.
455
© 2020 Law Business Research Ltd
United States
i Privacy and data protection legislation and standards – federal law (including
general obligations for data handlers and data subject rights)
General consumer privacy enforcement agency – the FTC
Although there is no single omnibus federal privacy or cybersecurity law nor designated
central data protection authority, the FTC comes closest to assuming that role for consumer
privacy in the US.4 The statute establishing the FTC, the FTC Act, grants the Commission
jurisdiction over essentially all business conduct in the country affecting interstate (or
international) commerce and individual consumers.5 And while the Act does not expressly
address privacy or information security, the FTC has interpreted the Act as giving it authority
to regulate information privacy, data security, online advertising, behavioural tracking and
other data-intensive, commercial activities – and accordingly to play a leading role in laying
out general privacy principles for the modern economy.
The FTC has rooted its privacy and information security authority in Section 5 of
the FTC Act, which charges the Commission with prohibiting ‘unfair or deceptive acts or
practices in or affecting commerce’.6 An act or practice is deceptive under Section 5 if there
is a representation or omission of information likely to mislead a consumer acting reasonably
under the circumstances; and the representation or omission is ‘material’. The FTC has
taken action against companies for deception when companies have made promises, such
4 This discussion refers generally to ‘privacy’ even though, typically, the subject matter of an FTC action
concerns ‘data protection’ more than privacy. This approach follows the usual vernacular in the United
States. See also Daniel J Solove and Woodrow Hartzog, ‘The FTC and the New Common Law of Privacy’,
114 Columbia L. Rev. (‘It is fair to say that today FTC privacy jurisprudence is the broadest and most
influential force on information privacy in the United States – more so than nearly any privacy statute and
any common law tort.’) available at papers.ssrn.com/sol3/papers.cfm?abstract_id=2312913.
5 See FTC, What We Do, www.ftc.gov/about-ftc/what-we-do. The FTC’s jurisdiction spans across borders
– Congress has expressly confirmed the FTC’s authority to provide redress for harm abroad caused by
companies within the United States. Federal Trade Commission Act, 15 U.S.C. § 45(a)(4) (1914).
6 id. at § 5.
456
© 2020 Law Business Research Ltd
United States
as those relating to the security procedures purportedly in place, and then not honoured or
implemented them in practice. An act or practice is ‘unfair’ under Section 5 if it causes or
is likely to cause substantial injury to consumers that is not reasonably avoidable and lacks
countervailing benefits to consumers or competition. The FTC thus understands unfairness
to encompass unexpected information practices, such as inadequate disclosure or actions that
a consumer would find ‘surprising’ in the relevant context.
A few examples of what the FTC believes constitutes unfair or deceptive behaviour
follow. First, the FTC takes the position that, among other things, companies must disclose
their privacy practices adequately and that, in certain circumstances, this may require
particularly timely, clear and prominent notice, especially for novel, unexpected or sensitive
uses.7
Second, the FTC also takes the position that Section 5 generally prohibits a company
from using previously collected personal data in ways that are materially different from, and
less protective than, what it initially disclosed to the data subject, without first obtaining the
individual’s additional consent.8
Finally, the FTC staff has also issued extensive guidance on online behavioural
advertising, emphasising four principles to protect consumer privacy interests:
a transparency and control, giving meaningful disclosure to consumers, and offering
consumers choice about information collection;
b maintaining data security and limiting data retention;
c express consent before using information in a manner that is materially different from
the privacy policy in place when the data were collected; and
d express consent before using sensitive data for behavioural advertising.9
The FTC has not, however, indicated that opt-in consent for the use of non-sensitive
information is necessary in behavioural advertising.
In terms of enforcement, the FTC has frequently brought successful actions under
Section 5 against companies that did not adequately disclose their data collection practices,
failed to abide by the promises made in their privacy policies, failed to comply with their
security commitments, or failed to provide a ‘fair’ level of security for consumer information.
Although various forms of relief (such as injunctions and damages) for privacy-related wrongs
are available, the FTC has frequently resorted to issuing consent decrees. Such decrees
generally provide for ongoing monitoring by the FTC, prohibit further violations of the law,
7 To this end, the FTC brought an enforcement action in 2009 against Sears for allegedly failing to disclose
adequately the extent to which it collected personal information by tracking the online browsing of
consumers who downloaded certain software. The consumer information allegedly collected included
‘nearly all of the Internet behaviour that occurs on [. . .] computers’. The FTC thus required Sears to
disclose prominently any data practices that would have significant unexpected implications in a separate
screen outside any user agreement, privacy policy or terms of use. See Complaint, In re Sears Holdings
Mgmt. Corp., Docket No. C-4264, para. 4 (F.T.C. Sept. 9, 2009).
8 Complaint, In the Matter of Myspace LLC, Docket No. C-4369 (F.T.C. Sept. 11, 2012).
9 Federal Trade Commission, FTC Staff Report: Self-Regulatory Principles for Online Behavioral Advertising,
at 39 (Feb. 2009), https://www.ftc.gov/sites/default/files/documents/reports/federal-trade-commission-staf
f-report-self-regulatory-principles-online-behavioral-advertising/p085400behavadreport.pdf.
457
© 2020 Law Business Research Ltd
United States
and subject businesses to substantial financial penalties for consent decree violations. These
enforcement actions have been characterised as shaping a common law of privacy that guides
companies’ privacy practices.10
458
© 2020 Law Business Research Ltd
United States
We briefly examine each of these categories, and the agencies with primary enforcement
responsibility for them, below.
Financial information
The Gramm-Leach-Bliley Act (GLBA)13 addresses financial data privacy and security by
establishing standards pursuant to which financial institutions must safeguard and store
their customers’ ‘non-public personal information’ (or ‘personally identifiable financial
information’). In brief, the GLBA requires financial institutions to notify consumers of
their policies and practices regarding the disclosure of personal information; to prohibit the
disclosure of such data to unaffiliated third parties, unless consumers have the right to opt
out or other exceptions apply; and to establish safeguards to protect the security of personal
information. The GLBA and its implementing regulations further require certain financial
institutions to notify regulators and data subjects after breaches implicating non-public
personal information.
Various financial regulators, such as the federal banking regulators (e.g., the Federal
Reserve, the Federal Deposit Insurance Corporation, the Office of the Comptroller of the
Currency) and the Securities and Exchange Commission (SEC), have authority to enforce
consumer privacy under the GLBA, while the FTC (for non-bank financial institutions)
and the Consumer Financial Protection Bureau (CFPB) (for certain banks and non-bank
financial institutions) do as well.
The SEC has also increasingly used its broad investigative and enforcement powers over
public companies who have suffered cybersecurity incidents. In doing so, the SEC has relied on
multiple theories, including that material risks were not appropriately disclosed and reported
pursuant to the agency’s guidance on how and when to do so and that internal controls for
financial reporting relating to information security did not adequately capture and reflect
the potential risk posed to the accuracy of financial results. Of particular note, in 2018, the
SEC published interpretive guidance to assist publicly traded companies in disclosing their
material cybersecurity risks and incidents to investors.14 The SEC suggested that all public
companies adopt cyber disclosure controls and procedures that enable companies to:
a identify cybersecurity risks and incidents;
b assess and analyse their impact on a company’s business;
c evaluate the significance associated with such risks and incidents;
d provide for open communications between technical experts and disclosure advisers;
e make timely disclosures regarding such risks and incidents; and
f adopt internal policies to prevent insider trading while the company is investigating a
suspected data breach.
Healthcare information
For healthcare privacy, entities within the Department of Health and Human Services
(HHS) administer and enforce the Health Insurance Portability and Accountability Act of
1996 (HIPAA),15 as amended by the Health Information Technology for Economic and
13 Gramm-Leach-Bliley Act, Pub. L. No. 106–102, 113 Stat. 1338 (codified and amended at scattered
sections of 12 and 15 U.S.C. (2015)).
14 SEC Statement and Guidance on Public Cybersecurity Disclosures, 17 C.F.R. §§ 229, 249 (2018).
15 Health Insurance Portability and Accountability Act of 1996, Pub. L. No. 104-191, 110 Stat. 1936
(codified and amended in scattered sections of 18, 26, 29, and 42 U.S.C. (2012)).
459
© 2020 Law Business Research Ltd
United States
Clinical Health Act (HITECH).16 Congress enacted HIPAA to create national standards
for electronic healthcare transactions, and HHS has promulgated regulations to protect the
privacy and security of personal health information. In general, HIPAA and its implementing
regulations state that patients generally have to opt in before covered organisations can share
the patients’ information with other organisations.
HIPAA’s healthcare coverage is quite broad. It defines ‘protected health information,’
often referred to as PHI, as ‘individually identifiable health information . . . transmitted
or maintained in electronic media’ or in ‘any other form or medium’.17 ‘Individually
identifiable health information’ is in turn defined as a subset of health information, including
demographic information, that ‘is created or received by a health care provider, health plan,
employer, or health care clearinghouse’; that ‘relates to the past, present, or future physical or
mental health or condition of an individual’, ‘the provision of health care to an individual’,
or ‘the past, present, or future payment for the provision of health care to an individual’; and
that either identifies the individual or provides a reasonable means by which to identify the
individual.18 Notably, HIPAA does not apply to ‘de-identified’ data.
With respect to organisations, HIPAA places obligations on ‘covered entities’, which
include health plans, healthcare clearing houses and healthcare providers that engage in
electronic transactions as well as, via HITECH, service providers to covered entities that
need access to PHI to perform their services. It also imposes requirements in connection with
employee medical insurance.19
Moreover, HIPAA also places obligations on ‘business associates,’ which are required
to enter into agreements, called business associate agreements, to safeguard PHI. A business
associate is defined as an entity that performs or assists a covered entity in the performance of
a function or activity that involves the use or disclosure of PHI (including, but not limited to,
claims processing or administration activities).20 Such agreements require business associates
to use and disclose PHI only as permitted or required by the agreement or as required by
law and to use appropriate safeguards to prevent the use or disclosure of PHI other than as
provided for by the business associate agreement. The agreements also include numerous
other provisions regarding the confidentiality, integrity and availability of electronic PHI.
HIPAA and HITECH not only restrict access to and use of PHI, but also impose
stringent information security standards. In particular, HHS administers the HIPAA Breach
Notification Rule, which imposes significant reporting requirements and provides for civil
and criminal penalties for the compromise of PHI maintained by covered entities and their
business associates. The HIPAA Security Rule also requires covered entities to maintain
appropriate administrative, physical and technical safeguards to ensure the confidentiality,
integrity and security of electronic PHI.
16 Health Information Technology for Economic and Clinical Health Act, Pub. L. No. 111-5, 123 Stat. 226,
467 (codified in scattered sections of 42 U.S.C. (2009)).
17 45 C.F.R. § 160.103.
18 45 C.F.R. § 160.103.
19 45 C.F.R. § 164.504(f )(3)(iii).
20 45 C.F.R. § 164.103.
460
© 2020 Law Business Research Ltd
United States
461
© 2020 Law Business Research Ltd
United States
27 Fair Credit Reporting Act, 12 U.S.C. §§ 1830–1831 (1970); 15 U.S.C. § 1681 et seq. (1970).
28 Fair and Accurate Credit Transactions Act of 2003, Pub. L. No. 108-159, 117 Stat. 1952 (codified as
amended at 15 U.S.C. §§ 1681c–1, 1681j, 1681 s–3 (2010)); 20 U.S.C. § 9701–9708 (2003)).
29 Fair Credit Reporting Act, 15 U.S.C. § 621.
30 State of California Department of Justice, Privacy Laws, oag.ca.gov/privacy/privacy-laws.
462
© 2020 Law Business Research Ltd
United States
have had nationwide data breaches must now research a number of different laws – which
are largely similar, but differ in subtle and important ways – to determine their notification
obligations.
In addition to the data breach notification laws, states have also imposed affirmative
administrative, technical and physical safeguards to protect the security of sensitive personal
information.31 For example, Massachusetts regulations require regulated entities to have a
comprehensive, written information security programme and vendor security controls.32
Likewise, as discussed below, the California Consumer Privacy Act contains security
requirements, and a preliminary set of general safeguards went into effect this year in New
York, to say nothing of the sector-specific cybersecurity rule issued by New York’s Department
of Financial Services (DFS). In short, absent pre-emptive federal legislation, we should
expect to see states continuing to pass new legislation in this area, creating an increasingly
complicated patchwork quilt of state laws for companies to navigate.
463
© 2020 Law Business Research Ltd
United States
464
© 2020 Law Business Research Ltd
United States
permit a minor to request removal of content or information posted on the operator’s site
or service by the minor, with certain exceptions.40 While California’s privacy policy laws are
likely the most prominent, they do not stand alone. For instance, Connecticut law requires
any person who collects social security numbers in the course of business to create a publicly
displayed privacy protection policy that protects the confidentiality of the sensitive number.
Nebraska and Pennsylvania have laws that prohibit the use of false and misleading statements
in website privacy policies.41 And there are many other state laws concerning privacy policies,
making this an excellent example of the many and diverse regulations that may be relevant to
businesses operating across multiple US states.
465
© 2020 Law Business Research Ltd
United States
44 See Digital Advertising Alliance (DAA), Self-Regulatory Program, www.aboutads.info; Network Advertising
Initiative, Opt Out Of Interest-Based Advertising, www.networkadvertising.org/choices/?partnerId=1//.
45 National Conference of State Legislatures, State Laws Related to Internet Privacy, http://www.ncsl.org/
research/telecommunications-and-information-technology/state-laws-related-to-internet-privacy.aspx.
466
© 2020 Law Business Research Ltd
United States
and used – with new directives being issued on almost a daily basis as this extremely dynamic
situation unfolds and even Congress considering comprehensive covid-19-related privacy
legislation.
First, one of the most immediate consequences of the covid-19 pandemic was that a
large proportion of the US workforce was forced to begin teleworking almost overnight. This
distributed environment raised the level of cybersecurity risk businesses face, as did the fact
that cybersecurity criminals and scammers have increased their efforts to target vulnerable
employers and workforces. Given this, several US federal agencies have issued guidance on
cybersecurity risks in relation to covid-19 – for example, the Department of Homeland
Security’s Cyber and Infrastructure Security Agency (CISA) and the FTC have issued
guidance on avoiding phishing and scam emails relating to covid-19.46 And organisations
have increased their preventative efforts, undertaking such tasks as reviewing and updating
their incident response plans to address an increased attack surface resulting from remote
work, ensuring regular patching and remote wiping, clarifying business continuity plans and
processes with vendors and clients, and raising employee awareness about covid-19-related
phishing emails.
Second, businesses have had to consider how to continue operating or reopen safely
during the pandemic, which often involves or requires collecting sensitive health and related
data (such as temperature and symptom checks, recent travel history, and contact with
infected persons) before employees return to work and establishing protocols for symptom
and exposure reporting. Various federal, state, and local agencies have issued mandatory or
recommended guidance that touches on nearly every aspect of these ‘return to work’ issues –
from what screening must and may be done, what information can and should be captured,
and how long such information must and can be maintained. Indeed, the number of such
mandatory or guidance documents is nearly as large as the number of jurisdictions in the
United States. A good exemplar of what these directives and recommendations look like, and
one that has had significant influence on many jurisdictions all over the country, is guidance
from the Centers for Disease Control (CDC), which permits and encourages companies to
take employee temperatures, while advising companies to act responsibly with regards to
employees’ privacy rights – for instance, by narrowly tailoring health questionnaires aimed to
reduce the spread of covid-19 and ensuring that any retained medical information is stored
securely.47
Federal, state, and local agencies have also promulgated guidance or released statements
noting that they may modify their enforcement posture or reporting requirements during the
pandemic. For example, the Department of Health and Human Services (HHS) has waived
penalties and refrained from enforcing certain provisions under the HIPAA Privacy Rule,
including the requirement to obtain patients’ consent before speaking with family members
or friends about patients’ care, the requirement to distribute a privacy notice, and the patient’s
right to request privacy restrictions or request confidential communications.48
46 CISA Joint Alert, Avoid Scams Related to Economic Payments, COVID-19, https://www.cisa.gov/
sites/default/files/publications/Avoid_Scams_Related_to_Economic_Payments_COVID-19.pdf; FTC,
Coronavirus Advice for Consumers, https://www.ftc.gov/coronavirus/scams-consumer-advice.
47 Guidance for Businesses & Employers, CDC (May 6, 2020), https://www.cdc.gov/coronavirus/2019-ncov/
community/guidance-business-response.html.
48 HHS, COVID-19 & HIPAA Bulletin Waiver of HIPAA Sanctions and Penalties During a Nationwide
Public Health Emergency (Mar. 2020), https://www.hhs.gov/sites/default/files/hipaa-and-covid-19-
limited-hipaa-waiver-bulletin-508.pdf.
467
© 2020 Law Business Research Ltd
United States
Third, besides having a substantial effect on how businesses operate, the covid-19
pandemic has prompted significant public and private sector efforts to develop technologies to
help fight the spread of the virus. The list of such technologies is long: for example, researchers
are examining how to leverage population data to help assess patients’ symptoms;49 artificial
intelligence is being used to analyse medical images, such as chest X-rays and thoracic CT
scans, in order to differentiate between diagnoses with covid-like symptoms;50 and, most
prominently, work is being done on how to use smartphones and their data to engage in
contact tracing (i.e., using phones to alert people when they have come into contact with
someone who has tested positive).
With respect to this last type of technology, opt-in contact-tracing applications are
being built with a range of different functionalities. One common variation is an app that,
using Bluetooth signals, would log other phones it comes into contact with that have also
enabled the app in the form of random numerical ID codes. If an app user self-reports
a positive test, anyone who had recently been near that user would receive an ‘exposure
notification’ alert. Of course, using smartphones in this way, or many of the other ways
under development, raises a number of questions under federal and state laws governing
electronic communications (such as the Federal Wiretap and Stored Communications Acts),
laws governing the privacy of health and medical information (such as HIPAA), and even
more general privacy regimes like those enforced by the FTC and the California Consumer
Privacy Act (CCPA). Businesses and other entities contemplating using such apps must also
ensure that they are making appropriate disclosures to the employees that use them and
obtaining any required consents to capture and use any information collected.
Fourth, and finally, the privacy and cybersecurity issues raised by the new information
employers and technologies are gathering and may continue to gather is only heightening
the perceived need for a national privacy framework, at least for regulatory clarity regarding
how consumers’ data can be collected and used in the context of the covid-19 pandemic. To
that end, congressional Democrats and Republicans have both introduced bills to protect
consumer data collected in coronavirus response efforts.
On 7 May 2020, Republicans introduced the COVID-19 Consumer Data Protection
Act.51 Aimed to protect personal health, geolocation and proximity data, the bill would
require companies to delete or de-identify data after the pandemic ends. Notably, the bill
carves out an exemption for employee screening data during covid-19. The Act would also
require companies under the jurisdiction of the FTC to obtain affirmative express consent
from individuals to collect, process, or transfer their personal health, geolocation, or proximity
information for the purposes of tracking the spread of covid-19, and the bill specifies several
covered purposes for the data.
Along the same lines, on 14 May 2020, Democrats in both the House and Senate
introduced a competing bill, the Public Health Emergency Privacy Act.52 The bill would
also regulate what data companies can collect during the pandemic (including health and
location data collected by contact-tracing apps), and require them to delete the data once
468
© 2020 Law Business Research Ltd
United States
the crisis ends. Companies would be limited to collecting data for public health purposes,
and prohibited from using health data for advertising, or to block access to employment,
finance, housing or insurance. And not long after these duelling privacy proposals were
introduced, the bipartisan Exposure Notification Privacy Act (ENPA) was introduced in the
Senate, seeking to directly regulate contact tracing apps. It is simply too early to tell how
consideration of these bills will unfold, but they demonstrate how the covid-19 pandemic
may end up being an additional accelerant for further US privacy regulation.
53 Press Release, FTC, FTC Imposes $5 Billion Penalty and Sweeping New Privacy Restrictions on Facebook, (Jul.
24, 2019), https://www.ftc.gov/news-events/press-releases/2019/07/ftc-imposes-5-billion-
penalty-sweeping-new-privacy-restrictions.
54 id.
55 id.
469
© 2020 Law Business Research Ltd
United States
Moreover, the Facebook settlement was not the only record-setting FTC action of the past year.
In September 2019, the FTC and New York’s Attorney General announced a record-setting
fine of US$170 million on Google and its subsidiary YouTube to settle allegations that they
violated the Children’s Online Privacy Protection Act (COPPA).60 This is the largest civil
penalty for violations of COPPA to date, exceeding the previous record US$5.7 million fine
handed to TikTok’s parent company in February 2019.61 Of note, the FTC and New York
Attorney General alleged that numerous YouTube channels were ‘directed to children,’ in
part because they self-identified as being for children in the ‘About’ section of the channel
webpages, and that, as such, YouTube did not put in place the protections COPPA requires
on such sites. In addition to the historic fine, YouTube also agreed to take several remedial
and risk mitigation steps to protect children’s privacy on the site. Moreover, in June 2020,
56 id.
57 id.
58 id.
59 id.
60 Stipulated Order for Permanent Injunction and Civil Penalty Judgment, Federal Trade Commission, et al., v.
Google LLC, et al., No. 1:19-cv-02642 (D.D.C. 2020).
61 Press Release, FTC, Video Social Networking App Musical.ly Agrees to Settle FTC Allegations That it
Violated Children’s Privacy Law, (Feb. 27, 2019), https://www.ftc.gov/news-events/press-releases/2019/02/
video-social-networking-app-musically-agrees-settle-ftc; Proposed Stipulated Order for Civil Penalties,
Permanent Injunction, and Other Relief, United States of America v. Musical.ly, et al., No. 2:19-cv-01439
(U.S. Dist. Ct. C.D. of Cal. 2019).
470
© 2020 Law Business Research Ltd
United States
the FTC demonstrated its continued focus on children’s privacy by fining an app developer,
HyperBeard, under COPPA for allowing third-party advertisers to collect information from
children using its app.62
The FTC was also not the only federal regulatory agency that had an active year. The
SEC has been exercising increasingly aggressive oversight regarding cybersecurity compliance
in recent years and the past year was no exception. Building on the SEC’s 2018 issuance of
new interpretive guidance to assist publicly traded companies in disclosing their material
cybersecurity risks and incidents to investors,63 the SEC’s Office of Compliance Inspections
and Examinations (OCIE) issued guidance in 2019 identifying the multiple steps it is taking
to heighten its enforcement presence for cybersecurity matters.64 In April and May 2019, the
OCIE further issued two risk alerts providing regulated entities with details on its privacy
and cybersecurity focus areas during examinations.65 More recently, the SEC’s OCIE and
Financial Industry Regulatory Authority (FINRA) issued 2020 examination priorities for
broker-dealers and investment advisers, which, among other priorities, included cyber and
information security risks, issues concerning digital assets, and the provision of electronic
investment advice.66 Finally, earlier this year, the OCIE released a report on ‘Cybersecurity
and Resiliency Observations’, providing an overview of best practices based on prior exams
to help organisations when considering ‘how to enhance cybersecurity preparedness and
operational resiliency’.67
The SEC has also backed this guidance up with action on the enforcement front.
For example, on 24 July 2019, the SEC joined the FTC in announcing a settlement with
Facebook – in the SEC’s case with Facebook agreeing to pay US$100 million to settle charges
for ‘making misleading disclosures regarding the risk of misuse’ of ‘user data’.68
62 Proposed Stipulated Order for Permanent Injunction and Civil Penalty Judgment, United States of America
v. Hyperbeard, Inc., et al.., No. 3:20-cv-3683 (U.S. Dist. Ct. N.D. of Cal. 2020).
63 The SEC suggested that all public companies adopt cyber disclosure controls and procedures that
enable companies to: identify cybersecurity risks and incidents; assess and analyse their impact on a
company’s business; evaluate the significance associated with such risks and incidents; provide for open
communications between technical experts and disclosure advisers; make timely disclosures regarding
such risks and incidents; and, adopt internal policies to prevent insider trading while the company is
investigating a suspected data breach.
64 SEC, Office of Compliance Inspections and Examinations: 2019 Examination Priorities (2019), https://
www.sec.gov/files/OCIE%202019%20Priorities.pdf. The OCIE’s 2019 Exam Priorities emphasise proper
configuration of network storage devices, information security governance, and policies and procedures
related to retail trading information security.
65 SEC, Investment Adviser and Broker-Dealer Compliance Issues Related to Regulation S-P – Privacy Notices
and Safeguard Policies (Apr. 16, 2019), https://www.sec.gov/files/OCIE%20Risk%20Alert%20-%20
Regulation%20S-P.pdf; SEC, Safeguarding Customer Records and Information in Network Storage – Use of
Third Party Security Features (May 23, 2019), https://www.sec.gov/files/OCIE%20Risk%20Alert%20-%20
Network%20Storage.pdf.
66 See OCIE, 2020 Examination Priorities, https://www.sec.gov/about/offices/ocie/national-examinatio
n-program-priorities-2020.pdf; FINRA, 2020 Risk Monitoring and Examination Priorities Letter, https://
www.finra.org/sites/default/files/2020-01/2020-risk-monitoring-and-examination-priorities-letter.pdf.
67 SEC, Office of Compliance Inspections and Examinations: Cybersecurity and Resiliency Observations, https://
www.sec.gov/files/OCIE%20Cybersecurity%20and%20Resiliency%20Observations.pdf.
68 Press Release, SEC, Facebook to Pay $100 Million for Misleading Investors About the Risks it Faced from
Misuse of User Data, (Jul. 24, 2019), https://www.sec.gov/news/press-release/2019-140.
471
© 2020 Law Business Research Ltd
United States
Another financial regulator that has recently adopted a more aggressive enforcement
posture with respect to cybersecurity matters is the Commodity Future Trading Commission
(CFTC). On 12 September 2019, the CFTC issued an order filing and settling charges with
Phillip Capital Inc, fining it US$1.5 million and finding that it had failed to supervise its
employees with respect to its cybersecurity policies and procedures and had not provided
timely notice to its customer about a cyber incident.69
The FTC’s, SEC’s, and CFTC’s enforcement emphasis in this area exemplifies a
broader executive branch focus on privacy and data protection issues. Indeed, numerous
other federal agencies are actively engaged – often through their contacting requirements –
such that businesses operating in the United States should consider casting a wide net when
determining whether they are subject to privacy or cybersecurity regulation. For example,
on 31 January 2020, the Department of Defense (DOD) released its latest version of the
Cybersecurity Maturity Model Certification (CMMC) for defense contractors. Under the
CMMC plan, DOD contractors will be required to obtain a cybersecurity rating from Level
1 through Level 5, and self-certification will not be permitted.70 Similarly, on 5 March 2020,
the Office of the Comptroller of the Currency (OCC) issued updated guidance regarding risk
management in national bank relationships with third parties, elaborating on a wide range of
topics, including the scope of third-party risk management obligations and oversight of cloud
computing providers and data aggregators.71
Finally, in addition to promulgating policies regarding privacy or data security, federal
regulators are also increasingly interested in studying and regulating digital innovation and
artificial intelligence. The examples of this trend are numerous, with some of the highlights
being the following:
a In August 2019, NIST released a draft guide with security feature recommendations
for internet of things (IoT) devices.72
b In May 2020, the National Telecommunications and Information Administration
(NTIA) published a notice seeking comments regarding the development of an
implementation plan for the national strategy to secure 5G, a component of the ‘Secure
5G and Beyond Act of 2020’ that was signed into law on 23 March 2020.73
c In June 2020, FINRA issued its 2020 Artificial Intelligence Report for industry
comment.74 The report is a culmination of FINRA’s Office of Financial Innovation
review of emerging challenges and legal considerations confronted by the securities
industry as broker-dealers introduce AI-based applications into their businesses.
69 Press Release, CFTC, CFTC Orders Registrant to Pay $1.5 Million for Violations Related to Cyber Breach
(Sept. 12, 2019), https://www.cftc.gov/PressRoom/PressReleases/8008-19.
70 Office of the Undersecretary of Defense, Cybersecurity Maturity Model Certification (CMMC) (Jan. 31,
2020), https://www.acq.osd.mil/cmmc/docs/CMMC_v1.0_Public_Briefing_20200131_v2.pdf.
71 Office of the Comptroller of the Currency (OCC), Third-Party Relationships: Frequently Asked Questions to
Supplement OCC Bulletin 2013-29 (March 5, 2020), available at https://www.occ.treas.gov/news-issuances/
bulletins/2020/bulletin-2020-10.html.
72 NIST, NIST Releases Draft Security Feature Recommendations for loT Devices (Aug. 1, 2019), nist.gov/
news-events/news/2019/08/nist-releases-draft-security-feature-recommendations-iot-devices.
73 Meeting Notice, 85 Fed. Reg. 103 (May 28, 2020), https://www.ntia.doc.gov/files/ntia/publications/
fr-secure-5g-implementation-plan-05282020.pdf.
74 Financial Industry Regulatory Authority (FINRA), Artificial Intelligence (AI) in the Securities Industry (June
2020), https://www.finra.org/sites/default/files/2020-06/ai-report-061020.pdf.
472
© 2020 Law Business Research Ltd
United States
d The same month, the OCC sought comment – by issuing an Advance Notice of
Proposed Rulemaking (ANPR) – on how best to accommodate new technology and
digital innovation in the business of banking.75
Legislative branch
The popular focus on privacy and cybersecurity matters has prompted Congress to join
the party. Multiple congressional committees – from the House and the Senate, chaired
by Republicans and Democrats – have held high profile hearings on the possibility of
enacting comprehensive federal privacy legislation, and both industry and civil society are
urging Congress to act. There is also widespread support in Congress for action, especially
(as discussed above) in light of the privacy implications of the covid-19 pandemic, such that
federal privacy legislation is probably more likely now than it has been at any time in the past
generation.
Despite the consensus that something needs to be done, however, the support at the
time of writing appears to cleave between those who want to enact legislation that pre-empts
state law such that US businesses are not subject to a patchwork quilt of privacy regulation
and those who (mirroring civil society) want to allow states to provide additional privacy
rights above a federal floor. The enactment of federal privacy legislation rests on the resolution
of this debate, as well as agreement on the particulars of the regulatory scheme. It is possible
that after the 2020 US presidential election, legislators may be in a better position to resolve
these issues.
In addition to comprehensive privacy legislation, in the past year, Congress has also
focused on several more targeted issues, such as facial recognition.76 Indeed, the currency of
this issue increased in the wake of civil unrest and protests regarding police reform, with some
cities having banned the use of the technology and several companies calling on Congress to
issue rules on the use of the technology and halting sales of facial recognition technology to US
police.77 Other recent issues that have attracted congressional attention – and led to proposed
legislation – are encryption78 and potential reforms to Section 230 of the Communications
Decency Act, which shields tech companies that provide online platforms from civil liability
stemming from third-party content.79
75 OCC, National Bank and Federal Savings Association Digital Activities (2019), https://www.occ.gov/
news-issuances/news-releases/2020/nr-occ-2020-76a.pdf.
76 Facial Recognition Technology (Part I): Its Impact on our Civil Rights and Liberties, House Committee on
Oversight and Reform (May 22, 2019), https://oversight.house.gov/legislation/hearings/facial-recognition-
technology-part-1-its-impact-on-our-civil-rights-and; Facial Recognition Technology (Part II): Ensuring
Transparency in Government Use, House Committee on Oversight and Reform (June 4, 2019),
https://oversight.house.gov/legislation/hearings/facial-recognition-technology-part-ii-ensuring-tra
nsparency-in-government-use; Facial Recognition Technology (Part III): Ensuring Commercial Transparency
& Accuracy, House Committee on Oversight and Reform (Jan. 15, 2020), https://oversight.house.gov/
legislation/hearings/facial-recognition-technology-part-iii-ensuring-commercial-transparency.
77 Tom Simonite, A Bill in Congress Would Limit Uses of Facial Recognition, Wired.com (June 12, 2020),
https://www.wired.com/story/bill-congress-limit-uses-facial-recognition/.
78 S. 4051, 116th Cong. (2020).
79 PACT Act, S. 4066, 116th Cong. (2020). A competing proposal is Senator Hawley’s Ending Support for
Internet Censorship Act, which has been praised by President Trump. See Ending Support for Internet
Censorship Act, S. 1914, 116th Cong. (2019).
473
© 2020 Law Business Research Ltd
United States
474
© 2020 Law Business Research Ltd
United States
third party prior to the data breach, the post-breach agreement included the same scope of
work as the prior statement of work, and the forensic report was widely distributed to different
regulators and Capital One’s accountant, suggesting that it was not specifically created in
anticipation of litigation. This opinion underscores the importance for organisations to
consider, in advance, how to engage with incident response service providers in order to
protect privilege in the event of a data breach litigation.
86 The California Consumer Privacy Act, A.B. 375, 2017 Gen Assemb., Reg. Sess. (Cal. 2018).
87 id. § 1798.140 (g).
88 id. § 1798.105 (a), 120 (a).
89 id. § 1798.120 (d).
90 id. § 1798.125 (a).
475
© 2020 Law Business Research Ltd
United States
f The CCPA provides a private cause of action for certain data breaches that result
from a business’s violation of the duty to implement and maintain reasonable security
procedures and practices.91
g The CCPA authorises the California Attorney General to enforce its provisions with
statutory fines of up to US$7,500 per violation.92
Seeking to temper the CCPA’s broad demands, the California legislature has created a number
of exemptions from all or a substantial part of the law – most notably, employee information
and B2B information. These exemptions are slated to expire, however, at the end of 2020.
As noted above, the California Attorney General, exercising authority explicitly granted
to him by the Act, has proposed regulations providing further guidance on a number of the
Act’s obligations. In particular, among other things, the draft regulations provide guidance on
required content for privacy policies, requirements for responding to data subject requests,
and appropriate verification standards for requests.
Even though the proposed regulations only recently were finalised, the office of the
California Attorney General began actively enforcing the CCPA on 1 July 2020, sending
violation notice letters to a ‘swath’ of online businesses.93 The Attorney General took this
action notwithstanding the request of several industry groups and entities for enforcement to
be delayed until January 2021 in light of the covid-19 crisis, and, as at the time of writing,
it remains to be seen how the Attorney General will follow up on its initial letters, including
how it will expect businesses to take advantage of the 30-day ‘cure’ period provided by the
Act.
Moreover, the massive changes to California privacy law we have seen over the past
couple of years may not be complete. Alastair Mactaggart, the consumer rights advocate who
was the driving force behind the CCPA, has recently secured enough signatures to place the
California Privacy Rights Act (CPRA), a proposed law that would significantly amend the
CCPA (and sometimes referred to as ‘CCPA 2.0’) as an initiative on California’s November
2020 ballot. If passed, the CPRA will modify the CCPA by, among other things, adding
the right to correct inaccurate information and limit first-party use of sensitive personal
information, clarifying the right to opt out of the sale or sharing of data for purposes of
online behavioural advertising, and extending the employee data and business-to-business
data exemptions through 2022.
476
© 2020 Law Business Research Ltd
United States
a Nevada became the first state to follow the CCPA trend when, on 29 May 2019,
it enacted a law that grants consumers the right to ‘opt out’ of the sale of personal
information. While Nevada’s law is not as comprehensive as the CCPA, it entered into
force earlier on 1 October 2019.94
b Maine was the second state to follow California’s footsteps, with the Governor
signing into law the ‘Act to Protect the Privacy of Online Consumer Information’
on 6 June 2019, which officially went into effect on 1 July 2020 (although Maine’s
Attorney General agreed to delay enforcement until 1 August 2020 due to covid-19).95
Again, this law is not as comprehensive as the CCPA, but it does obligate internet
service providers in Maine to obtain permission from their customers before selling or
sharing their data with a third party.
c On 25 July 2019, New York enacted the Stop Hacks and Improve Electronic Data
Security Act (SHIELD Act),96 updating New York’s breach reporting law by, among
other things, requiring entities that handle private information to implement a data
security programme with ‘reasonable’ administrative, technical and physical safeguards.
The Act’s reasonable security requirement went into effect on 21 March 2020. While
this law is again narrower than the CCPA, it is notable for detailing what constitutes
‘reasonable security’, laying out with some specificity examples of ‘reasonable’
safeguards. The SHIELD Act also makes clear that entities in compliance with data
security frameworks under certain federal or state laws (such as GLBA and HIPAA)
are in compliance with the SHIELD Act. In this regard, the Act mirrors a 2018 Ohio
law, which did not establish minimum cybersecurity standards but which did provide
companies with a safe harbour for tort liability in data breach actions when they put in
place ‘administrative, technical, and physical safeguards for the protection of personal
information and that reasonably confor[m] to an industry recognised cybersecurity
framework’.
d Finally, as happens most years, a number of states have also passed amendments to
their data breach notification laws or had such amendments enter into force, offering
another reminder of the fact that businesses must continually try to stay on top of the
various state law requirements in this area.97
Besides taking the lead on enacting broad, cross-sectoral privacy and data security legislation
and updating their data breach notification laws, states are also taking the lead in putting in
place other, more focused regulatory regimes. We have discussed some examples of this, such
as the New York Department of Financial Services’ Cybersecurity Regulation, above, but there
are many others. For instance, South Carolina passed a law putting in place prescriptive data
security requirements for insurers that went into effect on 1 January 2019,98 and other states
have followed suit, enacting requirements that generally track the Insurance Data Security
Model Law adopted by the National Association of Insurance Commissioners (NAIC).
477
© 2020 Law Business Research Ltd
United States
States are also taking the lead in regulating emerging technologies, with a prime
example of this being facial recognition technologies. On 31 March 2020, the Governor
of Washington state signed into law S.B. 6280, a bill aimed at regulating state and local
government agencies’ use of facial recognition services.99 The law contains safeguards that
ensure testing, transparency, and accountability for the uses of facial recognition technology
and includes various measures to uphold fundamental civil liberties. Several other states,
including Arizona, Illinois, Massachusetts, New Hampshire, and Vermont, are also considering
such legislation to curtail the use of facial recognition by government entities. Additionally,
Texas, Washington, and Illinois have already enacted statutes governing biometric data
directly, many other states indirectly regulate biometric data by including it in their statutory
definitions of personal information, and several other states, including Connecticut, New
Hampshire and Alaska, have considered or proposed legislation seeking to regulate biometric
data. These laws – which generally require notice and opt-out, limitations on the commercial
use of acquired biometric data, destruction of the data after a certain amount of time, and
employment of industry standards of care to protect the data – will likely continue to be an
area of focus going forward.
State courts
Just as the federal courts have decided a number of recent important privacy and data security
cases, so too have state courts. While a complete canvas of all of these decisions is beyond
the scope of this chapter, highlighting a couple of examples serves to demonstrate the general
point.
First, the Illinois Biometric Information Privacy Act (BIPA) provides a private right of
action for aggrieved individuals, and, much like the Ninth Circuit, the Illinois Supreme Court
has held that bare procedural violations of the statute are sufficient to establish standing.100 A
wide range of technology companies, including Facebook, Shutterfly, Snapchat and Google,
are finding themselves defending their implementation of facial recognition technology
against BIPA claims in Illinois courts.
Second, on 31 May 2019, a trial court in the District of Columbia held that the
District of Columbia’s attorney general could challenge Facebook’s privacy practices. In
doing so, the court rejected Facebook’s arguments that the court lacked jurisdiction over the
California-based company and that the attorney general had failed to adequately plead his
claims that the company ran afoul of the district’s Consumer Protection Procedures Act.101
These cases, in short, demonstrate the risks companies face as courts also respond to the
shifting privacy zeitgeist.
478
© 2020 Law Business Research Ltd
United States
This is a trend that has been building over time. In recent years, it has become best
practice to appoint a chief privacy officer and an IT security officer, to put in place an
incident response plan and vendor controls (which may be required by some state laws and
in some sectors by federal law), and to provide regular employee training regarding data
security. However, as technology advances and companies increasingly view information as
a significant strategic opportunity and risk, companies are increasingly sensing that these
structures, policies, and procedures are insufficient.
Indeed, while not so long ago companies were comfortable with IT and legal departments
running the show with respect to privacy issues, they are now increasingly elevating the level
of attention these issues receive and involving senior management and the board in oversight
and decision making. The examples of this are legion, and here are just a few:
a Microsoft has created a technology and corporate responsibility team that reports to
the president and provides guidance to the board and management on ethical business
practices, privacy and cybersecurity.102
b Microsoft and other companies have put in place internal boards to help oversee
and navigate the challenging moral, ethical, and practical issues raised by artificial
intelligence.103
c Numerous companies, including Walmart, BNY Mellon, and AIG, have put in place
technology committees of their board, with responsibility to, among other things,
review IT planning, strategy, and investment; monitor and provide guidance on
technological trends; and review cybersecurity planning and investment.104
In short, companies have recognised the changing zeitgeist, and they are increasingly taking
steps to create an effective organisational structure and practices to manage, guide, and
oversee privacy, data protection, and disruptive technologies.
102 We see the big picture, Microsoft Corp. (August 23, 2019), https://www.microsoft.com/en-us/
corporate-responsibility/governance.
103 AI news and events, Microsoft Corp. (August 23, 2019), https://www.microsoft.com/en-us/ai?activetab=pi
vot1%3aprimaryr5; SAP Becomes First European Tech Company to Create Ethics Advisory Panel for Artificial
Intelligence, SAP News (Sept. 18, 2018), https://news.sap.com/2018/09/sap-first-european-tech-
company-ai-ethics-advisory-panel/.
104 Walmart Inc., Technology and Ecommerce Committee Charter (adopted Jun. 2, 2011), https://
s2.q4cdn.com/056532643/files/doc_downloads/Gov_Docs/TeCC-Charter[1].pdf; BNY Mellon,
Technology Committee: Charter of the Technology Committee of the Board of Directors, The Bank of New
York Mellon Corporation (approved Apr. 9, 2019), https://www.bnymellon.com/us/en/who-we-are/
corporate-governance/technology-committee.jsp, American International Group, Inc., Technology
Committee Charter (effective May 9, 2018), https://www.aig.com/content/dam/aig/america-canada/us/
documents/corp-governance/technology-committee-charter-05.09.18.pdf.
479
© 2020 Law Business Research Ltd
United States
particular, the United States was approved in 2012 as the first formal participant in the
Asia-Pacific Economic Cooperation (APEC) Cross-Border Privacy Rules system, and the
FTC’s Office of International Affairs further works with consumer protection agencies
globally to promote cooperation, combat cross-border fraud and develop best practices.105
Significantly, however, as this chapter was being drafted, on 16 July 2020, the
Court of Justice for the European Union (CJEU) decided Data Protection Commissioner v.
Facebook Ireland, Max Schrems (Schrems II), which held that the EU–US Privacy Shield –
a transfer mechanism used by over 5,000 organisations as a mechanism enabling transfers
of personal data from the EU to the US – was invalid because the privacy protections
afforded to individuals under the Privacy Shield programme were not ‘essentially equivalent’
to privacy rights afforded to such individuals under EU law.106 The court also potentially
required additional protections to be implemented for another key transfer mechanism,
called Standard Contractual Clauses (SCCs), requiring organisations to further evaluate and
implement supplementary measures to provide additional privacy protections that afford an
individual privacy protections that are ‘essentially equivalent’ to those under EU law.
At the time of writing, the long-term implications of Schrems II are unclear. Regulators
on both sides of the Atlantic have preached calm, and guidance from European Data
Protection Board is expected soon. The US government and the EU Commission have also
committed to work cooperatively together to address the consequences of the Schrems II
decision and announced their intention to develop a successor programme to the Privacy
Shield. Nonetheless, while the Privacy Shield and SCCs are not the only approved legal
transfer mechanisms under the GDPR, they are the most widely-used, and as result, a key
facilitator of international trade and cross-border data flows. In light of the CJEU’s ruling,
at the very least, organisations relying on their Privacy Shield certification will be required to
implement an appropriate alternate legal transfer mechanism (for example, enhanced SCCs,
Binding Corporate Rules, or rely on informed consent or other exemptions under the GDPR)
and organisations relying on SCCs will have to assess whether their use of such clauses is
consistent with Schrems II and whether they need to put in place additional protections. In
the meantime, the Commerce Department has stated that US companies with the Privacy
Shield certification must continue to comply with the requirements even though they have
been invalidated by the EU.107 As such, the FTC can continue to enforce against certified
companies that do not live up to their commitments.
Another cross-border issue that has experienced recent activity is law enforcement
access to extraterritorial data. Historically, the mutual legal assistance treaty (MLAT) system
has governed cross-border transfers of data for law enforcement purposes. In recent years,
however, the rise of cloud computing has led to more and more data being stored somewhere
other than the jurisdiction in which it was created, placing strain on the system as the
480
© 2020 Law Business Research Ltd
United States
antiquated MLAT process was insufficiently nimble to keep up with the increased demand.
Other countries therefore became increasingly concerned about their inability to obtain
timely evidence, as US technology companies frequently held the relevant information but
were barred by US law from turning it over to foreign governments without going through
the MLAT process.
These issues came to a head in 2018 when the Supreme Court heard a case concerning
whether a search warrant served in the United States could authorise the extraterritorial
transfer of customer communications notwithstanding the laws of Ireland. US companies
were thus faced with being placed in the middle of a second conflict of law – not only would
they be forbidden from turning over information to foreign governments without a formal
MLAT request, but they would also have to turn over information to the US government
even absent an MLAT request.
Given the prospect of US industry facing this twin dilemma, as well as the desire of
foreign governments to address the concerns caused by the current operation of the MLAT
process, Congress enacted the Clarifying Lawful Overseas Use of Data Act (the CLOUD
Act).108 The CLOUD Act was designed to serve two purposes. First, it clarified that a US
search warrant could compel companies to disclose certain communications and records
stored overseas, thereby mooting the case before the Supreme Court. Second, the CLOUD
Act addressed the converse issue – foreign government access to information held in the
United States – by authorising the executive branch to enter into international agreements
that would allow for certain foreign nations to obtain content directly from US companies
without going through the MLAT process.
At the time of writing, the United States has entered into only one CLOUD Act
agreement that would facilitate foreign government access to communication held within
the United States. On 3 October 2019, the United States and United Kingdom signed the
CLOUD Act agreement, which entered into force on 8 July 2020. The Agreement obligates
each government to ensure their domestic laws permit US and UK national security and
law enforcement agencies to directly obtain certain electronic information from ‘Covered
Providers’ in the jurisdiction of the other government.109
Beyond this one agreement, the CLOUD Act’s clarification of the extraterritorial reach
of US law enforcement process has caused consternation, as companies that store data outside
the United States have been pressed by non-US customers and counterparts to explain
whether the CLOUD Act creates new risk that their data may now be within reach of the
US government. The US Department of Justice has thus recently taken steps to explain that,
in its view, the CLOUD Act broke no new ground and only clarified, rather than expanded,
the reach of US law enforcement; and that, in any event, the requirements in the United
States for obtaining a warrant for the content of electronic communications are perhaps the
toughest in the world and are highly protective of individual privacy.110
108 Clarifying Lawful Overseas Use of Data Act, 18 U.S.C. §§ 2523, 2713 (2018).
109 See Agreement between the Government of the United States of America and the Government of the United
Kingdom of Great Britain and Northern Ireland on Access to Electronic Data for the Purpose of Countering
Serious Crime (Oct. 2019), available at, https://assets.publishing.service.gov.uk/government/uploads/system/
uploads/attachment_data/file/836969/CS_USA_6.2019_Agreement_between_the_United_Kingdom_and_
the_USA_on_Access_to_Electronic_Data_for_the_Purpose_of_Countering_Serious_Crime.pdf.
110 Press Release, U.S. Dep’t of Justice, Promoting Public Safety, Privacy, and the Rule of Law Around
the World: The Purpose and Impact of the CLOUD Act (April 2019), https://www.justice.gov/opa/
press-release/file/1153446/download.
481
© 2020 Law Business Research Ltd
United States
Thus, it is safe to say that it is still too soon to tell what the impact of the CLOUD Act
will be. That said, the CLOUD Act is clearly yet another example of how US lawmakers and
regulators are trying to redesign the regulatory structures governing the data economy.
111 The United States does not have any jurisdictional issues for multinational organisations related to cloud
computing, human resources and internal investigations. However, foreign organisations subject to US
law should carefully consider how their data network is structured, and ensure they can efficiently respond
to international data transfer needs, including for legal process. Companies should also consider possible
international data transfer conflicts when crafting their global privacy and data protection compliance
programmes. Consideration should be given to whether US operations require access to non-US data, such
that non-US data could be considered within the company’s lawful control in the United States and thereby
subject to production requests irrespective of foreign blocking statutes. The United States respects comity,
but a foreign country’s blocking statute does not trump a US legal requirement to produce information.
482
© 2020 Law Business Research Ltd
Appendix 1
TOMMY ANGERMAIR
Clemens
Tommy Angermair is a partner in the Danish law firm Clemens and the head of the
law firm’s employment, data protection and corporate immigration law practice group.
Tommy is one of the most experienced Danish experts on data protection law (including
483
© 2020 Law Business Research Ltd
About the Authors
GDPR) compliance having provided advice on this topic since 2004. Tommy and the rest
of Clemens’ very experienced data protection team is currently heavily involved in several
GDPR compliance projects for mainly medium-sized and large companies, including several
large multinationals. Furthermore, Tommy is specialised in corporate immigration law (WPs,
business visas for inbound personnel, advising high net worth individuals etc.), which means
that he has a profound understanding of the data protection consideration in relation to
running an immigration law practice. Tommy Angermair annually speaks at international
legal conferences across the globe. Among other things, he is a frequent speaker at the AILA
GMS annual conference in the US and the biennial IBA Global Immigration & Nationality
Law conference on topics related to immigration, data protection and mobility. He has
contributed to several primarily international publications within his area of expertise,
including the chapter on Denmark in the recent editions of the Global Business Immigration
Handbook and The Employment Law Review.
RAHMA ATIKA
K&K Advocates
Rahma Atika, SH, is an associate at K&K Advocates. Rahma graduated from the Faculty of
Law, Universitas Indonesia. Prior to joining K&K Advocates, she participated in numerous
Model United Nations competitions, at both national and international level. Rahma also
represented the delegation of Republic of Indonesia in the World Festival of Youth and
Students 2017 held in Moscow and Sochi, Russia.
Rahma has advised numerous multinational companies on general corporate, privacy,
and IP-related matters. She has assisted many clients on privacy and TMT matters, including
a leading ride-hailing company in Southeast Asia, internet giants from the United States and
a South Korean multinational electronics conglomerate. She has also assisted clients in many
commercial dispute cases.
Rahma is in the process of obtaining her associate membership to the Chartered
Institute of Arbitrators.
484
© 2020 Law Business Research Ltd
About the Authors
NIENKE BERNARD
Greenberg Traurig LLP
Nienke Bernard has advised a wide variety of clients on data and technology related
transactions and issues, including data protection compliance, licensing and outsourcing.
She also has a strong background in financial regulatory law, particularly within the context
of services agreements and fintech.
FRANCESCA BLYTHE
Sidley Austin LLP
Francesca Blythe is a senior associate in the London office at Sidley Austin LLP, whose
main practice areas are data protection, privacy, cybersecurity, e-commerce and information
technology.
SØREN BONDE
Clemens
Søren is third-year associate in the Danish law firm Clemens, and part of one of the
leading and most experienced data protection law practice groups in Denmark. Søren has a
background as a legal manager in a multinational IT company headquartered in Denmark.
With his background as a master of business law (MSc Law) as well as a master of law (LLM),
Søren is particularly skilled at the analysis of complex legal issues with a view to obtaining
the best possible commercial result. Søren has extensive experience with assisting clients in
their purchase and development of IT applications and new technologies in an efficient and
pragmatic manner, especially in connection with assessment of legal consequences when
developing or utilising new products and technologies in relation to protection of personal and
corporate data. Moreover, Søren advises all client types on data protection issues, including in
485
© 2020 Law Business Research Ltd
About the Authors
SHAUN BROWN
nNovation LLP
Shaun Brown is a partner with nNovation LLP, an Ottawa-based law firm that specialises in
regulatory matters. With several years of experience both in the public and private sectors,
Shaun’s practice focuses on e-commerce, e-marketing, privacy, access to information and
information security. Shaun assists clients by developing practical and effective risk-mitigation
strategies, and by representing clients before tribunals and in litigation-related matters.
Shaun has a deep understanding of the online marketing industry from both a technical
and legal perspective. He speaks and writes regularly on privacy, marketing and information
management issues, is a co-author of The Law of Privacy in Canada, and teaches the same
subject in the faculty of law at the University of Ottawa.
ELLYCE R COOPER
Sidley Austin LLP
Ellyce Cooper is a partner in the firm’s Century City office and a member of the complex
commercial litigation and privacy and cybersecurity practices. Ellyce has extensive experience
in handling government enforcement matters and internal investigations as well as complex
civil litigation. She assists companies facing significant investigations and assesses issues to
determine a strategy going forward. Ellyce’s diverse experience includes representing clients
in internal investigations and government investigations along with responding to and
coordinating crisis situations. Her client list includes notable companies from the healthcare,
pharmaceutical, accounting, financial, defense and automotive industries. Ellyce earned her
JD from the University of California, Los Angeles School of Law and her BA, magna cum
laude, from the University of California Berkeley.
486
© 2020 Law Business Research Ltd
About the Authors
EMILY CRAVIGAN
Allens
Emily has extensive experience working on major projects for both government and
commercial clients in the technology, media and telecommunication sectors. She specialises
in technology procurement, the IT and intellectual property aspects of large corporate
transactions and data management and protection.
SANUJ DAS
Subramaniam & Associates
Sanuj specialises in litigation, both IP and non-IP, and is also a member of the Subramaniam
& Associates patent prosecution department. He also handles patent revocation proceedings
before the appellate board, along with patent, trademark and design opposition proceedings.
He has worked with a diverse array of clients, including professionals and scientists from the
telecommunication, pharmaceutical, FMCG and apparel sectors. In addition to a bachelor’s
degree in law, Sanuj holds bachelor’s and master’s degrees in pharmacy, with a specialisation
in pharmaceuticals, and is also a registered patent agent.
487
© 2020 Law Business Research Ltd
About the Authors
Isabella participates in projects to assist clients with compliance with the Brazilian
General Data Protection Act and the preparation of legal opinions, contracts, and memos in
the areas of digital law, privacy and data protection. She is a co-author of articles in the areas
of telecoms, cybersecurity, privacy and data protection.
STEVEN DE SCHRIJVER
Astrea
Steven De Schrijver is a partner in the Brussels office of Astrea. He has more than 27 years
of experience advising some of the largest Belgian and foreign technology companies, as well
as innovative entrepreneurs on complex commercial agreements and projects dealing with
new technologies. His expertise includes e-commerce, software licensing, cloud computing
(SaaS, PaaS, IaaS), hosted services platform development and services, privacy law (including
GDPR implementation), IT security, technology transfers, IT and BPO outsourcing, digital
transformation, Industry 4.0, IoT, augmented and virtual reality, artificial intelligence, drones
and robotics.
Steven has also been involved in several national and cross-border transactions in the
IT, media and telecoms sectors. He participated in the establishment of the first mobile
telephone network in Belgium, the establishment of one of the first e-commerce platforms
in Belgium, the acquisition of the Flemish broadband cable operator and network, and the
acquisition and sale of several Belgian software and technology companies. He has also been
involved in numerous outsourcing projects and data protection (now GDPR) compliance
projects.
Steven is the Belgian member of EuroITCounsel, a quality circle of independent
IT lawyers. In 2012, 2014, 2017, 2018 and 2019 he was given the ‘global information
technology lawyer of the year’ award by Who’s Who Legal and, in 2012, he received the ILO
Client Choice Award in the corporate law category for Belgium.
Steven has been admitted to the Brussels Bar. He holds a law degree from the University
of Antwerp (1992) and an LLM degree from the University of Virginia School of Law (1993).
He obtained his CIPP/E certification in 2018.
JULIUS FELDMANN
Winheller Attorneys At Law & Tax Advisors
Julius Feldmann is scientific researcher at the IP/IT department at Winheller Attorneys at
Law & Tax Advisors and specialises in data protection law and IT related legal matters.
488
© 2020 Law Business Research Ltd
About the Authors
for mainly medium-sized and large companies and multinationals. In addition, Camilla is
network leader in a data protection network facilitated by one of the leading legal network
and course providers in Denmark, and regularly gives presentations on personal data
challenges and issues. Finally, Camilla has extensive litigation experience and is qualified to
appear before the Danish high courts.
ADRIÁN FURMAN
Bomchil
Adrián Furman is a partner in the mergers and acquisitions and entertainment law departments
and in charge of Bomchil’s intellectual property area. He joined the firm in 2000.
He graduated as a lawyer from the University of Buenos Aires in 1998. He obtained a
postgraduate degree in corporate business law at the same institution.
He has worked on numerous cross-border transactions and regularly advises corporate
clients on various issues of a contractual nature. He also has wide experience of issues of
commercial fair trade and consumer protection. During 2005, he was international associate
at the New York offices of Simpson Thacher & Bartlett.
He is a frequent speaker at chambers of commerce on his areas of expertise and at the
Section of International Law of the American Bar Association seasonal meetings. He has been
and is a director and auditor of important companies such as PepsiCo, AMC Networks, Telefe
and Mindray, among others. He was co-chair of the International Commercial Transactions,
Distribution and Franchise Committee of the Section of International Law of the American
Bar Association.
His professional performance has been recognised by various specialised publications,
including Chambers Latin America, Legal 500 and Best Lawyers, and by the Latin American
Corporate Counsel Association and Client Choice Awards.
489
© 2020 Law Business Research Ltd
About the Authors
University of São Paulo, Brazil 2006; a specialised degree in contracts, at the Getúlio Vargas
Foundation, 2010; and an LLM in intellectual property, provided by the University of Turin
and the World Intellectual Property Organization, 2013, among others.
Juliana coordinates projects concerning the structure of technology companies in Brazil
and assists clients with the preparation of legal opinions, contracts, and memos in the areas
of digital law, privacy and data protection. She is co-author of articles in the areas of digital
law, privacy and data protection.
TAMÁS GÖDÖLLE
Bogsch & Partners Law Firm
Tamás Gödölle graduated from the law faculty of Eötvös Loránd University in Budapest.
He studied commercial and international private law for one year at the Ludwig Maximilian
University of Munich in Germany and continued with postgraduate legal studies at Queen
Mary and Westfield College, University of London (1990–1991). As a corporate, commercial
and intellectual property lawyer, he has been practising in Hungary, advising and representing
national and multinational clients, for over 25 years. Dr Gödölle has been a partner at
Bogsch & Partners since 1996, where he specialises in trademark, copyright, antitrust, unfair
competition and advertising matters, as well as franchise, distributor and licence contracts.
He also has extensive experience in information technology, privacy, data protection and life
science and media law issues. He is a member of the Budapest Bar, the Hungarian Association
for the Protection of Industrial Property and Copyright (MIE), both the Hungarian and the
International League of Competition Law (LIDC), ECTA, INTA, AIPPI, ITechLaw and
GRUR. As well as speaking Hungarian, he is fluent in English and German.
RISTO HÜBNER
Advokaadibüroo Nordx Legal
Risto Hübner is the founder, managing partner and attorney-at-law at law firm Nordx Legal
and the founder of a privacy technology company Privatron. Risto is an experienced specialist
in IT law, IP law and data privacy. Prior to founding Nordx Legal and Privatron, Risto worked
as the general counsel of Nortal, a multinational strategic change and technology company
that has planned and implemented about one-third of Estonia’s e-governance information
systems. Risto has significant experience in assisting companies with compliance with the
General Data Protection Regulation, especially in the context of using new technologies.
Risto is also a visiting lecturer in IT Law at the University of Tartu, a mentor to startups
at Startup Wise Guys accelerator and the founder and organiser of the Estonian chapter of
Legal Hackers, a global movement of lawyers, policymakers, designers, technologists and
academics who explore and develop creative solutions to some of the most pressing issues at
the intersection of law and technology. Risto is a member of the Estonian Bar Association.
TOMOKI ISHIARA
Sidley Austin Foreign Law Joint Enterprise
Mr Ishiara’s practice areas include intellectual property law, antitrust law, data security and
privacy law, entertainment law, investigation, litigation and arbitration. Mr Ishiara has
490
© 2020 Law Business Research Ltd
About the Authors
extensive experience in the field of intellectual property law. In addition, Mr Ishiara regularly
advises foreign clients on Japanese regulatory matters on finance, life science and anti-bribery
matters.
HERALD JONGEN
Greenberg Traurig LLP
Herald Jongen is an advocaat and shareholder at Greenberg Traurig LLP. Herald focuses on
technology transactions, outsourcing, strategic relationships and private M&A. He has led
many complex multi-jurisdictional projects. He goes where the deal is, which brought him
to New York, Silicon Valley, London, Paris, Brussels, Stockholm, Berlin, Frankfurt and other
places. He assisted the Dutch government on the negotiations with Microsoft, which led to
the landmark amendment for GDPR compliancy of Microsoft’s cloud products, signed in
May 2019. He is consistently ranked in Tier 1 for IT and for Outsourcing by Chambers and
The Legal 500. Quotes in these ranking guides include: ‘Market sources see him as a major
deal maker who knows where to focus his attention. They also highlight his up-to-the minute
industry expertise, which means he is ‘always in the loop with whatever’s going on.’; ‘Herald
Jongen guides the group with “supreme expertise in the field.” Clients are “deeply impressed
with his ability to understand the complex issues and translate them into simple concepts – an
enviable strength.”’ and ‘An exceptionally effective negotiator and has an excellent command
of the practical issues involved with IT.’
SHANTHI KANDIAH
SK Chambers
Shanthi Kandiah founded SK Chambers with the goal of creating a stand-alone regulatory
firm that services individuals and entities involved at all levels of the regulatory scheme.
She regularly advises many corporations in sectors such as media and telecommunications,
FMCG, construction and credit reporting on privacy and data protection matters, including
the following: compliance strategies that prevent and limit risk; managing risks through
contracts with customers and suppliers; data protection and cyber risk due diligence in
relation to acquisitions, dispositions and third-party agreements; crisis management when a
data breach occurs; investigations management – when faced with regulatory action for data
security breaches; and data transfers abroad – advising on risks and issues.
Shanthi Kandiah holds an LLM and a postgraduate diploma in economics for
competition law, both from King’s College London.
VYACHESLAV KHAYRYUZOV
Noerr
Vyacheslav Khayryuzov heads digital business and data privacy and co-heads the IP practice
groups in the Moscow office of Noerr. He advises clients that predominantly operate in
the technology, retail and media sectors. His extensive experience includes international
copyright and software law, data privacy protection, as well as commercial and media law
issues in Russia. In addition, he advises clients on general IP matters. He represents both
national and international clients, ranging from start-ups to large national and international
corporations.
491
© 2020 Law Business Research Ltd
About the Authors
BATU KINIKOĞLU
BTS&Partners
Batu Kınıkoğlu (LLM) is the head of the data protection practice at BTS & Partners. Batu
graduated from Istanbul University, Faculty of Law and achieved his master’s degree from
the University of Edinburgh. He has a broad range of experience on data protection and
telecommunications law and is valued by clients for his technical knowledge and dedication.
He advises clients on a wide range of issues, including data protection, information privacy,
cybersecurity, e-commerce and telecommunications law. His expertise also includes copyright
and open source software licensing. He also advises clients on public procurement projects
relating to information and communication technologies and has articles published in
international academic journals on subjects ranging from copyright to internet regulation.
DANNY KOBRATA
K&K Advocates
Danny leads the corporate and technology team at K&K Advocates, overseeing the corporate,
commercial IP, and TMT practice groups. Over the years, Danny has advised domestic
and international clients on TMT matters including privacy, e-commerce, advertising and
telecommunication. Danny has been actively involved in discussions on personal data
protection bills in Indonesia.
Among the trailblazers in Indonesian TMT law, Danny has advised clients from different
industries, including movie platforms, fintech, payments, financial, telecommunications,
application-based transportation, technology, gaming and e-commerce. His articles on
privacy issues have been published in national newspapers. He has also acted as a speaker
at different law seminars and workshops for privacy issues in Indonesia and is currently a
lecturer of the Cyber Law course at Prasetya Mulya University.
492
© 2020 Law Business Research Ltd
About the Authors
Nuno also assists national and international clients in risk assessment on emerging
technologies (AI, blockchain, cloud) and actively participates in digital transformation
projects under ‘Legal by Design’.
In the technology sector, Nuno has gained significant experience in drafting and
negotiating licensing, distribution and development contracts.
Nuno also organises and provides training sessions and workshops. He has been a
member of the Portuguese Bar Association since 2015.
WILLIAM RM LONG
Sidley Austin LLP
William Long is a global co-leader of Sidley’s highly ranked privacy and cybersecurity practice
and also leads the EU data protection practice at Sidley. William advises international clients
on a wide variety of GDPR, data protection, privacy, information security, social media,
e-commerce and other regulatory matters. William has been a member of the European
Advisory Board of the International Association of Privacy Professionals (IAPP) and on
the DataGuidance panel of data protection lawyers. He is also on the editorial board of
e-Health Law & Policy and also assists with dplegal (‘data privacy legal’), a networking group
of in-house lawyers in life sciences companies examining international data protection issues.
William was previously in-house counsel to one of the world’s largest international financial
services groups. He has been a member of a number of working groups in London and
Europe looking at the EU regulation of e-commerce and data protection and spent a year at
the UK’s Financial Law Panel (established by the Bank of England), as assistant to the chief
executive working on regulatory issues with online financial services.
LETICIA LÓPEZ-LAPUENTE
Uría Menéndez Abogados, SLP
Leticia López-Lapuente joined Uría Menéndez in 2004. She was named partner in 2019.
She heads the firm’s data protection and e-commerce area and also leads the LatAm data
protection group. Leticia focuses her practice on data protection, commercial and corporate
law, especially in the internet, software, e-commerce and technology sectors. She also
advises on privacy law issues. Leticia provides clients operating in these sectors with day-to-
day advice on regulatory, corporate and commercial matters, including the drafting and
negotiation of contracts, M&A, privacy advice, consumer protection and e-commerce issues,
493
© 2020 Law Business Research Ltd
About the Authors
corporate housekeeping, public procurement and RFP procedures, and dealings with public
authorities. She has been involved in major transactions and assisted businesses and investors
in these sectors.
She regularly speaks in national and international fora regarding personal data protection
and technology, in addition to having written numerous articles on data protection-related
matters.
MICHAEL MORRIS
Allens
Michael specialises in all corporate, commercial and regulatory aspects of technology,
telecommunications, intellectual property and the data life cycle. He has 20 years’ experience
across a range of ICT sector, IP and data issues in Australia, Europe, Singapore and Papua
New Guinea. He is particularly experienced in large projects that involve the procurement
or outsourcing of ICT, business process outsourcing, ICT system separations, business
transformation, and corporate transactions and projects in the ICT sector and data market.
He also regularly advises clients across all industry sectors and government on cybersecurity
issues, data protection, data commercialisation, data governance, dealing with data breaches,
IP protection and IP commercialisation.
MÁRK PÉCSVÁRADY
Bogsch & Partners Law Firm
Márk Pécsvárady is a junior associate at Bogsch & Partners, focusing on corporate law,
employment law, data protection and IP rights. Márk also holds an LLM degree from
the University of Göttingen, where his primary interest was international private law and
corporate law. As a member of the ChinaCham Hungarian–Chinese Chamber of Economy he
494
© 2020 Law Business Research Ltd
About the Authors
HUGH REEVES
Walder Wyss Ltd
Hugh Reeves is a senior associate in the information technology, intellectual property and
competition team of the Swiss law firm Walder Wyss Ltd. His preferred areas of practice
495
© 2020 Law Business Research Ltd
About the Authors
include technology transfers, data protection and privacy law, as well as information
technology and telecommunications law. He is also active in the areas of copyright, patent,
trademark and trade secret law.
Hugh Reeves was educated at the University of Lausanne (BLaw, 2008; MLaw, 2010)
and the University of California at Berkeley (LLM, 2016).
Hugh Reeves speaks English, French and German. He is registered with the Vaud Bar
Registry and admitted to practise in all of Switzerland.
JÜRG SCHNEIDER
Walder Wyss Ltd
Jürg Schneider is a partner with the Swiss law firm Walder Wyss Ltd. Jürg Schneider’s
practice areas include information technology, data protection and outsourcing. He regularly
advises both Swiss and international firms on comprehensive licensing, development, system
integration and global outsourcing projects. He has deep and extensive experience in the
fields of data protection, information security and e-commerce, with a particular focus on
transborder and international contexts. Jürg Schneider is a member of the board of directors
of the International Technology Law Association and immediate past co-chair of its data
protection committee. In addition, Jürg Schneider regularly publishes and lectures on ICT
topics in Switzerland and abroad.
Jürg Schneider was educated at the University of Neuchâtel (lic iur 1992, Dr iur 1999).
He has previously worked as a research assistant at the University of Neuchâtel, as a trainee at
the legal department of the canton of Neuchâtel and in a Neuchâtel law firm.
Jürg Schneider speaks German, French and English. He is registered with the Vaud Bar
Registry and admitted to practise in all of Switzerland.
BHREDIPTA SOCARANA
K&K Advocates
Bhredipta Socarana, SH, LLM, CIPP/E, is a senior associate at K&K Advocates. Bhredipta
obtained his bachelor of law degree from the Faculty of Law, Universitas Gadjah Mada. He
holds a master of laws degree from Berkeley Law, University of California, Berkeley (UC
Berkeley).
At K&K Advocates, Bhredipta provides services on technology, media, and
telecommunication as well as intellectual property. His practice is focused on regulatory
advisory, legal audit compliance and contentious work. He also often performs government
outreach on behalf of the firm’s clients.
496
© 2020 Law Business Research Ltd
About the Authors
OLGA STEPANOVA
Winheller Attorneys At Law & Tax Advisors
Olga Stepanova heads the IP/IT department at Winheller Attorneys at Law & Tax Advisors,
where she advises German and international companies and non-profit organisations on
issues of data protection, IT law and intellectual property.
MONIQUE STURNY
Walder Wyss Ltd
Monique Sturny is a managing associate in the information technology, intellectual property
and competition team of the Swiss law firm Walder Wyss Ltd. She advises international and
domestic companies on data protection law, competition law, distribution law, contract law
and information technology law matters, as well as with respect to the setting up of compliance
programmes. She represents clients in both antitrust and data protection proceedings in court
and before administrative bodies. She regularly publishes and speaks at conferences in her
areas of practice.
Monique Sturny was educated at the University of Fribourg (lic iur, 2002), the London
School of Economics and Political Science (LLM in international business law, 2007) and
the University of Berne (Dr iur, 2013). Monique Sturny speaks German, English and French.
She is registered with the Zurich Bar Registry and admitted to practise in all of Switzerland.
ADITI SUBRAMANIAM
Subramaniam & Associates
Aditi Subramaniam has a bachelor’s degree in English literature from the University of Delhi,
a bachelor’s degree in law from the University of Oxford and a master’s degree in law (LLM)
from Columbia Law School. She is qualified to practise law in the territories of India and
is awaiting her admission to the New York Bar, having recently passed the New York Bar
497
© 2020 Law Business Research Ltd
About the Authors
Examination. She specialises in patent and trade mark prosecution and contentious matters,
including oppositions and appeals before the Intellectual Property Office and the Appellate
Board, as well as litigation before the district and high courts. She also advises clients on data
protection, pharmaceutical advertising and cybersecurity. She is widely published and very
well regarded in the Indian and international legal fraternity.
498
© 2020 Law Business Research Ltd
About the Authors
product liability issues, e-commerce, trade practices, intellectual property (with a focus on
trademark), privacy and ICT law related advices, negotiations, litigation matters and contract
drafting. With the adoption of the GDPR, he has assisted a large number of clients and their
distribution network with the implementation of the new rules. He has also conducted a
significant number of Data Privacy Impact Assessments. He has particular experience in the
provision of legal advice to major clients in the automotive sector. Apart from this, he acts for
clients in general commercial disputes and court surveys.
Olivier graduated from the University of Louvain (UCL 1990, cum laude) and also
obtained a postgraduate degree in economic law from the University of Brussels (1992).
In 1992, he became a member of the Brussels Bar and joined the law firm De Caluwé &
Dieryck. In 1993 and 1994 he worked with Texaco Belgium as assistant to the general counsel
before joining the Antwerp Bar in 1995 as an associate at Dieryck, Van Looveren & Co, later
merged into Buyle Dieryck Van Looveren Maingain. Beginning in 2002, he became a partner
at Buyle Dieryck Van Looveren Maingain before joining Lawfort as a partner within the IP,
IT and distribution Department (2003–2006). In 2006 he co-founded the law firm Astrea.
Olivier is visiting professor at the Louvain School of Management (Facultés Notre
Dame de la Paix) where he teaches IP and distribution law. He has published on matters of
distribution law, agency agreements and product liability. He is a regular speaker at seminars.
Olivier is a member of the Antwerp Bar. He speaks Dutch, French and English.
SANJA VUKINA
Vukina & Partners Ltd
Attorney-at-law Sanja Vukina is the founder and managing partner in law firm Vukina &
Partners Ltd. Mrs Vukina has been registered with the Croatian State Intellectual Property
Office as a patent and trademark attorney since 1993. She is also a member of the executive
board of the Croatian Association of Patent and Trademark Attorneys, a European patent
attorney, Croatian representative with the European Patent Institute and a certified trainer
for licensing agreements for the Licensing Executives Society International. In 2017, she
received the Client Choice award for Croatia, being recognised by the clients as the best local
attorney in the field of intellectual property and trademark law.
Mrs Vukina mainly provides legal services regarding intellectual property-related rights,
with a particular focus on the implementation of business solutions through commercial
contracts and corporate regulations regarding the creation, application and exercise of
IP-related rights.
Mrs Vukina also advises on issues relating to applicable data protection legislation, such
as data protection compliance and innovative tailor-made solutions regarding the processing
of personal data for companies, particularly the processing of special categories of personal
data concerning health, such as those processed within the pharmaceutical and healthcare
businesses.
Due to her professional experience as a patent and trademark attorney registered with
the Croatian State Intellectual Property Office and Croatian Copyright Association, Mrs
Vukina has particular insight regarding copyright protection, trademarks, pharmaceutical
product patents and resolution of disputes in relation to intellectual property rights.
499
© 2020 Law Business Research Ltd
About the Authors
EMRE YILDIRIM
Greenberg Traurig LLP
Emre Yildirim has worked with clients on a wide variety of issues and transactions relating
to data compliance and technology. He gained expertise in general commercial contracting
and data protection compliance, in particular in the fields of regulatory matters, product
development, innovative data use and outsourcing. Emre’s background as a developer gives
him a distinctive edge in dealing with legal matters relating to information technology.
FRANCISCO ZAPPA
Bomchil
Francisco Zappa is a senior lawyer in the mergers and acquisitions and entertainment law
departments. He joined Bomchil in 2011.
He graduated with honours from the University of Salvador, Buenos Aires and
completed his masters’ degree in corporate law at the University of San Andrés, Buenos Aires.
His practice focuses on diverse corporate and contractual matters. He has wide experience in
fair trade and consumer protection issues and specialises in data protection law.
During 2017, he was an international associate at the New York offices of Simpson
Thacher & Bartlett.
He is a frequent speaker at chambers of commerce on matters in his areas of expertise.
500
© 2020 Law Business Research Ltd
About the Authors
SELEN ZENGIN
BTS&Partners
Selen Zengin graduated from Istanbul Bilgi University, faculty of law in 2016 and was admitted
to the Istanbul Bar Association in 2018. She particularly specialises in data protection and
electronic communications as well as cybersecurity, digital advertising and legal technology
sectors. Selen provides consultancy to local and international clients during the processes
of negotiating, reviewing and drafting of legal instruments and prepares regulatory and
technical compliance reports.
501
© 2020 Law Business Research Ltd
Appendix 2
CONTRIBUTORS’
CONTACT DETAILS
503
© 2020 Law Business Research Ltd
Contributors’ Contact Details
504
© 2020 Law Business Research Ltd
Contributors’ Contact Details
505
© 2020 Law Business Research Ltd
Contributors’ Contact Details
506
© 2020 Law Business Research Ltd
lawreviews
For more information, please contact [email protected]