Part 3 - Data Protection Principles
Part 3 - Data Protection Principles
on Data Protection
PART 3:
Data Protection
Principles
PURPOSE
Accountability
A Guide for Policy Engagement on Data Protection | PART 3: Data Protection Principles
Personal data must be processed in a lawful and fair manner. This principle is key
to addressing practices such as the selling and/or transfer of personal data that is
fraudulently obtained. ‘Fairness and transparency’ are essential for ensuring that
people’s data is not used in ways they would not expect. ‘Lawful’ means that data
must be processed in a way that respects of rule of law and that meets a legal
ground for processing. A ‘legal ground’ is a limited justification for processing
people’s data set out in law (e.g. consent) - discussed in the below section on
‘Lawful Grounds for Processing’.
37/98
A Guide for Policy Engagement on Data Protection | PART 3: Data Protection Principles
It is crucial that the individual is clearly informed and aware of how their
data is going to be processed, and by whom. If there is an intention to share
the data of an individual with a third party but the data controller is not
transparent about this fact and the data subject is not clearly informed, it is
likely that their personal data was obtained unfairly, and the process will not
be considered transparent.
It is not enough to just be clear about what you are doing with people’s data,
but the lawful criteria included in this principle means that an entity must be
justified in doing so by satisfying a legal ground.
PURPOSE
Purpose Limitation
38/98
A Guide for Policy Engagement on Data Protection | PART 3: Data Protection Principles
All personal data should be collected for a determined, specific, and legitimate
purpose. Any further processing must not be incompatible with the purposes
specified at the outset (i.e. the point of collection). This essentially means that it is
not acceptable to state that you need a person’s data for one purpose, and then
use it for something else without notice or justification.
This is particularly relevant to big data and other data analysis processes. For
example, the data broker industry thrives off the re-purposing of data:2 they amass
data from a vast array of sources, then compile, analyse, profile, and share insights
with their clients. This means that a lot of data shared for one purpose is
re-purposed in ways they might not expect, including targeted advertising.
Personal data should not be disclosed, made available, or otherwise used for
purposes other than those specified, in accordance with the ‘Purpose Limitation
Principle’.
While these are two widely recognised exceptions to the use limitation principles,
they are often abused and misused. In the case of (a), consent must be valid; it
must not be conditional, obtained through pre-ticked boxes, or have the details of
these other purposes hidden in small print or legalese (inaccessible to the average
data subject). In the case of (b), this has been used to allow for wide data-sharing
arrangements by state bodies and institutions in the exercise of their functions, for
example, using data provided for healthcare or education purposes for immigration
purposes. Such blanket exemptions threaten to weaken the protection offered by
data protection law, so it is crucial that any provisions providing for exceptions
be narrowly constructed, so that the principle of purpose limitation is not made
redundant and unenforceable when it comes to the State and its functions, and
exchanges of information between state agencies and that there are limits on the
reliance on consent, for example where there is an imbalance of power.
Furthermore, in relation to purpose limitation, the text of a law could provide for
various purposes which should not be incompatible with this principle.
39/98
A Guide for Policy Engagement on Data Protection | PART 3: Data Protection Principles
It is essential that these purposes be restricted in their scope, and the above terms
be further defined to provide clarity as to what each could entail.
Minimisation
40/98
A Guide for Policy Engagement on Data Protection | PART 3: Data Protection Principles
This principles requires that those processing data to consider what the
minimum amount of data necessary to achieve the purpose would be.
Processors should hold that and no more - it is not acceptable to collect
extra data because it might be useful later on, or simply because no thought
has been given to whether it is necessary in a specific scenario.
The principle of data minimisation is even more integral in the age of big
data, where advancement in technology has radically improved analytical
techniques for searching, aggregating, and cross-referencing large data sets
in order to develop intelligence and insights.7 With the promise and hope that
having more data will allow for accurate insights into human behaviour, there
is an interest and sustained drive to accumulate vast amounts of data. There
is an urgent need to challenge this narrative and ensure that only data that is
necessary and relevant for a specific purpose should be processed.
41/98
A Guide for Policy Engagement on Data Protection | PART 3: Data Protection Principles
Accuracy
Personal data must be accurate throughout processing and every reasonable step
must be taken to ensure this. This includes the following elements:
• Accuracy: All data processed must be accurate throughout the data lifecycle;
• Complete: Any category of data must be complete to the extent possible
that the omission of relevant data may not lead to the inference of different
information to the information that could be obtained if the data were
complete;
• Up-to-date: Any data that is retained and may be further processed in
accordance with the provisions provided for in the data protection law must
be kept up-to-date; and
• Limited: Personal data should only be processed (and retained) for the period
of time it is required for the purpose for which it was collected and stored.
The above elements reaffirm the rights of data subjects to access their personal
data, and to correct incomplete, inaccurate, or outdated data which should be
provided for in a data protection law.
42/98
A Guide for Policy Engagement on Data Protection | PART 3: Data Protection Principles
Storage Limitation
Personal data should only be retained for the period of time that the data is required
for the purpose for which it was originally collected and stored. This will strengthen
and clarify the obligation to delete data at the end of processing, which should be
included in another provision.
The law should clearly stipulate that data should not be kept for longer than
necessary for the purpose for which it was originally obtained. Any exceptions to
this must be very limited and clearly defined.
Just because the data controller might come across another use of the data does
not justify blanket or indefinite retention. How long it is necessary to store data will
be context-specific, however, this should be guided by other legislative obligations
and regulatory guidance. For individuals to be fairly informed about the processing
of their data, they must be informed how long their data will be retained, it is
therefore imperative that legislation incentivises data controllers to implement the
data minimisation principle by minimising the collection of personal data, and not
storing it longer than necessary.
43/98
A Guide for Policy Engagement on Data Protection | PART 3: Data Protection Principles
Any interference with the right to privacy and data protection requires
to be necessary and proportionate. Blanket data retention completely
fails to respect this – as confirmed in 2014, when the European Court of
Justice struck down the Data Retention Directive, calling mandatory data
retention, “an interference with the fundamental rights of practically the
entire European population...without such an interference being precisely
circumscribed by provisions to ensure that is actually limited to what
is strictly necessary”. This decision represented a strong authoritative
recognition of the safeguards that must be in place to protect our right
to privacy.9
44/98
A Guide for Policy Engagement on Data Protection | PART 3: Data Protection Principles
Personal data, at rest and in transit, as well as the infrastructure relied upon for
processing, should be protected by security safeguards against risks such as
unlawful or unauthorised access, use and disclosure, as well as loss, destruction,
or damage of data.
• Physical measures, i.e. locked doors and identification cards, for instance;
• Organisational measures, i.e. access controls;
• Informational measures, i.e. enciphering (converting text into a coded form),
and threat-monitoring; and
• Technical measures, i.e. encryption, pseudonymisation, anonymisation.
If security measures are not taken to protect data, and ensure the security
and safety of the infrastructure, data is left vulnerable to threats and is at risk
of breach and unlawful access. There have been multiple examples of data
breaches as a result of weak security.
45/98
A Guide for Policy Engagement on Data Protection | PART 3: Data Protection Principles
Accountability
46/98
A Guide for Policy Engagement on Data Protection | PART 3: Data Protection Principles
that only five data breaches were registered in South Africa.14 This is expected
to change significantly as PoPI comes into force, as responsible parties will
be required by law to disclose information about data breaches if they occur.
Accountability mechanisms play an important role in investigating breaches
and holding entities subject to the law to account. In 2017, following
revelations of a major leak of data from taxi hire app Uber in 2016, the
Mexican National Institute of Transparency, Access to Information and
Protection of Personal Data (INAI) asked Uber for information on the number
of “Mexican users, drivers and employees” who had been affected.15
The institute also asked Uber for information on the measures the company
is taking to mitigate damage and protect clients’ information.
47/98
A Guide for Policy Engagement on Data Protection | PART 3: Data Protection Principles
References
1 Data Protection Commission (Ireland), ‘Case Study 1/01’, available at: https://
www.dataprotection.ie/docs/Case-Study-1-01-Bank-and-Insurance-Company/121.htm
2 Privacy International, ‘How do companies get our data?’ available at: https://
www.privacyinternational.org/feature/2048/how-do-data-companies-get-our-data
3 The Centre for Internet and Society, ‘Aadhaar Act and its Non-compliance with
Data Protection Law in India’, 14 April 2016, available at: https://cis-india.org/
internet-governance/blog/aadhaar-act-and-its-non-compliance-with-data-protection-
law-in-india; and Usha Ramanathan, ‘Aadhaar: from compiling a government database
to creating a surveillance society’, Hindustan Times, January 2018, available at:
https://www.hindustantimes.com/opinion/aadhaar-from-compiling-a-govt-database-to-
creating-a-surveillance-society/story-Jj36c6tVyHJMjOhCI8vnBN.html
4 Costica Dumbrava, ‘European Information Systems In The Area Of Justice And Home
Affairs: An Overview’, European Parliamentary Research Service Blog, 15 May 2017,
available at: https://epthinktank.eu/2017/05/15/european-information-systems-in-
the-area-of-justice-and-home-affairs-an-overview/
8 Maria LaMagna,’ The reason your loan application is rejected may have nothing to
do with your credit score’, MarketWatch’, 29 March 2017, available at: https://
www.marketwatch.com/story/the-reason-your-loan-application-is-rejected-may-have-
nothing-to-do-with-your-credit-score-2017-03-29; Anna Tims, ‘Equifax mistake
with my credit score nearly lost me a mortgage’, The Guardian, 14 February
2017, available at: https://www.theguardian.com/money/2017/feb/14/credit-
rating-remortgage-equifax-experian-callcredit; and Anna Tims, ‘How credit
score agencies have the power to make or break lives’, The Guardian, 17 July
2017, available at: https://www.theguardian.com/money/2017/jul/17/credit-score-
angencies-break-lives-lenders-no-mortgage
9 Court of Justice of the European Union, ‘The Court of Justice declares the Data
Retention Directive to be invalid’, Curia, available (PDF) at https://curia.
europa.eu/jcms/upload/docs/application/pdf/2014-04/cp140054en.pdf
14 Duncan Alfreds, ‘SA fails to make data breaches public – expert’, Fin24, 26
February 2016, available at https://www.fin24.com/Tech/Cyber-Security/sa-fails-to-
make-data-breaches-public-expert-20160226
15 R3D: Red en Defensa de los Derechos Digitales, ‘INAI pide a Uber revelar si robo
masivo de datos afectó a usuarios mexicanos’, available (Spanish) at: https://
r3d.mx/2017/12/01/inai-pide-a-uber-revelar-si-robo-masivo-de-datos-afecto-a-
usuarios-mexicanos/#more-4034
48/98