NOTES Digital Privacy Seminar
NOTES Digital Privacy Seminar
Art. 8 ECHR: “Everyone has the right to respect for his private and family life” [...] “There shall be no
interference by a public authority with the exercise of this right except…”
No regard to ‘data protection’
Convention of the Council of Europe for the Protection of Individuals with regard to Automated
Processing of Personal Data → from privacy to data protection
US “free speech zone” is expressing concerns about possible implementation of a RTBF in the EU
Enforcement of such a right is supposed to undermine the protection afforded to freedom of expression and
particularly freedom of information → collective “right to know” is sacrificed for individual’s RTBF
Applicability of EU regulation to US-based companies continues to be challenged. BUT Google Spain said that
EU law applies even to companies established in EU for commercial purposes only
Decision 2000/520/EC: on the adequacy of the protection provided by the safe harbour privacy principles
SAFE HARBOUR
● Mechanism of self-certification intended for US organisations that process PD collected in the EU
● Designed to assist eligible organisations to comply with the EU Data Protection Directive and maintain
the privacy and integrity of that data
● US companies can opt into the program (i.e. self-certify) as long as they adhere to the 7 principles and
15 frequently asked questions. The principles:
1. Principle of notice
2. Principle of choice
3. Principle of onward transfer
4. Principle of security
5. Principle of data integrity
6. Principle of access
7. Principle of enforcement
SCHREMS II
Facts: Schrems went to DPC again, alleging that fb’s use of the standard contractual clauses (SCCs) for data
transfers approved by Commission Decision 2010/87 couldn’t provide a valid legal basis for transfers to the
US, in part because fb is obliged to make the PD of its users available to US government in the context of their
surveillance programs.
Proceedings also dealt with US law and practice regarding surveillance and level of protection provided by the
EU-US Privacy Shield. Irish High Court stayed the proceedings and referred questions to the CJEU
Court’s decision:
● Agreed to the use of SCCs as a data transfer mechanism
● Affirmed that the Commission has no obligation to evaluate the level of data protection in countries to
which data are transferred under them
● Declared the EU-US Privacy Shield INVALID because of:
a. Primacy of US law enforcement requirements over those of the Privacy Shield
b. Lack of necessary limitations and safeguards on the power of the authorities under US law,
particularly in light of proportionality requirements
c. Lack of an effective remedy in the US by EU data subjects
d. Deficiencies in the Privacy Shield Ombudsman mechanism (def: new mechanism to facilitate
the processing of and response to requests relating to the possible access for national security
purposes by US intelligence authorities to personal data transmitted from the EU to the US)
There’s a disconnect btw the political pressure to reach an accommodation with the US to which the
Commission seems to be subject, and the Court’s insistence on a high standard of data protection
THE GDPR: General Principles (and consent)
Overview:
● Directly applicable in all 28 MS
● Replaces the 1995 Data Protection Directive and the national laws transposing the 1995 Directive
● National laws applied until 25 May 2018
Principles:
● Lawfulness, fairness and transparency
● Purpose limitation
● Data minimization
● Accuracy
● Storage limitation
● Integrity and confidentiality
● Accountability (guiding principle of the entire EU data protection system)
ACCOUNTABILITY
Art. 5: the controller shall be responsible for, and be able to demonstrate compliance with the GDPR principles
Security measures:
● Art. 24: controller shall implement appropriate technical and organisational measures to ensure and to be able to
demonstrate that processing is performed in accordance with GDPR → controller’s responsibility/ liability
● Art. 32: controller and processor shall implement appropriate technical and organisational measures to ensure a
level of security appropriate to the risk
Risk-based approach
● The required level of data security must be identified on a case-by-case basis through an objective risk
assessment. Particularly, account should be taken of the risks presented from accidental or unlawful destruction,
loss, alteration, unauthorised disclosure of or access to PD
● GDPR encourages controllers to engage in risk analysis and to adopt risk-measured responses → additional
obligations for data processing activities that pose a high risk to individuals while requiring controllers to account
for risk in complying with many provisions of the GDPR
● Controllers that engage in low-risk processing activities (or adequately address risk) may avoid specific
requirements (e.g. notifying a data protection authority of a data breach). The GDPR also requires the supervisory
authorities to consider the risk level of the activity when deciding whether to impose fines for violation
Heightened obligations:
- Art. 35: data protection impact assessment
- Art. 36: prior consultation
- Art. 34: data breach notification to individuals
TRANSPARENCY
● Ensuring correct and transparent processing implies that the data subject is informed about the processing and its
purposes
● Data controller should provide the data subject with any additional information necessary to ensure correct and
transparent processing, taking into consideration the specific circumstances and context of processing
● The interested party should be informed of the existence of the profiling and its consequences
● Information shall be provided in a concise, transparent, intelligible and easily accessible form, using clear and
plain language, in particular for any information addressed specifically to a child
● Information shall be provided in writing, or by other means, including by electronic means
● Artt. 13 and 14: the controller must provide the data subject with minimum information on processing prior to
carrying out any processing activity
○ At the time of the collection of the data from the data subject
○ Within a reasonable period from the collection of the data from a source other than the data subject
LAWFULNESS OF PROCESSING
Consent
● Main legal basis to process PD and it has to be:
- Freely given
Freedom of choice of the data subject
Execution of a contract is made conditional on the provision of consent to the processing of PD
- Specific and informed
Data subject made aware of the identity of the controller and the purposes for PD processing.
If multiple purposes, must obtain consent for all of them
- Unambiguous
Silence, pre-ticked boxes or inactivity NOT valid consent
- Revocable
Data subject has the right to withdraw his/ her consent at any time. The withdrawal shall not
affect the lawfulness of processing based on consent before its withdrawal
- Provable
Controller shall be able to demonstrate that the data subject has consented to the processing
● Consent is NOT required when the processing is necessary to:
○ Performance of a contract to which the data subject is party or in order to take steps at the request of the
data subject prior to entering into a contract
○ To comply with a legal obligation which the controller is subject to
○ Performance of a task carried out in the public interest or in the exercise of official authority
○ Protect the vital interests of the data subject or of another natural person
○ For purposes of the legitimate interests pursued by the controller, except where such interests are
overridden by the interests or fundamental rights and freedoms of the data subject which require
protection of PD
● Explicit consent for processing personal categories of data (art. 9), automated individual decision-making (art.
22) and transfer in the lack of appropriate safeguards (art. 49)
○ Requirement referred to the way consent is expressed by the data subject. Written form not required
○ Examples: filling out an electronic form, sending an email, uploading a signed document or using an
electronic signature
○ Oral form is in principle compatible but it is necessary to consider the need to prove the explicit nature of
consent
Legitimate interest
● Data controller may lawfully process PD without consent of the data subjects
● To assess the legitimate interest of the data controller, it’s necessary to take into consideration:
○ The reasonable expectations of the data subject based on his/her relationship with the data controller.
GDPR leaves this evaluation to the data controller
○ Interests or fundamental rights and freedoms of the data subject which can prevail on the legitimate
interest of the data controller
● Factors to consider for ensuring adequate protection for those affected without jeopardising the sufficient degree
of flexibility of the operators:
- Nature and origin of legitimate interest
- Impact on the data subject
- Additional guarantees to avoid undue impact on the data subjects
● Should NOT be treated as a “last resort” for rare or unexpected situations. Should NOT be automatically chosen
● Cases in which the basis of legitimate interest may be used:
- Fraud prevention
- Direct marketing
- Transmission of PD within a business group for internal administrative purposes, including the
processing of PD of customers and employees
- Processing of traffic data, to the extent strictly necessary and proportionate to ensure network and
information security
● According to WP29, it’s possible to use one or more legal bases wrt the use of data for multiple purposes. Each
purpose must be legitimised by a specific legal basis. However:
○ NOT possible to change the pre-defined legitimacy assumption once the processing has started
○ NOT possible to retrospectively use the legitimate interest to justify the processing based on consent
○ Legal bases CANNOT be used according to the contingent needs of the data controller
PURPOSE LIMITATION
● PD should be only collected for specified, explicit and legitimate purposes and not further processed in a manner
that is incompatible with those purposes
● Purpose of data processing has a key role for the lawfulness of the controller/processor’s activities as it permits to
determine whether the basic principles of data minimization, accuracy and storage limitation are being respected
● If new processing activities are carried out that aren’t compatible with the initial purpose, they will only be lawful
if the consent is renewed or by way of statutory justification in EU MS allowing for a change of the data
processing purpose
DATA MINIMIZATION
● PD shall be adequate, relevant and limited to what is necessary in relation to the purposes for which they are
processed
● Data processing should NOT be limited to an absolute minimum, but rather to an adequate level regarding the
purposes of processing
● Technical and organisational measures should ensure adherence to this principle, e.g. through anonymisation,
pseudonymisation, through concepts of privacy by design and privacy by default
● Excess or irrelevant data should be deleted asap. Advantages:
○ In the event of a data breach, unauthorised individuals will only have access to a limited amount of data
○ Data minimisation makes it easier to keep data accurate and up to date.
STORAGE LIMITATION
● Data storage periods should be limited to a strict minimum
● PD shall be kept in a form that permits identification of data subjects for no longer than necessary for the
processing purposes
● Time limits should be established by the controller for erasure or for a periodic review
● Art. 17: controller’s obligation to erase PD
RIGHT TO ACCESS
● Data subject has the right to obtain from the controller confirmation as to whether or not PD concerning him/her
are being processed, and access to the PD
● Controller shall provide a copy of the PD undergoing processing
● The right to obtain a copy of data shall not adversely affect the rights and freedoms of other parties
● If request by electronic means, the information shall be provided in a commonly used electronic form
● Information to be provided:
a. Purposes of the processing
b. Categories of PD concerned
c. Recipients to whom the PD have been or will be disclosed
d. Where possible, the envisaged period for which the PD will be stored, or the criteria used to determine
that period when not possible
e. Existence of the right to request from the controller rectification/ erasure/ restriction of processing of PD
f. Right to lodge a complaint with a supervisory authority
g. Where PD are not collected from the data subject, any available information as to their source
h. Existence of automated decision-making, including profiling, meaningful information about the logic
involved, the significance and the envisaged consequences of such processing for the data subject
RIGHT TO OBJECT
● Right to object on the grounds relating to data subject’s particular situation, at any time to the processing of PD
concerning him/her where processing is necessary for
- Performance of a task carried out in the public interest or in the exercise of official authority
- Purposes of the legitimate interests pursued by the controller
● Controller shall no longer process the PD unless the controller demonstrates compelling legitimate grounds
● Case of direct marketing:
○ Where PD are processed for direct marketing purposes, the data subject shall have the right to object at
any time to processing of PD for such marketing, which includes profiling to the extent that it is related to
such direct marketing → PD no longer be processed for such purposes
DATA CONTROLLER
Art. 4(7) GDPR: “entity that determines the purposes for which and the means by which PD are processed”
Primary responsibility: ensuring that processing activities are compliant with EU data protection law
Joint controllership: in relation to any processing activity, possible to have more than one entity as controller
→ Joint liability:
- Primary focus: ensure that the data subject is protected
- Each joint controller is liable for the entirety of the damage. A controller may be exempted from liability if it
proves that it is not in any way responsible for the damage
- If one joint controller has paid full compensation, it may then bring proceedings against the other joint controllers
to recover their portions of the damages
OBLIGATIONS
- Appointment of representatives
Controllers established outside the EU must appoint a representative unless for occasional processing
- Appointment of processors: permitted practice under certain requirements
- Record keeping of processing activities, no obligation to notify DPAs
- Cooperation with DPAs
- Data breaches reporting and notification obligations, respectively to DPAs and data subjects
- Data security
Must implement appropriate technical and organisational measures to protect PD against accidental or
unlawful destruction or loss, alteration, unauthorised disclosure or access. Measures may include:
- Encryption of the PD
- On-going reviews of security measures
- Redundancy and back-up facilities
- Regular security testing
- Responsibility for implementing appropriate measures to ensure and demonstrate that processing activities are
compliant with the requirements of the GDPR
- Accountability: must be able to demonstrate compliance with the GDPR
DATA PROCESSOR
Art. 4(8): Entity that processes PD on behalf of the controller
Art. 28(1)-(3): appointment of a processor by the controller in the form of a binding written agreement
stating that the process must:
- Only act on the controller’s documented instructions
- Impose confidentiality obligations on personnel who processes relevant data
- Ensure the security of the PD that it processes
- Abide by the rules regarding appointment of sub-processors
- Implement measures to assist the controller in complying with the rights of data subjects
- Assist the controller in obtaining approval from DPAs where required
- At the controller’s election, either return or destroy the PD at the end of the relationship
- Provide the controller with all info necessary to demonstrate compliance with GDPR
OBLIGATIONS of Processor
- Appointment of sub-processors: need prior written consent of the controller
- Confidentiality: extended to all persons authorised to process the PD
- Compliance with the controller’s instructions
If a processor, in breach of the GDPR, determines the purposes and means of any
processing activity, that processor is treated as a controller in respect of that processing
- Records of processing activities: records including
- Details of the controller/processor and any representatives
- Categories of processing activities performed
- Information regarding cross-border data transfers
- A general description of the security measures implemented in respect of the processed
data
- Cooperation with DPAs
- Data security (see data controller’s)
- Data breach reporting to the data controller without undue delay
- Liability
Data subjects can bring claims directly against processors. However, a processor is liable
for the damage caused by its processing activities only where
- It has not complied with GDPR obligations that are specifically directed to
processors
- It has acted outside/contrary to lawful instructions of the controller
Security of Processing
In assessing the appropriate level of security, account shall be taken in particular of the risks that are
presented by processing, in particular from accidental or unlawful
- Destruction
- Loss
- Alteration
- Unauthorised disclosure of/ access to
of PD transmitted, stored or otherwise processed
→ DATA BREACH
● NOTIFICATION
○ In the case of a PD breach without undue delay and, where feasible, not later than 72
hours after becoming aware of it, the controller shall notify the PD breach to the
competent supervisory authority
○ Unless the PD breach is unlikely to result in a risk to the rights and freedoms of natural
persons
○ The controller shall document any PD breaches, comprising the facts relating to the PD
breach, its effects and the remedial action taken
● COMMUNICATION
○ When the PD breach is also likely to result in a high risk to the rights and freedoms of
natural persons, the controller shall communicate the PD breach to the data subject
without undue delay
Designation
● Controller/ processor shall designate a DPO in any case where
○ The processing is carried out by a public authority or body, except for courts acting in
their judicial capacity
○ The core activities of the controller/ processor consist of processing operations which, by
virtue of their nature, scope and/or purposes, require regular and systematic monitoring
of data subjects on a large scale
○ The core activities of the controller/processor consist of processing on a large scale of
special categories of data and PD relating to criminal convictions and offences
● In cases other than those in which the designation is mandatory, the controller/ processor/
associations and bodies representing categories of controllers and processors may or, when
required by EU/ national law, shall designate a DPO
● The DPO may act for such associations and other bodies representing controllers/ processors
Penalties
● Three possible layers:
○ Criminal penalties
○ Administrative fines
○ Appropriate measures, reprimand
● Recitals 148: “Due should be given to the nature, gravity and duration of the infringement, the
intentional character of the infringement, actions taken to mitigate the damage suffered, degree
of responsibility or any relevant previous infringements, the manner in which the infringement
became known to the supervisory authority, compliance with measures ordered against
controller/ processor, adherence to a code of conduct and any other aggravating or mitigating
factor”
● Infringements of the following provisions shall be subject to fines up to 10M€, or up to 2% of
the total worldwide annual turnover of the preceding financial year, whichever is higher
- Obligations of the controller and the processor
- Obligations of the certification body
- Obligations of the monitoring body
● Infringements of the following provisions shall be subject to fines up to 20M€, or up to 4% of
the total worldwide annual turnover of the preceding financial year, whichever is higher
- Basic principles for processing, including conditions for consent
- Data subject’s rights
- Transfers of PD to a recipient in a third country or international organisation
- Any obligation pursuant to MS law (e.g. “freedom of information” exception)
- Non-compliance with an order, or limitation on processing, or the suspension of data
flows by the supervisory authority, or failure to provide access to the same
- Non-compliance with an order by the supervisory authority
Open questions:
- Will the GDPR ensure an adequate balance between the protection of individual privacy and the
interests to extract value from big data and promote innovation and competitiveness?
- Should big data initiatives be regulated ad hoc?
- Is a static concept of PD still relevant in today’s technological environment?
e-PRIVACY DIRECTIVE
● The Electronic Privacy Directive (2002/58) was drafted specifically to address the requirements
of new digital technologies, ease the advance of electronic communications services and create
favourable market conditions for the digital economy
● The subject of the directive is the “right to privacy in the electronic communications sector” and
“free movement of data, communication equipment and services”
● It was designed to complement the data protection rules and other rules on telecoms
● Scope of application
○ It also protects the interests of legal persons, unlike the GDPR
○ It applies to processing of PD in connection with the provision of publicly available
electronic communications services in public communications networks
○ Does NOT apply to activities outside the scope of EU law, or concerning public security,
defence and State security and the areas of the State in criminal law
○ Note: e-Privacy rules under the directive only cover traditional telecom providers, not
other services like Skype, WhatsApp, Gmail, etc.
● It sets out rules to
- Ensure security in the processing of PD (including the notice for data breaches)
- Ensure confidentiality of communications
- Introducing safeguards in the processing of traffic data
- Ban unsolicited communications where the user has not given consent
● Key provisions
○ Providers must secure their services by at least
- Ensuring PD are accessed only authorised persons
- Protecting PD from being destroyed, lost or accidentally altered and from other
unlawful/ unauthorised forms of processing
- Ensuring the implementation of a security policy on the processing of PD
○ Service providers must inform the national authority of any PD breach within 24 hrs.
Individuals must also be informed if the PD is likely to harm their privacy, unless
specifically identified technological measures have been taken to protect the data
○ EU MSs must ensure the confidentiality of communications made over public networks,
in particular they must:
- Prohibit the listening, taping, storage or any type of surveillance/ interception of
communications and traffic data without the consent of users, except where there
is a legal authorisation and in compliance with specific requirements
- Guarantee that the storing of/ access to info on users’ personal equipment is
permitted only if the user has been clearly and fully informed of the purpose of
access and has been given the right of refusal
- When traffic data are no longer required for communication/ billing, they must be
erased or anonymized. These data may be processed for marketing purposes as
long as the user gives consent that can be withdrawn at any time
○ Prior user consent is required in a number of situations
- To send unsolicited communications (spam)
- To store information (cookies) on users’ devices or to obtain access to that info
- For the appearance of telephone numbers, email addresses or postal addresses in
public directories
○ EU MS are required to have a system of penalties including legal sanctions for
infringements of the directive
○ Scope of the rights and obligations can only be restricted by national legislative measures
when such restrictions are necessary and proportionate to safeguard specific public
interests, such as to allow criminal investigations or to safeguard national security