Cloud Security BootCamp A User's Guide To Data Protection Law and
Cloud Security BootCamp A User's Guide To Data Protection Law and
To SG & A
A User’s Guide to Data
Protection: Law and Policy
Fourth edition
BLOOMSBURY and the Diana logo are trademarks of Bloomsbury Publishing Plc
First published in Great Britain 2020
Copyright © Bloomsbury Professional 2020
All rights reserved. No part of this publication may be reproduced or transmitted
in any form or by any means, electronic or mechanical, including photocopying,
recording, or any information storage or retrieval system, without prior permission
in writing from the publishers.
While every care has been taken to ensure the accuracy of this work, no responsibility
for loss or damage occasioned to any person acting or refraining from action as a
result of any statement in it can be accepted by the authors, editors or publishers.
All UK Government legislation and other public sector information used in the
work is Crown Copyright ©. All House of Lords and House of Commons information
used in the work is Parliamentary Copyright ©. This information is reused under the
terms of the Open Government Licence v3.0 (http://www.nationalarchives.gov.uk/
doc/open-government-licence/version/3) except where otherwise stated.
All Eur-lex material used in the work is © European Union,
http://eur-lex.europa.eu/, 1998–2020.
Abbreviationsxvii
Table of Cases xxi
Table of Statutes xxv
Table of Statutory Instruments xxix
Table of EU Regulations xxxiii
Table of European Directives xli
Table of Treaties, Conventions and Agreements xliii
v
Contents
Chapter 3 Definitions 35
Introduction35
DPA Definitions 35
GDPR Definitions 38
Two Categories of Personal Data 42
Conclusion46
Chapter 5 Principles 61
Introduction61
When Data Protection Provisions Apply 61
Fair Processing Requirements 62
Principles of Data Protection 62
vi
Contents
Chapter 8 Exemptions 75
Introduction75
Exemptions under the DPA 2018 75
Exemptions under the GDPR 76
Conclusion77
vii
Contents
viii
Contents
ix
Contents
EDPB/WP29223
Employment Contracts, Terms, Policies 226
Processing Compliance Rules 226
The Rights of Employee Data Subjects 228
Monitoring Case 229
Conclusion231
x
Contents
xi
Contents
xii
Contents
xiii
Contents
Index533
xiv
‘Our measures are designed to support businesses in their use of data,
and give consumers the confidence that their data is protected and those
who misuse it will be held to account.’1
‘We are pleased the government recognises the importance of data pro-
tection, its central role in increasing trust and confidence in the digi-
tal economy and the benefits the enhanced protections will bring to the
public.’2
‘A blog [or social networking post] is a bit like a tattoo: a good idea at
the time but you might live to regret it.’6
xv
xvi
Abbreviations
xvii
Abbreviations
xviii
Abbreviations
xix
xx
Table of Cases
Bărbulescu v Romania (61496/08) [2016] IRLR 235, 41 BHRC 44������������������ 9.32; 17.24
Breyer v Germany (Case C-582/14) [2017] 1 WLR 1569, [2017] 2 CMLR 3,
[2017] CEC 691�����������������������������������������������������������������������������������������������������9.32
British Gas v Data Protection Registrar [1997–98] Info TLR 393,
[1998] UKIT DA98������������������������������������������������������������������������������������ 9.32; 17.22
xxi
Table of Cases
xxii
Table of Cases
Information Comr v Independent Inquiry into Child Sexual Abuse (18 July 2017)������9.32
Information Comr v Independent Inquiry into Child Sexual Abuse
(18 September 2018)����������������������������������������������������������������������������������������������9.32
Information Comr v London Borough of Lewisham (6 September 2018)���������������������9.05
Information Comr v Making it Wasy Ltd (2 August 2019)������������������������������������������23.07
Information Comr v Niebel; Information Comr v McNeish [2014]
UKUT 255 (AAC)������������������������������������������������������������������� 1.11; 9.17, 9.32; 18.12
Information Comr v Prudential (6 November 2012)�������������������������1.11; 9.17, 9.32; 11.12
Information Comr v Secure Home Systems (31 October 2018)�����������������������������������23.07
Information Comr v Smart Home Protection Ltd (13 June 2019)��������������������������������23.07
Information Comr v Shaw (5 December 2019)��������������������������������������������������������������1.11
Information Comr v Sjipsey (2 December 2019)�����������������������������������������������������������1.11
Information Comr v Solartech North East Ltd (23 November 2018)���������������������������23.07
Information Comr v Sony (July 2013) ���������������������������������������������������������������������������9.32
Information Comr v Superior Style Home Improvements Ltd
(17 September 2019)��������������������������������������������������������������������������������������������23.07
Information Comr v True Visions Productions Ltd (10 April 2019)��������� 1.10; 9.32; 18.12
Information Comr v Uber (26 November 2018)�������������������������������������������������������������1.11
Information Comr v Yahoo! UK (21 May 2018)������������������������������������������������������������9.32
Information Comr v Young (13 March 2020)�����������������������������������������������������������������9.05
McCall v Facebook (No 10-16380) (9th Cir, 20 September 2012)��������� 9.32; 11.12; 29.03
Maatschap Toeters & MC Verberk v Productschap Vee en Vlees
(Case C-171/03)���������������������������������������������������������������������������������������������������10.01
Microsoft Corpn v McDonald (t/a Bizads) [2006] EWHC 3410 (Ch),
[2007] Bus LR 548, [2007] Info TLR 300����������������������������������������������������9.17, 9.32
Ministero Fiscal, proceedings brought by (Case C-207/16) [2019] 1 WLR 3121,
[2018] 10 WLUK 1, [2019] 1 CMLR 31���������������������������������������������������������������1.03
Mosley v Google Inc [2015] EWHC 59 (QB), [2015] 2 CMLR 22,
[2015] EMLR 11����������������������������������������������������������������������������������������������������9.32
Motion Picture Association v BT (judgment 28 July 2011)�������������������������������������������9.32
NT1 & NT2 v Google LLC [2018] EWHC 799 (QB), [2018]
3 All ER 581, [2018] EMLR 18, [2018] HRLR 13��������������� 1.03; 9.32; 11.14; 26.60
Nowak v Data Protection Comr (Case C-434/16) [2018] 1 WLR 3505,
[2018] 2 CMLR 21�������������������������������������������������������������������������������������������������9.32
xxiii
Table of Cases
Tele2 Sverige v Swedish Post & Telecom Authority; R (on the application
of Watson) v Secretary of State for the Home Department
(Cases C-203/15 & C-698/15) [2017] QB 771, [2017] 2 WLR 1289,
[2017] 2 CMLR 30�������������������������������������������������������������������������������������������������9.32
xxiv
Table of Statutes
xxv
Table of Statutes
Data Protection Act 2018 – contd Data Protection Act 2018 – contd
Pt 3 (ss 29–81)���������������������� 3.02; 8.02; s 199, 200���������������������������11.02; 18.02
25.03, 25.05 s 204������������������������������������������������3.02
s 29(2)����������������������������������������������3.02 s 205������������������������������������������������3.02
s 32��������������������������������������������������3.02 s 207�������������������������������������� 5.02; 9.19
s 47������������������������������������������������11.29 s 207(7)��������������������������������������������5.02
s 55������������������������������������������������11.05 s 209������������������������������������ 3.02; 25.04
Pt 4 (ss 82–113)�������������������� 3.02; 8.02; s 210������������������������������������ 3.02; 25.04
25.03, 25.05 Sch 1���������������������������������� 14.09; 18.02
s 82(3)����������������������������������������������3.02 Pt 1 (paras 1–4)��������������� 3.05; 14.02
s 83��������������������������������������������������3.02 Pt 2 (paras 5–28)�������������������������3.05
s 99(3)��������������������������������������������10.01 Pt 3 (paras 29–37)�����������������������3.05
s 115–117���������������������������������������20.17 Sch 2����������������������������������������������25.04
s 121–128��������������������������������������18.02 Pt 1 (paras 1–5)��������������� 8.02; 25.04
s 129����������������������������������������������20.08 Pt 2 (paras 6–15)�����������������������25.04
s 139–141��������������������������������������20.17 Pt 3 (paras 16, 17)����������� 8.02; 25.04
Pt 6 (ss 142–181)����������������11.26; 18.02 Pt 4 (paras 18–25)�����������������������8.02
s 142�����������������������������������11.26; 20.09 Pt 5 (para 26)������������������� 8.02; 25.04
s 143, 144��������������������������������������11.26 Pt 6 (paras 27, 28)���������������������25.04
s 145�����������������������������������11.26; 20.10 Sch 3������������������������������������ 8.02; 25.04
s 146�����������������������������������11.26; 20.04 Pt 1 (para 1)���������������������������������8.02
s 146(8), (9)�����������������������������������10.01 Pt 2 (paras 2–6)���������������������������8.02
s 147�����������������������������������11.26; 20.05 Pt 3 (paras 7–12)�������������������������8.02
s 148�����������������������������������11.26; 20.06 Pt 4 (paras 13–20)�����������������������8.02
s 149����������������������������������������������11.26 Pt 5 (para 21)�������������������������������8.02
s 150����������������������������������������������11.26 Sch 4������������������������������������ 8.02; 25.04
s 150(2)������������������������������������������20.02 Sch 12��������������������������������������������20.17
s 151�����������������������������������11.26; 20.03 Sch 13��������������������������������������������20.17
s 152, 153��������������������������������������11.26 Sch 17�������������������������������� 20.17; 30.07
s 154�����������������������������������11.26; 20.07 Sch 15���������������������������������11.26; 20.07
s 155�����������������������������������11.26; 20.15 Sch 18����������������������������������������������9.18
s 155(2), (3)�����������������������������������20.15 Sch 19
s 156����������������������������������������������11.26 Pt 1 (paras 1–232)
s 157�����������������������������������11.26; 20.15 para 43�������������������������� 1.01; 4.02
s 158, 159, 165–167����������������������11.26 para 44����������������������������������25.02
s 168�����������������������������������11.12, 11.26 Data Retention and Investigatory
s 168(3)������������������������������������������11.12 Powers Act 2014�������������������������1.03
s 169�����������������������������������11.12, 11.26 European Communities
s 170�����������������������������������11.02; 20.12 Act 1972�������������������������24.14, 24.20
s 171������������������������11.02; 20.13, 20.14 s 2(1)����������������������������������������������24.14
s 172�����������������������������������11.02; 20.14 s 2(2)������������������������������������������������3.02
s 173����������������������������������������������11.02 European Union (Withdrawal)
s 177����������������������������������������������30.07 Act 2018������������������������24.07, 24.11,
s 179����������������������������������������������30.07 24.12, 24.14
s 180������������������������������������������������9.19 s 1��������������������������������������������������24.14
s 184������������������������� 9.18; 18.02; 20.16 s 2��������������������������������������������������24.14
s 185������������������������������������ 9.18; 18.02 s 3���������������������������������������24.13, 24.14
s 186����������������������������������������������18.02 s 3(1)����������������������������������������������24.13
s 187�������������� 9.21; 11.12; 18.02; 25.04 s 3(2)(a)������������������������������24.13, 24.14
s 188–190����������������� 9.21; 11.12; 18.02 s 5��������������������������������������������������24.13
s 196, 197���������������������������11.02; 18.02 s 5(1), (2), (4)��������������������������������24.13
s 198������������������������11.02, 11.14; 18.02 s 6��������������������������������������������������24.13
s 198(1)������������������������������������������11.14 s 6(1)����������������������������������������������24.13
xxvi
Table of Statutes
xxvii
xxviii
Table of Statutory Instruments
xxix
Table of Statutory Instruments
xxx
Table of Statutory Instruments
xxxi
Table of Statutory Instruments
xxxii
Table of EU Regulations
xxxiii
Table of EU Regulations
xxxiv
Table of EU Regulations
xxxv
Table of EU Regulations
xxxvi
Table of EU Regulations
xxxvii
Table of EU Regulations
xxxviii
Table of EU Regulations
xxxix
Table of EU Regulations
xl
Table of European Directives
xli
xlii
Table of Treaties, Conventions
and Agreements
xliii
xliv
Part 1
Data Protection
1
2
Chapter 1
Data Protection
3
1.01 Data Protection
3 Editorial, S Saxby, Computer Law & Security Review (2012) (28) 251–253, at 251.
4 ‘Personal Data Protection and Privacy,’ Counsel of Europe, at http://www.coe.int/en/.
4
The Importance of Data Protection 1.03
Even more recently the issue of online abuse, which involves amongst
other things privacy and data protection, has also been hitting the
headlines. Tragically, such online abuse can unfortunately contribute to
actual suicide. This is a particular concern in relation to children and
teenagers, but it can also affect adults.
It is also in the headlines because of public and official data protec-
tion supervisory authority (eg, ICO; Digital, Culture, Media and Sport
(DCMS) Committee) concerns with the problem of data misuse and the
damage of ‘permanent’ data online. The CJEU in the light of such con-
cerns issued an important decision in the Google Spain case involving
the Right to Erasure/Right to be Forgotten (RtbF) directing that certain
personal data online had to be deleted, following a complaint, from inter-
net search engine listing results.5 The High Court recently dealt with
RtbF in NC 1 and NC 2.6 Further RtbF cases include GC and Others,7
and Google v CNIL,8 and no doubt more will follow.
The CJEU also pronounced on the often contentious area of official
data retention. This is the obligation placed by countries on internet
service providers (ISPs) to retain certain customer data in relation to
telephone calls, internet searches, etc, so that (certain) official agencies
can ask to access or obtain copies of such data in the future. Debate
frequently surrounds whether this should be permitted at all, if so, when,
and under what circumstances, how long ISPs must store such data, the
cost of retaining same, etc. The strongest argument for an official data
retention regime may relate to the prevention or investigation of terror-
ism. Serious crime may come next. There are legitimate concerns that
the privacy and data protection costs are such that official data retention,
if permitted, should not extend to ‘common decent crime’ or unlimited
access and unlimited retention. The EU Data Retention Directive has
held invalid and similar laws in Member States including the UK have
also been invalidated, in whole or in part.9 No doubt argument, debate
5 See Google Spain SL, Google Inc v Agencia Española de Protección de Datos
(AEPD), Mario Costeja González, Court of Justice (Grand Chamber), Case C-131/12,
13 May 2014. Also see P Lambert, The Right to be Forgotten (Bloomsbury, 2019).
6 NT 1 & NT 2 v Google LLC [2018] EWHC 799 (QB).
7 GC and Others v Commission Nationale de l’Informatique et des Libertés (CNIL)
(Déréférencement de données sensibles), CJEU [2019] Case C-136/17.
8 Google LLC, successor in law to Google Inc v Commission Nationale de l’Informatique
et des Libertes (CNIL), CJEU [2019] Case C-507/17.
9 Judgment in Joined Cases C-293/12 and C-594/12, Digital Rights Ireland and
Seitlinger and Others, Court of Justice, 8 April 2014. Directive 2006/24/EC of the
European Parliament and of the Council of 15 March 2006 on the retention of data
generated or processed in connection with the provision of publicly available elec-
tronic communications services or of public communications networks and amending
5
1.03 Data Protection
Directive 2002/58/EC (OJ 2006 L105, p 54). J Rauhofer and D Mac Sithigh, ‘The
Data Retention Directive Never Existed,’ (2014) (11:1) SCRIPTed 118. The Data
Retention and Investigatory Powers Act 2014 (DRIPA 2014) was invalidated after
challenge by two MPs. This was brought in after the Directive was invalidated. The
second replacement Act (Investigatory Powers Act 2016) was also successfully chal-
lenged by Liberty. In relation to data protection as a fundamental right, see, for exam-
ple S Rodata, ‘Data Protection as a Fundamental Right,’ in S Gutwirth, Y Poullet,
P de Hert, C de Terwangne and S Nouwt, Reinventing Data Protection? (Springer,
2009) 77. A case dealing with the issue of how serious the level of crime must be in
order for law enforcement authorities to be able to access certain telecoms data is
Ministerio Fiscal, CJEU [2018] Case C-207/16.
6
The Importance of Data Protection 1.09
7
1.09 Data Protection
10 See, for example, G Martin, ‘Sony Data Loss Biggest Ever,’ Boston Herald, 27 April
2011.
11 See, for example, C Arthur, ‘Sony Suffers Second Data Breach With Theft of 25m
More User Details,’ Guardian, 3 May 2011.
12 See, for example, ‘Brown Apologises for Record Loss, Prime Minister Gordon Brown
has said he “Profoundly Regrets” the Loss of 25 Million Child Benefit Records,’ BBC,
21 November 2007.
13 See, for example, ‘Largest Ever Fine for Data Loss Highlights Need for Audited
Data Wiping,’ ReturnOnIt, at http://www.returnonit.co.uk/largest-ever-fine-for-data-
loss-highlights-need-for-audited-data-wiping.php.
14 See, for example, J Oates, ‘UK Insurer Hit With Biggest Ever Data Loss Fine,’
The Register, 24 August 2010. This was imposed by the Financial Services Authority
(FSA).
15 ICO v DSG Retail Limited [2020] 9/1/2020.
16 ICO v Cathay Pacific Airways Limited [2020] 4/3/2020.
17 ICO v Doorstep Dispensaree [2019] 20/12/2019.
18 ICO v Uber [2018] 26/11/2018.
19 ICO v Bounty (UK) Limited 11/4/2019.
8
The Data Protection Rules 1.13
9
1.13 Data Protection
29 L Costa and Y Poullet, ‘Privacy and the Regulation of 2012,’ Computer Law &
Security Review (2012) (28) 254 at 256.
10
Summary Data Protection Rules 1.19
30 Note generally, comments of the ICO in relation to Privacy by Design (PbD), and the
report Privacy by Design, at https://www.ico.org.uk.
11
1.19 Data Protection
12
General Criteria for Data Processing 1.20
34 Schrems v Commissioner, Court of Justice, Case C-362/14, 6 October 2015. The case
technically related to Prism and Facebook Europe and transfers to the US. However,
the wider import turned out to be the entire EU-US Safe Harbour Agreement and data
transfers to the US.
13
1.20 Data Protection
14
Lawful Processing 1.22
Lawful Processing
1.22 There is a prohibition on the collection and processing of p ersonal
data and special personal data unless:
●● the processing complies with the Principles of data protection; and
●● the processing comes within one of a limited number of specified
conditions (the Lawful Processing Conditions);
●● the processing must also comply with the data security requirements.
35 Note, for example, the ICO PECR security breach notifications – guidance for service
providers, at https://www.ico.org.uk.
36 The DPA and the EU data protection regime provide for codes of conduct being agreed
with national data protection authorities such as the ICO in relation to specific industry
sectors.
15
1.23 Data Protection
Definitions
1.23 The data protection regime contains a number of key d efinitions.
These are central to understanding the data protection regime, and
ultimately complying with it. These are essentially the building blocks
of the data protection regime. While these can be ‘complex concepts,’w
organisations need to fully understand them. Some examples of the
matters defined include:
●● Data Subject;
●● Controller;
●● Processor;
●● personal data;
●● processing;
●● special personal data.
The definitions are found in greater detail in Chapter 3.
16
Chapter 2
Sources of Data Protection Law
Introduction
2.01 Organisations and individuals need to consider a number of
sources of the law and policy underpinning the data protection regime.
In addition, there are a growing number of sources of interpretation and
understanding of data protection law. Reliance on the Data Protection
Act 2018 (DPA 2018) (or the EU General Data Protection Regulation
(GDPR)) alone can, therefore, be insufficient. Data protection is there-
fore arguably quite different from many other areas of legal practice.
In order to fully understand the data protection regime, one has to look
beyond the text, or first principles, of the DPA 2018.
What are the sources of data protection law and policy?
UK DPA 2018
2.02 Primarily, the data protection regime in the UK is governed
by the DPA 2018 and the GDPR (and previously EU Data Protection
Directive 1995 (DPD 1995)). (Note that Brexit will bring an end to the
direct effect of the GDPR in the UK. While this should have ceased from
31 January 2020 given the EU (Withdrawal Agreement) Act 2020 of that
date, the intention appears to be that the GDPR will continue during the
formal transition period for final negotiations with the EU, which are
(currently) scheduled to end on 31 December 2020). In addition, it is also
necessary to have regard to a number of other sources of law, policy and
the interpretation of the data protection regime, as well as any amend-
ments to same. Ultimately, Brexit will necessitate further data protection
regulation in the UK, and this will also be required to be reviewed in
addition to the DPA 2018. (See also Chapter 24 below).
17
2.03 Sources of Data Protection Law
UK Secondary Legislation
2.03 In addition to DPA 2018, various statutory instruments need to be
considered, which include:
●● Adoption Agency Regulations 1983;
●● Adoption Rules 1984;
●● Banking Coordination (Second Council Directive) Regulations
1992;
●● Civil Procedure Rules 1998;
●● Communications Act 2003;
●● Consumer Credit (Credit Reference Agency) Regulations 1977;
●● Consumer Credit (Credit Reference Agency) Regulations 2000
(repealed);
●● Consumer Protection (Distance Selling) Regulations 2000;
●● Data Protection Act 1998 (Commencement) Order 2000;
●● Data Protection Act 1998 (Commencement No 2) Order 2000;
●● Data Protection Act 1998 (Commencement No 2) Order 2008;
●● Data Protection (Corporate Finance Exemption) Order 2000
(repealed);
●● Data Protection (Conditions under paragraph 3 of Part II of
Schedule 1) Order 2000 (repealed);
●● Data Protection (Crown Appointments) Order 2000 (repealed);
●● Data Protection (Designated Codes of Practice) Order 2000;
●● Data Protection (Designated Codes of Practice) (No 2) Order 2000
(repealed);
●● Data Protection (Fees under section 19(7)) Regulations 2000;
●● Data Protection (Functions of Designated Authority) Order 2000
(repealed);
●● Data Protection (International Cooperation) Order 2000 (repealed);
●● Data Protection (Miscellaneous Subject Access Exemptions) Order
2000 (repealed);
●● Data Protection (Miscellaneous Subject Access Exemptions)
(Amendment) Order 2000;
●● Data Protection (Monetary Penalties) (Maximum Penalty and
Notices) Regulations 2010 (repealed);
●● Data Protection (Notification and Notification Fees) Regulations
2000;
●● Data Protection (Notification and Notification Fees) (Amendment)
Regulations 2001;
●● Data Protection (Notification and Notification Fees) (Amendment)
Regulations 2009;
●● Data Protection (Processing of Sensitive Personal Data) Order 2000
(repealed);
18
UK Secondary Legislation 2.03
1 The Freedom of Information and Data Protection (Appropriate Limit and Fees)
Regulations 2004.
19
2.03 Sources of Data Protection Law
20
UK Secondary Legislation 2.03
21
2.03 Sources of Data Protection Law
relation to Brexit issues and it is expected that there will be further data
protection specific secondary legislation.
22
ICO Guides 2.06
Case Law
2.05 Increasingly data protection cases (and cases which involve
direct or indirect reference to personal data and information impacting
the data protection regime) are coming to be litigated and determined
before the courts.
One of the reasons is that individuals are increasingly aware of and
concerned about their rights under the data protection regime. A further
reason is technological developments have enhanced the potential abuse
of personal data, from Spam, unsolicited direct marketing (DM), hack-
ing and data loss, phishing, email and internet scams, online abuse, data
transfers, access to personal data, etc, and litigation related to personal
data.
The case law which is relevant, whether influential or binding, to
applying and interpreting the UK data protection regime include:
●● case studies and documentation from the ICO;
●● case complaints adjudicated by the ICO and or Tribunal;
●● cases in England and Wales;
●● cases in Scotland;
●● cases in Northern Ireland;
●● EU Court of Justice cases (CJEU)(previously ECJ);
●● European Court of Human Rights (ECHR) cases;
●● relevant cases in other EU states and/or Common Law jurisdictions.
Some of the relevant cases are summarised and referenced herein. The
increasing impact of cooperation between data regulators and indeed
sometimes joint investigations, should also be considered as they become
more influential.
Indeed, as data regulator cases elsewhere can also be influential in
the subsequent investigation by the ICO of the same issues as they may
relate to UK Data Subjects. There are clear examples of corporations
being involved in data cases in more than one jurisdiction.
ICO Guides
2.06 The ICO provides a number of guides and interpretations in
relation to specific data protection issues and industry sectors. These
include guides and guidance for:
●● Brexit;
●● apps, online and electronic devices;
●● audits;
●● Big Data;
23
2.06 Sources of Data Protection Law
●● Cambridge Analytica;
●● CCTV;
●● charity;
●● child data;
●● construction blacklists;
●● credit and finance;
●● crime mapping;
●● criminal, court and police records;
●● data processing;
●● Data Protection by Design (DPbD);
●● data protection by default and by design;
●● Data Protection Officers;
●● data risk assessment and data protection impact assessments;
●● data sharing;
●● data subject access;
●● data protection – general;
●● deletion;
●● the new DPA 2018;
●● Driver and Vehicle Licensing Agency (DVLA);
●● drones;
●● education;
●● elected officials;
●● electoral register;
●● electronic communications and marketing;
●● employment;
●● encryption;
●● finance;
●● fundraising;
●● the GDPR and implications of GDPR for the UK;
●● health;
●● health records;
●● housing;
●● identity theft;
●● identity scanning;
●● international transfer;
●● marketing;
●● media;
●● monetary penalties;
●● online;
●● online and electronic devices;
●● Operation Motorman;
●● personal data;
●● political campaigning and personal data;
●● Principles of data protection;
24
Legal Textbooks 2.08
ICO Determinations
2.07 In addition, there is a body of decided decisions in relation to
complaints filed by individuals with the ICO on various issues. These
include the ICO’s Office in England and Wales8 and the ICO’s Office in
Scotland.9 They can assist in considering identical and similar situations
regarding issues of data protection compliance.10
Legal Textbooks
2.08 There are an increasing number of data protection legal textbooks
and guides. Frequently also, IT legal textbooks will have chapters or sec-
tions dedicated to data protection. Some examples of the former include:
●● Data Protection Law and Practice, Rosemary Jay (Fourth Edition);
●● Data Protection Law and Practice, Supplements, Rosemary Jay;
●● The Data Protection Officer, Profession, Rules and Role, Paul
Lambert (2017);
●● Guide to the General Data Protection Regulation: A Companion
to Data Protection Law and Practice (4th edition), Rosemary Jay,
William Malcolm, Ellis Parry, Louise Townsend, and Anita Bapat
(2017);
7 See https://ico.org.uk.
8 At https://ico.org.uk/.
9 At https://ico.org.uk/about_us/our_organisation/scotland.aspx.
10 In relation to the ICO and National Authorities generally regarding data protection
not DPD; and also Greenleaf, G, ‘Independence of Data Privacy Authorities (Part 1):
International Standards,’ Computer Law & Security Review (2012) (28) 3–13.
25
2.08 Sources of Data Protection Law
26
Legal Textbooks 2.08
27
2.08 Sources of Data Protection Law
28
EDPB 2.10
Legal Journals
2.09 There are also relevant learned journals and articles published in
relation to data protection compliance and developing data protection
issues. Some examples include:
●● Data Protection Law and Practice;
●● Communications Law;
●● Journal of Information Law and Technology;
●● Computers and Law from the Society of Computers and Law, at
www.scl.org;
●● SCRIPTed;
●● Computer Law and Security Review;
●● IT Law Today;
●● International Journal for the Data Protection Officer, Privacy
Officer and Privacy Counsel.
EDPB
2.10 In terms of the interpretation and understanding of the data pro-
tection regime in the UK, the European Data Protection Board (EDPB)
(established under Article 68 of the GDPR) is also required to be con-
sulted. (Previously this was effectively the WP29).11 This is an influen-
tial body in relation to addressing and interpreting the data protection
regime as well as problem areas in data protection practice. It is also
influential as it is comprised of members from the respective data protec-
tion authorities in the EU, including the ICO.
WP29 issued working papers, opinions and related documentation,
available at:
●● http://ec.europa.eu/justice/data-protection/article-29/documentation/
opinion-recommendation/index_en.htm.
29
2.10 Sources of Data Protection Law
Council of Europe
2.12 There are various important reference materials in relation to data
protection and privacy emanating from the Council of Europe (with over
45 Member States), such as:
●● Council of Europe Convention on data protection, No 108 of 1981;
●● Recommendation R(85) 20 on Direct Marketing;
●● Recommendation R(86) 1 on Social Security;
●● Recommendation R(97) 1 on the Media;
●● Recommendation R(97) 5 on Health Data;
●● Recommendation CM/Rec (2014)4 on electronic monitoring;
●● Democratic and effective oversight of national security services
(2015);
●● etc.
30
Other Official Sources 2.14
31
2.14 Sources of Data Protection Law
hacking, etc, and the ICO and Operation Motorman. The report and
recommendations of the Leveson Inquiry are of interest from a data
protection perspective (see below, Part 4).
Key/Topical Issues
2.15 Some of the key developments and issues which also influence
the data protection regime and how it is interpreted include:
●● data transfers, Privacy Shield and other data transfer legitimising
mechanisms;
●● data breach incidents;
●● insurance for data breach incidents;
●● preparedness and team preparations for incidents arising;
●● risk assessments;
●● data protection and privacy impact assessments;
●● mandated Data Protection Officers (DPOs) in organisations;
●● deletion, take down, erasure and the Right to be Forgotten;
●● security requirements for business;
●● employee monitoring and consent;
●● Spam and direct marketing;
●● the relationship between the Controller and the Processor, and which
relationship needs to be formalised in contract pursuant to the DPA
and GDPR;
●● disposal of computer hardware. Particular care is needed when con-
sidering the disposal of IT hardware, equipment and software. They
may still contain personal data files. This can continue to be the case
even when it appears that files have been wiped or deleted. There are
many examples accessible personal data still being available even
after it is believed to have been deleted and the device handed over
to a third part, or worse sold on. The new recipient could be able to
access the original personal data and records. This could quite easily
be a breach of a number of principles in the data protection regime.
It is always advised to take professional legal, IT and or forensic
advice when considering disposing of computer devices;
●● websites and social media compliance with the data protection
regime;
●● online abuse;
●● Internet of Things (IoT) and devices;
●● location data;
●● metadata;
●● new forms of data and personal data;
●● the ongoing ripples from the Snowden disclosures.
32
Conferences 2.18
Other Laws
2.17 Other laws can also be relevant in considering personal data and
privacy.14 Examples include:
●● IT law;
●● contract law;
●● consumer law;
●● eCommerce law;
●● financial services law;
●● health and medical law and related obligations;
●● computer crime and theft laws;
●● abuse and harassment laws;
●● insurance law;
●● travel, accommodation and hospitality law;
●● motoring law;
●● vehicle and taxi law;
●● succession law;
●● developing drone laws, licensing and regulations.
Conferences
2.18 There are a variety of conferences, annual events and training
organisations related to data protection. Some will be organised by
professional conference firms while others are non-profit technology,
legal or related organisations.
14 See review of particular laws in R Delfino, ‘European Union Legislation and Actions,’
European Review of Contract Law (2011) (7) 547–551, which includes reference to
data protection law.
33
2.19 Sources of Data Protection Law
Reference
2.19 Useful reference material is available as set out below.
The DPA 2018 at: https://www.legislation.gov.uk/ukpga/2018/12/enacted
The ICO is at: https://ico.org.uk/
The EU Commission is at: http://ec.europa.eu/justice/data- protection/
index_en.htm
The WP29 and EDPB (https://edpb.europa.eu/)
International Journal for the Data Protection Officer, Privacy Officer
and Privacy Counsel
The European Court of Justice website is at: http://europa.eu/about-eu/
institutions-bodies/court-justice/index_en.htm
Court of Justice (previously ECJ and CJEU) cases15 are at: http://
curia.europa.eu/juris/recherche.jsf? language=en
The ECHR website is at: http://echr.coe.int/Pages/home.aspx?p=home
34
Chapter 3
Definitions
Introduction
3.01 It is critical to understanding the data protection regime to know
and appreciate the definitions of key terms which underpin the legal
measures implementing the data protection regime. The definitions are
the building blocks for the data protection regime. They are contained
in the Data Protection Act 2018 (DPA 2018) (and the EU General Data
Protection Regulation (GDPR)). The definitions in the GDPR (the new
EU data protection regime) and which the DPA and UK data protection
regime should mirror, should be considered in detail. The GDPR will
also be the main EU data protection legal measure for many years to
come.
The various definitions are referred to below.
DPA Definitions
3.02 Section 1 of DPA 2018 sets out the following definitions:
35
3.02 Definitions
36
DPA Definitions 3.02
37
3.03 Definitions
GDPR Definitions
3.03 Article 4 of the new GDPR sets out the definitions for the new
data protection regime as follows:
38
GDPR Definitions 3.03
39
3.03 Definitions
40
GDPR Definitions 3.03
41
3.03 Definitions
42
Two Categories of Personal Data 3.05
43
3.05 Definitions
44
Two Categories of Personal Data 3.06
45
3.06 Definitions
Conclusion
3.07 It is important for organisations to distinguish, in advance of
collecting personal data, whether the proposed data collection relates to
general personal data or special personal data. They also need to be able
to confirm compliance procedures in advance of collecting and maintain-
ing personal data and particularly sensitive personal data. The organi-
sation could be asked to demonstrate at a future date that it obtained
consent, and general compliance. If it cannot, it may have to delete the
data, have committed breaches and offences, and potentially face fines
and or being sued by the Data Subject. Depending on the circumstances,
personal liability can also arise.
46
Chapter 4
History and Data Protection
Introduction
4.01 The legal discussion in relation to privacy is frequently linked
to the Warren and Brandeis’s legal article in 1890 entitled ‘The Right to
Privacy’ published in the Harvard Law Review.1 Arguably, data protection
is the modern coalface of the debate in relation to privacy and privacy
protection.2 The data protection regime can be considered as setting
standards in certain areas of informational privacy protection – which
have come to be followed in other jurisdictions internationally beyond
the EU.3 There have also been calls for international level data protection
rules.4 Certainly, if this was to come to pass, it could add greater certainty
for both organisations, industry and individual Data Subjects. Arguably
the pressure for better and more international standards is increas-
ing. While privacy discussion has progressed steadily since 1890, this
has sped up significantly with the advent of the consumer computer and
electronic storage, and has reached sometimes dizzying speeds with
modern internet iterations and associated uses.
1 S Warren and L Brandeis, ‘The Right to Privacy,’ Harvard Law Review (1890)
(IV) 193.
2 See JB Rule and G Greenleaf, eds, Global Privacy Protection – The First Generation
(Cheltenham: Elgar, 2008).
3 See M Birnhack, ‘The EU Data Protection Directive: An Engine of a Global Regime,’
Computer Law & Security Report (2008) (2) 508, at 512.
4 On the topic of international data protection issues, see, for example, C de Terwangne,
‘Is a Global Data Protection Regulatory Model Possible?’ in S Gutwirth, Y Poullet,
P de Hert, C de Terwange and S Nouwt, Reinventing Data Protection? (Springer,
2009), p 175; and C Kuner, ‘Developing an Adequate Legal Framework for
International Data transfers,’ in S Gutwirth, Y Poullet, P de Hert, C de Terwange and
S Nouwt, Reinventing Data Protection? (Springer, 2009), p 263.
47
4.02 History and Data Protection
5 P Carey, Data Protection, A Practical Guide to UK and EU Law (Oxford: OUP, 2009)
1. Also, Bainbridge, D, Data Protection (CLT, 2000) 2.
6 L AC MacDonald, Lynda, Data Protection: Legal Compliance and Good Practice
for Employers (Tottel, 2008), p 33.
7 RI D’Afflitto, ‘European Union Directive on Personal Privacy Rights and Computer-
ised Information,’ Villanova Law Review (1996) (41) 305–324.
8 Council of Europe Convention for the Protection of Individuals with Regard to
Automatic Processing of Personal Data Done at Strasbourg on the 28 January 1981,
at http://conventions.coe.int/Treaty/en/Treaties/Html/108.htm. Also, ‘Convention for
the Protection of Individuals with Regard to Automatic Processing of Personal Data,’
International Legal Materials (1981) (20) 317–325.
9 See generally P Carey, Data Protection, A Practical Guide to UK and EU Law
(Oxford, OUP, 2009) chapter 1.
48
History of Data Protection 4.02
49
4.02 History and Data Protection
50
Legal Instruments 4.05
Legal Instruments
4.04 The introduction or Recitals to the European legal instruments,
while not legally binding like the main text of the provisions, are still
influential in terms of interpreting the data protection regime, and also
highlight some of the history, philosophy and policy behind particular
data protections laws and provisions.
GDPR Recitals
4.05 The final version of the GDPR was agreed in December 2015
by the tripartite group and passed by the EU Parliament in April 2016.
From the date of publication in the Official Journal (4 May 2016) there is
a two year implementation period for organisations – and states in terms
of any amendments required to national legislation. The Recitals include
the following:
DPD Repealed
DPD 1995 is repealed; Commission decisions based on the DPD 1995
remain until replaced (Recital 171); and Directive 2002/58/EC15 is to be
updated following the GDPR (Recital 173).
14 There was also a previous Data Protection Act in the UK, namely, the Data Protection
Act 1984. The DPA of 1998 repealed the DPA of 1984. The DPA was passed into law
on 1 March 2000 pursuant to the Data Protection Act (Commencement) Order 2000,
SI 2000/183.
15 Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002
concerning the processing of personal data and the protection of privacy in the elec-
tronic communications sector (Directive on privacy and electronic communications).
51
4.05 History and Data Protection
WP29/EDPB
Establishment of European Data Protection Board (EDPB) which is the
effective equivalent of WP29 under the DPD 1995 (Recital 139).
Background and Rationale
Personal data protection is (now) a fundamental right;16 Article 8(1) of
the Charter of Fundamental Rights of the EU and Article 16(1) of the
Treaty (Recital 1); data processing should be designed to serve mankind;
balanced with other fundamental rights; principle of proportionality
(Recital 4); internal market and cross border transfers (Recital 6); rapid
technological developments and challenges (Recital 6); developments
require a strong and more coherent data protection framework (Recital 7);
the DPD 1995 has not prevented fragmentation in how data protection is
implemented (Recital 9); the need to ensure a consistent and high level
of protection and to remove obstacles to data flows (Recital 10); the
need for a consistent level of protection throughout the EU (Recital 13);
the GDPR protects natural persons and their personal data (Recital 12);
protections should be technologically neutral (Recital 15).
Obligations
Data processing must be lawful and fair (Recital 39); processing n ecessary
for a contract (Recital 44); processing for a legal o bligation (Recital 45);
processing necessary to protect life (Recital 46); the legitimate interests
of the Controller (Recital 47).
Security
Network and information security, Computer Emergency Response
Teams (CERTs) and Computer Security Incident Response Teams
(CSIRTs) (Recital 49); appropriate technical and organisational meas-
ures (Recitals 81, 87); security and risk evaluation (Recital 90); high
risk (Recital 84); impact assessments (Recitals 84, 90, 91, etc); large
scale processing operations (Recital 91); consultations (Recital 94); data
breach and data breach notification (Recitals 85, 86); and Commission
delegated acts.
52
Legal Instruments 4.05
Processing
Processing; pseudonymised data (Recitals 26, 28, 29); online identifiers
(Recital 30); consent (Recitals 32, 38, 40, 42, 43, 44, 50) lawful p rocessing
and consent (Recital 40); principle of transparency (Recital 39, 58, 60, 71);
children (Recital 38); processing for (additional) other purposes (Recital 50);
genetic data (Recital 34); health data (Recital 35); sensitive personal data
(Recitals 51, 52, 53, 54); additional identifying information (Recital 57);
processing and electoral activities (Recital 56); religious associations
(Recital 55); processing and direct marketing (Recital 70); right not to
be subject to a decision; automated processing (Recital 68, 71); profiling
(Recitals 70, 72); restrictions on principles and rights (Recital 73); respon-
sibility and liability of Controllers (Recital 74); risks (Recitals 75, 76, 83,
84, etc); Processors and Controllers (Recitals 79, 81, 82, etc); Codes of
Conduct (Recital 98); transparency and certification mechanisms (Recitals
99, 100); penalties and fines (Recital 148); criminal sanctions (Recital 149);
employee data (Recital 155); public authorities; processing in the public
interest or official authority; processing and public interest, scientific and
historical research purposes, statistical purposes, safeguards; archiving
purposes; scientific research purposes; historical research purposes; medi-
cal research purposes; statistical purposes; religious organisations.
Rights
Data Subject rights (Recital 59); principles of fair and transparent pro-
cessing (Recital 60); prior information requirements (Recital 61); right
of access (Recital 63); right of rectification and right to be forgotten
(RtbF) (Recital 65); right to complain (Recital 141); automated process-
ing (Recital 68).
Proceedings
Proceedings against Controllers, Processors and jurisdiction (Recitals
145, 146); damages and compensation (Recital 146); the prevention,
investigation, detection or prosecution of offences.
Establishment
Establishment (Recitals 22, 23, 36); groups of undertakings (Recital 37);
establishment (Recital 36, etc).
Transfers
Cross border data transfers (Recital 101, etc).
ICO and Supervisory Authorities
Supervisory authorities such as the ICO (SAs) (previously called data
protection authorities (DPAs) and the complete independence of SAs
(Recitals 117, etc).
53
4.05 History and Data Protection
New Bodies
Data protection not-for-profit bodies, organisations and associations
(Recital 142).
Notification/Registration Replaced
Replacement of ‘general’ notification/registration requirement (Recital 89).
Exceptions/Exemptions
The GDPR does not address national security (Recital 16); the GDPR
should not apply to data processing by a natural person in the course of
a purely personal or household activity and thus without a connection
with a professional or commercial activity (Recital 18); without preju-
dice to eCommerce Directive17 in particular eCommerce defences of
Articles 12–15 (Recital 21); the GDPR does not apply to the data of the
deceased (Recital 27). (Also fanpage case, ECJ C-210/16, June 2018).
Lawful Processing and Consent
Lawful processing and consent (Recital 40).
Online Identifiers
Online identifiers (Recital 30).
Sensitive Personal Data
Sensitive personal data and special categories of personal data (Recitals
10, 51, 53).
Children and Personal Data
Processing of children’s personal data (Recitals 38, 58, 65, 71, 75).
Health Data
Health data processing (Recitals 35, 45, 52, 53, 54, 63, 65, 71, 73, 75,
91, 112, 155, 159).
GDPR
General Provisions
4.06 The initial provisions refer to the context of the GDPR, namely,
the subject matter and objectives (Article 1); material scope (Article 2);
and territorial scope (Article 3).
17 Directive 2000/31/EC.
54
GDPR 4.07
55
4.07 History and Data Protection
56
GDPR 4.08
57
4.08 History and Data Protection
Conclusion
4.10 Privacy and data protection are evolving in terms of how technol-
ogy is changing how personal data are collected, used and processed.
The prior data protection legal regime is perceived as requiring updating.
The DPD was enacted in 1995, prior to social media, cloud computing,
mass data storage, data mining, electronic profiling, Web 2.0 and the
threats to the data security surrounding personal data. This was even
before the spotlight centred on abuse issues. Data protection needs to
evolve to deal with, or at least more explicitly deal with, these issues.
This is partly the reason for the new GDPR.
This is important for the issues it addresses as well as the current
legal provisions it enhances. As a Regulation as opposed to a Directive,
58
Conclusion 4.10
59
60
Chapter 5
Principles
Introduction
5.01 All organisations which collect and process personal data must
comply with the obligations of the UK data protection regime. It is,
therefore, very important to be familiar with the data protection regime.
This is set out in the new Data Protection Act 2018 (DPA 2018) (and the
EU General Data Protection Regulation (GDPR)).
61
5.02 Principles
62
Principles of Data Protection 5.04
63
5.04 Principles
64
Chapter 6
Ordinary Personal Data
Lawful Processing Conditions
Introduction
6.01 Organisations when obtaining and processing personal data
must not mislead and must also provide a number of prior information
requirements to the individual Data Subjects.
Without these it would be deemed that there is unfair obtaining and
processing. In addition, organisations must satisfy and meet one of the
Lawful Processing Conditions for lawful processing.
65
6.02 Ordinary Personal Data Lawful Processing Conditions
66
Special Personal Data Lawful Processing Conditions 6.03
67
6.03 Ordinary Personal Data Lawful Processing Conditions
68
Chapter 7
Processing Pre-Conditions:
Prior Information Requirements
and Transparency
Introduction
7.01 Organisations, even prior to obtaining and processing personal
data, are generally obliged to provide certain information to individual
Data Subjects. The data protection regime places great emphasise on the
need for transparency. While of course transparency in an ongoing obli-
gation throughout the data lifecycle, there is particular need to achieve
transparency through the use of providing specified details and informa-
tion prior to the initial data collection. This is in order that Data Subjects
can be properly informed, and can decide whether to consent or not, to
the proposed data collection and data processing. Problems can arise if
the Data Subject or a data regulator suggests that there is no valid collec-
tion of consent because there was either no prior information provided,
or the information provided was incorrect or vague in some way.
69
7.03 Processing Pre-Conditions
Where personal data relating to a Data Subject are collected from the
Data Subject, the Controller shall, at the time when personal data are
obtained, provide the Data Subject with the following information:
●● the identity and the contact details of the Controller and, and where
applicable, of the Controller’s representative;
●● the contact details of the DPO, where applicable;
●● the purposes of the processing for which the personal data are
intended as well as the legal basis for the processing;
●● where the processing is based on Article 6(1)(f), the legitimate inter-
ests of the Controller or by a third party;
●● the recipients or categories of recipients of the personal data, if any;
●● where applicable, that fact that the Controller intends to transfer per-
sonal data to a third country or international organisation and the
existence or absence of an adequacy decision by the Commission,
or in case of transfers referred to in Article 46 or 47, or the second
subparagraph of Article 49(1), reference to the appropriate or suit-
able safeguards and the means to obtain a copy of them or where
they have been made available (Article 13(1)).
In addition to the information referred to in Article 13(1), the Control-
ler shall, at the time when personal data are obtained, provide the Data
Subject with the following further information necessary to ensure fair
and transparent processing:
●● the period for which the personal data will be stored, or if this is not
possible, the criteria used to determine that period;
●● the existence of the right to request from the Controller access to and
rectification or erasure of the personal data or restriction of process-
ing concerning the Data Subject or to object to processing as well as
the right to data portability;
●● where the processing is based on Article 6(1)(a) or Article 9(2)(a),
the existence of the right to withdraw consent at any time, without
affecting the lawfulness of processing based on consent before its
withdrawal;
●● the right to lodge a complaint to a supervisory authority;
●● whether the provision of personal data is a statutory or contractual
requirement, or a requirement necessary to enter into a contract, as
well as whether the Data Subject is obliged to provide the data and
of the possible consequences of failure to provide such data;
●● the existence of automated decision-making including profiling,
referred to in Article 22(1) and (4), and at least in those cases, mean-
ingful information about the logic involved, as well as the signifi-
cance and the envisaged consequences of such processing for the
Data Subject (Article 13(2)).
70
Prior Information Requirements under the EU (GDPR) 7.04
Where the Controller intends to further process the data for a purpose
other than that for which the personal data were collected, the Controller
shall provide the Data Subject prior to that further processing with infor-
mation on that other purpose and with any relevant further information
as referred to in Article 13(2) (Article 13(3)).
Article 13(1), (2) and (3) shall not apply where and insofar as the Data
Subject already has the information (Article 14(5)).
Indirectly Obtained Data
7.04 Article 14 refers to information to be provided where the personal
data have not been obtained from the Data Subject.
Where personal data have not been obtained from the Data Subject, the
Controller shall provide the Data Subject with the following information:
●● the identity and the contact details of the Controller and, where
applicable, of the Controller’s representative;
●● the contact details of the DPO, where applicable;
●● the purposes of the processing for which the personal data are
intended as well as the legal basis for the processing;
●● the categories of personal data concerned;
●● the recipients or categories of recipients of the personal data, if any;
●● where applicable, that the Controller intends to transfer personal
data to a recipient in a third country or international organisation
and the existence or absence of an adequacy decision by the Com-
mission, or in case of transfers referred to in Article 46 or 47, or the
second subparagraph of Article 49(1), reference to the appropriate or
suitable safeguards and the means to obtain a copy of them or where
they have been made available (Article 14(1)).
In addition to the information referred to in Article 14(1), the Controller
shall provide the Data Subject with the following information necessary
to ensure fair and transparent processing in respect of the Data Subject:
●● the period for which the personal data will be stored, or if this is not
possible, the criteria used to determine that period;
●● where the processing is based on Article 6(1)(f), the legitimate inter-
ests pursued by the Controller or by a third party;
●● the existence of the right to request from the Controller access to and
rectification or erasure of personal data or restriction of processing
concerning the Data Subject and to object to the processing as well
as the right to data portability;
●● where the processing is based on Article 6(1)(a) or Article 9(2)(a),
the existence of the right to withdraw consent at any time, without
affecting the lawfulness of processing based on consent before its
withdrawal;
71
7.04 Processing Pre-Conditions
72
Conclusion 7.05
Conclusion
7.05 Organisations also need to be aware that if their data pro-
cessing, data collection, or consent gathering processes are ever
challenged in future, they need to be in a position to not only demon-
strate a record of the consent, but also a record of all of the informa-
tion, notices, etc as existed immediately prior to the collection event.
This can be difficult as the prior information record is separate to the
consent record. In addition, any large organisation will have to maintain
these records for thousand or even millions of individuals. In addition,
these records and policies will change over time, and so the organisa-
tion will need to maintain a record of which version is attached to which
consent; when policies or prior information and documentation versions
changed, etc. One can appreciate, therefore, that these required tasks are
not without a level of complexity. Critical, however, is that if a problem
arises with having prior information, or properly recording it, difficult
issues arise as to whether any associated consent can be relied upon.
73
74
Chapter 8
Exemptions
Introduction
8.01 In considering compliance obligations it is also important to
consider the exemptions that may apply. These are important as there
are a significant number of adaptations and exemptions from the EU
General Data Protection Regulation (GDPR) in the Data Protection
Act 2018 (DPA 2018).
The final suite of UK data protection legislation, including the so-
called UK-GDPR, will need careful analysis as this may contain further
amendments from the GDPR than are set out in the DPA 2018 itself, as
well as the important issue of exemptions from the GDPR and or the
data protection regime (whether in whole or in part on specific issues).
These may also be potentially difficult to track given that already the
DPA 2018 is a complex piece of legislation itself, and encompasses not
just data protection and aspects of GDPR-data protection, but included
other issues in addition.
Separately, the Leveson Report in considering the journalism
‘exemption’ in the Data Protection Act 1998 (DPA 1998), suggested
that it may have been too widely drafted, and also considered the his-
tory of the particular section. The Report has suggested that the DPA
be amended to ensure a more balanced journalism exemption provision.
The interface with the erasure and forgetting right will also be important.
75
8.02 Exemptions
1 Directive 2000/31/EC.
76
Conclusion 8.05
Conclusion
8.05 The exemptions are important when and where applicable. They
will often be more relevant to particular sectors. Generally, the exemp-
tions appear to be less litigated than other areas of data protection. The
UK’s derogations or amendments from aspects of the GDPR also need
to be considered by particular organisations and sectors depending on
the issue at hand. Organisations need to start with the GDPR, but then
check the DPA 2018 in case there were amendments made which affect
the issue.
In addition, depending on when the particular issue under consid-
eration arose or was initiated, it may come to be considered under the
DPA 1998 (under transitional provisions) or DPA 2018. If certain issues
started prior to the DPA 2018, the transitional provisions may mean that
the old rules continue to apply for the particular issue, as it is considered
as already in process.2
As with any legislation, it is as important for what it encompasses as
well as what it may exclude. The post-Brexit UK data protection regime
obviously requires scrutiny of each.
77
78
Chapter 9
Individual Data Subject Rights
Introduction
9.01 The data protection regime provides, or enshrines, a number of
rights to individuals in relation to their informational data and informa-
tional privacy. Transparency and consent are very important aspects of
respecting and enabling such fundamental rights to be vindicated, uti-
lised and enforced by Data Subjects. Individual Data Subjects have a
right of access to personal data. There are also time limits to be com-
plied with by a Controller in relation to replying to a Data Subject access
request (ie a request to access or obtain a copy of their personal data that
the organisation holds).
Individuals also have a right to prevent data processing for direct
marketing (DM) purposes.
The individual Data Subject has a right to prevent processing likely to
cause damage or distress.
A further right relates to automated decision taking, which relates to
automated decisions being taken without human oversight or interven-
tion. The traditional example often used is adverse credit decisions being
taken automatically. However, it can equally encompass such adverse
decisions and activities as so called neutral algorithmic processing and
arranging of information and result outputs. Examples could include
search rankings and priorities; search suggestions; search prompts; auto-
suggest; autocomplete; etc. Other examples could arise in relation to
profiling and advertising related activities.
Importantly, individual Data Subjects have specific rights in relation
to rectification, blocking, erasure and destruction and what is becoming
known as the Right to be Forgotten (RtbF). This has added significance
79
9.01 Individual Data Subject Rights
and attention following the Court of Justice decision in the RtbF land-
mark case of Google Spain.1
Individual Data Subjects are also entitled to compensation and dam-
ages, as well as being entitled to complain to the ICO and to the courts
to obtain judicial remedies.
The new EU General Data Protection Regulation (GDPR) refers to
Data Subject rights; principles of fair and transparent processing; prior
information requirements; right of access; right of rectification and right
to be forgotten (RtbF); right to complain to single supervisory author-
ity; automated processing. The difficulty, however, in dealing with
Data Subject rights is that the rights set out in the GDPR have many
derogations, amendments and exemptions set out in the Data Protection
Act 2018 (DPA 2018). These are not always easy to immediately discern
given the complexity of the DPA 2018, including the extensive materials
included in the Schedules to the Act.
Organisations should note that the new data protection regime is
important for creating a number of new rights, and for expanding or
strengthening some of the existing rights. In addition, organisations are
also required to notify the existence of certain rights to Data Subjects.
This can therefore create consequential issues where a required notifica-
tion has not been provided to the individual. Ultimately, such a failing
may feature in complaints with the data regulator or in separate court
related litigation.
80
Rights for Individual Data Subjects 9.03
●● collected for specified, explicit and legitimate purposes and not fur-
ther processed in a way incompatible with those purposes; further
processing for archiving purposes in the public interest, scientific
and historical research purposes or statistical purposes shall, in
accordance with Article 89(1), not be considered incompatible with
the initial purposes (‘purpose limitation’);
●● adequate, relevant and limited to what is necessary in relation to the
purposes for which they are processed (‘data minimisation’);
●● accurate and, where necessary, kept up to date; every reasonable step
must be taken to ensure that personal data that are inaccurate, having
regard to the purposes for which they are processed, are erased or
rectified without delay (‘accuracy’);
●● kept in a form which permits identification of Data Subjects for no
longer than is necessary for the purposes for which the personal data
are processed; personal data may be stored for longer periods insofar
as the data will be processed solely for archiving purposes in the
public interest, scientific or historical research purposes or statistical
purposes in accordance with Article 89(1) subject to implementation
of the appropriate technical and organisational measures required by
the GDPR in order to safeguard the rights and freedoms of the Data
Subject (‘storage limitation’);
●● processed in a manner that ensures appropriate security of the per-
sonal data, including protection against unauthorised or unlawful
processing and against accidental loss, destruction or damage, using
appropriate technical or organisational measures (‘integrity and
confidentiality’).
The Controller must be responsible for and be able to demonstrate com-
pliance (‘accountability’).
81
9.03 Individual Data Subject Rights
The data protection rights enshrined in the data protection regime for
individuals are set out in the data protection Principles and elsewhere in
the data protection rules. They include the following:
●● individuals have a right to be informed by organisations as to their
identity when they are collecting and processing the individual’s
personal data;
●● the organisation must disclose to the individual the purpose for
which it is collecting and processing the individual’s personal
data;
●● if the organisation is forwarding on the personal data to third party
recipients, it must disclose this to the individual as well as iden-
tify the third party recipients. If it is permitted to transfer the per-
sonal data outside of the country, the organisation must then also
identify which third party country will be receiving the personal
data;
●● organisations must answer and comply with requests from the indi-
vidual in relation to their data protection rights.
This includes requests for access to a copy of the personal data held
in relation to the individual. This is known as a personal data access
request.
The rights of Data Subjects can be summarised as including:
●● right of access;
●● right to establish if personal data exists;
●● right to be informed of the logic in automatic decision taking;
●● right to prevent processing likely to cause damage or distress;
●● right to prevent processing for direct marketing;
●● right to prevent automated decision taking;
●● right to damages and compensation;
●● right to rectify inaccurate data;
●● right to rectification, blocking, erasure and forgetting, and
destruction;
●● right to notification of erasure and for getting to third parties, etc;
●● right to complain to ICO;
●● right to go to court.
As indicated above, there can also be other obligations which may
be interpreted in a rights lens, such as the need for individuals to be
appraised of certain of their rights. A Data Subject may wish to complain
where they have not been furnished with this information.
82
Access Right under the DPA 2018 9.05
Recipients of Right
9.04 The data protection rights apply generally in relation to any indi-
viduals whose personal data are being collected and processed. Specifi-
cally, it can include:
●● employees;
●● other workers such as contractors, temps, casual staff;
●● agency staff;
●● ex-employees and retired employees;
●● spouses and family members;
●● job applicants, including unsuccessful applicants;
●● volunteers;
●● apprentices and trainees;
●● customers and clients;
●● prospective customer and clients;
●● suppliers;2
●● members;
●● users;
●● any other individuals.
83
9.05 Individual Data Subject Rights
relating to them such as, for example, performance at work, credit wor-
thiness, reliability or conduct, has constituted or is likely to constitute the
sole basis for any decision significantly affecting them, to be informed
by the Controller of the logic involved in that decision-taking.
It is important to consider that being informed only verbally may not
always, or at all, be a proper vindication of the Data Subject’s access
right. This is particularly so where large sets of personal data, or com-
plex details involving personal data, are involved. Generally, personal
data is provided in hardcopy. However, in particular circumstances,
certain Controllers prefer to furnish personal data in electronic format
where large volumes of materials are involved. If a Controller was to
refuse to furnish the personal data required, on the basis that it had ver-
bally communicated same, this would jar with the accepted understand-
ing of the data access right. It could also be argued that the Controller
was not allowing access to the personal data to be effectively and prop-
erly given. Note, however, the case of Durham County Council v Dunn
[2012] EWCA Civ 1654, which while acknowledging the legitimacy of
copies of documents, appears to suggest that other avenues also arise.
An organisation should be cautious in embarking in data access disclo-
sures other than in a documented and written manner. It is clearly the
case that an organisation has an obligation to be able to demonstrate
its compliance with access requests which includes maintaining written
procedures and records. Some would also query whether interpreting the
data access right as some sort of a data communicated right as appears
to be suggested in part of Durham as compatible with the Data Protec-
tion Act 1998 (DPA 1998), the DPA 2018 and now the GDPR (refer-
ring to electronic access). Organisations should note that responses to
data access request can be responded to electronically. Indeed, under the
GDPR there is an enhanced ability for Data Subject to request that the
responses be electronic.
Recent cases of also refer to data access right issues. In one case a
town clerk was prosecuted for frustrating and blocking an access issue,
and ultimately facilitating the deletion of records in order that they not
be available to be furnished.3 Hudson Bay Finance was served with an
official Enforcement Notice for failing to fulfil the data access right.4
The London Borough of Lewisham was also issued with an Enforcement
Notice over data access right issues.5
84
Access Right 9.06
Access Right
Access Right under the GDPR
9.06 Article 15 of the GDPR relates to the right of access for the Data
Subject.
The Data Subject shall have the right to obtain from the Controller
confirmation as to whether or not personal data concerning them are
being processed, and where that is the case, access to the personal data
and the following information:
●● the purposes of the processing;
●● the categories of personal data concerned;
●● the recipients or categories of recipient to whom the personal data
have been or will be disclosed, in particular recipients in third coun-
tries or international organisations;
●● where possible, the envisaged period for which the personal data
will be stored, or, if not possible, the criteria used to determine that
period;
●● the existence of the right to request from the Controller rectifica-
tion or erasure of personal data or restriction of the processing
of personal data concerning the Data Subject or to object to such
processing;
●● the right to lodge a complaint with a supervisory authority;
●● where the personal data are not collected from the Data Subject, any
available information as to their source;
●● the existence of automated decision making including profiling
referred to in Article 22(1) and (4) and at least in those cases, mean-
ingful information about the logic involved, as well as the signifi-
cance and the envisaged consequences of such processing for the
Data Subject (Article 15(1)).
Where personal data are transferred to a third country or to an interna-
tional organisation, the Data Subject shall have the right to be informed
of the appropriate safeguards pursuant to Article 46 relating to the trans-
fer (Article 15(2)).
The Controller shall provide a copy of the personal data undergoing
processing. For any further copies requested by the Data Subject, the
Controller may charge a reasonable fee based on administrative costs.
Where the Data Subject makes the request in electronic means, and
unless otherwise requested by the Data Subject, the information shall be
provided in a commonly used electronic form (Article 15(3)).
The right to obtain a copy referred to in paragraph 3 shall not adversely
affect the rights and freedoms of others (Article 15(4)).
85
9.07 Individual Data Subject Rights
6 R Morgan and R Boardman, Data Protection Strategy (Sweet & Maxwell, 2003) 252.
7 Data Protection Good Practice Note, Checklist for Handling Requests for Personal
Information (subject access requests), ICO, at https://ico.org.uk.
86
Access Right 9.07
4 Fee?
No – Go to 5.
Yes – Note, that there are restricted circumstances when a fee may
be charged. Go to 5.
5 Does the organisation hold any information about the person?
No – If one holds no personal information at all about the individual
one must tell them this.
Yes – Go to 6.
6 Will the information be changed between receiving the request and
sending the response?
No – Go to 7.
Yes – One can still make routine amendments and deletions to per-
sonal information after receiving a request. However, one must not
make any changes to the records as a result of receiving the request,
even if one finds inaccurate or embarrassing information on the
record. Go to 7.
7 Does it include any information about other people?
No – Go to 8.
Yes – One will not have to supply the information unless the other
people mentioned have given their consent, or it is reasonable to
supply the information without their consent. Even when the other
person’s information should not be disclosed, one should still sup-
ply as much as possible by editing the references to other people.
Go to 8.
8 Is the organisation obliged to supply the information?
No – If all the information held about the requester is exempt, then
one can reply stating that one does not hold any of their personal
information required to be revealed.
Yes – Go to 9.
9 Does it include any complex terms or codes?
No – Go to 10.
Yes – One must make sure that these are explained so the informa-
tion can be understood. Go to 10.
10 Prepare the response.8
Note that data access rights must be fulfilled within a specified time-
frame. The ICO has recently updated its guidance on the operation of the
time limit for fulfilling the data access right. (See Chapter 10 for further
details on the time limits, and the ICO’s updated guidance.)
8 See above.
87
9.08 Individual Data Subject Rights
88
GDPR: Rectification and Erasure 9.10
Article 17(1) and (2) shall not apply to the extent that processing is
necessary:
●● for exercising the right of freedom of expression and information;
●● for compliance with a legal obligation which requires processing by
EU or state law to which the Controller is subject or for the perfor-
mance of a task carried out in the public interest or in the exercise of
official authority vested in the Controller;
●● for reasons of public interest in the area of public health in accord-
ance with Article 9(2)(h) and (i) as well as Article 9(3);
●● for archiving purposes in the public interest, scientific or histori-
cal research purposes or statistical purposes in accordance with
Article 89(1) in so far as the right referred to in para 1 is likely to
render impossible or seriously impair the achievement of the objec-
tives of that processing;
●● for the establishment, exercise or defence of legal claims
(Article 17(3)).
Synodinou10 refers to the ‘right to oblivion’ and notes in relation to her
research that media rights are not immune to the right to be forgotten.
Examples are given where cases have been successful in preventing par-
ticular media stories dragging up past events long after they had occurred,
including court cases.11 Indeed, many countries already obscure party
names from decisions and judgments so as to render them anonymous,
such as in Germany, Austria, Greece, Finland, Belgium, Hungary, the
Netherlands, Poland and Portugal.12 The right to be forgotten has also
been recognised in France and Belgium.13 UK cases have also granted
anonymity to the Plaintiff,14 as did the Canadian Supreme Court in an
online abuse case.15 To be successful, however, it can be important to
change party initials.16
89
9.11 Individual Data Subject Rights
90
Automated Individual Decision Making Right 9.15
91
9.15 Individual Data Subject Rights
17 Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002
concerning the processing of personal data and the protection of privacy in the elec-
tronic communications sector (Directive on privacy and electronic communications).
92
Compensation for Data Subjects 9.17
freedoms and legitimate interests, at least the right to obtain human inter-
vention on the part of the Controller, to express their point of view and
to contest the decision (Article 22(3)).
Decisions referred to in paragraph (2) shall not be based on special cat-
egories of personal data referred to in Article 9(1), unless Article 9(2)(a)
or (g) apply and suitable measures to safeguard the Data Subject’s rights
and freedoms and legitimate interests are in place (Article 22(4)).
The EDPB has adopted and endorsed the following earlier WP29
guidance:
●● Guidelines on automated individual decision making and profiling
for the purposes of Regulation 2016/679, WP251 rev.01.
93
9.17 Individual Data Subject Rights
The ICO also fined the promoters behind a Spam company a total of
£440,000.21 A managing director has also been personally prosecuted
individually – ie separate and apart from the company entity.22
The area of compensation and civil litigation in vindication of data
protection rights will continue to develop. While the scale of monetary
claims, and awards, can differ as between the US and the UK, it is noted
that one defendant was happy to settle one such case for approx $20 m.23
It is possible that Data Subjects, and indeed Data Subjects who have
not suffered financial loss, can still suffer damage and be awarded com-
pensation or damages. Indeed, the Digital, Culture, Media and Sport
(DCMS) Committee when considering social media and related issues
refers to the existence of ‘online harms’.24
As data fines will no doubt increase, so too will the level of compensa-
tion and damages which may arise for an organisation, albeit that in the
context of individual Data Subjects such compensation will likely trail
the level of monetary data fines. Arguably levels of compensation and
damages have been artificially low. This can partly be explained by a
lack of familiarity with the concepts of data protection, and what some
may have seen as a certain novelty element. There have also been some
robust defence arguments raised on occasion. However, there have also
been some untenable defence arguments raised – but which have not
always been recognised as such. On the plaintiff side, it sometimes also
helps not to appear as the proverbial ambulance chaser. One should also
recall that while compensation and damages are provided for, it may
not be beneficial to present this as the first remedy being sought. After
all, there are many valuable reliefs and remedies available which can
be important solutions for individuals. It is appropriate to seek compen-
sation, but it is sometimes wise not to leave this as the only remedy
or primary remedy being sought. Overall, however, one can expect the
jurisprudence of compensation to develop sigificantly over the com-
ing years. After all, in many respects the research of the damage that
can arise from misuse, loss, and lack of data security is really only now
reaching wider understanding.
94
Jurisdiction 9.19
Jurisdiction
9.19 GDPR Recital 22 states that any processing of personal data
in the context of the activities of an establishment of a Controller or
a Processor in the Union should be carried out in accordance with the
GDPR, regardless of whether the processing itself takes place within
the EU. Establishment implies the effective and real exercise of activ-
ity through stable arrangements. The legal form of such arrangements,
whether through a branch or a subsidiary with a legal personality, is not
the determining factor in this respect.
GDPR Recital 23 states that in order to ensure that natural persons
are not deprived of the protection to which they are entitled under the
GDPR, the processing of personal data of Data Subjects who are in
the EU by a Controller or a Processor not established in the EU should
be subject to the GDPR where the processing activities are related to
the offering of goods or services to such Data Subjects irrespective of
whether connected to a payment. In order to determine whether such a
Controller or Processor is offering goods or services to Data Subjects
who are in the EU, it should be ascertained whether it is apparent that
the Controller or Processor envisages offering services to Data Subjects
in one or more states in the EU. Whereas the mere accessibility of the
Controller’s, Processor’s or an intermediary’s website in the Union, of an
email address or of other contact details, or the use of a language gener-
ally used in the third country where the controller is established, is insuf-
ficient to ascertain such intention, factors such as the use of a language
or a currency generally used in one or more states with the possibility
of ordering goods and services in that other language, or the mentioning
of customers or users who are in the EU, may make it apparent that the
controller envisages offering goods or services to such Data Subjects in
the EU.
Section 180 of the DPA 2018 refers to certain jurisdiction and jurisdic-
tion of court issues. Section 207 refers to the territorial application of the
DPA 2018.
95
9.20 Individual Data Subject Rights
Complaints to ICO
9.20 GDPR Recital 141 states that every Data Subject should have the
right to lodge a complaint with a single supervisory authority, in particu-
lar in the state of their habitual residence, and the right to an effective
judicial remedy in accordance with Article 47 of the Charter if the Data
Subject considers that their rights under the Regulation are infringed or
where the supervisory authority does not act on a complaint, partially
or wholly rejects or dismisses a complaint or does not act where such
action is necessary to protect the rights of the Data Subject. The inves-
tigation following a complaint should be carried out, subject to judicial
review, to the extent that is appropriate in the specific case. The super-
visory authority should inform the Data Subject of the progress and the
outcome of the complaint within a reasonable period. If the case requires
further investigation or coordination with another supervisory authority,
intermediate information should be given to the Data Subject. In order
to facilitate the submission of complaints, each supervisory authority
should take measures such as providing a complaint submission form
which can also be completed electronically, without excluding other
means of communication.
96
Organisational Data Protection Group 9.21
case striking down the Data Retention Directive was taken by one such
group.25
The DPA 2018 at ss 187–190 refers to the representation of Data
Subjects, including in ‘collective proceedings’.
There have already been a number of cases, including notable cases,
where data protection and privacy groups have been involved – if not
leading the respective cases and complaints to data regulators. Digital
Rights Ireland was instrumental in the decision invalidating the Data
Retention Directive.26 The groundbreaking case where the EU–US Safe
Harbours arrangement was invalidated was taken by an individual asso-
ciated with a European privacy group.27 The recent challenge to the
standard contractual clauses data transfer arrangement (in particular
as it relates to certain data transfers from the EU to the US) included
submissions from the Electronic Privacy Information Centre (EPIC),
the Business Software Alliance (BSA), Digitaleurope, and began with a
complaint from Max Schrems (and an associated data protection privacy
group).28
While there are an increasing number of data protection privacy
groups which take or initiate issue specific complaints, they have not
generally sought to focus on the compensation and damages potential.
In addition, an interesting point will be the extent to which established
trade unions or representative bodies may seek to be recognised as an
organisation data protection group as envisaged under the GDPR and
related legislation such as the UK-GDPR.
25 Cases C-293/12 and C-594/12, Digital Rights Ireland and Seitlinger and Others, Court
of Justice, 8 April 2014. Directive 2006/24/EC and amending Directive 2002/58/EC.
26 Directive 2006/24/EC of the European Parliament and of the Council of 15 March
2006 on the retention of data generated or processed in connection with the provision
of publicly available electronic communications services or of public communications
networks, and amending Directive 2002/58/EC. This was the case of Judgment of the
Court (Grand Chamber) of 8 April 2014 (requests for a preliminary ruling from the
High Court of Ireland (Ireland) and the Verfassungsgerichtshof (Austria)) – Digital
Rights Ireland Ltd (C-293/12) v Minister for Communications, Marine and Natural
Resources, Minister for Justice, Equality and Law Reform, The Commissioner of the
Garda Síochána, Ireland and the Attorney General, and Kärntner Landesregierung,
Michael Seitlinger, Christof Tschohl and Others (C-594/12), Joined Cases C-293/12
and C-594/12.
27 Schrems v Data Protection Commissioner, CJEU [2015] Case C-362/14.
28 Facebook Ireland and Schrems, AG Opinion, CJEU [2019] Case C-311/18_O
(19 December 2019).
97
9.22 Individual Data Subject Rights
Court Remedies
9.22 GDPR Recital 143 states that each natural or legal person should
have an effective judicial remedy before the competent national court
against a decision of a supervisory authority which produces legal effects
concerning that person. This is, inter alia, distinguished from other mat-
ters such as opinions and non legal effects.
Compensation
9.25 GDPR Recital 146 states that the Controller or Processor should
compensate any damage which a person may suffer as a result of pro-
cessing that infringes the GDPR. The Controller or Processor should be
exempt from liability if it proves that it is not in any way responsible
for the damage. The concept of damage should be broadly interpreted
in the light of the case law of the Court of Justice in a manner which
fully reflects the objectives of the GDPR. This is without prejudice to
any claims for damage deriving from the violation of other rules in EU
or state law. Processing that infringes the GDPR also includes process-
ing that infringes delegated and implementing acts adopted in accord-
ance with the GDPR and state law specifying rules of the GDPR. Data
Subjects should receive full and effective compensation for the damage
they have suffered. Where Controllers or Processors are involved in the
98
Sanctions 9.27
Penalties
9.26 GDPR Recital 148 states that in order to strengthen the enforce-
ment of the rules of the GDPR, penalties including administrative fines
should be imposed for any infringement of the GDPR, in addition to,
or instead of appropriate measures imposed by the supervisory author-
ity pursuant to the GDPR. In a case of a minor infringement or if the
fine likely to be imposed would constitute a disproportionate burden to a
natural person, a reprimand may be issued instead of a fine. Due regard
should be given to the nature, gravity and duration of the infringement,
the intentional character of the infringement, actions taken to mitigate
the damage suffered, degree of responsibility or any relevant previous
infringements, the manner in which the infringement became known to
the supervisory authority, compliance with measures ordered against the
Controller or Processor, adherence to a code of conduct and any other
aggravating or mitigating factor. The imposition of penalties including
administrative fines should be subject to appropriate procedural safe-
guards in accordance with the general principles of EU law and the
Charter, including effective judicial protection and due process.
Sanctions
9.27 GDPR Recital 150 states that the in order to strengthen and har-
monise administrative penalties for infringements of the GDPR, each
supervisory authority should have the power to impose administrative
fines. The GDPR should indicate infringements and the upper limit and
criteria for setting the related administrative fines, which should be deter-
mined by the competent supervisory authority in each individual case,
taking into account all relevant circumstances of the specific situation,
with due regard in particular to the nature, gravity and duration of the
99
9.27 Individual Data Subject Rights
100
GDPR Automated Individual Decision Making, Including Profiling 9.30
The Data Subject shall have the right to object, on grounds relating
to their particular situation, at any time to the processing of personal
data concerning them which is based on Article 6(1)(e) or (f), includ-
ing profiling based on these provisions. The Controller shall no longer
process the personal data unless the Controller demonstrates compelling
legitimate grounds for the processing which override the interests, rights
and freedoms of the Data Subject or for the establishment, exercise or
defence of legal claims (Article 21(1)).
Where personal data are processed for direct marketing purposes,
the Data Subject shall have the right to object at any time to process-
ing of personal data concerning them for such marketing, which
includes profiling to the extent that it is related to such direct marketing
(Article 21(2)).
Where the Data Subject objects to processing for direct marketing
purposes, the personal data shall no longer be processed for such pur-
poses (Article 21(3)).
At the latest at the time of the first communication with the Data Sub-
ject, the right referred to in paras 1 and 2 shall be explicitly brought to
the attention of the Data Subject and shall be presented clearly and sepa-
rately from any other information (Article 21(4)).
In the context of the use of information society services, and not-
withstanding Directive 2002/58/EC,29 the Data Subject may exercise
their right to object by automated means using technical specifications
(Article 21(5)).
Where personal data are processed for scientific and historical research
purposes or statistical purposes pursuant to Article 89(1), the Data Sub-
ject, on grounds relating to their particular situation, shall have the right
to object to processing of personal data concerning them, unless the pro-
cessing is necessary for the performance of a task carried out for reasons
of public interest (Article 21(6)).
29 Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002
concerning the processing of personal data and the protection of privacy in the elec-
tronic communications sector (Directive on privacy and electronic communications).
101
9.31 Individual Data Subject Rights
Conclusion
9.31 The rights are very important for organisations to recognise and
protect, and reflect in the documented processes, procedures and plans of
the organisation. These need to be incorporated from day one, as it may
not be possible to retrospectively become compliant if the initial collec-
tion and processing was illegitimate. This is increasingly significant as
data protection supervisory authorities and Data Subjects become more
proactive and as the levels of fines and penalties increase. It is clear that
the importance attached to data protection has increased significantly,
and so too the obligation for organisational compliance.
Cases to Consider
9.32 ICO complaints, cases and case studies which may be useful for
organisations to consider include:
●● Morrisons (liable to employees for ex-employee data breach of
employees’ data) (also described as first data breach class action in
UK) (original decision, Court of Appeal, and ultimately the Supreme
Court appeal). (The issue was employer responsibility under vicari-
ous liability for a data disclosure by way of upload to the internet
by an errant employee. The High Court and Court of Appeal found
for the plaintiff victim employees whose data was uploaded. The
Supreme Court disagreed. See Chapter 11);30
●● ICO v Cathay Pacific;31
●● ICO v CRDNN;32
●● ICO v DSG Retail;33
●● ICO v Cullen;34
●● ICO v Bounty (UK);35
30 Various Claimants v Morrison Supermarkets PLC, High Court [2018] EWHC 1123
(QB), Justice Langstaff, 16 May 2018, The errant ex IT employee, Andrew Skelton,
who released the personal data on over 100,000 employees was convicted and impris-
oned. That Morrisons was vicariously liable (at trial) opens the possibility of liabil-
ity to each of the affected employees. The company lost on appeal to the Court of
Appeal, but prevailed in the Supreme Court. Morrison v Various [2020] UKSC 12
(1 April 2020). A word of caution is still required in relation to over-assuming that a
company or employer can never be held vicariously liable for problem data issues. See
Chapter 11 for further discussion.
31 ICO v Cathay Pacific Airways Limited [2020] 4 March 2020.
32 ICO v CRDNN Limited [2020] 2 March 2020.
33 ICO v DSG Retail Limited [2020] 9 January 2010.
34 ICO v Cullen [2019] 24 June 2019.
35 ICO v Bounty (UK) Limited [2019] 11 April 2014.
102
Cases to Consider 9.32
36 ICO v Grove Pension Solutions Limited [2019] 26 March 2019. Refers to use of
‘professional’ incorrect advices.
37 ICO v True Visions Productions [2019] 10 April 2019.
38 ICO v Independent Inquiry into Child Sexual Abuse (IICSA) [2017] 18 July 2017.
39 NT 1 & NT 2 v Google LLC [2018] EWHC 799 (QB) (13 April 2018). Also see
P Lambert, The Right to be Forgotten (Bloomsbury, 2019).
40 ICO v Yahoo! UK, 21 May 2018. There was a fine of £250,000.
41 ICO v Facebook. The ICO imposed a fine of £500,000. ICO v Facebook [2018]
24 October 2018.
42 ICO v Independent Inquiry into Child Sexual Abuse (IICSA) [2018] 18 September
2018.
43 Tele 2 Sverige v Swedish Post and Telecom Authority and Watson v UK, ECJ/CJEU,
Joined Cases C-203/15 & C-698/15, 21 December 2016.
44 Nowak v Data Protection Commissioner, ECJ/CJEU, Second Chamber, Case
C-434/16, 20 December 2017.
45 Valsts policijas Rīgas reģiona pārvaldes Kārtības policijas pārvalde v Rīgas
pašvaldības SIA ‘Rīgas satiksme,’ ECJ/CJEU, Second Chamber, Case C-13/16, 4 May
2017.
46 Camera di Commercio, Industria, Artigianoto e Agricoltura di Lecce v Salvatore
Manni, ECJ/CJEU, Second Chamber, Case C-398/15, 9 March 2017.
47 Puškár v Finančné riaditeľstvo Slovenskej republiky and Kriminálny úrad finančnej
správy, ECJ/CJEU, Second Chamber, Case C-73/16, 27 September 2017.
48 Breyer v Germany, ECJ/CJEU, Case C-582/14, 19 October 2016.
49 VKI v Amazon EU, ECJ/CJEU, Case C-191/15, 29 September 2016.
50 ICO v Prudential, ‘Prudential Fined £50,000 for Customer Account Confusion,’ 6
November 2012.
103
9.32 Individual Data Subject Rights
104
Cases to Consider 9.32
●● Google v Vidal-Hall;72
●● Mosley v Google (various);
●● Google Spain SL Google Inc v Agencia Española de Protección de
Datos, Mario Costeja González;73
●● Weltimmo v Nemzeti Adatvédelmi és Információszabadság
Hatóság;74
●● Bărbulescu v Romania;75
●● Bărbulescu v Romania (this superior ruling overturning the above
erroneous (and controversial) decision).76
●● Google v Vidal-Hall77 (DPA 1998, s 13(2) was declared an inva-
lid implementation of EU law and an impermissive restriction of
Data Subject right to sue for damages and compensation, effectively
making Data Subject claims easier). (One issue going forward will
be any challenges to aspects of the so-called UK-GDPR once fully
enacted on the basis of being incompatible with the GDPR; and or
any challenge to a successful EU adequacy decision in relation to
data transfers to the UK on the basis of UK law due to differences
directly in UK data protection law or indirectly in relation to wider
laws (eg human rights). There have been ongoing comments by
politicians that the human rights legislation may be amended after
Brexit78 – notwithstanding that this may have serious adverse com-
plications for an EU data protection adequacy decision for the UK.
105
106
Chapter 10
Time Limits for Compliance
Introduction
10.01 There are various time limits referred to in the data protection
regime for the accomplishment of particular tasks. Depending on the
task at hand, non-compliance with a time limit could amount to a breach
and/or offence.
Time Limits
These are the main time limits and references contained in the GDPR.
107
10.01 Time Limits for Compliance
108
Time Limits 10.01
The ICO has updated its guidance in respect of time limits for complying
with various obligations under the data regulations. This policy change
is on foot of an EU case dealing with time limit issues (albeit in a differ-
ent subject area). The Toeters and Verberk case holds that ‘Article 50a
of Regulation No 3886/92 laying down detailed rules for the applica-
tion of the premium schemes … must be interpreted as meaning that a
premium application may be regarded as having been ‘lodged’ in due
time only if the competent authority received it prior to the expiry of
the time-limit. The fact that the competent authority was in a position to
transmit certain data to the Commission is irrelevant to the calculation
of a time-limit, which must be applied uniformly throughout the Com-
munity in order, particularly, to maintain equality of treatment between
economic operators.’1
The ICO now advises that:
‘If you exercise any of your rights under data protection law, the organisation
you’re dealing with must respond as quickly as possible. This must be no
later than one calendar month, starting from the day they receive the request.
If the organisation needs something from you to be able to deal with your
request (eg ID documents), the time limit will begin once they have received
this.
If your request is complex or you make more than one, the response time
may be a maximum of three calendar months, starting from the day of
receipt.’2
However, if the end date falls on a Saturday, Sunday or bank holiday, the
calendar month ends on the next working day.
Also, if the corresponding calendar date does not exist because the following
month has fewer days, it is the last day of the month.’
109
10.02 Time Limits for Compliance
Conclusion
10.02 When an organisation fails to comply within the required time-
frame, this in itself is another breach. It may be taken into consideration
by the ICO and/or a court.
110
Chapter 11
Enforcement and Penalties
for Non-Compliance
Introduction
11.01 There are a series of offences set out in the data protection
legislation. These are designed to ensure compliance with the data protec-
tion regime, from collection to fair use of personal data. O rganisations
must fully comply with their obligations. In addition to questions a rising in
relation to their continued use of personal data if it has not been collected
fairly, investigations, prosecutions and financial penalties can also arise.
Organisations can be fined up to 20,0000 EUR or 4% of worldwide
turnover, depending on the breach, or as set out in national legislation as
appropriate.
Offences by organisations can also be prosecuted. Individuals can also
be fined and prosecuted in addition to the organisation.
111
11.02 Enforcement and Penalties for Non-Compliance
Criminal Offences
11.03 The organisation can commit criminal offences in relation to its
data processing activities, namely:
●● unlawful obtaining or disclosure of personal data;
●● selling and offering to sell personal data;
●● enforcing individual Data Subject access;
●● disclosure of information;
●● obstructing or failing to assist in the execution of a warrant;
●● processing without a register entry (if still required);
●● failing to notify changes regarding registration (if still required);
●● carrying on assessable processing;
●● failing to make certain particulars available;
●● failing to comply with a notice;
●● making a false statement in response to a notice.
112
Other Consequences of Breach 11.05
1 ‘Private Detectives Jailed for Blagging: ICO Statement,’ ICO, 27 February 2012, at
https://ico.org.uk.
2 ‘Private Detectives Jailed for Blagging: ICO Statement,’ ICO, 27 February 2012, at
https://ico.org.uk.
113
11.06 Enforcement and Penalties for Non-Compliance
114
GDPR Changes re Fines and Prosecution 11.10
115
11.10 Enforcement and Penalties for Non-Compliance
116
Civil Sanctions under the DPA 11.12
117
11.12 Enforcement and Penalties for Non-Compliance
Section 168 recognised Article 82 of the GDPR and the right to com-
pensation for material or non-material damage. In addition the section
adds that ‘non material damage’ includes distress. This significantly
clarifies and widens the scope for Data Subject actions, compensation
and damages.
Compensation and damages can also be made to Data Subject repre-
sentative bodies (s 168(3)). (Also see representation of Data Subjects in
ss 187–190).
While there are certain conditions, the primary clause refers to ‘any
contravention’ by the organisation. In terms of the defence, in order to
be able to avail of it, an organisation will have to establish that it has
‘taken such care as in all the circumstances was reasonably required.’
This will vary from organisation to organisation, sector to sector, the
type of personal data involved, the risks of damage, loss, etc, the nature
of the security risks, the security measures and procedures adopted, the
history of risk, loss and damage in the organisation and sector.
Certain types of data will convey inherent additional risks over oth-
ers, such as loss of financial personal data. This can be argued to require
higher obligations for the organisation.
One interesting area to consider going forward is online damage, such
as viral publication, defamation, bulletin boards, discussion forums and
websites (or sections of websites), and social media websites. Where
damage occurs as a result of misuse or loss of personal data or results
in defamation, abuse and threats, liability could arise for the individual
tortfeasors as well as the website.
While there are three eCommerce defences in the eCommerce Direc-
tive, one should recall that the data protection regime (and its civil rights,
sanctions, duty of care and liability provisions) are separate and stand
alone from the eCommerce Directive legal regime. Indeed, even in terms
of the eCommerce defences one should also recall that: (a) an organi-
sation must first fall within an eCommerce defence, and not lose that
defence, in order to avail of it; and (b) there is no automatic entitlement
to an internet service provider (ISP) or website to a global eCommerce
defence, as in fact there in not one eCommerce defence but three specific
defences relating to specific and technical activities. Not all or every ISP
activity will fall into one of these defences. Neither will one activity fall
into all three defences.
It is also possible to conceive of a website which has no take down
procedures, inadequate take down defences, or non-expeditious take
down procedures or remedies, and which will face potential liability
under privacy and data protection as well as eCommerce liability.
For example, an imposter social media profile which contains personal
data and defamatory material could attract liability for the website
operator under data protection, and under normal liability if none of
118
Civil Sanctions under the DPA 11.13
the eCommerce defences were available or were lost. The later could
occur if, for example, the false impersonating profile was notified to the
website (or it was otherwise aware) but it did not do anything.3
As indicated above, the issue of civil liability and litigation by Data
Subjects to enforce their rights will continue. This will in part be fuelled
by increased awareness but also by the increasingly publicised instances
of data loss, data breach, damage and instances of abuse which involve
personal data. The Facebook Beacon settlement, while in the US, for
approx. $20 million emphasises the import of individuals seeking to vin-
dicate their privacy and personal data rights. In the UK, while Prudential
was fined £50,000, it is not inconceivable that loss, damage and financial
loss may have ensued. Consider, further that this example appears to
have related to a small number of individuals. However, what if thou-
sands of customer suffered financial loss, damage, stress, delay, missed
payments, lost flights, lost contracts, etc, as a result of mixing up files,
not completing files and transactions. These are all things which can
occur, whether through process errors or software glitches. This is not
at all far-fetched, as customers of RBS bank will confirm. Google was
also sued re Apple breach. Morrisons was sought to be found liable for
an errant IT employee related data breach (see further discussion below
on the Morrisons case).4
While we are well aware of the press phone hacking scandal, the
Leveson Inquiry and the ensuing litigation from many victims, as well as
there being admissions, interception offences, etc, there are also personal
data breach and data protection civil liability issues arising.
Morrisons Case
11.13 The Morrisons case is a further example of the increasing atten-
tion being paid to the important issues of data protection and private
personal data. It also exemplifies the earlier discussion referring to
data protection as being both inward facing as well as outward facing
(and which has also been highlighted from the earliest edition of this
publication).
This case is also interesting for many other aspects. Primarily, it is
receiving attention because of the claim of vicarious liability as against
3 This is a complex and developing area of law, common law, civil law, Directive,
GDPR and case law, both in the UK and internationally. A full detailed analysis is
beyond this current work.
4 Various Claimants v Morrison Supermarkets plc [2018] EWHC 1123 (QB). The errant
ex IT employee, Andrew Skelton, who released the personal data on over 100,000
employees was convicted and imprisoned. That Morrisons was vicariously liable at
trial and on appeal in the Court of Appeal opens the possibility of liability to each of
the affected employees. The company has indicated that it will appeal. (Notwithstand-
ing that the Supreme Court differed with the two lower courts).
119
11.13 Enforcement and Penalties for Non-Compliance
the employer to other employees resulting from data breach issues. The
case involved a large volume of employee records being posted onto
the internet. The employee records were also distributed to a number
of media outlets – after being further copied or downloaded from the
internet.
There are important issues of liability and responsibility – hence the
emphasis on the ability of individuals to be compensated when affected
by breaches, such as breaches of compliance, rights, data misuse, data
loss and data disclosure.
The issues involved are also demonstrated as being important given the
extensive jurisprudential record of the case. While the Supreme Court5
differed somewhat, the affected employees’ rights were vindicated as
against the employer by the High Court6 and the Court of Appeal.
The case also demonstrates the difficult and complex nature of many
modern data protection cases given the interface of law, rights and
technology. Sometimes a detailed appreciation – and even expertise – of
IT and computing is required in order to appreciate when and how data
protection breaches occur.
I should preface these comments by indicating that this is not a full
and detailed examination of all issues discussed and raised in the case,
nor indeed a review of all of the evidence, testimony and record avail-
able to the respective courts. It focuses mainly on the following issues.
First, there may be an immediate impulse on the part of some to sug-
gest that the case (at least in the Supreme Court) rules out the possibil-
ity that employers can be held vicariously liable for errant employees’
acts regarding personal data, or wider still that no data protection use or
misuse can give rise to liability or vicarious liability. Both suggestions
would be incorrect. Indeed, the Supreme Court decision focuses only
on an employee’s acts (apparently) without knowledge of the employer.
The second point is that the appeal(s) appear focused on issues of
vicarious liability alone. Other liability issues can arise and may be con-
tested in other circumstances.
This appears to be because issues of primary liability were discounted
by the trail court. (While Morrisons appealed the vicarious liability find-
ing against it, it does not seem that the plaintiffs appealed the lack of
primary liability finding). This may well be a live issue in other cases.
While there may or may not be good reasons for the various find-
ings, the record available does raise questions as to whether all appro-
priate issues referred to were included in the public record. It is unclear
whether different outcomes may have been possible with the benefit of
further testing of particular issue points in the case – particularly at trial.
120
Civil Sanctions under the DPA 11.13
121
11.13 Enforcement and Penalties for Non-Compliance
more important for a court to be aware of the gaps in policies than what
current policies may say.
It is also noted that in the present case, the company acknowledges
that there were policy changes between the date of the events at issues
and the trial date. It would be useful to understand the nature of these
changes in much greater depth than is presently possible from the cur-
rent record.
A glaring gap in the record for the court was the exact date and manner
of transmission or delivery of the vast payroll documentation to KPMG
by the errant employee. The case is also inconclusive on the very impor-
tant point of how delivery was achieved.
One would normally expect that this would be a central and core issue
for the employer to have to establish. Perhaps it is, but that is not easily
evident.
It is a glaring issue that the firm was not able to establish when the
documents were given to KPMG. This is a very important and potentially
impactful point. The various decisions make clear that it is acknowl-
edged that when the documents were delivered was not established by
the firm. This seems an essential issue to have been proven. In fact, the
decision seems to suggest that it was left up to the trial judge to try and
guess a time period when delivery may have occurred.
This seems somewhat remiss if that is the case (and raised the follow
on query as to whether it benefited the company not to have this issue
clarified with specificity).
That the firm could not establish a definitive date and time is (very)
curious. This in itself demonstrates policy and procedure gaps. Some
may call this a policy and evidence failing – or data security failings.
Why were there no documented procedures to safeguard the data when
transferring it to a third party and to ensure delivery was guaranteed and
recorded? Was there no email before or after delivery to KPMG? Was
there no internal email confirming delivery? If delivery was by hand,
was there no cover letter? Is it secure and data protection compliant to
deliver an electronic storage device with a large set of sensitive data to a
third party without cover documentation? Why was the firm not able to
establish any company-side policy or delivery recordal?
Why was the firm not able to evidence any correspondence or recordal
documentation from KPMG demonstrating when delivery occurred?
Why was there no evidence from KMPG indicating when it opened the
data delivered?
Some might suggest that these gaps and lack of clarity are a clear dem-
onstration of the firm breaching primary responsibilities.
One would be surprised if there was not some further potential record
available in relation to the delivery issue. If so, why was this a pparently
122
Civil Sanctions under the DPA 11.13
not available to the court? It seems that there was an element of f orensics
devoted to other issues regarding the errant employee, but there is appar-
ently no record of forensics available to the court dealing with the deliv-
ery issues.
The when issue is potentially of large significance to the primary
liability issue – and also the vicarious liability issue. The trail judge
narrowed the window of delivery (an official task for the employee) to
between 15 November to 21 November. The judge also found that the
employee also copied or downloaded the data in question to his own
USB device (USB2) on 18 November.
So the potentially important question of when delivery occurred
comes into play. Did the errant download on 18 December come before
delivery to KPMG? Put another way, did the download to USB2 (a per-
sonal device) occur prior to delivery to KPMG and therefore during an
official authorised activity?
Note that the firm had (a small number of) official, designated USB
devices. Why did data security policy and procedures not pick up and
alert management of (a) an unauthorised device access/connection; and
(b) an unauthorised and very large download (indeed, so large that it
could not be sent by internal email)?
While these are primarily questions which jump out, and certain mat-
ters are indeed unclear, it is clear that the respective courts in different
circumstances may well have had more to contend with. Indeed, as inter-
esting as the case is already, further factual clarity may have led to the
case being of even more importance.
It is also noted that the Supreme Court seems in part concerned pri-
marily to correct misunderstanding or misinterpretation in prior judicial
jurisprudence on vicarious liability generally, over the data protection
issues arising. Even on the record available from this case, companies
should not assume that they are immune from primary liability – nor
vicarious liability – in appropriate circumstances. The story of primary
or vicarious liability is by no means over.
A separate issue also appears to have been suggested, namely that some
distinction needs to be drawn as to when data is copied, and whether the
original data remains intact in situ. The suggestion seems to be that there
is no liability or responsibility to the employer if the original data has
not been deleted. While this aspect of the case requires further review,
some might suggest this as being curious to the extent that it may per-
mit all sorts of mischief. If a hacker hacks into a bank and steals data
which is then sold to identity thieves, is the hacker immune because the
original data remains at the bank? Is there no remedy against a bad actor
ransomware attacker because they are not changing or deleting data, but
rather locking the firm, hospital, etc out of the ability to access its own
123
11.13 Enforcement and Penalties for Non-Compliance
7 In a data protection related case in Berlin, not only was the company sued but the
directors were also personally named and included in the case. One of the reasons
specified was to ensure that the directors made sure that the Board of the company
made the appropriate amendments to ensure the breaches were rectified and would
not re-occur. A further interesting aspect of the case is that while the directors were
included personally, their names were redacted to initials. One such set of initials
was ‘MZ’. See The Federal Association of Consumer Organisations and Consumer
Groups, Federal Consumer Association, GB v Facebook Ireland Limited, MA, JB,
DG, PT and the Chairman MZ, [names redacted], [redacted] Reach, [redacted] Quay,
Dublin, Ireland.
124
Remedies, Liability and Penalties under the GDPR 11.19
125
11.19 Enforcement and Penalties for Non-Compliance
authority under Article 77, each Data Subject shall have the right to
an effective judicial remedy if they consider that their rights under this
GDPR have been infringed as a result of the processing of their personal
data in non-compliance with the GDPR (Article 79(1)).
Proceedings against a Controller or a Processor shall be brought
before the courts of the state where the Controller or Processor has an
establishment. Alternatively, such proceedings may be brought before
the courts of the state where the Data Subject has his or her habitual
residence, unless the Controller or Processor is a public authority of a
state acting in the exercise of its public powers (Article 79(2)).
Representation of Data Subjects
11.20 The Data Subject shall have the right to mandate a not-for-profit
body, organisation or association, which has been properly constituted
according to the law of a state, has statutory objectives are in the pub-
lic interest, and is active in the field of the protection of Data Subjects’
rights and freedoms with regard to the protection of their personal data
to lodge the complaint on their behalf, to exercise the rights referred to in
Articles 77, 78 and 79 on their behalf and to exercise the right to receive
compensation referred to in Article 82 on their behalf where provided for
by state law (Article 80(1)).
States may provide that any body, organisation or association referred
to in Article 80(1), independently of a Data Subject’s mandate, has the
right to lodge in that state, a complaint with the supervisory authority
competent which is competent pursuant to Article 77 and to exercise
the rights referred to in Articles 78 and 79 if it considers that the rights
of a Data Subject have been infringed as a result of the processing
(Article 80(2)).
There is increasing evidence of more such groups being formed and
becoming active in advocacy, filing complaints with data regulators
and, one expects, also seeking to develop jurisprudence in relation to
compensation and damages. While most of the groups are clearly data
protection and privacy focused, it may be possible that new groups
are particularly aiming to focus more on compensation issues than
advocacy issues. It also remains to be seen if existing bodies seek to cast
themselves as partly privacy groups (eg employee’ unions).
Suspension of Proceedings
11.21 Where a competent court of a state has information on proceed-
ings, concerning the same subject matter as regards processing by the
same Controller or Processor, that are pending in a court in another state,
126
Remedies, Liability and Penalties under the GDPR 11.25
it shall contact that court in the other state to confirm the existence of
such proceedings (Article 81(1)).
Where proceedings concerning the same subject matter as regards
processing by the same Controller or Processor are pending in a court in
another state, any competent court other than the court first seized may
suspend its proceedings (Article 81(2)).
Where those proceedings are pending at first instance, any court other
than the court first seized may also, on the application of one of the
parties, decline jurisdiction if the court first seized has jurisdiction over
the actions in question and its law permits the consolidation thereof
(Article 81(3)).
Right to Compensation and Liability
11.22 A person who has suffered damage as a result of an infringe-
ment of the GDPR shall have the right to receive compensation
from the Controller or Processor for the damage suffered (Article 82(1)).
(See para 11.09 above for more particular details).
General Conditions for Imposing Administrative Fines
11.23 An organisation can have fines and penalties imposed for
non-compliance. The fines regime is significantly updated under the new
data protection regime. In particular the level of fines and penalties are
increased. See para 11.10 above for further details.
Penalties
11.24 States shall lay down the rules on penalties applicable to
infringements of the GDPR in particular for infringements which are
not subject to administrative fines. Further details are referred to in
para 11.11 above.
Fines and Remedy Levels
11.25 Article 83 relates to administrative fine sanctions. Each super-
visory authority is empowered to impose administrative fines, which are
meant to be effective, proportionate and dissuasive, and include refer-
ence to the nature, gravity and duration of the breach, amongst other
factors.
Certain fines can be up to 10,000,000 EUR (or equivalent), or
in case of an enterprise up to two percent of its annual worldwide
turnover, whichever is higher. Other fines can amount to 20,000,000
EUR (or equivalent) or four percent of turnover, whichever is higher.
Further details are referred to in para 11.10 above.
127
11.26 Enforcement and Penalties for Non-Compliance
128
ICO Data Enforcement, Loss/Data Breaches, Fines and Convictions 11.29
129
11.29 Enforcement and Penalties for Non-Compliance
130
ICO Data Enforcement, Loss/Data Breaches, Fines and Convictions 11.29
131
11.29 Enforcement and Penalties for Non-Compliance
132
ICO Data Enforcement, Loss/Data Breaches, Fines and Convictions 11.29
133
11.29 Enforcement and Penalties for Non-Compliance
134
ICO Data Enforcement, Loss/Data Breaches, Fines and Convictions 11.29
135
11.29 Enforcement and Penalties for Non-Compliance
136
ICO Data Enforcement, Loss/Data Breaches, Fines and Convictions 11.29
137
11.29 Enforcement and Penalties for Non-Compliance
138
ICO Data Enforcement, Loss/Data Breaches, Fines and Convictions 11.29
139
11.29 Enforcement and Penalties for Non-Compliance
140
ICO Data Enforcement, Loss/Data Breaches, Fines and Convictions 11.29
141
11.29 Enforcement and Penalties for Non-Compliance
142
ICO Data Enforcement, Loss/Data Breaches, Fines and Convictions 11.29
143
11.29 Enforcement and Penalties for Non-Compliance
144
ICO Data Enforcement, Loss/Data Breaches, Fines and Convictions 11.29
145
11.29 Enforcement and Penalties for Non-Compliance
146
ICO Data Enforcement, Loss/Data Breaches, Fines and Convictions 11.29
147
11.29 Enforcement and Penalties for Non-Compliance
148
ICO Data Enforcement, Loss/Data Breaches, Fines and Convictions 11.29
149
11.29 Enforcement and Penalties for Non-Compliance
150
ICO Data Enforcement, Loss/Data Breaches, Fines and Convictions 11.29
151
11.29 Enforcement and Penalties for Non-Compliance
152
ICO Data Enforcement, Loss/Data Breaches, Fines and Convictions 11.29
153
11.30 Enforcement and Penalties for Non-Compliance
Conclusion
11.30 One comment on the above is that it is worrying how many
problem issues arise with regard to health data, and which amounts to
special personal data.
It should also be noted that company directors (and other officers) can
be personally prosecuted and fined.
If a request for information or other notice is received from the ICO
it may be appropriate to seek immediate legal advice. The ICO can also
issue enforcement notices. In addition, the ICO may also issue monetary
penalty notices or fines. It is important to note the emphasis now under
the new GDPR regime on teams dealing with the nuanced respective
data protection (and security) issues; DPOs; assessing data protection
risks and dealing with them appropriately; and the related new rules.
Organisations should ensure proper policies; awareness and ongoing
training are in operation across all personnel whom have an impact
and responsibility regarding data protection operations. It appears that
fines, prosecutions and Data Subject damage and access litigation will
increase.
154
Chapter 12
Security of Personal Data
Introduction
12.01 ‘Personally identifiable information (PII) data has become
the prime target of hackers and cyber-criminals. It can be exploited in
many ways, from identity theft, spamming and phishing right through to
cyber-espionage.’1 The data protection regime sets information and data
security obligations on all Controllers, as well as Processors. These IT
and personal data security requirements must be complied with. While
data security risks have increased with the internet,2 data security risk
issues are not just limited to the organisation’s internet.
The growing number of data security breaches, including through
inadequate data security, as well as internet usage and social media,
cloud computing and online abuse, will all increase the attention on
security and data protection. Yahoo! has suffered a large number of data
breaches, with the data of 500 million users exposed in one incident, and
over a billion users in another. Uber was fined £500,00 for a data breach
incident. Sony was fined £250,000 in relation to a hacking data breach
incident. Facebook was fined £500,000 regarding abuses of social media
harvested data (Cambridge Analytica). Telco Talk Talk was hacked in a
data breach incident. The MD of Talk Talk has said that ‘cyber crimi-
nals are becoming increasingly sophisticated and attacks against com-
panies which do business online are becoming more frequent’. Retailers
have been hacked, as evidenced by the recent ICO fine of £500,000 on
DSG Retail. Even children’s toy manufacturer Vtech was hacked, which
1 Y Rozenberg, ‘Challenges in PII Data Protection,’ Computer Fraud & Security (2012)
5–9, at 5.
2 ‘Security of the Internet and the Known Unknowns,’ Communications of the ACM
(2012) (55) 35–37.
155
12.01 Security of Personal Data
c arries the added risk to child data as well as parent data. Some organisa-
tions may not have realised that they can be held responsible for errant
third party hack attacks where they have contributed to or enabled the
attack by failure to have adequate data security precautions in place.
The new GDPR places significant emphasis on risk and risk assessment.
Organisations need to be compliant with these obligations.
156
Ensuring Appropriate Security Measures 12.05
5 Note generally, for example, R Morgan, ‘Data Controllers, Data Processors and
Data Sharers,’ SCL Computers and Law, 4 March 2011.
157
12.05 Security of Personal Data
158
Security under the EDPB 12.06
159
12.06 Security of Personal Data
160
Security under the GDPR 12.11
The Controller and Processor shall take steps to ensure that any person
acting under the authority of the Controller or the Processor who has
access to personal data shall not process them except on instructions
from the Controller, unless they are required to do so by EU or state law
(Article 32(4)).
Notification of a Data Breach to Supervisory Authority
12.09 In the case of a personal data breach, the Controller shall with-
out undue delay and, where feasible, not later than 72 hours after having
become aware of it, notify the personal data breach to the supervisory
authority, unless the personal data breach is unlikely to result in a risk
for the rights and freedoms of natural persons. Where the notification to
the supervisory authority is not made within 72 hours, it shall be accom-
panied by reasons for the delay (Article 33(1)).
The Processor shall notify the Controller without undue delay after
becoming aware of a personal data breach (Article 33(2)).
Contents of Notification
12.10 The notification must at least:
●● describe the nature of the personal data breach including where
possible, the categories and approximate number of Data Subjects
concerned and the categories and approximate number of data
records concerned;
●● communicate the name and contact details of the DPO or other
contact point where more information can be obtained;
●● describe the likely consequences of the personal data breach;
●● describe the measures taken or proposed to be taken by the
Controller to address the personal data breach, including, where
appropriate, measures to mitigate its possible adverse effects
(Article 33(2)).
Where, and in so far as, it is not possible to provide the information at
the same time, the information may be provided in phases without undue
further delay (Article 33(4)).
The Controller shall document any personal data breaches, comprising
the facts relating to the personal data breach, its effects and the remedial
action taken. This documentation must enable the supervisory authority
to verify compliance with this Article (Article 33(5)).
Communication of a Data Breach to Data Subject
12.11 When the personal data breach is likely to result in a high risk to
the rights and freedoms of individuals the Controller shall c ommunicate
161
12.11 Security of Personal Data
the personal data breach to the Data Subject without undue delay
(Article 34(1)).7
The communication to the Data Subject shall describe in clear and
plain language the nature of the personal data breach and contain at least
the information and the recommendations provided for in Article 31(3)
(b), (d) and (e) (Article 32(2)).
The communication to the Data Subject referred to in Article 32(1)
must not be required if:
●● the Controller has implemented appropriate technical and organisa-
tional protection measures, and that those measures were applied to
the personal data affected by the personal data breach, in particular
those that render the data unintelligible to any person who is not
authorised to access it, such as encryption; or
●● the Controller has taken subsequent measures which ensure that the
high risks to the rights and freedoms of Data Subjects referred to in
para 1 is no longer likely to materialise; or
●● it would involve disproportionate effort. In such a case, there shall
instead be a public communication or similar measure whereby
the Data Subjects are informed in an equally effective manner
(Article 34(3)).
If the Controller has not already communicated the personal data breach
to the Data Subject, the supervisory authority, having considered the
likelihood of the breach to result in a high risk, may require it to do so
or may decide that any of the conditions referred to in Article 34(3) are
met (Article 34(4)).
Data Protection Impact Assessment and Prior Consultation
12.12 Chapter IV, Section 3 of the GDPR refers to Impact Assess-
ments and Prior Consultations.
Data Protection Impact Assessment
12.13 Where a type of processing in particular using new technolo-
gies, and taking into account the nature, scope, context and purposes
of the processing, is likely to result in a high risk for the rights and
freedoms of natural persons, the Controller shall, prior to the process-
ing, carry out an assessment of the impact of the envisaged processing
7 Note, for example, P Wainman, ‘Data Protection Breaches: Today and Tomorrow,’
SCL Computers and Law, 30 June 2012. Also see M Dekker, Dr, C Christoffer
Karsberg and B Daskala, Cyber Incident Reporting in the EU (2012).
162
Security under the GDPR 12.13
163
12.14 Security of Personal Data
164
Organisational Security Awareness 12.17
165
12.17 Security of Personal Data
The DPA does not require that a named individual be appointed with
responsibility for security compliance. A titled officer is highly recom-
mended and under the GDPR a formal DPO is now a requirement. There
are specific organisational responsibilities, regarding security, which are
set out in the DPA and these include a specific requirement that all staff
are aware of and comply with the security standards set out in the data
protection regime.
These security requirements apply where an organisation collects and
processes any personal data. Typically personal data would include infor-
mation which identifies living individuals such as employees or custom-
ers. Accordingly, for most organisations, data protection compliance is
likely to be an issue that crosses various aspects of the business such as
human resources, IT and customer support. It is not necessarily just an
IT function. An organisational decision as to who should be responsible
for IT and data security should be made with this in mind.
The security standards set out in the Data Protection Act can be
summarised as obliging the organisation to take ‘appropriate’ security
measures to guard against unauthorised access, alteration, disclosure or
destruction of any personal data.
In determining what is ‘appropriate’, the organisation can have regard
to the state of technological development and the cost of implementing
the security measures. However, the organisation is obliged to ensure
that the measures it decides to adopt provide a level of security appropri-
ate to the harm that might result from a security compromise given the
nature of the data concerned. For example, a hospital processing sensi-
tive health data would be expected to adopt a particularly high security
standard while a corner shop processing personal data for a paper round
might be subject to a less onerous standard.
In light of some high profile cases of data theft or loss, readers should
note also that the ICO’s office has taken the view that an appropriate
level of security for laptop computers used in the financial services and
sensitive health industries requires the use of encryption in respect of the
data stored on the hard drive (over and above the use of user name and
password log-in requirements).
In adopting security measures within an organisation, they should
note that the legal standard governing personal data is over and above
any other legal obligations of confidentiality which could be owed to
third parties at common law or under a contract which contains confi-
dentiality provisions.
Appraising Employees
12.18 What guidance should be given to an organisation’s employees
regarding IT and data security? An organisation might consider these
issues.
166
Organisational Security Awareness 12.18
167
12.18 Security of Personal Data
168
Organisational Security Measures 12.21
169
12.21 Security of Personal Data
Raising Awareness
12.22 An EU Council Resolution8 indicates the recognition and
official concern in relation to the loss of personal data, and the fact
that technology has changed significantly since the EU Data Protection
Directive 1995 (DPD 1995).
It refers to the dangers of information loss, attacks on organisations,
and issues of network and information security for organisations and
individuals.
It indicated that EU states should engage in information campaigns
addressing the issues of security and personal data.
It recognises the need to promote best practice, such as the interna-
tionally recognised standards for IT and security set by international
and standards setting organisation eg ISO 15408, ISO 27001, PCI DSS,
ISO 31000,BS10012:2009, etc.
It also recognises the increase in eGovernment and the need to
promote secure eGovernment.
It also notes that in the increase of attacks on the security of personal
data though technology, some of the solutions may also come from
170
ICO Guidance 12.23
ICO Guidance
12.23 The ICO has also issued a guide entitled A Practical Guide to IT
Security, Ideal for Small Businesses12 which is useful. The ICO has also
commented in relation to encryption issues.13
The ICO also provides the following tips and suggestions14 for main-
taining and implementing IT security for personal data, namely:
For Computer Security
●● install a firewall and virus-checking on the computers;
●● make sure that the operating system is set up to receive automatic
updates;
●● protect the computer by downloading the latest patches or security
updates, which should cover vulnerabilities;
●● only allow staff access to the information they need to do their job
and do not let them share passwords;
9 See, for example, B Beric and G Carlisle, ‘Investigating the Legal Protection of Data,
Information and Knowledge Under the EU Data Protection Regime,’ International
Review of Law, Computers & Technology (2009) (23) 189–201.
10 See Network and Information Systems Regulations 2018 (UK), as amended by the
Network and Information Systems (Amendment) Regulations 2018 (UK), and also the
European Commission Regulation 2018/151.
11 See Regulation (EU) 910/2014 on electronic identification and trust services for
electronic transactions in the internal market.
12 At https://ico.org.uk.
13 ICO, Our Approach to Encryption, at https://ico.org.uk.
14 ICO, Security Measures, at https://ico.org.uk.
171
12.23 Security of Personal Data
172
ICO and Security Breaches 12.24
●● check that you are sending a fax to a recipient with adequate security
measures in place. For example, the fax should not be left uncol-
lected in an open plan office;
●● if the fax is sensitive, ask the recipient to confirm that they are at the
fax machine, they are ready to receive the document, and there is
sufficient paper in the machine;
●● ring up or email to make sure the whole document has been received
safely;
●● use a cover sheet. This will let anyone know who the information is
for and whether it is confidential or sensitive, without them having
to look at the contents.
For Other Security
●● shred all your confidential paper waste;
●● check the physical security of your premises;
●● training staff,
$$ so they know what is expected of them;
$$ to be wary of people who may try to trick them into giving out
personal details;
$$ so that they can be prosecuted if they deliberately give out
personal details without permission;
$$ to use a strong password – these are long (at least seven
characters) and have a combination of upper and lower case
letters, numbers and the special keyboard characters like the
asterisk or currency symbols;
$$ not to send offensive emails about other people, their private
lives or anything else that could bring your organisation into
disrepute;
$$ not to believe emails that appear to come from your bank that
ask for your account, credit card details or your password
(a bank would never ask for this information in this way);
$$ not to open Spam – not even to unsubscribe or ask for no more
mailings. Tell them to delete the email and either get Spam
filters on your computers or use an email provider that offers
this service.15
173
12.24 Security of Personal Data
notify the ICO if a personal data breach occurs. (Note the ePrivacy Reg-
ulation portends further rules, updates and or replacement).
A personal data breach is defined to mean:
‘a breach of security leading the accidental or unlawful destruction, loss,
alteration, unauthorised disclosure of, or access to, personal data transmitted,
stored or otherwise processed in connection with the provisions of a public
electronic communications service.’
174
Disposal of Computer Hardware 12.25
175
12.25 Security of Personal Data
access to the level and importance of the data on the laptop? Hierarchies
of access control need to be considered.
Particular sensitivity also arises if it is intended to recycle or give to
charity particular devices. Real consideration should be given to the per-
sonal data (and other data) thereon in deciding if and how to so dispose
of such devices.
Conclusion
12.26 Security is a legal data protection compliance requirement, as
well as best business practice. This is one of the more prominent areas
of compliance where time never stands still. The security risks and
needs must constantly be appraised and updated. It is also essential to
ensure that outsourced data processing activities are also undertaken
in an appropriately secure manner. Increasingly the area of appraisals
and procedures surrounding security breaches and data loss instances
is regulated. If such an event arises, the ICO as well as individual Data
Subjects may have to be informed. Liability issues should also be a con-
stant concern for organisations as regards security and risk. Maintaining
data security is an ongoing task. What may be secure and data protection
compliant last month, may not be so next month. Constant vigilance is
required.
176
Chapter 13
Outsourcing and Data Processors
Introduction
13.01 While many organisations may feel they do not engage third
parties to deal with their personal data, processes and databases, closer
inspection often indicates that this is not correct. Many organisations,
and across all sectors of activity, engage third parties or outsource certain
of their internal processing activities.1
One example is where an organisation may find it more convenient
to outsource its payroll functions to an organisation specialising in such
activities. It is necessary, therefore, that the employee personal data, or
certain of it, is transferred to the third party organisation for processing.
This third party is a data Processor acting for the organisation. A contract
must be in place and appropriate security standards implemented.
Sometimes organisations outsource other activities, such as marketing,
recruitment, employment of consultants or agents or part time employees.
Organisations increasingly outsource market research and customer
satisfaction surveys to third parties. These are all Processors where
personal data is involved.
If an organisation must transfer or export personal data outside of the
UK and lawfully permit transfers outside of the transfer restriction, it
must satisfy, as appropriate, one of the following:
●● an export to one of the safe permitted countries or UK equivalent; or
●● an export to the US under the original EU-US Safe Harbour
agreement and the new EU-US Privacy Shield agreement or UK
equivalent;2 or
177
13.01 Outsourcing and Data Processors
Engaging Processors
13.03 Where processing of personal data is carried out by a Processor
on behalf of a Controller, the Controller should:
●● choose a Processor providing sufficient guarantees in respect of
the technical and organisational security measures governing the
processing to be carried out; and
●● take reasonable steps to ensure compliance with those measures.
178
Relying on Third Party Processors 13.04
179
13.05 Outsourcing and Data Processors
Conclusion
13.05 It is also important that the organisation undertake ongoing
assessments and checks regarding the operation of the data processing
undertaken by the Processor. This should also include the security and
compliance measures. Issues of risk, security breach and data protec-
tion compliance must be assessed on an ongoing basis. The issue of the
relationship and the appropriate contract documentation required when
outsourcing is becoming increasingly complex.
180
Part 2
Inward Facing Organisational
DP Obligations
181
182
Chapter 14
Processing Employee Personal
Data
Introduction
14.01 Organisations sometimes focus on their customer related data
compliance issues. It is important for new and existing organisations
to look inwards, as there are important inward facing data protection
obligations. Personal data includes the personal data of employees also.
The employees of the organisation also have Data Subject rights which
must be respected.
The variety of inward-facing data protection issues which organisa-
tions need to deal with on a daily basis are ever increasing. Some of these
include whether to allow employees to bring their own devices (BYOD)
into the organisation and to permit them to place organisational data
onto such devices. If so permitted, a particular BYOD policy needs to be
considered and implemented. If not permitted, this should be expressly
specified in a transparent manner.
The ability for organisations to track their employees off-site is also
a new consideration. This can include technologies onboard v ehicles
as well as satellite and location technologies. It also includes the
organisation’s (and employee’s BYOD) smart phone (and other) devices.
The issues of monitoring and unjustified monitoring are also big consid-
erations. Organisations should not assume that monitoring, much less all
types of monitoring, of employees is permitted.
Clearly, there are many more means by which new and/or expanded
sets of personal data may be collected and used by an organisation.
However, it is equally necessary to consider the data protection
compliance issues at the earliest opportunity, and what collections are
permissible and which are not.
183
14.01 Processing Employee Personal Data
184
New Inward Facing Changes 14.02
●● health data (Recital 35, 45, 52–54, 63, 65, 71, 73, 75, 91, 112,
155, 159; Articles 4, 9, 17, 23, 36, 88);
●● GDPR definitions (Article 4);
●● new processing rules: obligations (Articles 5–11);
●● new (data protection) Principles (Article 5);
●● lawfulness of processing: lawful processing conditions (Article 6);
●● processing special categories of personal data (Article 9);
●● processing re criminal convictions and offences data (Article 10);
●● processing not requiring identification (Article 11);
●● Controllers and Processors (Chapter IV);
●● responsibility of the Controller (Article 24);
●● joint Controllers (Article 26);
●● Processor (Article 28);
●● processing under authority of Controller and Processor (Article 29);
●● records of processing activities (Article 30);
●● representatives of Controllers not established in EU (Article 27);
●● security of processing (Article 32);
●● notifying data breach to supervisory authority (Article 33);
●● communicating data breach to Data Subject (Article 34);
●● data protection impact assessment and prior consultation (Chapter IV,
Section 3);
●● data protection impact assessment (Article 35);
●● prior consultation (Article 36);
●● new Data Protection Officer (DPO) (Chapter IV; Section 4;
Article 37);
●● position (Article 38) and tasks (Article 39) of new DPO;
●● general principle for transfers (Recitals 6, 48, 101–103, 107, 108,
110–114, 153; Articles 4, 13, 14, 15, 23, 28, 30, 40, 42, 44–49, 70,
83, 85, 88, 96; Article 44);
●● transfers via adequacy decision (Article 45);
●● transfers via appropriate safeguards (Article 46);
●● transfers via binding corporate rules (Article 47);
●● transfers or disclosures not authorised by EU law (Article 48);
●● derogations for specific situations (Article 49);
●● new processing rules: Data Subject rights (Recitals 1–4, 9–11, 13,
16, 19, 38, 39, 41, 47, 50–54, 57, 59, 63, 65, 66, 68–71, 73–81,
84–86, 89, 91, 94, 98, 102, 104, 108, 109, 111, 113, 114, 116, 122,
129, 137, 139, 141–143, 153–156, 162, 164, 166, 173; Articles 1,
4–7, 9–22; Chapter III);
●● right to transparency (Recitals 13, 39, 58, 60, 71, 78, 100, 121;
Chapter III, Section 1; Articles 5, 12–14, 26, 40–43, 53, 88);
●● data access rights (Chapter III, Section 2);
185
14.02 Processing Employee Personal Data
186
Data Protection Officer (DPO) 14.03
as access requests, data protection website queries and the like. There
may have been an understanding that personnel managers were respon-
sible for dealing with all employee related queries, including references
to and copies of employee documentation and personal data.
This is no longer the case. Now there must be a designated DPO
appointed in organisations. Furthermore, the role and tasks of the
DPO are not limited to outward facing issues. The DPO will also be
concerned with inward facing issues. Employees and similar internal
facing individuals have data protection rights and will be able to address
queries to the DPO quite separate from the human resource functions.
Therefore, organisations must consider DPO issues and the GDPR
in terms of internal facing functions. Chapter IV, Section 4 of the new
GDPR refers to DPOs and the obligation for organisations to appoint
DPOs.
The Controller and the Processor shall designate a DPO in any case
where:
●● the processing is carried out by a public authority or body, except for
courts acting in their judicial capacity; or
●● the core activities of the Controller or the Processor consist of
processing operations which, by virtue of their nature, their scope
and/or their purposes, require regular and systematic monitoring of
Data Subjects on a large scale; or
●● the core activities of the Controller or the Processor consist of
processing on a large scale of special categories of data pursuant
to Article 9 and data relating to criminal convictions and offences
referred to in Article 10 (Article 37(1)).
A group of undertakings may appoint a single DPO provided that the
DPO is easily accessible from each establishment (Article 37(2)).
Where the Controller or the Processor is a public authority or body,
a single DPO may be designated for several such authorities or bodies,
taking account of their organisational structure and size (Article 37(3)).
In cases other than those referred to in Article 37(1), the Controller
or Processor or associations and other bodies representing categories of
Controllers or Processors may or, where required by EU or state law
shall, designate a DPO. The DPO may act for such associations and other
bodies representing Controllers or Processors (Article 37(4)).
The DPO shall be designated on the basis of professional qualities
and, in particular, expert knowledge of data protection law and practices
and the ability to fulfil the tasks referred to in Article 39 (Article 37(5)).
The DPO may be a staff member of the Controller or Processor, or
fulfil the tasks on the basis of a service contract (Article 37(6)).
The Controller or the Processor shall publish the contact details of the
DPO and communicate these to the supervisory authority (Article 37(7)).
187
14.03 Processing Employee Personal Data
The Controller or the Processor shall ensure that the DPO is involved,
properly and in a timely manner, in all issues which relate to the protec-
tion of personal data (Article 38(1)).
The Controller or Processor shall support the DPO in performing the
tasks referred to in Article 39 by providing resources necessary to carry
out these tasks as well as access to personal data and processing opera-
tions, and to maintain their expert knowledge (Article 38(2)).
The Controller or Processor shall ensure that the DPO does not receive
any instructions regarding the exercise of those tasks. He or she shall not
be dismissed or penalised by the Controller or the Processor for perform-
ing their tasks. The DPO shall directly report to the highest management
level of the Controller or the Processor (Article 38(3)).
Data Subjects may contact the DPO with regard to all issues related to
the processing of their personal data and the exercise of their rights under
the GDPR (Article 38(4)).
The DPO shall be bound by secrecy or confidentiality concern-
ing the performance of their tasks, in accordance with EU or state law
(Article 38(5)).
The DPO may fulfil other tasks and duties – which must not result in
a conflict of interests (Article 38(6)).
The Controller or Processor shall ensure that any such tasks and duties
do not result in a conflict of interests (Article 38(6)).
The DPO shall have at least the following tasks:
●● to inform and advise the Controller or the Processor and the employ-
ees who carry out processing of their obligations pursuant to the
GDPR and to other EU or state data protection provisions;
●● to monitor compliance with the GDPR, with other EU or state data
protection provisions and with the policies of the Controller or
Processor in relation to the protection of personal data, including
the assignment of responsibilities, awareness-raising and training of
staff involved in processing operations, and the related audits;
●● to provide advice where requested as regards the data protec-
tion impact assessment and monitor its performance pursuant to
Article 35;
●● to cooperate with the supervisory authority;
●● to act as the contact point for the supervisory authority on issues
related to the processing of personal data, including the prior con-
sultation referred to in Article 36, and to consult, where appropriate,
with regard to any other matter (Article 37(1)).
The DPO shall in the performance of their tasks have due regard to the
risk associated with the processing operations, taking into account the
nature, scope, context and purposes of the processing (Article 39(2)).
188
Those Covered 14.05
Those Covered
14.05 Who is covered by the inward facing organisational data protec-
tion obligations? While full time employees are the most obvious exam-
ple, they are not the only ones. Organisations must consider the inward
facing personal data of:
●● full time employees;
●● part time employees;
●● other workers such as temps and casual staff;
●● agency staff;
●● contractors;
●● ex-employees;
●● retired employees;
●● spouses;
●● job applicants, including unsuccessful applicants;
●● volunteers;
●● apprentices and trainees;
●● work experience staff;
●● indirectly engaged persons, such as actors (after the Sony film ‘The
Interview’ massive data breach incident – after which the online
publication of internal disparaging emails regarding certain actors
caused significant reputational damage and potential lawsuits. It also
cost key personnel their jobs).
189
14.05 Processing Employee Personal Data
Where an organisation engages with the data of any of the above, it will
have to ensure that the data protection regime is complied with.
190
Lawful Processing and Organisation’s Employees 14.08
191
14.08 Processing Employee Personal Data
192
Special Data Lawful Processing and Organisation’s Employees 14.12
193
14.12 Processing Employee Personal Data
ICO Codes
14.13 It is recommended that the organisation consult the most rel-
evant ICO guidance and codes in terms of implementing, or tailoring, IT
data processing and data protection compliance practices.1
Responsible Person for Data Protection Compliance
14.14 Organisations will have to appoint a particular identified person
in the organisation to deal with and be responsible for all data protection
processes and related compliance issues. This includes ensuring that the
organisation is data protection compliant in accordance with the DPA
and the ICO Employment Practices Code.2
In addition to a data protection supervisor or DPO it is also recom-
mended that an individual at Board level be appointed to be responsible
for overseeing and dealing with data protection compliance within the
organisation. The contemporary importance and significance of data pro-
tection ensures that it is now clearly a boardroom issue.
Responsibilities include ongoing compliance, policies, strategies,
processes, training, monitoring, reviewing and updating, coordinating,
engaging appropriate expertise and advices, audits, DPbD, education,
courses, notification and registration, incident response, etc, as regards
data protection.
Personnel Contracts
14.15 The organisation’s contracts of employment need to incorpo-
rate appropriate notifications, consent clauses (only if appropriate), and
194
Employees and Security 14.20
195
14.20 Processing Employee Personal Data
196
Conclusion 14.22
Conclusion
14.22 Organisations need to actively have considered data protec-
tion compliance issues and the recording of compliance even before an
employee is engaged. Data protection and personal data arises at recruit-
ment, selection and interview stages. The organisation must also note
relevant policies. Unless data protection issues and policy issues are
properly incorporated into the employment relationship, the organisa-
tion may be non-compliant. In addition, it may not be able to enforce
and rely upon particular contract terms, policies, employee obligations,
disciplinary rules and such like.
197
198
Chapter 15
Employee Data Protection Rights
Introduction
15.01 Just as other parties whose personal data are being collected and
processed have data protection rights, employees also have Data Subject
rights.
199
15.02 Employee Data Protection Rights
200
Rights Under the GDPR 15.05
●● where possible, the envisaged period for which the personal data will
be stored, or if not possible, the criteria used to determine that period;
●● the existence of the right to request from the Controller rectification
or erasure of personal data or restriction of processing of personal
data concerning the employee or to object to the processing;
●● the right to lodge a complaint to a SA;
●● where the personal data are not collected from the employee, any
available information as to their source;
●● the existence of automated decision making including profiling
referred to in Article 22(1) and (4) and at least in those cases, mean-
ingful information about the logic involved, as well as the signifi-
cance and the envisaged consequences of such processing for the
employee (Article 15(1)).
Where personal data are transferred to a third country or to an interna-
tional organisation, the employee shall have the right to be informed of
the appropriate safeguards pursuant to Article 46 relating to the transfer
(Article 15(2)).
The Controller shall provide a copy of the personal data undergoing
processing. For any further copies requested by the employee, the Con-
troller may charge a reasonable fee based on administrative costs. Where
the Data Subject makes the request in electronic form, and unless other-
wise requested by the employee, the information shall be provided in a
commonly used electronic form (Article 15(3)).
The right to obtain a copy referred to in para (3) shall not adversely
affect the rights and freedoms of others (Article 15(4)).
Rectification Right
15.04 Chapter III, Section 3 of the GDPR refers to rectification and
erasure. The employee shall have the right to obtain from the Control-
ler without undue delay the rectification of inaccurate personal data con-
cerning them. Taking into account the purposes of the processing, the
employee shall have the right to have incomplete personal data completed,
including by means of providing a supplementary statement (Article 16).
Right to Erasure (Right to be Forgotten)
15.05 The new GDPR states that Data Subject shall have the right to
obtain from the Controller the erasure of personal data concerning them
without undue delay and the Controller shall have the obligation to erase
personal data without undue delay where one of the following grounds
applies:
●● the personal data are no longer necessary in relation to the purposes
for which they were collected or otherwise processed;
201
15.05 Employee Data Protection Rights
202
Rights Under the GDPR 15.08
203
15.08 Employee Data Protection Rights
The right shall not adversely affect the rights and freedoms of others
(Article 20(4)).
Automated Individual Decision Making Right
15.09 Chapter III, Section 4 of the new GDPR refers to the right to
object and automated individual decision making.
Right to Object
15.10 The new GDPR states that the employee shall have the right
to object, on grounds relating to their particular situation, at any time
to the processing of personal data concerning them which is based on
Article 6(1)(e) or (f), including profiling based on these provisions.
The Controller shall no longer process the personal data unless the
Controller demonstrates compelling legitimate grounds for the processing
which override the interests, rights and freedoms of employee or for the
establishment, exercise or defence of legal claims (Article 21(1)).
Where personal data are processed for direct marketing purposes,
the Data Subject shall have the right to object at any time to processing
of personal data concerning them for such marketing, which includes
profiling to the extent that it is related to such direct marketing
(Article 21(2)).
Where the employee objects to processing for direct marketing
purposes, the personal data shall no longer be processed for such
purposes (Article 21(3)).
At the latest at the time of the first communication with the employee,
the right referred to in Article 21(1) and (2) shall be explicitly brought
to the attention of the employee and shall be presented clearly and
separately from any other information (Article 19(4)).
In the context of the use of information society services, and
notwithstanding Directive 2002/58/EC,1 the employee may exercise
their right to object by automated means using technical specifications
(Article 21(5)).
Where personal data are processed for scientific and historical
research purposes or statistical purposes pursuant to Article 89(1), the
employee, on grounds relating to their particular situation, shall have the
right to object to processing of personal data concerning them, unless
1 Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002
concerning the processing of personal data and the protection of privacy in the elec-
tronic communications sector (Directive on privacy and electronic communications).
Also note ePrivacy Regulation and updated ePrivacy rules.
204
Rights Under the GDPR 15.12
the processing is necessary for the performance of a task carried out for
reasons of public interest (Article 21(6)).
Automated Individual Decision Making, Including Profiling
15.11 The new GDPR states that the employee shall have the right
not to be subject to a decision based solely on automated processing,
including profiling, which produces legal effects concerning them or
similarly significantly affects them (Article 22(1)).
Article 22(1) shall not apply if the decision:
●● is necessary for entering into, or performance of, a contract between
the employee and a Controller [a]; or
●● is authorised by EU or state law to which the Controller is subject
and which also lays down suitable measures to safeguard the
employee’s rights and freedoms and legitimate interests; or
●● is based on the Data Subject’s explicit consent (Article 22(2)) [c].
In cases referred to in Article 22(2)(a) and (c) the Controller shall imple-
ment suitable measures to safeguard the employee’s rights and freedoms
and legitimate interests, at least the right to obtain human intervention
on the part of the Controller, to express their point of view and to contest
the decision (Article 22(3)).
Decisions referred to in Article 22(2) shall not be based on special
categories of personal data referred to in Article 9(1), unless Article 9(2)(a)
or (g) applies and suitable measures to safeguard the employee’s rights
and freedoms and legitimate interests are in place (Article 22(4)).
Express Employee Provision
15.12 There are a limited number of situations which are expressly
referred to in the GDPR in addition to the general provisions. One
specific provision refers to the employment sector. This is referred to in
GDPR Article 88. It provides that:
‘Member States may, by law or by collective agreements, provide for more
specific rules to ensure the protection of the rights and freedoms in respect
of the processing of employees’ personal data in the employment context, in
particular for the purposes of the recruitment, the performance of the con-
tract of employment, including discharge of obligations laid down by law or
by collective agreements, management, planning and organisation of work,
equality and diversity in the workplace, health and safety at work, protection
of employer’s or customer’s property and for the purposes of the exercise and
enjoyment, on an individual or collective basis, of rights and benefits related
to employment, and for the purpose of the termination of the employment
relationship.’
205
15.12 Employee Data Protection Rights
It continues that:
‘Those rules shall include suitable and specific measures to safeguard the data
subject’s human dignity, legitimate interests and fundamental rights, with par-
ticular regard to the transparency of processing, the transfer of personal data
within a group of undertakings, or a group of enterprises engaged in a joint
economic activity and monitoring systems at the work place.’
Conclusion
15.13 Organisations need to respect the data protection rights of
their employees, and even potential employees. In addition, particular
care and attention needs to be paid to access requests from employees.
Compliance is an ongoing issue as, for example, new changes and
business practices will always present new challenges internally.
206
Chapter 16
Employee Considerations
Introduction
16.01 A large number of issues arise in terms of dealing with employee
personal data, both in terms of audits, access, planning and compliance.
Contract
16.02 The starting point for informing and appraising employees of
the importance of data protection, confidentiality and security in the
organisation, and in relation to the employee’s personal data should be to
begin with the employment contract. There should be clauses referring
to data protection and also to security.
Policies
16.03 There should also be policies relating to data protection
furnished to all actual (and prospective) employees. These need to be
updated regularly as the issues covered change constantly.
These policies may be separate or may be incorporated into an
employee handbook.
Organisations need to be aware that if there is an important change
made, unless this is notified and recorded to employees, the o rganisation
may not be able to rely upon the changed clause. For example, if there
is a new activity banned or regulated in an updated policy but the new
policy is not notified to employees, it may be impossible to use the
new policy to disciple an errant employee. They and their lawyers will
strongly argue that the new policy was not notified, is not part of the
employment relationship, and would be unlawful to apply. There are
many examples of this problem occurring in practice.
207
16.04 Employee Considerations
208
Evidence 16.09
Transfers of Undertaking
16.08 Transfers of undertakings or TUPE,1 as it is known, refers to
organisations being transferred to a new owner, whether in whole or in
part. Situations like this are an everyday part of the commercial business
environment.
The Transfer of Undertakings (Protection of Employment) Regulations
20062 provide certain protections for employees where the business is
being transferred to a new owner. While primarily directed at the protec-
tion of employees’ employment related rights, it is also noteworthy in
that employee personal data will also be transferred to the new employer
or organisation. There are various types of personal data to consider.
The same rights, interests, terms, contracts, etc, as applied with the
old employer are to apply with the new employer, which included data
protection user rights, and possibly corporate communications usage, etc.
Evidence
16.09 Disputes naturally arise between employers and employees from
time to time. In such disputes the organisation may need to rely upon
documents, information and materials which will contain personal data.
While this may fit under the legitimate interests and legal interest provi-
sions, employers should be careful about using less obvious personal
data. This might include private emails communications over which an
employee may argue privacy and confidentiality. Particular concerns
arise in cases where covert monitoring has been used. Before commenc-
ing covert activities of this type the organisation should seek advices.
Otherwise, any evidence gathered may possibly be ruled inadmissible
subsequently.
Organisations also need to be careful in that computer, electronic and
mobile data can change, expire and or be amended quickly. It can be
important to act quickly. Advance policies, procedures and protocols
assist in this regard.
209
16.10 Employee Considerations
Enforceability
16.10 An important issue for all organisations to consider is that if
they ever wish to be able to discipline an errant employee, including up
to dismissal, consequent upon their activities regarding personal data,
internet usage, security breach, etc, the organisation needs to be able to
point to a breach of an explicit contract or policy clause. If the breach
is not explicit, or there is not written into the policy and contract, the
employee can argue that there is no breach, perhaps regardless of the
seriousness of the instant issue arising.
While online abuse is an issue to be dealt with, organisations need to
be conscious of reputational damage from such incidents. However, they
also need to consider what would happen if any of their employees are
involved, whether by way of participation or orchestration, in an incident
of abuse. One would have to consider what the contracts and policies
say, as well as develop reaction strategies.
Data Breach
16.11 Employee involvement is critical in dealing with – and
preparing for – data breach incidents. Various teams of employees will
be involved.
Notification of Employee Data Breaches
16.12 However, as employee personal data can also be the subject of
a data breach incident, employees may also need to be specifically con-
sidered in this context. For example, they may need to be separately
informed that there is a breach relating to their personal data and what
actions and safeguards are being followed by the organisation to deal
with the issue. If the employees need to take specific actions, they may
also need to be appraised of this possibility. Potentially liability issues
may also arise. For example, employees in the massive Sony data breach
incidents may have considered suing Sony for breaches in relation to
their data.
210
Conclusion 16.15
Location
16.14 Increasingly technology permits organisations to track devices
and hence employees. However, a very careful prior analysis needs to
be conducted in advance to consider whether this is strictly needed,
desirable, proportionate, transparent and complies with the data protec-
tion regime. As with many of these new issues, a question of balance
is needed and just because something is technically possible does not
equate with it being prudent or lawful.
Conclusion
16.15 These are all issues that need to be addressed well in advance
of an incident arising. It may be too late to start implementing policies,
etc, after the event.
Employee data protection compliance is a complicated and ongoing
obligation for organisations. It also needs to involve the DPOs, appropri-
ate board member, human resources, IT personnel and legal. On occa-
sion, others may also have to become involved also.
Organisations should also ensure that employees are fully appraised of
the need for respect for personal data, data security, and understanding
of the respective policies to protect personal data. Where an employee
accesses, uses or – worse – discloses personal data, whether of customers
or employees, the employer will be held responsible (notwithstanding
any employee responsibility issues). The data regulator will seek to know
what the employer did or did not do that may have prevented to employee
breach arising. Data security is also very important and ranges from
access controls, segregation, hierarchies of access on a need-to-access
basis, passwords, encryption, device policies, and on-site and off-site
usage rules. These issues, and where risks and gaps may arise, are ongoing
compliance requirements and cannot be left static over time.
211
212
Chapter 17
Employee Monitoring Issues
Introduction
17.01 One of the more contentious areas of employee data protection
practice relates to the issue of the monitoring of employee email, inter-
net, etc usage. More recently, concerns have arisen as to the use of tech-
nology to monitor employee activities generally, and to monitor their
location and movement.
Employers are concerned about certain risks that can arise as result
of the activities of employees in the workplace, but sometimes proceed
without considering data protection compliance, the need for proportion-
ality, and that while certain monitoring activities may be permissible,
others will not be. Employers need to engage in a careful diligence exer-
cise prior to rolling out any monitoring-type activities. It is also unwise
be assume that just because one monitoring use or activity may be pos-
sible, that additional unrelated forms of monitoring technology will also
be legally permitted. Various data regulators receive complaints from
employees that refer to employer monitoring issues, from CCTV, to
email, to location, to biometrics, etc.
213
17.02 Employee Monitoring Issues
●● copyright infringement;
●● confidentiality breaches and leaks;
●● data protection;
●● contract;
●● inadvertent contract formation;
●● harassment;
●● abuse;
●● discrimination;
●● computer crime;
●● interception offences;
●● criminal damage;
●● data loss;
●● data damage;
●● computer crime;
●● criminal damage;
●● eCommerce law;
●● arms and dual use good export restrictions;
●● non-fatal offences against the person;
●● child pornography;
●● policies;
●● on-site/off-site;
●● bring your own device (BYOD), etc;
●● online abuse, snooping, etc.
These are examples of an expanding list of concerns for organisations.
Obviously, some of these will be recalibrated in importance depending
on the type of organisation, the business sector and what its activities
are. Confidentiality, for example, may be critically important for certain
organisations, but less important for other organisations.
214
Employee Misuse of Email, Internet, etc 17.03
2 See, for example, G Martin, ‘Sony Data Loss Biggest Ever,’ Boston Herald,
27 April 2011.
3 See, for example, C Arthur, ‘Sony Suffers Second Data Breach With Theft of 25m
More User Details,’ Guardian, 3 May 2011.
4 See, for example, ‘Brown Apologises for Record Loss, Prime Minister Gordon Brown
has said he “Profoundly Regrets” the Loss of 25 Million Child Benefit Records,’ BBC,
21 November 2007, at http://news.bbc.co.uk/2/hi/7104945.stm.
5 See, for example, ‘Largest Ever Fine for Data Loss Highlights Need for Audited
Data Wiping,’ ReturnOnIt, at http://www.returnonit.co.uk/largest-ever-fine-for-data-
loss-highlights-need-for-audited-data-wiping.php.
6 See, for example, J Oates, ‘UK Insurer Hit With Biggest Ever Data Loss Fine,’
The Register, 24 August 2010, at http://www.theregister.co.uk/2010/08/24/data_loss_
fine/. This was imposed by the Financial Services Authority (FSA).
7 ICO v DSG Retail [2020] 9/1/20.
215
17.03 Employee Monitoring Issues
Contract
17.04 It is possible for employees to agree and enter into contract via
electronic communications. This is increasingly a concern since the legal
recognition of electronic contract in the eCommerce legislation.
This can include the inadvertent creation of legally binding contracts
for the organisation.
In addition, it is possible that an employee may create or agree partic-
ular contract terms, delivery dates, etc, electronically which they would
not otherwise do.
These can be contracts, or terms, which the organisation would not
like to be bound by.
It is also possible that breach of contract issues could arise.
Employment Equality
17.05 It can be illegal to discriminate, or permit discrimination, on
grounds of, for example:
●● gender;
●● race;
216
Offline Abuse 17.08
●● age;
●● sexual orientation;
●● family status;
●● religious beliefs;
●● disability;
●● member of minority groups.
Instances of such discrimination can occur on the organisation’s com-
puter systems. Even though the organisation may not be initially aware
of the instance, it can still have legal consequences.
Harassment
17.06 Harassment via the organisation’s computer systems is also
something which could cause consequences for an organisation. Exam-
ples could include the circulation of written words, pictures or other
material which a person may reasonably regard as offensive. The organi-
sation could be held liable for employees’ discriminatory actions unless
it took reasonable steps to prevent them, or to deal with them appro-
priately once they arise. See Protection from Harassment Act 1997 (as
amended).
Online Abuse
17.07 This is a growing problem. However, it is also an issue for
organisations when their employees are the victims or perpetrators of
online abuse. It is only a matter of time before organisations are sued for
the actions of their employees using the organisation’s systems. Organi-
sations can also assist in tackling these issues, and some indeed have
more of an ability to do so than others.
Offline Abuse
17.08 Offline abuse or offline disparagement, defamation, etc can also
arise. In the Sony data breach incident regarding the film ‘The Interview’
there are examples of employee details being published online after the
breach. In addition various emails were published where senior employ-
ees were at least disparaging of others directly or indirectly engaged by
the organisations. In instances such as this, as well as being other than
best practice for both the employees and the organisation, liability issues
can also arise.
217
17.09 Employee Monitoring Issues
Child Pornography
17.09 There is a serious risk and concern for organisations where this
could occur on the organisation’s computer systems or devices. See, for
example, the Protection of Children Act 1978 (as amended), Criminal
Justice Act 1988 (as amended), and the Criminal Justice and Public
Order Act 1994 (as amended).
218
Focus of Organisational Communications Usage Policies 17.12
219
17.12 Employee Monitoring Issues
●● text;
●● internet;
●● mobile and portable devices;
●● electronic storage devices;
●● home and off-site usage;
●● vehicle usage and location usage;
●● employee Internet of Things (IoT) usage as it may affect the
organisation.
This will involve an ongoing task, not just a one-off exercise. It also
needs coordinated team responsibility.
Key Issues to Organisational Communications
Usage Policies
17.13 The key aspects to consider in relation to the employee corpo-
rate communications usage policies, include:
●● ownership;
●● usage;
●● authorisation;
●● confidentiality;
●● authentication;
●● retention and storage;
●● viruses;
●● disciplinary matters;
●● dismissal matters;
●● security;
●● awareness;
●● transparency;
●● breach notification;
●● DPOs;
●● planning and data protection by design and by default.
These will vary depending on each organisation.
From a data protection regime perspective, one of the key issues for an
organisation is the ability to monitor employees if and when needed, as
distinct from general monitoring which may be difficult or not permissible.
220
Human Right 17.15
Human Right
17.15 The following is subject to continuing Brexit considerations.
The Human Rights Act 1998 (as amended)12 means that the European
10 See, for example, C Brandenburg, ‘The Newest Way to Screen Job Applicants: A
Social Networker’s Nightmare,’ Federal Communications Law Journal (2007–2008)
(60) 597; D Gersen, ‘Your Image, Employers Investigate Job Candidates Online More
than Ever. What Can You Do to Protect Yourself?’ Student Law (2007–2008) (36)
24; AR Levinson, ‘Industrial Justice: Privacy Protection for the Employed,’ Cornell
Journal of Law and Public Policy (2009) (18) 609–688; I Byrnside, ‘Six Degrees of
Separation: The Legal Ramifications of Employers Using Social Networking Sites
to Research Applicants,’ Vanderbilt Journal of Entertainment and Technology Law
(2008) (2) 445–477; and M Maher, ‘You’ve Got Messages, Modern Technology
Recruiting Through Text Messaging and the Intrusiveness of Facebook,’ Texas Review
of Entertainment and Sports Law (2007) (8) 125–151.
11 Human Rights Act 1998, at http://www.legislation.gov.uk/ukpga/1998/42/contents.
12 Human Rights Act 1998, at http://www.legislation.gov.uk/ukpga/1998/42/contents.
221
17.15 Employee Monitoring Issues
222
EDPB/WP29 17.18
ILO Code
17.17 Organisations should also consider the ILO Code of Practice on
Protection of Workers Personal Data,16 which recommends that:
●● employees must be informed in advance of reasons, time schedule,
methods and techniques used and the personal data collected;
●● the monitoring must minimise the intrusion on privacy of employees;
●● secret monitoring must be in conformity with legislation or on foot
of suspicion of criminal activity or serious wrongdoing;
●● continuous monitoring should only occur if required for health and
safety or protection of property.
EDPB/WP29
Processing in the Employment Context
17.18 The WP29, now replaced by the EDPB, has long been con-
cerned about employee monitoring and surveillance issues in terms of
privacy and personal data. It issued an Opinion on the Processing of
Personal Data in the Employment Context.17 It states that ‘no business
interest may ever prevail on the principles of transparency, lawful pro-
cessing, legitimisation, proportionality, necessity and others contained in
data protection laws.’
16 At http://www.ilo.org/wcmsp5/groups/public/---ed_protect/---protrav/---safework/
documents/normativeinstrument/wcms_107797.pdf.
17 Opinion 8/2001 on the processing of personal data in the employment context, WP48.
223
17.18 Employee Monitoring Issues
224
EDPB/WP29 17.19
19 See above.
20 See above.
21 Opinion 2/2008 on the review of the Directive 2002/58/EC on privacy and electronic
communications (ePrivacy Directive), WP150.
22 Opinion 2/2008 on the review of the Directive 2002/58/EC on privacy and electronic
communications (ePrivacy Directive), WP150.
23 Working document on the surveillance of electronic communications in the work-
place, WP55.
24 Opinion 4/2007 on the concept of personal data. At http://ec.europa.eu/justice/
data-protection/article-29/documentation/opinion-recommendation/files/2007/
wp136_en.pdf.
25 At http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-
recommendation/files/2007/wp131_en.pdf.
225
17.19 Employee Monitoring Issues
226
Processing Compliance Rules 17.22
Suggested Guidelines
17.22 Some suggested guidelines to consider generally are set out
below. However, it is always suggested that appropriate professional
legal and technical advice be sought in particular circumstances:
●● comply with the processing compliance rules set out above;
●● ensure fair obtaining, collecting and processing of personal data;
●● compliance must be ensured at the time of data capture NOT
subsequently;
●● get it right first time;
●● the lessons of British Gas and other examples are that in a worst case
you may have to delete the database and start again from the begin-
ning, or re-do your collection and notification process;
●● consider opt-in and opt-out consent changes;
●● consider the purpose or purposes for the data collection and which
must be specified;
●● provide information to the Data Subject when collecting;
●● consider whether the Data Subject is the source (direct) or whether a
third-party is the source (indirect);
●● specified and lawful;
●● use or purpose to which the data collected will be put must be clear
and defined. Otherwise it could be deemed too vague and unfair and
ultimately an unfair collection which would undermine the initial
consent given;
●● if disclosure occurs, it must be specified, clear and defined;
●● data security measures must be assessed and implemented;
●● data security includes physical security;
●● data security also includes technical security;
●● measures must be put in place to prevent loss, alteration or
destruction;
●● other legislation may also apply such as in relation to hacking, crim-
inal damage, etc;
●● the personal data must be kept accurate and kept up to date;
●● personal data must be kept for no longer than is necessary;
●● consider that there are many different types of personal data;
●● the organisational or business need requirement must be identified;
●● how personal data is collected must be considered, planned and
recorded;
●● check Principles of data protection;
●● check Lawful Processing Conditions;
●● explicit consent may be required for collecting and processing spe-
cial personal data;
227
17.22 Employee Monitoring Issues
228
Monitoring Case 17.24
●● security rights;
●● data protection impact assessment and prior consultation;
●● communicating data breach to Data Subject (Article 34);
●● Data Protection Officer (DPO);
●● remedies, liability and sanctions (Chapter VIII).
Monitoring Case
17.24 There has been considerable publicity in relation to the ECHR
case of Bărbulescu v Romania.28 This was frequently reported as hold-
ing that employers can monitor employee communications. The ECHR
press release heading states: ‘Monitoring of an employee’s use of the
internet and his resulting dismissal was justified’. Popular commentary
suggested and implied that all employers can monitor all employee
communications including email and internet. A strong and significant
word of caution should be noted by organisations. The previous edition
noted:
●● the case does not find on a general basis that employers can monitor
all employee email;
●● the case does not find on a general basis that employers can monitor
all employee internet usage;
●● the case does not find on a general basis that employers can monitor
all employee communications;
●● the case technically related to a claim that national laws are
insufficient, it is not a case per se between the employee and the
employer;
●● there is a significant dissent encompassed within the judgment –
which some will feel is a more correct assessment of the law – and
provides better guidance to employers;
●● the majority decision acknowledges difficult legal and factual issues
and certain matters missing from the claim file from the respective
sides;
●● the employer had accessed two online communications’ accounts of
the employee, one ostensibly for business and one personal;
●● notwithstanding that the personal account was clearly personal and
private, and there being various apparent issues, the majority seemed
to ignore this clear breach by the employer;
229
17.24 Employee Monitoring Issues
230
Conclusion 17.25
Since the last edition it can now be noted that the previous level
of understanding has been restored. The case Bărbulescu v Romania
was the subject of a more superior decision in the Grand Chamber of
ECHR in 2017.29 This resulted in a different decision in favour of the
employee. The court said that the employee’s rights were not properly
considered.
The court concludes that the applicant’s communications in the work-
place were covered by the concept of ‘private life’ and ‘correspond-
ence’. In the circumstances of the case, Article 8 of the Convention was
applicable.
The original courts did not sufficiently examine whether the aim
pursued by the employer could have been achieved by less intrusive
methods than accessing the actual contents of the employee’s com-
munications. The original court also failed to consider the seriousness
of the consequences of the monitoring and the subsequent discipli-
nary proceedings. The Grand Chamber noted that the employee had
received the most severe disciplinary sanction, namely dismissal. It
held that:
‘the domestic courts failed to determine, in particular, whether the applicant
had received prior notice from his employer of the possibility that his commu-
nications on Yahoo Messenger might be monitored; nor did they have regard
either to the fact that he had not been informed of the nature or the extent
of the monitoring, or to the degree of intrusion into his private life and cor-
respondence. In addition, they failed to determine, firstly, the specific reasons
justifying the introduction of the monitoring measures; secondly, whether the
employer could have used measures entailing less intrusion into the appli-
cant’s private life and correspondence; and thirdly, whether the communica-
tions might have been accessed without his knowledge’.
‘[T]he Court considers that the domestic authorities did not afford adequate
protection of the applicant’s right to respect for his private life and corre-
spondence and that they consequently failed to strike a fair balance between
the interests at stake. There has therefore been a violation of Article 8 of the
Convention’.
Conclusion
17.25 Organisations at different times may feel a tension to engage
in monitoring of employees. No matter how tempting, this needs to be
231
17.25 Employee Monitoring Issues
232
Part 3
Outward Facing Organisational
DP Obligations
233
234
Chapter 18
Outward Facing Issues
Introduction
18.01 Beyond the inward facing employee related sphere, organisa-
tions also need to consider the outward facing sphere. For many organi-
sations the outward facing data protection issues frequently dominate
more. They can also be the most contentious. These issues raise signifi-
cant data protection concerns and compliance issues to be dealt with.
Because these issues are related to consumers, they are more obvious
to the media and gain more public attention when things go wrong –
whereas employee data issues are less obvious or less transparent.
Some of the queries that can arise include:
●● consumer data rights;
●● data over-collection;
●● data misuse by corporations;
●● hidden collections;
●● hidden uses;
●● consent issues;
●● data breach issues and how breaches arose;
●● whether individuals are notified frequently enough and early enough
of breach events;
●● whether companies take sufficient remedial measures after a breach
arises and whether they should pay breach monitoring and insur-
ance for the individuals affected (eg Equifax data breach and the
monitoring for third party use of breach victim details by errant third
parties);
●● designated Data Protection Officers (DPOs);
●● forms of outward facing personal data to consider;
●● compliance with the data protection regime when dealing with exist-
ing customers;
235
18.01 Outward Facing Issues
236
New Outward Facing Changes 18.02
Some of the new GDPR changes which apply to outward facing organi-
sational issues include:
●● repeal of the EU Data Protection Directive (DPD 1995) (Article 94);
●● WP29 and EDPB (Recitals 72, 77, 105, 119, 124, 136, 140, 143,
168; Articles 35, 40–43, 47, 51, 52, 58 – 62, 64, and 65);
●● background and rationale (Recitals 1, 8, 11, 13);
●● context, objectives, scope of GDPR (Articles 1, 2 and 3);
●● obligations (Recitals 32, 39, 40, 42, 43–47);
●● security (Recitals 2, 16, 19, 39, 49, 50, 52, 53, 71, 73, 75, 78, 81, 83,
91, 94, 104, 112; Articles 2, 4, 5, 9, 10, 30, 32, 35, 40, 47);
●● processing;
●● rights (Recitals 1, 2, 4, 9, 10, 11, 13, 16, 19, 38, 39, 41, 47, 50–54,
57, 63, 65, 66, 68–71, 73–81, 84–86, 89, 91, 94, 98, 102, 104, 108,
109, 111, 113, 114, 116, 122, 129, 137, 139, 141–143, 153–156, 162,
164, 166, 173; Articles 1, 4–7, 9–22);
●● proceedings (Recitals 52, 80, 129, 143, 147; Articles 23, 40, 78, 79,
81, 82);
●● establishment (Recitals 22, 36, 52, 65, 100, 117, 122, 124, 126, 127;
Articles 3, 4, 9, 17, 18, 21, 37, 42, 49, 54, 56, 57, 60, 62, 65, 70, 79);
●● transfers (Recitals 6, 48, 101–103, 107, 108, 110–114, 153;
Articles 4, 13–15, 23, 28, 30, 40, 42, 44–49, 70, 83, 85, 88, 96);
●● ICO, etc;
●● new bodies (Recital 142; Articles 9, 80);
●● notification/registration replaced (Recital 89);
●● exceptions/exemptions (Recitals 14, 15, 17);
●● lawful processing and consent (Recitals 10, 32, 33, 38–40, 42–46,
49–51, 54, 63, 65, 68, 69, 71, 83, 111, 112, 116, 138, 155, 161, 171;
Articles 4–9, 13, 14, 17, 18, 20, 22, 23, 32, 40, 49, 82, 83);
●● online identifiers (Recitals 30, 64; Articles 4, 87);
●● sensitive and special personal data (Recitals 10, 51, 53, 54, 59, 65,
71, 80, 91, 97; Articles 6, 9, 22, 27, 30, 35, 37, 47);
●● children (Recital 38);
●● health data (Recitals 35, 45, 52–54, 63, 65, 71, 73, 75, 91, 112, 155,
159: Article 4, 9, 17, 23, 36, 88);
●● GDPR definitions (Article 4);
●● new processing rules: obligations (Articles 5–11);
●● new (data protection) Principles (Article 5);
●● lawfulness of processing: lawful processing conditions (Article 6);
●● child’s consent;
●● processing special categories of personal data (Article 9);
●● processing re criminal convictions and offences data (Article 10);
●● processing not requiring identification (Article 11);
237
18.02 Outward Facing Issues
238
Data Protection Officer 18.03
239
18.03 Outward Facing Issues
240
Types of Outward Facing Personal Data 18.05
241
18.05 Outward Facing Issues
1 This issue arose for consideration in the first data protection audit of Facebook by the
Irish supervisory authority. See also, for example, S Monteleone, ‘Privacy and Data
Protection at the time of Facial Recognition: Towards a New Right to Digital Iden-
tity?’ European Journal of Law and Technology (2012) (3:3).
242
Compliance with the Outward Facing Principles 18.08
243
18.08 Outward Facing Issues
244
Ordinary Personal Data Lawful Processing Conditions 18.09
245
18.09 Outward Facing Issues
246
Customers, etc, Special Personal Data Lawful Processing Conditions 18.10
247
18.10 Outward Facing Issues
248
Consequences of Non-Compliance 18.13
Direct Marketing
18.12 Most commercial organisations will wish to engage in direct
marketing (DM). For some organisations this will be an important core
activity.
The data protection regime has extensive provisions dealing with
direct marketing. There are requirements to inform the Data Subject that
they may object by a written request and free of charge to their personal
data being used for direct marketing (DM) purposes.
If the Controller anticipates that personal data kept by it will be pro-
cessed for purposes of direct marketing it must inform the persons to
whom the data relates that they may object by means of a request in
writing to the Controller and free of charge.
However, a customer is entitled at any time by notice in writing to a
Controller to require the Controller at the end of such period (as is rea-
sonable in the circumstances) to cease, or not to begin, processing for
the purposes of direct marketing (DM) personal data in respect of which
they are the Data Subject.
Two individuals (ie, separate to the organisation) were fined £440,000
by the ICO for sending unsolicited marketing Spam messages.2 More
recently, Black Lion Marketing was fined £171,000 for unsolicited
texts;3 CRDNN Limited was fined £500,000 for 193 million unsolicited
calls;4 and True Visions Productions was fined £120,000 for consent and
transparency failings.5
Note the updated rules under the ePrivacy Regulation (and PECR)
once finalised.
Consequences of Non-Compliance
18.13 If the organisation fails to assess and organise compliance pro-
cedures in advance of undertaking the collection and processing of per-
sonal data of customers, etc, it will inevitable be operating in breach of
the data protection regime. Any personal data collected will be illicit.
Equally, if originally compliant but during operation one of the data
protection Principles, Lawful Processing Conditions, and/or security
requirements are breached, the personal data processed will be question-
able, particularly if new personal data is involved or has new activities
and uses.
2 ICO v Niebel and ICO v McNeish at https//:ico.org.uk. Note, case was appealed.
3 ICO v Black Lion Marketing Limited [2020] 27/3/2020.
4 ICO v CRDNN Limited [2020] 2/3/2020.
5 ICO v True Visions Productions Limited [2019] 10/4/19.
249
18.13 Outward Facing Issues
What are the consequences? The collection and/or processing are ille-
gal. The organisation, as the Controller, can be the subject of complaints,
investigations and enforcement proceedings from the ICO. Depending
on the severity of the non-compliance, prosecutions can also involve the
directors and employees of the organisation, in addition to the organisa-
tion itself.
If convicted, the organisation could face significant fines. These will
be in addition to the bad publicity and media attention which a prosecu-
tion can bring.
There can be other consequences too. If the organisation relies heavily
on direct marketing (DM), or is a particular type of internet company,
the customer database of personal data can be one of the most signifi-
cant assets of the organisation. If the database is collected in breach of
the data protection regime, the organisation will not be able to establish
compliant data collections and consents. It could, therefore, be ordered
to delete the database.
Alternatively, an organisation may wish to sell its business or to seek
investors for the business. This is frequently the case in the technology
sector. However, as part of a potential purchaser or investor assessing
whether to proceed, it will undertake a due diligence examination of
the processes, procedures and documentation of the organisation. It will
request to see documented evidence of data protection compliance and
that the valuable database, etc, are fully data protection compliant. If this
cannot be established, serious question marks will arise and the transac-
tion may not proceed.
250
Conclusion 18.15
needs to ensure compliance. This may mean that the organisation needs
to have a separate additional set of notices, policies and consent docu-
mentation in relation to users.
Conclusion
18.15 When organisations begin to look outwards, a separate range of
data collection possibilities will arise. The avenues for data collection
are more diverse. In addition, the intended uses to which the organisation
will put this type of personal data will be potentially greater. The data
protection Principles and Lawful Processing Conditions require particu-
lar consideration and configuration to the intended data processing activ-
ities of customer, etc personal data. Different security and enforcement
risks can arise and need to be protected against. It cannot be assumed that
everyone that the organisation may wish to collect personal data from
will be an actual customer. Therefore, organisations need to consider
how to ensure separate consent and notifications to this category of person.
An example of this may be cookies which may obtain personal data.
Even on the narrow issue of cookies, we see that consent and transpar-
ency are no longer linear, and now to be compliant must be multi faceted
and multi layered. Consent and compliance from a wider perspective are
also increasingly complex. The many competing interests that must be
met by outward facing data protection compliance mean it is more diffi-
cult, but it also becomes easier to miss a gap and become non compliant.
251
252
Chapter 19
Data Protection and Privacy by
Design
Introduction
19.01 It has been suggested that ‘law should play a more active role in
establishing best practices for emerging online trends.’1 Data Protection by
Design (DPbD) and data protection by default are prime examples. One of
the most important and developing practical areas of data protection is the
concept of DPbD as referred to in the EU General Data Protection Regula-
tion (GDPR). Originally developed as a follow on from the data protection
legal regime, it is now being recognised more widely, and is also being
explicitly referred to and recognised in primary legislation itself.
DPbD/PbD and data protection by default are important for organisa-
tions both in terms of being a legal obligation but also commercially in
terms of being a competitive advantage.2
Background
19.02 The concept of PbD is complementary to data protection law
and regulation. The idea is acknowledged to have started with Dr Ann
Cavoukian, previously the Information and Privacy Commissioner for
Ontario, Canada. She states that:
‘the increasing complexity and interconnectedness of information technolo-
gies [requires] building privacy right into system design … the concept of
253
19.02 Data Protection and Privacy by Design
Principles of PbD
19.03 The Information and Privacy Commissioner for Ontario refers
to seven principles of PbD.4 These are set out below.
1 Proactive not Reactive; Preventative not Remedial
The Privacy by Design (PbD) approach is characterised by proactive
rather than reactive measures. It anticipates and prevents privacy
invasive events before they happen. PbD does not wait for privacy risks
to materialise, nor does it offer remedies for resolving privacy
infractions once they have occurred – it aims to prevent them from
occurring. In short, PbD comes before-the-fact, not after.
2 Privacy as the Default Setting
One point is certain – the default rules PbD seek to deliver the maxi-
mum degree of privacy by ensuring that personal data are automati-
cally protected in any given IT system or business practice. If an
individual does nothing, their privacy still remains intact. No action
is required on the part of the individual to protect their privacy – it
is built into the system, by default.
3 Privacy Embedded into Design
PbD is embedded into the design and architecture of IT systems and
business practices. It is not bolted on as an add-on, after the fact.
The result is that privacy becomes an essential component of the
core functionality being delivered. Privacy is integral to the system,
without diminishing functionality.
4 Full Functionality – Positive-Sum, not Zero-Sum
PbD seeks to accommodate all legitimate interests and objectives
in a positive-sum ‘win-win’ manner, not through a dated, zero-sum
approach, where unnecessary trade-offs are made. PbD avoids the
pretence of false dichotomies, such as privacy vs security, demon-
strating that it is possible to have both.
3 At http://privacybydesign.ca/about/.
4 At http://www.privacybydesign.ca/content/uploads/2009/08/7foundational principles.
pdf.
254
GDPR 19.04
GDPR
Data Protection by Design (DPbD)
19.04 The Commission proposed an enhanced data protection regime
including DPbD.6 Article 25 of the GDPR refers to data protection by
design and by default. This is an increasingly important area in data
protection.
Data Subject’s rights and freedoms and legitimate interests and com-
pliance increasingly require planning and pre-problem solving.
5 At http://www.privacybydesign.ca/content/uploads/2009/08/7foundational principles.
pdf.
6 See GDPR, S Spiekermann, ‘The Challenges of Privacy by Design,’ Communications
of the ACM (2012) (55) 38–40; S Spiekermann and LF Cranor, ‘Engineering Privacy,’
IEEE Transactions on Software Engineering (2009) (35) 67–82; L Tielemans and
M Hildebrandt, ‘Data Protection by Design and Technology Neutral Law,’ Computer
Law and Security Review (2013) (29:5) 509.
255
19.05 Data Protection and Privacy by Design
ICO
19.06 DPbD is embraced by the ICO in the UK. The ICO refers to
DPbD by saying that ‘Privacy by Design is an approach whereby pri-
vacy and data protection compliance is designed into systems holding
information right from the start, rather than being bolted on afterwards
or ignored, as has too often been the case.’7
256
ICO 19.07
8 See above.
9 See above.
10 ICO, PbD ICO Implementation Plan, at https://ico.org.uk.
11 ICO, Privacy Impact Assessment, at https://ico.org.uk.
12 ICO, Privacy by Design, An Overview of Privacy Enhancing Technologies,
26 November 2008. At https://ico.org.uk.
13 ICO, Privacy by Design (2008). At https:// ico.org.uk.
14 See above at 2.
257
19.07 Data Protection and Privacy by Design
This lifetime approach ensures that privacy controls are stronger, simpler and
therefore cheaper to implement, harder to by-pass, and fully embedded in the
system as part of its core functionality.
However, neither current design practices in the private and public sectors,
nor existing tools tend to readily support such an approach. Current privacy
practices and technologies are geared towards ‘spot’ implementations and
‘spot’ verifications to confirm that privacy designs and practices are correct at
a given moment within a given scope of inspection.’17
ICO Recommendations
19.08 The ICO report makes a number of recommendations in relation
to PbD practice in the UK.18 These are:
‘Working with industry bodies to build an executive mandate for privacy
by design, supported by sample business cases for the costs, benefits and
risks associated with the processing of personal information, and promotion
of executive awareness of key privacy and identity concepts so that privacy is
reflected in the business cases for new systems.
15 See above at 7.
16 ICO, Privacy by Design (2008).
17 ICO, Privacy by Design (2008). At https://ico.org.uk, at 7–8.
18 See above, summarised at 3, and in detail at 22–31.
258
ICO 19.08
Promoting current and future research into PETs that deliver commercial
products to manage consent and revocation, privacy-friendly identification
and authentication, and prove the effectiveness of privacy controls.
The government, key industry representatives and academics, and the ICO are
urged to consider, prioritise and set in motion plans to deliver these recom-
mendations and hence make privacy by design a reality.’19
The report highlights the need and context for PbD in relation to the
many instances of data loss in the UK (and internationally). It states that:
‘Consumer trust in the ability of public authorities and private organisations
to manage personal information is at an all-time low ebb. A stream of high-
profile privacy incidents in the UK over the past year has shaken confidence
in the data sharing agenda for government with associated impacts on high-
profile data management programmes, and businesses are having to work
that much harder to persuade customers to release personal information to
them.’20
259
19.08 Data Protection and Privacy by Design
The ICO has also issued more recent guidance on risk and assessment
issues in light of the GDPR.23
EDPB
19.09 In addition to the above, the EDPB has more recently set out
further guidance documentation, namely;
●● Guidelines 4/2019 on Article 25 Data Protection by Design and by
Default;
●● Recommendation 01/2019 on the draft list of the European Data
Protection Supervisor regarding the processing operations subject to
the requirement of a data protection impact assessment (Article 39.4
of Regulation (EU) 2018/1727).
Commercial Adoption
19.10 Many multinationals and other organisations are embracing
PbD and DPbD. Microsoft, for example, has endorsed PbD for many
years.
The EU data protection authorities, under WP29 and the French
data protection authority (CNIL) while investigating particular policy
amalgamation and changes, in WP29 and Data Protection Authorities/
Google,24 found certain changes to be in breach of data protection law.
Various remedial changes were required. One of these included that
Google incorporate the policy of DPbD into its products and services.
In addition to mandated DPbD per the new GDPR, it may be that spe-
cific DPbD requirements or recommendations come to be included in
individual decisions of SAs when dealing with audits, complaints and
investigations.
260
Conclusion 19.11
Conclusion
19.11 An organisation must be proactive and not reactive. Data pro-
tection considerations need to be considered and built in from the earli-
est stage in processes which potentially impact data protection. They
must be transparent and visible. Problem issues are addressed and solu-
tions incorporated into the process design and process cycle so that pre-
problem solving is achieved for personal data. DPbD needs to be built
in, not merely added or considered once a problem arises at the end or
after go-live. However, PbD and DPbD means incorporating these con-
siderations into the whole life cycle and not just at the beginning and
or the end. It is also incorporated into engineering processes and not
just system consideration and data categories. PbD and DPbD is now a
key concept and requirement under the new GDPR. There is increasing
emphasis on privacy engineering as a part of the mechanisms needed
to achieve DPbD. DPbD is one of the more important innovations in
data protection generally. This is reflected in the GDPR. All organisa-
tions will need to appraise themselves of the concept and the regula-
tory compliance issues. The above Google requirement to implement
DPbD is also timely and reflects the importance that enterprise, both
large and small, needs to engage the benefits, as well as the require-
ments, of DPbD.
Privacy impact assessments25 are also referred to in the GDPR and
may also be relevant in the context of DPbD. DPbD, privacy impact assess-
ments are also relevant in the context of developing cloud services.26
Cloud services also raise important data protection and security consid-
erations and these should be carefully considered by customers as well
as providers.27 WP29 (now the EDPB) has also commented in relation
25 Wright, D, ‘The State of the Art in Privacy Impact Assessments,’ Computer Law &
Security Review (2012) (28) 54–61.
26 Cloud and data protection reliability and compliance issues are referred to in R Clarke
‘How Reliable is Cloudsourcing? A Review of Articles in the Technical Media 2005–11,’
Computer Law & Security Review (2012) (28) 90–95. King and Raja also research
the area of the protections of sensitive personal data and cloud computing, see
NJ King and VT Raja ‘Protecting the Privacy and Security of Sensitive Customer Data
in the Cloud,’ Computer Law & Security Review (2012) (28) 308–319; J Peng, ’A New
Model of Data Protection on Cloud Storage,’ Journal of Networks (03/2014) (9:3) 666.
27 See, for example ICO, Guidance on the Use of Cloud Computing, at https://ico.org.
uk. WP29, Opinion 05/2012 on Cloud Computing, WP 196, 1 July 2012; P Lanois,
‘Caught in the Clouds: The Web 2.0, Cloud Computing, and Privacy?,’ Northwestern
Journal of Technology and Intellectual Property (2010) (9) 29–49; FM Pinguelo and
BW Muller ‘Avoid the Rainy Day: Survey of US Cloud Computing Caselaw,’ Boston
261
19.11 Data Protection and Privacy by Design
College Intellectual Property & Technology Forum (2011) 1–7; IR Kattan, ‘Cloudy
Privacy Protections: Why the Stored Communications Act Fails to Protect the Privacy
of Communications Stored in the Cloud,’ Vandenburg Journal of Entertainment and
Technology Law (2010–2011) (13) 617–656.
28 WP29, Opinion 02/2015 on C-SIG Code of Conduct on Cloud Computing; and
Opinion 05/2012 on Cloud Computing.
29 WP29, Statement on Statement of the WP29 on the impact of the development of big
data on the protection of individuals with regard to the processing of their personal
data in the EU, 2014. The ICO also issued guidance on big data and data protection
issues prior to the new GDPR in 2014.
30 WP29, Opinion 8/2014 on the Recent Developments on the Internet of Things.
31 WP29, Opinion 01/2015 on Privacy and Data Protection Issues relating to the Utilisa-
tion of Drones.
32 WP29, Opinion 02/2013 on apps on smart devices.
33 WP29, Cookie sweep combined analysis 2015; Opinion 04/2012 on Cookie Consent
Exemption.
34 WP29, Opinion 9/2014 on the application of Directive 2002/58/EC to device
fingerprinting.
35 WP29, Opinion 05/2014 on Anonymisation Techniques. The ICO has previously
issued guidance on anonymisation techniques prior to the GDPD in an anonymisation
code of practice (2012).
36 WP29, Opinion 03/2013 on purpose limitation.
37 WP29, Opinion 02/2013 on apps on smart devices.
262
Chapter 20
Enforcement Powers
Introduction
20.01 What happens if an organisation does not comply with the data
protection regime when dealing with customers, etc, personal data?
When things go wrong, there can be legal and publicity conse-
quences for the organisation. The impact of a data protection breach
can mean an immediate cross team effort to deal with the data protec-
tion breach.
In dealing with an incident, and in planning for compliance with cus-
tomer, etc personal data, organisations should be aware of the various
ICO enforcement powers. These emphasise the importance of conse-
quences for non-compliance. Enforcement proceedings can be issued
by the ICO. Significant fines and penalties can result. Potentially also,
individual customers may decide to sue for damage, loss and breach of
their personal data rights.
Data protection compliance is also an important due diligence issue
when organisations are reviewed at time of sale and purchase, and indeed
at other times also. It can affect a sale or purchase as well as the value
involved. In some instances where there is non-compliance, a customer
database, which in some instances is the most valuable asset of a com-
mercial organisation, may have to be deleted. That is a real cost of non
compliance and not getting things right from day one.
Enforcement Notices
20.02 The ICO may issue enforcement notices to organisations. If the
ICO is satisfied that a Controller has contravened or is contravening any
of the data protection Principles, in relation to the use of customer, etc
263
20.02 Enforcement Powers
personal data, the ICO may serve a notice (‘an enforcement notice’). The
enforcement notice will require compliance by the organisation with the
data protection Principles, or principle in question and as specified in
the notice.
Where the ICO is satisfied that a person has failed, or is failing, it may
give the person a written notice which requires the person:
●● to take steps specified in the notice; or
●● to refrain from taking steps specified in the notice;
●● or both.
Breaches which might give rise to an enforcement notice can be varied
but include:
●● a breach of the Principles;
●● a breach of rights;
●● a breach of obligations of Controllers and Processors;
●● a breach of a requirement to communicate a data breach to the ICO
or to Data Subjects;
●● a breach of the transfer restrictions.
There are also other types of breaches referred to which can also give
rise to an enforcement notice.
The enforcement notice is, therefore, very wide in terms of what the
ICO can require. It can encompass all types of non-compliance or breach
in relation to customer, etc, personal data. The ICO considers whether
the contravention has caused or is likely to cause personal damage or
distress, in deciding whether to serve an enforcement notice (Data Pro-
tection Act 2018 (DPA 2018), s 150(2)). This would encompass non-
compliance in terms of collecting and processing customer, etc personal
data. However, the ICO may reserve such notices for more serious
instances of non-compliance or breach. It may be argued that an actual
data breach or data loss instance is naturally a serious incident and there-
fore may lean towards investigation and enforcement. This might be
particularly the case if the breach has not been remedied by the time of
notification of the breach to the ICO.
20.03 Section 151 of the DPA 2018 also refers to enforcement notices
in the context of rectification and erasure of personal data. The provisions
are detailed and would require attention when procedures are designed
to comply with the Principles, rights and other requirement of the data
protection legislation. Where a Data Subject feels that there is non com-
pliance with their rights and/or a request in the context of rectification or
erasure, there is potential for these issues to arise if the request is being
refused, whether in whole or in part.
264
Information Notices 20.09
Assessment Notices
20.04 Organisations also need to be aware of assessment notices that
may be issued by the ICO. Section 146 of the DPA 2018 relates to assess-
ment notices. The ICO may serve a Controller with a notice (referred to
as an ‘assessment notice’) for the purpose of enabling the ICO to carry
out an assessment of whether the Controller or Processor has complied
or is complying with the data protection legislation.
An assessment notice may require the Controller or Processor to do
any of a range of particular actions, including permitting the ICO to enter
the premises. (Note that the ICO previously had to apply to court for an
order to enter the Cambridge Analytica premises).
Limitations and Restrictions
20.05 DPA 2018, s 147 refers to assessment notices and limitations
and restrictions. These should be consulted in the event of such a notice
arising.
Destroying/Falsifying Information & Document
20.06 DPA 2018, s 148 refers to particular provisions and conse-
quences which may arise in the event of destroying or falsifying infor-
mation as regards information notices and assessment notices. Various
offences can arise.
Information Notices
20.09 DPA 2018, s 142 refers to information notices. The ICO may
issue an information notice:
●● requiring a Controller or Processor to provide information for the
purposes of carrying out the ICO’s functions; or
265
20.09 Enforcement Powers
Information Orders
20.10 DPA 2018, s 145 refers to special information orders. The ICO
can apply to court from an information order where a person fails to
comply with an information notice. The order would essentially direct
that certain action or information be provided.
Failure to Comply
20.11 A failure to comply with a notice regardless of type can have
serious consequences. Further investigations and actions, including court
actions directing assistance to the ICO can occur. In addition, depending
on what the ICO finds, penalties, fines and prosecutions can also ensue.
266
Power of ICO to Impose Monetary Penalty 20.15
267
20.15 Enforcement Powers
Tasks
20.17 Without prejudice to other tasks set out under the GDPR, each
supervisory authority shall:
●● monitor and enforce the application of the GDPR;
●● promote public awareness and understanding of the risks, rules,
safeguards and rights in relation to processing. Activities addressed
specifically to children shall receive specific attention;
●● advise, in accordance with national law, the national parliament,
the government, and other institutions and bodies on legislative and
administrative measures relating to the protection of natural person’s
rights and freedoms with regard to processing;
●● promote the awareness of Controllers and Processors of their obliga-
tions under the GDPR;
●● upon request, provide information to any Data Subject concern-
ing the exercise of their rights under the GDPR and, if appropriate,
co-operate with the supervisory authorities in other states to this end;
268
Tasks 20.17
269
20.17 Enforcement Powers
Powers
20.18 Pursuant to the new GDPR, each supervisory authority shall
have the following investigative powers:
●● to order the Controller and the Processor, and, where applicable, the
Controller’s or the Processor’s representative to provide any infor-
mation it requires for the performance of its tasks;
●● to carry out investigations in the form of data protection audits;
●● to carry out a review on certifications issued pursuant to Article 42(7);
●● to notify the Controller or the Processor of an alleged infringement
of the GDPR;
●● to obtain, from the Controller and the Processor, access to all per-
sonal data and to all information necessary for the performance of
its tasks;
●● to obtain access to any premises of the Controller and the Processor,
including to any data processing equipment and means, in accord-
ance with EU law or state procedural law (Article 58(1)).
Each supervisory authority shall have the following corrective powers:
●● to issue warnings to a Controller or Processor that intended process-
ing operations are likely to infringe provisions of the GDPR;
●● to issue reprimands to a Controller or a Processor where processing
operations have infringed provisions of the GDPR;
●● to order the Controller or the Processor to comply with the Data
Subject’s requests to exercise their rights pursuant to the GDPR;
270
Powers 20.18
271
20.18 Enforcement Powers
including effective judicial remedy and due process, set out in EU and
state law in accordance with the Charter of Fundamental Rights of the
EU (Article 58(4)).
Each state shall provide by law that its supervisory authority shall
have the power to bring infringements of the GDPR to the attention of
the judicial authorities and where appropriate, to commence or engage
otherwise in legal proceedings, in order to enforce the provisions of the
GDPR (Article 58(5)).
Each state may provide by law that its supervisory authority shall
have additional powers to those referred to in Article 58(1), (2) and (3).
The exercise of these powers shall not impair the effective operation of
Chapter VII (Article 58(6)).
272
General Conditions for Imposing Administrative Fines 20.19
273
20.19 Enforcement Powers
Penalties
20.20 The new GDPR provides that states shall lay down the rules
on penalties applicable to infringements of the GDPR in particular for
infringements which are not subject to administrative fines pursuant to
Article 83, and shall take all measures necessary to ensure that they are
implemented. Such penalties shall be effective, proportionate and dis-
suasive (Article 84(1)).
Each state must notify to the Commission those provisions of its law
which it adopts pursuant to Article 84(1), by 25 May 2018 and, without
delay, any subsequent amendment affecting them (Article 84(2)).
Conclusion
20.21 Data protection is important. Personal data is considered impor-
tant and sensitive to customers. This should be respected by organisa-
tions. Organisations are not permitted to collect nor process customer,
etc, personal data without being data protection compliant. It is in this
274
Conclusion 20.21
275
276
Chapter 21
Transfers of Personal Data
Introduction
21.01 Organisations are under ever increasing pressure to reduce
costs. This can sometimes involve consideration of outsourcing to coun-
tries outside of the jurisdiction. Any transfers of personal data, unless
specifically exempted, are restricted.
In addition, the global nature of commercial activities means that
organisations as part of normal business processes may seek to transfer
particular sets of personal data to group entities whom may be located
outside of the jurisdiction. There can be similar situations where an
organisation wishes to make cross border data flows to agents, partners
or outsourced Processors.
The data protection regime controls and regulates the transfers of
personal data1 from the UK to jurisdictions outside of the jurisdiction.
The transfer of personal data outside of the jurisdiction are known as
trans border data flows (TBDFs) or cross border transfers.2 Frequently
organisations would have transferred personal data to other sections
within their international organisation, such as banks. This could be per-
sonal data in relation to customers as well as employees (eg where the
Personnel or payroll section may be in a different country). This too is
included in the default ban, unless specifically exempted.
1 See A Nugter, Transborder Flow of Personal Data within the EC (Kluwer Law and
Taxation Publishers, 1990).
2 CT Beling, ‘Transborder Data Flows: International Privacy Protection and the Free
Flow of Information,’ Boston College International and Comparative Law Review
(1983) (6) 591–624; ‘Declaration on Transborder Data Flows,’ International Legal
Materials (1985)(24) 912–913; Council Recommendation Concerning Guidelines
Governing the Protection of Privacy and Transborder Flows of Personal Data,’ Inter-
national Legal Materials (1981)(20) 422–450; ‘Draft Recommendation of the Council
Concerning Guidelines the Protection of Privacy and Transborder Flows of Personal
Data,’ International Legal Materials (1980)(19) 318–324.
277
21.01 Transfers of Personal Data
This trend of transfers has increased, however, as more and more activ-
ity is carried out online, such as eCommerce and social media. Personal
data is frequently transferred or mirrored on computer servers in more
than one country as a matter of apparent technical routine.
However, organisations need to be aware that any transfer of personal
data of UK and EU citizens needs to be in compliance with the data pro-
tection regime. One of the obligations is that transfers of personal data
may not occur.3 This default position can be derogated from if one of a
limited number of criteria are satisfied. If none of the exemption criteria
apply, the default position in the data protection regime applies and the
transfer cannot take place.
Transfer Ban
21.02 Transfers (outside EEA/EU) are prohibited per se. The focus
is directed upon the privacy protection elsewhere and the dangers of
uncontrolled transfers of personal data.
The Data Protection Act 1998 (DPA 1998) stated previously that:
‘Personal data shall not be transferred to a country or territory outside the
European Economic Area [EEA] unless that country or territory ensures an
adequate level of protection for the rights and freedoms of Data Subjects in
relation to the processing of personal data.’
3 For one article noting the difficulties that the data protection regime creates in terms
of trans border data flows, see L Kong, ‘Data Protection and Trans Border Data Flow
in the European and Global Context,’ European Journal of International Law (2010)
(21) 441–456.
278
Exceptions 21.04
A transfer can occur where there has been a positive Community find-
ing in relation to the type of transfer proposed. A Community finding
means a finding that a country or territory outside the EEA/EU does, or
does not, ensure an adequate level of protection.
Therefore, if there has been a positive community finding in relation
to a named country outside of the jurisdiction, this means that that coun-
try is deemed to have a level of protection in its laws comparable to
the UK and EU data protection regime. This then makes it possible for
organisations to make transfers to that specific country.
The EU Commission provides a list of Commission decisions on the
adequacy of the protection of personal data in named third countries.4
The EU Commission has thus far recognised that Andorra, Canada
(commercial organisations), Faroe Islands, Israel, Japan, Switzerland,
Argentina, Guernsey, Isle of Man, Jersey, New Zealand, Uruguay, the
EU-US Privacy Shield rules (if signed up and adhered to), and the trans-
fer of air passenger name record to the United States Bureau of Customs
and Border Protection (as specified) as providing adequate protection for
personal data. This list will expand over time.
Exceptions
21.04 If the recipient country’s protection for personal data is not
adequate, or not ascertainable, but it is intended that transfers are still
commercially desired, the organisation should ascertain if the transfer is
comes within one of the other excepted categories. Transfers of personal
data from the UK to outside of the EU/EEA jurisdiction cannot occur
unless it falls within one of the transfer exemptions.
The exemptions from the transfer restrictions, if there is a UK equiva-
lent to the EU regime are:
●● the Data Subject has given consent;
●● the transfer is necessary for performance of contract between Data
Subject and Controller;
●● the transfer is necessary for taking steps at the request of the Data
Subject with a view to entering into a contract with the Controller;
●● the transfer is necessary for conclusion of a contract between
Controller and a person other than Data Subject that is entered
into at request of Data Subject and is in the interests of the Data
Subject;
4 At http://ec.europa.eu/justice/data-protection/international-transfers/adequacy/
index_en.htm.
279
21.04 Transfers of Personal Data
280
Binding Corporate Rules 21.07
Creating Adequacy
Through Consent
21.05 One of the possible transfer solutions is ‘creating adequacy’
through consent.
Through Contract
21.06 One of the other exemptions relates to transfers permitted as
a result of adopting the EU model contracts into the legal relationship
between the data exporter and the data importer/recipient.
Transfers of data to a third country may be made even though there
is not adequate protection in place in the third country, if the Controller
secures the necessary level of protection through contractual obligations.
These contractual protections are the model contract clauses emanat-
ing from Commission. The Commission has issued what it considers to
be adequate clauses which are incorporated into the contract relationship
of the data exporter and data importer as then provide an adequate level
of consent.
Obtaining consent of pre-existing customers may pose a problem so in
some cases may not be possible or practical. For example, it may not be
possible to retrospectively change existing contracts and terms.
However, going forward it may be possible to include ‘transfer’ issues
in any data protection compliance and related models.
(Also note Chapter 24 with regard to Brexit and UK adequacy deci-
sion issues.)
281
21.07 Transfers of Personal Data
6 See http://ec.europa.eu/justice/data-protection/international-transfers/binding-corporate-
rules/index_en.htm; L Moerel, Binding Corporate Rules, Corporate Self-Regulation of
Global Data Transfers (OUP, 2012).
7 See also L Moerel, Binding Corporate Rules, Corporate Self-Regulation and Global
Data Transfers (OUP, 2012).
282
GDPR: The New Transfers Regime 21.09
However, the review process with the Commission or one of the national
data protection supervisory authorities (such as the ICO) can take some
time given the complexity involved.
283
21.09 Transfers of Personal Data
rights and effective administrative and judicial redress for the Data
Subjects whose personal data are being transferred;
●● the existence and effective functioning of one or more independ-
ent supervisory authorities in the third country or to which an inter-
national organisation is subject, with responsibility for ensuring
and enforcing compliance with the data protection rules, including
adequate enforcement powers, for assisting and advising the Data
Subjects in exercising their rights and for co-operation with the
supervisory authorities of the states; and
●● the international commitments the third country or international
organisation concerned has entered into, or other obligations arising
from legally binding conventions or instruments as well as from its
participation in multilateral or regional systems, in particular in rela-
tion to the protection of personal data (Article 45(2)).
The Commission, after assessing the adequacy of the level of protec-
tion, may decide, by means of implementing act, that a third country,
a territory or one or more specified sectors within a third country, or an
international organisation ensures an adequate level of protection within
the meaning of Article 45(3). The implementing act shall provide for a
mechanism for a periodic review, at least every four years, which shall
take into account all relevant developments in the third country or inter-
national organisation. The implementing act shall specify its territorial
and sectorial application and, where applicable, identify the supervisory
authority or authorities referred to in Article 45(2)(b). The implement-
ing act shall be adopted in accordance with the examination procedure
referred to in Article 93(2) (Article 45(3)).
The Commission shall, on an on-going basis, monitor developments in
third countries and international organisations that could affect the func-
tioning of decisions adopted pursuant to para 3 and decisions adopted
on the basis of Article 25(6) of the EU Data Protection Directive 1995
(DPD) (Article 45(4)).
The Commission shall, where available information reveals, in par-
ticular following the review referred to in Article 45(3), that a third
country, a territory or one or more specified sectors within a third
country, or an international organisation no longer ensures an ade-
quate level of protection within the meaning of Article 45(2), to the
extent necessary, repeal, amend or suspend the decision referred to in
Article 45(3) without retro-active effect. Those implementing acts shall
be adopted in accordance with the examination procedure referred to in
Article 87(2), or, in cases of extreme urgency, in accordance with the
procedure referred to in Article 93(2) (Article 45(5)). On duly justified
imperative grounds of urgency, the Commission shall adopt immediately
284
GDPR: The New Transfers Regime 21.10
285
21.10 Transfers of Personal Data
286
GDPR: The New Transfers Regime 21.11
287
21.11 Transfers of Personal Data
●● the mechanisms for reporting and recording changes to the rules and
reporting these changes to the supervisory authority;
●● the co-operation mechanism with the supervisory authority to ensure
compliance by any member of the group of undertakings, or group
of enterprises engaged in a joint economic activity, in particular by
making available to the supervisory authority the results of verifica-
tions of the measures referred to in this Article 47(2)(j);
●● the mechanisms for reporting to the competent supervisory authority
any legal requirements to which a member of the group of undertak-
ings, or group of enterprises engaged in a joint economic activity
is subject in a third country which are likely to have a substantial
adverse effect on the guarantees provided by the binding corporate
rules; and
●● the appropriate data protection training to personnel having perma-
nent or regular access to personal data (Article 47(2)).
There may be future changes and requirements too. The Commission
may specify the format and procedures for the exchange of information
between Controllers, Processors and supervisory authorities for binding
corporate rules. Those implementing acts shall be adopted in accordance
with the examination procedure set out in Article 93(2) (Article 48(3)).
Transfers Not Authorised by EU Law
21.12 Any judgment of a court or tribunal and any decision of an
administrative authority of a third country requiring a Controller or
Processor to transfer or disclose personal data may only be recognised or
enforceable in any manner if based on an international agreement, such
as a mutual legal assistance treaty, in force between the requesting third
country and the EU or a state, without prejudice to other grounds for
transfer pursuant to this Chapter (Article 48).
Derogations
21.13 In the absence of an adequacy decision pursuant to Article 45(3),
or of appropriate safeguards pursuant to Article 46, including binding
corporate rules, a transfer or a set of transfers of personal data to a third
country or an international organisation shall take place only on one of
the following conditions:
●● the Data Subject has explicitly consented to the proposed transfer,
after having been informed of the possible risks of such transfers
for the Data Subject due to the absence of an adequacy decision and
appropriate safeguards; [a]
288
GDPR: The New Transfers Regime 21.13
289
21.13 Transfers of Personal Data
290
Issues 21.16
Issues
21.16 Certain issues may arise in relation to:
●● What is a ‘transfer’? Is there a difference between transfer versus
transit?
●● ‘Data’ and anonymised data, is there a restriction on transfers of
anonymised data? For example, can certain anonymised data fall
outside the definition of personal data?
●● ‘Third country’ currently includes the EU countries and EEA
countries of Iceland, Norway, Liechtenstein. The EU countries are
291
21.16 Transfers of Personal Data
8 Digital Rights Ireland and Seitlinger and Others, Joined Cases C-293/12 and
C-594/12, Court of Justice, 8 April 2014.
292
Checklist for Compliance 21.18
293
21.18 Transfers of Personal Data
3. has the organisation complied with all the other data protection
Principles?
4. is the transfer to a country on the EU Commission’s white list of
countries or territories (per a Community finding) accepted as pro-
viding adequate levels of protection for the rights and freedoms of
Data Subjects in connection with the processing of their personal
data?
5. if the transfer is to the US, has the US recipient of the personal data
signed up to the EU-US Department of Commerce Privacy Shield
scheme [or any alternative mechanism]?
6. is the personal data passenger name record information (PNR)?
If so, particular rules may apply.
8. can the organisation assess that the level of protection for Data
Subjects’ rights as ‘adequate in all the circumstances of the case’?.
9. if not, can the organisation put in place adequate safeguards to pro-
tect the rights of the Data Subjects whose data is to be transferred?
10. can the organisation rely on another exception from the restriction
on international transfers of personal data?
[Note: No 7 missing in the original]
Brexit
21.19 See Chapter 24 with regard to Brexit and the impact on EU data
transfers to the UK after Brexit is completed. The important issue of a
UK adequacy decision and the complicating issues involved are neces-
sary considerations. Many issues remain unclear at this stage.
Conclusion
21.20 Data protection compliance practice for organisations means
that they will have to include a compliance assessment, as well as an
assessment of associated risks, in relation to potential transfers of per-
sonal data outside of the jurisdiction. This applies to transfers from par-
ent to subsidiary or to a branch office as well as transfers to any unrelated
company or entity.
The ICO also provides useful guidance in relation to:
●● Assessing Adequacy;
●● Model Contract Clauses;
●● Binding Corporate Rules; and
●● Outsourcing.
294
Conclusion 21.20
There is also the following ICO guidance which can be a useful refer-
ence for organisations, namely, the:
Data Protection Act;
295
296
Chapter 22
ePrivacy and Electronic
Communications
Introduction
22.01 There is increasing use of electronically transmitted personal
data. This is protected and regulated, in certain respects, separate from
the general data protection regime under the General Data Protection
Regulation (GDPR).
While originally the regulation of telecommunications related per-
sonal data centred on telecoms companies, it is now recognised as
encompassing telecoms companies and certain companies engaged in
activities involving the collection or transmission of particular personal
data over electronic communications networks, including the internet.
Organisations concerned with compliance relating to marketing, email
marketing, text marketing, telephone marketing, fax marketing, the
use of location based data, cookies, identification regarding telephone
calls and other telephone issues need to consider the additional data
protection rules.
The GDPR indicates that it shall not impose additional obligations on
natural or legal persons in relation to the processing of personal data in
connection with the provision of publicly available electronic commu-
nications services in public communication networks in the EU in rela-
tion to matters for which they are subject to specific obligations with the
same objective set out in Directive 2002/58/EC1 (Article 89).
However, other Directives and Regulations (in particular the ePrivacy
Regulation once finalised) may be reviewed in terms of amendments
required in order to smoothly comply with the GDPR.
1 Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002
concerning the processing of personal data and the protection of privacy in the elec-
tronic communications sector (Directive on privacy and electronic communications).
297
22.02 ePrivacy and Electronic Communications
Background
22.02 There has been a separation between the data protection of gen-
eral personal data, in EU Data Protection Directive 1995 (DPD 1995),
and the regulation of personal data in (tele)communications networks.
The later were legislated for in the Data Protection Directive of 1997.2
This was later replaced with the ePrivacy Directive (ePD). The ePD was
amended by Directive 2006/24/EC and Directive 2009/136/EC. Now,
organisations need to be aware of the updated provisions coming with
the ePrivacy Regulation, which replaces the previous rules regarding
ePrivacy, electronic marketing, cookies, etc.
ePD3 concerns the processing and protection of personal data and pri-
vacy in the electronic communications sector. It is also known as the
Directive on privacy and electronic communications, hence ePD. One
of the concerns has been how electronic communications and electronic
information are increasingly used for profiling for marketing purposes,
including by electronic means.4 (Indeed, this is also reflected in the
cookie rules).
2 Directive 97/66/EC.
3 Directive 2002/58/EC of 12 July 2002.
4 See, for example, W McGeveran, ‘Disclosure, Endorsement, and Identity in Social
Marketing,’ University of Illinois Law Review (2009) (4) 1105–1166.
298
Marketing 22.05
●● telephone marketing;
●● fax marketing;
●● cookies, etc.
Marketing
22.04 How should organisations go about ensuring data protection
compliance for direct marketing (DM)? When is DM permitted? All
organisations should carefully assess compliance issues when consider-
ing any direct marketing activities. Getting it wrong can be costly and
can have ICO enforcement and investigation consequences as well as
penalties.
Article 13 of the ePD refers to unsolicited communications.
Article 13(1) in particular provides that the use of the following, namely:
●● automated calling systems without human intervention (automatic
calling machines);
●● facsimile machines (fax); or
●● electronic mail,
for the purposes of direct marketing may only be allowed in respect of
subscribers who have given their prior consent.
This means that there is a default rule prohibiting DM without prior
consent. Many marketing orientated organisations may be surprised, if
not dismayed by this.
Existing Customers’ Email
22.05 However, in the context of existing customers, there is a pos-
sibility to direct market using emails. Article 13(2) of the ePD provides
that notwithstanding Article 13(1), where an organisation obtains from
its customers their electronic contact details for email, in the context of
the sale of a product or a service, in accordance with the DPD, the organ-
isation may use these electronic contact details for DM of its own similar
products or services provided that customers clearly and distinctly are
given the opportunity to object, free of charge and in an easy manner, to
such use of electronic contact details when they are collected and on the
occasion of each message in case the customer has not initially refused
such use.
Therefore, once the email details are obtained at the time of a prod-
uct or service transaction, it will be possible to use that email for direct
marketing purposes. Conditions or limitations apply however. Firstly,
the organisation is only permitted to market and promote similar prod-
ucts or services. This, therefore, rules out unrelated, non-identical and
299
22.05 ePrivacy and Electronic Communications
300
Marketing Protection for Organisations 22.12
301
22.12 ePrivacy and Electronic Communications
302
Marketing Protection for Organisations 22.16
Having regard to the state of the art and the cost of their implementa-
tion, these measures shall ensure a level of security appropriate to the
risk presented. Obviously, these can change over time as risks and as
technology change.
Article 4(2) provides that in case of a particular risk of a breach of the
security of the network, the provider of a publicly available electronic
communications service must inform the subscribers concerning such
risk and, where the risk lies outside the scope of the measures to be taken
by the service provider, of any possible remedies, including an indication
of the likely costs involved.
Confidentiality
22.15 Article 5 refers to confidentiality of the communications.
Article 5(1) provides that states shall ensure the confidentiality of com-
munications and the related traffic data by means of a public commu-
nications network and publicly available electronic communications
services, through national legislation. In particular, they shall prohibit
listening, tapping, storage or other kinds of interception or surveillance
of communications and the related traffic data by persons other than
users, without the consent of the users concerned, except when legally
authorised to do so in accordance with Article 15(1). This paragraph
shall not prevent technical storage which is necessary for the conveyance
of a communication without prejudice to the principle of confidentiality.
Article 5(2) provides that para 1 shall not affect any legally authorised
recording of communications and the related traffic data when carried
out in the course of lawful business practice for the purpose of pro-
viding evidence of a commercial transaction or of any other business
communication.
Article 5(3) provides that states shall ensure that the use of electronic
communications networks to store information or to gain access to infor-
mation stored in the terminal equipment of a subscriber or user is only
allowed on condition that the subscriber or user concerned is provided
with clear and comprehensive information, inter alia about the purposes
of the processing, and is offered the right to refuse such processing by
the Controller. This shall not prevent any technical storage or access for
the sole purpose of carrying out or facilitating the transmission of a com-
munication over an electronic communications network, or as strictly
necessary in order to provide an information society service explicitly
requested by the subscriber or user.
Traffic Data
22.16 Article 6 refers to traffic data. Article 6(1) provides that traf-
fic data relating to subscribers and users processed and stored by the
303
22.16 ePrivacy and Electronic Communications
304
Marketing Protection for Organisations 22.19
305
22.19 ePrivacy and Electronic Communications
whether the data will be transmitted to a third party for the purpose of
providing the value added service. Users or subscribers shall be given
the possibility to withdraw their consent for the processing of location
data other than traffic data at any time.
This is increasingly important as more and more smart phones and
electronic devices permit the capture of location based data relating to
individuals and/or their personal equipment.
Article 9(1) provides that where consent of the users or subscribers
has been obtained for the processing of location data other than traffic
data, the user or subscriber must continue to have the possibility, using a
simple means and free of charge, of temporarily refusing the processing
of such data for each connection to the network or for each transmission
of a communication.
Article 9(1) provides that processing of location data other than traf-
fic data in accordance with Articles 9(1) and (2) must be restricted to
persons acting under the authority of the provider of the public commu-
nications network or publicly available communications service or of the
third party providing the value added service, and must be restricted to
what is necessary for the purposes of providing the value added service.
Exceptions
22.20 Article 10 relates to exceptions.
Directories
22.21 Article 12 refers to directories of subscribers. Article 12(1) pro-
vides that states shall ensure that subscribers are informed, free of charge
and before they are included in the directory, about the purpose(s) of a
printed or electronic directory of subscribers available to the public or
obtainable through directory enquiry services, in which their personal
data can be included and of any further usage possibilities based on
search functions embedded in electronic versions of the directory.
Article 12(2) provides that states shall ensure that subscribers are
given the opportunity to determine whether their personal data are
included in a public directory, and if so, which, to the extent that such
data are relevant for the purpose of the directory as determined by the
provider of the directory, and to verify, correct or withdraw such data.
Not being included in a public subscriber directory, verifying, correcting
or withdrawing personal data from it shall be free of charge.
Article 12(3) provides that states may require that for any purpose of a
public directory other than the search of contact details of persons on the
basis of their name and, where necessary, a minimum of other identifiers,
additional consent be asked of the subscribers.
306
Conclusion 22.22
Article 12(4) provides that Articles 12(1) and (2) shall apply to
subscribers who are natural persons. states shall also ensure, in the
framework of EU law and applicable national legislation, that the legiti-
mate interests of subscribers other than natural persons with regard to
their entry in public directories are sufficiently protected.
Conclusion
22.22 Originally envisaged as relating to telecoms type data only,
this secondary aspect of the data protection regime has expanded in
substance, scope and detail. While much of it is still specific to telecoms
companies and entities involved in the transfer of electronic communica-
tions, certain issues are more generally applicable. The ePD as amended
applies to all organisations who wish to engage in direct marketing
through a variety of means. Compliance is necessary and needs to be
planned in advance. If not specifically exempted from the default rule it
is difficult to envisage permissible direct marketing (DM).
The ePD and the above comments all need to be read in light of the
final version of the provisions formulated in the new ePrivacy Regulation,
as well as national regulations which may be repealed, amended or
updated as a result.
307
308
Chapter 23
Electronic Direct Marketing
and Spam
Introduction
23.01 Direct marketing (DM) tends to be one of the most contentious
areas of data protection practice. It also receives probably most attention,
with the possible exceptions of data breach/data loss and internet/social
media data protection issues.
Most organisations need to engage in (DM) at some stage, some more
heavily than others. Many organisations may even go so far as to say that
DM is an essential ingredient of continued commercial success.
However, DM is sometimes viewed as Spam and unsolicited commer-
cial communications which are unwanted and also unlawful. The data
protection regime (and eCommerce legal regime) refers to permissible
DM and sets out various obligatory requirements while at the same time
setting a default position of prohibiting non-exempted or non-permitted
electronic direct marketing.
The EU General Data Protection Regulation (GDPR) does not impose
additional obligations on natural or legal persons in relation to the pro-
cessing of personal data in connection with the provision of publicly
available electronic communications services in public communica-
tion networks in the EU in relation to matters for which they are sub-
ject to specific obligations with the same objective set out in Directive
2002/58/EC1 (Article 95 of the GDPR). There may be a review to ensure
that the ePrivacy Directive (ePD) fully complements and does not con-
flict with the GDPR, and if so, amendments may be required.
1 Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002
concerning the processing of personal data and the protection of privacy in the elec-
tronic communications sector (Directive on privacy and electronic communications).
309
23.01 Electronic Direct Marketing and Spam
The the ePrivacy Regulation, once finalised, will also necessitate fur-
ther changes and compliance.
2 See, for example, L Edwards, ‘Consumer Privacy Law 1: Online Direct Marketing,’
and L Edwards and J Hatcher, ‘Consumer Privacy Law: Data Collection, Profiling and
Targeting,’ each in L Edwards and C Waelde, eds, Law and the Internet (Hart, 2009)
489 et seq, and 511 et seq respectively.
310
Direct Marketing (DM) 23.06
a valid address to which the recipient may send a request that such
communications cease, shall be prohibited.
Article 13(5) provides that Article 13(1) and (3) shall apply to sub-
scribers who are natural persons. states shall also ensure that the legiti-
mate interests of subscribers other than natural persons with regard to
unsolicited communications are sufficiently protected.
Marketing Default Position
23.04 How should organisations go about data protection compliance
DM? When is DM permitted? All organisations should carefully assess
compliance issues when considering any DM activities. Getting it wrong
can be costly and can have ICO enforcement and investigation conse-
quences, not to mention penalties Indeed, a penalty of £440,000 was
recently imposed in relation to spam DM (see ICO cases chart).
Article 13 of the ePD provides a number of rules in relation to unso-
licited communications. Article 13(1) provides that:
●● automated calling systems without human intervention (automatic
calling machines);
●● facsimile machines (fax); or
●● electronic mail,
for the purposes of DM may only be allowed in respect of subscribers
who have given their prior consent.
Therefore, there is a default rule prohibiting the forms of DM referred
to above without prior consent. Many marketing orientated organisations
may consider this a hindrance to what may have been considered legiti-
mate marketing and business activities.
Limited Direct Marketing Permitted
23.05 Limited direct marketing is permitted, namely, of subscribers or
customers whom have given their prior consent. This implies consent in
advance of receiving the DM or simultaneous to the DM.
However, in terms of DM by email, this is further restricted.
Direct Marketing to Existing Customers’ Email
23.06 In the context of existing customers, there is a possibility to
DM using emails. Article 13(2) of the ePD provides that where an
organisation obtains from its customers their electronic contact details
for email, in the context of the sale of a product or a service, in accord-
ance with the DPD, the organisation may use these electronic contact
details for DM of its own similar products or services provided that cus-
tomers clearly and distinctly are given the opportunity to object, free of
charge and in an easy manner, to such use of electronic contact details
311
23.06 Electronic Direct Marketing and Spam
when they are collected and on the occasion of each message in case
the customer has not initially refused such use.
Therefore, once the email details are obtained at the time of a product
or service transaction, it will be possible to use that email for direct mar-
keting purposes. Conditions or limitations apply however. Firstly, the
organisation is only permitted to market and promote similar products
or services. This, therefore, rules out unrelated, non-identical and non-
similar products and services. Secondly, at the time of each subsequent
act of DM, the customer must be given the opportunity in an easy and
accessible manner to opt out or cancel the DM. Effectively, they must be
taken off of the organisation’s DM list.
National Marketing Opt-out Registers
23.07 Article 13(3) of ePD provides that states shall take appropri-
ate measures to ensure that, free of charge, unsolicited communications
for purposes of direct marketing, in cases other than those referred to
in Article 13(1) and (2), are not allowed either without the consent of
the subscribers concerned or in respect of subscribers who do not wish
to receive these communications, the choice between these options to
be determined by national legislation. This means that each state must
determine and provide a means for individuals to opt-out of receiving
DM in advance.3
Various of the cases where marketing breach data fines are imposed
by the ICO involve unsolicited marketing calls being made to telephone
numbers registered on the telephone preference service (TPS), whereby
individuals can register their preference not to be the recipients of mar-
keting calls. Examples of illegal TPS marketing call breaches include:
●● Superior Style Home Improvements – fined £150,000;4
●● Making it Easy – fined £160,000;5
●● Smart Home Protection – fined £90,000;6
●● Avalon Direct – fined £80,000;7
●● Solartech North East – fined £90,000;8
●● DM Design Bedrooms – fined £160,000;9
●● Secure Home Systems – fined £80,000;10
312
PECR 23.11
PECR
23.11 Detailed provisions governing direct marketing by electronic
communications are set out in the PECR (Privacy and Electronic
Communications (EC Directive) Regulations 200313), implementing the
313
23.11 Electronic Direct Marketing and Spam
ePD in the UK. PECR will likely be updated, amended and/or replaced
once the full extent of the ePrivacy Regulation is known.
It provides rules in relation to automated calling machine; fax;
email; unsolicited call by automated calling machine or fax; unsolic-
ited telephone call; disguising or concealing identity; contact address;
opt in/opt out; and ‘soft opt in.’
PECR is also interesting in that it applies to both legal and natural
persons. Generally, rights are not recognised for organisations in the data
protection regime.
The PECR refers to the implementation of the rules regarding elec-
tronic communications and direct marketing DM). Regulations 22
and 23 refer to email marketing.14
Regulation 22 of the PECR provides as follows:
‘(1) This regulation applies to the transmission of unsolicited communica-
tions by means of electronic mail to individual subscribers.
(2) Except in the circumstances referred to in paragraph (3), a person shall
neither transmit, nor instigate the transmission of, unsolicited commu-
nications for the purposes of direct marketing by means of electronic
mail unless the recipient of the electronic mail has previously notified the
sender that he consents for the time being to such communications being
sent by, or at the instigation of, the sender.
(3) A person may send or instigate the sending of electronic mail for the
purposes of direct marketing where:
(a) that person has obtained the contact details of the recipient of that
electronic mail in the course of the sale or negotiations for the sale
of a product or service to that recipient;
(b) the direct marketing is in respect of that person’s similar products
and services only; and
(c) the recipient has been given a simple means of refusing (free of
charge except for the costs of the transmission of the refusal) the
use of his contact details for the purposes of such direct marketing,
at the time that the details were initially collected, and, where he did
not initially refuse the use of the details, at the time of each subse-
quent communication.
(4) A subscriber shall not permit his line to be used in contravention of
paragraph (2).’
314
PECR 23.12
(b) where a valid address to which the recipient of the communication may
send a request that such communications cease has not been provided.’
In other words, email, text, picture and video marketing messages are all
considered to be “electronic mail”. Marketing transmitted in WAP messages
is considered to be “electronic mail”. WAP Push allows a sender to send a
specially formatted SMS message to a handset which, when received, allows
a recipient through a single click to access and view content stored online,
through the browser on the handset.
315
23.12 Electronic Direct Marketing and Spam
silent calls or calls where a fax or other electronic signal is transmitted; this is
because no marketing material is transmitted during these calls.’15
It adds that:
‘This is what the law requires:
●● You cannot transmit, or instigate the transmission of, unsolicited market-
ing material by electronic mail to an individual subscriber unless they
have previously notified you, the sender, that they consent, for the time
being, to receiving such communications. There is an exception to this
rule which has been widely referred to as the soft opt in (Regulation 22 (2)
refers).
●● You cannot transmit, or instigate the transmission of, any marketing
by electronic mail (whether solicited or unsolicited) to any subscriber
(whether corporate or individual) where:
$$ Your identity has been disguised or concealed; or
$$ You have not provided a valid address to which the recipient can
send an opt-out request.
$$ That electronic mail would contravene regulations 7 or 8 of
the Electronic Commerce (EC Directive) Regulations 2002
(SI 2002/2013); or
$$ That electronic mail encourages recipients to visit websites which
contravene those regulations (Regulation 23 refers).
●● A subscriber must not allow their line to be used to breach Regulation 22 (2)
(Regulation 22 (4) refers).’16
316
Civil Sanctions 23.15
Civil Sanctions
23.15 Individual Data Subjects can also sue for compensation under
the data protection rules. Where a person suffers damage as a result of a
failure by a Controller or Processor to meet their data protection obliga-
tions, then the Controller or Processor may be subject to civil sanctions
by the person affected. Damage suffered by a Data Subject will include
damage to reputation, financial loss and mental distress.
This will vary from organisation to organisation, sector to sector, the
type of personal data involved, the risks of damage, loss, etc, the nature
of the security risks, the security measures and procedures adopted, the
history of risk, loss and damage in the organisation and sector.
Certain types of data will convey inherent additional risks over others,
such as loss of financial personal data. This can be argued to require
higher obligations for the organisation.
One interesting area to consider going forward is online damage,
such as viral abuse, publication, defamation, bulletin boards, discussion
forums and websites (or sections of websites), and social media web-
sites. Where damage occurs as a result of misuse or loss of personal data
or results in defamation, abuse and threats, liability could arise for the
individual tortfeasors as well as the website.
While there are eCommerce defences in the eCommerce Directive,
one should recall that the data protection regime (and its duty of care and
liability provisions) are separate and stand alone from the eCommerce
Directive legal regime. Indeed, even in terms of the eCommerce
317
23.15 Electronic Direct Marketing and Spam
defences one should also recall that (a) an organisation must first fall
within an eCommerce defence, and not lost that defence, in order to
avail of it; and (b) there is no automatic entitlement to an internet ser-
vice provider (ISP) or website to a global eCommerce defence, as in
fact there in not one eCommerce defence but three specific defences
relating to specific and technical activities. Not all or every ISP activity
will fall into one of these defences. Neither will one activity fall into all
three defences.
It is also possible to conceive of a website which has no take down
procedures, inadequate take down defences, or non-expeditious take
down procedures or remedies, and which will face potential liability
under privacy and data protection as well as eCommerce liability. For
example, an imposter social media profile which contains abuse, per-
sonal data and defamatory material could attract liability for the web-
site operator under data protection, and under normal liability if none of
the eCommerce defences were unavailable or were lost. The later could
occur if, for example, the false impersonating profile was notified to the
website (or it was otherwise aware) but it did not do anything.17
PECR implemented ePD (also known as the ePrivacy Directive)
regarding the protection of privacy in the electronic communications
sector. In 2009 ePD was amended by Directive 2009/136/EC. This
included changes to Article 5(3) of ePD requiring consent for the storage
or access to information stored on a subscriber or users terminal equip-
ment ie a requirement for organisations to obtain consent for cookies and
similar technologies.18 The ePrivacy Regulation will add/import updates
and replacements to this area which organisations will need to incopo-
rate and comply with.
17 This is a complex and developing area of law, common law, civil law, GDPR, forth-
coming ePrivacy Regulation and case law, both in the UK and internationally. A full
detailed analysis is beyond this current work.
18 The same comments apply, see above.
318
Related Issues 23.19
Related Issues
23.19 Certain related issues also arise, which are beyond detailed
analysis presently but which may be used for specific organisations to
consider further.
One example is the increasingly controversial area of profiling, adver-
tising and direct marketing in relation to children.21
Online behavioural advertising (OBA) and the behavioural targeting
of internet advertising is increasingly debated.22
Commentators, and media, often focus on the issue of threats to pri-
vacy, data protection and reputation rights caused by web 2.0 activities
such as social media, search engine services, etc. The query arises as
to whether revenue versus privacy is better respected by certain online
services providers?23
19 See www.spamlaws.com.
20 See VJ Reid, ‘Recent Developments in Private Enforcement of the Can-Spam Act,’
Akron Intellectual Property Journal (2010) (4) 281–307.
21 U Munukutla-Parker, ‘Unsolicited Commercial E-mail, Privacy Concerns Related
to Social Network Services, Online Protection of Children, and Cyberbullying,’ I/S:
A Journal of Law and Policy (2006) (2) 628–650.
22 Deane-Johns, ‘Behavioural Targeting of Internet Advertising,’ Computers and Law
(2009) (20) 22.
23 L Edwards and C Waelde, eds, Law and the Internet (Oxford: Hart, 2009) 539.
319
23.20 Electronic Direct Marketing and Spam
Cases
23.20 There are many official cases, prosecutions and fines in relation
to Spam. Some of the largest fines from the ICO have been in relation to
Spam and unsolicited marketing (in addition to the growing area of data
breaches).
Conclusion
23.21 Few organisation will not be interested in DM and advertis-
ing. The key is to get it right. The consequences of sending unlawful
electronic communications can amount to offences, prosecutions offi-
cial enforcement and investigations as well as being sued or prosecuted.
This is one of the areas which is consistently an area of focus from ICO
investigation. These issues become more important as: (a) increased
competition puts pressure on organisations to engage, or increase, mar-
keting and profiling efforts; and (b) the software, devices and technolo-
gies available to facilitate such efforts are increasing in significance.
Over time, cost efforts also decrease in terms of adopting these new
tools. As always, however, organisations are cautioned to ensure data
protection compliance. They might also, on occasion, pause to ques-
tion general ethical consideration in certain instances. Depending on the
sector, there may also be an obligation to consider and comply with
certain third party organisational rules, particularly as regards direct
marketing issues. Indeed, the new regime also provides the impetus
for representative organisations to increasingly consider industry-wide
data protection Codes of Conduct. These are encouraged by the ICO
and the new data protection regime. It is also important to look out for
the changes that may occur as a result of the ePrivacy Regulation once
available.
320
Part 4
New UK Regime
321
322
Chapter 24
Background to the New UK
Regime
Introduction
24.01 The UK data protection regime is fundamentally changed. It
should not be viewed as a big bang development, however. Rather, as the
ICO has pointed out, it is an ‘evolution’ not a ‘revolution.’1 The previous
data protection regime was over 20 years’ old and required substantial
redevelopment and updating.
323
24.02 Background to the New UK Regime
Queen’s Speech
24.03 The 2017 Queens Speech5 forecast the Data Protection Act 2018
(DPA 2018) changes as follows:
‘A new law [to] ensure that the United Kingdom retains its world-class regime
protecting personal data, and … a new digital charter … to ensure that the
United Kingdom is the safest place to be online.’
3 ‘UK’s proposed Data Protection Bill looks to go further than GDPR,’ Information-
Age.com, 8 August 2017. This is also interesting from the perspective of some stand-
ards exceeding the GDPR, but other standards which might be argued to be less than
the GDPR level. Even if there are one or two aspects which are below the GDPR level,
that is very problematic to an adequacy decision application.
4 ‘A New Law Will Ensure That the United Kingdom Retains Its World-Class Regime
Protecting Personal Data.’ The Queen’s Speech and Associated Background Briefing,
on the Occasion of the Opening of Parliament on Wednesday 21 June 2017 (Prime
Minister’s Office, 10 Downing Street, London, SW1A 2AA) (21 June 2017).
5 Queen’s Speech 2017, 21 June 2017.
6 ‘A New Law Will Ensure That the United Kingdom Retains Its World-Class Regime
Protecting Personal Data.’ The Queen’s Speech and Associated Background Briefing,
on the Occasion of the Opening of Parliament on Wednesday 21 June 2017 (Prime
Minister’s Office, 10 Downing Street, London, SW1A 2AA) (21 June 2017).
324
Digital Charter and Internet Safety 24.05
about them at the age of 18” … and to “bring forward a new data
protection law”.
●● To ensure that our data protection framework is suitable for our new
digital age, and cement the UK’s position at the forefront of tech-
nological innovation, international data sharing and protection of
personal data.
●● To allow police and judicial authorities to continue to exchange
information quickly and easily with our international partners in the
fight against terrorism and other serious crimes.
●● To implement the [GDPR] and the new Directive which applies to
law enforcement data processing, meeting our obligations while we
remain an EU member state and helping to put the UK in the best
position to maintain our ability to share data with other EU member
states and internationally after we leave the EU.’
The main elements of the DPA 2018 are described as:
●● ‘To establish a new data protection regime for non-law enforcement
data processing … The new rules strengthen rights and empower
individuals to have more control over their personal data, including
a right to be forgotten when individuals no longer want their data
to be processed, provided that there are no legitimate grounds for
retaining it.
●● To modernise and update the regime for data processing by law
enforcement agencies. The regime will cover both domestic pro-
cessing and cross-border transfers of personal data.
●● To update the powers and sanctions available to the [ICO].’
7 Emphasis added.
325
24.05 Background to the New UK Regime
326
The Ministerial Statement 24.06
It adds that:
‘Businesses will be supported to ensure they are able to manage and secure
data properly. The data protection regulator, the [ICO], will also be given
more power to defend consumer interests and issue higher fines, of up to
£17 million or 4 per cent of global turnover, in cases of the most serious data
breaches.’
The Minister of State for Digital states the DPA 2018 is:
‘designed to support businesses in their use of data, and give consumers the
confidence that their data is protected and those who misuse it will be held to
account.
The new Data Protection [Act] … give[s] us one of the most robust, yet
dynamic, set of data laws in the world. The [DPA 2018] … give[s] people
more control over their data, require[s] more consent for its use, and prepare[s]
Britain for Brexit. We have some of the best data science in the world and this
new law will help it to thrive.’
327
24.06 Background to the New UK Regime
328
‘Final’ Brexit Negotiations in Transition Period 24.07
329
24.07 Background to the New UK Regime
commercial entities and their advisors. While there are, on the one
hand, potential problems for data transfers in the event of a no deal
Brexit, there are also a number of problem issues even in a deal situ-
ation. Unfortunately, concerns in relation to the possibility of a ‘final’
no deal Brexit, or further extension(s), all lead to uncertainty and
risk.
Brexit Guides
24.08 The ICO issued the following no deal guidance in late 2018:
●● Announcements, descriptions and statements on No Deal Brexit;
●● Six Steps to Take guide on No Deal Brexit;
●● ‘Broader’ guidance document on leaving EU if no withdrawal agree-
ment; and
●● Overview FAQs guidance on No Deal Brexit.
There is also new content and commentary on data protection, transfers
and:
●● the European Union (Withdrawal) Act 2018;
●● Department update.
There is also updated guidance from the ICO, partly in light of the earlier
enhanced possibility of a no deal Brexit arising.
The ICO has issued a number of additional guidance documents to
assist organisations to prepare for the possibility of a no deal Brexit.
These began with a press release on 13 December 2018, and related
statements and electronic update announcements. The release acknowl-
edges that:
‘[w]hile the basis on which the UK will leave the EU has still to be decided,
the ICO has today published new guidance and practical tools to help organi-
sations understand the implications in the event of a no deal.’
330
Brexit Guides 24.09
However, readers will note that the DPA 2018 does not absorb or imple-
ment the GDPR. The GDPR is (apparently) currently directly effective
during the transition. It would assist to understand what date an official
application from an adequacy decision starts on, and what date examina-
tion may commence.
The blog also suggests that the ‘two-way free flow of personal infor-
mation will no longer be the case if the UK leaves the EU without a with-
drawal agreement that specifically provides [and hopefully expressly so
provide] for the continued flow of personal data.’ It may also be that an
official EU Adequacy Decision is needed. However, issues arise as to
when an application for an adequacy decision can be made, and when
the formal review process can commence. Can it be during the transition
period between Brexit Day and Exit Day, or must it wait until Exit Day?
More official certainty would be welcome.
The ICO blog advises organisations to take ‘precautionary prepa-
rations’ to ‘ensure these data flows continue’ in the event of no deal.
However, there remains uncertainty even in the event of a deal. The offi-
cial advice is to ‘carefully consider alternative transfer mechanisms to
maintain data flows.’
One of these is the standard contractual clauses route. It is indicated
that there will be further official guidance and assistance in relation
to these contracts. Another route, generally reserved for multinational
organisations, is approved binding corporate rules. These take time.
However, it is suggested in the guidance that existing binding corporate
rules may need review.
‘Six Steps to Take’ ICO Guide
24.09 The ICO has also issued a six-step assistance guide. It states that
‘[i]f you operate in the EEA, you may need to comply with both the UK
data protection regime and the EU regime after the UK exits the EU. You
may also need to appoint a representative in the EEA.’ The six steps for
‘Leaving the EU’ are:
1. continue to comply;
2. transfers to the UK;
3. transfers from the UK;
4. European operations;
5. documentation;
6. organisational awareness.
Point 1 (Continue to comply) states, inter alia, that:
‘The [DPA 2018] will remain in place. The government intends to bring the
GDPR directly into UK law on exit, to sit alongside it. There will be some
technical adjustments to the UK version of the GDPR so that it works in a
331
24.09 Background to the New UK Regime
Point 1 (transfers to the UK) states, inter alia, that organisations need to:
‘Review your data flows and identify where you receive data from the EEA,
including from suppliers and processors. Think about what GDPR safeguards
you can put in place to ensure that data can continue to flow once we are
outside the EU.’
It continues that this ‘means the sender needs to make sure there are ade-
quate safeguards in place, or one of the exceptions listed in the GDPR.’
It also refers to the importance of the adequacy decision issue. It states
that:
‘If the EU makes a formal adequacy decision that the UK regime offers an
adequate level of protection, there will be no need for specific safeguards.
However, on exit date there may not be such a decision in place. So you
should plan to implement adequate safeguards.’
332
Brexit Guides 24.10
333
24.10 Background to the New UK Regime
334
Data and the European Union (Withdrawal) Act 2018 24.12
law if we leave the EU without a deal, to sit alongside the DPA 2018.’
In addition, the ICO ‘expect the government to use new legislation to
make technical amendments to the GDPR so that it works in a UK-only
context.’
Question four above asks if an organisation can still transfer data to
and from Europe if the UK leaves without a deal. The ICO guidance
states as follows:
‘The government has said that transfers of data from the UK to the European
Economic Area (EEA) will not be restricted. However, if we leave the EU
without a deal, GDPR transfer rules will apply to any data coming from the
EEA into the UK. You need to consider what GDPR safeguards you can put in
place to ensure that data can continue to flow into the UK.’
335
24.12 Background to the New UK Regime
EUWA Details
24.13 As indicated above, the DPA 2018 does not implement the
GDPR in the UK given the current direct effect of the GDPR. Post
Brexit, it may be preferable to have a DPA 2019/20 which does imple-
ment the GDPR. Unfortunately, matters may become more complicated
by inclusion in, and as a consequence of, the EUWA.
336
EUWA Details 24.13
(a) Amend the definition of “exit day” in subsection (1) to ensure that the
day and time specified in the definition are the day and time that the
Treaties are to cease to apply to the United Kingdom, and
(b) Amend subsection (2) in consequence of such amendment.’
Section 9(1) provides that ‘A Minister … may by regulation make such
provision as the Minister considers appropriate for the purposes of
implementing the withdrawal agreement if the Minister considers that
such provision should be in force on or before exit day, subject to the
prior enactment of a statute by Parliament approving the final terms of
withdrawal of the United Kingdom from the EU.’ Note that ‘regulations
337
24.13 Background to the New UK Regime
under this section may not … amend, repeal or revoke the Human Rights
Act 1998 or any subordinate legislation made under it’ (s 9(3)(e)). Also
‘[n]o regulations may be made under this section after exit day’ (s 9(4)).
Section 2 refers to ‘Saving for EU-derived domestic legislation.’
It includes the following:
‘EU-derived domestic legislation, as it has effect in domestic law immediately
before exit day, continues to have effect in domestic law and after exit day.’
This potentially includes the DPA 2018. However, it does not, at least
currently, include the GDPR or any UK measure transposing or bring the
GDPR into UK law.
Section 3, however, may be more pertinent. It states that:
‘Direct EU legislation, so far as operative immediately before exit day, forms
part of domestic law on and after exit day’ (s 3(1)).
338
EUWA Official Explanatory Commentary 24.14
339
24.14 Background to the New UK Regime
340
New ICO Guidance Update 24.15
341
24.15 Background to the New UK Regime
Preparation
24.16 The ICO advises that preparation is necessary and that organisa-
tions should:
●● assess their data flows and transfers in order to identify problem
restricted transfers in advance;
●● consider if and how transfers may continue, especially in the
absence of a possible future EU adequacy decision, which may not
have issued yet;
●● consider standard contractual clauses with the counterparty (note the
ICO tool available, and draft template contracts);
●● updating of binding corporate rules, if previously utilised;
●● update documentation and privacy notices;
●● compliance vetting by the transferor entity.
Particular considerations also arise for UK entities which do not have an
office, branch or establishment in the EU or EEA after Exit Day. Other
entities may have appointed a representative in the EU for GDPR pur-
poses. The ICO provides commentary on these situations. Indeed, many
organisations will already have established branches outside the UK or
even moved outside of the UK as a result of preparing for the possibility
of Brexit. GDPR compliance needs to be considered. Details and com-
mentary on these scenarios are referred to in the ICO guidance.
342
EDPS Guidance 24.17
EDPS Guidance
24.17 The European Data Protection Supervisor (EDPS) has also
issued guidance in relation to the possibility of a No Deal Brexit sce-
nario (‘Information Note on International Data Transfers After Brexit,’
16 July 2019).
The EDPS notes that currently as of 1 November 2019, the UK will
be a third country as referred to under the data protection rules, and
transfer restrictions automatically kick in. (This is unless the Withdrawal
Agreement takes effects prior to that date, which currently does not
seem likely, in which case transfers should be able to continue until
31 December 2020 (an effective transition period) pending final arrange-
ments and negotiations. Note, the 2020 deadline may be extended by two
years. This seems moot presently however).
The EDPS notes that a No Deal Brexit ‘would have [immediate]
reprecutions for the protection pf personal data … because … EU …
law, including data protection law, will cease to apply in the UK.’ The
GDPR requirements and restrictions on data transfers to less safe or non-
equivalent third countries will apply (see Chapter V, GDPR). There is a
default transfer ban, unless one of the limited number of transfer mech-
anisms can be established for particular data transfers or transactions
involving personal data.
The level of protection for the data being transferred must not be
undermined (GDPR Article 46).
Businesses and their advisers must therefore consider whether there is
a business need for data transfers which will be adversely affected by a
No Deal Brexit scenario. If so, the organisation needs to assess how best
to establish safeguards and the application of one of the limited number
of transfer mechanism in this scenario ‘to enable the transfer to a third
country’ – namely, the UK in this instance.
The EDPS refers to:
●● adequacy decisions (see GDPR Article 47 regarding adequate levels
of protection);
343
24.17 Background to the New UK Regime
344
Commission 24.18
Commission
24.18 In addition to the above Position Paper referred to by the EDPS,
the Commission has also issued a ‘Notice to Stakeholders Withdrawal of
345
24.18 Background to the New UK Regime
the United Kingdom From the Union and EU Rules in the Field of Data
Protection’ on 9 January 2018.
This notes that given the Article 50 notice submitted by the UK (on
29 March 2017) that EU law ceases to apply in the UK – unless there
is a validated Withdrawal Agreement. (Note, that while there has been
some discussion recently as to whether the UK may seek to have a
further extension of the leave date past 1 November 2019, there has
also been some discussion as to whether the Article 50 Notice may be
withdrawn).
The Commission’s ‘Notice to Stakeholders’ notes the ‘considerable
uncertainties’ and that ‘all stakeholders processing personal data are
reminded of legal repercussions, which need to be considered when the
[UK] becomes a third country.’ The Commission highlights the possibil-
ity and need to consider:
●● standard data protection clauses (as approved by the Commission);
●● binding corporate rules (but which generally only apply to certain
large group entities, and in any event require prior approval from a
data protection supervisory authority);
●● approved codes of conduct; and
●● approved certification mechanisms.
The Commission notes that the rules relating to some of these mecha-
nisms have been simplified in the GDPR as compared with the prior
DPD95/46.
EDPB
24.19 The European Data Protection Board (EDPB) issued guidance
entitled ‘Information Note on Data Transfers Under the GDPR in the
Event of a No Deal Brexit’ (12 February 2019). In this scenario it reiter-
ates the need to consider:
●● standard or ad hoc data protection clauses;
●● binding corporate rules;
●● codes of conduct and certification mechanisms; and
●● derogations.
It also includes reference to the five steps referred to above.
It notes that at the time of issue, ‘[a]ccording to the UK Government,
the current practice, which permits personal data to flow freely from
the UK to the EEA, will continue in the event of a no-deal Brexit.’
However, matters have shifted politically since then and the immedi-
ate next steps remain somewhat less certain, which is unfortunate for
346
Brexit and EU (Withdrawal Agreement) Act 2020 24.20
business entities which require the ability to plan ahead. The ‘UK
Government’s and the ICO’s website should be regularly consulted.’
While there is uncertainty, organisations wishing to continue dealing
and receiving personal data from their unconnected business partners
located inside the EU must implement most likely standard contractual
clauses, given that binding corporate rules will only apply to the largest
of organisations and in a pre-approved manner. In addition, there will
be increased pressure on parties in the EU wishing to continue to deal
with UK entities, to implement appropriate mechanisms and safeguards
from their end, in which case they will be raising queries directly with
their UK counter parties.
347
24.20 Background to the New UK Regime
348
Conclusion 24.21
Conclusion
24.21 The above provides an introduction to some of the Brexit con-
siderations and the intentions behind the new UK data protection regime.
The documentation referred to above, in particular the Ministerial
Statement document, provides very detailed background and policy
in relation to the need and benefit of updating the UK data protection
regime and aligning, or continuing to align, with the EU regime.
349
350
Chapter 25
The New Data Protection Act
Introduction
25.01 The new UK Data Protection Act is the most important
development in UK data protection law in over 20 years.
Repeal
25.02 The Data Protection Act 1998 (DPA 1998) is repealed – as
specified in Sch 19, para 44 of the Data Protection Act 2018 (DPA 2018).
Breakdown
25.03 The DPA 2018 is long and complex, comprising:
●● 215 sections over 130 pages; and
●● 20 Schedules (comprising 1–9 Parts depending on the Schedule)
over 208 pages.
The Act is also complicated by the fact that it addresses more than just
the EU General Data Protection Regulation (GDPR) itself, and conse-
quent repeal of the prior legislation.
In addition to the GDPR related issues, the Act also encompasses the
following:
●● Part 3: Law Enforcement Processing;
●● Part 4: Intelligence Services Processing;
●● Part 2, Chapter 3: applying the GDPR rules via the Act to other
information and data not covered by the GDPR.
351
25.03 The New Data Protection Act
352
Specific Changes from GDPR 25.04
353
25.04 The New Data Protection Act
354
Comment 25.05
Comment
25.05 The DPA 2018 is quite a complex piece of legislation and will
require organisations and their representatives undertaking careful re-
reading even in order to get an overview understanding.
Large elements of the Act will not be relevant in the ordinary course
of dealing for most organisations, in particular Part 3 and Part 4. The
GDPR extended section (Part 2, Chapter 3) (eg, freedom of information)
will also not be directly relevant to most organisations, especially those
in the commercial sphere. Note that these elements of the Act while so
encompassed, are outside of core data protection and are beyond the pre-
set scope of this book.
In terms of the remainder data protection sections of the Act, it should
be noted that these differ from the DPA 1998. The DPA 1998 was intended
to implement the EU Data Protection Directive 1995 (DPD 1995) into
the UK. EU Directives by their nature need local law implementation.
EU Regulations are different. The GDPR is directly effective in all
states – including the UK. The DPA 2018 is not technically required to
implement the GDPR in the UK as it is already applicable directly.
However, like many other states, the UK recognises that it needs a
new law to repeal the old law (ie the DPA 1998); and in order to deal
with specific local law issues. In addition, the GDPR specifies that
certain provisions from the GDPR can be tailored in each individual
state depending on the local issues and environment. For example,
while the GDPR provides that information society services must have
an age of consent of 16, it provides that states may derogate from
this. The UK utilises this derogation to apply an age of consent of 13
instead of 16. Numerous other derogations and changes are made in
the DPA 2018.
355
25.06 The New Data Protection Act
Future
25.06 With the UK in the EU, the GDPR was directly effective –
regardless of the DPA 2018. With the EU (Withdrawal Agreement)
Act 2020 of 23 January 2020 the Brexit Exit Day has occurred, thus the
GDPR direct effect ceases. However, there is a saver insofar as mat-
ters appear to continue as before during the transition period during the
remainder of 2020. Under the EU (Withdrawal Agreement) Act 2020
and Withdrawal Agreement the UK and EU continue negotiations on the
nature of future long term relations between each, and which transition
period is to continue until 21 December 2020.
While the Government has indicated that it does not intend to seek
extensions beyond December, it is possible for there to be extension
to the negotiation period if needed. Given that there have already been
extensions at earlier stages of the Brexit process, it is not out of the ques-
tion that further extensions may occur. Indeed, the current pandemic
might also provide a basis for an extension.
In the Brexit scenario, a further Data Protection Act will be needed to
bring into UK law the GDPR provisions which are not already incorpo-
rated in the DPA 2018. There would be a political and economic need
to ensure that UK law after the GDPR stops being directly effective, to
ensure a level of legal equivalence between the UK law protections for
personal data and those in the EU. If there is no equivalency of protec-
tion and rights, transfers of important economic and financial data which
incorporates personal data cannot continue to flow between the EU and
UK. Many business flows of data would have to cease as it would be
caught by the default transfer ban from the EU to areas not formally
recognised as being of equivalent standards.
A new Data Protection Act may have to follow after the DPA 2018,
depending on political developments. In addition, an EU formal ade-
quacy finding may be also required. This particular issue will not be
without difficulty in the normal course – and could take years. However,
one can assume that the Government would wish to have this included
in the terms of any final agreement with the EU, and this is currently
planned to be concluded in advance of the December 2020 data sched-
uled for the end of the transition period.
However, predicting the result of political negotiations and associated
timeframes is beyond a work such as this – particularly during a period
of frought negotiations, a level of brinksmanship, and an international
pandemic.
356
Part 5
New EU Regime
357
358
Chapter 26
New Regime
Introduction
26.01 The EU data protection regime is fundamentally updated and
expanded.1 Many things have changed since the introduction of the EU
Data Protection Directive 1995 (DPD 1995). Data processing activi-
ties have changed, as well as increases in scale and complexity. New
data processing activities and issues are constantly evolving. The EU
undertook a formal review of the data protection regime. Partly on foot
of the review, it was decided to update DPD 1995, ultimately via the
new EU Regulation, namely the EU General Data Protection Regulation
(GDPR).
359
26.02 New Regime
Review Policy
26.03 The Commission and others recognised that technology and
commercial changes have meant that the data protection regime required
updating.5 Indeed, the Council of Europe Convention on data p rotection6
which pre-dates DPD 1995 and which was incorporated into the national
law of many EU (and other states) prior to DPD 1995, is also in the pro-
cess of being updated.7 The WP29 also refers to the need for future data
protection measures in its Opinion regarding The Future of Privacy.8
Indeed, there have also been calls for greater political activism in rela-
tion to particular data protection issues.9 Others10 have also highlighted
new problematic developments in relation to such things as location data
and location based services, which need to be dealt with.11 Online abuse
and offline abuse issues are other issues which need to be addressed.
360
Review Policy 26.03
Rebecca Wong refers to some of the areas of concern which the GDPR
proposes to address.12 These include:
●● the data protection regime in the online age;
●● social media;
●● cloud computing;
●● minimum/maximum standards;
●● the data protection Principles.13
The Commission states14 that the policy in reviewing the data protection
regime is to:
●● modernise the EU legal system for the protection of personal data,
in particular to meet the challenges resulting from globalisation and
the use of new technologies;
●● strengthen individuals’ rights, and at the same time reduce adminis-
trative formalities to ensure a free flow of personal data within the
EU and beyond;
●● improve the clarity and coherence of the EU rules for personal data
protection and achieve a consistent and effective implementation
and application of the fundamental right15 to the protection of per-
sonal data in all areas of the EU’s activities.16
It is also to enhance consumer confidence in eCommerce.17 In addition,
it should also bring comprehensive savings to organisations as the com-
pliance obligations of complying with somewhat differing national data
protection regimes will be reduced if not eliminated.18
12 R Wong, ‘The Data Protection Directive 95/46/EC: Idealisms and Realisms,’ Interna-
tional Review of Law, Computers & Technology (2012) (26) 229–244.
13 See above.
14 Reform of Data Protection Legal Framework, Commission, Justice Directorate, at
http://ec.europa.eu/justice/data-protection/index_en.htm.
15 In relation to data protection as a fundamental right, see, for example S Rodata,
‘Data Protection as a Fundamental Right,’ in S Gutwirth, Y Poullet, P de Hert,
C de Terwangne and S Nouwt, Reinventing Data Protection? (Springer, 2009) 77.
A Mantelero notes that ‘If legislators consider data protection as a fundamental right,
it is necessary to reinforce its protection in order to make it effective and not condi-
tioned by the asymmetries which characterize the relationship between Data Subject
and data controllers,’ A Mantelero, ‘Competitive Value of Data Protection: The Impact
of Data Protection Regulation on Online Behaviour,’ International Data Privacy Law
(11/2013) (3:4) 98.
16 Reform of Data Protection legal Framework, Commission, Justice Directorate,
at http://ec.europa.eu/justice/data-protection/index_en.
17 In Brief, Communications Law (2012) (17) 3.
18 See above.
361
26.03 New Regime
The review19 summarises the need for new data protection rules, as
follows:
‘The current EU data protection rules date from 1995. Back then, the internet
was virtually unknown to most people. Today, 250 million people use the
internet daily in Europe.
Think how that has changed our personal data landscape through the explo-
sion of ecommerce, social networks, online games and cloud computing.
The European Commission has therefore adopted proposals for updating data
protection rules to meet the challenges of the digital age. In particular, the
proposals will strengthen protection of your personal data online.’
Importance
26.04 Costa and Poullet indicate that as the GDPR ‘comes into force,
the document will be the new general legal framework of data protection,
repealing [the DPD] more than twenty-seven years after its adoption.’23
The GDPR, as well as Article 8(1) of the EU Charter of fundamental
rights of 2000 and Article 16(1) of the Lisbon Treaty, reassert the impor-
tance of privacy and data protection ‘as a fundamental right’.24 ‘[E]ffec-
tive and more coherent protection’ is required25 (see below).
In terms of policy as between modernising via a Directive or via a
Regulation ‘in order to ensure a full consistent and high level of protection
362
Fundamental Right 26.05
Fundamental Right
26.05 Personal data protection is now recognised as a fundamen-
tal right for individuals, both in the new GDPR and the EU Charter of
Fundamental Rights of 2000, Lisbon Treaty (Treaty on the Functioning
of the European Union) and the Council of Europe Convention.
‘EU Charter (Article 8(1))
Everyone has the right to the protection of personal data concerning him or
her.’
Everyone has the right to the protection of personal data concerning them.’
363
26.05 New Regime
Innovations
26.06 Commentators have indicated that parts of the GDPR contain
particular ‘legislative innovation.’30 Some examples of this innovation
are indicated to be the:
●● Principles of data protection;
●● Data Subjects’ rights;
●● Controllers’ and Processors’ obligations;
●● Regulation issues regarding technologies.31
It has been noted that while DPD 1995 emphasises protection for the
fundamental right and freedoms of individuals ‘and in particular their
right to privacy,’ the GDPR in Articles 1 and 2 stresses the need to pro-
tect the fundamental right and freedoms of individuals ‘and in particular
their right to the protection of personal data.’32 Further references also
emphasise data protection as a stand-alone concept from privacy, such as
data protection risk assessments and pre-problem solving via data pro-
tection by design (DPbD) and by default.
There is a new consistency mechanism whereby the national data
protection authorities are obliged to cooperate with each other and with
the Commission.33 Two examples given include: data protection assess-
ments; and the obligation of notifying Data Subjects in relation to data
breaches.34
The obligations in terms of sufficient security and data breaches are
more detailed in the GDPR than previously.35 The obligations are now
more detailed than those in relation to telcos and ISPs in the ePD.36 Data
breaches are referred to in the GDPR. In the event of a data breach the
Controller must notify the ICO. In addition the Controller must also
communicate to the Data Subjects if there is a risk of harm to their pri-
vacy or personal data.
30 See above.
31 See above.
32 See above, 255.
33 Chapter VII, section 10, see L Costa and Y Poullet, ‘Privacy and the Regulation of
2012,’ Computer Law & Security Review (2012) (28) 254–262, at 255.
34 See above.
35 L Costa and Y Poullet, ‘Privacy and the Regulation of 2012,’ Computer Law &
Security Review (2012) (28) 254–262, at 256.
36 See above.
364
Innovations 26.06
365
26.06 New Regime
43 See above.
44 See above.
45 See above.
46 For example, Anne Cavoukian, DPA Ontario, Privacy Guidelines for RFID Informa-
tion Systems, at www.ipc.on.ca, says the privacy and security must be built into the
solution from the outset, at the design stage. Referred to ibid.
366
Enhanced Provisions and Changes 26.07
Data Subjects have more control over their personal data. In the con-
text of social networks, ‘individual profiles should be kept private from
others by default.’47
The concept of DPbD and data protection by default as provided in the
GDPR are predicted to soon impact upon organisational contracts and
contracting practices relating to data processing activities.48
As mentioned above, one of the new areas is the obligation to engage
in data protection impact assessments. Article 35(1) provides that that:
‘[w]here a type of processing in particular using new technologies, and tak-
ing into account the nature, scope, context and purposes of the processing, is
likely to result in a high risk for the rights and freedoms of natural persons,
the Controller shall, prior to the processing, carry out an assessment of the
impact of the envisaged processing operations on the protection of personal
data. A single assessment may address a set of similar processing operations
that present similar high risks.’
47 L Costa and Y Poullet, ‘Privacy and the Regulation of 2012,’ Computer Law &
Security Review (2012) (28) 254–262, at 260, and referring to European data Protec-
tion Supervisor on the Communications from Commission to the European Parlia-
ment, the Council, the Economic and Social Committee and the Committee of the
Regions, ‘A Comprehensive Approach on Personal Data Protection in the European
Union,’ at 23.
48 See above, 260.
49 See also Commission on a common framework for collective redress, at http://
ec.europa.eu/consumers/redress_cons/collective_redress_en.htm.
50 L Costa and Y Poullet, ‘Privacy and the Regulation of 2012,’ Computer Law &
Security Review (2012) (28) 254–262, at 261.
51 See above.
367
26.07 New Regime
The erasure and forgetting right is most clearly associated and related to
the following in particular:
●● where the personal data are no longer necessary in relation to the
purposes for which they were originally collected and processed
(and the associated finality principle);
●● where the Data Subject has withdrawn their consent for processing;
●● where Data Subjects object to the processing of the personal data
concerning them;
●● where the processing of the personal data does not comply with the
GDPR.56
The GDPR and the erasure and forgetting right ‘amplifies the effective-
ness of data protection Principles and rules.’57
Data Subjects can have their data erased under the right to be forgot-
ten when there is no compliance, in addition to instances where they
simply withdraw their consent.58 User control and Data Subject control
are, therefore, enhanced.
368
Enhanced Provisions and Changes 26.07
59 See above.
60 See above, at 260.
61 In Brief, Communications Law (2012) (17) 3.
62 Referred to in In Brief, Communications Law (2012) (17) 3.
369
26.07 New Regime
the opportunities of the Digital Single Market by cutting red tape and
benefiting from reinforced consumer trust.’63
The Commission also refers to the benefits of the changes. It states:
‘The reform will allow people to regain control of their personal data. Two-
thirds of Europeans (67%), according to a recent Eurobarometer survey, stated
they are concerned about not having complete control over the information
they provide online. Seven Europeans out of ten worry about the potential use
that companies may make of the information disclosed. The data protection
reform will strengthen the right to data protection, which is a fundamental
right in the EU, and allow them to have trust when they give their personal
data.
The new rules address these concerns by strengthening the existing rights
and empowering individuals with more control over their personal data. Most
notably, these include,
●● easier access to your own data: individuals will have more information
on how their data is processed and this information should be available in
a clear and understandable way;
●● a right to data portability: it will be easier to transfer your personal data
between service providers;
●● a clarified “Right to be Forgotten”: when you no longer want your data
to be processed, and provided that there are no legitimate grounds for
retaining it, the data will be deleted;
●● the right to know when your data has been hacked: For example,
companies and organisations must notify the national supervisory author-
ity of serious data breaches as soon as possible so that users can take
appropriate measures.
One continent, one law: The regulation will establish one single set of rules
which will make it simpler and cheaper for companies to do business in the
EU.
One-stop-shop: businesses will only have to deal with one single supervisory
authority. This is estimated to save €2.3 billion per year.
European rules on European soil: companies based outside of Europe will
have to apply the same rules when offering services in the EU.
370
Enhanced Provisions and Changes 26.07
Rules fit for innovation: the regulation will guarantee that data protection
safeguards are built into products and services from the earliest stage of devel-
opment (Data protection by Design (DPbD)). Privacy-friendly techniques
such as pseudonomysation will be encouraged, to reap the benefits of big data
innovation while protecting privacy.
The data protection reform will stimulate economic growth by cutting costs
and red tape for European business, especially for small and medium enter-
prises (SMEs). The EU’s data protection reform will help SMEs break into
new markets. Under the new rules, SMEs will benefit from four reductions
in red tape:
●● No more notifications: Notifications to supervisory authorities are a for-
mality that represents a cost for business of €130 million every year. The
reform will scrap these entirely.
●● Every penny counts: Where requests to access data are manifestly
unfounded or excessive, SMEs will be able to charge a fee for providing
access.
●● Data Protection Officers: SMEs are exempt from the obligation to
appoint a data protection officer insofar as data processing is not their
core business activity.
●● Impact Assessments: SMEs will have no obligation to carry out an
impact assessment unless there is a high risk.
Individuals’ personal data will be better protected, when processed for any law
enforcement purpose including prevention of crime. It will protect everyone –
regardless of whether they are a victim, criminal or witness. All law enforce-
ment processing in the Union must comply with the principles of necessity,
proportionality and legality, with appropriate safeguards for the individuals.
Supervision is ensured by independent national data protection authorities,
and effective judicial remedies must be provided.
The Data Protection Directive for Police and Criminal Justice Authorities
provides clear rules for the transfer of personal data by law enforcement
authorities outside the EU, to ensure that the level of protection of individuals
guaranteed in the EU is not undermined.’64
371
26.07 New Regime
372
The New Data Protection Regime 26.08
●● ICO, etc;
●● new bodies (Recital 142; Articles, 9 and 80);
●● notification/registration replaced (Recital 89);
●● exceptions/exemptions (Article 23);
●● lawful processing and consent (Articles 4–9, 13, 14, 17, 18, 20, 22,
23, 32, 40, 49, 82, 83);
●● online identifiers (Recital 30; Articles 4, 87);
●● sensitive and special personal data (Articles 6, 9, 22, 27, 30, 35,
37, 47);
●● children (Articles 6, 8, 12, 40, 57);
●● health data (Articles 4, 9, 17, 23, 36, 88);
●● DPR definitions (Article 4);
●● new processing rules: obligations (Articles 5–11);
●● new (data protection) Principles (Article 5);
●● lawfulness of processing: legitimate processing conditions
(Article 6);
●● child’s consent: conditions for information society services
(Article 8);
●● processing special categories of personal data (Article 9);
●● processing re criminal convictions and offences data (Article 10);
●● processing not requiring identification (Article 11);
●● Controllers and Processors (Chapter IV);
●● responsibility of the Controller (Article 24);
●● joint Controllers (Article 26);
●● Processor (Article 28);
●● processing under authority of Controller and Processor (Article 29);
●● records of processing activities (Article 30);
●● representatives of Controllers not established in EU (Article 27);
●● co-operation with supervisory authority;
●● security of processing (Article 32);
●● notifying data breach to supervisory authority (Article 33);
●● communicating data breach to Data Subject (Article 34);
●● data protection impact assessment and prior consultation (Chapter IV,
Section 3);
●● data protection impact assessment (Article 35);
●● prior consultation (Article 36);
●● new Data Protection Officer (DPO) (Chapter IV, Section 4;
Article 37);
●● position (Article 38) and tasks of new DPO (Article 39);
●● general principle for transfers (Article 44);
●● transfers via adequacy decision (Article 45);
●● transfers via appropriate safeguards (Article 46);
●● transfers via binding corporate rules (Article 47);
●● transfers or disclosures not authorised by EU law (Article 48);
373
26.08 New Regime
374
Main Provisions and Changes of GDPR 26.12
375
26.13 New Regime
376
Main Provisions and Changes of GDPR 26.17
377
26.18 New Regime
378
Main Provisions and Changes of GDPR 26.19
379
26.19 New Regime
69 See, for example, D Gourlay and G Gallagher, ‘Collecting and Using Children’s
Information Online: the UK/US Dichotomy,’ SCL Computers and Law, 12 December
2011.
70 Note generally, for example, JS Groppe, ‘A Child’s Playground or a Predator’s Hunting
Ground? – How to Protect Children on Internet Social Networking Sites,’ CommLaw
Conspectus (2007) (16) 215–245; EP Steadman, ‘MySpace, But Who’s Responsibil-
ity? Liability of Social Networking Websites When Offline Sexual Assault of Minors
Follows Online Interaction,’ Villanova Sports and Entertainment Law Journal (2007)
(14) 363–397; DC Beckstrom, ‘Who’s Looking at Your Facebook Profile? The Use of
Student Conduct Codes to Censor College Students’ Online Speech,’ Willamette Law
Review (2008) 261–312.
380
Main Provisions and Changes of GDPR 26.20
71 See, for example, L McDermott, ‘Legal Issues Associated with Minors and Their Use
of Social Networking Sites,’ Communications Law (2012) (17) 19–24.
381
26.20 New Regime
content, cyber bullying, but also from the collection and use of their per-
sonal data online and collected online, sometimes without their knowl-
edge or consent). Their personal data and privacy is more vulnerable
than that of older people.
It is important for organisation to note the ‘child’ provisions in the
GDPR. This will have implications in how organisations:
●● consider the interaction with children and what personal data may be
collected and processed;
●● ensure that there is appropriate compliance for such collection and
processing for children as distinct from adults.
Child’s Consent: Conditions for Information Society Services
26.21 Processing of children’s personal data are referred to in Recital
38. Article 8 of the GDPR makes new provisions in relation to condi-
tions for children’s consent for Information Society services. Where
Article 6(1)(a) applies, in relation to the offer of information society
services directly to a child, the processing of personal data of a child
shall be lawful where the child is at least 16 years old. Where the child
is below the age of 16 years, such processing shall only be lawful if and
to the extent that consent is given or authorised by the holder of parental
responsibility over the child (Article 8(1)).
The Controller shall make reasonable efforts to verify in such cases
that consent is given or authorised by the holder of parental responsi-
bility over the child, taking into consideration available technology
(Article 8(2)). This shall not affect the general contract law of states such
as the rules on the validity, formation or effect of a contract in relation to
a child (Article 8(3)).
Processing Special Categories of Personal Data
26.22 Sensitive personal data are referred to in Recitals 10 and 51 and
special categories of personal data are referred to in Recitals 10, 51, 52,
53, 54, 71, 80, 91 and 97.
Article 9 refers to the processing of special categories of personal data.
The processing of personal data, revealing racial or ethnic origin, politi-
cal opinions, religious or philosophical beliefs, or trade-union member-
ship, and the processing of genetic data, biometric data for the purpose
of uniquely identifying a natural person, data concerning health or data
concerning a natural person’s sex life and sexual orientation shall be
prohibited (Article 9(1)).72
72 In relation to genetic data generally, see for example D Hallinan, PJA de Hert and
M Friedewald, ‘Genetic Data and the Data Protection Regulation: Anonymity,
382
Main Provisions and Changes of GDPR 26.22
383
26.22 New Regime
384
Main Provisions and Changes of GDPR 26.25
385
26.26 New Regime
386
Main Provisions and Changes of GDPR 26.29
387
26.29 New Regime
388
Main Provisions and Changes of GDPR 26.31
The Commission may lay down standard contractual clauses for the
matters referred to in Article 28(3) and (4) and in accordance with the
examination procedure referred to in Article 93(2) (Article 28(7)).
A supervisory authority may adopt standard contractual clauses for the
matters referred to in Article 28(3) and (4) and in accordance with the
consistency mechanism referred to in Article 63 (Article 28(8)).
The contract or the other legal act referred to in Article 28(3) and (4)
shall be in writing, including in an electronic form (Article 28(9)).
Without prejudice to Articles 82, 83 and 84, if a Processor infringes
the GDPR by determining the purposes and means of data processing,
the Processor shall be considered to be a Controller in respect of that
processing (Article 28(10)).
Organisations acting as Processors should recall that while they may
indeed be Processors, they can also at the same time be Controllers in
relation to different sets of personal data.
Processing Under Authority of Controller and Processor
26.30 The Processor and any person acting under the authority of the
Controller or of the Processor who has access to personal data shall not
process them except on instructions from the Controller, unless required
to do so by EU or state law (Article 29).
Records of Processing Activities
26.31 Each Controller and where applicable the Controller’s rep-
resentative, shall maintain a record of processing activities under its
responsibility. This record shall contain all of the following information:
●● the name and contact details of the Controller and where applicable
the joint Controller, the Controller’s representative and the DPO;
●● the purposes of the processing;
●● a description of categories of Data Subjects and of the categories of
personal data;
●● the categories of recipients to whom the personal data have been or
will be disclosed including recipients in third countries or interna-
tional organisations;
●● where applicable, transfers of data to a third country or an interna-
tional organisation, including the identification of that third country
or international organisation and, in case of transfers referred to in
Article 49(1), the documentation of suitable safeguards;
●● where possible, the envisaged time limits for erasure of the different
categories of data;
●● where possible, a general description of the technical and organisa-
tional security measures referred to in Article 32(1) (Article 30(1)).
389
26.31 New Regime
390
Main Provisions and Changes of GDPR 26.34
for the rights and freedoms of natural persons, taking into account
the nature, context, scope and purposes of the processing; or
●● a public authority or body (Article 27(2)).
The representative shall be established in one of the states where the
Data Subjects whose personal data are processed in relation to the offer-
ing of goods or services to them, or whose behaviour is monitored, are
(Article 27(3)).
The representative shall be mandated by the Controller or the
Processor to be addressed in addition to or instead of the Controller or
the Processor by, in particular, supervisory authorities and Data Subjects,
on all issues related to the processing, for the purposes of ensuring com-
pliance with the GDPR (Article 27(4)).
The designation of a representative by the Controller or the Processor
shall be without prejudice to legal actions which could be initiated
against the Controller or the Processor themselves (Article 28(5)).
Cooperation with Supervisory Authority
26.33 The Controller and the Processor and, where applicable, their
representatives, shall co-operate, on request, with the supervisory author-
ity in the performance of its tasks (Article 31).
Data Protection by Design (DPbD) and by Default
26.34 Article 25 refers to data protection by design and by default.
Note also the related concept, or precursor concept, of Privacy by Design
(PbD). In some ways PbD is the impetus for the current DPbD rules.
Taking into account the state of the art and the cost of implementation
and the nature, scope, context and purposes of the processing as well as
the risks of varying likelihood and severity for rights and freedoms of
natural persons posed by the processing, the Controller shall, both at the
time of the determination of the means for processing and at the time of
the processing itself, implement appropriate technical and organisational
measures, such as pseudonymisation, which are designed to implement
data protection Principles, such as data minimisation, in an effective
manner and to integrate the necessary safeguards into the processing in
order to meet the requirements of the GDPR and protect the rights of
Data Subjects (Article 25(1)).
The Controller shall implement appropriate technical and organisa-
tional measures for ensuring that, by default, only personal data which
are necessary for each specific purpose of the processing are processed.
That obligation applies to the amount of data collected, the extent of
their processing, the period of their storage and their accessibility. In
particular, such measures shall ensure that by default personal data are
391
26.34 New Regime
392
Main Provisions and Changes of GDPR 26.38
393
26.38 New Regime
77 WP29, Opinion 03/2014 on Personal Data Breach Notification. Also see WP29;
Working Document 01/2011 on the current EU personal data breach framework
and recommendations for future policy developments; Opinion 06/2012 on the draft
Commission Decision on the measures applicable to the notification of personal data
breaches under Directive 2002/58/EC on privacy and electronic communications.
394
Main Provisions and Changes of GDPR 26.41
●● the Controller has taken subsequent measures which ensure that the
high risk for the rights and freedoms of Data Subjects referred to in
Article 34(3) is no longer likely to materialise;
●● it would involve disproportionate effort. In such a case, there shall
instead be a public communication or similar measure, whereby
the Data Subjects are informed in an equally effective manner
(Article 34(3)).
If the Controller has not already communicated the personal data breach
to the Data Subject, the supervisory authority, having considered the
likelihood of the personal data breach resulting in a high risk, may
require it to do so or may decide that any of the conditions referred to in
Article 34(3) are met (Article 34(4)).
Each organisation should have a prepared Data Subject notification
procedure and letter/email for the Data Subject in the event that it is
needed. This may be incorporated into an overall data breach procedure
for the organisation.
Data Protection Impact Assessment and Prior Consultation
26.40 Chapter IV, Section 3 of the GDPR refers to impact assess-
ments and prior consultations. The WP29 also refers to impact assess-
ments.78 The ICO also has a guide entitled ‘Data Protection Impact
Assessments’.79
Data Protection Impact Assessment
26.41 Where a type of processing in particular using new technolo-
gies, and taking into account the nature, scope, context and purposes of
the processing, is likely to result in a high risk for the rights and free-
doms of natural persons, the Controller shall, prior to the processing,
395
26.41 New Regime
396
Main Provisions and Changes of GDPR 26.42
80 Generally note D Wright and P de Hert, eds, Privacy Impact Assessment (Springer
2012).
397
26.42 New Regime
398
Main Provisions and Changes of GDPR 26.46
contractual clauses for the transfer of personal data to processors established in third
countries, under Directive 95/46/EC (data controller to data processor); FAQs in order
to address some issues raised by the entry into force of the EU Commission Decision
2010/87/EU of 5 February 2010 on standard contractual clauses for the transfer of
personal data to processors established in third countries under Directive 95/46/EC
2010; Recommendation 1/2007 on the Standard Application for Approval of Binding
Corporate Rules for the Transfer of Personal Data.
399
26.46 New Regime
public security, defence, national security and criminal law and the
access of public authorities to personal data, as well as the imple-
mentation of this legislation, data protection rules, professional
rules and security measures, including rules for onward transfer of
personal data to another third country or international organisation,
which are complied with in that country or international organisa-
tion, case law, as well as effective and enforceable Data Subject
rights and effective administrative and judicial redress for the Data
Subjects whose personal data are being transferred;
●● the existence and effective functioning of one or more independ-
ent supervisory authorities in the third country or to which an inter-
national organisation is subject, with responsibility for ensuring
and enforcing compliance with the data protection rules, including
adequate enforcement powers for assisting and advising the Data
Subjects in exercising their rights and for assisting and advising the
Data Subjects in exercising their rights and for co-operation with the
supervisory authorities of the states; and
●● the international commitments the third country or international
organisation concerned has entered into, or other obligations arising
from legally binding conventions or instruments as well as from its
participation in multilateral or regional systems, in particular in rela-
tion to the protection of personal data (Article 45(2)).
The Commission, after assessing the adequacy of the level of protection,
may decide by means of implementing act, that a third country, or a ter-
ritory or one or more specified sectors within that third country, or an
international organisation ensures an adequate level of protection within
the meaning of Article 45(3).
The Commission shall, on an on-going basis, monitor developments
in third countries and international organisations that could affect the
functioning of decisions adopted pursuant to Article 45(3) and decisions
adopted on the basis of Article 25(6) of DPD 1995 (Article 45(4)).
The Commission shall publish in the Official Journal of the EU and
on its website a list of those third countries, territories and specified sec-
tors within a third country and international organisations where it has
decided that an adequate level of protection is or is no longer ensured
(Article 45(8)).
Decisions adopted by the Commission on the basis of Article 25(6) of
DPD 1995 shall remain in force until amended, replaced or repealed by
a Commission Decision adopted in accordance with Article 45(3) or (5)
(Article 45(9)).
400
Main Provisions and Changes of GDPR 26.47
Note that the EU-US Safe Harbour data transfer regime was struck
down by the Court of Justice in the Schrems case.82 The Safe Harbour
regime was held to be invalid. Notwithstanding the GDPR, the previ-
ous Safe Harbour regime needed to be replaced. Negotiations between
the EU Commission and the US authorities ensued. Agreement may be
reached and a new agreement implemented in early 2016. The replace-
ment is entitled EU-US Privacy Shield.
It should be noted also that there have been some concerns that the
same or similar reasons for the striking down of the Safe Harbour regime
may cause concerns for some of the other transfer legitimising mecha-
nisms. It remains to be seen if further challenges or concerns will under-
mine the Privacy Shield, standard clauses, etc.
The issues of data transfers and adequacy decision has added signifi-
cance in the UK now that Brexit has been passed by Parliament (in the
form of the EU (Withdrawal Agreement) Act 2020), and the transition
period is well advanced, and the UK is seeking a formal adequacy deci-
sion from the EU in order ease and facilitate the continued use of EU
data transfers into the UK. (See also Chapter 24.)
Transfers via Appropriate Safeguards
26.47 In the absence of a decision pursuant to Article 45(3), a
Controller or Processor may transfer personal data to a third country
or an international organisation only if the Controller or Processor has
provided appropriate safeguards, and on condition that enforceable Data
Subject rights and effective legal remedies for Data Subjects are avail-
able (Article 46(1)).
The appropriate safeguards referred to in Article 46(1) may be pro-
vided for, without requiring any specific authorisation from a supervi-
sory authority, by:
●● a legally binding and enforceable instrument between public author-
ities or bodies;
●● binding corporate rules in accordance with Article 47;
82 Schrems v Commissioner, Court of Justice, Case C-362/14, 6 October 2015. The case
technically related to Prism and Facebook Europe and transfers to the US. However,
the wider import turned out to be the entire EU-US Safe Harbour Agreement and data
transfers to the US. Note WP29 statement on the case, Statement on the implementa-
tion of the judgement of the Court of Justice of the European Union of 6 October 2015
in the Maximilian Schrems v Data Protection Commissioner case (C-362/14).
401
26.47 New Regime
402
Main Provisions and Changes of GDPR 26.48
403
26.48 New Regime
404
Main Provisions and Changes of GDPR 26.50
405
26.50 New Regime
406
Main Provisions and Changes of GDPR 26.52
85 L Costa and Y Poullet, ‘Privacy and the Regulation of 2012,’ Computer Law &
Security Review (2012) (28) 254–262, at 256.
407
26.52 New Regime
408
Main Provisions and Changes of GDPR 26.54
409
26.54 New Regime
the time when personal data are obtained, provide the Data Subject with
the following information:
●● the identity and the contact details of the Controller and, where
applicable, of the Controller’s representative;
●● the contact details of the DPO, where applicable;
●● the purposes of the processing for which the personal data are
intended as well as the legal basis for the processing;
●● where the processing is based on Article 6(1)(f), the legitimate inter-
ests pursued by the Controller or by a third party;
●● the recipients or categories of recipients of the personal data,
if any;
●● where applicable, the fact that the Controller intends to transfer per-
sonal data to a third country or international organisation and the
existence or absence of an adequacy decision by the Commission, or
in the case of transfers referred to in Articles 46 or 47, or the second
subparagraph of Article 49(1), reference to the appropriate or suit-
able safeguards and the means by which to obtain a copy of them or
where they have been made available (Article 13(1)).
In addition to the information referred to in Article 13(1), the Controller
shall, at the time when personal data are obtained, provide the Data
Subject with the following further information necessary to ensure fair
and transparent processing:
●● the period for which the personal data will be stored, or if that is not
possible, the criteria used to determine that period;
●● the existence of the right to request from the Controller access to and
rectification or erasure of personal data or restriction of processing
concerning the Data Subject or to object to the processing as well as
the right to data portability;
●● where the processing is based on Article 6(1)(a) or Article 9(2)(a),
the existence of the right to withdraw consent at any time, without
affecting the lawfulness of processing based on consent before its
withdrawal;
●● the right to lodge a complaint to a supervisory authority;
●● whether the provision of personal data is a statutory or contractual
requirement, or a requirement necessary to enter into a contract, as
well as whether the Data Subject is obliged to provide the data and
of the possible consequences of failure to provide such data;
●● the existence of automated decision making including profiling
referred to in Article 22(1) and (4) and at least in those cases, mean-
ingful information about the logic involved, as well as the signifi-
cance and the envisaged consequences of such processing for the
Data Subject (Article 13(2)).
410
Main Provisions and Changes of GDPR 26.55
Where the Controller intends to further process the data for a purpose
other than that for which the personal data were collected, the Controller
shall provide the Data Subject prior to that further processing with infor-
mation on that other purpose and with any relevant further information
as referred to in Article 13(2) (Article 13(2)).
Article 13(1), (2) and (3) shall not apply where and insofar as the Data
Subject already has the information (Article 13(4)).
Right to Prior Information: Indirectly Obtained Data
26.55 Article 14 refers to information to be provided where the data
have not been obtained from the Data Subject. Where personal data have
not been obtained from the Data Subject, the Controller shall provide the
Data Subject with the following information:
●● the identity and the contact details of the Controller and, where
applicable, of the Controller’s representative;
●● the contact details of the DPO, where applicable;
●● the purposes of the processing for which the personal data are
intended as well as the legal basis of the processing;
●● the categories of personal data concerned;
●● the recipients or categories of recipients of the personal data, if any;
●● where applicable, that the Controller intends to transfer personal data
to a recipient in a third country or international organisation and the
existence or absence of an adequacy decision by the Commission,
or in case of transfers referred to in Article 46 or 47, or the second
subparagraph of Article 49(1), reference to the appropriate or suit-
able safeguards and the means to obtain a copy of them or where
they have been made available (Article 14(1)).
In addition to the information referred to in Article 14(1), the Controller
shall provide the Data Subject with the following information necessary
to ensure fair and transparent processing in respect of the Data Subject:
●● the period for which the personal data will be stored, or if this is not
possible, the criteria used to determine that period;
●● where the processing is based on Article 6(1)(f), the legitimate inter-
ests pursued by the Controller or by a third party;
●● the existence of the right to request from the Controller access to and
rectification or erasure of personal data or restriction of processing
concerning the Data Subject and to object to processing as well as
the right to data portability;
●● where processing is based on Article 6(1)(a) or Article 9(2)(a), the
existence of the right to withdraw consent at any time, without
affecting the lawfulness of processing based on consent before its
withdrawal;
411
26.55 New Regime
412
Main Provisions and Changes of GDPR 26.56
413
26.56 New Regime
414
Main Provisions and Changes of GDPR 26.60
88 In relation to the original draft, etc, see for example, G Sartor, ‘The Right to be Forgot-
ten in the Draft Data Protection Regulation,’ International Data Privacy Law (2015)
(5;1) 64. Also A Mantelero, ‘The EU Proposal for a general data protection regulation
and the roots of the “right to be forgotten,”’ Computer Law and Security Report (2013)
(29:3) 229.
415
26.60 New Regime
personal data” within the meaning of Article 2(b) when that information con-
tains personal data and, second, the operator of the search engine must be
regarded as the “controller” in respect of that processing, within the meaning
of Article 2(d).
The WP29 also refers to RtbF issues as well as the Google Spain case.90
This includes WP29 ‘Guidelines on the implementation of the Court of
Justice of the European Union judgment on “Google Spain and Inc v
Agencia Española de Protección de Datos (AEPD) and Mario Costeja
González.”’
There have also been recent cases, including a case against the French
data regulator (regarding special categories of data)91; a case taken by
the French data regulator against Google (regarding jurisdictional take-
downs);92 and the first UK High Court RtbF cases, NT1 and NT2.93
Note also the EDPB guidance:
●● Guidelines 5/2019 on the criteria of the Right to be Forgotten in the
search engines cases under the GDPR (part 1).
89 Google Spain SL and Google Inc v Agencia Española de Protección de Datos (AEPD)
and Mario Costeja González, Case C-131/12, 13 May 2014. Also see, for example,
P Lambert, The Right to be Forgotten (Bloomsbury, 2019); P Lambert, International
Handbook of Social Media Laws (Bloomsbury 2014); P Lambert, Social Networking:
Law, Rights and Policy (Clarus Press 2014); V Mayer-Schönberger, Delete: the Virtue
of Forgetting in the Digital Age (Princeton, 2009).
90 WP29 Guidelines on the implementation of the Court of Justice of the European
Union judgment on ‘Google Spain and Inc v Agencia Española de Protección de
Datos (AEPD) and Mario Costeja González’ C-131/121; Opinion 8/2010 on applica-
ble law (WP29 adds as follows: ‘In its judgment in Google Spain the Court of Justice
of the European Union decided upon certain matters relating to the territorial scope of
Directive 95/46/EC. The WP29 commenced an internal analysis of the potential impli-
cations of this judgment on applicable law and may provide further guidance on this
issue during the course of 2015, including, possibly, additional examples.’).
91 GC and Others v Commission Nationale de l’Informatique et des Libertés (CNIL)
(Déréférencement de données sensibles), CJEU [2019] Case C-136/17.
92 Google LLC, successor in law to Google Inc v Commission Nationale de l’Informatique
et des Libertes (CNIL), CJEU [2019] Case C-507/17.
93 NT1 and NT2 v Google LLC [2018] EWHC 799 (QB; [2018] EMLR 18; [2018]
HRLR 13.
416
Main Provisions and Changes of GDPR 26.63
417
26.63 New Regime
94 Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002
concerning the processing of personal data and the protection of privacy in the elec-
tronic communications sector (Directive on privacy and electronic communications).
418
Main Provisions and Changes of GDPR 26.67
419
26.67 New Regime
Taking into account the state of the art and the nature, scope, context
and purposes of the processing as well as the risks of varying likelihood
and severity for rights and freedoms of natural persons posed by the pro-
cessing, the Controller shall, both at the time of the determination of the
means for processing and at the time of the processing itself, implement
appropriate technical and organisational measures, such as pseudonymi-
sation, which are designed to implement data protection Principles, such
as data minimisation, in an effective way and to integrate the necessary
safeguards into the processing in order to meet the requirements of the
GDPR and protect the rights of Data Subjects (Article 25(1)).
The Controller shall implement appropriate technical and organisa-
tional measures for ensuring that, by default, only personal data which
are necessary for each specific purpose of the processing are processed.
That obligation applies to the amount of data collected, the extent of
their processing, the period of their storage and their accessibility. In
particular, such measures shall ensure that by default personal data are
not made accessible without the individual’s intervention to an indefinite
number of natural persons (Article 23(2)).
An approved certification mechanism pursuant to Article 42 may be
used as an element to demonstrate compliance with the requirements set
out in Article 25(1) and (2) (Article 25(3)).
Note also the EDPB guidance:
●● Guidelines 4/2019 on Article 25 Data Protection by Design and by
Default.
Security Rights
26.68 See above (paras 26.36 and 26.37).
Data Protection Impact Assessment and Prior Consultation
Data Protection Impact Assessment
26.69 Chapter IV, Section 3 of the GDPR refers to Impact Assessments
and Prior Consultations.
Where a type of processing in particular using new technologies,
and taking into account the nature, scope, context and purposes of the
processing, is likely to result in a high risk for the rights and freedoms
of natural persons, the Controller shall, prior to the processing, carry
out an assessment of the impact of the envisaged processing operations
on the protection of personal data. A single assessment may address
a set of similar processing operations that present similar high risks
(Article 35(1)).
420
Main Provisions and Changes of GDPR 26.69
The Controller shall seek the advice of the DPO, where designated,
when carrying out a data protection impact assessment (Article 35(2)).
A data protection impact assessment referred to in Article 35(1) shall
in particular be required in the case of:
●● a systematic and extensive evaluation of personal aspects relating
to natural persons which is based on automated processing, includ-
ing profiling, and on which decisions are based that produce legal
effects concerning the natural person or similarly significantly affect
the natural person;
●● processing on a large scale of special categories of data referred to in
Article 9(1), or of personal data relating to criminal convictions and
offences referred to in Article 10; or
●● a systematic monitoring of a publicly accessible area on a large scale
(Article 35(3)).
The supervisory authority shall establish and make public a list of the
kind of processing operations which are subject to the requirement for a
data protection impact assessment pursuant to Article 35(1). The supervi-
sory authority shall communicate those lists to the EDPB (Article 35(4)).
The supervisory authority may also establish and make public a list
of the kind of processing operations for which no data protection impact
assessment is required. The supervisory authority shall communicate
those lists to the EDPB (Article 35(5)).
Prior to the adoption of the lists referred to in Article 35(4) and (5) the
competent supervisory authority shall apply the consistency mechanism
referred to in Article 63 where such lists involve processing activities
which are related to the offering of goods or services to Data Subjects or
to the monitoring of their behaviour in several states, or may substantially
affect the free movement of personal data within the EU (Article 35(6)).
The assessment shall contain at least:
●● a systematic description of the envisaged processing operations and
the purposes of the processing, including where applicable the legit-
imate interest pursued by the Controller;
●● an assessment of the necessity and proportionality of the processing
operations in relation to the purposes;
●● an assessment of the risks to the rights and freedoms of Data Subjects
referred to in Article 35(1);
●● the measures envisaged to address the risks, including safeguards,
security measures and mechanisms to ensure the protection of per-
sonal data and to demonstrate compliance with the GDPR taking
into account the rights and legitimate interests of Data Subjects and
other persons concerned (Article 35(7)).
421
26.69 New Regime
422
Data Protection Officer 26.73
423
26.74 New Regime
424
Data Protection Officer 26.78
425
26.78 New Regime
426
Data Protection Officer 26.80
427
26.80 New Regime
428
Data Protection Officer 26.84
429
26.84 New Regime
430
Data Protection Officer 26.87
provided that those purposes can be fulfilled in that manner. Where those
purposes can be fulfilled by further processing which does not permit or
no longer permits the identification of Data Subjects these purposes shall
be fulfilled in that manner (Article 89(1)).
Where personal data are processed for scientific and historical research
purposes or statistical purposes, EU or state law may provide for deroga-
tions from the rights referred to in Articles 15, 16, 18 and 21 subject to
the conditions and safeguards referred to in Article 89(1) in so far as such
rights are likely to render impossible or seriously impair the achievement
of the specific purposes, and such derogations are necessary for the ful-
filment of those purposes (Article 89(2)).
Where personal data are processed for archiving purposes in the pub-
lic interest, EU or state law may provide for derogations from the rights
referred to in Articles 15, 16, 18, 19, 20 and 21 subject to the conditions
and safeguards referred to in Article 89(1) in so far as such rights are
likely to render impossible or seriously impair the achievement of the
specific purposes, and such derogations are necessary for the fulfilment
of these purposes (Article 89(3)).
Where processing referred to in Article 89(2) and (3) serves at the
same time another purpose, the derogations shall apply only to process-
ing for the purposes referred to in those paragraphs (Article 89(4)).
Obligations of Secrecy
26.86 States may adopt specific rules to set out the powers by the
supervisory authorities laid down in Article 58(1)(e) and (f) in relation to
Controllers or Processors that are subject, under EU or state law or rules
established by national competent bodies to an obligation of professional
secrecy or other equivalent obligations of secrecy where this is neces-
sary and proportionate to reconcile the right of the protection of personal
data with the obligation of secrecy. Those rules shall only apply with
regard to personal data which the Controller or Processor has received as
a result of, or has obtained in, an activity covered by that obligation of
secrecy (Article 90(1)).
Each state shall notify to the Commission the rules adopted pursuant
to Article 90(1), by 25 May 2018 and without delay, any subsequent
amendment affecting them (Article 90(2)).
New Data Protection Officer Obligation
Introduction
26.87 Now organisations need to have a designated Data Protection
Officer (DPO) to deal with the data protection compliance obligations,
dealing with Data Subject access requests, etc. That is not to say that
431
26.87 New Regime
432
Conclusion 26.92
Conclusion
26.92 All organisations need to become very familiar with the GDPR.
While in some instances the current compliance mechanisms are con-
tinued, there are many new requirements to compliance. Organisations
need to start now in terms of ensuring preparation and compliance.
Indeed, the most prudent organisations will continually be adopting best
433
26.92 New Regime
434
Part 6
Particular Issues
435
436
Chapter 27
Data Breach
Introduction
27.01 Data breach issues are one of the most important and conse-
quential areas of data protection (and security) for organisations to
pay attention to. Given the unfortunate increase in the number of data
breaches, it is inevitable that there will be increasing regulator attention.
The new EU General Data Protection Regulation (GDPR) also increases
data protection security obligations; and the consequence of significant
new fines and penalties where breaches occur.
The new GDPR defines ‘personal data breach’ as a ‘breach of secu-
rity leading to the accidental or unlawful destruction, loss, alteration,
unauthorised disclosure of, or access to, personal data transmitted, stored
or otherwise processed’. The importance attached to dealing with data
breaches and data breach incidents is highlighted in the GDPR. Now
data breaches must be notified to the supervisory authority and the Data
Subjects. (Bear in mind that employees can also be Data Subjects). Data
Subjects can suffer loss and damage if there has been a data breach, and
particularly so if they are unaware of it and are not notified when the
organisation becomes aware in order that, for example, remedial meas-
ures can be undertaken by the Data Subject. For example they may wish
to change passwords or cancel credit cards, depending on the nature of
the breach. Indeed, in some instances organisations may need to recom-
mend remedial or safety measures to Data Subjects after a data breach.
437
27.02 Data Breach
438
Communication of a Data Breach to Data Subject 27.04
Note that there can be data security breach issues which can lead to
data regulator sanction, but separately and in addition, the failure to
notify when required can itself be an instance of breach of the data pro-
tection regime.
1 Note, for example, P Wainman, ‘Data Protection Breaches: Today and Tomorrow,’
SCL Computers and Law, 30 June 2012. Also see M Dekker, Dr, C Christoffer
Karsberg and B Daskala, Cyber Incident Reporting in the EU (2012).
439
27.05 Data Breach
Notification Timelines
27.06 Organisations will need to assess the categories of personal data
they have that may be involved in a data breach. They also need to assess
what type of organisation or sector they are involved in. These factors
may dictate how the data protection regime may impose time limits for
respective notification of breaches. (See Chapter 10).
Notification Processes
27.07 DPOs and organisations need to develop, and update as appro-
priate, breach notification procedures. There needs to be an appropriate
response plan for the different types of breach incidents, ICO, other reg-
ulators if appropriate or required, Data Subjects and other organisations,
whether partners, Processors, outsource security, etc.
Contracts and agreements should also be reviewed to ensure appropri-
ate breach, notification and security provisions.
440
Data Security Standards 27.08
441
27.09 Data Breach
Incident Response
27.09 Some of the incident response and action points include, and not
in order of priority:
●● incident detection and reporting;
●● incident notification to organisation (eg notification or demand from
hacker, posting online, etc);
●● internal notification(s);
●● team notifications;
●● risk assessment;
●● PIAs;
●● disciplinary action;
●● hacker relation action;
●● supervisory authority external breach notification;
●● Data Subject breach notification;
●● customer breach notification.
Conclusion
27.10 Security and data breach issues are significant considerations
for organisations. The new data protection regime re-emphasises this.
Data breach issues should be considered in conjunction with the vari-
ous risk reduction mechanisms referred to under the new GDPR regime,
such as impact assessments, Data Protection by Design and by default,
mandatory breach reporting, mandatory prior consultations with the
supervisory authority in the case of identified high risks, codes of con-
duct and certification mechanisms. The enhanced penalties will also be
applied in the worst breach cases.
442
Chapter 28
Data Protection Impact
Assessment
443
28.02 Data Protection Impact Assessment
444
Data Protection Impact Assessment 28.03
445
28.03 Data Protection Impact Assessment
you start your processing, and run alongside the planning and develop-
ment process.’
It refers to the following steps, namely:
●● identify need for a DPIA;
●● describe the processing;
●● consider consultation;
●● assess necessity and proportionality;
●● identify and assess risks;
●● identify measures to mitigate risk;
●● sign off and record outcomes;
●● integrate outcomes into plan;
●● keep under review.
Reasons for Assessment
28.04 Vodafone refer to the following reasons for assessments:
●● accountability: to demonstrate that the assessment process was
performed appropriately and in accordance with the programme of
assessments agreed with the board sponsor for data protection;
●● provides basis for post implementation review: to ensure any data
protection risks identified are allocated a business owner and a time-
table for delivery mitigation actions, therefore providing the DPO
with a mechanism for ensuring that the agreed actions are delivered
within agreed timescales;
●● provides a basis for audit: Vodafone distinguishes between a review
which is undertaken by the DPO who is responsible for ensuring
it is implemented and the controls required are delivered, and the
audit which is an objective and neutral assessment undertaken by
the group or local audit function or any other suitably qualified audit
function that is not part of delivering the overall Data Protection
Risk Management System;
●● provides corporate memory: ensuring the information gained is
available to those completing new assessments if original staff have
left or use a part of a subsequent assessment of the same business or
commercial unit or activity;
●● enables the experience gained during the project to be shared with
the future assessment teams and others outside the organisation.2
446
Data Protection Impact Assessment 28.06
447
28.06 Data Protection Impact Assessment
448
Data Protection Impact Assessment 28.08
449
28.09 Data Protection Impact Assessment
Prior Consultation
28.09 The Controller shall consult the supervisory authority prior to
processing where a DPIA as provided for in Article 35 indicates that the
processing would result in a high risk in the absence of measures taken
by the Controller to mitigate the risk (Article 36(1)).
Where the supervisory authority is of the opinion that the intended
processing referred to in Article 36(1) would infringe the GDPR, in par-
ticular where the Controller has insufficiently identified or mitigated
the risk, it shall within a period of up to eight weeks of receipt of the
request for consultation, provide written advice to the Controller and,
where applicable the Processor, and may use any of its powers referred
to in Article 53. That period may be extended for a further six weeks,
taking into account the complexity of the intended processing. The
supervisory authority shall inform the Controller and, where applicable,
the Processor, of any such extension within one month of receipt of the
request for consultation together with the reasons for the delay. Those
periods may be suspended until the supervisory authority has obtained
information it may have requested for the purposes of the consultation
(Article 36(2)).
When consulting the supervisory authority pursuant to Article 36(1),
the Controller shall provide the supervisory authority with:
●● where applicable, the respective responsibilities of the Controller,
joint Controllers and Processors involved in the processing, in par-
ticular for processing within a group of undertakings;
●● the purposes and means of the intended processing;
●● the measures and safeguards provided to protect the rights and free-
doms of Data Subjects pursuant to the GDPR;
●● where applicable, the contact details of the DPO;
●● the DPIA provided for in Article 35; and
●● any other information requested by the supervisory authority
(Article 36(3)).
States shall consult the supervisory authority during the preparation of a
proposal for a legislative measure to be adopted by a national parliament,
or of a regulatory measure based on such a legislative measure, which
relates to processing (Article 37(4)).
Notwithstanding Article 36(1), states’ law may require Controllers to
consult with, and obtain prior authorisation from, the supervisory author-
ity in relation to the processing of personal data by a Controller for the
performance of a task carried out by the Controller in the public interest,
including processing in relation to social protection and public health
(Article 36(5)).
450
Conclusion 28.10
Conclusion
28.10 Carrying out impact assessments and the like helps to not
only identify privacy and data protection problems, which can then
be addressed, but also helps to raise these at the earliest stage possi-
ble. Therefore, the least expensive and least problematic time to make
remedial changes is engaged. Carrying out such assessments is now a
requirement under the new GDPR regime. This is especially so for high
risk activities and when sensitive personal data may be involved. These
assessments ensure organisations understand the data they hold, and the
problem issues likely to arise. The organisation, its processes, and the
ultimate customer relationship, will all be improved. Impact assessments
are ultimately one of the mechanisms under the new GDPR for assess-
ing, and thus minimising, risk in the personal data environment.
Organisations must now be proactive and assess when processing
activities are likely to raise risks in relation to personal data and pro-
cessing. The DPO and other relevant parties/teams must be involved.
Assessments must be more systematic. Risk identification and evalua-
tion are now key considerations. Measures to mitigate and address risks
must be considered and documented, including risk assessments. In situ-
ations where there are substantial risk issues, it may be necessary to con-
sult with the ICO.
451
452
Chapter 29
Social Media
Introduction
29.01 New technologies ‘permit easy dissemination and using of
information. Current ICT allows individuals to share [sometimes
unknowingly] their personal preferences and behaviour information on
an unprecedented scale. This could lead to people losing control of per-
sonal information.’1 The internet is an increasing part of our daily lives.
One of its more popular examples is social media. What are the legal
implications of social media?2 One of the most controversial issues in
relation to social media websites is their data processing and respect for
privacy and personal data.3 This is only part of the story. There are many
discrete issues, such as:
●● employers using social networks to vet and screen job applicants;4
●● employers monitoring their employees’ social media;5
1 T Stanimir, ‘Personal Data Protection and the New Technologies,’ Proceedings of the
International Conference on Information Technologies (2011) 333–344.
2 S Nelson, J Simek and J Foltin, ‘The Legal Implications of Social Networking,’
Regent University Law Review, (2009–2010) (22) 1–34. Also, P Viscounty, J Archie,
F Alemi and J Allen, ‘Social Networking and the Law,’ Business Law Today
(2008–009) (58) 18.
3 See, for example, P Roth, ‘Data Protection Meets Web 2.0: Two Ships Passing in the
Night,’ UNSW Law Journal (2010) (33) 532–561. NJ Slabbert, ‘Orwell’s Ghost: How
Teletechnology is Reshaping Civil Society,’ CommLaw Conspectus (2007–2008) (16)
349–359.
4 C Brandenburg, ‘The Newest Way to Screen Job Applicants: A Social Networker’s
Nightmare,’ Federal Communications Law Journal (2007–2008) (60) 597. D Gersen,
‘Your Image, Employers Investigate Job Candidates Online More than Ever. What
can You Do to Protect Yourself?’ Student Law (2007–2008) (36) 24; I Byrnside,
‘Six Degrees of Separation: The Legal Ramifications of Employers Using Social
Networking Sites to Research Applicants,’ Vanderbilt Journal of Entertainment and
Technology Law (2008) (2) 445–477.
5 AR Levinson, ‘Industrial Justice: Privacy Protection for the Employed,’ Cornell
Journal of Law and Public Policy (2009) (18) 609–688.
453
29.01 Social Media
Companies like Facebook exercise massive market power which enables them
to make money by bullying the smaller technology companies and developers
who rely on this platform to reach their customers.
6 M Maher, ‘You’ve Got Messages, Modern Technology Recruiting Through Text Mes-
saging and the Intrusiveness of Facebook,’ Texas Review of Entertainment and Sports
Law (2007) (8) 125–151.
7 Digital, Culture, Media and Sport (DCMS) Committee, ‘Disinformation and “Fake
News”: Final Report’ (18 February 2019). Available at www.parliament.uk/business/
committees/committees-a-z/commons-select/digital-culture-media-and-sport-
committee/news/fake-news-report-published-17-19/.
454
Controllers and Joint Controllers 29.02
These are issues that the major tech companies are well aware of, yet continu-
ally fail to address. The guiding principle of the ‘move fast and break things’
culture often seems to be that it is better to apologise than ask permission.
We need a radical shift in the balance of power between the platforms and the
people. The age of inadequate self regulation must come to an end. The rights
of the citizen need to be established in statute, by requiring the tech companies
to adhere to a code of conduct written into law by Parliament, and overseen by
an independent regulator.
We also have to accept that our electoral regulations are hopelessly out of
date for the internet age. We need reform so that the same principles of trans-
parency of political communications apply online, just as they do in the real
world. More needs to be done to require major donors to clearly establish the
source of their funds.
Much of the evidence we have scrutinised during our inquiry has focused on
the business practices of Facebook; before, during and after the Cambridge
Analytica data breach scandal.
We believe that in its evidence to the Committee Facebook has often deliber-
ately sought to frustrate our work, by giving incomplete, disingenuous and at
times misleading answers to our questions.’8
8 Ibid.
9 Unabhängiges Landeszentrum für Datenschutz Schleswig-Holstein v Wirtschaftsaka-
demie Schleswig-Holstein GmbH, CJEU [2018] Case C-210/16 (5 June 2018).
10 Fashion ID GmbH & Co.KG v Verbraucherzentrale NRW eV, CJEU [2019]
Case C-40/17 (29 July 2019).
455
29.02 Social Media
venture, which as part of its activities also takes direction from each
respective entity. Another scenario might be a lecturer who posts on
Facebook or a blogging website. Perhaps the lecturer, university and the
site are each a Joint Controller.
Investigations
29.03 Social media organisations can be officially investigated and
audited much like any other organisations can. One audit,11 for example,
reviewed certain specific aspects of social media data protection compli-
ance. This arose after a number of complaints regarding specific aspects
of an organisation. The following issues were looked at, namely:
●● privacy policies;
●● advertising;
●● access requests;
●● retention;
●● cookies/social plug-ins;
●● third part apps;
●● disclosures to third parties;
●● facial recognition/tag suggest;
●● data security;
●● deletion of accounts;
●● friend finder;
●● tagging;
●● posting on other profiles;
●● credits;
●● pseudonymous profiles;
●● abuse reporting;
●● compliance management/governance.
That is not to suggest that every potential data protection issue was con-
sidered. It was not. Other issues and complaints can arise in future, as
well as further investigations.12
456
Social Media and Leveson 29.04
457
29.04 Social Media
actions, but which may be complicated by the act that the company has
sought to close down. Facebook was fined £500,000 by the ICO regard-
ing Cambridge Analytica issues.
Awareness
29.07 Increasingly potential employers, schools and universities use
social media profile information in making assessments on applications
regarding specific individuals. Unfortunately, one of the issues relates
to the consequence of this for individuals, sometimes adverse conse-
quences.16 In addition, many users, and particularly those of a younger
15 See, for example, Y Hashemi, ‘Facebook’s Privacy Policy and its Third-Party Part-
nerships: Lucrativity and Liability,’ BUJ Science & Technology Law (2009) (15)
140–161.
16 See discussion at L Edwards and C Waelde, eds, above, 481.
458
Tagging and Identification 29.08
age, will not (fully) appreciate that such activities and consequences can
arise from their social media.
There is arguably more to be done by social networks in terms of
informing and appraising users of the issues which can arise. This is par-
ticularly emphasised when children and teenagers are concerned.
WP29 in its Opinion regarding social media, recognises the dan-
gers arising from apps.17 Compliance with EU General Data Protection
Regulation (GDPR) must be ensured. There is also a UK Home Office
Good Practice Guidance for the Providers of Social Networks.18
Arguably, these could be updated. This is an area where significant ongo-
ing research is needed.
In addition, it should be noted that social media companies have also
recognised that their own awareness and preparedness needs to increased
following the revelations surrounding the attack on the US election of
2016; and the ongoing Cambridge Analytica developments. The ICO is
also investigating the latter and will no doubt issue findings and a report
in due course. It cannot be ruled out at this remove as to whether the
ICO may find sufficient evidence to mount prosecutions in relation to
offences committed.
459
29.09 Social Media
Abuse, Attacks,Threats,Trolling,Victims
29.10 It is clear that these problem issues are significant and appear
to be increasing. Pierre Trudel, for example, notes that the risks to indi-
viduals increase from many online activities, including in relation to data
protection, safety, etc.21
Popular social media websites, such as Twitter, Reddit and now
Facebook, are recognising that more needs to be done to address issues
of online abuse and will progress changes to assist in dealing with the
problem.
The Olympics in London brought to the fore the disadvantages of
social media, where social networks such as Twitter, Facebook, etc,
can be used for abuse.22 There is a growing and troubling number of
19 L Edwards and C Waelde, eds, Law and the Internet (Hart, 2009) 483.
20 In 2008. At https://www.gov.uk/government/uploads/system/uploads/attachment_data/
file/251456/industry_guidance_social_networking.pdf.
21 P Trudel, ‘Privacy Protection on the Internet: Risk Management and Networked Nor-
mativity,’ in S Gutwirth, Y Poullet, P de Hert, C de Terwange and S Nouwt, Reinvent-
ing Data Protection? (Springer, 2009) 317.
22 J Rosenberg, ‘Tom Daley, Twitter Abuse and the Law,’ Guardian, 31 July 2012;
S James, ‘Man Cautioned After Mark Halsey Twitter Abuse,’ Guardian, 27 S eptember
460
Abuse, Attacks, Threats, Trolling,Victims 29.10
461
29.10 Social Media
available which they use for certain activities, but are reluctant to extend
to abuse victims.
But no matter how many ‘report buttons’ there are on a given web-
site, they are entirely useless without protocols, policies and procedures
behind the scenes to follow through on reports that are made. A com-
plaints procedure is meaningless unless there are enough people investi-
gating abuse reports.
It would be interesting to examine and compare the number of peo-
ple employed in abuse investigation teams across various social media
websites. Should there be a minimum number of employees assigned
per number of users of a social media website? Or should there be a
minimum number of employees per amount of abuse reports made? The
turnover of such websites could easily absorb hiring more staff.
A further point arises regarding social media and related websites.
Some are happy to publish statistics about the level of reports and com-
plaints received relating to copyright infringement. This appears com-
mercially driven. There is significantly less ‘transparency’ as regards the
level of abuse reports and complaints made to social media websites, and
around how, and how quickly, these abuse reports are resolved.
As much as we are presently shocked by the dark side of internet abuse,
cyberbullying and the terrible consequences, it may be that we would be
further shocked at the scale of abuse being reported, when the facility is
available to do so. That may be a useful line of pursuit for anyone who is
officially concerned about this issue. It is also worth considering that what-
ever a website may say at first blush may not always be the whole picture.
We are now beginning to realise that, on occasion, social media and
other websites can have a dark side.
Unfortunately, there are large gaps in our knowledge, research and
understanding of these developing issues. More research is needed to
appraise ourselves of all potential solutions and policy decisions as well
as assisting websites to fully engage their own (corporate, moral and
legal) responsibilities and functional capabilities.
There are also business case advantages. The EU Commission and
websites have recently developed a code of conduct initiative for online
hate takedowns.
25 A Blank, ‘On the Precipe of e-Discovery: Can Litigants Obtain Employee Social
Networking Web Site Information Through Employers?’ CommLaw Conspectus
462
Electronic Evidence 29.12
Electronic Evidence
29.12 There are growing digital evidence opportunities for litiga-
tion, which can include personal data.27 These can include service of
documents28 and civil discovery.29 Social media have been described as
electronic footprints.30 This can also include employees’ social media
activity.31
(2009–2010) (18) 487–516. Also, I Byrnside, ‘Six Clicks of Separation: The Legal
Ramifications of Employers using Social Networking Sites to Research Applicants,’
Vanderbilt Journal of Entertainment and Technology Law (2008) (10) 445–477.
26 See also M Maher, ‘You’ve Got Messages: Modern technology Recruiting Through
Text-Messaging and the Intrusiveness of Facebook,’ Texas Review of Entertainment
& Sports Law, (2007) (8) 125–151; C Brandenburg, ‘The Newest Way to Screen Job
Applicants: A Social Networker’s Nightmare,’ Federal Communications Law Journal
(2007–2008) (60) 597–626.
27 K Minotti, ‘The Advent of Digital Diaries: Implications of Social Networking Web
Sites for the Legal Profession,’ South Carolina Law Review (2009) (60) 1057–1074;
JS Wilson, ‘MySpace, Your Space or Our Space? New Frontiers in Electronic Evi-
dence,’ Oregon Law Review (2007) (86) 1201–1240; AC Payne, ‘Twitigation: Old
Rules in a New World,’ Washburn Law Journal (2010) (49) 842–870.
28 AL Shultz, AL, ‘Superpoked and Served: Service of Process via Social Networking
Sites,’ 43 University Richmond Law Review (2008–2009) (43) 1497–1528. RJ Hedges,
Rashbaum and AC Losey, ‘Electronic Service of Process at Home and Abroad: Allow-
ing Domestic Electronic Service of Process in Federal Courts,’ Federal Courts Law
Review (2010) (4) 54–76.
29 SC Bennett, ‘Civil Discovery of Social Networking Information,’ Southwestern Law
Review (2009–2010) (39) 413–431. Also, DS Witte, ‘Your Opponent Does Not Need
a Friend Request to See Your Page: Social Networking Sites and Electronic Discov-
ery,’ McGeorge Law Review (2009–2010) (41) 891–903; RA Ward, ‘Discovering
Facebook: Social Network Subpoenas and the Stored Communications Act,’ Harvard
Journal of Law & Technology (2011) (24) 563–588.
30 EM Marsico, Jr, ‘Social Networking Websites: Are Myspace and Facebook the Finger-
prints of the Twenty-first Century?’ Widener Law Journal (2010) (19) 967–976. Also,
EE North, ‘Facebook Isn’t Your Space Anymore: Discovery of Social Networking Web-
site,’ University of Kansa Law Review (2009–2010) (58) 1279–1309; TM Williams,
‘Facebook: Ethics, Traps, and Reminders,’ Litigation News (2009–2010) (35) 4.
31 For example, see, L Thomas, ‘Social Networking in the Workplace: Are Private
Employers Prepared to Comply With Discovery Requests for Posts and Tweets?’ SMU
Law Review (2010) (63) 1373–1402.
463
29.13 Social Media
32 L Costa and Y Poullet, ‘Privacy and the Regulation of 2012,’ Computer Law & Secu-
rity Review (2012) (28) 254–262, at 256.
33 See above.
464
Consent and Social Media 29.14
34 L Edwards and C Waelde, eds, Law and the Internet (Hart, 2009) 479.
35 See above.
36 See above.
37 See above.
465
29.14 Social Media
466
Consent and Social Media 29.14
of Minors Follows Online Interaction,’ Villanova Sports and Entertainment Law Jour-
nal (2007) (14) 363–397; DC Beckstrom, ‘Who’s Looking at Your Facebook Pro-
file? The Use of Student Conduct Codes to Censor College Students’ Online Speech,’
Willamette Law Review (2008) 261–312.
42 See, for example, L McDermott, ‘Legal Issues Associated with Minors and Their Use
of Social Networking Sites,’ Communications Law (2012) (17) 19–24.
43 Federation of German Consumer Organisations (VZBV) v Facebook, German Federal
Court of Justice, 14 January 2016.
467
29.14 Social Media
44 Directive 2000/31/EC of the European Parliament and of the Council of 8 June 2000
on certain legal aspects of information society services, in particular electronic com-
merce, in the Internal Market (‘Directive on electronic commerce’).
468
Rights 29.19
guarantees to ensure that the rights and obligations provided for in this
Directive are respected in practice.
Rights
Right to Prevent Data Processing Likely to Cause Damage
or Distress
29.18 Data Subjects have a right to prevent processing likely to cause
damage or distress. This can also be considered relevant to social media.
Right to Prevent Data Processing for DM
29.19 Data Subjects have the right to prevent processing for purposes
of direct marketing. This can also be considered relevant to social media.
469
29.20 Social Media
GDPR
Definitions and Social Media
29.23 The GDPR is relevant to social media. The GDPR definitions
include:
‘personal data means a breach of security leading to the accidental
breach’ or unlawful destruction, loss, alteration, unauthorised
disclosure of, or access to, personal data transmitted, stored
or otherwise processed;
‘main means:
establishment’ ●● as regards a Controller with establishments in more
than one Member State, the place of its central
administration in the EU, unless the decisions on
the purposes and means of the processing of per-
sonal data are taken in another establishment of the
Controller in the EU and the latter establishment
has the power to have such decisions implemented,
in which case the establishment having taken
such decisions is to be considered to be the main
establishment;
470
GDPR 29.25
45 See, for example, Norberto Nuno Gomes de Ardrade, ‘Regulating Electronic Identity
in the European Union: An Analysis of the Lisbon Treaty’s Competences and Legal
Basis for eID,’ Computer Law and Security Review (2012) (28) 153–162, at 153.
European Commission, Communication from the Commission – a Digital Agenda for
Europe (Brussels: European Commission 2010) 11.
471
29.25 Social Media
The Controller shall facilitate the exercise of Data Subject rights under
Articles 15–22. In cases referred to in Article 11(2), the Controller shall
not refuse to act on the request of the Data Subject for exercising their
rights under Articles 15–22, unless the Controller demonstrates that it is
not in a position to identify the Data Subject (Article 12(2)).
The Controller shall provide information on action taken on a request
under Articles 15–22 to the Data Subject without undue delay and in any
event within one month of receipt of the request. This period may be
extended by two further months where necessary, taking into account the
complexity of the request and the number of the requests. The Controller
shall inform the Data Subject of any extensions within one month of
receipt of the request, together with the reasons for the delay. Where the
Data Subject makes the request in electronic form means, the informa-
tion shall be provided in electronic form where possible, unless other-
wise requested by the Data Subject (Article 12(3)).
If the Controller does not take action on the request of the Data
Subject, the Controller shall inform the Data Subject without delay and
at the latest within one month of receipt of the request of the reasons for
not taking action and on the possibility of lodging a complaint to a super-
visory authority and seeking a judicial remedy (Article 12(4)).
Information provided under Articles 13 and 14 and any communica-
tion and any actions taken under Articles 15–22 and 34 shall be pro-
vided free of charge. Where requests from a Data Subject are manifestly
unfounded or excessive, in particular because of their repetitive charac-
ter, the Controller may either charge a reasonable fee taking into account
the administrative costs of providing the information or communication
or taking the action requested; or, refuse to act on the request. In these
cases, the Controller shall bear the burden of demonstrating the mani-
festly unfounded or excessive character of the request (Article 12(5)).
Without prejudice to Article 11, where the Controller has reasonable
doubts concerning the identity of the individual making the request
referred to in Articles 15–21, the Controller may request the provision
of additional information necessary to confirm the identity of the Data
Subject (Article 12(6)).
The information to be provided to Data Subjects pursuant to Articles 13
and 14 may be provided in combination with standardised icons in order
to give in an easily visible, intelligible and clearly legible manner a
meaningful overview of the intended processing. Where the icons are
presented electronically they shall be machine-readable (Article 12(7)).
The Commission shall be empowered to adopt delegated acts in
accordance with Article 92 for the purpose of determining the informa-
tion to be presented by the icons and the procedures for providing stand-
ardised icons (Article 12(8)).
472
GDPR 29.28
473
29.28 Social Media
474
GDPR 29.29
data have not been obtained from the Data Subject, the Controller shall
provide the Data Subject with the following information:
●● the identity and the contact details of the Controller and, where
applicable, of the Controller’s representative;
●● the contact details of the DPO, where applicable;
●● the purposes of the processing for which the personal data are
intended as well as the legal basis of the processing;
●● the categories of personal data concerned;
●● the recipients or categories of recipients of the personal data, if any;
●● where applicable, that the Controller intends to transfer personal data
to a recipient in a third country or international organisation and the
existence or absence of an adequacy decision by the Commission,
or in case of transfers referred to in Article 46 or 47, or the second
subparagraph of Article 49(1), reference to the appropriate or suit-
able safeguards and the means to obtain a copy of them or where
they have been made available (Article 14(1)).
In addition to the information referred to in Article 14(1), the Controller
shall provide the Data Subject with the following information necessary
to ensure fair and transparent processing in respect of the Data Subject:
●● the period for which the personal data will be stored, or if this is not
possible, the criteria used to determine that period;
●● where the processing is based on Article 6(1)(f), the legitimate inter-
ests pursued by the Controller or by a third party;
●● the existence of the right to request from the Controller access to and
rectification or erasure of the personal data or restriction of process-
ing of data concerning the Data Subject and to object to the process-
ing as well as the right to data portability;
●● where processing is based on Article 6(1)(a) or Article 9(2)(a), the
existence of the right to withdraw consent at any time, without
affecting the lawfulness of processing based on consent before its
withdrawal;
●● the right to lodge a complaint to a supervisory authority;
●● from which source the personal data originate, and if applicable,
whether it came from publicly accessible sources;
●● the existence of automated decision making including profiling
referred to in Article 22(1) and (4) and at least in those cases, mean-
ingful information about the logic involved, as well as the signifi-
cance and the envisaged consequences of such processing for the
Data Subject (Article 14(2)).
475
29.29 Social Media
476
GDPR 29.31
477
29.31 Social Media
478
GDPR 29.34
Article 17(1) and (2) shall not apply to the extent that processing is
necessary:
●● for exercising the right of freedom of expression and information;
●● for compliance with a legal obligation which requires processing of
personal data by EU or state law to which the Controller is subject or
for the performance of a task carried out in the public interest or in
the exercise of official authority vested in the Controller;
●● for reasons of public interest in the area of public health in accord-
ance with Article 9(2)(h) and (i) as well as Article 9(3);
●● for archiving purposes in the public interest, scientific or histori-
cal research purposes or statistical purposes in accordance with
Article 89(1) in so far as the right referred to in Article 17(1) is
likely to render impossible or seriously impair the achievement of
the objectives of that processing; or
●● for the establishment, exercise or defence of legal claims
(Article 17(3)).
Right to Restriction of Processing
29.34 Article 18 refers to the right to restriction of processing. The
Data Subject shall have the right to obtain from the Controller the restric-
tion of the processing where one of the following applies:
●● the accuracy of the data is contested by the Data Subject, for a period
enabling the Controller to verify the accuracy of the data;
●● the processing is unlawful and the Data Subject opposes the erasure
of the personal data and requests the restriction of their use instead;
●● the Controller no longer needs the personal data for the purposes
of the processing, but they are required by the Data Subject for the
establishment, exercise or defence of legal claims;
●● the Data Subject has objected to processing pursuant to Article 21(1)
pending the verification whether the legitimate grounds of the
Controller override those of the Data Subject (Article 18(1)).
Where processing has been restricted under Article 18(1), such personal
data shall, with the exception of storage, only be processed with the Data
Subject’s consent or for the establishment, exercise or defence of legal
claims or for the protection of the rights of another natural or legal per-
son or for reasons of important public interest of the EU or of a state
(Article 18(2)).
A Data Subject who obtained the restriction of processing pursuant to
Article 18(1) shall be informed by the Controller before the restriction of
processing is lifted (Article 18(3)).
479
29.35 Social Media
480
GDPR 29.39
46 Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002
concerning the processing of personal data and the protection of privacy in the elec-
tronic communications sector (Directive on privacy and electronic communications).
481
29.39 Social Media
freedoms and legitimate interests, at least the right to obtain human inter-
vention on the part of the Controller, to express his or her point of view
and to contest the decision (Article 22(3)).
Decisions referred to in Article 22(4) shall not be based on spe-
cial categories of personal data referred to in Article 9(1), unless
Article 9(2)(a) or (g) applies and suitable measures to safeguard the
Data Subject’s rights and freedoms and legitimate interests are in place
(Article 22(4)).
Communicating Data Breach to Data Subject
29.40 When a personal data breach is likely to result in a high risk to
the rights and freedoms of natural persons, the Controller shall commu-
nicate the personal data breach to the Data Subject without undue delay
(Article 34(1)).
The communication to the Data Subject shall describe in clear and
plain language the nature of the personal data breach and contain at least
the information referred to in Article 33(3)(b), (c) and (d) (Article 34(2)).
The communication to the Data Subject shall not be required if:
●● the Controller has implemented appropriate technical and organi-
sational protection measures, and those measures were applied to
the personal data affected by the personal data breach, in particular
those that render the personal data unintelligible to any person who
is not authorised to access it, such as encryption;
●● the Controller has taken subsequent measures which ensure that the
high risk for the rights and freedoms of Data Subjects referred to in
Article 34(1) is no longer likely to materialise;
●● it would involve disproportionate effort. In such cases, there shall
instead be a public communication or similar measure whereby
the Data Subjects are informed in an equally effective manner
(Article 34(3)).
If the Controller has not already communicated the personal data breach
to the Data Subject, the supervisory authority, having considered the
likelihood of the breach to result in a high risk, may require it to do so
or may decide that any of the conditions referred to in Article 34(3) are
met (Article 34(4)).
Security of Processing
29.41 Taking into account the state of the art, the costs of implementa-
tion and the nature, scope, context and purposes of the processing as well
as the risk of varying likelihood and severity for the rights and freedoms
of natural persons, the Controller and the Processor shall implement
482
GDPR 29.42
483
29.42 Social Media
484
GDPR 29.43
485
29.44 Social Media
Prior Consultation
29.44 The Controller shall consult the supervisory authority prior to
the processing where a data protection impact assessment as provided
for in Article 35 indicates that the processing would result in a high risk
in the absence of measures taken by the Controller to mitigate the risk
(Article 36(1)).
Where the supervisory authority is of the opinion that the intended
processing referred to in Article 36(1) would infringe the GDPR, in par-
ticular where the Controller has insufficiently identified or mitigated
the risk, it shall within a maximum period of eight weeks following the
request for consultation give written advice to the Controller and, where
applicable the Processor, and may use any of its powers referred to in
Article 58. This period may be extended by six weeks, taking into account
the complexity of the intended processing. The supervisory authority
shall inform the Controller and, where applicable, the Processor, of any
such extension within one month of receipt of the request for consulta-
tion together with the reasons for the delay. These periods may be sus-
pended until the supervisory authority has obtained any information it
has requested for the purposes of the consultation (Article 36(2)).
When consulting the supervisory authority pursuant to Article 36(1),
the Controller shall provide the supervisory authority with:
●● where applicable, the respective responsibilities of Controller, joint
Controllers and Processors involved in the processing, in particular
for processing within a group of undertakings;
●● the purposes and means of the intended processing;
●● the measures and safeguards provided to protect the rights and free-
doms of Data Subjects pursuant to the GDPR;
●● where applicable, the contact details of the DPO;
●● the data protection impact assessment provided for in Article 35; and
●● any other information requested by the supervisory authority
(Article 36(3)).
States shall consult the supervisory authority during the preparation of a
proposal for a legislative measure to be adopted by a national parliament,
or of a regulatory measure based on such a legislative measure, which
relates to the processing (Article 36(4)).
Notwithstanding Article 36(1), states’ law may require Controllers to
consult with, and obtain prior authorisation from, the supervisory author-
ity in relation to the processing by a Controller for the performance of
a task carried out by the Controller in the public interest, including pro-
cessing in relation to social protection and public health (Article 36(5)).
486
Chapter 30
Leveson, the Press and Data
Protection
Introduction
30.01 The UK Leveson Report deals with (certain) data protection
issues in detail, namely the recommendations relating to data protec-
tion and journalism. The evidence and issues are more fully described in
Part H, 5 of the Report.
DPA 1998, s 32
30.02 The Data Protection Act 1998 (DPA 1998) s 32 referring to jour-
nalism activities, provided:
‘(1) Personal data which are processed only for the special purposes are
exempt from any provision to which this subsection relates if—
(a) the processing is undertaken with a view to the publication by any
person of any journalistic, literary or artistic material,
(b) the data Controller reasonably believes that, having regard in par-
ticular to the special importance of the public interest in freedom of
expression, publication would be in the public interest, and
(c) the data controller reasonably believes that, in all the circum-
stances, compliance with that provision is incompatible with the
special purposes.
(2) Subsection (1) relates to the provisions of—
(a) the data protection principles except the seventh data protection
principle,
(b) section 7,
(c) section 10,
(d) section 12, and
(e) section 14(1) to (3).
487
30.02 Leveson, the Press and Data Protection
(3) In considering for the purposes of subsection (1)(b) whether the belief
of a data Controller that publication would be in the public interest was or
is a reasonable one, regard may be had to his compliance with any code of
practice which—
(a) is relevant to the publication in question, and
(b) is designated by the [Secretary of State] by order for the purposes
of this subsection.
(4) Where at any time (‘the relevant time’) in any proceedings against a data
Controller under section 7(9), 10(4), 12(8) or 14 or by virtue of section 13
the data Controller claims, or it appears to the court, that any personal data to
which the proceedings relate are being processed—
(a) only for the special purposes, and
(b) with a view to the publication by any person of any journalistic,
literary or artistic material which, at the time twenty-four hours
immediately before the relevant time, had not previously been pub-
lished by the data Controller,
the court shall stay the proceedings until either of the conditions in
subsection (5) is met.
(5) Those conditions are—
(a) that a determination of the Commissioner under section 45 with
respect to the data in question takes effect, or
(b) in a case where the proceedings were stayed on the making of a
claim, that the claim is withdrawn.
(6) For the purposes of this Act ‘publish’, in relation to journalistic, literary
or artistic material, means make available to the public or any section of the
public.’
Lord Lester of Herne Hill is referred to in the Report (p 1067) as having
‘warned at length that, as drafted and because of cl 31, the DPA failed
to implement the Directive and authorised interference by the press with
the right to privacy in breach of Art 8 of the ECHR.’
At page 1068 of the Report, it refers to:
‘Mr Coppel’s arguments … would be that on the current state of the UK
authorities, s 32 fails to implement the Directive from which it derives, and
is inconsistent with the relevant parts of the ECHR to which it is intended to
give effect, because the relationship between privacy and expression rights
has got out of balance. A proper balance is a fundamental obligation. The UK
is therefore positively required to change the law to restore the balance. That
is indeed Mr Coppel’s own contention: that UK data protection law currently
fails to implement our obligations, and that Lord Lester’s concerns had proved
to be prescient.’
488
Leveson Recommendations 30.03
2.12 Put at its very lowest, the point could be made that the effect of the
development of the case law has been to push personal privacy law in media
cases out of the data protection regime and into the more open seas of the
Human Rights Act. This has happened for no better reason than the slowness
of the legal profession to assimilate data protection law and, in the case of
the judiciary, its greater familiarity with (and, he suggests, perhaps a prefer-
ence for) the latitude afforded by the human rights regime over the specificity
of data protection. But this, the argument goes, is undesirable because the
data protection regime is much more predictable, detailed and sophisticated
in the way it protects and balances rights, and significantly reduces the risks,
uncertainties and expense of litigation concomitant on more open-textured
law dependent on a court’s discretion. Where the law has provided specific
answers, the fine-nibbed pen should be grasped and not the broad brush. The
balancing of competing rights in a free democracy is a highly sophisticated
exercise; appropriate tools have been provided for the job and should be used.’
Leveson Recommendations
To the Ministry of Justice
30.03 The Leveson Report makes the following recommendations,
namely:
‘48. The exemption in section 32 of the Data Protection Act 1998 should
be amended so as to make it available only where: 49 (a) the processing of
data is necessary for publication, rather than simply being in fact undertaken
with a view to publication; (b) the data Controller reasonably believes that
the relevant publication would be or is in the public interest, with no special
weighting of the balance between the public interest in freedom of expression
and in privacy; and (c) objectively, that the likely interference with privacy
resulting from the processing of the data is outweighed by the public interest
in publication.
49. The exemption in section 32 of the Data Protection Act 1998 should
be narrowed in scope, so that it no longer allows, by itself, for exemption
from: 50 (a) the requirement of the first data protection principle to process
personal data fairly (except in relation to the provision of information to the
Data Subject under paragraph 2(1)(a) of Part II Schedule 1 to the 1998 Act)
and in accordance with statute law; (b) the second data protection principle
(personal data to be obtained only for specific purposes and not processed
incompatibly with those purposes); (c) the fourth data protection principle
(personal data to be accurate and kept up to date); (d) the sixth data protec-
tion principle (personal data to be processed in accordance with the rights of
489
30.03 Leveson, the Press and Data Protection
individuals under the Act); (e) the eighth data protection principle (restrictions
on exporting personal data); and (f) the right of subject access. The recom-
mendation on the removal of the right of subject access from the scope of
section 32 is subject to any necessary clarification that the law relating to the
protection of journalists’ sources is not affected by the Act.
50. It should be made clear that the right to compensation for distress con-
ferred by section 13 of the Data Protection Act 1998 is not restricted to cases
of pecuniary loss, but should include compensation for pure distress.
51. The procedural provisions of the Data Protection Act 1998 with special
application to journalism in: (a) section 32(4) and (5) (b) sections 44 to 46
inclusive should be repealed.
53. Specific provision should be made to the effect that, in considering the
exercise of any of its powers in relation to the media or other publishers, the
Information Commissioner’s Office must have regard to the application to a
data Controller of any relevant system of regulation or standards enforcement
which is contained in or recognised by statute.
54. The necessary steps should be taken to bring into force the amendments
made to section 55 of the Data Protection Act 1998 by section 77 of the Crimi-
nal Justice and Immigration Act 2008 (increase of sentence maxima) to the
extent of the maximum specified period; and by section 78 of the 2008 Act
(enhanced defence for public interest journalism).
56. A new duty should be introduced (whether formal or informal) for the
Information Commissioner’s Office to consult with the Crown Prosecu-
tion Service in relation to the exercise of its powers to undertake criminal
proceedings.
57. The opportunity should be taken to consider amending the Data Protection
Act 1998 formally to reconstitute the Information Commissioner’s Office as
an Information Commission, led by a Board of Commissioners with suitable
expertise drawn from the worlds of regulation, public administration, law and
business, and active consideration should be given in that context to the desir-
ability of including on the Board a Commissioner from the media sector.’
490
Leveson Recommendations 30.04
To the ICO
30.04 The Leveson Report also makes recommendation to the ICO.
These are:
‘58. The Information Commissioner’s Office should take immediate steps to
prepare, adopt and publish a policy on the exercise of its formal regulatory
functions in order to ensure that the press complies with the legal require-
ments of the data protection regime.
59. In discharge of its functions and duties to promote good practice in areas
of public concern, the Information Commissioner’s Office should take imme-
diate steps, in consultation with the industry, to prepare and issue compre-
hensive good practice guidelines and advice on appropriate principles and
standards to be observed by the press in the processing of personal data. This
should be prepared and implemented within six months from the date of this
Report.
60. The Information Commissioner’s Office should take steps to prepare and
issue guidance to the public on their individual rights in relation to the obtain-
ing and use by the press of their personal data, and how to exercise those
rights.
491
30.04 Leveson, the Press and Data Protection
68. The Secretary of State for Justice should use the power vested in him by
s 124(1)(a)(i) of the Coroners and Justice Act 2009 to invite the Sentencing
Council of England and Wales to prepare guidelines in relation to data protec-
tion offences (including computer misuse).’
Comparison
30.06 A comparison of the DPA 1998 and the Leveson comments is
set out below.
DPA 1998 (s 32) Leveson
(1) Personal data which are processed 48 The exemption in s 32 of the Data
only for the special purposes are Protection Act 1998 should be
exempt from any provision to which amended so as to make it available
this subsection relates if— only where:(a) the processing of data
(a) the processing is undertaken is necessary for publication, rather
with a view to the publication than simply being in fact undertaken
by any person of any with a view to publication; (b) the
journalistic, literary or artistic data Controller reasonably believes
material, that the relevant publication would
(b) the data Controller reasonably be or is in the public interest,
believes that, having regard with no special weighting of the
in particular to the special balance between the public interest
importance of the public in freedom of expression and in
interest in freedom of privacy; and (c) objectively, that
expression, publication would the likely interference with privacy
be in the public interest, and resulting from the processing of the
data is outweighed by the public
interest in publication.
492
Comparison 30.06
493
30.06 Leveson, the Press and Data Protection
Conclusion
30.07 The Data Protection Act 2018 (DPA 2018), s 177 makes provi-
sion for the ICO to produce guidance in relation to the steps needed
in seeking redress in relation to media organisations. In addition, DPA
2018, s 179 states that the Secretary of State issue reports on the effec-
tiveness of media related dispute resolution procedures. Schedule 17 also
refers to reviews of processing of personal data for journalism purposes.
494
Chapter 31
Data Protection Officer
Introduction
31.01 Organisations are now required to have a Data Protection
Officer (DPO). In addition, the role and task requirements are now
more explicit. The DPO must also have an appropriate independence
in their activities and cannot be compromised or dictated to in a manner
which undermines their role and duties in relation to personal data. It is
now clear that the profession of the independent and expert DPO has
arrived.
495
31.03 Data Protection Officer
496
Tasks and Role 31.08
Group DPO
31.04 A group of undertakings may appoint a single DPO provided
that a DPO is easily accessible from each establishment (Article 37(2)).
Where the Controller or the Processor is a public authority or body,
a single DPO may be designated for several such authorities or bodies,
taking account of their organisational structure and size (Article 37(3)).
In cases other than those referred to in Article 37(1), the Controller
or Processor or associations and other bodies representing categories of
Controllers or Processors may or, where required by EU or state law
shall, designate a DPO. The DPO may act for such associations and other
bodies representing Controllers or Processors (Article 37(4)).
Qualifications and Expertise of DPO
31.05 The DPO shall be designated on the basis of professional
qualities and, in particular, expert knowledge of data protection law
and practices and the ability to fulfil the tasks referred to in Article 39
(Article 37(5)).
The DPO may be a staff member of the Controller or Processor, or
fulfil the tasks on the basis of a service contract (Article 37(6)).
Contact Details
31.06 The Controller or the Processor shall publish the contact
details of the DPO and communicate these to the supervisory authority
(Article 37(7)).
Data Subjects may contact the DPO on all issues related to the pro-
cessing of the Data Subject’s personal data and the exercise of their
rights under the GDPR (Article 38(4)).
Reporting
31.07 The DPO shall directly report to the highest management level
of the Controller or the Processor (Article 38(3)).
Independent in Role and Tasks
31.08 The Controller or Processor shall ensure that the DPO does not
receive any instructions regarding the exercise of their tasks. He or she
shall not be dismissed or penalised by the Controller or the Processor for
performing their tasks (Article 38(3)).
497
31.09 Data Protection Officer
Resources
31.09 The Controller or Processor shall support the DPO in perform-
ing the tasks referred to in Article 39 by providing resources necessary
to carry out those tasks and access to personal data and processing opera-
tions, and to maintain his or her expert knowledge (Article 38(2)).
Summary
31.10 In summary, organisations must designate a DPO to:
●● monitor internal compliance with the GDPR regime and rules;
●● ensure governance of the organisation’s data management;
●● draft and update compliant data protection policies;
●● implement systems, changes and functions in terms of being
compliant.
The DPO should be qualified and have particular expertise in data pro-
tection law and practice. They need to be able to fulfil their tasks in
compliance and conformity with the GDPR. It appears they may be an
employee or a contractor.
The DPO details must be made available publicly and the supervisory
authority (such as the ICO) should be notified.
The organisation must involve the DPO in a timely manner in relation
to all issues in relation to the protection of personal data and Data Sub-
ject issues. Proper and adequate resources must be supplied to the DPO
by the organisation in order that they can undertake their tasks. There is
an obligation that the DPO has independence in their role and functions,
and that they cannot be controlled or micromanaged or instructed in rela-
tion to their tasks.
The DPO will report to the Board or highest management level as
appropriate. This also emphasises the increasing importance attached to
data protection understanding and compliance.
The DPO advises the organisation and employees in relation to their
data protection obligations under national law and the GDPR. They will
also monitor compliance with the data protection legal regime as well as
internal policies. They will also be involved in assigning responsibilities,
raising awareness and staff education and training.
DPOs should be highlighting the changes and the new GDPR to the
organisation. Key issues need to be identified to appropriate manage-
ment. New and ongoing change and compliance issues need appropriate
resourcing. The DPO should assess what personal data the organisation
collects and processes, for what purpose, and where it is located and
secured. Particular attention is needed with regard to outsourcing issues
498
Summary 31.10
1 Paul Lambert, The Data Protection Officer, Profession, Rules and Role (Routledge,
Taylor & Francis, 2017).
2 ICO, ‘Data Protection Officers,’ at https://ico.org.uk/for-organisations/guide-to-data-
protection/guide-to-the-general-data-protection-regulation-gdpr/accountability-
and-governance/data-protection-officers/.
499
500
Chapter 32
Brexit, Privacy Shield and
Schrems
Introduction
32.1 The recent Schrems PRISM case1 (Schrems II) is important to
consider. This is a request for a preliminary ruling under Article 267
TFEU from the High Court (in Ireland) in proceedings before it involv-
ing privacy campaigner Max Schrems, Facebook and the Irish Data Pro-
tection Commission. A range of other interested parties, including the
US Government, EU national states, and other privacy, data protection
and industry parties, have also made submissions.
Maximilian Schrems, in what was an evolving complaint, effectively
sought to have the local data regulator (now the Data Protection Com-
mission) impose a ban or restriction on the EU Facebook entity, based
on Ireland, transferring the personal data of EU citizens to the US
Facebook entity because such data may become subject to access by
(certain) EU investigative agencies, in particular the CIA and FBI. The
case refers in particular to US surveillance known as signals intelli-
gence provisions under the Foreign Intelligence Surveillance Act (FISA)
(specifically section 702) and a particular Executive Order (also known
as a Presidential Directive) (EO 12333).
From one perspective the case can be seen as a data retention-type case
as opposed to a core (commercial) data protection case. (As indicated
earlier, data retention often proves to be controversial and is sometimes
501
32.1 Brexit, Privacy Shield and Schrems
2 The earlier Data Retention Directive, for example, was declared invalid in the Digital
Rights Ireland case: Case C-293/12.
3 In fact, and technically speaking, there are two such standard contract mechanisms.
One refers to data transfers from a Controller to a Controller, and the other refers to
data transfers from a Controller to a Processor. While only one of the SCC mecha-
nisms is the focus in this case, there is growing commentary that the same principles
elucidated in the case should apply to both mechanisms.
4 See the interpretation and validity of Commission Decision 2010/87/EU of 5 February
2010 on standard contractual clauses for the transfer of personal data to processors
established in third countries under Directive 95/46 (OJ 2010 L 39, p 5), as amended
by Commission Implementing Decision (EU) 2016/2297 of 16 December 2016
(OJ 2016 L 344, p 100). This is the Commission Decision 2010/87.
502
Issues and Questions 32.2
503
32.2 Brexit, Privacy Shield and Schrems
505
32.2 Brexit, Privacy Shield and Schrems
(Q10) Given the findings of the High Court in relation to US law, does
the provision of the Privacy Shield ombudsperson under Annex
A to Annex III to the Privacy Shield Decision when taken in con-
junction with the existing regime in the United States ensure that
the US provides a remedy to data subjects whose personal data is
transferred to the United States under the [SCC Decision] that is
compatible with Article 47 of the Charter]?
(Q11) Does the [SCC Decision] violate Articles 7, 8 and/or 47 of the
Charter?
As sometimes happens, the answers ultimately provided are compounded
together as opposed to individualised.
Interestingly, the referring court asks ‘Does the [SCC Decision] violate …
the Charter?’ It does not ask ‘Does the [Privacy Shield Decision]
violate … the Charter?’. Yet it strikes down and invalidates the Privacy
Shield nonetheless.
While the referring national court had already made certain adverse find-
ings in relation to US law and the protections and remedies available in
the US for EU citizens in relation to their data which has been transferred
to the US, it has been suggested that only the EU court could actually
invalidate an EU law decision (such as the SCC Decision or Privacy
Shield Decision.
The decision also exemplified how sometimes important data protection
cases can sometime take a long, and sometimes surprising route. Despite
previous criticisms, it was actually the Irish Data Protection Commission
which had taken an adverse view to the standing of the Privacy Shield
and which initiated the High Court case (because of the prior Schrems
complaint). Shrems and Facebook actually became technical defendants
in the case. It is also worth pointing out that when the Schrems complaint
originated, the Privacy Shield itself was not yet in existence.
Privacy Shield
Decision
32.3 The court invalidated the Privacy Shield found decision in what
is the most directly and immediately impactful part of the decision. The
official summary states that:
‘[T]he Court examines the validity of Decision 2016/1250 in the light of the
requirements arising from the GDPR, read in the light of the provisions of
the Charter guaranteeing respect for private and family life, personal data
protection and the right to effective judicial protection. In that regard, the Court
notes that that decision enshrines the position, as did Decision 2000/520, that
506
Privacy Shield 32.4
It continues that:
‘As regards the requirement of judicial protection, the Court holds that,
contrary to the view taken by the Commission in Decision 2016/1250, the
Ombudsperson mechanism referred to in that decision does not provide data
subjects with any cause of action before a body which offers guarantees sub-
stantially equivalent to those required by EU law, such as to ensure both the
independence of the Ombudsperson provided for by that mechanism and the
existence of rules empowering the Ombudsperson to adopt decisions that
are binding on the US intelligence services. On all those grounds, the Court
declares Decision 2016/1250 invalid.’10
Implications
32.4 The immediate impact is that companies seeking to rely on Pri-
vacy Shield as the lawful mechanism for the transfer of data to the US
9 ‘The Court of Justice invalidates Decision 2016/1250 on the adequacy of the protec-
tion provided by the EU–US Data Protection Shield. However, it considers that Com-
mission Decision 2010/87 on standard contractual clauses for the transfer of personal
data to processors established in third countries is valid,’ Court of Justice of the Euro-
pean Union, press release No 91/20, 16 July 2020.
10 ibid.
507
32.4 Brexit, Privacy Shield and Schrems
Implications
32.7 The direct implication is that businesses with pre-existing data
transfer arrangements which are based on the legal premise of the stand-
ard contracts are (currently) valid and safe, and continue. Businesses
11 ‘The Court of Justice invalidates Decision 2016/1250 on the adequacy of the protec-
tion provided by the EU–US Data Protection Shield However, it considers that Com-
mission Decision 2010/87 on standard contractual clauses for the transfer of personal
data to processors established in third countries is valid,’ Court of Justice of the Euro-
pean Union, press release No 91/20, 16 July 2020.
12 ibid.
509
32.7 Brexit, Privacy Shield and Schrems
also have the assurance now that the standard contracts are available as
a prime means of creating future lawful data transfers.
Businesses will also be assured by the fact that the standard contract
rules apply to data transfers to any third country outside of the EU
and so will be helpful in regulating and permitting international data
transfers – not just to the US. (Of course, some transfers may not require
standard contracts if the EU had already made an Adequacy Decision
permitting lawful data transfers to specific named countries based on the
EU’s assessment that the laws and protection of the recipient country are
already equivalent to those in the EU. One reason for standard contracts
being so important, however, is that there are more countries without an
Adequacy Decision than with one.)
Notwithstanding the assurance provided by the decision for the legality
and continued existence of standard contracts transfer mechanism, the
decision holds very important practical and legal implications in terms
of how to apply and operate the standard contracts.
Rightly or wrongly, there is a suggestion that standard contracts were
not always operated with the respect with which they deserved. After all,
they are legal documents and seek to regulate important aspects of data
protection law. The criticism is that sometimes a company may sign a
standard contract in a less than considered manner, place it in a drawer
and then (almost) forget about it.
Not so anymore.
The court makes express statements as to how seriously the standard
contracts must be treated and the careful consideration and examinations
which firms must undertake in order to assess whether a standard contract
will work and whether it may be undermined by the legal rules in the
recipient country. There are more detailed exercises which must be under-
taken by both the proposed data exporter and the proposed data recipient.
The implication is that without examination of safeguard issues and pro-
vision for safeguard mechanisms, it may be that the proposed contracts
cannot be entered into. Another potential implication is that without
appropriate consideration of safeguard issues for a proposed contract,
the validity of the contract if executed may be called into question.
While the above applies to new standard contracts, the question which
must also be considered by those with pre-existing standard contracts
is whether there is a risk that their contracts could be invalidated
because there is insufficient consideration and provision for safe-
guards. It is prudent, it is suggested, to at least review pre-existing
contracts and to ask the safeguard questions which this aspect of the
case gives rise to.
510
Standard Contract Clauses 32.7
511
32.7 Brexit, Privacy Shield and Schrems
512
Conclusion 32.9
Conclusion
32.9 There are also other issues disclosed in the decision, such as the
ability of national data protection regulators, to regulate data transfer.
The decision suggests that there may indeed be positive obligations on
such authorities to be proactive in policing data transfers which may not
be adhering to or be permitted under the data protection regime.
However, the decision issues referred to above will require to be care-
fully monitored for further official guidance and potential official deci-
sions on data transfers. At the same time, those proposing to engage in
data transfers will need to examine the feasibility of contract mechanisms
(and also BCC mechanisms) as appropriate. In addition, those with pre-
existing executed standard contracts arrangements would be prudent to
review their existing documentation. It may be that contracts or practice
documentation might be enhanced further.
Vice-President Jourová states that ‘[w]hen personal data travels abroad
from Europe, it must remain safe’, but acknowledges that ‘it is essential
to have a broad toolbox for international transfers while ensuring a high
level of protection for personal data’.14
The EU and US authorities are already in contact and will discuss the
avenues available. It may, for example, be possible to consider a Privacy
Shield 2.0 or other updated arrangement.
Commissioner Reynders adds that:
‘In the meantime, transatlantic data flows between companies can continue
using other mechanisms for international transfers of personal data available
under the GDPR.
‘We will work together with the national data protection to ensure a swift and
513
32.9 Brexit, Privacy Shield and Schrems
The Vice President sets out priorities for considering and future replace-
ment, namely:
●● guaranteeing the protection of personal data transferred across the
Atlantic;
●● working constructively with our American counterparts with an aim
of ensuring safe transatlantic data flows;
●● working with the European Data Protection Board and national data
protection authorities to ensure our international data transfer tool-
box is fit for purpose.16
In addition, the Commission is already ‘working intensively to ensure
that this toolbox is fit for purpose, including the modernisation of the
Standard Contractual Clauses’.17 So we can also expect that new more
enhanced clauses will be released sometime in the future.
Just to add one note of caution, however, there is a potential sting in the
tail in the judgement to the extent that the court said that the (current)
‘[e]xamination of … standard contractual clauses … has disclosed noth-
ing to affect the validity of that decision.’ That is not a guarantee of per-
manent immunity from a future adverse decision. Indeed, Mr Schrems
already seemed to suggest after the judgment that if the clauses were
seriously challenged they may fall too.18
Controllers and Processors should note that current best practice never
stands still. A contact or practice which was legal last year may have to
be reviewed, updated or replaced today. Legal compliance is an ongoing
task – and as the judgment confirms, can become more onerous over time.
This is further emphasised by the judgment’s requirement that the
national data protection supervisory authorities must be (more) proactive
in enforcing the rules of data protection.19 From Mr Schrems’ perspec-
tive, this was the most important issue decided.
Depending on the circumstances, there may also arise situations where
companies might have to consider where data already transferred to the
US may have to be returned or deleted, and the documentation surround-
ing such deletion.
15 Ibid.
16 Ibid.
17 Ibid.
18 The comment is that they ‘would be splattered in pieces too if they were.’ Interview
with IAPP, 17 July 2019.
19 See, for example decision [3], p 44.
514
Chapter 33
Other Data Protection Issues
Introduction
33.01 Data protection covers many separate but important topics.
Many of these are directly relevant to many organisations. Unfortunately
they cannot all be adequately covered in a book such as this. However, it
may assist to briefly refer to some of these issues, and to convey at least
to some extent the wide scope of the data protection regime. Quite sim-
ply, data protection affects every business, organisation and individual.
New Regime
33.02 The new GDPR overhauls and modernises the data protection
regime throughout the EU (and elsewhere). UK organisations will be
affected and will have to prepare for the new regime. What does the
new data protection regime under the forthcoming EU GDPR do? Some
of the specific changes and updates for organisations are highlighted in
Part 5 of the book.
The whole area of transfers of personal data outside of the EEA
(TBDFs or data transfers) is regularly changing, for example, as new
countries are added to a white list of permitted export countries after
having been examined on behalf of the EU Commission. There are also
other changes such as contractual clauses and binding corporate rules
(BCR) (and noting related updates in relation to Privacy Shield, and the
debate as to whether there are knock on consequences for contractual
clauses and BCRs). If an organisation needs to consider the possibil-
ity of data transfer exports to non-EEA countries, the current most up
to data transfer rules should be assessed, as well as appropriate pro-
fessional advice. It may be necessary to have specific legal contracts
in place. These rules may also be sector specific for certain industries
515
33.02 Other Data Protection Issues
516
Genome Data 33.04
particular to the patients whose special personal data are involved. There
does not appear to have been any opportunity or mechanism for patients
to opt-in or to opt-out before any proposed data transfers. The purpose
of the transfer and the details leading up to the transfer and arrangement
are also unclear, which also undermines the possibility of fair, compliant
processing. Fundamentally, the entire project relates to a new secondary
use in relation to the medical data in question, which requires proper con-
sideration and data protection compliance, which is not evident from the
documentation thus far available. The data referred to is also of such a
nature as to appear to go beyond the purported purpose thus far disclosed.
One would expect any medical data being transferred for research –
in particular names, address and other non-necessary information – to
be redacted and or pseudononymised prior to transfer, which does not
appear to have happened and which is not required in the Information
Sharing Agreement.
While Big Data health projects can have benefits, and such projects
can be worth the endeavour even without a successful end-resulting
health benefit, they all need to be data protection complaint. Serious
questions remain in relation to this project, and thus far compliance has
not been demonstrated. In fact, the information disclosed in the Data
Sharing Agreement and an official NHS Q&A document raise more
questions than answers. It appears that on the basis of these documents
to be non-data protection compliant.
Recently the ICO has commented on issues of data protection, contact
tracing, and mobile applications as they relate to Covid-19.6
Genome Data
33.04 A related and growing area is genomic,7 genome research, and
the implications for individuals’ privacy and personal data. Individu-
als may be concerned with what happens with their own DNA gene
sequence, information regarding predispositions to diseases, how this
may affect them, and how doctors, employers, insurers, and government
may access and use such personal data. One resource relating to this area
is The Governance of Genetic Information, Who Decides? by Widdows
and Mulle.8
6 ICO, ‘Apple and Google Joint Initiative on COVID-19 Contact Tracing Technology,’
ICO (17 April 2020).
7 L Curren et al, ‘Identifiability, Genomics, and UK Data Protection Law,’ European
Journal of Health Law (2010) (17) 329–344.
8 H Widdows and C Mullen, eds, ‘Frontmatter, The Governance of Genetic Information,
Who Decides?’ Cambridge Law, Medicine and Ethics (2009).
517
33.05 Other Data Protection Issues
Body Scanners
33.05 The introduction of body scanning technology in airports has
been controversial.9 While the prime argument in favour relates to air-
line security and terrorism, not everyone is convinced, and those chal-
lenged to produce evidence of successful attacks prevented, have been
less forthcoming.
The main controversy centres on the ability of the body scanners to
provide a complete, graphic, internal and intrusive image of a person’s
naked body once they walk through the scanner. There are of course
different types and different settings. However, the introduction of body
scanners is a perfect example of the introduction of a new technology
without considering the privacy and data protection implications in
advance. Later versions of body scanners have been developed which
produce a line image drawing, not a biological, naked representation.
They are equally capable of highlighting contraband material. Privacy
designed body scanners can be equally effective. While the original ver-
sions of body scanners were problematic, the more recent versions dem-
onstrate that technology can be much more privacy- and data protection
friendly when properly designed. The further lesson is that these consid-
erations should be incorporated at the design stage – not after the product
launches on the market.
9 See, for example, O Mironenko, ‘Body Scanners Versus Privacy and Data Protection,’
Computer Law & Security Review (2011) (27) 232–244.
10 Various v Morrison (rev 1) [2017] EWHC 3113 (QB) (1 December 2017); Various
v Morrison [2020] UKSC 12 (1 April 2020).
518
New Hardware Devices, New Software 33.08
Cloud
33.07 The popularity of cloud computing and virtualisation services
with users, enterprise and increasingly official organisations is increas-
ing. However, there are real concerns in relation to privacy, data pro-
tection, data security,12 continuity, discovery, liability, record keeping,
etc.13 One commentator refers to cloud computing as ‘the privacy storm
on the horizon.’14 Any organisation considering cloud services needs to
carefully consider the advantages, disadvantages, assessments and con-
tract assurances that will be required. Such organisations, as well as the
service operators, also need to assure themselves as to how they ensure
data protection compliance.
519
33.08 Other Data Protection Issues
Internet of Things
33.09 The beginning of the so called Internet of Things (IoT) or
connected devices era is now well heralded. However, the full
consideration of the data protection implications are yet to be fully out-
lined. Organisations need to appreciate the implications for employees,
users and also their compliance systems. Manufacturers are assisted in
identifying and reducing these risks by the new risk and assessment tools
of the EU General Data Protection Regulation (GDPR).
On-Site/Off-Site
33.10 Organisations have to tackle the issues presented by employ-
ees not just working on-site, but also travelling and working at home or
other locations off-site. This trend will likely increase even following
the Covid-19 pandemic. This can impact, for example, the security and
security risks regarding the personal data collected and processed by the
organisation. It also means that devices may be taken off-site and or that
third party devices may exist and which are utilised to access the organi-
sation’s systems remotely.
Note also the recent EDPB document:
●● Guidelines 3/2019 on processing of personal data through video
devices.
15 ICO, ‘The Use of Live Facial Recognition Technology by Law Enforcement in Public
Places’, 31 October 2019.
520
Drones 33.12
Online Abuse
33.11 The increasingly evident problem of online abuse such as
cyberbullying, trolling, defamation, copying and utilising personal
data to abuse and blackmail children, teenagers, etc, are issues which
need to be considered by all organisations, as well as policymakers.
Pierre Trudel, for example, notes that the risks to individuals increase
from many online activities, including in relation to data protection,
safety, etc.16
The Information Commissioner comments more generally that
websites ‘can be held liable for their misuse of personal data.’ She adds
that ‘[t]hese organisations have control over what happens with an
individual’s personal data and how it is used to filter content – they con-
trol what we see, the order in which we see it, and the algorithms that
are used to determine this. Online platforms can no longer say that they
are merely a platform for content; they must take responsibility for the
provenance of the information that is provided to users.’17
‘Data crimes are real crimes,’ states the Information Commissioner.18
Drones
33.12 As much as there is a new GDPR data protection regime, there
are also new rules and regulations being developed in relation to drones.
Drones now have to be registered in more and more jurisdictions,
However, the privacy and data protection implications, while being
highlighted in general discussion, are not yet adequately encompassed in
express privacy and data protection rules. There will be increasing calls
to do so, as well as increasing examples of why such an accommodation
is needed. A number of headline issues are raised by drones, including
privacy and data protection, drones as transport or delivery vehicles, and
the interference and malicious use of drones (such as at airports).
Note also the recent EDPB document:
●● Guidelines 1/2020 on processing personal data in the context of
connected vehicles and mobility related applications.
521
33.13 Other Data Protection Issues
Increasing Actions
33.13 There will be increasing enforcement and fines facing organisa-
tions when compliance goes wrong and also when data breach incidents
arise. In addition to the actions of regulators such as the ICO, there will
also be increasing actions from individual Data Subjects, class actions
and representative organisations. While this might occur most frequently
where financial data or special data are concerned, it will not be limited
to these areas. For example, there are already examples of data breach
and data loss in relation to Internet of Things devices and services which
open up new areas of exposure.
I am pleased therefore that the Government has accepted our call to set up
a “Council of Data Science Ethics” to address the growing legal and ethical
challenges associated with balancing privacy, anonymisation of data, security
and public benefit.’19
19 ‘Government Agree to set up “Council of Data Ethics,”’ The Science and Technology
Committee, available at http://www.parliament.uk/business/committees/committees-
a-z/commons-select/science-and-technology-committee/news-parliament-2015/
big-data-dilemma-government-response-15-16/. The report is at http://www.publications.
522
Politics 33.16
Politics
33.16 The Cambridge Analytical scandal was a shock to many, in
terms of how so much private personal data could be collected without
knowledge, transparency or consent, and then used for data analytical
purposes with a view to political user profiling and ultimately political
influence manipulation, Various actions were initiated by data regulators
as well as policymakers. This Information Commissioner has indicated
that the ICO’s investigation was the largest data regulatory investigation
thus far, and involved detailed cooperation with other data regulators
internationally. The Commissioner comments that ‘we have seen that the
behavioural advertising ecosystem has been applied across to political
campaigning to influence how we vote. I am deeply concerned that this
has happened without due legal or ethical consideration of the impacts to
our democratic system.’21
While a number of significant data fines have been issued and detailed
reports have been published, one should not assume that there are not
more shoes to drop, nor that further investigation and problem issues
need to be dealt with.
523
33.17 Other Data Protection Issues
Conclusion
33.17 Data protection compliance is never a one size fits all or a single
one time policy document. The nature of what amounts to personal
data and the activities to which such data can be processed for are ever
changing. Those within an organisation, therefore, need to be constantly
alert to compliance issues and changes. Organisations also need to be
constantly alert to new issues and dangers generally, and also those hot
button issues specific to their sector. Significantly, greater attention and
resources are needed to also deal with security, data breaches and data
protection compliance.
The Information Commissioner states, ‘[t]he spotlight is well and
truly on data protection … We need a sustained willingness by citizens to
exercise their data protection rights. We need data protection authorities
unafraid to use our new tools, sanctions and fining powers.’ Businesses
and organisations – and their advisors – need to be ready to meet this
new challenge.
524
Appendices
Reference Links
Information Commissioner’s Office:
https://ico.org.uk/
European Data Protection Board:
https://edpb.europa.eu/
Society of Computers and Law:
http://www.scl.org
International Journal for the Data Protection Officer, Privacy Officer
and Privacy Counsel:
www.idpp.info
Legislative Links
Data Protection Act 2018:
https://www.legislation.gov.uk/ukpga/2018/12/enacted General Data
Protection Regulation: http://ec.europa.eu/justice/data-protection/reform/
files/regulation_oj_en.pdf
525
Appendices
Objections to Marketing
Jay1 provides the following suggestions for organisations when dealing
with access requests/marketing objections, namely,
●● does the objection relate to marketing or another form or processing?
●● does it relate to direct marketing within the definition?
●● is it in writing or sent electronically or oral?
●● if it is not in writing or electronic is it appropriate to deal with it as
sent or should the individual be require to put it in writing or send it
by electronic means?
●● at which branch or office was it received?
●● on what date was the request received?
●● has the individual making the request given an intelligible name and
address to which the controller can respond?
●● when does the period for response expire?
●● what time scale has the individual specified to stop marketing
processing on a notice?
●● what marketing processing is affected?
1 Jay and Hamilton, Data Protection: Law and Practice, (London: Sweet and Maxwell,
2007), pp 436–437.
526
Audit Checklist
Audit Checklist
Morgan and Boardman2 refer to the audits. Their checklists include for
example:
Extent of Audit
●● what parts of the organisation and its files and systems have been
audits and for what reason?
●● are they likely to be sufficient to give an indication of the organisa-
tion’s overall data protection compliance or not?
Classes of Personal Data Audited
●● computer
●● email
●● other letter/memo files
●● internet
●● intranet
●● manual (relevant filing system)
●● video (scanned images, CCTV, photographic, film)
●● audio (contract, training, voicemail)
●● biometric
●● other categories of personal data (eg tachograph)
●● types of Personal Data
527
Appendices
528
Audit Checklist
529
Appendices
Procedures
Morgan and Boardman3 refer to processes and procedures in relation
compliance and ongoing compliance. The queries checklist includes for
example:
Procedures and Procedures
●● what industry/trade association guidance is available?
●● what published processed and procedures are there in respect of
personal data?
●● how are they brought to the attention of staff others?
●● how enforced?
●● how updated?
●● who is responsible for this?
●● how does he/she fit into the organisations structure?
Data Protection Notification/Registration
●● has the organisation notified?
●● if not, why does it consider itself exempt?
●● is the notification consistent with the personal data identified by the
audit?
●● purposes?
●● is the notification up to date?
●● how is the notification kept up to date?
Data Subjects’ Rights
●● what Procedures are in place to deal with requests in connection
with data subjects rights?
●● how has it worked so far?
●● any problems with identifying a particular individual in the personal
data?
●● are the Information Commissioner’s Codes (eg CCTV, employment
practice, data sharing) followed?
People
●● who is in charge of data protection?
●● what resources does he/she have?
●● how is he/she supported by senior management?
●● what if any disciplinary action has been taken in respect of data
protection?
530
Procedures
531
532
Index
A B
Abuse Binding corporate rules
employee monitoring, 17.07 definition, 3.03
generally, 33.11 generally, 21.11
social media, 29.10 WP29 documents, 21.07
Access right Biometric data
dealing with requests, 9.07 definition, 3.03
GDPR, and, 9.06 Blocking
generally, 9.05 generally, 9.01
Accuracy social media, 29.21
overview, 1.19 Blogs
Adequate protection see Websites and blogs
transfer of personal data, 21.03 Body scanners
Anonymised data generally, 33.05
transfer of personal data, 21.16 Breaches of rules
Assessment notices data processing activities, 11.03
destroying or falsifying information generally, 11.02
and documents, 20.04 other consequences, 11.04
generally, 20.04 Brexit
limitations, 20.05 conclusion, 24.21
restrictions, 20.05 EDPB guidance, 24.19
Audits EDPS guidance, 24.17
request, 20.08 employee monitoring and human rights,
Automated calling systems 17.14–17.15
ePrivacy Directive, 22.04 EU Commission’s ‘Notice to
Automated decision taking Stakeholders’, 24.18
data subjects’ rights EU (Withdrawal) Act 2018
generally, 9.16, 9.29–9.30, 26.66 data, and, 24.12
introduction, 9.14 details, 24.13
right to object, 9.15, 9.29 Official Explanatory Commentary,
employee data protection regime 24.14
introduction, 15.09 EU (Withdrawal Agreement) Act 2020,
object, to, 15.10 24.07, 24.20
profiling, 15.11 ‘final’ negotiations in transition period,
social media 24.07
generally, 29.39 GDPR, and, 1.13, 2.02–2.04,
introduction, 29.22, 29.37 4.10
right to object, 29.38 generally, 2.02, 2.04, 8.05, 24.02
533
Index
534
Index
535
Index
536
Index
537
Index
538
Index
539
Index
540
Index
541
Index
542
Index
543
Index
544
Index
545
Index
546
Index
547
Index
548
Index
549
Index
550
Index
551
Index
552
Index
553
Index
554
Index
555
Index
556
Index
557
Index
558
Index
559
Index
560
Index
561
Index
562
Index
563
Index
564
Index
565
Index
566
Index
567