Introduction to Data Protection Law
Introduction to Data Protection Law
Introduction
to Data
Protection
Law
Cases and Materials from the EU
Introduction to Data Protection Law
Indranath Gupta · Sherin Sarah Philip ·
Paarth Naithani
Introduction to Data
Protection Law
Cases and Materials from the EU
Indranath Gupta Sherin Sarah Philip
Jindal Global Law School Jindal Global Law School
O. P. Jindal Global University O. P. Jindal Global University
Sonipat, Haryana, India Sonipat, Haryana, India
Paarth Naithani
Jindal Global Law School
O. P. Jindal Global University
Sonipat, Haryana, India
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature
Singapore Pte Ltd. 2024
This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether
the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse
of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and
transmission or information storage and retrieval, electronic adaptation, computer software, or by similar
or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book
are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or
the editors give a warranty, expressed or implied, with respect to the material contained herein or for any
errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional
claims in published maps and institutional affiliations.
This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd.
The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721,
Singapore
We are extremely grateful to all those who have taken time out of their busy schedule
and ensured the timely completion of this project. This book was inspired by the
course “GDPR: A European Example of Data Protection Law” offered by O.P. Jindal
Global University to their postgraduate law students, whose enthusiasm motivated us
to undertake this project. This has been made possible because of the extraordinary
efforts of Pranav Ramakrishnan, who spent several hours of his precious time on this
project. We would also like to thank our family and colleagues at O.P. Jindal Global
University (JGU) for their constant encouragement. It is towards all of them that
we owe our gratitude. We admire the unconditional support of our Vice Chancellor,
Prof. C. Raj Kumar.
v
Contents
vii
viii Contents
Indranath Gupta is Professor of Law at Jindal Global Law School and Dean,
Office of Data, Innovation and Technology of O. P. Jindal Global University (JGU).
He held the Jean Monnet Chair in Multi-dimensional Approaches to the Under-
standing of the EU Data Protection Framework. He is Director, Jindal Initiative on
Research in I.P. and Competition (JIRICO) and Senior Fellow at the Jindal Insti-
tute of Behavioural Sciences (JIBS) and International Institute for Higher Education
Research and Capacity Building (IIHEd). Prof. Gupta holds a Ph.D. from Brunel
University, London, and two LL.M. degrees (taught and research) from the Univer-
sity of Aberdeen, UK, and the University of East Anglia, UK. He specializes in
technology law and aspects of intellectual property law. Prof. Gupta has published
many books on IP Law with Springer and is currently heading the major reference
work project titled Handbook on Originality in Copyright.
Sherin Sarah Philip is Assistant Professor at Jindal Global Law School. She
acquired her LL.M in International Commercial Law in 2018 from University College
of Dublin, Ireland, where she chose corporate governance and white collar crime as
an area to work on. She also has a diploma in “Entrepreneurship Administrative
and Business Laws”. Her interests include corporate law, IP law, and data protection
laws.
Paarth Naithani is Lecturer at Jindal Global Law School, O.P. Jindal Global Univer-
sity. Paarth holds an LLM in Intellectual Property and Technology Law. He has an
academic interest in data protection law and has published on data protection in
journals, including the International Review of Law, Computers and Technology,
Tilburg Law Review, European Data Protection Law Review, and the Journal of Data
Protection and Privacy. Paarth has been Research Fellow with the Jean Monnet Chair
in Multi-dimensional Approaches to the Understanding of the EU Data Protection
Framework [2020–2023] at O.P. Jindal Global University.
xi
Chapter 1
Introduction to EU Data Protection Law
1 Introduction
The idea of data protection amongst citizens generally stems from the insecurity
that prevails in the age of advancing technology. This insecurity originates from the
rise of the commercial internet and the exponential technological developments and
growth. The idea of protecting data and creating a data protection framework is not
new and has a considerable lineage in the European Union (EU). The EU General
Data Protection Regulation or GDPR1 has worked as a source of inspiration across
jurisdictions. GDPR has been cited as a global benchmark for the digital economy.
In the words of UN Secretary General António Guterres in 2019, GDPR
“set an example […] inspiring similar measures elsewhere […][and] urge[d] the EU and
its Member States to continue to lead to shape the digital age and to be at the forefront of
technological innovation and regulation.”2
But, the widely known GDPR2 is not the beginning of the data protection measures
adopted in the European Union. Before the GDPR, there was a Directive enacted
in 19953 (Directive of 1995), now repealed after the passage of the GDPR. This
Directive has significantly influenced emerging jurisprudence from the European
Court of Justice (ECJ)/Court of Justice of the European Union (CJEU).
1 Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on
the protection of natural persons with regard to the processing of personal data and on the free
movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation)
OJ L 119, 4.5.2016, p. 1–88.
2 European Commission, ‘Communication From The Commission To The European.
Parliament And The Council - Data protection as a pillar of citizens’ empowerment and the EU’s
approach to the digital transition - two years of application of the General Data Protection Regula-
tion’ (24 June 2020). https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52020D
C0264. Accessed 25 June 2024.
3 Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the
protection of individuals with regard to the processing of personal data and on the free movement
of such data OJ L 281, 23.11.1995, p. 31–50.
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024 1
I. Gupta et al., Introduction to Data Protection Law,
https://doi.org/10.1007/978-981-97-6355-9_1
2 1 Introduction to EU Data Protection Law
4 European Parliament, ‘REPORT on the First Report on the implementation of the Data Protec-
tion Directive (95/46/EC) (COM(2003) 265 – C5-0375/2003 – 2003/2153(INI))’ (24 February
2004). https://www.europarl.europa.eu/doceo/document/A-5-2004-0104_EN.html. Accessed 25
June 2025.
5 Neil Robinson, Hans Graux, Maarten Botterman, and Lorenzo Valeri, ‘Review of the European
the processing of personal data and the protection of privacy in the electronic communications
sector (Directive on privacy and electronic communications) OJ L 201, 31.7.2002, pp. 37–47.
8 Charter of Fundamental Rights of the European Union OJ C 326, 26.10.2012, pp. 391–407.
9 OECD, ‘OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data’
Personal Data, Legal basis of processing (including Legitimate Interest, Consent and
Necessity for the performance of contract) and Proportionality in the data processing.
In doing so, the chapter will refer to different judgements of the ECJ or the CJEU.
11 The World Bank, ‘World Development Report 2021 - Chapter 6: Data policies, laws, and
Regulations: Creating a trust environment’. https://wdr2021.worldbank.org. Accessed 25 June 2024.
12 The Digital Personal Data Protection Act, 2023. https://www.meity.gov.in/writereaddata/files/
25 June 2024.
4 1 Introduction to EU Data Protection Law
The protection level in the EU is multi-layered and robust. The roots can be found
in the OECD Guidelines.
The preface to the 1980 OECD Guidelines reads:
“The development of automatic data processing, which enables vast quantities of data to be
transmitted within seconds across national frontiers, and indeed across continents, has made
it necessary to consider privacy protection in relation to personal data.”14
In 1980, the Guidelines identified the future of Automatic Data Processing where,
a vast quantity of data will be transmitted within seconds, thereby making bound-
aries meaningless. Data will travel not only within the country but across conti-
nents. Therefore, is harmonisation the most revered key in a borderless data world?
Overall, harmonisation is a difficult task when it comes to data protection because the
conceived framework will depend on the general economy of involved jurisdictions.
However, there is a need for efforts to harmonise the principles based on which the
data protection law functions.
The OECD Guidelines of 1980 were drafted in technologically neutral terms,
with a broad ambit covering private and public sectors’ entities. They recognise the
accountability principle, and the Guidelines follow a simple conceptual language.15
The OECD document of 1980 was amended in 2013, and refers to the data protection
principles. The OECD Guidelines reads:
“There should be limits to the collection of personal data and any such data should be
obtained by lawful and fair means and, where appropriate, with the knowledge or consent
of the data subject.”16
The data controller must obtain personal data by lawful and fair means. The idea
of knowledge and consent is extremely important for fair processing. What is the
threshold of knowledge? One must travel from being informed to having knowledge.
Being aware of the consequences of data processing could take the individual closer
to knowledge. Further, knowledge only helps the individual share decisive consent.
The data controller must ensure that the journey [i.e. being informed and having
knowledge] ends in a fair and reasonable manner.
With knowledge, sharing of information becomes a key exercise. It is important
to consider when information is being given, how and to whom it is being given, and
in what ways it is being given. The data controller needs to ascertain this approach
and have an implementation plan to understand the expectations of the law.
14 OECD, ‘OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data’.
https://bja.ojp.gov/sites/g/files/xyckuh186/files/media/document/oecd_fips.pdf. Accessed 25 June
2024.
15 Michael Kirby, ‘The history, achievement and future of the 1980 OECD Guidelines on privacy’,
The Directive of 1995 followed the OECD Guidelines. The overall objective was
to harmonise the existing levels of data protection measures in different Member
States. Like the OECD Guidelines, the Directive recognised purpose specification,
minimising data processing, limiting storage to the purpose, security safeguards,
ensuring all-round transparency, and accurate processing of data, amongst other
things.
After the passage of the Directive, the EU’s highest Court helped understand the
template of data protection measures that a data controller must adopt. Through some
of its judgements discussed in the subsequent sections it clarifies prevailing concepts
in data protection. These judgements considered relevant provisions of GDPR and
the data protection Directive. Although GDPR replaced the old Directive, its effect
has been foundational to the workings of GDPR.
The following section introduces the basic prevailing concepts by looking at ECJ/
CJEU judgements interpreting the GDPR and the Directive 95/46/EC.
This section discusses the basic concepts of data protection framework, including
that of a data controller, personal data and the legal grounds of processing. It relies
on several ECJ/CJEU judgements to reflect upon the scope.
There are several judgements that give a better understanding about a data controller.
The landmark case in this regard involves Google Spain SL v. Agencia Española de
Protección de Datos Case C-131/12.17 Before delving into whether search engines
like Google are data controllers, this section will introduce the definition of a data
controller.
A data controller is understood under GDPR as the entity that decides why and
how data would be processed. The GDPR requires that the data controller should
have a legal ground for processing personal data, it should follow the obligations
provided under the law, and it should provide rights to the data subject (as per Article
4(1), data subject is the natural person who is identified or identifiable from the data).
The GDPR defines controller in Article 4(7)18
“...the purposes and the means amounts to deciding respectively the “why”
and the “how” of the processing: given a particular processing operation, the
controller is the actor who has determined why the processing is taking place
(i.e., “to what end”; or “what for”) and how this objective shall be reached (i.e.
which means shall be employed to attain the objective).”
Source EDPB Guidelines 07/2020 on the concepts of controller and processor in the
GDPR
Alongside the data controller, the GDPR also introduces data processor. Article
4(8)20 defines processor as “a natural or legal person, public authority, agency or other
body which processes personal data on behalf of the controller.”21 It is important to
differentiate between a data controller and a data processor. The following example
can help understand the difference. “A brewery has many employees. It signs a
contract with a payroll company to pay the wages. The brewery tells the payroll
company when the wages should be paid, when an employee leaves or has a pay rise,
and provides all other details for the salary slip and payment. The payroll company
provides the IT system and stores the employees’ data. The brewery is the data
controller and the payroll company is the data processor.”22
The scope of the term data controller is wide and not limited to public author-
ities. For instance, in C-272/19 Land Hessen, the CJEU decided that the Petitions
Committee of a Member State’s parliament is a controller and has to abide by Article
15 of GDPR at the time of deciding the purpose and means of processing personal
data. The concept of data controller in Regulation 2016/679 is not confined to public
19 Guidelines 07/2020 on the concepts of controller and processor in the GDPR Version 2.1 Adopted
on 07 July 2021.
20 Article 4(8), GDPR.
21 Article 4(8), GDPR.
22 EU Commission, ‘What is a data controller or a data processor?’. https://commission.europa.
eu/law/law-topic/data-protection/reform/rules-business-and-organisations/obligations/controllerpr
ocessor/what-data-controller-or-data-processor_en. Accessed 25 June 2024.
4 Basic Concepts: Data Protection Framework 7
authorities and is sufficiently wide to include anybody who, as per Article 4(7) GDPR,
“alone or jointly with others, determines the purposes and means of the processing
of personal data.”23
Various CJEU judgements discussed below indicate how a data controller has been
interpreted in different contexts. The judgements of Wirtschaftsakademie Schleswig–
Holstein, Jehovan Todistajat, FashionID suggest that “one can be a joint controller
if there is an objective to process the data..even without having (i) access to the
data, and (ii) exercising only marginal influence over the means, such as in deciding
to use a given platform (and exercising very marginal influence over its means of
processing).”24 The crucial criteria seems to be that “the person in question ‘made it
possible’ for personal data to be collected and transferred, potentially coupled with
some input that such a joint controller has as to the parameters (or at least where
there is silent endorsement of them).”25
The case involving Google Spain helps us understand why search engines such as
Google are data controllers under the GDPR as well as the old Directive. A Spanish
national Mr Costeja González filed a complaint before the Spanish Data Protection
Agency (the AEPD) against Google Spain SL (‘Google Spain’) and Google Inc. The
complaint was concerning removal of Mr Costeja Gonzálezs’ personal data from
Googles’ indexes and prevention of future access to the data.
Facts
23 VQ v Land Hessen, Request for a preliminary ruling from the Verwaltungsgericht Wiesbaden,
C-272/19 Land Hessen ECLI:EU:C:2020:535.
24 Michèle Finck, ‘Cobwebs of control: the two imaginations of the data controller in EU law’,
e.V. ECLI:EU:C:2018:1039.
26 Google Spain SL v. Agencia Española de Protección de Datos Case C-131/12
ECLI:EU:C:2014:317.
8 1 Introduction to EU Data Protection Law
“(d) …the natural or legal person, public authority, agency or any other body
which alone or jointly with others determines the purposes and means of the
processing of personal data; where the purposes and means of processing are
determined by national or Community laws or Regulations, the controller
or the specific criteria for his nomination may be designated by national or
Community law;”
Google Spain and Google Inc., the deletion of personal information must be handled
by the website that published the data and made it publicly available. Therefore, the
publisher is in the most acceptable position to determine the information’s lawfulness.
The Court suggested, Google, as an operator of a search engine, would be a
controller. Otherwise, it would end up excluding those from the purview of data
protection who play a decisive role in disseminating personal data over the Internet.
Google is not a traditional controller that would play a primary role in data collection.
However, with advancements in technology, there would be situations where data
controllers would be involved in different activities that do not fit the scope of the
traditional framework.
While the CJEU considered the concept of search engine as data controller in Google
Spain, it extended its scope in a different context in the Jehovah’s Witnesses judge-
ment. The issue was whether a religious community is a data controller when it
organises activities involving the collection of personal data.
Facts
The Jehovah’s Witnesses Community engaged in door-to-door preaching activi-
ties. They collected data from persons unknown to them, including their names,
addresses, information about religious beliefs and family circumstances. The infor-
mation collected was used as a memory aid when visiting people for subsequent
times. The Jehovah’s Witnesses Community also maintained a list of persons in a
refusal register including people who had requested not to be visited by preachers.
The Jehovah’s Witnesses Community members had Guidelines for taking notes
mentioned in its magazines dedicated to preaching. They claimed it did not require
its members to collect data. They did not know the type of notes taken or the identity
of the preachers collecting the data.
Questions
In the background of these facts, the following were the issues referred to the
CJEU.
“… (3)Must the phrase “alone or jointly with others determines the purposes
and means of the processing of personal data” appearing in Article 2(d) of
… Directive [95/46] be interpreted as meaning that a religious community
that organises an activity in the course of which personal data is collected (in
particular, by allocating areas in which the activity is carried out among the
various preachers, supervising the activity of those preachers and keeping a list
of individuals who do not wish the preachers to visit them) may be regarded
as a controller, in respect of the processing of personal data carried out by
its members, even if the religious community claims that only the individual
members who engage in preaching have access to the data that they gather?
(4)Must Article 2(d) of Directive [95/46] be interpreted to the effect that in
order for a religious community to be considered a controller it must have
taken other specific measures, such as giving written instructions or orders
directing the collection of data, or is it sufficient that that religious community
can be regarded as having de facto control of its members’ activities?”
accounts. The fan page can post any communication and introduce itself to social
network users. The fan page administrators had access to anonymous statistical
information of its visitors made available by a Facebook feature called ‘Facebook
Insights’. Cookies collected information when they were stored on visitors’ devices.
The cookies contained a unique user code that matched with Facebook users’ connec-
tion data. The storage and functioning of cookies and subsequent data processing
were not disclosed to the user by Wirtschaftsakademie or Facebook Ireland Ltd.
Questions
“It appears that any person wishing to create a fan page on Facebook concludes
a specific contract with Facebook Ireland for the opening of such a page, and
thereby subscribes to the conditions of use of the page, including the policy on
cookies, which is for the national Court to ascertain.
According to the documents before the Court, the data processing at issue in
the main proceedings is essentially carried out by Facebook placing cookies on
the computer or other device of persons visiting the fan page, whose purpose
is to store information on the browsers, those cookies remaining active for two
years if not deleted. It also appears that in practice Facebook receives, registers
and processes the information stored in the cookies in particular when a person
visits ‘the Facebook services, services provided by other members of the Face-
book family of companies, and services provided by other companies that use
the Facebook services’. Moreover, other entities such as Facebook partners
or even third parties ‘may use cookies on the Facebook services to provide
services [directly to that social network] and the businesses that advertise on
Facebook’.
That processing of personal data is intended in particular to enable Facebook
to improve its system of advertising transmitted via its network, and to enable
the fan page administrator to obtain statistics produced by Facebook from the
visits to the page, for the purposes of managing the promotion of its activity,
making it aware, for example, of the profile of the visitors who like its fan
page or use its applications, so that it can offer them more relevant content and
develop functionalities likely to be of more interest to them.”
the criteria in accordance with which the statistics are to be drawn up and even
designate the categories of persons whose personal data is to be made use of by
Facebook. Consequently, the administrator of a fan page hosted on Facebook
contributes to the processing of the personal data of visitors to its page.
In particular, the administrator of the fan page can ask for — and thereby
request the processing of — demographic data relating to its target audience,
including trends in terms of age, sex, relationship and occupation, information
on the lifestyles and centres of interest of the target audience and information on
the purchases and online purchasing habits of visitors to its page, the categories
of goods and services that appeal the most, and geographical data which tell
the fan page administrator where to make special offers and where to organise
events, and more generally enable it to target best the information it offers.
While the audience statistics compiled by Facebook are indeed transmitted to
the fan page administrator only in anonymised form, it remains the case that
the production of those statistics is based on the prior collection, by means of
cookies installed by Facebook on the computers or other devices of visitors
to that page, and the processing of the personal data of those visitors for such
statistical purposes. In any event, Directive 95/46 does not, where several oper-
ators are jointly responsible for the same processing, require each of them to
have access to the personal data concerned.
In those circumstances, the administrator of a fan page hosted on Facebook,
such as Wirtschaftsakademie, must be regarded as taking part, by its definition
of parameters depending in particular on its target audience and the objec-
tives of managing and promoting its activities, in the determination of the
purposes and means of processing the personal data of the visitors to its fan
page. The administrator must therefore be categorised, in the present case, as
a controller responsible for that processing within the European Union, jointly
with Facebook Ireland, within the meaning of Article 2(d) of Directive 95/46.”
processing by requiring a higher threshold of influence over the means. Future case
law should devise a de minimis threshold of influence over the means of processing
required to qualify as a data controller. Pursuant to this test, only parties that determine
the purposes and the means beyond the mere choice of a platform or service and the
enabling of someone else’s processing should be controllers.”29 It suggests a role
based approach; however, it may not be always possible to identify the exact role and
its influence over the purpose behind processing personal data. Also, is it the right
approach to reduce the scope attached with the term data controller? What impact
would it have on rights of the data subject? These questions are equally important to
answer.
The EU data protection law applies to the processing of personal data with the data
controller having a lawful justification for processing such data. Thus, it is essential
to determine that the processed data is indeed personal data.
Personal data is information about an identified or identifiable natural person
defined under Article 4(1) of GDPR. It –
29 Michèle Finck, Cobwebs of control: the two imaginations of the data controller in EU law,
International Data Privacy Law, Volume 11, Issue 4, November 2021, Pages 333–347, https://doi.
org/10.1093/idpl/ipab017.
30 Article 4(1), GDPR.
31 Peter Nowak v Data Protection Commissioner. Case C-434/16. ECLI:EU:C:2017:994.
18 1 Introduction to EU Data Protection Law
particular person.”32 The judgement of Breyer suggests that for identifiability, “it is
not required that all the information enabling the identification of the data subject
must be in the hands of one person.”33 According to Recital 26 of the GDPR, “account
should be taken of all the means reasonably likely to be used, such as singling out,
either by the controller or by another person to identify the natural person directly or
indirectly.”34 These elements will be discussed further through different judgements
in this section.
But before discussing the judgements, it is important to note that data can be
de-identified, encrypted, pseudonymised, or anonymised. Which of these kinds of
data does data protection law apply to? The EU Commission has explained35
non-personal data under the GDPR’, (2020) 10(1) International Data Privacy Law 11–36, https://
doi.org/10.1093/idpl/ipz026.
37 Mark Elliot, Kieron O’Hara, Charles Raab, Christine M. O’Keefe, Elaine Mackey, Chris Dibben,
Heather Gowans, Kingsley Purdam, Karen McCullagh, ‘Functional anonymisation: Personal data
and the data environment’ (2018) 34(2) Computer Law & Security Review 204–221. https://doi.
org/10.1016/j.clsr.2018.02.001.
38 Miranda Mourby, Elaine Mackey, Mark Elliot, Heather Gowans, Susan E. Wallace, Jessica Bell,
Hannah Smith, Stergios Aidinlis, Jane Kaye, “Are ‘pseudonymised’ data always personal data?
4 Basic Concepts: Data Protection Framework 19
rendered anonymous, and data that is pseudonymised for one organisation could
be anonymised for a third party.39 More detailed discussions on pseudonymisation
can be found in the following chapters.
Importantly, “[w]hen the hyperconnected onlife world of data-driven agency
arrives, the intensive compliance regime of the General Data Protection Regulation
(GDPR) will become ‘the law of everything’, well-meant but impossible to maintain.
By then we should abandon the distinction between personal and non-personal data,
embrace the principle that all data processing should trigger protection, and under-
stand how this protection can be scalable.”40 In a connected environment often the
line between personal data and non-personal data becomes blurry. It is likely the case
where personal data becomes non-personal by or through the use of accepted tech-
nological norms. If all forms of data trigger data protection, there could questions
about its overall impact on innovation and business models adopted in the digital
economy.
The following sub-sections discuss CJEU judgements to understand the concept
of personal data in different situations, such as in the case of examination scripts
and dynamic IP addresses. The test of identifiability is discussed alongside other
concepts.
The judgement identified the dynamic internet protocol address as personal data. It
raises the all-important question of the possible accessibility of additional data in
a combination of available data from different sources that may help identify the
natural person.
Facts
Breyer had accessed the websites of several German Federal institutions. These
websites provided topical information to their users. With the emerging web attacks,
these websites mentioned all access operations in logfiles to prevent possible intru-
sions. It was done to prosecute those indulging in such behaviours. The informa-
tion in these logfiles included the address of the website accessed, the file accessed
during such search, keywords entered while searching for information, the time when
websites were accessed, the volume of data transferred, an indication of a successful
Implications of the GDPR for administrative data research in the UK”, (2018) 34(2) Computer
Law & Security Review 222–233, https://doi.org/10.1016/j.clsr.2018.01.002.
39 Miranda Mourby, Elaine Mackey, Mark Elliot, Heather Gowans, Susan E. Wallace, Jessica Bell,
Hannah Smith, Stergios Aidinlis, Jane Kaye, “Are ‘pseudonymised’ data always personal data?
Implications of the GDPR for administrative data research in the UK” (2018) 34(2) Computer
Law & Security Review 222–233. https://doi.org/10.1016/j.clsr.2018.01.002.
40 Nadezhda Purtova, ‘The law of everything. Broad concept of personal data and future of EU data
protection law’ (2018) 10(1) Law, Innovation and Technology 40–81. https://doi.org/10.1080/175
79961.2018.1452176.
41 Patrick Breyer v Bundesrepublik Deutschland C-582/14. ECLI:EU:C:2016:779.
20 1 Introduction to EU Data Protection Law
transaction and most importantly, the Internet Protocol address of the computer from
where these information have been accessed.
IP address represents a computer, and it helps develop a connection with a website,
thereby seeking access to a server where the website is located. The Internet Service
Provider (ISP) facilitates the Internet connection and allocates either a static IP
address or a dynamic IP address to the subscribers’ computers, who are data subjects
in this matter. Unlike a static IP address, the dynamic IP address changes each time
a user connects to the internet.
Mr Breyer brought the action requesting an order restraining these websites from
storing IP addresses when users access them. He claimed that storage should be
restricted to resolve technical errors and not otherwise.
After the initial application was rejected, the Court of Appeal ruled in favour of
Mr Breyer. It said:
“a dynamic IP address, together with the date on which the website was
accessed to which that address relates constitutes, if the user of the website
concerned has revealed his identity during that consultation period, personal
data, because the operator of that website is able to identify the user by linking
his name to his computer’s IP address.”
have, if Mr Breyer has not disclosed his identity during the consultation of those
websites, the information necessary to identify him without disproportionate
effort.
….[A]cademic opinion mostly supports the view, first, that the collection
and use of personal data relating to the user of a website is authorised only in
order to facilitate the specific use of that website and, second, that those data
must be deleted at the end of period of consultation concerned if they are not
data required for billing purposes.”
42Scarlet Extended SA v Société belge des auteurs, compositeurs et éditeurs SCRL (SABAM).
C-70/10. ECLI:EU:C:2011:771.
22 1 Introduction to EU Data Protection Law
“it appears that the online media services provider has the means which may
likely reasonably be used in order to identify the data subject, with the assis-
tance of other persons, namely the competent authority and the internet service
provider, on the basis of the IP addresses stored.
..a dynamic IP address registered by an online media services provider when
a person accesses a website that the provider makes accessible to the public
constitutes personal data within the meaning of that provision, concerning that
provider, where the latter has the legal means which enable it to identify the
data subject with additional data which the internet service provider has about
that person.”
In Peter Nowak, answer scripts of students alongside the comments shared by exam-
iners were construed personal data. Unlike the previous judgement, which developed
the idea of identifiability, the CJEU developed another perspective surrounding the
definition of personal data: that the data must ‘relate’ to an identified or identifiable
individual. The CJEU laid down the content, purpose and effect test for the data to
‘relate’ to an individual.
Facts
The complainant, Mr Nowak, was a trainee accountant and cleared some of the levels
of examinations organised by the Institute of Chartered Accountants of Ireland (CAI).
Mr Nowak could not clear the Strategic Finance and Management Accounting course,
which was classified as an open-book examination.
Unfortunately, Mr Nowak could not clear the course in question on four occasions.
He reached out to CAI, suggesting that they hold his personal data. The CAI refused
to share the script with him, citing that the script in question cannot be considered
personal data within the meaning of the data protection legislation. The Data Protec-
tion Commissioner also rejected his application, citing that examinations’ scripts do
not generally fall within the scope of personal data. Finally, after several rejections,
the Supreme Court allowed the appeal and ruled in favour of Mr Nowak.
Questions
However, the Supreme Court decided to refer this matter to the CJEU and forwarded
the following questions:
“(41) … any person must be able to exercise the right of access to data relating
to him which are being processed, in order to verify in particular the accuracy
of the data and the lawfulness of the processing;”
“1. The data subject shall have the right to obtain from the controller confir-
mation as to whether or not personal data concerning him or her are being
processed, and, where that is the case, access to the personal data …
3. The controller shall provide a copy of the personal data undergoing
processing …
4. The right to obtain a copy referred to in paragraph 3 shall not adversely
affect the rights and freedoms of others.”
The Court referred to the words ‘any information’ in the definition of personal data
and concluded that it is quite broad in nature. It encompasses all possible kinds of
information and is not limited to opinions and assessments. They could be subjective
and objective in nature. The requirement is that the information in hand relates to
the data subject.
There are reasons why the written answers submitted by a person ‘relate’ to the
person.
“First, the content of those answers reflects the extent of the candidate’s knowl-
edge and competence in a given field and, in some cases, his intellect, thought
processes, and judgment. In the case of a handwritten script, the answers
contain, in addition, information as to his handwriting. Second, collecting those
answers is to evaluate the candidate’s professional abilities and suitability to
practice the profession concerned. Last, the use of that information, one conse-
quence of that use being the candidate’s success or failure at the examination
concerned, is liable to affect his or her rights and interests, in that it may deter-
mine or influence, for example, the chance of entering the profession aspired
to or of obtaining the post sought.”
Once it is ascertained that a data controller is processing personal data, the legal basis
behind such processing must be established. Article 6(1) of the GDPR provides
different legal grounds that the data controller can rely upon prior to processing
personal data.
“1. Processing shall be lawful only if and to the extent that at least one of the
following applies: (a) the data subject has given consent to the processing of
his or her personal data for one or more specific purposes; (b) processing is
necessary for the performance of a contract to which the data subject is party
or in order to take steps at the request of the data subject prior to entering into a
contract; (c) processing is necessary for compliance with a legal obligation to
which the controller is subject; (d) processing is necessary in order to protect
the vital interests of the data subject or of another natural person; (e) processing
is necessary for the performance of a task carried out in the public interest or
in the exercise of official authority vested in the controller; (f) processing is
necessary for the purposes of the legitimate interests pursued by the controller
28 1 Introduction to EU Data Protection Law
or by a third party, except where such interests are overridden by the interests or
fundamental rights and freedoms of the data subject which require protection
of personal data, in particular where the data subject is a child.”
“Consent Your company/organisation offers a music app and ask for citizens’
consent to process their musical preferences in order to suggest tailored songs
and possible concerts to them.
Contractual obligation Your company/organisation sell goods online. It can
process data that is necessary to take steps at the request of the individual prior
to entering into the contract and for the performance of the contract. So you can
process the name, delivery address, credit card number (if payment by card),
etc.
Legal obligation You own a company with employees. In order to obtain social
security cover, the law obliges you to provide personal data (for example weekly
income of your employees) to the relevant authority.
Public interest … [A] professional association such as a bar association or
a chamber of medical professionals vested with an official authority to do so
may carry out disciplinary procedures against some of their members.
Vital interests of a person: A hospital is treating a patient after a serious road
accident; the hospital doesn’t need his consent to search for his ID to check
whether that person exists in the hospital’s database to find previous medical
history or to contact his next of kin.
Your organisation’s legitimate interests: Your company/organisation ensures
its network security by monitoring the use of its employees’ IT devices. Your
company/organisation may legitimately process personal data for that purpose,
only if the least intrusive method is chosen as regards the privacy and data
protection rights of your employees, for example, by limiting the accessibility
of certain websites. (Note that this can’t be done in EU Member States where
national law sets out stricter rules for processing in the employment context).”
is legitimate, there is a three-part test for legitimate interest as explained by the ICO,
UK.47 These three-part tests are primarily related to the data protection principles
with purpose behind personal data processing is an essential hinge that legitimises
processing. It also helps the data controller to not digress and remain with the confines
of the objective of data collection. The necessity test is also proportional to the exact
need of data collection and to the subsequent processing. The data controller has
to run an assessment exercise, if not formally, to gauge the exact need before data
collection begins. The final prong dictates the overarching interest of legislative
intervention, which is to give the personal autonomy back to the data subjects.
europa.eu/law/law-topic/data-protection/reform/rules-business-and-organisations/legal-grounds-
processing-data/grounds-processing/what-does-grounds-legitimate-interest-mean_en. Accessed
25 June 2024.
49 TK v Asociaţia de Proprietari bloc M5A Scara-A Case C-708/18 ECLI:EU:C:2019:1064.
4 Basic Concepts: Data Protection Framework 31
Facts
The complainant lived in an apartment he owned in a building society named M5A.
At a residential community’s general assembly organised in April 2016, the building
society decided to install a video surveillance system. As part of the video surveillance
system, the plan was to install three cameras in the buildings’ common parts. The
first camera pointed towards the buildings’ front, while the other two cameras were
in the lift and the ground-floor hallway.
The complainant claimed that the video surveillance system infringed the
complainant’s privacy. Even after numerous complaints, the video cameras continued
to operate in society. In his complaint to the referring Court, the complainant
requested the removal of the cameras.
According to the association, “the decision to install a video surveillance system
had been taken in order to monitor as effectively as possible who enters and leaves
the building, since the lift had been vandalised on many occasions and there had
been burglaries and thefts in several apartments and the common parts.”50 Further,
the association suggested that they had previously taken alternative measures, such
as installing an intercom/magnetic card entry system before installing the video
cameras.
The referring Court suggested, “in a general manner, that processing of personal
data, such as the recording of images by means of a video surveillance system, may
be carried out only if the data subject has given his or her express and unequivocal
consent. …[However] a series of exceptions to that rule, which include the exception
whereby the processing of personal data is required in order to protect the data
subject’s life, physical integrity or health or those of a threatened third party.”51
Questions
The questions that were referred to the CJEU essentially asked whether legitimate
interests could justify the installation of CCTV cameras in the building society in
the absence of the complainant’s consent.
“(1) Are Articles 8 and 52 of the Charter and Article 7(f) of Directive 95/
46 to be interpreted as precluding provisions of national law such as those at
issue in the main proceedings, … in accordance with which video surveillance
may be used to ensure the safety and protection of individuals, property and
valuables and for the pursuit of legitimate interests, without the data subject’s
52 František Ryneš v Úřad pro ochranu osobních údajů. Case C-212/13 ECLI:EU:C:2014:2428.
4 Basic Concepts: Data Protection Framework 33
person concerned by the data protection do not take precedence over the legitimate
interest pursued.”53
As to the first condition i.e. data controller’s legitimate interest claim, the Court
weighed the Controller’s practice of setting up a video surveillance system. The
objective was to protect property and the health and life of the co-owners of the
building, including that of the complainant. This activity would amount to legitimate
interest under Article 7(f).
In the context of Article 7(f), the referring Court questioned whether “the interests
pursued by the controller at issue must, first, be ‘proven’ and, secondly, be ‘present
and effective at the time of the data processing’.”54 The present and effective interest
were fulfilled because there were previous instances of theft burglaries, and they
continued even after installing other services like various security arrangements at
the gate of the building.
As for the second condition i.e. the need to process for legitimate interest, the
derogations in question should be no more than what is strictly necessary. Therefore,
it must be ascertained that legitimate data processing interests “cannot reasonably
be as effectively achieved by other means less restrictive of the fundamental rights
and freedoms of data subjects, in particular the rights to respect for private life and
to the protection of personal data guaranteed by Articles 7 and 8 of the Charter.”55
This approach relates to the data minimisation principle, as data processing should
correlate to the purpose, and processing must not be beyond the stipulated purpose.
The idea of proportionality must be respected in the workings of the video surveil-
lance device—the specific methods of installing and operating the three installed
cameras, the working hours of the three installed cameras and the opportunity to
block or obscure such images where surveillance is not essential.
As for the third condition, i.e. reconciling fundamental rights vis-à-vis legitimate
purpose, it is important to measure the seriousness of the derogation of fundamental
rights. Further, it is important to consider the nature of personal data—i.e. its sensi-
tivity and access rights of different individuals, including the methods followed while
accessing such data.
The reasonable expectations of data subjects must also be considered because
processing should not continue beyond necessary. These reasonable expectations
should balance with the interests of the co-owners who stay in the same building
society, whose expectations are equally important.
Therefore, finally, the Court suggested:
“In the light of the foregoing, the answer to the questions raised is that
Article 6(1)(c) and Article 7(f) of Directive 95/46, read in the light of Arti-
cles 7 and 8 of the Charter, must be interpreted as not precluding national
processing, which the users agreed to when signing up for the services. The general
terms provided the companies’ cookie and data policy. The terms also provided that
“Meta Platforms Ireland collect[ed] user- and device-related data about user activi-
ties on and off the social network and link[ed] the data with the Facebook accounts of
the users concerned. The latter data, relating to activities outside the social network
(‘the off-Facebook data’), [were] data concerning visits to third-party webpages and
apps, which [were] linked to Facebook through programming interfaces—‘Face-
book Business Tools’—as well as data concerning the use of other online services
belonging to the Meta group, including Instagram, WhatsApp, Oculus and—until
13 March 2020—Masquerade.”59 In this background, the CJEU decided on the most
appropriate legal basis for processing online behavioural advertising. In detail, the
following were the questions before the CJEU -
Questions
unlawful use, breaches of the terms of service and policies and other harmful
behaviour;
also constitute legitimate interests within the meaning of Article 6(1)(f) of the
GDPR if, for those purposes, the undertaking [collects data from other group
services and from third-party websites and apps via integrated interfaces such
as ’Facebook Business Tools’, or via cookies or similar storage technologies
placed on the internet user’s computer or mobile device, links those data with
the user’s Facebook.com account and uses them]?
In those circumstances, can collecting data from other group services and
from third-party websites and apps via integrated interfaces such as ’Facebook
Business Tools’, or via cookies or similar storage technologies placed on the
internet user’s computer or mobile device, linking those data with the user’s
Facebook.com account and using them, or using data already collected and
linked by other lawful means, also be justified under Article 6(1)(c), (d) and
(e) of the GDPR in individual cases, for example to respond to a legitimate
request for certain data (point (c)), to combat harmful behaviour and promote
security (point (d)), to research for social good and to promote safety, integrity
and security (point (e))?
Can consent within the meaning of Article 6(1)(a) and Article 9(2)(a) of
the GDPR be given effectively and, in accordance with Article 4(11) of the
GDPR in particular, freely, to a dominant undertaking such as [Meta Platforms
Ireland]?”
to demonstrate how the main subject matter of the contract cannot be achieved
if the processing in question does not occur…
..The fact that such processing may be referred to in the contract or may be
merely useful for the performance of the contract is, in itself, irrelevant in
that regard. The decisive factor for the purposes of applying the justification
set out in point (b) of the first subparagraph of Article 6(1) of the GDPR is
rather that the processing of personal data by the controller must be essential
for the proper performance of the contract concluded between the controller
and the data subject and, therefore, that there are no workable, less intrusive
alternatives…
..As regards, first, the justification based on personalised content, it is important
to note that, although such a personalisation is useful to the user, in so far as
it enables the user, inter alia, to view content corresponding to a large extent
to his or her interests, the fact remains that, subject to verification by the
referring Court, personalised content does not appear to be necessary in order
to offer that user the services of the online social network. Those services
may, where appropriate, be provided to the user in the form of an equivalent
alternative which does not involve such a personalisation, such that the latter is
not objectively indispensable for a purpose that is integral to those services.”
“First, with regard to the condition relating to the pursuit of a legitimate interest,
it must be stated that, according to Article 13(1)(d) of the GDPR, it is the respon-
sibility of the controller, at the time when personal data relating to a data subject
are collected from that person, to inform him or her of the legitimate interests
pursued where that processing is based on point (f) of the first subparagraph
of Article 6(1) of that regulation....
38 1 Introduction to EU Data Protection Law
…Second, with regard to the condition that the processing of personal data be
necessary for the purposes of the legitimate interests pursued, that condition
requires the referring Court to ascertain that the legitimate data processing
interests pursued cannot reasonably be achieved just as effectively by other
means less restrictive of the fundamental rights and freedoms of data subjects,
in particular the rights to respect for private life and to the protection of personal
data guaranteed by Articles 7 and 8 of the Charter.
…In this context, it should also be recalled that the condition relating to the need
for processing must be examined in conjunction with the ‘data minimisation’
principle enshrined in Article 5(1)(c) of the GDPR, in accordance with which
personal data must be ‘adequate, relevant and limited to what is necessary in
relation to the purposes for which they are processed’..
…Third, with regard to the condition that the interests or fundamental rights and
freedoms of the person concerned by the data protection do not take precedence
over the legitimate interests of the controller or of a third party, the Court has
already held that that condition entails a balancing of the opposing rights and
interests at issue which depends in principle on the specific circumstances of
the particular case and that, consequently, it is for the referring Court to carry
out that balancing exercise, taking account of those specific circumstances….
Furthermore, as can be seen from Recital 47 of the GDPR, the interests and
fundamental rights of the data subject may in particular override the interest of
the data controller where personal data are processed in circumstances where
data subjects do not reasonably expect such processing.”
The Court held that, “First, with regard to personalised advertising, it must be
borne in mind that, according to Recital 47 of the GDPR, the processing of
personal data for direct marketing purposes may be regarded as carried out for
a legitimate interest of the controller….
…However, such processing must also be necessary in order to achieve that
interest and the interests or fundamental freedoms and rights of the data subject
must not override that interest. In the context of that balancing of the opposing
4 Basic Concepts: Data Protection Framework 39
rights at issue, namely, those of the controller, on the one hand, and those
of the data subject, on the other, account must be taken,[..]in particular of the
reasonable expecta tions of the data subject as well as the scale of the processing
at issue and its impact on that person…
…In this regard, it is important to note that, despite the fact that the services of
an online social network such as Facebook are free of charge, the user of that
network cannot reasonably expect that the operator of the social network will
process that user’s personal data, without his or her consent, for the purposes
of personalised advertising. In those circumstances, it must be held that the
interests and fundamental rights of such a user override the interest of that
operator in such personalised advertising by which it finances its activity, with
the result that the processing by that operator for such purposes cannot fall
within the scope of point (f) of the first subparagraph of Article 6(1) of the
GDPR….
…Furthermore, the processing at issue in the main proceedings is particularly
extensive since it relates to potentially unlimited data and has a significant
impact on the user, a large part – if not almost all – of whose online activities
are monitored by Meta Platforms Ireland, which may give rise to the feeling
that his or her private life is being continuously monitored.”
“[a]s regards the objective of ensuring network security, that objective, as stated
in Recital 49 of the GDPR, constitutes a legitimate interest of Meta Platforms
Ireland, capable of justifying the processing operation at issue in the main
proceedings…
…However, as regards the need for that processing for the purposes of that
legitimate interest, the referring Court will have to ascertain whether and to
what extent the processing of personal data collected from sources outside
the social network Facebook is actually necessary to ensure that the internal
security of that network is not compromised…
40 1 Introduction to EU Data Protection Law
…In that context, [..] it will also have to ascertain whether the legitimate data
processing interest pursued cannot reasonably be achieved just as effectively by
other means less restrictive of the fundamental freedoms and rights of the data
subjects, in particular the rights to respect for private life and to the protection
of personal data guaranteed by Articles 7 and 8 of the Charter and whether
the ‘data minimisation’ principle enshrined in Article 5(1)(c) of the GDPR has
been observed….
…as regards the ‘product improvement’ objective, it cannot be ruled out from
the outset that the controller’s interest in improving the product or service with
a view to making it more efficient and thus more attractive can constitute a
legitimate interest capable of justifying the processing of personal data and
that such processing may be necessary in order to pursue that interest….
…However, subject to final assessment by the referring Court in that respect,
it appears doubtful whether, as regards the data processing at issue in the
main proceedings, the ‘product improvement’ objective, given the scale of that
processing and its significant impact on the user, as well as the fact that the user
cannot reasonably expect those data to be processed by Meta Platforms Ireland,
may override the interests and fundamental rights of such a user, particularly
in the case where that user is a child…
….as regards the objective referred to by the referring Court, relating to the
sharing of information with law-enforcement agencies in order to prevent,
detect and prosecute criminal offences, it must be held that that objective
is not capable, in principle, of constituting a legitimate interest pursued by
the controller, within the meaning of point (f) of the first subparagraph of
Article 6(1) of the GDPR. A private operator such as Meta Platforms Ireland
cannot rely on such a legitimate interest, which is unrelated to its economic
and commercial activity. Conversely, that objective may justify processing by
such an operator where it is objectively necessary for compliance with a legal
obligation to which that operator is subject.”
“Article 4(11) of the GDPR [...] defines ‘consent’ as meaning ‘any freely given,
specific, informed and unambiguous indication of the data subject’s wishes by
4 Basic Concepts: Data Protection Framework 41
5 ePrivacy Directive
Other than the 1995 Data Protection Directive and the GDPR, there are other
data protection endeavours in the EU. One of the major Directives is the ePrivacy
Directive. The ePrivacy Directive looks to:
This section discusses the judgements involving La Quadrature du Net and Privacy
International to explain how Article 15(1) of the ePrivacy Directive must be inter-
preted where information is processed for surveillance. Article 15(1) allows Member
States to adopt restrictions on individual rights by necessary, appropriate and
proportionate measures. The Court held that EU law precluded national legislation
mandating providers of electronic communications services to transmit traffic data
and location data to security and intelligence agencies on a broad and indiscriminate
basis to protect national security.
44 1 Introduction to EU Data Protection Law
Facts
La Quadrature du Net, French Data Network, brought actions before the Council
of State, France for the annulment on the grounds that they infringed the French
Constitution, the ECHR and Directives 2000/31 and 2002/58, read in the light of the
Charters’ Articles 7, 8 and 47. The relevant Articles of the Internal Security Code in
question were the following.
60La Quadrature du Net and Others v Premier ministre and Others. Joined Cases C-511/18, C-512/
18 and C-520/18. ECLI:EU:C:2020:791.
5 ePrivacy Directive 45
Questions
The essential question before the CJEU was whether the legislative measures of
Member States restricting the right to privacy are justified as per Article 15(1)
of the ePrivacy Directive, which requires necessary, appropriate and proportionate
measures.
“Member States may adopt legislative measures to restrict the scope of the
rights and obligations …of this Directive when such restriction constitutes a
necessary, appropriate and proportionate measure within a democratic society
to safeguard national security (i.e. State security), defence, public security, and
the prevention, investigation, detection and prosecution of criminal offences
or of unauthorised use of the electronic communication system…To this end,
Member States may, …adopt legislative measures providing for the retention
of data for a limited period justified on the grounds laid down in this paragraph.
All the measures referred to in this paragraph shall All the measures referred to
in this paragraph shall be in accordance with the general principles of [Union]
law…”
expected to keep the communications and data of subscribers anonymous. They must
not record such communications unless there is an agreement to the contrary.
However, Article 15(1) of Directive 2002/58 allows Member States to introduce
a certain legislative framework that derogates the scope of Articles 7, 8 and 11 of the
Charter of Fundamental Rights which recognise, inter alia, the right to privacy and
personal data protection. The rights enshrined under these Articles are not absolute
and must be measured against the rights that are essential for the functioning of a
democratic society. But, the steps to preserve the rights within a democratic society
should be necessary, appropriate and proportionate to the freedoms and rights of
natural persons whose traffic and location data are tracked. Recital 11 of the Directive
reads that the intended purpose should decide the course of measures undertaken.
In the context of necessary appropriate and proportionate measures, the CJEU
suggested:
61 Peter Puškár v Finančné riaditeľstvo Slovenskej republiky, Kriminálny úrad finančnej správy
C-73/16.
62 Peter Puškár v Finančné riaditeľstvo Slovenskej republiky, Kriminálny úrad finančnej správy
C-73/16.
63 Peter Puškár v Finančné riaditeľstvo Slovenskej republiky, Kriminálny úrad finančnej správy
C-73/16.
5 ePrivacy Directive 47
The Court applied the tests of necessity, proportionality and safeguards to the
legislative measures examining intrusive actions in the private lives of natural
persons, even if the aim of national legislation framed under Article 15(1) is towards
combatting serious crime and threats to public security. Article 15(1), read with Arti-
cles 7, 8, 11 and 52 of the Charter of Fundamental Rights, will not preclude legislative
measures protecting national security and preventing threats in a democratic society.
However, such pre-conditions should be genuine, present and foreseeable. When
there is a serious threat to jeopardising Articles 7 and 8 of the Charter, the processing
may only happen where there is a serious threat to national security. Furthermore, an
effective review must be carried out through a Court or an independent administra-
tive body. The review system should reflect upon the safeguarding measures in place
to reduce the instances of possible abuse. For instance, data retention cannot be the
general rule since that takes us away from the data minimisation principle. Besides,
data must not be retained systematically and continuously, especially in the context
of the sensitivity attached to traffic and location data that electronic communication
service providers may collect. It could seriously threaten the private life of individ-
uals who may have subscribed to certain services offered by the service providers.
The above assertion is also relevant when combating serious crime or preventing
threats to public security. Following the principle of proportionality, the duration
of retention should be limited to the circumstances and objectives that are strictly
necessary.
The Court listed the above principles when considering automated analysis and
real-time collection, inter alia, of traffic and location data. They emphasised:
authorised only within the limits of what is strictly necessary. In cases of duly
justified urgency, the review must take place within a short time.”
64Privacy International v Secretary of State for Foreign and Commonwealth Affairs and Others.
Case C-623/17. ECLI:EU:C:2020:790.
5 ePrivacy Directive 49
further added “that the databases compiled by the security and intelligence agencies
[were] subject to bulk, unspecific, automated processing, with the aim of discovering
unknown threats. To that end, the referring Court state[d] that the sets of metadata
thus compiled should be as comprehensive as possible, so as to have a ‘haystack’ in
order to find the ‘needle’ hidden therein.”65
The Court considered Recital 11 of Directive 2002/58, which indicates that
Member States can carry out lawful interceptions, which should be strictly propor-
tionate to the intended purpose that is considered necessary for the functioning of
a democratic society. All actions are to be measured against available adequate
safeguards.
The case examined whether general and indiscriminate transmission of traffic and
location data was allowed under Article 15(1) in the given circumstances.
“…it should be noted that the transmission of traffic data and location data to
persons other than users, such as security and intelligence agencies, derogates
from the principle of confidentiality. Where that operation is carried out, as in
the present case, in a general and indiscriminate way, it has the effect of making
the exception to the obligation of principle to ensure the confidentiality of data
the rule, whereas the system established by Directive 2002/58 requires that that
exception remain an exception.
Lastly, given the significant amount of traffic data and location data that can be
retained continuously by a general retention measure and the sensitive nature
of the information that data may provide, the mere retention of that data by
the providers of electronic communications services entails a risk of abuse and
unlawful access.
It follows that national legislation requiring providers of electronic communi-
cations services to disclose traffic data and location data to the security and
intelligence agencies by means of general and indiscriminate transmission
exceeds the limits of what is strictly necessary and cannot be considered to be
justified, within a democratic society, as required by Article 15(1) of Directive
2002/58, read in the light of Article 4(2) TEU and Articles 7, 8 and 11 and
Article 52(1) of the Charter.
In the light of all the foregoing considerations, …precluding national legislation
enabling a State authority to require providers of electronic communications
services to carry out the general and indiscriminate transmission of traffic data
and location data to the security and intelligence agencies for the purpose of
safeguarding national security.”
65Privacy International v Secretary of State for Foreign and Commonwealth Affairs and Others.
Case C-623/17. ECLI:EU:C:2020:790.
50 1 Introduction to EU Data Protection Law
Another judgement that deals with the interpretation of Article 15(1) of the ePrivacy
Directive read with fundamental rights under the Charter of Fundamental Rights
is Ministerio Fiscal. The judgement was about a situation when public authorities
wanted to access data concerning SIM cards so that they could identify individuals
using stolen mobile phones.
Facts.
“Mr Hernandez Sierra lodged a complaint with the police for a robbery, which
took place on 16 February 2015, during which he was injured and his wallet
and mobile telephone were stolen.
On 27 February 2015, the police requested the investigating magistrate to order
various providers of electronic communications services to provide (i) the tele-
phone numbers that had been activated between 16 February and 27 February
2015 with the International Mobile Equipment Identity code (‘the IMEI code’)
of the stolen mobile telephone and (ii) the personal data relating to the identity
of the owners or users of the telephone numbers corresponding to the SIM
cards activated with the code, such as their surnames, forenames and, if need
be, addresses.
By order of 5 May 2015, the investigating magistrate refused that request.
The latter held that the measure requested would not serve to identify the
perpetrators of the offence. Moreover, it refused to grant the request on the
ground that Law 25/2007 limited the communication of the data retained by
the providers of electronic communications services to serious offences. Under
the Criminal Code, serious offences are punishable by a term of imprisonment
of more than five years, whereas the facts at issue in the main proceedings did
not appear to constitute such an offence.”
must be interpreted as meaning that public authorities’ access to data for the purpose
of identifying the owners of SIM cards activated with a stolen mobile telephone,
such as the surnames, forenames and, if need be, addresses of the owners of the SIM
cards, entails interference with their fundamental rights, enshrined in those articles
of the Charter, which is sufficiently serious to entail that access being limited, in the
area of prevention, investigation, detection and prosecution of criminal offences, to
the objective of fighting serious crime and, if so, by reference to which criteria the
seriousness of the offence at issue must be assessed.”67
“.. the access of public authorities to such data constitutes an interference with
the fundamental right to respect for private life, enshrined in Article 7 of the
Charter, even in the absence of circumstances which would allow that interfer-
ence to be defined as ‘serious’, without it being relevant that the information in
question relating to private life is sensitive or whether the persons concerned
have been inconvenienced in any way. Such access also constitutes interfer-
ence with the fundamental right to the protection of personal data guaranteed
in Article 8 of the Charter, as it constitutes processing of personal data..
As regards the objectives that are capable of justifying national legislation, such
as that at issue in the main proceedings, governing the access of public author-
ities to data retained by providers of electronic communications services and
thereby derogating from the principle of confidentiality of electronic commu-
nications, it must be borne in mind that the list of objectives set out in the
first sentence of Article 15(1) of Directive 2002/58 is exhaustive, as a result
of which that access must correspond, genuinely and strictly, to one of those
objectives
As regards the objective of preventing, investigating, detecting and prosecuting
criminal offences, it should be noted that the wording of the first sentence of
Article 15(1) of Directive 2002/58 does not limit that objective to the fight
against serious crime alone, but refers to ‘criminal offences’ generally.
In that regard, the Court has admittedly held that, in areas of prevention, inves-
tigation, detection and prosecution of criminal offences, only the objective
of fighting serious crime is capable of justifying public authorities’ access
to personal data retained by providers of electronic communications services
which, taken as a whole, allow precise conclusions to be drawn concerning the
private lives of the persons whose data is concerned.
.. the objective pursued by legislation governing that access must be propor-
tionate to the seriousness of the interference with the fundamental rights in
question that that access entails..
“…the sole purpose of the request at issue in the main proceedings, by which the
police seeks, for the purposes of a criminal investigation, a Court authorisation
to access personal data retained by providers of electronic communications
services, is to identify the owners of SIM cards activated over a period of 12
days with the IMEI code of the stolen mobile telephone...that request seeks
access to only the telephone numbers corresponding to those SIM cards and
to the data relating to the identity of the owners of those cards, such as their
surnames, forenames and, if need be, addresses. By contrast, those data do
not concern, as confirmed by both the Spanish Government and the Public
Prosecutor’s Office during the hearing, the communications carried out with
the stolen mobile telephone or its location.
It is therefore apparent that the data concerned by the request for access at issue
in the main proceedings only enables the SIM card or cards activated with the
stolen mobile telephone to be linked, during a specific period, with the identity
of the owners of those SIM cards. Without those data being cross-referenced
with the data pertaining to the communications with those SIM cards and the
location data, those data do not make it possible to ascertain the date, time,
duration and recipients of the communications made with the SIM card or cards
in question, nor the locations where those communications took place or the
frequency of those communications with specific people during a given period.
Those data do not therefore allow precise conclusions to be drawn concerning
the private lives of the persons whose data is concerned.
5 ePrivacy Directive 53
Facts
Promusicae, a non-profit organisation of producers and publishers, filed an appli-
cation for preliminary measures against Telefónica, a commercial business that
provides Internet connection services. Promusicae requested Telefónica to reveal
identities and physical addresses of people who were using its Internet access
services, and whose IP address and date and time of connection information was
available. Promusicae claimed that KaZaA file exchange program (peer-to-peer or
P2P) was used to share phonograms whose exploitation rights were held by members
of Promusicae.
Promusicae claimed that KaZaA users violated intellectual property rights. Tele-
fónica claimed that the scope of law does not extend to civil procedures or proceed-
ings and extends to criminal investigations or to ensure public security and national
defence. Promusicae contended that the law should be read in accordance with Direc-
tives 2000/31, 2001/29 and 2004/48, as well as UN Charter Articles 17 and 47, which
authorise similar requests for other purposes.
Questions
“…whether Directive 2002/58 precludes the Member States from laying down,
with a view to ensuring effective protection of copyright, an obligation to
communicate personal data which will enable the copyright holder to bring
civil proceedings based on the existence of that right…
If that is not the case, it will then have to be ascertained whether it follows
directly from the three Directives expressly mentioned by the national Court
that the Member States are required to lay down such an obligation…”
“Article 5(1) of Directive 2002/58 provides that Member States must ensure
the confidentiality of communications by means of a public communications
network and publicly available electronic communications services, and of the
related traffic data, and must inter alia prohibit, in principle, the storage of that
data by persons other than users, without the consent of the users concerned…
Article 15(1) of Directive 2002/58 thus gives Member States the possibility
of providing for exceptions to the obligation of principle, imposed on them
by Article 5 of that Directive, to ensure the confidentiality of personal
data.”
“…the Member States [may] adopt legislative measures to restrict the obliga-
tion of confidentiality of personal data where that restriction is necessary inter
alia for the protection of the rights and freedoms of others. As they do not
specify the rights and freedoms concerned, those provisions of Article 15(1)
of Directive 2002/58 must be interpreted as expressing the Community legis-
lature’s intention not to exclude from their scope the protection of the right to
property or situations in which authors seek to obtain that protection in civil
proceedings.”
“In the light of all the foregoing, the answer to the national Court’s question
must be that Directives 2000/31, 2001/29, 2004/48 and 2002/58 do not require
the Member States to lay down, in a situation such as that in the main proceed-
ings, an obligation to communicate personal data in order to ensure effective
protection of copyright in the context of civil proceedings.”
Suggested Readings
1. OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, 1980.
2. The OECD Privacy Framework, 2013.
3. Michael Kirby, The history, achievement and future of the 1980 OECD guidelines on privacy,
International Data Privacy Law, Volume 1, Issue 1, February 2011, Pages 6–14, https://doi.org/
10.1093/idpl/ipq002
4. Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on
the protection of individuals with regard to the processing of personal data and on the free
movement of such data OJ L 281, 23.11.1995, p. 31–50.
Suggested Readings 57
5. Commission of the European Communities, First report on the implementation of the Data
Protection Directive (95/46/EC) Brussels, 15.5.2003 COM(2003) 265 final.
6. European Parliament, REPORT on the First Report on the implementation of the Data Protection
Directive (95/46/EC) (COM(2003) 265 – C5-0375/2003 – 2003/2153(INI)) 24 February 2004
https://www.europarl.europa.eu/doceo/document/A-5-2004-0104_EN.html
7. Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016
on the protection of natural persons with regard to the processing of personal data and on
the free movement of such data, and repealing Directive 95/46/EC (General Data Protection
Regulation) OJ L 119, 4.5.2016, p. 1–88.
8. COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT
AND THE COUNCIL Data protection as a pillar of citizens’ empowerment and the EU’s
approach to the digital transition - two years of application of the General Data Protection
Regulation COM/2020/264 final.
9. Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning
the processing of personal data and the protection of privacy in the electronic communications
sector (Directive on privacy and electronic communications) OJ L 201, 31.7.2002, p. 37–47.
10. Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE
COUNCIL concerning the respect for private life and the protection of personal data in
electronic communications and repealing Directive 2002/58/EC (Regulation on Privacy and
Electronic Communications) COM/2017/010 final - 2017/03 (COD).
11. Charter of Fundamental Rights of the European Union OJ C 326, 26.10.2012, p. 391–407.
12. The Digital Personal Data Protection Act, 2023.
13. EDPB Guidelines 07/2020 on the concepts of controller and processor in the GDPR Version
2.1 Adopted on 07 July 2021.
14. Nadezhda Purtova, ‘The law of everything. Broad concept of personal data and future of EU
data protection law’ (2018) 10(1) Law, Innovation and Technology 40–81.
15. Frederik J. Zuiderveen Borgesius, ‘Personal data processing for behavioural targeting: which
legal basis?’, (2015) 5(3) International Data Privacy Law 163–176, https://doi.org/10.1093/
idpl/ipv011
16. Michael Veale and Frederik Zuiderveen Borgesius, ‘Adtech and real-time bidding under
European data protection law’ (2022) 23(2) German Law Journal 226–256.
17. Rechnungshof (C-465/00) v Österreichischer Rundfunk and Others and Christa Neukomm (C-
138/01) and Joseph Lauermann (C-139/01) v Österreichischer Rundfunk. Joined cases C-465/
00, C-138/01 and C-139/01. ECLI:EU:C:2003:294.
18. Heinz Huber v Bundesrepublik Deutschland. Case C-524/06. ECLI:EU:C:2008:724.
19. VS v Inspektor v Inspektorata kam Visshia sadeben savet. Case C-180/21.
ECLI:EU:C:2022:967.
20. Advocate General Opinion in La Quadrature du Net v Premier ministre, Ministère de la Culture
Case C-470/21.
21. VQ v Land Hessen, Request for a preliminary ruling from the Verwaltungsgericht Wiesbaden,
C-272/19 Land Hessen ECLI:EU:C:2020:535.
22. Michèle Finck, ‘Cobwebs of control: the two imaginations of the data controller in EU law’
(2021) 11(4) International Data Privacy Law 333–347, https://doi.org/10.1093/idpl/ipab017
23. Google Spain SL v. Agencia Española de Protección de Datos Case C-131/12
ECLI:EU:C:2014:317.
24. Proceedings brought by Tietosuojavaltuutettu. Judgment of the Court (Grand Chamber) of 10
July 2018. Case C-25/17. ECLI:EU:C:2018:551.
25. Unabhängiges Landeszentrum für Datenschutz Schleswig-Holstein v Wirtschaftsakademie
Schleswig-Holstein GmbH. Case C-210/16. ECLI:EU:C:2018:388
26. Peter Nowak v Data Protection Commissioner. Case C-434/16. ECLI:EU:C:2017:994.
27. Patrick Breyer v Bundesrepublik Deutschland. Case C-582/14. ECLI:EU:C:2016:779.
28. Michèle Finck, Frank Pallas, ‘They who must not be identified—distinguishing personal from
non-personal data under the GDPR’, (2020) 10(1) International Data Privacy Law 11–36,
https://doi.org/10.1093/idpl/ipz026
58 1 Introduction to EU Data Protection Law
29. Scarlet Extended SA v Société belge des auteurs, compositeurs et éditeurs SCRL (SABAM).
C-70/10. ECLI:EU:C:2011:771.
30. TK v Asociaţia de Proprietari bloc M5A Scara-A Case C-708/18 ECLI:EU:C:2019:1064.
31. František Ryneš v Úřad pro ochranu osobních údajů. Case C-212/13. ECLI:EU:C:2014:2428.
32. Meta Platforms v Verbraucherzentrale Bundesverband eV Case C-252/21
ECLI:EU:C:2023:537.
33. La Quadrature du Net and Others v Premier ministre and Others. Joined Cases C-511/18,
C-512/18 and C-520/18. ECLI:EU:C:2020:791
34. Peter Puškár v Finančné riaditeľstvo Slovenskej republiky, Kriminálny úrad finančnej správy
C-73/16.
35. Privacy International v Secretary of State for Foreign and Commonwealth Affairs and Others.
Case C-623/17. ECLI:EU:C:2020:790.
36. Proceedings brought by Ministerio Fiscal. C-207/16. ECLI:EU:C:2018:788
37. Productores de Música de España (Promusicae) v Telefónica de España SAU Case C-275/06.
ECLI:EU:C:2008:54.
38. Raphael Gellert, ‘We Have Always Managed Risks in Data Protection Law: Understanding
the Similarities and Differences between the Rights-Based and the Risk-Based Approaches to
Data Protection’ (2016) 2 Eur Data Prot L Rev 481.
39. V. Cimina, “The data protection concepts of ‘controller’, ‘processor’ and ‘joint controllership’
under Regulation (EU) 2018/1725” (2021) 21 ERA Forum 639–654 https://doi.org/10.1007/
s12027-020-00632-8
40. Chris Jay Hoofnagle, Bart van der Sloot & Frederik Zuiderveen Borgesius, ‘The Euro-
pean Union general data protection regulation: what it is and what it means’ (2019) 28(1)
Information & Communications Technology Law, https://doi.org/10.1080/13600834.2019.157
3501
41. Marianna Rantou, ‘The growing tension between copyright and personal data protection on
an online environment: The position of Internet Service Providers according to the European
Court of Justice’, (2012) 3(2) European Journal for Law and Technology.
42. Fanny Coudert, Evi Werkers, ‘In The Aftermath of the Promusicae Case: How to Strike the
Balance?’, (2010) 18(1) International Journal of Law and Information Technology 50–71.
https://doi.org/10.1093/ijlit/ean015
43. Michèle Finck, Frank Pallas, ‘They who must not be identified—distinguishing personal from
non-personal data under the GDPR’, (2020) 10(1) International Data Privacy Law 11–36.
https://doi.org/10.1093/idpl/ipz026
44. Irene Kamara, ‘Exam Scripts Are Personal Data According to AG Kokott’ (2017) 3(3) European
Data Protection Law Review 402–405
45. Frederik Zuiderveen Borgesius, ‘The Breyer Case of the Court of Justice of the European
Union: IP Addresses and the Personal Data Definition’ (2017) 3(1) European Data Protection
Law Review 130–137
46. Karolina Podstawa, ‘Peter Nowak v Data Protection Commissioner: You Can Access Your
Exam Script, Because It Is Personal Data’ (2018) 4(2) European Data Protection Law Review
252–259
Chapter 2
EU Data Protection Law Framework
1 Introduction
In the previous chapter, we have discussed several basic concepts of data protection,
which are personal data, the data controller and legal basis of processing (including
consent, legitimate interests and the necessity for the performance of a contract). A
data controller who processes personal data must have a legal basis for processing.
This chapter delves into the requirement of consent as a legal basis for processing.
It also discusses the principles of processing that a data controller must observe
when processing personal data. Finally, it discusses exceptions under the data protec-
tion framework, including the personal or household exemption and the journalistic
purpose exemption.
2 Principles of Processing
With the help of different judgements delivered by the ECJ and the CJEU, this
section introduces the data protection principles concerning Purpose specification
and Collection Limitation, Accuracy, Accountability and Storage Limitation.
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024 59
I. Gupta et al., Introduction to Data Protection Law,
https://doi.org/10.1007/978-981-97-6355-9_2
60 2 EU Data Protection Law Framework
1EDPB Guidelines 4/2019 on Article 25 Data Protection by Design and by Default Version 2.0
Adopted on 20 October 2020.
2 Principles of Processing 61
Therefore, there could be possible errors in the collected data. However, a controller
can always give a data subject an option to review the submitted data and take
necessary measures to correct incorrect personal data. This opportunity would count
towards reasonable steps taken by data controllers to process data accurately. Data
not processed accurately can create difficulties. For example, a credit rating agency
calculating credit scores for a data subject could give erroneous results if the data
is not processed accurately by data controllers. It may lead to the refusal of a loan
application by a financial organisation if the data available with a credit rating agency
is incorrect. Lastly, the process to update records should not be complicated. It should
not be unnecessarily lengthy or cumbersome.
The scope, content and precision of the accuracy principle must be understood.
The scope of the accuracy principle is that it applies to all personal data processed
under the scope of the GDPR.2 The content of the accuracy principle can be under-
stood as follows: “Article 5(1)(d) GDPR encompasses two separate concepts of
accuracy: factual accuracy and temporal accuracy. Both concepts are related, and
both can be subsumed by a broad understanding of factual accuracy.”3 Accuracy
generally means accuracy as to a matter of fact.4 The precision of the accuracy prin-
ciple is that accuracy must be ascertained in the “light of the purpose for which that
data was collected.”5 The accuracy principle arguably protects people from making
decisions based on wrong information, and also applies to opinions.6
2.3 Accountability
Article 5(2) provides the principle of accountability: “The controller shall be respon-
sible for, and be able to demonstrate compliance with, paragraph 1.”7 It suggests that
accountability requires the data controller to demonstrate compliance with all other
data protection principles mentioned in paragraph 1.
2 Dara Hallinan, Frederik Zuiderveen Borgesius, ‘Opinions can be incorrect (in our opinion)! On
data protection law’s accuracy principle’ (2020) 10(1) International Data Privacy Law 1–10. https://
doi.org/10.1093/idpl/ipz025.
3 Dara Hallinan, Frederik Zuiderveen Borgesius, ‘Opinions can be incorrect (in our opinion)! On
data protection law’s accuracy principle’ (2020) 10(1) International Data Privacy Law 1–10. https://
doi.org/10.1093/idpl/ipz025.
4 Article 29 Working Party, Guidelines on the Implementation of the Court of Justice of the European
Union Judgment on ‘Google Spain and inc v. Agencia Española de Protección De Datos (AEPD)
and Mario Costeja González’ C-131/12 (14/EN WP 225, 2014), 15.
5 Peter Nowak v Data Protection Commissioner C434/16 ECLI:EU:C:2017:994, para 53.
6 Dara Hallinan, Frederik Zuiderveen Borgesius, ‘Opinions can be incorrect (in our opinion)! On
data protection law’s accuracy principle’ (2020) 10(1) International Data Privacy Law 1–10. https://
doi.org/10.1093/idpl/ipz025.
7 Article 5(2), GDPR.
2 Principles of Processing 63
. The data controller is responsible for informing the supervisory authority about
the data breach.
“(e) kept in a form which permits identification of data subjects for no longer
than is necessary for the purposes for which the personal data are processed;
personal data may be stored for longer periods insofar as the personal data
will be processed solely for archiving purposes in the public interest, scien-
tific or historical research purposes or statistical purposes in accordance with
Article 89(1) subject to implementation of the appropriate technical and organ-
isational measures required by this Regulation in order to safeguard the rights
and freedoms of the data subject (‘storage limitation’);”
The judgement concerns the interpretation of the purpose limitation and storage
limitation principle when another database is created by the data controller for storing
information. The purpose limitation principle is a cornerstone of data protection law
and its strong enforcement can help safeguard data subjects’ rights.9
Facts
The facts involved Digi, a leading internet service and television provider in Hungary.
Digi had created a test database copying the data of one-third of its private customers
and stored them in a database called ‘digihu’ database. Digi became aware that an
ethical hacker had gained access to the personal data of 322,000 persons from the test
database. Thus, Digi concluded a confidentiality agreement with the hacker, offering
them a reward. Digi also corrected the fault, enabling access to the test database.
Digi then notified the Authority of the data breach and an investigation was opened.
The Authority found infringement of Article 5(1)(b) and (e) of Regulation 2016/
679 as Digi had not immediately deleted the test database after correcting the fault.
This had resulted in a large amount of personal data being stored in the test database
for 18 months without any purpose. Digi was asked to review its databases and fined
around EUR 248 000.
The essential question was whether the purpose limitation and storage limitation
principles allow the data controller to store data, which was collected for a limited
legitimate purpose, in a parallel database.
Questions
The Fővárosi Törvényszék (Budapest High Court, Hungary) referred the following
questions to the Court for a preliminary ruling:
personal data which were otherwise collected and stored for a limited legiti-
mate purpose compatible with the principle of ’storage limitation’ established
in Article 5(1)(e) of [Regulation 2016/679]?.”
“[I]t is thus apparent from the wording of that provision that it comprises
two requirements, one relating to the purposes of the initial collection of the
personal data and the other concerning the further processing of those data.
Regarding, first, the requirement that personal data are to be collected for
specified, explicit and legitimate purposes, it follows from the case-law of
the Court that that requirement implies, first of all, that the purposes of the
processing are to be identified at the latest at the time of the collection of the
personal data, next, that the purposes of that processing are to be clearly stated
and, finally, that the purposes of that processing are to guarantee, inter alia, the
lawfulness of the processing of those data, within the meaning of Article 6(1)
of Regulation 2016/679.
With regard, secondly, to the requirement that the personal data are not to
be the subject of further processing which is incompatible with those purposes,
it should be pointed out, on the one hand, that the recording and storage, by
the controller, in a newly created database, of personal data stored in another
database constitutes ‘further processing’ of those data.
The concept of ‘processing’ is defined broadly in Article 4(2) of Regulation
2016/679 as covering any operation or set of operations which is performed on
personal data or on sets of personal data, whether or not by automated means,
such as, inter alia, the collection, recording and storage of those data.
Moreover, in accordance with the usual meaning of the term ‘further’ in
everyday language, any processing of personal data which is subsequent to the
initial processing constituted by the initial collection of those data constitutes
‘further’ processing of those data, regardless of the purpose of that further
processing.
It is apparent from a combined reading of Article 5(1)(b), Article 6(1)(a) and
Article 6(4) of Regulation 2016/679 that the question of the compatibility of
the further processing of personal data with the purposes for which those data
were initially collected arises only if the purposes of that further processing
are not identical to the purposes of the initial collection.
Moreover, it follows from that Article 6(4), read in the light of Recital 50
of that Regulation, that, where the processing for a purpose other than that for
which the data have been collected is not based on the data subject’s consent
or on an EU or Member State law, it is necessary, in order to ascertain whether
processing for another purpose is compatible with the purpose for which the
2 Principles of Processing 67
personal data are initially collected, to take into account, inter alia, first, any
link between the purposes for which the personal data have been collected and
the purposes of the intended further processing; secondly, the context in which
the personal data have been collected, in particular regarding the relationship
between data subjects and the controller; thirdly, the nature of the personal
data; fourthly, the possible consequences of the intended further processing
for data subjects; and finally, fifthly, the existence of appropriate safeguards in
both the original and intended further processing operations.
[T]hose criteria reflect the need for a specific, logical and sufficiently close
link between the purposes for which the personal data were initially collected
and the further processing of those data, and ensure that such further processing
does not deviate from the legitimate expectations of the subscribers as to the
subsequent use of their data.
Furthermore, in the third place, [..] those criteria limit the reuse of personal
data previously collected by ensuring a balance between, on the one hand,
the need for predictability and legal certainty regarding the purposes of the
processing of personal data previously collected and, on the other hand, the
recognition of a degree of flexibility for the controller in the management of
those data, and thereby contribute to the attainment of the objective of ensuring
a consistent and high level of protection of natural persons, which is set out in
Recital 10 of Regulation 2016/679."
timely and transparent manner to the data subject, preferably during data collection.
Data subjects’ expectations about the second round of processing of personal data is
a further test to ensure fair processing. The Court stated that,
“it is apparent from the order for reference that the personal data were initially
collected by Digi, the controller, for the purposes of the conclusion and
performance of subscription contracts with its private customers.
Second, the parties to the main proceedings are not in agreement on the
specific purpose of the recording and storage by Digi, in the test database, of
the personal data at issue. While Digi argues that the specific purpose of the
creation of the test database was to guarantee access to the subscribers’ data
until the errors were corrected, with the result that that purpose was identical
to the purposes pursued by the initial collection of those data, the Authority
maintains that the specific purpose of the further processing was distinct from
those purposes since it was the conducting of tests and the correction of errors.
It is apparent from the order for reference that the test database was created
by Digi in order to be able to carry out tests and correct errors, so that it is in the
light of those purposes that it falls to the referring Court to assess the compati-
bility of the further processing with the purposes of the initial collection, being
the conclusion and performance of subscription contracts… Third, regarding
that assessment, it should be pointed out that there is a specific link between the
conducting of tests and the correction of errors affecting the subscriber database
and the performance of the subscription contracts of private customers, in that
such errors may be prejudicial to the provision of the contractually agreed
service, for which the data were initially collected…
…[S]uch processing does not deviate from the legitimate expectations of
those customers as to the subsequent use of their personal data. It is not, further-
more, apparent from the order for reference that those data were sensitive in
whole or in part or that the further processing at issue of those data, as such,
had detrimental consequences for the subscribers or was not accompanied by
appropriate safeguards, which it is, in any event, for the referring Court to
verify.”
for the conducting of those tests and the correction of those errors.”12 It entails that
legal basis of data processing may be questioned when the data controller exceeds the
storage time, which in turn must be synchronised with the purpose limitation prin-
ciple. An otherwise legitimate processing may turn invalid owing to a data controller
exceeding the data storage time. The Court explained –
“In the first place, it should be pointed out that, under Article 5(1)(e) of Regu-
lation 2016/679, personal data are to be kept in a form which permits identi-
fication of data subjects for no longer than is necessary for the purposes for
which the personal data are processed.
It is thus unequivocally clear from the wording of that article that the prin-
ciple of ‘storage limitation’ requires the controller to be able to demonstrate, in
accordance with the principle of accountability referred to in paragraph 24 of
the present judgment, that personal data are kept only for as long as is necessary
for the purposes for which they were collected or for which they have been
further processed.
It follows that even initially lawful processing of data may over time become
incompatible with Regulation 2016/679 where those data are no longer neces-
sary for such purposes and that the data must be erased when those purposes
have been served.
That interpretation is consistent, in the second place, with the context of
Article 5(1)(e) of Regulation 2016/679.
In this case, Digi argued that it was due to an oversight that the personal
data of a portion of its private customers stored in the test database were not
deleted after the tests had been conducted and the errors had been corrected.
In that regard, it is sufficient to point out that that argument is not relevant
for the purposes of assessing whether data were kept for longer than was
necessary for the purposes for which they were further processed, in breach of
the principle of ‘storage limitation’, laid down in Article 5(1)(e) of Regulation
2016/679."
3 Consent
The GDPR provides six legal grounds of processing. A data controller processing
personal data must rely on one of these legal bases to justify the processing. Consent
is one of the most important lawful bases for processing personal data, as suggested
by the Meta case discussed in Chapter 1. According to the GDPR, consent must
be sought through a clear affirmative act by the data subject agreeing to the data
processing. There are four attributes of valid consent: freely given, specific, informed
and unambiguous.13 This section discusses judgements to ascertain the meaning
associated with all these terms.
The judgement involving Orange discusses the concept of consent and how it is imple-
mented under the old Directive and the GDPR. Orange Romania, the data controller,
provided mobile communication services in Romania. In 2018, the Romanian Data
Protection Authority imposed a fine on the data controller, citing that they were
involved in storing copies of customer identity documents. Orange Romania could
not show demonstrable evidence suggesting that customers had consented to such
processing. Orange Romania was asked to destroy the copies of such documents.
Facts
Orange Romania had concluded contracts with their subscribers and had attached
copies of personal identity documents to the concluded contracts. The relevant clauses
of the pre-printed form were:
13Article 7, GDPR.
14Orange Romania SA v Autoritatea Naţională de Supraveghere a Prelucrării Datelor cu Caracter
Personal (ANSPDCP) Case C - 61/19.
3 Consent 71
the conditions for its termination, the conditions for accessing and using the
services, including service coverage areas, …;
(ii), Orange România has provided the customer with all the necessary
information to enable him or her to give his or her unvitiated, express, free
and specific consent to the conclusion and express acceptance of the contract,
including all the contractual documentation, the General Terms and Conditions
for using Orange’s services and the Brochure of Tariffs and Services;
(iii) he or she has been informed of, and has consented to, the following:
- the processing of personal data for the purposes referred to in Article 1.15
of the General Terms and Conditions for using Orange’s services;
- the storage of copies of documents containing personal data for identifi-
cation purposes;
- the agreement for the processing of personal data (contact number and
email address) for direct marketing purposes;
- the agreement for the processing of personal data (contact number and
email address) for market research purposes;”
“(1) For the purposes of Article [2](h) of Directive 95/46, what conditions must
be fulfilled in order for an indication of wishes to be regarded as specific and
informed?
(2) For the purposes of Article 2(h) of Directive 95/46, what conditions
must be fulfilled in order for an indication of wishes to be regarded as freely
given?…
…whether Article 2(h) and Article 7(a) of Directive 95/46 and Article 4(11)
and Article 6(1)(a) of Regulation 2016/679 must be interpreted as meaning that
a contract for the provision of telecommunications services which contains a
clause stating that the data subject has been informed of, and has consented
to, the collection and storage of a copy of his or her identity document for
identification purposes is capable of demonstrating that that person’s consent
has been validly given, as provided for in those provisions, to that collection
and storage.”
The essential question was whether Orange Romania did indulge in practices that
exudes the requirements of freely given, specific and informed consent of users.
They did include a provision in the user agreement that suggested that a data subject
was well informed and further on the data subjects did share consent to process their
identity documents. An answer to the above questions is related to the idea of fairness
under data protection law. Recital 38 of the Directive 95/46 provides:
“if the processing of data is to be fair, the data subject must be in a position to
learn of the existence of a processing operation and, where data are collected
from him, must be given accurate and full information, bearing in mind the
circumstances of the collection.”
Source Recital 38
The ethos of fairness is inextricably connected with the information the data
controllers share with the data subjects. Sharing accurate information helps provide
the requisite knowledge about data processing to the data subject. Also important is
the method of providing the information. It also relates to informed consent, which
requires relevant information to be provided to the data subject before seeking their
consent. The idea of consent was provided by Article 2(h) of the old Directive, which
states:
“the data subject’s consent shall mean any freely given specific and informed
indication of his wishes by which the data subject signifies his agreement to
personal data relating to him being processed.”
the request must be clear, concise and not unnecessarily disruptive to the use
of the service for which it is provided.
(42) Where processing is based on the data subject’s consent, the controller
should be able to demonstrate that the data subject has given consent to the
processing operation. In particular in the context of a written declaration on
another matter, safeguards should ensure that the data subject is aware of the
fact that and the extent to which consent is given. In accordance with Council
Directive 93/13/EEC [of 5 April 1993 on unfair terms in consumer contracts,
(OJ 1993 L 95, p. 29)], a declaration of consent pre-formulated by the controller
should be provided in an intelligible and easily accessible form, using clear
and plain language and it should not contain unfair terms. For consent to
be informed, the data subject should be aware at least of the identity of the
controller and the purposes of the processing for which the personal data are
intended. Consent should not be regarded as freely given if the data subject has
no genuine or free choice or is unable to refuse or withdraw consent without
detriment."
Article 7(1), (2) and (4) of Regulation 2016/679.
“1. Where processing is based on consent, the controller shall be able to
demonstrate that the data subject has consented to processing of his or her
personal data.
2. If the data subject’s consent is given in the context of a written declaration
which also concerns other matters, the request for consent shall be presented
in a manner which is clearly distinguishable from the other matters, in an
intelligible and easily accessible form, using clear and plain language. Any
part of such a declaration which constitutes an infringement of this Regulation
shall not be binding.
4. When assessing whether consent is freely given, utmost account shall
be taken of whether, inter alia, the performance of a contract, including the
provision of a service, is conditional on consent to the processing of personal
data that is not necessary for the performance of that contract."
share consent. If enough and clear consent options are shared, then it is less likely
that consent was ambiguous.
The GDPR requires that the controller follows a framework that allows data
subjects to share consent through an easily accessible and intelligible format. The
data subject should not need to look for information; rather, the data controller
should provide reasonable means to easily access information. Consent as a lawful
basis should be clearly identified with the purpose of processing. Further, the data
controller should use clear and plain language while providing information to the
data subject.
Consent is also closely related to the idea of fair processing. Fair and transparent
processing would include sharing of pre-processing information, fair disclosure of
data, transparent means adopted by data controllers at the time of transferring of data,
providing adequate and simple opportunities for sharing consent and withdrawal of
consent and expressing at all times, terms related to privacy in a clear, plain and
simple language.
Article 5 of the GDPR reflects upon processing fairly and lawfully.
“…during the procedure for concluding the contracts at issue in the main
proceedings, its sales agents informed the customers concerned, before
concluding the contracts, inter alia, of the purposes of collecting and storing
copies of the identity documents and of their choice as to that collection and
storage, before obtaining their oral consent to that collection and storage.
76 2 EU Data Protection Law Framework
15 Opinion of Advocate General Szpunar delivered on 4 March 2020. Orange Romania SA v Autori-
tatea Naţională de Supraveghere a Prelucrării Datelor cu Caracter Personal (ANSPDCP). Case C-61/
19. ECLI:EU:C:2020:158.
3 Consent 77
The situation suggests that the data controller did not seek active participation
from the data subject. It is required that data subjects share their clear affirmative
action when sharing consent. Besides, informed consent is questionable because
Orange did not make it absolutely clear that the refusal to share the consent about the
storage of identification documents would have any bearing on the service at hand.
The Court suggested:
“[I]t is for the data controller to demonstrate that the data subject has, by active
behaviour, given his or her consent to the processing of his or her personal
data and that he or she has obtained, beforehand, information relating to all
the circumstances surrounding that processing, in an intelligible and easily
accessible form, using clear and plain language, allowing that person easily
to understand the consequences of that consent, so that it is given with full
knowledge of the facts. A contract for the provision of telecommunications
services which contains a clause stating that the data subject has been informed
of, and has consented to, the collection and storage of a copy of his or her
identity document for identification purposes is not such as to demonstrate
that that person has validly given his or her consent, as provided for in those
provisions, to that collection and storage, where
– the box referring to that clause has been ticked by the data controller before
the contract was signed, or where – the terms of that contract are capable of
misleading the data subject as to the possibility of concluding the contract in
question even if he or she refuses to consent to the processing of his or her
data, or where
– the freedom to choose to object to that collection and storage is unduly
affected by that controller in requiring that the data subject, in order to refuse
consent, must complete an additional form setting out that refusal.”
16 Article 7, GDPR.
78 2 EU Data Protection Law Framework
possible manner with no inconsistency. The controller should avoid sharing unneces-
sary, lengthy documents where important information cannot be found easily. In fact,
the controller should use effective tools to highlight important excerpts of privacy
policies for data subjects.
Orange Romania raises the importance of steps taken by data controllers during
the pre-stage processing of personal data. It explains the meaning associated with
active, freely given and informed consent. Data controllers must ensure that data
subjects should have complete information and should not be confused because of
misleading information.
Another judgement that discusses the concept of consent is the CJEU’s decision in
Planet49. The decision discussed consent in the context of cookies. It is important to
introduce cookies and their Regulation under the ePrivacy Directive before discussing
the Planet49 judgement.
Cookies and similar technologies are used to track customers’ online activities.
Essentially, cookies can help the data controller understand user choices, interests
and online behaviour. Therefore, advertisers can target customers based on their
behavioural patterns and time spent on the Internet.
In this context, consent plays a crucial role in allowing customers to decide whether
they want to allow cookies. The controller should clearly state the purposes for using
cookies and allow the data subjects to select one or all purposes. However, some
cookies are deemed strictly necessary from the point of operation of websites. If
those cookies are rejected, some of the website features won’t work well because
those technical cookies connect the user’s computers to the data controller’s website.
Usually, websites mention that they use cookies for various purposes and provide
users with a link to the cookie policy. Websites also categorise cookies by purpose,
including strictly necessary, performance, functional and marketing cookies. The
users are free to accept, reject, or choose the cookies they wish to allow.
It is important to facilitate the individual’s understanding of the implications
of consenting. There is a need to clearly delineate the purposes of using cookies.
Customers should have the choice to freely decide which cookies to allow. It is
important not to bundle purposes by presenting only the choice to accept all cookies
and not the choice to accept cookies by purpose. Besides, the data subject should
have the opportunity to exercise the right to opt out of using cookies. Further, the
check-boxes must not be pre-selected. When sliders are used, the slider should not
be enabled by default, expecting that the data subject can disable such an option.
“I agree to the web analytics service Remintrex being used for me. This has the
consequence that [Planet49] sets cookies, which enables Planet49 to evaluate
my surfing and use behaviour on websites of advertising partners and thus
enables advertising by Remintrex that is based on my interests. (…)”
“(1)(a) Does it constitute a valid consent within the meaning of Article 5(3)
and Article 2(f) of Directive [2002/58], read in conjunction with Article 2(h) of
Directive [95/46], if the storage of information, or access to information already
stored in the user’s terminal equipment, is permitted by way of a pre-checked
check-box which the user must deselect to refuse his or her consent?
(b) For the purposes of the application of Article 5(3) and of Article 2(f) of
Directive [2002/58] read in conjunction with Article 2(h) of Directive [95/46],
does it make a difference whether the information stored or accessed constitutes
personal data?
(c) In the circumstances referred to in Question 1(a), does a valid consent
within the meaning of Article 6(1)(a) of Regulation [2016/679] exist?
(2) What information does the service provider have to give within the scope
of the provision of clear and comprehensive information to the user that has to
be undertaken in accordance with Article 5(3) of Directive [2002/58]? Does
80 2 EU Data Protection Law Framework
this include the duration of the operation of the cookies and the question of
whether third parties are given access to the cookies?’.”
The Court discussed other questions, such as the scope of the ePrivacy Directive.
In ascertaining the scope of the ePrivacy Directive, the Court suggested,
“Article 5(3) of Directive 2002/58 refers to ‘the storing of information and ‘the
gaining of access to information already stored’, without characterizing that
information or specifying that it must be personal data.”
“3. Member States shall ensure that the storing of information, or the gaining of
access to information already stored, in the terminal equipment of a subscriber
or user is only allowed on condition that the subscriber or user concerned
has given his or her consent, having been provided with clear and compre-
hensive information, in accordance with Directive 95/46/EC, inter alia, about
the purposes of the processing. This shall not prevent any technical storage or
access for the sole purpose of carrying out the transmission of a communication
over an electronic communications network, or as strictly necessary in order
for the provider of an information society service explicitly requested by the
subscriber or user to provide the service.”
Data subjects should not be expected to opt out of check-boxes pre-ticked by data
controllers. There are other features of consent that will be discussed in this section,
which are the language and the standard of explicit consent.
The Dutch Data Protection Authority (DDPA) had fined TikTok for e 750,000.
TikTok, in the process of offering its services, had violated children’s privacy. TikTok
did not share the information regarding terms of service and privacy in the appro-
priate language. The chosen language was English instead of Dutch; therefore, the
data subjects could not understand their rights and the risks associated with the TikTok
service. Further, an additional problem was that many of Tiktok’s subscribers were
children; therefore, there was a lot of concern regarding transparency. While trans-
parency is a key measure to protect privacy, the breadth and scope of activities adding
to a transparent transaction are not easily understood.
Defending their position, Tiktok suggested that many of their subscribers would
understand English and that residents would be proficient in the language. Therefore,
providing the terms of service and privacy policy in English would not be a problem
for the subscribers. The DDPA suggested that transparency is a core requirement for
all data controllers. The test of transparency begins with proper information sharing.
The DDPA suggested that there is a higher degree of responsibility attached to data
controllers where data subjects are children. Children would need to be informed in
a clear, plain and simple manner. By sending information in English, in the opinion
of DDPA, TikTok failed to fulfil the requirement of clear, plain and simple language.
Further questions could be asked about the meaning and implementation of the
steps that promote a clear, plain and simple way of informing data subjects. At the
outset, it is assumed that data subjects would read the terms of service and privacy
conditions if they were provided information in a clear, simple and plain manner.
However, there is no way one can guarantee such a thing to happen. After reading,
the data subject must understand the information the data controller has shared.
Therefore, understanding would be absent if reading does not happen in the first
place. Although presenting the terms of service and privacy policy in clear, plain
and simple language would help the data controller check the compliance box, an
unaddressed concern is achieving the overall purpose of the data subject reading and
understanding policy documents to make informed privacy decisions.
The Dutch DPA decision indicates the importance of language for data subjects
reading and understanding information. This approach would help data subjects
make informed and educated decisions about whether they want to use a service.
The following section discusses another mechanism which can help data subjects
make informed decisions – the requirement of explicit consent.
under the GDPR that may be used to verify that the user has understood the infor-
mation. This standard is applicable when processing sensitive personal data, which
carries a high privacy risk to individuals.
“[t]his Regulation does not apply to the processing of personal data by a natural
person in the course of a purely personal or household activity and thus with
no connection to a professional or commercial activity. Personal or household
activities could include correspondence and the holding of addresses, or social
networking and online activity undertaken within the context of such activities.
However, this Regulation applies to controllers or processors which provide the
means for processing personal data for such personal or household activities.”
data processing in smart homes? Reconsidering joint controllership and the household exemption’,
(2020) 10(4) International Data Privacy Law 279–293. https://doi.org/10.1093/idpl/ipaa011.
4 Exemptions Under Data Protection Framework 85
The Lindqvist judgement is one of the earliest decisions that was useful for under-
standing the scope of exemptions prescribed under the old data protection Directive.
The complaint was filed at a time when the use of commercial Internet was slowly
starting.
Facts
Mrs Lindqvist worked as a catechist in a parish in Sweden. In 1998, she created
certain webpages on her personal computer. These pages had information about Mrs
Lindqvist and her 18 colleagues in the parish. The information included personal
details and the job and hobbies of 18 individuals including circumstances they had in
their respective families, telephone numbers and other matters. Mrs Lindqvist also
shared information about a particular colleague of hers who had injured herself.
Mrs Lindqvist did not inform her colleagues about the internet pages and the fact
that she uploaded all such information. She had to remove those pages when others
objected.
The public prosecutor brought charges against Mrs Lindqvist for breaching the EU
Data Protection Directive 95/46 for (1) processing personal data by automatic means
without notifying in written the Swedish DPA, (2) processing sensitive personal data
without authorisation and (3) transferring without authorisation personal data to a
third country.
Questions
There were several questions in this case.
. What is the meaning associated with personal data processed either wholly or
partly by automated means falling under Article 3(1) of Directive 95/46.
. Whether uploading information about individuals would be considered an
exemption under Article 3(2).
. Whether the nature of the information pertaining to the injured colleague, which
was available on the Internet, would be considered personal data relating to health.
Therefore, whether it will fall within the category of special categories of data
under Article 8(1).
There were several arguments made by Mrs Lindqvist and the Government of
Sweden. On the first question, Mrs Lindqvist was against the opinion that automatic
processing of personal data would include mentioning names on a web page. Since
the names were not meta tags, one would not be able to search such pages with the
help of a search engine. In the opinion of the Government, all forms of processing
using a computer would account for the processing of personal data.
According to the Court, processing under Article 2(b) of Directive 95/46 includes
“any operation or set of operations which are performed upon personal data, whether
Other than the personal or household exemption, there is also the exemption of
journalistic purpose which will be discussed by reference to two CJEU judgements.
“(1) Can an activity in which data relating to the earned and unearned income
and assets of natural persons are:
(a) collected from documents in the public domain held by the tax authorities
and processed for publication,
(b) published alphabetically in printed form by income bracket and
municipality in the form of comprehensive lists,
(c) transferred onward on CD-ROM to be used for commercial purposes,
and
Source Recital 37
The Recital allows data processing to happen in derogation of the rights envisaged
under the Directive solely for journalistic purposes. However, the Member States
must ensure that proper safeguards and measures are in place to mitigate the possible
risk of abuse concerning the use of personal data.
The Court answered the first question in the affirmative. Reiterating the scope of
Article 3(1) of the Directive in the context of the case in hand, they suggested the
activities including collection of documents from the public domain, publishing the
documents alphabetically, transfer of data to CD-ROM and processing the data for
text-messaging service involve the processing of personal data under Article 3(1).
4 Exemptions Under Data Protection Framework 89
The data are personal data since they directly or indirectly relate to natural persons
with the help of different identifiers. Therefore, personal data is processed since the
steps involve aspects of the collection, retrieval and storage.
One of the questions dealt with the issue of already available personal data in the
public domain and whether processing such data would fall outside the scope of the
Directive. One such condition has already been explained in the Lindqvist case,34 in
the context of purely personal or household activity and outcome of holding records
of addresses and other correspondences. Following the Lindqvist judgement, the
data controller cannot use this basis if the processing and its outcome extend to an
indefinite number of people. While the reference point in the Lindqvist case was
uploading the data on the Internet for anyone to access, the reference point in the
Satakunnan case was making the data available to an unrestricted number of people
over the mobile telephone.35
Further, the Court argued that “a general derogation from the application of the
Directive in respect of published information would largely deprive the Directive of
its effect. It would be sufficient for the Member States to publish data in order for
those data to cease to enjoy the protection afforded by the Directive.”36 Therefore, the
Court concluded that personal data, and “files which contain solely, and in unaltered
form, material that has already been published in the media, fall within the scope of
application of the Directive.”37
Finally, the Court determined whether the processing activities would fall within
the scope of journalistic purposes. The overarching objective under the Directive is
not to stem data flow but equally protect natural persons’ fundamental right to privacy
and personal data protection. At times, there is a need to reconcile these rights with
freedom of expression in a democratic society. Member States must take steps for
such reconciliation. The derogations and limitations must be limited to the scope of
solely journalistic purposes or the purpose of artistic or literary expression.38
The Court stated few principles that can help understand the journalistic purpose
exemption. First, following the Advocate General, the Court stated that “apparent
from the legislative history of the Directive, the exemptions and derogations provided
for in Article 9 of the Directive apply not only to media undertakings but also to every
person engaged in journalism.”39
Secondly, the fact that the data has been published within the public domain
with the intention of profit-making does not seem prima facie to put such activity
outside the scope of an activity undertaken ‘solely for journalistic purposes’. In fact, a
degree of commercial activity and success is even attached to those who are attached
to professional journalistic activities.
Lastly, the medium and methods adopted to disseminate the outcome of such
activity are immaterial. Therefore, it could possibly be carried out on the Internet as
well.
Therefore,
“It follows from all of the above that activities such as those involved in the
main proceedings, relating to data from documents which are in the public
domain under national legislation, may be classified as ‘journalistic activities’
if their object is the disclosure to the public of the information, opinions or
ideas, irrespective of the medium which is used to transmit them. They are
not limited to media undertakings and may be undertaken for profit-making
purposes.”
This judgement reflects on the data protection norms to follow while conducting jour-
nalistic activities. It explains who could be a journalist and the journalist’s role and
further reflects on whether formal training is required to become a journalist. Further,
it reflects upon the possibility of disseminating journalistic material on different
media and the objective of carrying out a journalistic activity.
Facts
Buivids reflects on the scope of journalism and its cross-section with the data
protection principles and the data protection framework in the EU.
“Mr Buivids made a video recording in a station of the Latvian national police
while he was making a statement in the context of administrative proceedings
which had been brought against him.
Mr Buivids published the recorded video (‘the video in question’), which
showed police officers going about their duties in the police station, on the
internet site www.youtube.com, which is an internet site that allows users to
publish, share and watch videos.
After that video had been published, the National Data Protection Agency
found, by decision of 30 August 2013, that Mr Buivids had infringed
Article 8(1) of the Personal Data Protection Law because he had not informed
the police officers, as persons concerned, in the manner laid down by that provi-
sion, of the intended purpose of the processing of personal data concerning
them. It is submitted that Mr Buivids also failed to provide any information
to the National Data Protection Agency as to the purpose of the recording
and publication of the recorded video on an internet site such as to prove
that the objective pursued was compliant with the provisions of the Personal
Data Protection Law. The National Data Protection Agency therefore requested
Mr Buivids to remove that video from the internet site www.youtube.com and
from other websites.
Mr Buivids stated in his application that he had wished, by the publication
of the video in question, to bring to the attention of society something which
he considered to constitute unlawful conduct on the part of the police. That
Court dismissed the action.”
“(1) Do activities such as those at issue in the case (the recording, in a police
station, of police officers carrying out procedural measures and publication of
the video on the internet site www.youtube.com) fall within the scope of the
Data Protection Directive 1995?
(2) Are the activities in question processing of personal data for journalistic
purposes within the meaning of Article 9 of the Data Protection Directive
1995?”
41 Article 4, GDPR.
92 2 EU Data Protection Law Framework
“In the context of a video-surveillance system, the Court has held that a video
recording of persons which is stored on a continuous recording device — the
hard disk drive of that system — constitutes, pursuant to Article 2(b) and Article
3(1) of Directive 95/46, the automatic processing of personal data" (Ryneš, C-
212/13).
“First, the recording and publication of the video in question cannot be regarded
as a processing of personal data in the exercise of an activity which falls outside
the scope of EU law, nor can it be understood as a processing operation which
concerns public security, defence, State security and the activities of the State
in areas of criminal law, within the meaning of the first indent of Article 3(2)
of Directive 95/46. …
Secondly, since Mr Buivids published the video in question on a video
website on which users can send, watch and share videos without restricting
access to that video, thereby permitting access to personal data to an indef-
inite number of people, the processing of personal data at issue in the main
42 Article 4, GDPR.
4 Exemptions Under Data Protection Framework 93
proceedings does not come within the context of purely personal or household
activities.
Moreover, the act of recording a video of police officers in the performance
of their duties is not capable of excluding such a type of processing of personal
data from coming within the scope of Directive 95/46.”
“…the right to privacy and the right to freedom of expression, the European
Court of Human Rights has laid down a number of relevant criteria which must
be taken into account, inter alia, contribution to a debate of public interest, the
degree of the notoriety of the person affected, the subject of the news report,
the prior conduct of the person concerned, the content, form and consequences
of the publication, and the manner and circumstances in which the information
was obtained and its veracity.”
Questions
1. Explain the principles of processing under the GDPR with implementation
examples.
2. As a data controller, what are the various considerations for seeking valid consent
of data subjects?
3. Explain the exemptions for personal or household purposes and journalistic
purposes. Is a broad or narrow interpretation of these exemptions desirable?
4. Explain the scope of the journalistic purpose exemption with case law.
Suggested Readings
22. Agnieszka Jabłonowska, Adrianna Michałowicz, ‘Planet49: Pre-Ticked Checkboxes Are Not
Sufficient to Convey User’s Consent to the Storage of Cookies (C-673/17 Planet49)’ (2020)
6(1) European Data Protection Law Review 137–142
Chapter 3
Transparency and Rights of the Data
Subject
1 Introduction
The idea and framework of transparency provide the necessary foundation for
protecting the privacy of individuals. However, there is no universal standardised
scale available to measure the transparency level that a data controller should follow.
This chapter will discuss the meaning associated with the transparency principle.
Amongst other things, the section will discuss the general rules of the transparency
requirement (Article 12) and the requirement of information to be provided (Articles
13–14). Further, the chapter will discuss how the transparency principle is connected
to other rights and principles under the GDPR.
This chapter will broadly cover the rights of the data subject under the GDPR1
including the right to access (Article 15), right to erasure (right to be forgotten)
(Article 17), the right to data portability (Article 20) and right to object to data
processing (Article 21). Various CJEU judgements including Google Spain,2 Google
1 Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on
the protection of natural persons with regard to the processing of personal data and on the free
movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation),
OJ 2016 L 119/1 (hereinafter ‘GDPR’).
2 Google Spain SL and Google Inc. v Agencia Española de Protección de Datos (AEPD) and Mario
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024 97
I. Gupta et al., Introduction to Data Protection Law,
https://doi.org/10.1007/978-981-97-6355-9_3
98 3 Transparency and Rights of the Data Subject
CNIL,3 GC CNIL,4 the case of Dutch Data Protection Authority and IAB Europe,5
Virgin Media6 and We Buy Any Car Limited (WBAC)7 will be discussed.
3 Google LLC, successor in law to Google Inc. v Commission nationale de l’informatique et des
libertés (CNIL), Case C-507/17, ECLI identifier: ECLI:EU:C:2019:772.
4 GC and Others v Commission nationale de l’informatique et des libertés (CNIL), Case C-136/17,
As per Recital 39, the information to be provided includes the risks, the rules, the
safeguards and the rights, and what happens to what kind of data. Whether data
controllers handle any sensitive personal information and how they store it, or whether
they transfer the data. Further, the specific purpose of processing has to be specified
on the data controller’s interface at the time of collection of the personal information.
The specific purposes should match with the forthcoming granular consent. Consent
should connect to the purpose of processing.
The processing of personal data should be relevant and limited to the purpose
behind data collection. Purpose limitation is a principle that ensures that processing
connects through and through with the purpose. Essentially, the principle ensures
that there is no overprocessing. Further, the storage period for personal data must
be limited to a strict minimum time within the confines of the purpose shared with
the natural person. Once the purpose has been fulfilled, the data controller must not
store the information unless there are definite reasons for storing them.
The data controller should review the data storage timeline, becoming part of the
internal governance structure. The data protection officer would help the internal
governance evolve within the data controller’s establishment. There must be discus-
sions about data storage and possible data erasure. All persons working in an
establishment and handling data should know data storage and deletion protocol.
Recital 50 helps us understand the concept of compatible purpose in the purpose
limitation principle. It lists the circumstances under which purposes could be deemed
compatible.
“The processing of personal data for purposes other than those for which
the personal data were initially collected should be allowed only where the
processing is compatible with the purposes for which the personal data were
initially collected. In such a case, no legal basis separate from that which
allowed the collection of the personal data is required. … In order to ascer-
tain whether a purpose of further processing is compatible with the purpose
for which the personal data are initially collected, the controller, after having
met all the requirements for the lawfulness of the original processing, should
take into account, inter alia:
any link between those purposes and the purposes of the intended further
processing;
the context in which the personal data have been collected, in particular the
reasonable expectations of data subjects based on their relationship with the
controller as to their further use;
the nature of the personal data;
the consequences of the intended further processing for data subjects;
and the existence of appropriate safeguards in both the original and intended
further processing operations.”
Another important Recital is Recital 60, which talks about transparency in the context
of profiling.
purposes. The controller should provide the data subject with any further
information necessary to ensure fair and transparent processing taking into
account the specific circumstances and context in which the personal data are
processed. Furthermore, the data subject should be informed of the existence
of profiling and the consequences of such profiling. Where the personal data
are collected from the data subject, the data subject should also be informed
whether he or she is obliged to provide the personal data and the conse-
quences, where he or she does not provide such data. That information may be
provided in combination with standardised icons in order to give in an easily
visible, intelligible and clearly legible manner, a meaningful overview of the
intended processing. Where the icons are presented electronically, they should
be machine-readable.”
Article 13:
“1. Where personal data relating to a data subject are collected from the
data subject, the controller shall, at the time when personal data are obtained,
provide the data subject with all of the following information:
(a) the identity and the contact details of the controller and, where applicable,
of the controller’s representative;
(b) the contact details of the data protection officer, where applicable;
(c) the purposes of the processing for which the personal data are intended
as well as the legal basis for the processing;
(d) where the processing is based on point (f) of Article 6(1), the legitimate
interests pursued by the controller or by a third party;
(e) the recipients or categories of recipients of the personal data, if any;
(f) where applicable, the fact that the controller intends to transfer personal
data to a third country or international organisation and the existence or absence
of an adequacy decision by the Commission, or in the case of transfers referred
to in Article 46 or 47, or the second subparagraph of Article 49(1), reference
to the appropriate or suitable safeguards and the means by which to obtain a
copy of them or where they have been made available."
Recital 61:
“The information in relation to the processing of personal data relating to
the data subject should be given to him or her at the time of collection from
the data subject, or, where the personal data are obtained from another source,
within a reasonable period, depending on the circumstances of the case. Where
personal data can be legitimately disclosed to another recipient, the data subject
should be informed when the personal data are first disclosed to the recipient.
Where the controller intends to process the personal data for a purpose other
than that for which they were collected, the controller should provide the data
subject prior to that further processing with information on that other purpose
and other necessary information. Where the origin of the personal data cannot
be provided to the data subject because various sources have been used, general
information should be provided.”
the information, […] or where the provision of information to the data subject proves
to be impossible or would involve a disproportionate effort.”17
Article 14 applies in cases where data controllers collect personal data of data
subjects indirectly. It has the same requirements as under Article 13, except additional
conditions about informing the data subjects.
Article 14:
“The controller shall provide the information […]:
within a reasonable period after obtaining the personal data, but at the latest
within one month, having regard to the specific circumstances in which the
personal data are processed;
if the personal data are to be used for communication with the data subject,
at the latest at the time of the first communication to that data subject; or.
if a disclosure to another recipient is envisaged, at the latest when the
personal data are first disclosed.”
4 Compliance Example
The following compliance example suggests how the principle of transparency and
other provisions of data protection law, including consent, apply in a practical
scenario. It is important to understand not only the provisions of the GDPR but
also their application in practice.
Facts
Around 2019, a series of complaints were filed against Interactive Advertising Bureau
(IAB), Europe. The basis of these complaints was GDPR and how the IAB infringed
several principles, including but not limited to legality, appropriateness, transparency,
purpose limitation, storage restriction, security safeguards and accountability.
The case dealt with the conformity of the Transparency and Consent Framework
(TCF) with GDPR. The case also pertains to impact of TCF on the practice of
Real-Time Bidding (RTB).
The TCF process included multiple players. These were21 :
1. Publishers: These were websites that make advertising space available, and they
were in direct contact with online users and collect and process the personal
data of online users. These publishers provided a consent management platform
(CMP) on their website or on their application. The CMP helped them manage
consent shared by users or visitors and facilitate the TCF process. Publishers
could also decide on the Adtech vendors who would collect users’ personal data
from their websites and the respective purposes for such collections.
2. Adtech vendors: These were companies that receive the personal data of online
users from publishers so that they could fill up advertising spaces on the
publishers’ websites and their applications.
3. Consent Management Platforms: There were specific consent management
platforms to facilitate the CMP. A pop-up appeared during the first connection
to a website. Through that pop-up, consent was sought to placing cookies and
other identifying information related to the online user. Here, there are certain
additional technical details that need to be understood.
The practice of Real-Time Bidding (RTB) can be explained as follows:
“[O]nline advertising is usually done primarily automatically and behind the
scenes, through ‘Programmatic advertising’ methods of which real-time bidding
(RTB) is the leading system. Real-time bidding refers to the use of an instantaneous
automated online auction for the sale and purchase of online advertising space.
Specifically, it means that when an individual accesses a website or application that
contains an advertising space, behind the scenes through an automated online auction
20 AEPD Decision on the merits 21/2022 of 2 February 2022 Case number: DOS-2019-01377.
https://edpb.europa.eu/system/files/2022-03/be_2022-02_decisionpublic_0.pdf. Accessed January
16, 2023
21 AEPD Decision on the merits 21/2022 of 2 February 2022 Case number: DOS-2019-01377.
22 AEPD Decision on the merits 21/2022 of 2 February 2022 Case number: DOS-2019-01377.
https://edpb.europa.eu/system/files/2022-03/be_2022-02_decisionpublic_0.pdf. Accessed January
16, 2023.
4 Compliance Example 109
retrieve a user’s preferred data at any time and pass this information on to
adtech vendors who need it…
An Internet user browses the website of a publisher, for example a news
website.
i.The publisher ensures that a CMP is activated on its website or in its app
when the user arrives.
ii.The CMP checks whether a TC String already exists for this user or not. If
a ‘globally stored’ TC String is chosen, the CMP will contact the IAB Europe-
managed consensu.org internet domain to verify from there whether there is
already a so- called ’consensu’ cookie on the user’s device. In particular, this
relates to the euconsent-v2 cookie.
iii.If the third step shows that the TC String does not yet exist or is not up
to date, in a fourth step the CMP will show the user a user interface where he
can consent to the collection and sharing of his personal data.
iv.The Internet user makes a choice in the user interface.
v.The CMP generates the TC String and places a euconsent-v2 cookie on
the user’s device or updates the existing cookie.”
1. “In the absence of a valid legal basis, … the data processing in the context
of the TCF in its current format, whereby CMPs capture the preferences of
online users in a TC String, does not comply with Article 6 of the GDPR.
110 3 Transparency and Rights of the Data Subject
“that the processing of personal data under the OpenRTB on the basis of prefer-
ences captured in accordance with the current version of the TCF is incompat-
ible with the GDPR, due to an inherent breach of the principles of lawfulness
and fairness.”
1. “providing a valid legal basis for the processing and dissemination of users’
preferences within the context of the TCF, in the form of a TC String and a
euconsent-v2 cookie, as well as prohibiting, via the terms of use of the TCF, the
5 Right of Access Under the GDPR 111
The right of access to personal data relates to the principle of transparency. It enables
the data subject to comprehend how their personal data are handled and the effects of
that processing. The purpose of this right is also to give the person enough information
about how their data are processed so that they can verify and challenge various
parts of the processing activity in accordance with the GDPR (e.g. the principle
of lawfulness, accuracy).23 Recital 63 of the GDPR elaborates the right to access
personal data.
(d) where possible, the envisaged period for which the personal data will
be stored, or, if not possible, the criteria used to determine that period;
(e) the existence of the right to request from the controller rectification or
erasure of personal data or restriction of processing of personal data concerning
the data subject or to object to such processing;
(f) the right to lodge a complaint with a supervisory authority;
(g) where the personal data are not collected from the data subject, any
available information as to their source;
(h) the existence of automated decision-making, including profiling,
referred to in Article 22(1) and (4) and, at least in those cases, meaningful infor-
mation about the logic involved, as well as the significance and the envisaged
consequences of such processing for the data subject.”
This judgement dealt with the question of whether the right to access under Article
15 of the GDPR includes the right to access information about the categories of
recipients or even specific recipients of the data.
Facts
Questions
The Oberster Gerichtshof (Supreme Court) referred the following question to the
CJEU:
“Is Article 15(1)(c) of [the GDPR] to be interpreted as meaning that the right
of access is limited to information concerning categories of recipient where
specific recipients have not yet been determined in the case of planned disclo-
sures, but that right must necessarily also cover recipients of those disclosures
in cases where data [have] already been disclosed? ”
“1. The data subject shall have the right to obtain from the controller confir-
mation as to whether or not personal data concerning him or her are being
processed, and, where that is the case, access to the personal data and the
following information:
(c) the recipients or categories of recipient to whom the personal data
have been or will be disclosed, in particular recipients in third countries or
international organisations;”
“ [..] in order to respect the right of access, all processing of personal data
of natural persons must comply with the principles set out in Article 5 of
the GDPR…Those principles include the principle of transparency set out
in Article 5(1)(a) of the GDPR, which, as is clear from Recital 39 of that
Regulation, requires that the data subject have information about how his or
her personal data are processed and that that information be easily accessible
and easy to understand…
…the exercise of that right of access must enable the data subject to verify
not only that the data concerning him or her are correct, but also that they are
processed in a lawful manner…
In particular, that right of access is necessary to enable the data subject
to exercise, depending on the circumstances, his or her right to rectification,
right to erasure (‘right to be forgotten’) or right to restriction of processing,
conferred, respectively, by Articles 16, 17 and 18 of the GDPR [..] and the data
subject’s right to object to his or her personal data being processed, laid down
in Article 21 of the GDPR, and right of action where he or she suffers damage,
laid down in Articles 79 and 82 of the GDPR… Thus, in order to ensure the
effectiveness of all of the rights [..] the data subject must have, in particular,
the right to be informed of the identity of the specific recipients where his or
her personal data have already been disclosed…
…as is apparent from Recital 4 of the GDPR, the right to the protection of
personal data is not an absolute right. That right must be considered in relation
to its function in society and be balanced against other fundamental rights, in
accordance with the principle of proportionality…
Accordingly, it may be accepted that, in specific circumstances, it is not
possible to provide information about specific recipients. Therefore, the right
of access may be restricted to information about categories of recipient if it is
impossible to disclose the identity of specific recipients, in particular where
they are not yet known. In addition, it should be borne in mind that, under
Article 12(5)(b) of the GDPR, the controller may, pursuant to the principle
of responsibility referred to in Article 5(2) and Recital 74 of that Regulation,
refuse to act on requests from a data subject where those requests are mani-
festly unfounded or excessive, it being specified that it is for the controller to
demonstrate that those requests are unfounded or excessive.”
The right to be forgotten (RTBF) is a right that is available with a data subject when
the retention of personal data by a data controller is no longer necessary for the
purpose of processing. It is available even when the data subject has withdrawn
the consent shared initially with the data controller or where the processing is in
contravention of any of the provisions of GDPR. The right can be exercised in the
116 3 Transparency and Rights of the Data Subject
particular instance of a child’s consent. A child may not have been fully aware of the
risks involved with processing personal data and realise the potential risks of such
processing on the Internet after a few years. The data subject who is no longer a
child can also exercise this right.
While a data subject can exercise the right to be forgotten to remove or erase
personal data, there are situations where further data retention would be lawful,
including fulfilling a legal obligation. Recital 65 of the GDPR mentions these
situations as well as the grounds for the exercise of the right.
Recital 65 states:
“A data subject should have the right to have personal data concerning him
or her rectified and a ‘right to be forgotten’ where the retention of such
data infringes this Regulation or Union or Member State law to which the
controller is subject. In particular, a data subject should have the right
to have his or her personal data erased and no longer processed where
the personal data are no longer necessary in relation to the purposes for
which they are collected or otherwise processed, where a data subject has
withdrawn his or her consent or objects to the processing of personal data
concerning him or her, or where the processing of his or her personal data
does not otherwise comply with this Regulation. That right is relevant in
particular where the data subject has given his or her consent as a child and
is not fully aware of the risks involved by the processing, and later wants to
remove such personal data, especially on the internet. The data subject should
be able to exercise that right notwithstanding the fact that he or she is no longer
a child. However, the further retention of the personal data should be lawful
where it is necessary, for exercising the right of freedom of expression and
information, for compliance with a legal obligation, for the performance of a
task carried out in the public interest or in the exercise of official authority
vested in the controller, on the grounds of public interest in the area of public
health, for archiving purposes in the public interest, scientific or historical
research purposes or statistical purposes, or for the establishment, exercise or
defence of legal claims.”
“(a) the personal data are no longer necessary in relation to the purposes for
which they were collected or otherwise processed;
(b) the data subject withdraws consent on which the processing is based
according to point (a) of Article 6(1), or point (a) of Article 9(2), and where
there is no other legal ground for the processing;
6 The Right to Erasure (Right to Be Forgotten) 117
(c) the data subject objects to the processing pursuant to Article 21(1) and
there are no overriding legitimate grounds for the processing, or the data subject
objects to the processing pursuant to Article 21(2);
(d) the personal data have been unlawfully processed;
(e) the personal data have to be erased for compliance with a legal obligation
in Union or Member State law to which the controller is subject;
(f) the personal data have been collected in relation to the offer of
information society services referred to in Article 8(1).”
Recital 66 reads:
“To strengthen the right to be forgotten in the online environment, the right to
erasure should also be extended in such a way that a controller who has made
the personal data public should be obliged to inform the controllers which are
processing such personal data to erase any links to, or copies or replications
of those personal data. In doing so, that controller should take reasonable
118 3 Transparency and Rights of the Data Subject
steps, taking into account available technology and the means available to the
controller, including technical measures, to inform the controllers which are
processing the personal data of the data subject’s request.”
“If a data subject obtains the delisting of a particular content, this will result in
the deletion of that specific content from the list of search results concerning
the data subject when the search is, as a main rule, based on his or her name.
This content will however still be available using other search criteria.
Delisting requests do not result in the personal data being completely erased.
Indeed, the personal data will neither be erased from the source website nor
from the index and cache of the search engine provider. For example, a data
subject may seek the delisting of personal data from a search engine’s index
which have originated from a media outlet, such as a newspaper article. In this
instance, the link to the personal data may be delisted from the search engine’s
index; however, the article in question will still remain within the control of
the media outlet and may remain publicly available and accessible, even if no
longer visible in search results based on queries that include in principle the
data subject’s name.”
Source EDPB Guidelines 5/2019 on the criteria of the Right to be Forgotten in the
search engines cases under the GDPR (Part 1)
The right to be forgotten in the case of search engines has been considered by
several CJEU judgements, including Google Spain, Google CNIL, GC CNIL, TU
and RE v Google LLC.
26EDPB Guidelines 5/2019 on the criteria of the Right to be Forgotten in the search engines cases
under the GDPR (part 1) Version 2.0 Adopted on 7 July 2020.
6 The Right to Erasure (Right to Be Forgotten) 119
This matter concerns a Spanish national, Mr Costeja González, who filed a complaint
before the Spanish Data Protection Agency ‘the AEPD’ against Google Spain SL
(‘Google Spain’) and Google Inc. It concerns the appropriate measures to be adopted
so that Mr Costeja González’s personal data are removed from the search engine’s
index and future access to the data is prevented. The judgement suggests the concep-
tual dimensions attached to the right to be forgotten. The AEPD considered that
“obligation [to erase] may be owed directly by operators of search engines, without
it being necessary to erase the data or information from the website where they appear,
including when retention of the information on that site is justified by a statutory
provision.”28
Questions
The essential question was whether the GDPR allows Mr Costeja to exercise the
right to be forgotten so that search results about him would not appear in the search
results list when his name was searched on Google.
ECLI:EU:C:2014:317
120 3 Transparency and Rights of the Data Subject
name, since that processing enables any internet user to obtain through
the list of results a structured overview of the information relating to
that individual that can be found on the internet — information which
potentially concerns a vast number of aspects of his private life and which,
…without the search engine, could not have been interconnected or
could have been only with great difficulty — and thereby to establish a
more or less detailed profile of him.
…Furthermore, the effect of the interference with those rights of the
data subject is heightened on account of the important role played by the
internet and search engines in modern society.”
the ground that that information may be prejudicial to him or that he wishes it
to be ‘forgotten’ after a certain time.
As the data subject may, in the light of his fundamental rights under Arti-
cles 7 and 8 of the Charter, request that the information in question no longer
be made available to the general public by its inclusion in such a list of results,
it should be held, …that those rights override, as a rule, not only the economic
interest of the operator of the search engine but also, the interest of the
general public in finding that information upon a search relating to the
data subject’s name.
However, that would not be the case if it appeared, for particular
reasons, such as the role played by the data subject in public life, that
the interference with his fundamental rights is justified by the prepon-
derant interest of the general public in having, on account of inclusion in
the list of results, access to the information in question.”
“Does the search result relate to a natural person – i.e. an individual? And does
the search result come up against a search on the data subject’s name?
Does the data subject play a role in public life? Is the data subject a public
figure?
Is the data subject a minor?
Is the data accurate?
Is the data relevant and not excessive?
a. Does the data relate to the working life of the data subject?
b. Does the search result link to information which allegedly constitutes
hate speech/slander/libel or similar offences in the area of expression against
the complainant?
c. Is it clear that the data reflect an individual’s personal opinion or does it
appear to be verified fact?
Is the information sensitive within the meaning of Article 8 of the Directive
95/46/EC?
Is the data up to date? Is the data being made available for longer than is
necessary for the purpose of the processing?
Is the data processing causing prejudice to the data subject? Does the data
have a disproportionately negative privacy impact on the data subject?
29Guidelines On The Implementation Of The Court Of Justice Of The European Union Judgment
On “Google Spain And Inc V. Agencia Española De Protección De Datos (Aepd) And Mario Costeja
González” C-131/12 Adopted on 26 November 2014 14/EN WP 225.
6 The Right to Erasure (Right to Be Forgotten) 123
Does the search result link to information that puts the data subject at risk?
In what context was the information published?
a. Was the content voluntarily made public by the data subject?
b. Was the content intended to be made public? Could the data subject have
reasonably known that the content would be made public?
Was the original content published in the context of journalistic purposes?
Does the publisher of the data have a legal power – or a legal obligation – to
make the personal data publicly available?
Does the data relate to a criminal offence?”
This judgement, which was delivered subsequent to the Google Spain case, discusses
an interesting issue about de-referencing across all possible search engine domains.
The matter relates to a dispute between Google LLC, the legal successor to Google
Inc., and the Commission nationale de l’informatique et des libertés (‘the CNIL’).
The dispute was over a EUR 100,000 penalty imposed on Google by the CNIL.
Google had refused to de-reference links from all of Google Search domain name
extensions.
Facts
“CNIL served formal notice on Google that, when granting a request from a
natural person for links to web pages to be removed from the list of results
displayed following a search conducted on the basis of that person’s name, it
must apply that removal to all its search engine’s domain name extensions.
Google refused to comply …confining itself to removing the links in ques-
tion from only the results displayed following searches conducted from the
domain names corresponding to the versions of its search engine in the
Member States.”
(2) In the event that Question 1 is answered in the negative, must the “right to
de-referencing”, as established by the [Court] in the judgment cited above, be
interpreted as meaning that a search engine operator is required, when granting
a request for de-referencing, only to remove the links at issue from the results
displayed following a search conducted on the basis of the requester’s name
on the domain name corresponding to the State in which the request is deemed
to have been made or, more generally, on the domain names distinguished
by the national extensions used by that search engine for all of the Member
States …?”
31Case C-507/17 Google LLC vs. Commission nationale de l’informatique et des libertés (CNIL)
EU:C:2019:772.
126 3 Transparency and Rights of the Data Subject
Therefore,
“It follows that, currently, there is no obligation under EU law, for a search
engine operator who grants a request for de-referencing made by a data
subject, as the case may be, following an injunction from a supervisory or
judicial authority of a Member State, to carry out such a de-referencing on
all the versions of its search engine.
…a search engine operator cannot be required, …to carry out a de-
referencing on all the versions of its search engine… .”
prevent or, at the very least, seriously discourage an internet user conducting a search
from one of the Member States on the basis of a data subject’s name from gaining
access, via the list of results displayed following that search, to the links which are
the subject of that request.”32 Thus, while the Google Spain case laid down the right
to be forgotten in the case of search engines, the Google CNIL case laid down the
extent of the right vis-à-vis the domain names of the search engine corresponding to
EU Member States. Further, there are existing conditions under which the request for
erasure will not be upheld. It is a right if upheld will work only in the EU. Another
judgement that deals with the right to be forgotten for search engines is the GC CNIL
case, which discusses the right in the case of sensitive personal data.
The request was made as part of a dispute between GC, AF, BH and ED and the
Commission nationale de l’informatique et des libertés (‘the CNIL’). The question
arose over four decisions and whether Google Inc., now Google LLC, has to de-
reference various links appearing in the search results displaying their names and
leading to third-party web pages.
Facts
32 Case C-507/17 Google LLC vs. Commission nationale de l’informatique et des libertés (CNIL).
EU:C:2019:772.
33 GC, AF, BH, ED v Commission nationale de l’informatique et des libertés (CNIL) Case C-136/
17 ECLI:EU:C:2019:773.
128 3 Transparency and Rights of the Data Subject
“whether the provisions of Article 8(1) and (5) of Directive 95/46 must be inter-
preted as meaning that the prohibition or restrictions relating to the processing
of special categories of personal data, mentioned in those provisions, apply
also, subject to the exceptions provided for by the Directive, to the operator of
a search engine in the context of his responsibilities, powers and capabilities
as the controller of the processing carried out for the needs of the functioning
of the search engine….
…whether the provisions of Article 8(1) and (5) of Directive 95/46 must be
interpreted as meaning that the operator of a search engine is required by those
provisions, …to accede to requests for de-referencing in relation to links
to web pages containing personal data falling within the special categories
referred to by those provisions;
6 The Right to Erasure (Right to Be Forgotten) 129
“whether or not publication of the personal data on the web page at the end of
the link at issue is lawful, must the provisions of Directive 95/46 be interpreted
as:
– requiring the operator of a search engine, when the person making the
request establishes that the data in question have become incomplete or inac-
curate, or are no longer up to date, to grant the corresponding request for
de-referencing;
– more specifically, requiring the operator of a search engine, when the
person making the request shows that, having regard to the conduct of the legal
proceedings, the information relating to an earlier stage of those proceedings
is no longer consistent with the current reality of his situation, to de-reference
the links to web pages comprising such information?
Must Article 8(5) of Directive 95/46 be interpreted as meaning that infor-
mation relating to the investigation of an individual or reporting a trial and
the resulting conviction and sentencing constitutes data relating to offences
and to criminal convictions? More generally, does a web page comprising data
referring to the convictions of or legal proceedings involving a natural person
fall within the ambit of those provisions?”
The Court stated that search engines become liable to take off information from
the list of search results given the nature of the data that is shared while displaying
search results. Search engines may be asked to remove information from their search
results if the information is inaccurate or incomplete and can potentially negatively
impact the data subject.
While consent provides the lawful basis for processing personal data, in the context
of search engines, the data controller cannot ask for consent from data subjects in a
traditional manner. But if search engines receive a request for the right to be forgotten,
it represents an expression of withdrawal of consent. The search engines should take
RTBF requests as indications suggesting stopping further personal data processing.
After receiving de-referencing requests, the search engines must ascertain
“It is thus for the operator of a search engine to assess, in the context of a
request for de-referencing relating to links to web pages on which information
is published relating to criminal proceedings brought against the data subject,
concerning an earlier stage of the proceedings and no longer corresponding to
the current situation, whether, in the light of all the circumstances of the case,
such as, in particular, the nature and seriousness of the offence in question, the
progress and the outcome of the proceedings, the time elapsed, the part played
by the data subject in public life and his past conduct, the public’s interest
at the time of the request, the content and form of the publication and the
consequences of publication for the data subject, he or she has a right to the
information in question no longer, in the present state of things, being linked
6 The Right to Erasure (Right to Be Forgotten) 131
with his or her name by a list of results displayed following a search carried
out based on that name.
It must, however, be added that, even if the operator of a search engine were
to find that that is not the case because the inclusion of the link in question
is strictly necessary for reconciling the data subject’s rights to privacy and
protection of personal data with the freedom of information of potentially
interested internet users, the operator is in any event required, at the latest on
the occasion of the request for de-referencing, to adjust the list of results in
such a way that the overall picture it gives the internet user reflects the current
legal position, which means in particular that links to web pages containing
information on that point must appear in first place on the list.”
Facts
TU was engaged in business and was cohabiting partners with RE. In 2015, three
articles were published on the g-net website criticising the investment model of the
fifth company. An article also illustrated photos of TU in a luxury car, near a helicopter
and aeroplane. There was also a photo of RE in a convertible car. G-LLC operates
the g-net website and has its registered office in New York, USA. The purpose of
G-LLC is “to contribute consistently towards fraud prevention in the economy and
society by means of active investigation and constant transparency.”35 There are
publications criticising G-LLC’s model, which involves blackmailing companies to
publish negative reports and later offering to delete the reports for money.
Google displayed the articles about TU and RE when their names were searched
on their own and with the names of the companies. An article was also showing when
company names were entered. Besides, an image search of Google displayed photos
of the applicants as thumbnails. TU and RE requested Google “to de-reference the
links to the articles at issue in the main proceedings from the list of search results,
on the ground that they contained inaccurate claims and defamatory opinions, and,
second, to remove the thumbnails from the list of search results.”36 Google refused
as it was unaware of the inaccuracy claimed.
Questions
“(1) Is it compatible with the data subject’s right to respect for private life
(Article 7 of the [Charter]) and to protection of personal data (Article 8 of
the Charter) if, within the context of the weighing-up of conflicting rights and
interests arising from Articles 7, 8, 11 and 16 of the Charter, within the scope
of the examination of his [or her] request for de-referencing brought against
the data controller of an internet search engine, pursuant to Article 17(3)(a)
of [the GDPR], when the link, the de-referencing of which [that person] is
requesting, leads to content that includes factual claims and value judgments
based on factual claims the truth of which is denied by the data subject, and the
lawfulness of which depends on the question of the extent to which the factual
claims contained in that content are true, the national Court also concentrates
conclusively on the issue of whether the data subject could reasonably seek
legal protection against the content provider, for instance by means of interim
relief, and thus at least provisional clarification on the question of the truth of
the content displayed by the search engine data controller could be provided?
(2) In the case of a request for de-referencing made against the data controller of
an internet search engine, which in a name search searches for photos of natural
persons which third parties have introduced into the internet in connection with
the person’s name, and which displays the photos which it has found in its search
results as preview images (thumbnails), within the context of the weighing-up
of the conflicting rights and interests arising from Articles 7, 8, 11 and 16
of the Charter pursuant to Article 12(b) and [point (a) of the first paragraph
of Article 14] of Directive [95/46 or] Article 17(3)(a) of [the GDPR], should
the context of the original third-party publication be conclusively taken into
account, even if the third-party website is linked by the search engine when
the preview image is displayed but is not specifically named, and the resulting
context is not shown with it by the internet search engine?.”
“As regards, in the first place, the obligations of the person requesting de-
referencing on account of the referenced content being inaccurate, it is for
that person to establish the manifest inaccuracy of the information found in
that content or, at the very least, of a part – which is not minor in relation
to the content as a whole – of that information. However, in order to avoid
imposing on that person an excessive burden which is liable to undermine
the practical effect of the right to de-referencing, that person has to provide
only evidence that, in the light of the circumstances of the particular case, can
found in the referenced content – which is not minor in relation to that content
as a whole – is, at least prima facie, inaccurate.
By contrast, where the inaccuracy of such information found in the refer-
enced content is not obvious, in the light of the evidence provided by the data
subject, the operator of the search engine is not required, where there is no
such judicial decision, to accede to such a request for de-referencing. Where
the information in question is likely to contribute to a debate of public interest, it
is appropriate, in the light of all the circumstances of the case, to place particular
importance on the right to freedom of expression and of information.”
“As regards, in the first place, the purpose of the processing at issue, it should
be noted that the publication of photographs as a non-verbal means of commu-
nication is likely to have a stronger impact on internet users than text publica-
tions. Photographs are, as such, an important means of attracting internet users’
attention and may encourage an interest in accessing the articles they illustrate.
Since, in particular, photographs are often open to a number of interpretations,
displaying them in the list of search results as thumbnails may, in accordance
with what has been stated in paragraph 95 of the present judgment, result in a
particularly serious interference with the data subject’s right to protection of his
or her image, which must be taken into account when weighing-up competing
rights and interests.
As regards, in the second place, the nature of the processing carried out
by the operator of the search engine, it must be observed, as did the Advocate
General in point 55 of his Opinion, that, by retrieving the photographs of natural
persons published on the internet and displaying them separately, in the results
of an image search, in the form of thumbnails, the operator of a search engine
The Court held that Article 17(3)(a) GDPR implies that de-referencing request
is not dependant on the issue of accuracy being resolved in the action that a person
has brought against the content provider.40 It suggested that de-referencing request
for removal of image search result must consider informative value of the picture as
well as informative value of text accompanying the picture, irrespective of context
of publication.41
Thus, the CJEU has interpreted the right to be forgotten in various judgements
that are discussed above. While the Google Spain judgement (Case C-131/12) laid
down the right to be forgotten in the case of search engines by allowing the removal
from the list of search results links containing personal data, the Google CNIL
judgement (Case C-507/17) laid down that the de-referencing of links extends to
all EU domain names and not domain names worldwide. Other judgements dealt
with specific circumstances for the right to be forgotten. The GC CNIL judgement
(Case C-136/17) involved discussing the right to be forgotten when sensitive personal
data are processed, and the TU, RE Google judgement (Case C-460/20) involved
discussing the right to be forgotten when the accuracy of personal information is in
question.
The GDPR provides for the right to data portability. The essential components of
the right to data portability include the right to get personal data, the right to transfer
personal information from one data controller to another and the controllership of
personal information.42
Recital 68 of GDPR refers to the right of data portability and the conditions under
which a data controller must transfer the data to another data controller.
Recital 68
“To further strengthen the control over his or her own data, where the processing
of personal data is carried out by automated means, the data subject should
also be allowed to receive personal data concerning him or her which he or
she has provided to a controller in a structured, commonly used, machine-
readable and interoperable format, and to transmit it to another controller.
43 European Parliament, ‘REPORT on the First Report on the implementation of the Data Protec-
tion Directive (95/46/EC) (COM(2003) 265 – C5-0375/2003 – 2003/2153(INI))’ (24 February
2004). https://www.europarl.europa.eu/doceo/document/A-5-2004-0104_EN.html. Accessed 25
June 2025.
44 Article 29 Working Party Guidelines on the right to data portability 16/EN WP 242 rev.01 Adopted
and derived data’ that data controllers generate by virtue of the data shared by data
subjects. It could be health-related data that data subjects share for carrying out
some kind of risk assessment exercise. Further, the data controller may infer some
information out of the shared data.45
As pointed by scholars, the right of data portability not only encourages compe-
tition amongst service providers, but it also ensures in limiting large companies
monopolising the functioning of the digital economy. The right encourages interop-
erability through the development of multilevel platforms, thereby bringing the data
subject at the helm of affairs amongst different stakeholders.46
Articles 21 and 22 and Recitals 70, 71 and 72 of the GDPR deal with the data subjects
right to object processing of personal data. The data subject has the right to object,
when the processing is for direct marketing purposes. Further, a data subject can
also oppose personal data processing for scientific or historical research or statistical
purposes, based on the data subject’s situation, unless such processing is necessary
to complete a task fulfilling a certain public interest.
Article 22 of GDPR provides certain safeguards from solely automated processing
and processing towards profiling a natural person. Article 22 titled, ‘Automated
individual decision-making, including profiling’ reads,
“1. The data subject shall have the right not to be subject to a decision based
solely on automated processing, including profiling, which produces legal
effects concerning him or her or similarly significantly affects him or her.
2. Paragraph 1 shall not apply if the decision:
(a) is necessary for entering into, or performance of, a contract between the
data subject and a data controller;
(b) is authorised by Union or Member State law to which the controller
is subject and which also lays down suitable measures to safeguard the data
subject’s rights and freedoms and legitimate interests; or.
(c) is based on the data subject’s explicit consent.
….the data controller shall implement suitable measures to safeguard the
data subject’s rights and freedoms and legitimate interests, at least the right to
45 Article 29 Working Party Guidelines on the right to data portability 16/EN WP 242 rev.01 Adopted
on 13 December 2016 As last Revised and adopted on 5 April 2017.
46 Paul De Hert, Vagelis Papakonstantinou, Gianclaudio Malgieri, Laurent Beslay, Ignacio Sanchez,
‘The right to data portability in the GDPR: Towards user-centric interoperability of digital services’
(2018) 34(2) Computer Law & Security Review 193–203, https://doi.org/10.1016/j.clsr.2017.
10.003.
140 3 Transparency and Rights of the Data Subject
obtain human intervention on the part of the controller, to express his or her
point of view and to contest the decision.”
47 Luca Tosoni, ‘The right to object to automated individual decisions: resolving the ambiguity of
Article 22(1) of the General Data Protection Regulation’ (2021) 11(2) International Data Privacy
Law 145–162, https://doi.org/10.1093/idpl/ipaa024.
48 Luca Tosoni, ‘The right to object to automated individual decisions: resolving the ambiguity of
Article 22(1) of the General Data Protection Regulation’ (2021) 11(2) International Data Privacy
Law 145–162, https://doi.org/10.1093/idpl/ipaa024.
49 EDPB Guidelines on Automated individual decision-making and Profiling for the purposes of
Regulation 2016/679.
7 The Right to Data Portability and Right to Object to Processing 141
8 Compliance Examples
The section further discusses two decisions of Data Protection Authorities that can
help understand the nuances of the data subjects objecting to automated processing
and processing for direct marketing purposes.
The ICO fined Virgin Media in 2021 for sending its customers volumes of direct
marketing emails. The customers received marketing preference reminders from
Virgin Media. The ICO stated that these were direct marketing messages and imposed
a fine of GBP 50,000.
Facts
More than 400,000 marketing emails were sent to subscribers who had opted out of
receiving marketing communications from Virgin Media. The text of the mail was
the following:
“We want to let you know that we won’t be raising your price this year. This
means the price you pay for your current package right now will stay the same
in 2020.
We’d like to stay in touch about all the great Virgin Media stuff we have on
offer for you. You have currently said no to receiving marketing messages from
us, which means that we are not able to keep you up to date with our latest TV,
broadband, phone and mobile news, competitions, product and bundle offers
via online, email, post, SMS, phone. You can change your preferences by
simply registering or signing in to virginmedia.com/optin. Click ‘My Profile’,
then ‘My Preferences’.”
50 Bart Custers, Anne-Sophie Heijne, ‘The right of access in automated decision-making: The scope
of article 15(1)(h) GDPR in theory and practice’ (2022) 46 Computer Law & Security Review,
https://doi.org/10.1016/j.clsr.2022.105727.
51 ICO, ‘Virgin Media Limited’. https://cy.ico.org.uk/action-weve-taken/enforcement/virgin-
The complainant believed that a service message was masked to lure customers
into opting for future marketing communications. A series of events help understand
the nature of communication between Virgin Media and its subscribers.
A total of 1,964,562 emails were sent by Virgin Media on the 4 August. These
emails were about the price freeze. Out of these emails, Virgin media had sent
1,303,671 emails to those subscribers who had opted in to receive price freeze
messages. These were those groups of customers who wanted to receive this infor-
mation. 209,376 emails went to those subscribers who had decided to opt out
from receiving marketing communications. It meant that these customers did not
want to receive these emails. They did not have the marketing preference reminder
text. Further, 4,51,515 emails were sent to those customers who had opted out
of receiving marketing emails. In these cases, however, the marketing preference
reminder text was included. The ICO received a complaint regarding this category
of emails.
Virgin media suggested that they had received this data about Prize Freeze Emails
directly from the subscribers. They claimed they relied on certain feedback before
sending those emails, although they did not disclose the actual number. They claimed
that the feedback data suggested that some customers preferred to be informed about
marketing information. This information ranges from discounts on different products
and other packages that customers may not have opted for earlier.
Virgin media assumed that customers who had opted out a year ago may have
changed their minds about marketing preferences.
Decision
The ICO believed that Virgin media violated the data protection norms by sending
451,217 emails to subscribers who had specifically opted out of receiving marketing
emails. They were direct marketing messages with the marketing preference reminder
text in them.
Further on, they suggested,
“(3) A person may send or instigate the sending of electronic mail for the
purposes of direct marketing where –
(a) That person has obtained the contact details of the recipient of that
electronic mail in the course of the sale or negotiations for the sale of a product
or device to that recipient;
(b) The direct marketing is in respect of that person’s similar products and
services only; and.
(c) The recipient has been given a simple means of refusing (free of charge
except for the costs of transmission of the refusal) the use of his contact details
for the purposes of such direct marketing at the time that the details were
initially collected, and, where he did not initially refuse the use of the details,
at the time of each subsequent communication.”
“It is apparent from the above that whilst customers are informed of future
ways to opt-out at the point of collection of their details, the opportunity to
actually object to marketing messages is presented only after provision of the
vehicle valuation. Individuals have no opportunity to refuse marketing when
initially inputting their details. WBAC accept that the opt-out provision does
not occur until receipt of the first valuation email however believe that as there
is a ’minor temporal gap’ between the two events it is ’simultaneous’.”
Suggested Readings
1 Introduction
The chapter focuses on the obligations and tasks designated to data controllers and
data processors. According to the WP29, the main purpose of defining the concept of
a data controller is to determine who is responsible for complying with data protection
Regulations and how data subjects can exercise their rights effectively. Essentially, it
is about assigning responsibility.1 To comprehend the expectations, we will examine
rulings from the CJEU and determinations made by the data protection authorities.
Additionally, guidance from the EDPB and the ICO is consulted to grasp the standard
expectations. The GDPR establishes that the primary responsibility consistently lies
with the data controller.
2 Fashion ID C-40/172
In broad terms, a controller is an entity that establishes the purpose and methods of
processing personal data, functioning as the primary decision-maker. Controllers are
entrusted with the duty of maintaining continuous compliance with data protection
laws, achieved through the implementation of suitable technical and organisational
measures outlined in the privacy policy.3 The CJEU emphasised that the scope of
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024 149
I. Gupta et al., Introduction to Data Protection Law,
https://doi.org/10.1007/978-981-97-6355-9_4
150 4 Duties and Responsibilities of Controller and Processor
the word ‘controller’ includes “effective and complete protection” of data subjects.4
The CJEU has explicitly supported the WP29 stance that reasonable expectations of
data subjects must be considered as an important factor to determine and interpret
the concept of controller.5 To gain a better understanding of this concept, we will
analyse the judgement in the Fashion ID case.
Facts
Fashion ID, having a website of its own, implemented a plugin that Facebook
developed (“’Like’ button”).
The entire process was operationalised when a visitor would consult the Fashion
ID website. Through the Fashion ID’s website, details of visitors’ personal data were
communicated to Facebook Ireland. It did not require the visitor to be a member of
the social network Facebook. Also, it did not need the user to click on the Like button
embedded on Fashion ID’s website. There was a possibility that the data transmission
happened without the knowledge of the visitor.
A complaint was filed against Fashion ID, citing the transmission of personal data
that belonged to the visitors without their knowledge to Facebook Ireland. The data
transmission thus happened without their consent and infringed all the data protection
norms.
The interpretation of definition for consent under GDPR and the old Directive are
different. Due to the nature of the dispute and its timeframe, the old Directive has
been considered in this judgement.
4 Case C-131/12 Google Spain SL and Google Inc v Agencia Española de Protección de Datos
(AEPD) and Mario Costeja González [2014] ECLI:EU:C:2014:317, para 34; Case C-2010/16,
Wirtschaftsakademie Schleswig–Holstein (2018), ECLI:EU:C:2018:388, para. 28.
5 WP29 2010, 12.
2 Fashion ID C-40/17 151
“[If] someone has embedded a programming code in his website which causes
the user’s browser to request content from a third party and, to this end, trans-
mits personal data to the third party, is the person embedding the content the
‘controller’ …if that person is himself unable to influence this data-processing
operation?
Does the duty to inform under Article 10 of Directive [95/46] also apply
in a situation such that in the present case to the operator of the website who
has embedded the content of a third party and thus creates the cause for the
processing of personal data by the third party?.”
The activities of Fashion ID allowed Facebook to embed the Like button on its
webpage. It allowed them to collect personal data of those visiting Fashion ID’s
webpage. It happened regardless of whether the visitor to Fashion ID’s webpage was
a member of the social network that Facebook developed, accessed the Like button,
or had any awareness of such activity.
6 Fashion ID.
152 4 Duties and Responsibilities of Controller and Processor
Fashion ID exerted influence over transmitting data to Facebook and helped them
with the plugin on their webpage.
Overall, it can be understood that Facebook and Fashion ID jointly carried out the
operations through which personal data of visitors were collected and disclosed. The
embedding of a link on the Fashion ID’s website can be construed as a strategic plan
for making their goods more visible to those already part of the social networking
group of Facebook. There is undoubtedly an implicit commercial objective of
increasing publicity of their goods. This plan served Fashion ID’s and Facebook’s
economic interests.
The entire activity would make Fashion ID a controller whose responsibility would
be limited to the operations till the time data are transferred to Facebook.
Therefore, the Court observed:
“…it appears that Fashion ID’s embedding of the Facebook ‘Like’ button on
its website allows it to optimise the publicity of its goods by making them more
visible on the social network Facebook when a visitor to its website clicks on
that button.
The reason why Fashion ID seems to have consented, at least implicitly,
to the collection and disclosure by the transmission of the personal data of
visitors to its website by embedding such a plugin on that website is in order
to benefit from the commercial advantage consisting in increased publicity for
its goods; those processing operations are performed in the economic interests
of both Fashion ID and Facebook Ireland, for whom the fact that it can use
those data for its own commercial purposes is the consideration for the benefit
to Fashion ID’…
‘…Fashion ID, that embeds on that website a social plugin causing the
browser of a visitor to that website to request content from the provider of that
plugin and, to that end, to transmit to that provider the personal data of the
visitor can be considered to be a controller, …limited to the operation or set
of operations involving the processing of personal data in respect of which it
actually determines the purposes and means, that is to say, the collection and
disclosure by transmission of the data at issue.”
Similarly, in the Worten judgement,11 the ECJ held that data contained in the
working time register constitute personal data and concluded that the controller
is responsible for ensuring that necessary security measures are in line with
the associated risks and its legal obligations.12
In many instances, the CJEU and EDPB define a controller as a party that has
‘decisive influence’ over the purposes and means of processing.13 This broad criterion
effectively protects the interests of the data subjects.14
In Wirtschaftsakademie Schleswig–Holstein judgement,15 the CJEU ruled that
the entity that manages a Facebook fan page constituted a joint controller since the
entity gave Facebook permission to set cookies on visitors’ devices, collect personal
information and produce marketing and advertising analytics. Although the entity did
not handle the personal data, it did facilitate Facebook’s data processing by creating
a fan page for its own marketing.16 The judgement demonstrated the importance of
a broad interpretation of control leading to better protection for data subjects. The
Grand Chamber concluded that both Facebook and the administrators of Facebook
fan pages are data controllers.17 Facebook is a data controller since it determines
the aims and methods of data processing for users and visitors to fan pages. Fan
page admins are also controllers because they agree to Facebook’s terms of service
and set criteria for data gathering, including the target audience. Despite obtaining
only anonymised analytics data, fan page admins impact Facebook’s data processing
modalities, identifying them as controllers.18
In Jehovan Todistajat judgement,19 the Grand Chamber confirmed that being a
data controller does not necessitate data access. In this case, the Jehovah’s Witnesses
Community was designated a controller for the data gathering that happened through
its members during their visits to different houses, which the society “organised,
coordinated and encouraged.”20
(AEPD) and Mario Costeja González [2014] ECLI:EU:C:2014:317, para 34 (Case 131/12 Google
Spain).
15 Case C-2010/16, Wirtschaftsakademie Schleswig–Holstein (2018), ECLI:EU:C:2018:388, paras
26–37.
16 Chen, Jiahong and others; ‘Who Is Responsible for Data Processing in Smart Homes? Recon-
sidering Joint Controllership and the Household Exemption’ (2020) 10 International Data Privacy
Law 279, 283;
Becker, Regina; Thorogood, Adrian; Bovenberg, Jaspe and Mitchell, Colin, ‘Applying GDPR
Roles and Responsibilities to Scientific Data Sharing’ (2022) International Data Privacy Law.
17 Finck, Michèle; ‘Cobwebs of Control: The Two Imaginations of the Data Controller in EU Law’
(2021) 11(4) International Data Privacy Law 333–347 (Finck, Michèle; ‘Cobwebs of Control: The
Two Imaginations of the Data Controller in EU Law).
18 Finck, Michèle; ‘Cobwebs of Control: The Two Imaginations of the Data Controller in EU Law.
19 Case C-25/17 Jehovan todistajat v Tietosuojavaltuutettu (2018) ECLI:EU:C:2018:551.
20 Case C-25/17 Jehovan todistajat [2018] ECLI:EU:C:2018:551.
3 Design and Default Approach to Protecting the Privacy 155
At times, processing using complex technology makes it difficult for a data controller
to comply with the data protection principles that protect the privacy of data
subjects.21 The complex nature of technology only makes it difficult at the stage
where a product and service are offered to the data subject. To tackle such a situation,
the GDPR introduces the concept of privacy by design and default.22
In its preliminary opinion23 on privacy by design, the European Data Protection
Supervisor (EDPS) emphasised the need of examining a wide range of options, which
includes a visionary and ethical dimension that is consistent with the principles and
values enshrined in the EU Charter of Fundamental Rights.
< https://www.edps.europa.eu/sites/default/files/publication/18-05-31_preliminary_opinion_on_p
rivacy_by_design_en_0.pdf > accessed on 6th July 2024.
156 4 Duties and Responsibilities of Controller and Processor
configurations during the initial design phase of a product or service. They will entail
minimising data processing, pseudonymisation of personal data, increase overall
transparency of the processes undertaken, allowing data subjects to become stake-
holders and finally allow data controllers to adopt and enhance security protocols
for data processing. The second half of the Recital turns to the producers of these
technologies and services and products that draw upon these technologies assuming
that controllers and processors are end-users of these products and services. They
don’t entirely involve themselves in the production stage. On the contrary, they rely
on marketed technological products and services. However, the onus and account-
ability rest with controllers and processors. To ensure that controllers and processors
can comply with the data protection principles, it is only logical that the change
happens at the end of the producer or the manufacturer. Adopting privacy by default
and design would help the controllers and processors demonstrate compliance and
accountability.
In addition to Recital 78, Article 25 reflects upon other data protection features
by design and default.
24 Kuner, Christopher; Bygrave, Lee. A., The EU General Data Protection Regulation (GDPR): A
Commentary(2020)(Kuner).
25 Dag Wiese Schartum, ‘Making Privacy by Design Operative’ (2016) 24 IJLIT 151.
26 Joseph Srouji and Thibault Mechler, ’How Privacy-Enhancing Technologies Are Transforming
Privacy by Design and Default: Perspectives for Today and Tomorrow’ (2020) 3 JDPP 1.
27 I v. Finland, App. No. 20511/03 (2008) (I v. Finland).
28 Ari Ezra Waldman, ‘Data Protection by Design? A Critique of Article 25 of the GDPR’ (2021)
53 Cornell International Law Journal, Northeastern University School of Law Research Paper No.
411–2021.
158 4 Duties and Responsibilities of Controller and Processor
claimed that the institution handling her medical information employed a records
system that lacked proper privacy safeguards, particularly access logs. This design
issue made it hard to determine whether unauthorised access had occurred. Although
Finnish legislation provided for damages in circumstances of unauthorised access,
the ECHR deemed this insufficient.29
Using Article 8 of the European Convention on Human Rights, which ensures the
right to privacy, the ECHR determined that Finland was required to secure privacy by
design.30 The Court emphasised the need of taking realistic and effective precautions
to prevent unauthorised access in the first place. It emphasised that the State must
ensure that systems are designed to prevent or at least record unauthorised access to
personal information.31 The Court determined that if the hospital had limited access
to healthcare experts directly involved in the applicant’s treatment, the applicant
would have been better protected legally. This emphasises the need of privacy by
design in protecting personal information.32
EDPB which is an independent EU body established to enhance an effective and
consistent application of data protection Regulations has published Guidelines on
the issue of privacy by design and by default.
The Guidelines 4/2019 on Article 25 data protection by design and by default (DPDD)
aim to ensure the implementation of DPDD principles amongst data controllers,
processors and producers, promoting GDPR-compliant products and services. The
Guidelines interpret Article 25, outlining general obligations, implementation plans,
certification schemes and the supervisory authority’s role. They emphasize creating
measures to safeguard data subjects’ rights and ensuring processing activities adhere
to data protection principles.34
Article 25(1) emphasises the need of controllers using suitable technical and
organisational measures to protect data subjects’ rights in order to improve the
29 I v. Finland.
30 Article VIII, Convention for the Protection of Human Rights and Fundamental Freedoms,
European Convention on Human Rights, (ECHR), 1950.
31 I v. Finland.
32 I v. Finland.
33 Guidelines 4/2019 on Article 25 data protection by design and by default. https://edpb.europa.
eu/sites/default/files/files/file1/edpb_guidelines_201904_dataprotection_by_design_and_by_def
ault_v2.0_en.pdf . Accessed 4 December 2023 (Guidelines 4/2019).
34 Ira S Rubinstein and Nathaniel Good, ‘The Trouble with Article 25 (and How to Fix It): The
internal governance structure inside the data controller’s organisation. This entails
implementing modern technologies like as pseudonymisation, structured data storage
and virus detection systems, as well as teaching personnel on cyber hygiene.
Controllers must foresee hazards, keep records to assess efficacy and ensure that
measures are consistent with data protection standards.35
The state of the art, implementation costs, type, scope, context, processing goal and
data subject hazards are all important concerns. All these components work together
to guarantee that data protection measures are effective, scalable and robust, in line
with the GDPR’s overall goals. The “state of the art”36 refers to the most recent
technological advances and organisational frameworks that data controllers must
use to protect data subjects’ interests. Controllers are expected to stay up to date
on technical advancements and incorporate them into their data protection policies
to effectively protect data subjects’ rights, which includes implementing advanced
internal governance structures that combine technology management with organi-
sational measures. The “cost of implementation”37 refers to the resources and time
required to put in place data protection procedures.38 The Guidelines emphasise
that costs should not impede the effective implementation of data protection stan-
dards. Furthermore, the phrase “nature, scope, context, and purpose of processing”39
emphasises the importance of taking into account the extent and conditions of data
processing operations.40 Controllers must foresee and handle risks to data subjects’
rights and freedoms, using a risk-based approach as described in numerous GDPR
rules.41 Finally, the “time aspect”42 emphasises the significance of incorporating data
protection considerations at all stages of the processing lifecycle, from initial design
to final implementation, to ensure continual protection of personal data.43
The GDPR Guidelines for Article 25(2) focus on guaranteeing data protection by
default. This notion mandates that, by default, only personal data required for each
given processing purpose be handled. To comply with data protection standards,
configuration settings in software, devices and services must be configured before
processing begins.44 It allows the controller to follow the GDPR. When employing
third-party software, a risk assessment is required to guarantee that the default settings
35 Guidelines 4/2019.
36 Guidelines 4/2019.
37 Guidelines 4/2019.
38 Guidelines 4/2019.
39 Guidelines 4/2019.
40 Guidelines 4/2019.
41 Guidelines 4/2019.
42 Guidelines 4/2019.
43 Guidelines 4/2019.
44 Guidelines 4/2019.
160 4 Duties and Responsibilities of Controller and Processor
may be changed to satisfy GDPR compliance. The Guidelines describe four dimen-
sions of the data minimization duty. To begin, the amount of personal data collected
should be proportionate to the objective and purpose, considering both volume and
data categories.45
Third, storage of personal data should be dictated by the purpose of processing.
Once the goal has been met, there is no need for more storage.46 Finally, accessi-
bility should be based on necessity. Systems should be in place to limit access to
personal data during processing stages, ensuring that data are not made available to an
endless number of people without sufficient intervention.47 This holistic approach to
data protection by default assures GDPR compliance while protecting data subjects’
rights.
To implement DPDD and to ensure that data controllers follow the data protection
principles, the Guidelines prescribe certain stages and methods. The data protection
principles include transparency, lawfulness, fairness, purpose limitation, data mini-
mization, accuracy, storage limitation, integrity and secrecy and accountability.49 The
DPDD Guidelines go into greater detail about how to apply each principle in prac-
tice. Under GDPR, Articles 15–22 talk about various facets of transparency.50 Trans-
parency, for example, necessitates that data subjects are provided with comprehensive
information regarding data processing, including pre-stage, during and post-stage
processing.51 Lawfulness focuses on the legal foundation for processing, with consent
becoming the most legal approach for processing,52 and emphasises that consent
must be free, informed, explicit and unambiguous, with a simple withdrawal proce-
dure.53 Fairness assures that data processing is unbiased, non-discriminatory and not
deceptive, even in automated procedures that require human participation.54 As a
45 Guidelines 4/2019.
46 Guidelines 4/2019.
47 Guidelines 4/2019.
48 Guidelines 4/2019, 14.
49 Article 5, Recital 39, GDPR.
50 Article 15–22, GDPR.
51 Guidelines 4/2019, 15.
52 Guidelines 05/2020 on consent under Regulation 2016/679. https://www.edpb.europa.eu/sites/
recourse, there must be some human intervention to ascertain checks and balances,
including addressing grievances.55 Purpose limitation assures that data processing
does not go beyond the original, specified, explicit, legitimate reason for which it
was collected.56 Therefore, the data controller ought to be careful in this regard.
Otherwise, the processing would lose its legal basis. It would be useful to have a
review system in place.57
Additional principles include data minimisation, which necessitates settings that
allow only necessary data processing and advocates pseudonymisation or deletion of
irrelevant data.58 No longer necessary data can be deleted or anonymised.59 Accu-
racy requires that personal data can be maintained up to date, with data subjects able
to seek rectifications or erasure.60 Storage limitation ensures that data are retained
only for the duration required for initial processing, with automated deletion tech-
niques for unneeded data.61 Integrity and confidentiality entail preserving data from
loss, unauthorised access and damage via security measures and policies, as well as
pushing for security by design in system development.62 Accountability requires the
controller to demonstrate risk mitigation and breach management measures, such as
timely reporting of breaches to supervisory authorities and impacted data subjects,
in order to minimise the damage.63
Although Article 25 of the GDPR is a complex rule, its legal language reveals
a fundamental structure.64 The provision explicitly requires: (a) effective protection
against data processing risks to the data subject’s fundamental rights; (b) the incor-
poration of legal principles and rules and (c) the incorporation of these principles
into the processing design, including its technological and organisational aspects.65
It is quite obvious how to assess these dangers, which considerably aids in directing
protection efforts, assuring effective protection and reducing unnecessary regulatory
burdens.66
Furthermore, controllers have access to a comprehensive set of legal principles
and norms that act as legislative tools for providing more structure during the risk
protection implementation phase (while also taking into account the regulatory cost
that repetitive protection systems can impose).67 This is the core normative frame-
work established by Article 25(1) of the GDPR for implementing data protection by
design.
The Territorial Scope of Article 3(2) of GDPR extends to those data controllers or
data processors who may not be based out of the EU but are involved in processing
personal data of data subjects residing in the EU.69 It can happen in two ways:
1. When a data controller or a data processor is offering goods or services to those
in the EU. These transactions would not necessarily need payment at the end.
2. Second, when they engage themselves in monitoring the behaviour of EU
residents.
For a data controller or data processor outside the EU, there is a requirement to
have a representative or representatives in the EU. Article 27 of the GDPR requires:
67 Von Grafenstein, M. Refining the Concept of the Right to Data Protection in Article 8 ECFR – Part
III European Data Protection Law Review Volume 7, Issue 3 (2021). 373–387.
68 Dan Jerker B. Svantesson, ‘Article 4(1)(a) “Establishment of the Controller” in EU Data Privacy
There could be more than one controller deciding the purpose of processing
and how data would be processed. In such a case, they would be teamed up as
joint controllers. These controllers must individually determine their responsibilities
concerning the purpose of processing and maintaining the sanctity of the data protec-
tion principles. When GDPR applies to controllers based out of the European Union,
they need to ensure that their representatives are present to act on their behalf.
A controller can take help from a processor acting on behalf of such controller. The
data controller would accept help from a processor, who would follow similar values
and adopt effective measures protecting the rights of data subjects and maintain the
sanctity of the data protection principles. The processor can only engage with another
processor subsequent of controller’s approval.
The agreement between the controller and processor should incorporate issues
that are relevant to the controller. For instance, issues such as the subject matter,
nature and purpose of processing, the duration of data processing, classification of
personal data and the data subjects and finally controllers’ obligations and rights.70
Amongst other responsibilities, the processor is expected to abide by the following:
Data security is a prime concern for all organisations. With the application of
new technologies, organisations are collecting and processing data at all times,
thereby increasing instances of breaches. While most of the breaches happen due
to external malicious activities, but a significant amount of breach can be accorded
to casual errors within the organisation itself. Data security is not limited to securing
personal sensitive information but also being compliant to protect the personal infor-
mation on a continuous basis. Data security is a fundamental aspect of many obliga-
tions imposed on data controllers and processors by the GDPR. The commission’s
impact assessment which accompanies the GDPR and the Law Enforcement Direc-
tive (LED) proposals acknowledges that the reform gives actors space and flexibility
to improve a data controller’s and processor’s accountability and responsibility in
assessing and mitigating data protection risks.72
In the context of risks associated with various levels of processing, Article 32 portrays
specific risk mitigating steps for the data controllers. They are:
In the Digital Rights Ireland case in 2014, the Court of Justice of the
European Union appeared to consider data security as integral to the core
essence of the right to data protection.
In 2006, the EU passed the Data Retention Directive, which requires
Telecommunications Service Providers (TSPs) to keep traffic and location
data for crime prevention and investigation. In Ireland, Digital Rights took this
Directive and Part 7 of the Criminal Justice (Terrorist Offences) Act 2005 (Irish
Law) requiring data retention to the High Court. The High Court has submitted
the matter to the European Court of Justice (ECJ) for a preliminary ruling. Simi-
larly, in Austria, challenges to the Telekommunikationsgesetz 2003 (“Austrian
law”) implementing the Directive were taken before the Verfassungsgericht-
shof (“Constitutional Court of Austria).” Both the cases were joined by the
President of the Court and maintained that both the Directive and national
legislations violated privacy and data protection rights.I
The Court held that:
“Nor is that retention of data such as to adversely affect the essence of the
fundamental right to the protection of personal data enshrined in Article 8 of
the Charter, because Article 7 of Directive 2006/24 provides, in relation to data
protection and data security, that, without prejudice to the provisions adopted
pursuant to Directives 95/46 and 2002/58, certain principles of data protec-
tion and data security must be respected by providers of publicly available
168 4 Duties and Responsibilities of Controller and Processor
Facts
In 2014, the IT systems of Starwood Hotels were compromised. Marriott acquired
Starwood in 2016. For two years, Marriott did not detect the attack. This was the
time when GDPR was in force. As the attack continued, the attacker got hold of
the cardholder data environment in the Starwood network. It allowed the attacker
access to the customers’ personal data. The attacker did get hold of both encrypted
and unencrypted files. Under the unencrypted file were names, gender, date of birth,
details under the Starwood loyalty programme [mailing address, passport country
code, phone number, email address and credit card expiration date]. In total, there
were 5.25 million unencrypted guest passport numbers, country, flight details and
email addresses. There were also data about child guests and the number of cribs in
the room.
Under the encrypted information, there were 18.5 million passport numbers with
9.1 million payment card details. Marriott estimated that in total 339 million guest
records were affected. Of these, 30.1 million were EEA records, and 7 million were
associated with the UK.
Finally, when the attack was discovered, the personal data of a large number of
individuals were compromised. Following the discovery, Marriott promptly informed
the data subjects and took immediate steps to mitigate the effects of the attack.
73 Digital Rights Ireland Ltd v Minister for Communications, Marine and Natural Resources and
Others and Kärntner Landesregierung and Others, Joined Cases C-293/12 and C-594/12.
74 Information Commissioner’s Office (ICO). https://ico.org.uk/media/action-weve-taken/mpns/
Steps taken by Marriott after they came to know about the incident:
IP address, which is not the case in this matter."76 In their response, the Commissioner
said that “[i]t is right to say that no security measure ‘would necessarily’ work, there
being no guarantee that any security measure is wholly effective. It is also true that
it is harder to detect an attacker who is not operating from a suspicious IP address.
However, this is precisely why the monitoring of legitimate user accounts (including
through logging) within the network for unusual activity is vital.”77
. Insufficient Monitoring of Databases
The Commissioner posed concern about monitoring the existing databases that
Marriott maintained. There were no security alerts on databases, no process to
aggregate the logs, and there was concern with the restrictions imposed on these
databases.
. Control of Critical Systems
There was concern with how Marriott maintained their servers’ security since
the attacker could access the administrator accounts. They failed to ensure that their
critical systems were safeguarded from unauthorised access.
. Encryption
The concern was that Marriott did not follow a consistent approach regarding
encryption. They were not able to produce any risk assessment exercise catering to
the encryption process. Not all passport numbers were encrypted. While it may be
true that some personal data might be at higher risk than others, it does not mean that
threat to other categories of data, as a result, is vitiated.
Due to the incident, Marriott encountered substantial costs for recovery, legal
consequences and reputational damage. This security breach, arising from pre-
existing vulnerabilities, is now recognised as one of the most significant cyber inci-
dents globally. It emphasises the need to increase in the security standards especially
in the context of mergers and acquisitions (M&A).
Marriott International was scrutinised not only for the breach, but also for
the security procedures put in place to protect its guests’ personal information.
Pseudonymisation could have potentially reduced the impact of the leak if Marriott
had pseudonymised its guests’ personal information. Even if attackers acquired unau-
thorised access to the data, they would be unable to directly identify and exploit
individual records because sensitive information such as names and payment details
had been pseudonymised. The GDPR emphasises the need of pseudonymisation as a
security strategy for protecting personal data and reducing the risks connected with
data breaches.
Impact assessments have been utilised across various regulatory domains to evaluate
the risks associated with technologies or contexts. For example, technology assess-
ments emerged in the 1960s to examine the ramifications of technological inno-
vations, while environmental impact assessments are widely practised.85 Privacy
Impact Assessments (PIAs), later evolving into Data Protection Impact Assess-
ments (DPIAs), were initially conducted in the 1990s in Canada, New Zealand and
Australia. Initially, these assessments were primarily conducted by public sector enti-
ties but later adopted by industry as a means to protect privacy interests and showcase
accountability.86
Controllers and processors must follow specific protocols when processing
personal data in a high-risk environment. Data Protection Impact Assessment exer-
cise is to safeguard data subjects’ rights from high-risk processing.87 There are quite
a few Recitals we have to consider and Article 35 to understand the legal framework
under GDPR.
https://www.edps.europa.eu/system/files/2021-04/21-04-27_aepd-edps_anonymisation_en_5.pdf.
Accessed on 24th June 2024.
85 Environmental Impact Assessments, Directive 2015/52/EU.
86 Kloza,D; Dijik,Neils Van; Gellert, Raphaël; Istaván Böröcz; Tanas Alessia;Mantovani, Eugenio;
Quinn, Paul, Data protection impact assessments in the European Union: complementing the new
legal framework towards a more robust protection of individuals (2017).
87 David Wright and Kush Wadhwa, ‘Introducing a Privacy Impact Assessment Policy in the EU
Recital 91 deals with situations where the data controller is involved in large-scale
processing of personal data. This large-scale processing could affect multiple data
subjects. Owing to the extent of data processing, the overall impact could be sensitive
in nature leading to a high-risk environment. Further, there could be risk with the use
of high-end technologies where the data subject has minimal chance of exercising
their rights.89 ,90 There are certain instances of processing where an impact assessment
report should be considered. Here the Recital states:
Using of new technologies to process personal data is likely to affect the rights of
data subjects, in the context of the purpose, nature and scope. In such situations, an
impact assessment exercise would help data controller to comprehend the situation.
A single assessment may help similar processing operations presenting identical
risks for the data subjects.91 The data protection officer in this regard can help the
data controller to organise the data impact exercise.92
Article 35 points to some instances where the impact assessment exercise is
crucial.
. An automated processing which results in “a systematic and extensive evalu-
ation of personal aspects relating to natural persons which is based on auto-
mate processing.”93 Such processing includes profiling, and the outcomes of such
processing will have a legal or other forms of impact on data subjects.
. Where special categories of data are processed—sensitive, special categories and
data relating to criminal convictions.
. A large-scale processing of a publicly accessible area through systematic
monitoring.
The supervisory authority would made available a list where DPIA is required.
Similarly, they can make a list public where no DPIA exercise is needed.
The EDPB has also Guidelines on DPIA. The Guidelines provided nine criteria
reference points for data controllers to consider.
. The first criteria refer to Recitals 71 and 91, wherein the evaluation of personal
data includes profiling and predicting data subjects’ behavioural attributes.
. The second refers to automated decision-making, which has legal effects on data
subjects and significantly impacts them.
94 Guidelines on Data Protection Impact Assessment (DPIA) and determining whether processing
is “likely to result in a high risk” for the purposes of Regulation 2016/679. https://ec.europa.eu/
newsroom/article29/items/611236/en. Accessed 5 December 2023. {Guidelines on Data Protection
Impact Assessment (DPIA)}
176 4 Duties and Responsibilities of Controller and Processor
The DPIA exercise should happen before data processing begins. It is a norm which
sits well with data protection by design and by default. It is merely a tool for deciding
on data processing. It is an ongoing process and may require a revisit owing to a
change in the purpose of processing or the categories of data involved in processing.
Therefore, it is not necessarily a one-time process.
Article 35(9) of the GDPR mandates that controllers should reach out to data
subjects or their representatives regarding planned processing, “without undermining
the protection of commercial or public interests or the security of processing opera-
tions,”96 when deemed suitable. This recognition implies that involving data subjects
in DPIA processes could impose significant administrative and financial burdens
on controllers. However, the GDPR provides no further guidance on assessing the
appropriateness qualification, leaving this decision to the controllers’ discretion.97
In most of the mentioned exercises, data controllers and data processors would
need help from experts. Under GDPR, data protection officer plays a role of an expert.
The controller and processor must designate a data protection officer in the following
cases:
. When a public authority conducts the processing.
. The core activities involve large-scale systematic monitoring of data subjects.
Systematic monitoring is required owing to the scope and purpose of processing.
The large-scale processing also extends to sensitive data.
A ‘core activity’ is linked to the notion that personal data processing is integral to
controller’s or processor’s operations, as elucidated by the WP29 Guidelines.98 The
Confederation of European Data Protection Organisations (CEDPO) suggested that
‘core activities’ should be interpreted based on the organisation’s corporate purpose
description and its revenues as outlined in the profit and loss statement.99
The GDPR does not give a specific definition for the term ‘large scale’ terms of
processing personal data; however, Recital 91 sheds some light on Article 34(3)(b)
of the GDPR, which requires DPIA exercise for large-scale processing of special
categories of data. The WP29 Data Protection Officer (DPO) Guidelines attach four
criteria to ‘large scale’ processing. They will depend on the number of data subjects
involved, the extent of processing as a result, the time period and the geographical
reach of such activity.100
A single data protection officer can be appointed by a group of data controllers.
However, each data controller should have access to the data protection officer. This
is also true for controllers representing public authorities. It will, however, depend
on the organisational structure and size of the organisation. The Working Party 29
recommends, “that the DPO be located within the European Union, whether or not
the controller or the processor is established in the European Union. However, it
cannot be excluded that, in some situations where the controller or the processor has
no establishment within the European Union, a DPO may be able to carry out his or
her activities more effectively if located outside the EU.”101
The data protection officer would be an expert, and we will reflect upon the
required qualities under Article 39. The controller or the processor should share the
details of the data protection officer with the supervisory authority.
In 2010, the Network of Data Protection Officers (‘NDPO’) of the EU institutions
and bodies already considered that a DPO should possess the following personal
qualities:
1. “(a) It is recommended that the DPO should have the following experience/
maturity: at least 3 years of relevant experience to serve as DPO in a body
where data protection is not related to the core business (and thus personal data
processing activities are mainly administrative); and at least 7 years of relevant
experience to serve as DPO in an EU institution or in those EU bodies where
data protection is related to the core business or which have an important volume
of processing operations on personal data.
2. (b) Personal skills: integrity, initiative, organisation, perseverance, discretion,
ability to assert him- self/herself in difficult circumstances, interest in data
protection and motivation to be a DPO.
3. (c) Interpersonal skills: communication, negotiation, conflict resolution, ability
to build working relationships.”102
The controller or the processor should ensure that a data protection attends to the
issues pertaining to data protection promptly. Further, they shall extend their support
to the data protection officer by providing resources that the data protection officer
would require.103 The officer may need these resources to complete the entrusted
responsibility. No instructions should come to the data protection officer from the
controller or processor or any of their representatives.104 The data protection officer
should independently perform their tasks and report to the top-management within
the organisation.105 Data subjects can reach out to the data protection officer as well
for exercising their rights.106
The data protection officer shall be entrusted with the following tasks:
. One of the responsibilities of the DPO is to train those involved in the processing
of personal data.
102 Professional Standards for Data Protection Officers of the EU institutions and bodies working
under Regulation (EC) 45/2001,(NDPO, 2010).
103 Eric Lachaud, ‘Should the DPO Be Certified?’ (2014) 4 IDPL 189.
104 Barbara Eggl, ‘Learning to Walk a Tightrope: Challenges DPOs Face in the Day-to-Day Exercise
the Innovation of the Relationship between Data and Data Subjects’ Rights’ (2020) 3 JDPP 403.
106 Article 38, GDPR.
7 Standardisation of Processes 179
. In its advisory role, DPO is required to monitor compliance with GDPR. The DPO
shall also help raise awareness amongst staff members involved in data processing
and related auditing activities.
. As and when required, the DPO shall guide the DPIA exercise and monitor the
implementation under Article 35.
. For a supervisory authority in the Member State, the DPO is the first point of
contact on data protection issues.
. The DPO, while carrying out its task, should always factor in the related risk
associated with the context, scope and purpose of data processing.107
In the Oikonomopoulos judgement,108 the Court determined that the failure to
inform the DPO was a significant enough issue to support a claim for damages. It
emphasised that without proper and prompt information regarding data processing
activities, the DPO couldn’t effectively carry out the crucial supervisory role assigned
by the European legislature, including the ability to notify the European Data
Protection Supervisor.109
7 Standardisation of Processes
Standardised processes are critical to ensure that inconsistencies are addressed. The
data protection measures to protect the privacy of natural persons are no exceptions.
We have seen in many of our discussions in the past that several practices followed
by data controllers could suffer from inconsistencies. For instance, the template that
should be used to share communication with data subjects; the consent framework
and how consent is shared; steps concerning the transfer of personal data beyond the
borders of the European Union; appropriate measures taken by the data controllers
towards security so on and so forth.
Recitals 98 and 99 and Articles 40 and 41 reflect upon the introduction of these
standardised processes.
encouraged to facilitate the effective implementation of the GDPR. The codes should
consider unique features of processing in certain sectors, including micro, small
and medium enterprises. The codes calibrate the obligations and responsibilities of
controllers and processors. This calibration happens after accounting for the risks
associated with data processing with an overarching aim of safeguarding the rights
of data subjects.110
(g) the information provided to, and the protection of, children, and the
manner in which the consent of the holders of parental responsibility over
children is to be obtained;
(h) the measures and procedures referred to in Articles 24 and 25 and the
measures to ensure security of processing referred to in Article 32;
(i) the notification of personal data breaches to supervisory authorities and
the communication of such personal data breaches to data subjects;
(j) the transfer of personal data to third countries or international organisa-
tions; or.
(k) out-of-court proceedings and other dispute resolution procedures for
resolving disputes between controllers and data subjects with regard to
processing, without prejudice to the rights of data subjects pursuant to Articles
77 and 79.”
Article 41 talks about creating a setup, which will have relevant expertise to under-
stand the workings of the code. A competent supervisory authority will accredit
this body for that purpose. This accredited body will work in parallel and not in
contradiction with the tasks that one associates with a supervisory authority.113
There are certain pre-requisites connected to the accreditation of this body, and
Article 41 lays down the ground rules:
uments/4024815/uk-accreditation-requirements-for-code-of-conduct-202303.pdf. Accessed 6
December 2023. {Information Commissioner’s Office (ICO)}.
116 Information Commissioner’s Office (ICO), 2.
7 Standardisation of Processes 183
It is not just about sharing information with the data subjects, the data controllers
need to ensure that data subjects understand the consequences of data processing and
the complexities attached to such processing. It is difficult to predict whether data
subjects will read the privacy policy concerning the service or the product that a data
controller provides. Further, it is even more challenging to predict whether the data
subject would be able to understand the privacy policy in the way presented by the data
controller. We can keep trying to standardise the information that the data controller
shares, how they are represented and how data subjects navigate such information.
These are tough standards to meet, and in the last 27 years covering the time of the
Directive and the GDPR, there hasn’t been much of a change. Therefore, a better
option would be to develop certain standardised measures that the data controllers
must meet before processing begins. These standardisation measures would have a
certain degree of universality connected to them. Once data controllers are certified,
it will be easier for them as well for the data subjects, who then wouldn’t rely much
on the content of the information. Here we will turn our attention to Recital 100 and
Articles 42 and 43.
7.6 Certification
Recital 100 of the GDPR advises creating the entire certification procedure. It ranges
from creating data protection seals and marks as part of the code of conduct creation
process. These aimed standardisations streamline the tasks of data subjects while
assessing the data protection quality under different circumstances.118
At the EU level, Member States and the existing administrative structure, including
supervisory authorities, EDPB and the Commission would promote the certifica-
tion procedure and support data controllers and processors to comply with GDPR.
Participation is voluntary, but certification will aid in providing adherence to the
Regulations.
The certification under this Article will follow the approval structure of a supervi-
sory authority and will be issued by certified bodies. If the Board happens to approve
the criteria behind adopting a common certification seal, it may become the European
Data Protection Seal.
The controller or processer must submit all necessary information about the
processing activities they follow. This information must be provided to the certi-
fication body or the supervisory authority to run the certification procedure.
The issued certification is valid for a maximum period of three years. Controllers
and processors may opt to renew, subject to meeting the relevant requirements. There
could be a situation where the certification is withdrawn. This could be due to not
meeting the certification requirements.
The EDPB collates all existing and valid certification mechanisms and data
protection seals. They will be responsible for making them public.119
Suggested Readings
1. Guidelines 4/2019 and Analysis on Article 25 Data Protection by Design and by Default (Article
25).
2. EDPB Guidelines on Data Protection Impact Assessment (DPIA) adopted on 4th April 2017.
3. Guidelines 1/2018 on certification and identifying certification criteria in accordance with
Articles 42 and 43 of the Regulation adopted on 4th June 2019.
4. ICO Accreditation Requirements For UK GDPR Code Of Conduct Monitoring Bodies.
5. WP29, 2010, Opinion 1/2010 on the concepts of “controller” and “processor”.
6. EDPS, opinion 5/2018. Preliminary Opinion on privacy by design, ( May 2018).
7. Kuner, Christopher; Bygrave, Lee.A., The EU General Data Protection Regulation (GDPR):
A Commentary(2020).
8. Guidelines 05/2020 on consent under Regulation 2016/679.
9. Guidelines on Automated individual decision-making and Profiling for the purposes of
Regulation 2016/679.
10. EC Staff Working Paper 2012.
11. WP29, Guidelines on Data Protection Officers(‘DPOs’), (2017).
12. Michèle Finck, ‘Cobwebs of Control: The Two Imaginations of the Data Controller in EU Law’
(2021) 11 IDPL 333.
186 4 Duties and Responsibilities of Controller and Processor
13. Nils Zurawski, David Wright, and Paul de Hert (eds), Privacy Impact Assessment (Springer
2012) 519 pp, ISBN 978-94-007-2542-3, (2012) 2 IDPL 316.
14. Dan Jerker B. Svantesson, ‘Article 4(1)(a) “Establishment of the Controller” in EU Data Privacy
Law—Time to Rein in This Expanding Concept? (2016) 6 IDPL 210.
15. Michael Veale, Reuben Binns, and Jef Ausloos, ‘When Data Protection by Design and Data
Subject Rights Clash’ (2018) 8 IDPL 105.
16. Donato La Muscatella, ‘Data Protection Officer: Tasks and Responsibilities of a Key Role for
the Innovation of the Relationship between Data and Data Subjects’ Rights’ (2020) 3 JDPP
403.
Chapter 5
Transfer of Personal Data to Third
Countries
1 Introduction
Transferring of personal data beyond EU is one of the most difficult questions tackled
under the GDPR. It was an issue that the Data Protection Directive tried to remedy,
but the GDPR proposes a comprehensive structure for data transfer.
The GDPR sets the rules under circumstances when a data controller, while
fulfilling the purpose of processing, is required to transfer personal data beyond
the boundaries of the Union.
The general notion is that there has to be a comparable data protection framework
in the country where the data are now being transferred or would be transferred. Data
controllers need to ensure that the country where data are transferred has effective
implementation measures of the data protection principles.
This chapter will focus on the legal structure that exists under GDPR for transfer
of personal data. The legal structure encompasses relevant Recitals and Articles and
different Guidelines issued by EDPB along with their interpretation. Additionally,
we will look at the Schrems I and Schrems II judgements delivered by the CJEU
concerning data transfer from the EU to the USA and the circumstances under which
the safe harbour agreement and the privacy shield agreement have been questioned.
Finally, we will also look into the third EU-US Privacy Framework adopted by
European Commission which introduces new binding safeguards that addresses all
the concerns raised by the ECJ/CJEU.
To ascertain the foundation of the rules of transfer, there are about fifteen Recitals
starting from 101, reflecting various dimensions of transfer.
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024 187
I. Gupta et al., Introduction to Data Protection Law,
https://doi.org/10.1007/978-981-97-6355-9_5
188 5 Transfer of Personal Data to Third Countries
In the era of globalisation data will flow outside the EU. As a result, with the
increase in the data flow, there are concerns associated with data protection. One
cannot undermine the extent of data protection offered to natural persons under
GDPR when transferring the data outside the EU. Therefore, a specific regulatory
framework must be followed before transferring happens. The General Principles
of Article 44 make it mandatory to follow the GDPR data transfer standards while
transferring data beyond EU.1
However, Recital 102 suggested that GDPR does not prejudice international agree-
ments resulting out of an agreement between the Union and a third country. Member
States are also free to enter into international agreements so far as such agreements
comply with GDPR and ensure safeguards to personal data through appropriate
means.2 The Commission will decide on the level of adequacy in the third country
[Recital 103].3 In such cases, the impending transfer to a third country or international
organisation does not need further authorization. It may also revoke such adequacy
decision after providing reasons to the stakeholders.4
When assessing the safeguards in the third country, the Commission would
consider the status of the rule of law and how the country’s legal structure gears
up to respect the rule of law and access to justice.5 Further, the Commission would
consider the existing human rights norms and laws concerning public and national
security.
and legal developments.6 In the process, the Commission should consider the views
and findings of different bodies of the Union. Data transfer may be prohibited if
the review findings suggest that the countries or the organisations in question no
longer adequately process the data.7 Other than the Recitals, Article 45 reflects upon
transfers based on adequacy decisions. According to Article 45, the periodic review
should happen at least every four years.8
Adequacy requires that data protection Regulations outside EU are consistent
with the EU requirements with a further requirement of an adequate enforcement
mechanism. These Regulations must be significantly comparable to those of the EU,
but they do not have to be the same. According to WP29, it entails adhering to a
“core” set of principles governing the substance and enforcement of existing data
mechanisms covering GDPR, EU Charter of Fundamental Rights and international
agreements like Council of Europe Convention 108. It also entails analysing the legal
framework that governs public authorities’ access to personal data.9
There could be instances where adequacy decisions are not present in relation to
a third country. In all such cases, the data controllers should ensure that appropriate
safeguard mechanisms are in place for the data subjects. These could be in the form
of approved binding corporate rules, standard data protection clauses or contrac-
tual clauses approved by the supervisory authorities in the Member States.10 These
measures will be discussed in detail later in the chapter. They should ensure that the
requirements under GDPR are adequately protected in a third country. There could
be other administrative arrangements, like a memorandum of understanding (MoU),
where public authorities or their representatives carry out data transfers. This MoU
should be able to uphold the rights that data subjects want to exercise. Safeguards that
are not legally binding and offered as part of these arrangements must be authorised
by a competent supervisory authority.11
The controller or a processor can use the approved standard data protection clauses
by the Commission or the supervisory authority. A controller or a processor can also
include standard data protection clauses in a contract between the processor and
any other subsequent processor. Also, other clauses could be added, and additional
safeguards may be provided subject to that these clauses or the clauses mentioned
above do not affect the rights of data subjects.12
6 Julian Wagner, ‘The Transfer of Personal Data to Third Countries under the GDPR: When Does
a Recipient Country Provide an Adequate Level of Protection?’ (2018) 8 IDPL 318.
7 Bjørn Aslak Juliussen, Elisavet Kozyri, Dag Johansen, and Jon Petter Rui, ‘The Third Country
Problem under the GDPR: Enhancing Protection of Data Transfers with Technology’ (2023) 13
IDPL 225.
8 Article 45, GDPR.
9 Working Party 29, 2017.
10 Massimo Marelli, ‘Transferring Personal Data to International Organizations under the GDPR:
“Onward transfer,” although not explicitly defined in documents like the standard
contractual clauses,13 generally refers to a situation entailing subsequent transfer of
personal data after its initial transfer to a data importer outside the EU or EEA.14 This
term is commonly used to describe situations where data imported by a company are
further transferred to third parties by the initial importer. For example, a company
might delegate database management to a service provider, who then subcontracts
maintenance tasks to another entity, constituting an onward transfer of data.15
Article 47 reflects upon binding corporate rules. These are internal policies estab-
lished and adhered by corporations for transfer of personal data. These rules shall
be approved by a competent supervisory authority and would be enforceable on
all concerned members of the group or group of enterprises.18 These rules should
include the following details:
(e) the rights of data subjects in regard to processing and the means to
exercise those rights, including the right not to be subject to decisions based
solely on automated processing, including profiling …
(f) the acceptance by the controller or processor established on the territory
of a Member State of liability for any breaches of the binding corporate rules
by any member concerned not established in the Union…
(h) the tasks of any data protection officer designated in accordance with
Article 37 or any other person or entity in charge of the monitoring compliance
with the binding corporate rules within the group of undertakings, or group of
enterprises engaged in a joint economic activity, as well as monitoring training
and complaint-handling;
(i) the complaint procedures;
(j) the mechanisms within the group of undertakings, or group of enterprises
engaged in a joint economic activity for ensuring the verification of compliance
with the binding corporate rules. Such mechanisms shall include data protection
audits and methods for ensuring corrective actions to protect the rights of the
data subject. …
(k) the mechanisms for reporting and recording changes to the rules and
reporting those changes to the supervisory authority; …”
If the data subject is unable to share consent, the transfer is deemed permis-
sible to safeguard their bodily integrity and vital interests, or the vital interests of
another individual. Adequacy decision sans public interest may lead to restriction
and stopping transfer of personal data beyond EU by the law of Union or Member
State.
As a general rule, data transfer should comply with a two-step process: follow data
protection principles under Article 5 of GDPR and have a lawful basis under Articles
6 and 9 when handling special categories of data.
The EDPB has identified critical safeguards for international data transfer agreements
between public agencies to protect data subjects’ rights. These agreements must state
the purpose of data collection and processing, ensuring that personal information is
not used for incompatible objectives.30 The agreements must also ensure that data are
accurate, relevant and confined to its intended purpose, with mechanisms in place
to quickly correct any mistakes.31 Furthermore, data retention clauses ensure that
personal data are stored for a limited period and only for as long as necessary.32
In addition, the agreements must ensure the security and confidentiality of
transferred data using adequate technical and organisational safeguards.33 An effi-
cient internal governance framework is required to regulate access to personal
data and enforce security Regulations. The agreements should also include proto-
cols for managing data breaches and notifying data subjects.34 Importantly, data
27 Olivier Proust and Emmanuelle Bartoli, ‘Binding Corporate Rules: A Global Solution for
International Data Transfers’ (2012) 2 IDPL 35.
28 Article 50, GDPR.
29 (Guidelines 2/2020 on Articles 46 (2) (a) and 46 (3) (b) of … - europa.eu). https://edpb.eur
opa.eu/sites/default/files/consultation/
edpb_guidelines_202002_art46guidelines_internationaltransferspublicbodies_v1.pdf. Accessed 7
December 2023 (Guidelines 2/2020).
30 Guidelines 2/2020, 8.
31 Guidelines 2/2020, 8.
32 Guidelines 2/2020, 9.
33 Guidelines 2/2020, 9.
34 Zuzanna Gulczyńska, ‘A Certain Standard of Protection for International Transfers of Personal
Guidelines 2/2020 on articles 46 (2) (a) and 46 (3) (b) of Regulation 2016/
679 for transfers of personal data between EEA and non-EEA public
authorities and bodies (18th January 2020)
“a general information notice with, as a minimum, information on how and
why the public bodies may process and transfer personal data, the relevant tool
used for the transfer, the entities to which such data may be transferred, the
rights available to data subjects and applicable restrictions, available redress
mechanisms and contact details for submitting a dispute or claim”
35 Guidelines 2/2020, 9.
36 Guidelines 2/2020, 10.
37 Guidelines 2/2020, 10.
38 Guidelines 2/2020, 11.
39 Guidelines 2/2020, 12.
40 Guidelines 2/2020, 13.
196 5 Transfer of Personal Data to Third Countries
Guidelines 2/2020 on articles 46 (2) (a) and 46 (3) (b) of Regulation 2016/
679 for transfers of personal data between EEA and non-EEA public
authorities and bodies (18th January 2020).
“First, the receiving public body should commit to put in place a mechanism
to effectively and timely handle and resolve complaints from data subjects
concerning compliance with the agreed data protection safeguards.
Second, the agreement should allow for a judicial remedy, including
compensation for damages - both material and non-material - as a result of
the unlawful processing of personal data.
In that case, the international agreement could create a structure which
enables the data subject to enforce its rights outside the Courts, for example,
through quasi-judicial, binding mechanisms such as arbitration or alternative
dispute resolution mechanisms such as mediation, which would guarantee an
independent review.”
Article 46 of the GDPR allows EEA public bodies to transfer personal data to public
bodies in a third country which will have prior authorisation of the supervisory
authority. They can base this transfer on instruments concluded between these public
authorities. These instruments must be legally binding and enforceable. The parties
involved in such transfer should commit themselves to safeguarding data subjects’
should also make an assessment of the existing data protection law with transfer
norms to third countries. Further, the availablilty of data subjects’ rights and
redressal mechanisms.
. The extent of independence associated with supervisory authority for enforcing
data subjects’ rights.
. Adequacy may be tested through an implementing act, which opens for peri-
odic reviews every four years. Review will address development in different
jurisdictions with a further option to monitor these changes.46
. The adequacy level falls short, and the Commission can repeal, amend or suspend
its decision as necessary. The deficiencies must be addressed in consultation with
the foreign jurisdiction or the organisation.47
Recommendations Published on 2 February 2021 on the Adequacy Referential Under
the LED
The EDPB document48 explains the process to be followed to test the level of
adequacy in a jurisdiction beyond EU and for an international organisation. In the
context of the LED for the purposes of the “prevention, investigation, detection or
prosecution of criminal offences or the execution of criminal penalties, including the
safeguarding against the prevention of threats to public security”, the third country
must have the core data protection principles embedded in their legal framework to
ensure essential equivalence the EU framework.49 ,50
tive,. https://edpb.europa.eu/sites/default/files/files/file1/recommendations012021onart.36led.pdf_
en.pdf. Accessed 7 December 2023 (Recommendations 01/2021).
49 Laura Drechsler, ‘Wanted: LED Adequacy Decisions. How the Absence of Any LED Adequacy
Decision Is Hurting the Protection of Fundamental Rights in a Law Enforcement Context’ (2021)
11 IDPL 182.
50 Recommendations 01/2021,4.
5 EU Standards for Adequacy in the Police Cooperation and Judicial … 199
Following different judgements delivered by CJEU, a legal basis that allows interfer-
ence with the rights in the Charter must satisfy the remit of proportionality correlated
to the purpose that permits such interference. [La Quadrature du Net and Schrems
II].52
To satisfy this requirement, the legislation must lay down the minimum safe-
guards. It is over and above having clear and precise rules covering the scope of
interference. It guarantees protection against the risk of abuse to those whose data
have been transferred. The measures of safeguarding the interest of data subjects
should explicitly include the circumstances under which processing can take place.
An adequacy decision is an outcome of the privacy and data protection framework
and effective implementation of such framework through the existing legal structure
in a third country.
The scope of LED ensures that the general data protection principles are followed,
yet there are specific changes from the general applicability in other cases which are
discussed below.
The EDPB defines numerous key principles for the lawful and fair data processing,
emphasising that permission must not be used as a legal foundation for processing
by competent authorities in criminal cases due to a lack of true free choice. Instead,
Member States may enact legislation requiring data subjects to comply in specified
cases, such as DNA testing or location surveillance.53 Processing becomes legal if
it is intended to prevent public security threats, as specified in national legislation.54
Following the purpose limitation principle, data processing is allowed for reasons
that are precise, explicit and legitimate, with an option of further processing in the
background of legally structured and proportionate reasons.55
Further processing or disclosure of personal data for non-law enforcement reasons
must be legally justified and appropriate, such as for national security.56 Data minimi-
sation is critical, with solutions such as limiting entry fields and implementing quality
checks to guarantee that only relevant data are handled.57 The notion of data accu-
racy is especially important in contexts such as Court procedures, where data can
include subjective statements.58 Transparency is vital, with data subjects receiving
51 Recommendations 01/2021, 8.
52 La Quadrature du Net and others, 6 October 2020, ECLI:EU:C:2020:791; Case C-311/18,
Data Protection Commissioner v Facebook Ireland Ltd and Maximillian Schrems, 16 July 2020,
ECLI:EU:C:2020:559.
53 Nadezhda Purtova, ‘Between the GDPR and the Police Directive: Navigating through the Maze
clear and basic information about data processing, while exceptions exist to protect
legal inquiries or investigations while balancing data subject rights.59
Data subjects have rights to access, rectify and erase data, particularly after
processing objectives have ended, albeit these rights may be limited to avoid impeding
law enforcement.60 Automated decision-making and profiling must be regulated,
with legal safeguards and human intervention to protect data subjects.61 Data protec-
tion by design and default is an option, including the technical measures such as
pseudonymisation. To ensure similar data protection levels in jurisdictions outside
the EU, particular rules and enforcement mechanisms must be in place to uphold EU
standards originating from the Charter of Fundamental Rights and LED.62
The EU-US Data Privacy Framework gives EU citizens new rights when their data
are transmitted to participating US organisations, such as access to their data and the
power to request changes or deletions of incorrect or unlawfully handled data. It also
includes redressal mechanisms for mishandled data, such as free independent dispute
resolution and an arbitration board. Companies in the USA can join the framework
by committing to privacy standards such as purpose limitation, data minimization
and data retention, as well as requirements for data security and third-party sharing.63
Facts
Mr. Schrems has been a Facebook social network user since 2008. The entire judge-
ment is based on a complaint that Mr. Schrems had filed in 2013. He did not want his
personal data to go to the USA. He suggested that Facebook Ireland was transferring
and storing personal data on servers located in America. Mr. Schrems argued that the
level of legal protection and the practices followed in the USA were not adequately
protecting rights of EU data subjects. Further, the data stored in the USA were used
(Schrems I).
6 Transatlantic Data Transfer: EU-US Standards 201
65 Schrems I.
66 https://eur-lex.europa.eu/legal-content/en/TXT/?uri=CELEX%3A32000D0520. Accessed 7
December 2023.
67 Schrems I.
202 5 Transfer of Personal Data to Third Countries
premised on protecting national security and the prevention of crime. At all times,
such collection must be proportional to the overarching purpose.68
Following the facts of the case, Mr. Schrems’s complaint questions the legality
of the safe harbour regime. This regime was an outcome of the decision 2000/520
taken by the Commission. Although Mr. Schrems never questioned the validity of
the Directive or the Decision, he questioned the role of the Commissioner. The issue
was whether the Decision of 2000/520 obligated the Commissioner or whether the
Commissioner could apply Article 8 of the Charter to question the Decision.
Questions
‘(1) Whether in the course of determining a complaint which has been made to
an independent office holder who has been vested by statute with the functions
of administering and enforcing data protection legislation that personal data
is being transferred to another third country (in this case, the United States of
America) the laws and practices of which, it is claimed, do not contain adequate
protections for the data subject, that office holder is absolutely bound by the
Community finding to the contrary contained in [Decision 2000/520] having
regard to Article 7, Article 8 and Article 47 of [the Charter], the provisions of
Article 25(6) of Directive [95/46] notwithstanding?
(2) Or, alternatively, may and/or must the office holder conduct his or her
own investigation of the matter in the light of factual developments in the
meantime since that Commission decision was first published?’.
68 Schrems I.
69 ‘Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the
Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement
of Such Data’, ‘Directive 95/46/EC of the European Parliament and of the Council of 24 October
1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the
Free Movement of Such Data’ (OJ L24 October 1995) accessed 7 December 2023 (Directive 95/
46/EC).
70 Directive 95/46/EC.
6 Transatlantic Data Transfer: EU-US Standards 203
Recital 10 discusses increasing the level of data protection, and the current mech-
anism for protecting personal data must be enhanced. The Directive is not intended
to inhibit personal data flow outside the EU, which is required for international trade.
Therefore, Recital 56 reflects upon the need to test the adequate protection level in
the third country and overall assessment of the protection level and existing legal
structure in the third country. As a result, as per Recital 56, a transfer may be prohib-
ited to third countries that do not ensure adequate protection.71 Therefore, transfer
to third countries can only happen in full compliance with Article 8 of the Charter
(Recital 60).72
Additionally, Recitals 62 and 63 also discuss the independence of supervisory
bodies in Member States and the degree of freedom with which they should act
to preserve the rights. As a result, supervisory agencies should have the resources
they need to carry out their responsibilities, such as investigations and interventions.
These are incidents in which people have filed complaints.73
Articles 1, 2, 25, 26, 28 and 31 of Directive 95/46:
In the context of personal data, Article 1 gives Member States’ the responsibility
to safeguard the rights of natural persons.74 Article 2 provides for definitions which
covers personal data, its processing and definition of controller.75
Article 25 sets the prerequisites for transferring personal data outside the EU,76
while Article 26 specifies situations where such transfers can occur without assessing
adequacy. These include scenarios based on unambiguous consent, performance of
contract and protecting interests of data subjects.77
In all of the above cases and for the rest, appropriate safeguards are required to
be taken to safeguard rights enshrined under the Charter.
Article 28 discusses supervisory authorities’ role in Member States.
These supervisory authorities have:
. Powers of investigation ranging from access to data and collection of all necessary
information for carrying out supervisory duties.
. Powers of intervention, including sharing opinions before processing happens to
the power of banning processing.
. The scope to hear complaints lodged by an individual in the context of the existing
rights.78
Further to the Articles and Recitals above, the Court also referred to the Decision
which led to transfer of data from the EU to the USA.
71 Directive 95/46/EC.
72 Directive 95/46/EC.
73 Directive 95/46/EC.
74 Directive 95/46/EC.
75 Directive 95/46/EC.
76 Directive 95/46/EC.
77 Schrems I.
78 Schrems I.
204 5 Transfer of Personal Data to Third Countries
“(a) the government body in the United States referred to in Annex VII to
this Decision or an independent recourse mechanism within the meaning of
letter (a) of the Enforcement Principle set out in Annex I to this Decision has
determined that the organisation is violating the Principles implemented in
accordance with the FAQs; or.
(b) there is a substantial likelihood that the Principles are being violated;
there is a reasonable basis for believing that the enforcement mechanism
concerned is not taking or will not take adequate and timely steps to settle the
case at issue; the continuing transfer would create an imminent risk of grave
harm to data subjects; and the competent authorities in the Member State have
made reasonable efforts under the circumstances to provide the organisation
with notice and an opportunity to respond.”
83 2000/520/EC.
84 2000/520/EC.
85 2000/520/EC.
86 2000/520/EC.
206 5 Transfer of Personal Data to Third Countries
“Annexure 1
Safe Harbour Privacy Principles.
“… the Department of Commerce is issuing this document and Frequently
Asked Questions (“the Principles”) under its statutory authority to foster,
promote, and develop international commerce. The Principles were developed
in consultation with industry and the general public to facilitate trade and
commerce between the United States and European Union. They are intended
for use solely by US organisations receiving personal data from the European
Union for the purpose of qualifying for the safe harbour and the presumption
of “adequacy” it creates. Because the Principles were solely designed to serve
this specific purpose, their adoption for other purposes may be inappropriate.
…
Decisions by organisations to qualify for the safe harbour are entirely volun-
tary, and organisations may qualify for the safe harbour in different ways.
…
Adherence to these Principles may be limited: (a) to the extent necessary to
meet national security, public interest, or law enforcement requirements; (b) by
statute, government Regulation, or case-law that create conflicting obligations
or explicit authorisations, provided that, in exercising any such authorisation,
an organisation can demonstrate that its non-compliance with the Principles
is limited to the extent necessary to meet the overriding legitimate interests
furthered by such authorisation; or (c) if the effect of the Directive [or] Member
State law is to allow exceptions or derogations, provided such exceptions or
derogations are applied in comparable contexts. Consistent with the goal of
enhancing privacy protection, organisations should strive to implement these
Principles fully and transparently, including indicating in their privacy policies
where exceptions to the Principles permitted by (b) above will apply on a
regular basis. For the same reason, where the option is allowable under the
Principles and/or US law, organisations are expected to opt for the higher
protection where possible.”
87 Yann Padova, ‘The Safe Harbour is Invalid: What Tools Remain for Data Transfers and What
Comes Next?’ (2016) 6 IDPL 139.
88 2000/520/EC.
6 Transatlantic Data Transfer: EU-US Standards 209
89 Data Protection Commissioner v Facebook Ireland Limited and Maximillian Schrems, C-311/
18, ECLI:EU:C:2020:559, 16 July 2020 (Schrems II).
90 Commission Decision on standard contractual clauses for the transfer of personal data to
processors established in third countries under Directive 95/46/EC of the European Parliament and
of the Council (2010). https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX%
3A32010D0087#:~:text=Commission%20Decision%202002%2F16%2FEC,the%20European%
20Union%20to%20a. Accessed 20th May 2024.
91 Schrems-II.
92 Schrems-II.
93 Schrems-II.
94 Schrems-II.
95 Schrems-II.
210 5 Transfer of Personal Data to Third Countries
Approved clauses ensure that data controllers follow certain objective standards when
it comes to data transfer.
Source Schrems- II
The SSC empowers supervisory authorities to review practices of the data
importers. They may prohibit or suspend data transfer where evidence suggests that
such a transfer may adversely impact data subjects.
Article 1 of the SCC examines the scope of the Decision, which applies to personal
data transfer outside the EU.96
The annexe consists of 12 standard clauses97 out of which some of relevant clauses
in the present context have been considered.
. Clause 4: “Obligations of the data exporter”98 :
It is the obligation of the data exporter to certify that the transfer of data will happen
following statutory data protection protocols. Data exporter must advise any data
processor involved in data processing. Further, for particular categories of data, data
subjects should have enough warnings about the possibility of data transfer and the
jurisdiction receiving such transfer may not be a country with adequate protection.99
. Clause 5 “Obligations of the data importer …”:
The data importer at all times must follow the data transfer norms and instructions
of the data exporter. If, for whatever reasons, the data importer cannot comply, the
96 Schrems- II.
97 Schrems-II.
98 Schrems-II.
99 Schrems-II.
6 Transatlantic Data Transfer: EU-US Standards 211
data importer will promptly inform the data exporter. The data exporter can then
suspend the data transfer or terminate the contract. In the event that the data importer
is unable to fulfil its responsibilities due to legislative action or otherwise, the data
importer shall quickly notify the data exporter of the change. The data exporter then
can act accordingly.100
Further, clause 5 also refers to special circumstances where the data importer
should promptly inform the data exporter for legally binding disclosure required
by a law enforcement agency. This is with reference to the national legislation’s
mandatory requirements that apply to the data importer. It could be in relation to the
prevention, detection and prosecution of criminal offences and for the purposes of
national and public interests.101
. Clause 6, under the heading “Liability”, talks about the compensation liability of
the data exporter towards the data subject. Data importer should switch places
with the exporter in case of an inability to pay the compensation.102
. Clause 11 reflects upon the idea of “Sub-processing” where data importer is
not allowed to further delegate through a subcontract mechanism unless there
is a written consent from the data exporter. The subprocessor will have similar
obligations as the data importer.103
. Clause 12, “Obligation after the termination of personal data-processing services”,
requires a return of all that the data importer received to the data exporter. The
data importer shall destroy all such information unless legislation prevents such
an act.104
In 2015, the CJEU invalidated the safe harbour agreement between the EU and
the USA. Following that, the Privacy Shield Decision was adopted after assessing
the structure of US legislation. The objective was to correct the shortcomings of
the safe harbour agreement by adopting the privacy shield process. There was a
detailed representation of the safeguards adopted through this new avenue through
which data transfer will be made possible which included role of the Privacy Shield
100 Schrems-II.
101 Schrems-II.
102 Schrems-II.
103 Schrems-II.
104 Schrems-II.
105 COMMISSION IMPLEMENTING DECISION (EU) 2016/1250 of 12 July 2016 pursuant
to Directive 95/46/EC of the European Parliament and of the Council on the adequacy
of the protection provided by the EU-U.S. Privacy Shield (notified under document
C(2016) 4176). https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=uriserv%3AOJ.L_.2016.207.
01.0001.01.ENG. Accessed 7 December 2023 (Decision (EU) 2016/1250).
212 5 Transfer of Personal Data to Third Countries
Ombudsperson who would look after the proportionality of interference by the federal
agencies.106 In this regard:
106 David Bender, ‘Having Mishandled Safe Harbor, Will the CJEU Do Better with Privacy Shield?
A US Perspective’ (2016) 6 IDPL 117.
107 50 U.S.C. § 1881.
108 Decision (EU) 2016/1250.
109 Decision (EU) 2016/1250.
6 Transatlantic Data Transfer: EU-US Standards 213
Act or FOIA.110 It is a tool that the EU data subjects may avail to access records of
personal data held by national agencies. However, Recital 115 pointed to a possible
legal basis [EO 12333] that US intelligence authorities may use and may not be
covered under this privacy shield.111
In this context, the CJEU commented,
“where judicial redress possibilities in principle do exist for non-U.S. persons, such as for
surveillance under FISA, the available causes of action are limited … and claims brought by
individuals (including U.S. persons) will be declared inadmissible where they cannot show
’standing’ …, which restricts access to ordinary Courts.”112
with other officials representing different departments and agencies. The senior coor-
dinator will work independently from the intelligent community and directly report
to the secretary of state.114
Questions
personal data carried out by State authorities in the course of an activity meant to
protect national security.”117 ,118
The 2nd, 3rd and the 6th questions all point to the level of protection envisaged
in the context of personal data transferred to a country outside the EU based on
SCC. Also, various factors ensure that the level of protection is adequately fulfilled.
Without an adequacy decision, safeguards’ mechanism could be through the adoption
of the SCC approved by the Commission.
“ It follows that, since, first, a transfer of personal data, such as that at issue
in the main proceedings, for commercial purposes by an economic operator
established in one Member State to another economic operator established in a
third country, falls, as is apparent from the answer to the first question, within
the scope of the GDPR and, second, the purpose of that Regulation is, inter alia,
as is apparent from Recital 10 thereof, to ensure a consistent and high level of
protection of natural persons within the European Union and, to that end, to
ensure a consistent and homogeneous application of the rules for the protection
of the fundamental rights and freedoms of such natural persons with regard to
the processing of personal data throughout the European Union, the level of
protection of fundamental rights required by Article 46(1) of that Regulation
must be determined on the basis of the provisions of that Regulation, read in
the light of the fundamental rights enshrined in the Charter.”
8th Question
“If a third country data importer is subject to surveillance laws that in the view
of a data protection authority conflict with the [standard contractual clauses] or
Article 25 and 26 of [Directive 95/46] and/or the Charter, is a data protection
authority required to use its enforcement powers under Article 28(3) of [Direc-
tive 95/46] to suspend data flows or is the exercise of those powers limited to
exceptional cases only, in light of Recital 11 of [the SCC Decision], or can a
data protection authority use its discretion not to suspend data flows?”
the Regulation. Unless an adequacy decisions fails before a Court, it legally binds
Member States and its organs, including the supervisory authorities. However, an
adequacy decision would not prevent a data subject raising a grievance with the
supervisory authority. It would have all its power despite the Decision and can exer-
cise its right to independently verify a complaint. Where relevant, they can involve
the national Courts to investigate the validity of such a Decision.
offered under the SCC. Therefore, the fact that SCC does not bind authorities in the
third countries owing to its contractual nature cannot affect the validity of the Deci-
sion. At all stages, the recipient in the third country must inform the controller about
its inability to carry out the contractual responsibilities entrusted under SCC. This
could be because of multiple situations, including the change in legal structure in the
recipient country.
In the context of Clause 5 [annex] of the SCC Decision (Standard Contractual
Clauses of Processors),119 the Advocate General suggested that, “compliance with an
obligation prescribed by the law of the third country of destination which goes beyond
what is necessary for those purposes must be treated as a breach of those clauses.”120
The responsibility, therefore, rests with the controller and the recipient for assessing,
in comparison to the EU, the level of protection available in the recipient country.
As a result, when the enforceability of SCC is difficult for the reasons stated above,
the appropriate supervisory body must suspend or prohibit such a transfer subject to
a valid adequacy Decision. There could be a situation where supervisory authorities
in different Member States adopt divergent decisions. To avoid such a situation, the
supervisory authority that believes that transfer should be avoided, must consult the
EDPB for an opinion, which will be binding on supervisory authorities.
Therefore, “the answer to the 7th and 11th questions is that examination of the
SCC Decision in the light of Articles 7, 8 and 47 of the Charter has disclosed nothing
to affect the validity of that decision.”121
119 Schrems-II.
120 Schrems-II.
121 Schrems-II.
6 Transatlantic Data Transfer: EU-US Standards 219
(9) (a) For the purposes of Article 25(6) of [Directive 95/46], does [the
Privacy Shield Decision] constitute a finding of general application binding on
data protection authorities and the Courts of the Member States to the effect that
the United States ensures an adequate level of protection within the meaning
of Article 25(2) of [Directive 95/46] by reason of its domestic law or of the
international commitments it has entered into?
(b) If it does not, what relevance, if any, does the Privacy Shield Decision
have in the assessment conducted into the adequacy of the safeguards provided
to data transferred to the United States which is transferred pursuant to the [SCC
Decision]?
(10) Given the findings of the High Court in relation to US law, does the
provision of the Privacy Shield ombudsperson under Annex A to Annex III to
the Privacy Shield Decision when taken in conjunction with the existing regime
in the United States ensure that the US provides a remedy to data subjects whose
personal data is transferred to the United States under the [SCC Decision] that
is compatible with Article 47 of the Charter?”
122 Schrems-II.
220 5 Transfer of Personal Data to Third Countries
The CJEU pointed out the limitations of the ‘Privacy Shield Decision under
Annexure II. It relates to adherence to the Privacy Shield Framework Principles and
its limited application when it comes to the question of State requirements’. Like
Decision 2000/520, this Decision also indicates that certain requirements take prece-
dence over the principles. As a result, US organisations receiving personal data from
the EU must forego data protection principles when they clash with State necessities,
rendering them incompatible.123 The interference with personal data can range from
access to and use by public authorities through different surveillance programmes.
It is observed that none of the provisions [Section 702, FISA EO, 12333 with PPD-28]
live up to the EU standard of data protection. Therefore, surveillance programmes
cannot be considered limited to absolute necessity.
“In those circumstances, the limitations on the protection of personal data arising
from the domestic law of the United States on the access and use by US public
authorities of such data transferred from the European Union to the United States,
which the Commission assessed in the Privacy Shield Decision, are not circumscribed
in a way that satisfies requirements that are essentially equivalent to those required,
under EU law, by the second sentence of Article 52(1) of the Charter.”124
The next question was about the role of the ombudsperson. We have noticed in the
previous sections that the power of the ombudsperson was limited, and there were
limitations concerning redressal mechanisms under various legislation. As a starting
point, data subjects must have the opportunity to appear before an independent and
impartial Court. However, it can be pointed out that there was nothing to suggest that
ombudspersons’ decisions were binding on intelligent services. It means that there
was absolutely nothing that data subjects can rely on. Therefore, the ombudsperson
mechanism did not guarantee the rights required as per Article 47 of the Charter.
So, expectations under EU data protection law would not match the Privacy Shield
Framework. Therefore, the Decision is invalid.
The European Commission has issued its third Decision for the EU-US Data Privacy
Framework on 10 July 2023, allowing personal data to flow safely from the EU
to US enterprises that participate in the Framework without additional data protec-
tion protections. The arrangement was formalised in October 2022 by President
123 Schrems-II.
124 Schrems-II.
6 Transatlantic Data Transfer: EU-US Standards 221
Biden’s Executive Order on “Enhancing Safeguards for United States Signals Intelli-
gence Activities”,125 which was supplemented by Regulations issued by US Attorney
General Garland.126 The new framework includes obligatory protections to address
concerns raised by the ECJ/CJEU, such as limiting US intelligence services’ access
to the EU data to what is necessary and proportional, as well as establishing a Data
Protection Review Court (DPRC) for the EU citizens.127
Significant changes to the previous Privacy Shield have been included such as the
DPRC’s ability to order the destruction of data gathered in contravention of the new
protections. The framework ensures that US corporations adhere to privacy standards
such as deleting personal data when it is no longer required and protecting data when
sharing it with other parties. EU citizens have several options for remedy if their data
are mistreated by US corporations, including free independent dispute resolution
channels and an arbitration tribunal. The US legal system also contains safeguards
for data obtained by public agencies for enforcement of criminal law and national
security, ensuring that access is necessary and appropriate.128
The authorities on both sides of the Atlantic will conduct periodic assessments
of the EU-US Data Privacy Framework, with the first review taking place within a
year of the adequacy decision entering into force. These reviews will ensure that
all elements have been implemented and work properly in practice. The Framework
strives to provide legal stability for businesses and trust for citizens, fostering stronger
economic links and shared values between the EU and the USA.129
125 Executive Order on Enhancing Safeguards for United States Signals Intelligence Activ-
ities, (2022). https://www.whitehouse.gov/briefing-room/presidential-actions/2022/10/07/execut
ive-order-on-enhancing-safeguards-for-united-states-signals-intelligence-activities/. Assessed 20th
June 2024.
126 Data Protection: European Commission adopts new adequacy decision for safe and trusted
Parliament and of the Council on the adequate level of protection of personal data under the EU-US
Data Privacy Framework, (10th July 2023). https://commission.europa.eu/document/download/
fa09cbad-dd7d-4684-ae60-be03fcb0fddf_en?filename=Adequacy%20decision%20EU-US%20D
ata%20Privacy%20Framework_en.pdf. Accessed on 24th June 2024.
128 EU-US Data Privacy Framework (2023).
129 EU-US Data Privacy Framework (2023).
222 5 Transfer of Personal Data to Third Countries
In 2021, the EC introduced two SCCs: for controllers and processors within and
outside the EEA.130
The Recent Changes in the SCC
The recent version of the SCC has been modernised, but the core elements that have
been part of the old Directive have been retained. Therefore, the required commit-
ments of the data importer and exporter are present in the recent version. Alongside
important changes have been introduced in this version.
. While the previous version of the SCC included scenarios of transfer between
controllers and controllers and processors to processors, the new version has
accommodated some additional transfer situations. Now the entire structure looks
something like this: controller to controller (module 1), controller to processor
(module 2), processor to processor (module 3) and processor to a controller
(module 4).131
. From a previous arrangement of three separate sets of SCCs, the new version
follows a modular structure with one set of SCCs. This meant that the general
clauses that apply to all four scenarios are included alongside the specific transfer
situation corresponding to a particular module.
. A docking clause has been now introduced. It is an optional clause using which
parties to the SCC can decide to include other parties who may be required to
join the existing contract in the future. The docking clause provides additional
flexibility.
. The annexes are comprehensive, providing specific information on transfers
starting from the parties, their roles, purposes and so forth.
. The substantive changes are:
– Enhanced transparency obligations by focussing on data subjects’ rights, data
breach notification and rules for onward transfers.
– The new enhanced SSC includes the requirements of Article 28 GDPR
[Processor]. Therefore, there is no further need to sign a separate contract
to comply with the requirements of Article 28.
– There is a mention of the transfer impact assessment for the parties to the SCC
to carry out. This development implements the outcome of the Schrems II
judgement. The transfer impact assessment report should document the specific
circumstances surrounding the transfer, the laws in the recipient country and
the presence of additional safeguards.
130 Joint Guide to ASEAN Model Contractual Clauses and EU Standard Contractual
Clauses. https://commission.europa.eu/system/files/2023-05/%28Final%29%20Joint_Guide_to_A
SEAN_MCC_and_EU_SCC.pdf. Accessed 7 December 2023 (Joint Guide).
131 Joint Guide.
Suggested Readings 223
– There are new obligations added to cases where public authorities would be
accessing data transfer.
Questions:
1. What are the key considerations for transferring personal data to third countries
under GDPR?
2. How does an adequacy decision by the European Commission facilitate the
transfer of personal data to third countries?
3. Evaluate the validity and implications of the Privacy Shield regime in ensuring
data protection standards for transatlantic data transfers.
4. How do EU-U.S. Privacy Framework agreements contribute to maintaining data
protection standards?
Suggested Readings
1. Guidelines 2/2020 on articles 46 (2) (a) and 46 (3) (b) of Regulation 2016/679 for transfers
of personal data between EEA and non-EEA public authorities and bodies adopted on 18th
January 2020.
2. DIRECTIVE (EU) 2016/680 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL
of 27 April 2016.
3. Joint Guide to ASEAN Model Contractual Clauses and EU Standard Contractual Clauses.
4. Recommendations 1/2022on the Application for Approval and on the elements and principles
to be found in Controller Binding Corporate Rules (Art. 47 GDPR).
5. Guidelines 2/2020 on articles 46 (2) (a) and 46 (3) (b) of Regulation 2016/679 for transfers of
personal data between EEA and non-EEA public authorities and bodies.
6. Kosta, Eleni; Boehm, Franziska The EU Law Enforcement Directive (LED): A Commentary
(2024).
7. Recommendations 01/2021 on the adequacy referential under the law enforcement directive.
8. Data Protection: European Commission adopts new adequacy decision for safe and trusted
EU-US data flows.
9. Massimo Marelli, ‘Transferring Personal Data to International Organizations under the GDPR:
An Analysis of the Transfer Mechanisms’ (2024) 14 IDPL 19
10. Bjørn Aslak Juliussen, Elisavet Kozyri, Dag Johansen, and Jon Petter Rui, ‘The Third Country
Problem under the GDPR: Enhancing Protection of Data Transfers with Technology’ (2023)
13 IDPL 22
11. Damon Greer, ‘Safe Harbor—A Framework That Works’ (2011) 1 IDPL 143
12. Lothar Determann, ‘Adequacy of Data Protection in the USA: Myths and Facts’ (2016) 6 IDPL
244
Chapter 6
Enforceability, Remedies, Liabilities
and Penalties
1 Introduction
2 Supervisory Authority
1Stephan Mulders, ‘The Relationship between the Principle of Effectiveness under Art. 47 CFR
and the Concept of Damages under Art. 82 GDPR’ (2023) 13 IDPL.
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024 225
I. Gupta et al., Introduction to Data Protection Law,
https://doi.org/10.1007/978-981-97-6355-9_6
226 6 Enforceability, Remedies, Liabilities and Penalties
and control processing by public and private sector enterprises. Their responsibilities
include handling complaints, giving information, and promoting public awareness
about data privacy issues.2
Supervisory authorities are set-up to ensure that compliance measures can be effec-
tively implemented. They can independently perform their tasks enshrined under
GDPR. Member States can contemplate establishing multiple supervisory authori-
ties depending on their internal governance and administrative structure. They will
monitor the consistent and effective implementation of the different provisions of
GDPR. There should be internal coordination amongst all supervisory authorities to
assist the Commission.
2Kuner, Christopher; Bygrave, Lee. A., The EU General Data Protection Regulation (GDPR): A
Commentary(2020).
2 Supervisory Authority 227
matter.2 Within a period of three weeks after being informed the lead supervi-
sory authority shall decide whether or not it will handle the case in accordance
with the procedure provided in Article 60, taking into account whether or not
there is an establishment of the controller or processor in the Member State of
which the supervisory authority informed it.
2.4. Where the lead supervisory authority decides to handle the case, the proce-
dure provided in Article 60 shall apply.2 The supervisory authority which
informed the lead supervisory authority may submit to the lead supervisory
authority a draft for a decision.3 The lead supervisory authority shall take
utmost account of that draft when preparing the draft decision referred to
in Article 60(3).
3.5. Where the lead supervisory authority decides not to handle the case,
the supervisory authority which informed the lead supervisory authority shall
handle it according to Articles 61 and 62.
4.6. The lead supervisory authority shall be the sole interlocutor of the
controller or processor for the cross-border processing carried out by that
controller or processor.”
Facts
Weltimmo, a company registered in Slovakia, ran a website having descriptions of
properties in Hungary. Advertisers’ personal data were processed who wanted to
place their advertisements on Weltimmo’s website. Advertisements were free for
a month before subscription began. Advertisers, complained, their data never got
deleted of their advertisements after the initial period was over. It was suggested that
Weltimmo continue to charge these customers without deleting those data. When the
advertisers did not pay the amount, their details were forwarded to the debt recovering
agencies by Weltimmo.
Subsequently, the advertisers filed complaints with the Hungarian data protec-
tion authority, which asserted its competence to adjudicate the issue. Weltimmo then
appealed to the Budapest administrative authority, arguing that lacking an office
in Hungary shouldn’t affect jurisdiction, as the data processing concerned proper-
ties within Hungary. In its appeal, Weltimmo contended that the Hungarian data
protection authority (DPA) was not the right forum to hear the matter. In fact, they
should have reached out to the Slovak DPA to handle this complaint. In response,
the Hungarian DPA pointed to a representative of Weltimmo in Hungary involved
in administrative and judicial proceedings, and highlighted that while Weltimmo’s
Internet servers were in Germany or Austria, the company owners resided in Hungary.
Further, the data protection authority came to know from its counterpart in
Slovakia that Weltimmo did not carry out its activity from the registered office in
Slovakia. The registered office has moved from one State to another on multiple
occasions.
Weltimmo also developed the websites in the Hungarian language. To opera-
tionalise Weltimmo’s activities, there was a bank account in Hungary. The bank
account was towards recovery of debts and served a correspondence address to
carry out business activities. Weltimmo raised a technical issue to justify the non-
completion of the erasure activity. The advertisers were tasked with entering the data
and deleting them before the one-month period expired.7
Recital 19 of the Data Protection Directive helps to understand the meaning
associated with the establishment:
7Weltimmo case.
8‘Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the
Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement
of Such Data’, accessed 8 December 2023.
2 Supervisory Authority 231
their personal data to a facility (server) for data storage and data processing
belonging to the operator of the website in that other Member State?
(2) Can Article 4(1)(a) of [Directive 95/46], read in conjunction with
Recitals 18 to 20 of its preamble and Articles 1(2) and 28(1) thereof, be inter-
preted as meaning that the Hungarian [data protection authority] may not apply
the Hungarian law on data protection, as national law, to an operator of a prop-
erty dealing website established only in another Member State, even if it also
advertises Hungarian property whose owners transfer the data relating to such
property probably from Hungarian territory to a facility (server) for data storage
and data processing belonging to the operator of the website?
(3) Isit significant for the purposes of interpretation that the service provided
by the data controller who operates the website is directed at the territory of
another Member State?
(4) Is it significant for the purposes of interpretation that the data relating to
the properties in the other Member State and the personal data of the owners
are uploaded in fact from the territory of that other Member State?
(5) Is it significant for the purposes of interpretation that the personal data
relating to those properties are the personal data of citizens of another Member
State?
(6) Is it significant for the purposes of interpretation that the owners of the
undertaking established in Slovakia live in Hungary?.”
9 Weltimmo case.
10 Weltimmo case.
11 Weltimmo case.
232 6 Enforceability, Remedies, Liabilities and Penalties
The concept of establishment refers to any actual and functional action, which
can be minimum and provided through a permanent arrangement.
It is clear that Weltimmo ran property dealing websites. These properties are situ-
ated in Hungary. The properties were catered to those who read Hungarian. Adver-
tisements were allowed for a month for free and then on a chargeable basis. Therefore,
there is no doubt that Weltimmo follows a real and effective activity.
The representative of Weltimmo positioned in Hungary was a contact between
Weltimmo and those who lodged complaints. It also represented the company
different proceedings.
Therefore, it is essential to establish that activities pertaining to the establishment
in question led to data processing. In this matter, loading personal data would be
construed as processing information. These personal data, at times, was used for
invoicing the advertisements.
The point of nationality is of no relevance in this matter. It is not relevant in
deciding the national law that applies to data processing.
(b) advise the Commission on any issue related to the protection of personal
data in the Union, including on any proposed amendment of this Regulation;
(c) advise the Commission on the format and procedures for the exchange
of information between controllers,processors and supervisory authorities for
binding corporate rules;
(d) issue Guidelines, recommendations, and best practices on procedures for
erasing links, copies or replications of personal data from publicly available
communication services as referred to in Article 17(2);
(f) issue Guidelines, recommendations and best practices in accordance with
point (e) of this paragraph for further specifying the criteria and conditions for
decisions based on profiling pursuant to Article 22(2);
(g) issue Guidelines, recommendations and best practices in accordance with
point (e) of this paragraph for establishing the personal data breaches and
determining the undue delay…
(i) issue Guidelines, recommendations and best practices in accordance with
point (e) of this paragraph for the purpose of further specifying the criteria
and requirements for personal data transfers based on binding corporate
rules adhered to by controllers and binding corporate rules adhered to by
processors…
(k) draw up Guidelines for supervisory authorities concerning the applica-
tion of measures referred to in Article 58(1), (2) and (3) and the setting of
administrative fines pursuant to Article 83;
(n) encourage the drawing-up of codes of conduct and the establishment of
data protection certification mechanisms and data protection seals and marks
pursuant to Articles 40 and 42;
(q) provide the Commission with an opinion on the certification requirements
referred to in Article 43(8);
(r) provide the Commission with an opinion on the icons referred to in Article
12(7);
(s) provide the Commission with an opinion for the assessment of the adequacy
of the level of protection in a third country or international organisation….
(t) issue opinions on draft decisions of supervisory authorities pursuant to the
consistency mechanism…
(w) promote the exchange of knowledge and documentation on data protection
legislation and practice with data protection supervisory authorities worldwide.
(x) issue opinions on codes of conduct … .”
They can share opinions with supervisory authorities in the following situations. For
this to happen, the supervisory authority must share the draft decision with the Board
for it to consider in the either of the following ways:
A.
. Adopting a list of processing that would require data protection impact
assessment.
. Matters related to codes of conduct.
. The accreditation and certification body requirements and the criteria for
certification.
. To determine standard data protection clauses
. To authorise contractual clauses
. To approve binding corporate rules.
B. Opinion sought by any supervisory authority, chair, or Commission on a general
issue impacting more than one Member State. This option can be availed where
there is lack of mutual assistance or failure to carry out joint operations amongst
supervisory authorities.16
When a concerned supervisory authority objects to the lead authority’s draft decision
under Article 60(4) and the objection is dismissed, the Board will issue a binding
decision to ensure consistency. This includes conflicts over jurisdiction and situations
in which a responsible authority fails to seek or consider the Board’s opinion (Article
64(1)). In such instances, any supervisory authority or the Commission may apply
for resolution.17
Article 8 of the EU Charter affirms rights of data subjects. Article 77 of the GDPR
allows data subjects to enforce this right by filing a complaint with a supervisory body.
The processes for lodging these complaints with administrative or judicial bodies
in Member States are not standardised by Union law. While Member States have
procedural autonomy, it is limited by Article 47 of the Charter. It ensures availability
of free and fair justice. Chapter VIII of the GDPR specifies specific procedures
for administrative and judicial bodies dealing with data protection issues, setting
numerous objectives that national laws must achieve.18
Every resident data subject can reach out to a supervisory authority with a complaint.
If a data subject believes that their rights under the Regulation have been violated,
there is a remedial process under Article 47 of the Charter. There is even an option
to file a complaint against a supervisory authority. There could be instances where
a supervisory authority may have failed to adequately protect the rights of a data
subject.19 The outcome of a complaint must be communicated to the data subject.
There could be instances when legally constituted representatives may act and
receive compensation of behalf of data subjects.20 They can act on an independent
mandate if it is legally permissible. For receiving compensation; however, the body
may not be allowed to receive compensation in case of an independent mandate. It
is further illustrated under Article 80 of GDPR.
A person can appear before a national Court to remedy the outcome of a legal
decision taken by a supervisory authority.21 It will not however impact the right
enshrined under Article 263 of the Treaty on the Functioning of the European Union
(TFEU).22 This decision could be in relation to investigative, corrective and autho-
risation powers or dismissal or rejection. However, it is limited to legally binding
decisions. The application should be filed where the supervisory authority is based
in the Member State.
This section is instrumental in establishing a framework for accountability and high-
lights individuals right to seek judicial remedies in case of infringements. The chapter
establishes the principle of compensation for both monetary and non-material losses
stemming from GDPR violations. It ensures a balanced approach to enforcement
with the aim to prevent non-compliance and providing individuals with avenues to
seek redressal.
18 Kuner, Christopher; Bygrave, Lee.A., The EU General Data Protection Regulation (GDPR): A
Commentary(2020)(Kuner, 2020).
19 Kuner 2020.
20 Kuner, 2020.
21 Kuner, 2020.
22 Kuner, 2020.
236 6 Enforceability, Remedies, Liabilities and Penalties
(1) Without prejudice to any other administrative or judicial remedy, every data
subject shall have the right to lodge a complaint with a supervisory authority,
in particular in the Member State of his or her habitual residence, place of
work or place of the alleged infringement if the data subject considers that the
processing of personal data relating to him or her infringes this Regulation.
Article 78: Right to an effective judicial remedy against a supervisory
authority
(2) Without prejudice to any other administrative or non-judicial remedy, each
data subject shall have the right to an effective judicial remedy where the
supervisory authority which is competent pursuant to Articles 55 and 56 does
not handle a complaint or does not inform the data subject within three months
on the progress or outcome of the complaint lodged pursuant to Article 77.
(4) Where proceedings are brought against a decision of a supervisory authority
which was preceded by an opinion or a decision of the Board in the consistency
mechanism, the supervisory authority shall forward that opinion or decision to
the Court.
Article 79: Right to an effective judicial remedy against a controller or
processor
Without prejudice to any available administrative or non-judicial remedy,
including the right to lodge a complaint with a supervisory authority pursuant
to Article 77, each data subject shall have the right to an effective judicial
remedy where he or she considers that his or her rights under this Regulation
have been infringed as a result of the processing of his or her personal data in
non-compliance with this Regulation."
A data subject has a right of compensation against a data controller and a processor.
Recital 146 reads, “ The concept of damage should be broadly interpreted in the
light of the case-law of the Court of Justice in a manner which fully reflects the
objectives of this Regulation. “23 This provision does not give an exact quantum of
damages. If a controller or processor is part of the same processing, they should be
liable for the entire damage. It has been further expanded under Article 82 of the
Regulation.24
For minor infringements, a reprimand may be issued or in situations where the data
subject may face additional disproportionate burden.25 However, certain parameters
are considered before deciding the quantum of fine.
. The steps the controller and processor take to institutionalise technical and organ-
isational measures towards implementing data protection by design and by default
and security safeguard connected with the processing of personal data.
. Any instance of previous infringement by the controller or processor.
. The degree of co-operation with the supervisory authority to remedy the
infringement and mitigate possible adverse effects.
. The nature of the personal data involved in infringement.
. The notification process of a breach—the manner in which the controller or
processor acted upon.
. Extent of adherence to the codes of conduct and approved certification process.
. The gains made or losses avoided by the controller or the processor directly from
the infringement.28
Whether negligently or intentionally, if for the same or linked processing oper-
ations the controller or processor infringe multiple provisions of the GDPR, the
fine shall not be more than what is specified for the gravest infringement.29 For a
particular infringement, the administrative fines would be up to 10,000,000 EUR
(ten million).30 In case it is an undertaking, then it is up to 2% of the worldwide
turnover, and the highest amount of the two. The preceding year will be considered.
The provisions that will be considered are the following:
. Article 8: Conditions applicable to child’s consent in relation to information
society services
. Article 11: Processing which does not require identification
. Article 25: Data protection by design and by default
. Article 39: Tasks of the data protection officer
. Article 42: Certification
. Article 43: Certifications bodies
. Article 41(4): Obligations of monitoring body31
For certain infringements, the administrative fines would be up to 20,000,000
EUR (twenty million) . In case it is an undertaking, it is up to 4% of the worldwide
turnover, and the highest amount of the two.32 The preceding year will be considered.
The provisions that will be considered are the following:
. Non-fulfilment of data protection principles, including the requirement of
consent—all that have been included under Articles 5,6,7 and 9;
. The rights of the data subject—Articles 12 to 22;
. Transfer of personal data to a third country or an International Organisation—
Articles 44–49;
AND THE COUNCIL Data Protection as a Pillar of Citizens’ Empowerment and the Eu’s Approach
to the Digital Transition - Two Years of Application of the General Data Protection Regula-
tion, https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A52020DC0264 ’, accessed
8 December 2023.
36 Data Protection as a Pillar of Citizens (2020).
37 Data Protection as a Pillar of Citizens (2020), 5.
38 Data Protection as a Pillar of Citizens (2020), 5.
39 Data Protection as a Pillar of Citizens (2020), 5.
40 Data Protection as a Pillar of Citizens (2020), 5.
240 6 Enforceability, Remedies, Liabilities and Penalties
involved for the benefit of data subjects. It also pointed out that developing a standard
data protection culture amongst supervisory authorities in the EU is still a work in
progress. There aren’t definitive indications to suggest that data protection authorities
have used the tools that GDPR provides, for instance, joint operations leading to joint
investigations.
In reality, it is often seen that organisations who fail to comply with the GDPR
may face stiff penalties.41 These fines act as a major deterrent to data breaches and
noncompliance, and aim to protect privacy and personal data within the EU. The
Virgin Media decision demonstrates the practical implementation of these sanctions,
emphasising the need of GDPR compliance.
The Virgin media decision42 is one of the best examples to understand the concept
of penalties and fines. The ICO decided on the quantum of penalty using the following
method.
. As a first step, the Commissioner considered the nature and seriousness of the
infringement. Therefore, the starting point for the penalty was fixed at GBP
50,000. Consequently, it opens up the conversation about interpreting the extent
of the infringement.
. The second step would be to consider aggravating or mitigating factors. These
factors may require the Commissioner to increase or reduce the starting point.
What were the aggravating conditions considered?
The expansion of business and financial gains of Virgin media through the emails
that they had sent.
What were the mitigating factors considered?
The Commissioner did not consider any mitigating factors in this case. It looked
at the proposed penalty and suggested that Virgin Media has access to financial
resources. Therefore, proportionately, there would be no financial hardship for them
to pay the recommended penalty. The penalty, therefore, is justified in the context of
this case. The circumstances did not warrant any increase or increase of the starting
point of GBP 50,000.43
According to the CJEU, an administrative fine under Article 83 GDPR can only
be assessed in cases where it can be proven that the controller infringed Articles
83(4)–(6) GDPR, either wilfully or by negligence.44
There are several steps the supervisory authorities should follow while deciding on
the fine. They are:
. Regulation breaches warrant “equivalent sanctions”45
The Regulation ensures consistent and robust data protection measures for data
subjects, removal of obstacles that impede smooth data flow and inconsistent
application of GDPR. Recital 11 highlights,
“equivalent powers for monitoring and ensuring compliance with the rules for the protection
of personal data and equivalent sanctions for infringements in the Member States.”46
The presence of equivalent sanctions in the Member States and effective cooper-
ation between supervisory authorities would help prevent divergences and meet the
Regulation’s goal. Although supervisory authorities enjoy complete independence,
they must cooperate to meet the larger goal of consistently applying and enforcing
GDPR.
. Administrative fines should be “effective, proportionate and dissuasive”47 :
45 Guidelines on the application and setting of administrative fines for the purpose of regulation
2016/679.
46 Guidelines on the application and setting of administrative fines for the purpose of regulation
2016/679.
47 Guidelines on the application and setting of administrative fines for the purpose of regulation
2016/679.
48 Guidelines on the application and setting of administrative fines for the purpose of regulation
2016/679.
242 6 Enforceability, Remedies, Liabilities and Penalties
There is a need for supervisory authorities to cooperate with each other using different
avenues, including formal and informal exchange of information. Through these
conversations, greater detail of information exchange is possible about the application
of the fining requirement.49
The document gives some indication about the different provisions under Article
83.
An indicative list of intentional breaches could be situations where the DPO’s instruc-
tions are not followed by data controllers and processors or they disregard existing
policies or norms.53
. “Any action taken by the controller or processor to mitigate the damage suffered
by data subjects”54
Appropriate measures taken by a data controller may help the supervisory authority
decide the extent of the fine imposed. Supervisory authorities can show some degree
of flexibility to those data controllers and processors who own up to the infringements
and have taken further responsibility to correct or reduce the impact of such a breach.
Some of the examples cited are:
49 Guidelines on the application and setting of administrative fines for the purpose of regulation
2016/679.
50 Guidelines on the application and setting of administrative fines for the purpose of regulation
2016/679.
51 Guidelines on the application and setting of administrative fines for the purpose of regulation
2016/679.
52 Guidelines on the application and setting of administrative fines for the purpose of regulation
2016/679.
53 Guidelines on the application and setting of administrative fines for the purpose of regulation
2016/679.
54 Guidelines on the application and setting of administrative fines for the purpose of regulation
2016/679.
4 How Are Fines Calculated Under GDPR? 243
The penalties imposed in Member States’ national laws for violations of EU data
protection rules frequently failed to be sufficiently ‘dissuasive’. The GDPR not only
broadens its reach to encompass international controllers and processors operating in
EU markets, but it also creates the possibility of implementing effective and dissua-
sive fines. Fines serve an important function in deterring infractions and encouraging
accountability. They act as a deterrent by imposing a credible threat of investigation
and penalties, so shifting the perceived balance of the expected benefits and costs
of non-compliance sufficiently to incentivise controllers to comply. Fines also have
a moral and supportive impact, sending a message to those who are naturally law-
abiding, as well as their internal advisers and data protection officials, confirming
their commitment to accountability and compliance.58
55 Guidelines on the application and setting of administrative fines for the purpose of regulation
2016/679.
56 Guidelines on the application and setting of administrative fines for the purpose of regulation
2016/679.
57 Guidelines on the application and setting of administrative fines for the purpose of regulation
2016/679.
58 Kuner, Christopher; Bygrave, Lee. A., The EU General Data Protection Regulation (GDPR): A
Commentary(2020)(Kuner).
244 6 Enforceability, Remedies, Liabilities and Penalties
The legal framework provided in this document intends to provide supervisory bodies
with clear and objective grounds for imposing administrative fines under the GDPR.
These rules, first accepted by the EDPB in 2018, were built on earlier principles
established by the WP29 in 2017. While the earlier recommendations focused on
incidents that warranted administrative fines under Article 83, the present Guide-
lines include a technique for establishing the appropriate fine amount. They aim
to align the starting points for assessment across individual cases, emphasising a
consistent approach rather than mandating a rigorous mathematical formula for deter-
mining fines. Instead, the final sum depends on the individual circumstances of each
instance.60
The EDPB’s goal is not to standardise the outcomes of every decision, but to
align the initial points of evaluation and the methodology utilised by regulatory
bodies. These rules require supervisory bodies to report the original proposed fine
amount and justify any subsequent revisions based on applicable EU and Member
State Regulations. By fostering openness and consistency, the EDPB hopes to ensure
that administrative fines are effective and reasonable methods for enforcing GDPR
compliance throughout the European Union.61
“Step 1: Identifying the processing operations in the case and evaluating the
application of Article 83(3) GDPR.
Step 2: Finding the starting point for further calculation based on an evaluation
of.
a) the classification in Article 83(4)–(6) GDPR;
b) the seriousness of the infringement pursuant to Article 83(2)(a), (b)
and (g) GDPR; c) the turnover of the undertaking as one relevant element
to take into consideration with a view to imposing an effective, dissuasive and
proportionate fine, pursuant to Article 83(1) GDPR.
59 Guidelines 04/2022 on the calculation of administrative fines under the GDPR adopted on 12th
May 2022, https://edpb.europa.eu/system/files/2022-05/edpb_guidelines_042022_calculationofad
ministrativefines_en.pdf . Accessed 8 December 2023 (Guidelines 04/2022).
60 Guidelines 04/2022.
61 Guidelines 04/2022.
4 How Are Fines Calculated Under GDPR? 245
We will start with the possibility of concurrent infringements and their effect
on Article 83(3). To begin with, the supervisory authority needs to consider the
conduct and breaches upon which the fine will be based. Multiple circumstances
could connect with a case, and the document suggests they could be considered as one,
or they could be treated as different circumstances leading to sanctionable conduct.
The document also points to a possibility of one and the same conduct giving rise to
multiple infringements. It leads to the possibility of concurrent infringements. The
calculation of fines, as a result, could be calculated considering different possibilities.
Therefore, it is essential to ascertain the relevant sanctionable conduct out of
one or many to impose the fine. Circumstances connected to a matter would decide
whether they fall under one and same conduct or multiple conducts. That is where
the terms come in – for the same or linked processing operations – lead up to one or
the same conduct.64
62 Guidelines 04/2022.
63 Article. 83, GDPR.
64 Guidelines 04/2022.
246 6 Enforceability, Remedies, Liabilities and Penalties
The document further said that it is essential to ascertain the compliance of trans-
parency obligations at the time of determining the threshold for the same or linked
processing operations. Therefore, any infringement could possibly relate to the same
or linked processing operations. The document cites a few examples, and they are as
follows:
Source Guidelines 04/2022 on the calculation of administrative fines under the GDPR
Having a harmonised starting point for deciding the amount of fine would not stop the
supervisory authorities from assessing each case on its merits. The penalty has to be
effective, dissuasive and proportionate. Other than this point, the EDPB documents
give a choice to the supervisory authority to categorise infringements under the low,
medium or high level of seriousness. For a low level of seriousness, the proposal is
to start between 0 and 10% of the applicable legal maximum, similarly for a medium
level—10 to 20% and for a high level of seriousness, between 20 to 100%.65
The EDPB document raises an important point here. As a starting point,
when calculating administrative fines, the GDPR structure treats micro-enterprises
and multinational corporations alike. Therefore the document suggests that a fair
approach would be to reflect upon the turnover.
Therefore, the supervisory authority may consider adjusting the starting point
where the infringement involves an undertaking with an annual turnover not
exceeding 2 million euros, 10 million euros and 50 million euros.66
65 Guidelines 04/2022.
66 Guidelines 04/2022.
248 6 Enforceability, Remedies, Liabilities and Penalties
Source Guidelines 04/2022 on the calculation of administrative fines under the GDPR
Adopted on 12th May 2022
Therefore, for a bigger undertaking, the category of starting amounts would have
a broader range. The supervisory authority may not want to adjust from the angles
of effectiveness, dissuasiveness and proportionality.
Example:
“A supermarket chain with a turnover of e450 million has infringed Article 12
GDPR. The supervisory authority, based on a careful analysis of the circum-
stances of the case, decided that the infringement is of a low level of seriousness.
To determine the starting point for further calculation, the supervisory authority
first identifies that Article 12 GDPR is listed in Article 83(5)(b) GDPR and that,
based on the turnover of the undertaking (e450 million), a legal maximum of
e20 million,- applies.
Based on the level of seriousness determined by the supervisory authority (low),
a starting amount between e0 and e2 million,- should be considered (between
0 and 10% of the applicable legal maximum, see paragraph 60 above).
The supervisory authority considers that an adjustment down to 90% of the
starting amount is justified based on the size of the undertaking, which has
a turnover of e450 million. This amount forms the basis for further calcula-
tion, which should result in a final amount not exceeding the applicable legal
maximum of e20 million."
67The CNIL’s restricted committee imposes a financial penalty of 50 Million euros against
GOOGLE LLC, (2019), https://www.edpb.europa.eu/news/national-news/2019/cnils-restricted-
committee-imposes-financial-penalty-50-million-euros_en. Accessed on 24th June 2024 (CNIL,
2019).
4 How Are Fines Calculated Under GDPR? 249
decision, CNIL levied a 50 million euro fine on Google for a lack of openness, inad-
equate information availability, and insufficient consent methods for personalised
advertising. The fine was calculated using numerous parameters indicated in Article
83 of the GDPR, such as the nature, gravity, time period of violation, number of
individuals impacted, and whether the infringement was purposeful or negligent.
CNIL’s ruling highlighted how these considerations determined the final fine
amount. It emphasised particular infractions of GDPR rules and the implications
for users’ privacy rights. The decision emphasised the importance of transparency in
data processing procedures and the need for strong consent systems, setting a prece-
dent for how supervisory authorities interpret and apply GDPR Regulations when
calculating administrative fines. This case demonstrates how supervisory authorities
manage the complexity of GDPR enforcement, employing a methodical approach to
assess fines that are both effective and commensurate to the gravity of the violations
committed by the controllers.68
While deciding the extent of the fine, all circumstances should be considered,
including possible multiple infringements and increase and increase of aggravating
or mitigating circumstances. The supervisory authority should not count the same
events twice.
Effectiveness
A fine is considered effective if it creates a deterrent effect. Recital 148 of the GDPR
states that effective imposition of penalties could strengthen the enforcement and
rules of this Regulation. Therefore, the supervisory authority needs to check the
effectiveness of the fine.69
Proportionality
The EDPB document suggests that when a choice between appropriate measures
exists, the least onerous has to be the choice. Further, the disadvantages, as a result,
should not be disproportionate to the aims of GDPR. The amount of the fine should
correlate to the gravity of the infringement. As a task, the supervisory authority should
ensure that the acceptable amount is proportionate to the infringement’s severity and
the undertaking’s size. Two factors require a detailed understanding of economic
viability and social and economic context.
68 CNIL, 2019.
69 Guidelines 04/2022.
250 6 Enforceability, Remedies, Liabilities and Penalties
70 Guidelines 04/2022.
71 Guidelines 04/2022.
72 Guidelines 04/2022.
73 Guidelines 04/2022.
Suggested Readings 251
Suggested Readings
1. Guidelines on the application and setting of administrative fines for the purposes of the
Regulation 2016/679.
2. Guidelines 04/2022 on the calculation of administrative fines under the GDPR adopted on 12th
May 2022.
3. COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT
AND THE COUNCIL Data Protection as a Pillar of Citizens’ Empowerment and the Eu’s
Approach to the Digital Transition - Two Years of Application of the General Data Protection
Regulation.
4. Stephan Mulders, ‘The Relationship between the Principle of Effectiveness under Art. 47 CFR
and the Concept of Damages under Art. 82 GDPR’ (2023) 13 IDPL 169
5. Donato La Muscatella, ‘Data Protection Officer: Tasks and Responsibilities of a Key Role for
the Innovation of the Relationship between Data and Data Subjects’ Rights’ (2020) 3 JDPP 403
6. Diogo Matos Brandão, ‘The One-Stop-Shop and the European Data Protection Board’s Role in
Combatting Data Supervision Forum Shopping’ (2023) 13 IDPL 313
7. Anna Aurora Wennäkoski, ‘Mapping the Supervisory Authorities’ Activities: Pragmatic
Problem-Solvers or New Practice Creators?’ (2020) 3 JDPP 149