The EU Data Protection Directive revised: New challenges and perspectives Maria Giannakaki Attorney at Law – D.E.A. 4 th International Conference on Information.

Slides:



Advertisements
Similar presentations
1 IS THERE A FUNDAMENTAL RIGHT TO FORGET? Bruxelles – 20 May 2009.
Advertisements

Introduction to basic principles of Regulation (EC) 45/2001 Sophie Louveaux María Verónica Pérez Asinari.
Geneva, Switzerland, September 2012 m-Cloud for Homecare - Policy & Regulatory Challenges - Francesca Fontana, Associate at ICT Legal Consulting.
STRATEGIC PLANNING FOR Post-Clearance Audit (PCA)
The Gathering Cloud computing - Legal considerations David Goodbrand, Partner 28 February 2013 Aberdeen Edinburgh Glasgow.
Sarah Branam Mehmet MunurDino Tsibouris
The Geopolitics of Personal Data and the Governance of Privacy Colin J. Bennett Department of Political Science University of Victoria BC, Canada
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
1 Reform of the EU regulatory framework for electronic communications What it means for Access to Emergency Services Reform of the EU regulatory framework.
Lecture to Carleton University, Center for European Studies, December 1, 2010.
Anomalous Aspects of Transfer of Personal Data from the E.U. to the U.S. Stephen R. Bell Willkie Farr & Gallagher ABA Section of International Law New.
Class 13 Internet Privacy Law European Privacy.
THE CHOICES WE MAKE THAT MATTER – International Data Privacy/Protection JILL L. UREY, ASSISTANT GENERAL COUNSEL MID-ATLANTIC CIO FORUM NOVEMBER 20, 2014.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Lawyer at the Brussels Bar Lecturer at the University of Strasbourg Assistant at the University of Brussels Data Protection & Electronic Communications.
RESPECT Guidelines regarding data protection aspects whithin socio-economic research Y. Poullet, K. Rosier, I. Vereecken CRID-FUNDP in cooperation with.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
Privacy Codes of Conduct as a self- regulatory approach to cope with restrictions on transborder data flow Dr. Anja Miedbrodt Exemplified with the help.
1 Freedom of Information (Scotland) Act 2002 A strategic view.
Dr Sharon Azzopardi. k What is Convergence? A Union of Media Print Television Camera Telephone Radio Internet A Union of Services Data Voice Video.
The European influence on privacy law and practice Nigel Waters, Pacific Privacy Consulting International Dimension of E-commerce and Cyberspace Regulation.
Data Protection Compliance Professor Ian Walden Institute of Computer and Communications Law, Centre for Commercial Law Studies, Queen Mary, University.
Data Protection Act AS Module Heathcote Ch. 12.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
Europe's work in progress: quality of mHealth Pēteris Zilgalvis, J.D., Head of Unit, Health and Well-Being, DG CONNECT Voka Health Community 29 September.
European Data Protection Supervisor Pharmaceutical Regulatory & Compliance Congress, Brussels, 7 June 2007 European Privacy and Data Protection Policy.
E-Privacy and Cookies: Legal Aspects. E-Privacy Directive 2002/58, amended by 136/2009 Main amendments focus on DBN (security) and confidentiality of.
The Framework for Privacy Policies in the UK: Is telling people what information is gathered about them part of the framework? Does it need to be? Emma.
Undertakings for collective investment in transferable securities (UCITS) Worldbank Global Development Learning Network The Advanced Program in Accounting.
©2012 Morrison & Foerster (UK) LLP | All Rights Reserved | mofo.com Data Protection Masterclass: The New Draft EU Data Protection Regulation 19 September.
Fred Carter Senior Policy & Technology Advisor Information and Privacy Commissioner Ontario, Canada MISA Ontario Cloud Computing Transformation Workshop.
Personal data processed in cloud infrastructures: main legal aspects Avv. Enrico Pelino Attorney at Law at Bologna Bar, Italy Senior Associate at ICTlegalconsulting.
1 Revising the Data Protection Directive Reinventing Data Protection? Lilian Mitrou, Ass. Professor University of the Aegean 4 th International Seminar.
1 TAIEX JHA Workshop on data protection and cloud computing Data transfers to third countries and standard contractual clauses Skopje, 29 May 2014.
Key Points for a Privacy Programme for Multinationals Steve Coope.
GUIDE TO HUMAN RIGHTS FOR INTERNET USERS Implementation Strategy Concept.
Business Challenges in the evolution of HOME AUTOMATION (IoT)
-1- WORKSHOP ON DATA PROTECTION AND DATA TRANSFERS TO THIRD COUNTRIES Technical and organizational security measures Skopje, 16 May - 17 May 2011 María.
František Nonnemann Skopje, 10th October 2012 JHA Data protection and re-use of PSI as a tool for public control–CZ approach.
Agencija za zaštitu ličnih/osobnih podataka u Bosni i Hercegovini Агенција за заштиту личних података у Босни и Херцеговини Personal Data Protection Agency.
TRANSBORDER DATA FLOWS INA MEIRING. THE PROTECTION OF PERSONAL INFORMATION ACT (“POPI”) > 'personal information' means information relating to an identifiable,
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
Data Protection and Enabling Psi Re-use EVPSI & LAPSI Final Meeting
Data Protection Officer’s Overview of the GDPR
Luca De Matteis Justice counsellor (criminal law, data protection)
THE NEW GENERAL DATA PROTECTION REGULATION: A EUROPEAN OR A GLOBAL STANDARD? Bart van der Sloot Senior Researcher Tilburg Institute for Law, Technology,
A trust-based framework for the data-driven economy
WORLD OF CLOUD COMPUTING AFTER GDPR challenges, opportunities and the unknown Matjaž Drev, MA. National Supervisor for Personal Data Protection, Information.
Interactive Gaming Council Board Meeting I-Gaming Legal status
General Data Protection Regulation
General Data Protection Regulations Preparing for the upcoming changes in data protection law David Jones & Angharad Williams.
International Regulatory Trends
Data Protection Legislation
Setting Actuarial Standards
Bob Siegel President Privacy Ref, Inc.
State of the privacy union
G.D.P.R General Data Protection Regulations
Bart van der Sloot Data Protection 2.0 The proposal for a General Data Protection Regulation Bart van.
General Data Protection Regulation
Relocation CARNIVAL come one…come all
Data Protection What’s new about The General Data Protection Regulation (GDPR) May 2018? Call Kerry on Or .
GDPR - New Data Protection Regulation
Bart van der Sloot Data Protection 2.0 The proposal for a General Data Protection Regulation Bart van.
Welcome!.
Data transfers to non-EU countries under the new GDPR
The activity of Art. 29. Working Party György Halmos
GDPR & Accountability ISACA Ireland Annual Conference 2018
The General Data Protection Regulation: Are You Ready?
EU Data Protection Legislation
General Data Protection Regulation
Presentation transcript:

The EU Data Protection Directive revised: New challenges and perspectives Maria Giannakaki Attorney at Law – D.E.A. 4 th International Conference on Information Law 4 th International Conference on Information Law May 2011 Thessaloniki

The EU Data Protection Directive revised: New challenges and perspectives  Challenges  Cloud computing  Web 2.0  Perspectives for amendment  Applicable law  Cross-border issues  Right to be forgotten  Quasi-legal measures

Cloud computing  Cloud computing allows users  to access and store information and  use software functionality on remote servers hosted in data servers world wide  Delivery models  IaaS (Windows Live Skydrive, Rackspace Cloud)  PaaS (Google Apps Engine)  SaaS (Zoho.com, Google docs)

Which law applies in the cloud?  ‘ Place of establishment’ and ‘use of means’ - no longer suitable determinative factors for applicable law  Data centers located in several jurisdictions  Data transferred randomly, processed and duplicated in a variety of locations  The cloud requires a different approach based on  the place where the processing takes place  targeted individuals

Who is responsible for data protection compliance?  Data Controller vs processor:  Data Controller: the party who determines the purpose and means of processing  Data processor: the party who acts on the data controllers behalf  Issues when applied in cloud computing context:  Multiple offers and different clients targeted  Difficult to determine who acts as data controller  Customers may end up to be solely responsible for data protection compliance  Sub-contracting concerns

Which legal basis for cross border data transfers?  Countries with non-adequate level of protection  US Safe Harbor  Model contracts  Binding Corporate Rules  Onward transfers

WEB Characteristics  Social Computing/Web as a Platform  Web 2.0 Characteristics  Ubiquitous character of information  Different type of information is aggregated and made available on a single view  Information used in a different context than this originally published  No oblivion on the Internet  the “Hotel California effect”

WEB Data Privacy Challenges  Ignorance of the danger of exposure:  Privacy is no more a social norm  Illusion of intimacy on the Web  Publication of much more information than they think  Information which would otherwise be forgotten or forgiven can be easily retrieved  Data subjects are loosing control over their data

Perspectives for amendment  European Commission Communication “A comprehensive approach on personal data protection in the EU”  Council’s Conclusions on the Communication  WP29 “The future of privacy”  European Commission DG JFS Study “New Challenges to Data Protection”  Summary of replies to the Public Consultation

Applicable law  Current provisions  “context of the activities” principle  “use of equipment” unless such equipment is used for purposes of transit  Suggestions for improving the Directive  Swift back to the “country of origin” principle  Concept of “targeted individuals” or “service oriented approach”  Children’s Online Privacy Protection Act  Rome I

Cross-border issues  Harmonization within the EEA countries  Amendment of the Directive or Regulation  Best practices and suggested interpretations by the WPa29  Simplification of International Data Transfers  Improvement of the current procedures for international data transfers  International Standards on the Protection of Privacy

Right to be forgotten  Right to be forgotten  The right of individuals to have their data no longer processed and deleted when they are no longer needed for legitimate purposes  The right of individuals not to be accountable for their conduct after a certain amount of time and beyond a given framework of relationships  The right is innovative but it not new  It is implicitly established in the EU Directive with the principle of data retention and the existing duty to keep data no longer than necessary  It also forms part of the right to informational self-determination (right to oblivion – droit a l’ oubli)

Right to be forgotten  Questions about its content and achievability in practice  What kind of information/records?  Who will be entitled to such right?  How can it be exercised when information appears in different platforms through the Internet (search engines, internet archive, mash-ups, social network aggregators)?

Right to be forgotten  Criticism  Conflicting rights (freedom of speech, freedom of press, freedom of society to record history)  Fears that it can be used as a tool for censorship or suppression of civil liberties or exercised by data subjects in circumstances where negative information about them is processed for lawful purposes  Different approaches (US)  “Google case” - Spanish Data Protection Authority

Recommendations  Raise data subjects awareness on the implications of sharing their personal data  Increase users control over their profile data -“easiest personal data to forget are those which have never been collected”  Reinforce data subjects rights to access, rectify or delete data  Impose privacy - friendly default settings to SNS providers  Regulate third parties access to data subjects data

Quasi-legal measures  Principle of Accountability  Data controllers are requested to:  put in place proactive measures ensuring compliance and  retain adequate evidence to prove compliance and effectiveness of measures adopted  Opinion 3/2010 WP29

Quasi-legal measures  Personal Data Breach Notification  E-Privacy Directive: Notification requirements to providers of publicly available services  Amended Directive 95/46/EC: Sector specific data breach notification requirements  Opinion 13/2011 WP29  Data Breach Notification Procedures  Standard EU Data Breach Notification Form  Modalities for implicated individuals’ information  Technological protection measures for notification exemption  Guidance on information to be retained by providers

Quasi-legal measures  Assessment of the effectiveness of technical and organizational measures:  Privacy Impact Assessments (PIAs)  Opinion 9/2011 WPa29 on RFID  EU Certification Schemes  European Privacy Seal, European Codes of Conduct, BCRs  Empowerment of data subjects control over their data:  “ Privacy by Design” Principle  Privacy - Friendly Default Settings  Privacy Enhancing Technologies (PETs)  Cookie cutters, out of tag mechanisms

Conclusions  The Commission is expected to unveil legislative proposals to update the EU data protection framework this summer.  However it is going to be several years before the revised Directive is agreed and implemented in the EU Member States.  Until then:  Data controllers are encouraged to implement Quasi-Legal Measures  Data subjects awareness on the impact of publication of their personal data on the Internet should be raised

The EU Data Protection Directive revised: New challenges and perspectives Thank you for your attention Maria Giannakaki Attorney at law – D.E.A.