Judicial Training on Data Protection and Privacy Rights

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

Re-use of PSI Data Protection Issues Cécile de Terwangne Professor at the Law Faculty, Research Director at CRIDS University of Namur (Belgium) 2 nd LAPSI.
Introduction to basic principles of Regulation (EC) 45/2001 Sophie Louveaux María Verónica Pérez Asinari.
BIOMETRICS, CCTV & DATA PROTECTION By Drudeisha Madhub Data Protection Commissioner Date:
The Data Protection (Jersey) Law 2005.
PRIVACY COMPLIANCE An Introduction to Privacy Privacy Training.
What if my organization conducts business across borders ? Your footnote Privacy and “Personal Information” have different meanings in different countries;
Class 13 Internet Privacy Law European Privacy.
1 Ann-Charlotte Nygård, Programme Manager, FRA Roundtable: Possibilities for cooperation on consular and visa issues in the Danube Region.
CENTRAL SCOTLAND POLICE Data Protection & Information Security Stuart Macfarlane Information Governance Unit Police Service of Scotland.
1 When hate speech tangles privacy... When hate speech tangles privacy...
Judgment of the Court of the European Union (Grand chamber) Retention of Telecommunications Data Holly Raiche Director, Internet Society of Australia.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
III Mercator International Symposium November 2004 "Linguistic diversity and education: Challenges and opportunities" Mercator-Legislation “The right.
Data Protection Corporate training Data Protection Act 1998 Replaces DPA 1994 EC directive 94/46/EC The Information Commissioner The courts.
IT Applications Theory Slideshows By Mark Kelly Vceit.com Privacy Laws.
Data Protection Principles as Basic Foundation for Data Protection in EU/EEA Introduction to Data Protection Theory Seminar - AFIN Stephen.
DATA PROTECTION ACT (DPA). WHAT IS THE DATA PROTECTION ACT?  The Data Protection Act The Data Protection Act (DPA) gives individuals the right.
DATA PROTECTION ACT INTRODUCTION The Data Protection Act 1998 came into force on the 1 st March It is more far reaching than its predecessor,
Data Protection Principles as Basic Foundation for Data Protection in EU/EEA Introduction to Data Protection Theory Seminar - AFIN Stephen.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Presented by Ms. Teki Akuetteh LLM (IT and Telecom Law) 16/07/2013Data Protection Act, 2012: A call for Action1.
European Data Protection Supervisor TAIEX Seminar - Belgrade 9 February 2009 Principles of data protection and international legal framework Alfonso Scirocco.
The anti-discrimination legislation in Albania Presentation of the corresponding EU Directives and of their approximation.
Framework of engagement : big data for official use Roy D. Ibay AVP Regulatory PLDT – Smart.
The fundamental rights of LGBT citizens in Europe – EU legislation and the Charter of Fundamental Rights.
Understanding Privacy An Overview of our Responsibilities.
Denise Chrysler, JD Director, Mid-States Region
The future of data protection: General Data Protection Regulation
Surveillance around the world
Processing for archiving purposes in the GDPR
Data Protection GCSE ICT Mrs N Steventon-2005.
Data Protection: The Law
Data Protection and Confidentiality
THE NEW GENERAL DATA PROTECTION REGULATION: A EUROPEAN OR A GLOBAL STANDARD? Bart van der Sloot Senior Researcher Tilburg Institute for Law, Technology,
Issues of personal data protection in scientific research
General Data Protection Regulation (GDPR)
IT Applications Theory Slideshows
GDPR Overview Gydeline – October 2017
Privacy and Security in the Employment Relationship
General Data Protection Regulation: Turning the black into white
GDPR Overview GDPR - General Data Protection Regulations
GDPR Overview Gydeline – October 2017
Nina Barakzai November 2017
Data Protection & Freedom of Information- An Introduction
Introducing GDPR: How the General Data Protection Regulation transforms the world Laura Mudd November 2016.
GENERAL DATA PROTECTION REGULATION (GDPR)
The General Data Protection Regulation (GDPR)

Data Protection principles
Data Protection and You
Relocation CARNIVAL come one…come all
Data Protection What’s new about The General Data Protection Regulation (GDPR) May 2018? Call Kerry on Or .
IMPLICATIONS OF GDPR ROBERT BELL.
GDPR Workshop MEU Symposium Prague 2018
Data Protection in a Tutorial Context
GDPR enforcement begins
Information Handling Research Student Induction Day
ARTICLE 16 OF REGULATION (EC) 1083/2006
The EDPS: competences and processing of personal data in EU funds
Data Protection for SDS Employers Alison Johnston Lead Policy Officer (Scotland) Information Commissioner’s Office.
General Data Protection Regulation Q & A Session
Dr Elizabeth Lomas The General Data Protection Regulation (GDPR): Changing the data protection landscape Dr Elizabeth Lomas
The supervision of personal data processing by EU institutions and bodies => data protection and privacy, why it matters, for you as citizens and as EU.
General Data Protection Regulation (GDPR)
GDPR Session
The European Union’s General Data Protection Regulation (GDPR): Overview and Guidance SUNY Office of General Counsel Spring 2019.
General Data Protection Regulation
The EU General Data Protection Regulation
Information Governance
Presentation transcript:

Judicial Training on Data Protection and Privacy Rights Special Cases and Exceptions to the Protection of Personal Data: Is this becoming the rule? EJTN Administrative Law Project Judicial Training on Data Protection and Privacy Rights Filipa Calvão - CNPD Lisboa,23.03.2017

1. Justification of the subtitle: is the exception the rule? Significant change in personal data processing (increase of the capacity to collect, store and analyze data; Internet and globalization of data processing) Consequence: growth of personal data processing and greater (worldwide) impact of processing Several sources of personal data available on the Internet: public data bases, social media networks, blogs, search engines; new technologies, such as the wearable devices, provide new types of personal information –> Big Data; profiling

1. Justification of the subtitle: is the exception the rule? Risks of massive processing and profiling [Y. Poullet]: De-contextualization of data (risk of being judged ‘out of context’) and discrimination; Surveillance and Predictive Society: lost of freedom and self-determination; Lost of identity: reducing the person identity and individuality to a profile; Reducing our choices to what the profile determines; Future individual actions conditioned by fear of non-compliance with the ‘normal’ profile

1. Justification of the subtitle: is the exception the rule? And this is becoming the rule of personal data processing… Can the exception to data protection be the rule? Main General Interests invoked to justify massive data processing: security, efficiency and transparency However, apart from the emergency situations recognized by Charter of Fundamental Rights and national Constitutions, there are not, there cannot be, exceptions to protection of personal data

1. Justification of the subtitle: is the exception the rule? All other cases in which security, efficiency or transparency are at stake (and demand data processing) may justify the restriction of data protection right but not its total sacrifice There may be: special cases of data protection restriction, or special data protection cases

2. Special Cases 2.1. Dynamic process of application of data protection law Concrete balancing of interests and rights must be renewed in each case; judgment cannot be crystalized.

2.2. Special data protection cases: sensitive data and prohibition of its processing Sensitive data: racial or ethnic origin, political opinions, religious or philosophical beliefs, trade-union membership, genetic data, health or sex life (Art. 8 Directive 95/46/CE) AND: sexual orientation; biometric data specifically processed to uniquely identify a person (Art. 9 Regulation (EU) 2016/679); 

Can it be classified as sensitive data? 2.2.Special data protection cases: sensitive data and prohibition of its processing Sensitiveness of data depends on the concrete context of processing; mainly connected to susceptibility of discrimination Increase of data processing that might conduct to a similar result: nationality, place of birth, place of birth of the data subjects’ parents. Can it be classified as sensitive data?

2.3. Special cases of data protection restriction Massive processing of data by commercial companies with legitimate aims imposed by law – but beyond what is adequate or necessary Examples: Data retention; PNR (Passenger Name Record); The case of cities covered by video surveillance systems

2.3. Special cases of data protection restriction Adequacy: most of the times creates a sensation of security, but is not able to ensure security (e.g., video surveillance) Necessity: even if adequate, collection of more data then those needed to achieve the aim (Data Retention: CJUE Digital Rigths Ireland, (C-293/12 e C- 594/12); Tele2 Sverige AB (C-203/2015); PNR vs. API – Advanced Passenger Information: exact information of the identification of passengers send by airline companies to authorities; the extra data are related to food restrictions, means of payment…)

2.3. Special cases of data protection restriction Besides: no precise grounds are invoked to justify restrictive legislative measures; No effective or relevant use of the date collected; Disproportionality of data mining and predictive analysis to prevent crimes.  

3. Analysis of some examples 3.1. Duty of banks to report to Tax Administration all bank transfers over a certain amount (e.g., € 1000,00) Massive communication of data to Financial Intelligence Units; profiling in order to detect a suspicious behavior 3.2. e-Call Massive possessing of data (localization, driving behavior), allowing profiling and monitorization, when the original aim is to provide efficient help in emergency cases 3.3. Wi-fi Networks Wi-fi hotspots provided by companies that collect at least the localization of the user of mobile device, even when it is not on-line - Tracking the users; allowing the combination of data through IMEI (International Mobile Equipment Identification) - - relevance of privacy restriction in public spaces