Instelling. Onderwerp. Datum

Size: px
Start display at page:

Download "Instelling. Onderwerp. Datum"

Transcription

1 Instelling Linklaters Technology Media and Telecommunications Issue 63 Onderwerp EU Guidance on which cookies are exempt from the new consent requirements Datum Juli 2012 Copyright and disclaimer De inhoud van dit document kan onderworpen zijn aan rechten van intellectuele eigendom van bepaalde betrokkenen, Er wordt u geen recht verleend op deze rechten. M&D Seminars geeft u via dit document informatie, maar verstrekt geen advies. M&D Seminars garandeert niet dat de informatie in dit document foutloos is. U gebruikt de inhoud van dit document op eigen risico. M&D Seminars, noch een van haar directieleden, aandeelhouders of bedienden zijn aansprakelijk voor bijzondere, indirecte, bijkomstige, afgeleide of bestraffende schade, noch voor enig ander nadeel van welke aard ook bij het gebruik van dit document en van de inhoud van dit document. M&D Seminars 2012 M&D SEMINARS Eikelstraat De Pinte T F info@mdseminars.be

2 July 2012 Technology Media and Telecommunications. Data Protection EU Linklaters obtains Binding Corporate Rules approval Linklaters binding corporate rules were approved by the UK Information Commissioner on 1 June 2012 (available here). Binding corporate rules are a set of group-wide binding privacy commitments. They allow worldwide transfers of personal data within Linklaters in full compliance with European data protection laws. A number of organisations in other industry sectors have adopted binding corporate rules but this is the first time that a law firm has obtained approval. Scope The binding corporate rules cover transfers of personal information about both clients and employees between Linklaters 28 offices in 20 jurisdictions worldwide. The rules were authorised under the mutual recognition procedure with the UK Information Commissioner acting as lead regulator and the Belgian Privacy Commission and German Hess data protection authority acting as co-lead regulators. Binding corporate rules are not the only means of achieving compliance with European rules on international transfers of personal data but they are the most flexible. Alternative approaches, which may suit certain organisations, include the use of intra-group agreements and adhesion to the US Safe Harbor. For other organisations, however, binding corporate rules are becoming an increasingly attractive option to achieve compliance. Revisions to European data law The proposed changes to European data protection laws also places a lot of emphasis on accountability, for example appointing data protection officers and ensuring that appropriate processes and procedures are in place. Binding corporate rules provide a helpful platform to prepare for these changes. Linklaters LLP has worked and continues to work on a number of other binding corporate rules applications for its clients, with further authorisations expected in the near future. By Tanguy Van Overstraeten, Brussels, and Richard Cumbley, London Contents EU Linklaters obtains Binding Corporate Rules approval... 1 EU How is the new cookie law being implemented across Europe?... 2 EU Guidance on which cookies are exempt from the new consent requirements... 7 EU New data protection mechanism to ease international outsourcings. 9 EU Working Party Opinion on developments in biometric technologies Belgium Implementation of the EU Telecom Package Belgium Court condemns identity theft on Facebook France The CNIL issues its investigation programme for France New data breach notification obligations take effect Germany Working Paper on cloud computing published UK Subject access requests & the problems with unstructured data UK Smeaton v Equifax: What must you do to ensure Issue 63 July personal data is accurate?... 28

3 EU How is the new cookie law being implemented across Europe? One of the more controversial amendments to the eprivacy Directive is the requirement to obtain consent for the use of certain cookies. This requirement should have been implemented by Member States over a year ago. Some have done so, but a significant minority have not. We look at different positions across Europe from early adopters, such as the UK and France, to the late developers, such as Belgium, Poland and Germany. The cookie law The cookie law continues to be controversial but it is hard to say it is new. The European Union added these provisions to article 5 of the eprivacy Directive in November 2009 as part of a major overhaul of the European telecoms laws framework. These changes should have been implemented in all Member States by May However, a significant minority have yet to do so. At the end of May, the European Commission decided to refer Belgium, the Netherlands, Poland, Portugal and Slovenia to the European Court of Justice for failing to implement these changes into their local law. The law itself only permits the storage of, or access to, information on the terminal equipment of a subscriber or user if that subscriber or user has been informed and has given consent. It therefore applies to a wide range of technology but most of the focus has been on http cookies. One of the most difficult issues with the new law is the need for consent. This has created a number of unresolved questions: > what is meant by consent? Does it need to be express or can it be implied? Does it need to be given prior to a cookie being set? > how should consent be obtained in practice? Is it best to use a banner advert, pop-up or notice on the website? > can consent be given through internet browser settings? The amended eprivacy Directive expressly recognises this as possible but are current browser settings sufficient? > consent is not needed if the access or storage is for the purpose of a communication or strictly necessary for a service explicitly requested by the user, but how does this exemption apply in practice? We consider this particular point elsewhere in this newsletter. We consider how these issues have been dealt with in a selection of Member States. Early adopter UK The UK s response to the cookie requirements is at quite an advanced stage. It implemented these requirements in May 2011 through amendments to the Privacy and Electronic Communications (EC Directive) Regulations Recognising that it would take some time for websites to comply with these Issue 63 July

4 requirements, the Information Commissioner adopted an informal moratorium on any enforcement action until May The law itself is a fairly faithful reproduction of the requirements of the eprivacy Directive and includes an express reference to consent being obtained through browser settings. The law has been supplemented by very full guidance from the Information Commissioner which has been updated on a regular basis. It is now in its third edition and is available here. The guidance provides an explanation about how cookies work and clarifies the Information Commissioner s interpretation of the law. In particular, the Information Commissioner considers that: > it might be possible to obtain implied consent to the use of cookies but this must normally be given prior to the cookie being set. It is hard to see how consent could be valid if it is given after the cookie is set; > there are a number of different ways in which organisations can obtain consent, particularly given that it may be possible to rely on implied consent. However, the more intrusive the cookie is, the greater the steps necessary to obtain consent; and > whilst it is possible to get consent through browser settings, current browsers are not sufficient for this purpose. The Information Commissioner is also concerned about the number of users likely to be using legacy browsers. The maturity of the UK s response to these laws is evidenced by the fact that it is already starting to enforce them. The Information Commissioner wrote to 50 organisations at the end of May asking for details of their compliance with these requirements. The response to those enquiries could well lead to further enforcement action. Early adopter France France is also relatively well advanced, having implemented these requirements though Ordinance n of 24 August 2011 on electronic communications. This amends the existing provisions on cookies in Article 32 II of the law n of 6 January 1978 (the French DPA ). The French implementation of the law again closely mirrors the amended eprivacy Directive and expressly mentions that consent may be granted by appropriate parameter settings in the user s connection device. It is supplemented by a recently issued opinion of the CNIL (the French Data Protection Authority) on the application of these laws in practice (available here). The guidance makes a number of interesting points, for example: > user s consent must be free, specific and informed, meaning that the user shall be able to choose which cookies are used and for what purpose. Consent need only be given or refused once. Accordingly, the CNIL suggests it may be possible to use a refusal cookie that, provided the user agrees to it, would remember the user s choice to refuse the storage of a cookie on their computer; Issue 63 July

5 > CNIL lists examples of ways to get consent such as a banner at the top of a web page, an area superimposed on a web page or boxes to check at the time of subscription to an online service. However, obtaining consent though general conditions of use is not likely to be valid and pop-up windows are not recommended because they are often blocked by browsers; and > the settings of the current browsers are not sufficient to demonstrate consent as they are difficult to use and differ significantly from one to another. In addition, websites do not have technical capabilities to accurately check browser settings. Thus, the CNIL considers that current browsers may not be considered as granting clear and complete information to the user when asking for consent. The guidance also stresses that all cookies are subject to the provisions of Article 32 II, including those which do not contain personal data. Recent implementation in Belgium Belgium is one of the Member States against whom enforcement action has been taken with the European Commissioner referring Belgium to the European Court of Justice at the end of May. It was at the time already in the process of implementing the cookie law and has now adopted the Law of 21 June 2012 introducing various provisions regarding electronic communications (the Belgian Law ). This law still needs to be published before coming into force. This will implement the cookie rule into Belgian law in Article 129 of the e- Communications Law. In doing so, it largely follows the text proposed by the amended eprivacy Directive. However, it distinguishes more specifically the two conditions required, i.e. (a) clear and specific information regarding the purposes of the data processing and the rights of the individual based on the Belgian legislation protecting personal data, and (b) the obtaining of the individual s consent after the above information has been provided. It also emphasises that the data controller must allow users to withdraw their consent free of charge. It specifies that compliance with the above requirements does not exempt the website operator from applying the other relevant provisions of the Belgian legislation protecting personal data. As in a number of other Member States, the Belgian Law does not set out how actually to obtain consent and so it will be up to the regulators to issue relevant guidance. A first indication of the Belgian position is that, during its review of the draft bill, the Belgian Privacy Commission indicated that consent may not be obtained through current browser settings (Opinion 10/2012 of 21 March 2012 regarding the draft bill). Poland suggest browser settings are sufficient Poland is another Member State against whom the European Commission has taken enforcement action. However, on 14 June 2012, the Polish Ministry of Administration and Digitalisation announced that it has adopted a project Issue 63 July

6 amendment to the Telecommunications Law act ( TE ), which includes, amongst other things, the new cookie law. The project amendment only changes the current provisions by introducing stricter information obligations for online service providers. The user must therefore be informed unambiguously and in an easily understandable manner, prior to placing the cookies, about: > the purpose of storing cookies; > the use of the content of the cookie; and > details of how the user can control the use of those cookies by modifying the internet browser s or the service s settings. The Ministry considers that an informed end-user expresses consent if he accepts the default browser s settings with respect to cookies, while the act of changing them should be understood as the end-user not granting consent. Therefore, the Ministry is of the opinion that this solution implements the consent requirements in the amended eprivacy Directive. Moreover, in the Ministry s view, there is no contradiction between the proposed amendment of the TE and its other provisions under which an end-user s consent may not be implied or inferred. During the public consultation on the new legislation, there was criticism that the projected amendment provides both insufficient protection of Internet users data and more complications for entrepreneurs, especially those in the advertising sector. The project amendment will now need to undergo normal legislative procedures in order to come into force. This may well lead to further amendments. No new cookie laws in sight yet in Germany Although Germany amended its Telecommunication Act (TKG) in early 2012 to implement many other amendments to the European telecoms framework, it has not yet published its new cookie laws. The German government explained that these requirements had to be discussed at a European level first as there were a number of unresolved questions about their implementation in practice. Other proposals by German political parties for the implementation of the relevant clauses were rejected by the German government. According to an opinion recently expressed by the German Federal Data Protection Commissioner Peter Schaar, the European cookie standards could now be applied directly and enforced in Germany in any event. Others expect that due to the unclear standards of the proposed cookie rules, the data protection authorities will refrain from enforcing such rules for the time being. Conclusions The incomplete and inconsistent implementation of the cookie law across Europe is aggravated by the lack of clear jurisdictional provisions in the Issue 63 July

7 amended eprivacy Directive. The considerable problems this causes for organisations operating on a pan-european basis is likely to persist for some time. By Sylvie Rousseau and Benoit Chevrel Barbier (Paris), Guillaume Couneson (Brussels), Lara White (London), Ingemar Kartheuser (Munich) and Gabriela Trebicka (Warsaw) Issue 63 July

8 EU Guidance on which cookies are exempt from the new consent requirements The amended eprivacy Directive includes a requirement to obtain consent to the use of cookies unless they are used for an exempt purpose. The Article 29 Working Party, the representative body for European data protection authorities, has recently issued an opinion on this exemption. Exempt cookies The first step in most cookie compliance projects is to conduct an audit to find out what cookies are set by a website and the purpose for which each cookie is used. This information can then be used to categorise each cookie to determine if it is used for an exempt purpose and, if not, how to obtain consent. The opinion considers the two exempt purposes in detail, namely: > cookies that are strictly necessary for the provision of an information society service explicitly requested by the subscriber or user. The working party interprets this exemption restrictively, stressing that the cookie must be necessary to enable the information society service i.e. without it the service would not work. The relevant service must also have been requested by the user through some positive action; and > cookies that are used for the sole purpose of carrying out the transmission of a communication over an electronic communication network. The working party again takes a restrictive approach, stating that it is not sufficient for the cookie to simply assist, speed up or regulate the transmission. An example of a cookie that is exempt is a load balancing session cookie. These are set where a user is allocated to a particular server in a pool of servers. The cookie ensures the user only deals with that server, which is important as it will be the only one with information on the status of that user s browsing session. The opinion also considers the different characteristics of cookies, for example, session or persistent and first party or third party. These characteristics affect the applicability of the exemptions and, as can be seen in the table below, it is unlikely that many persistent cookies will fall within these exemptions. Finally, where a cookie is used for a number of different purposes, all of those purposes must fall within the exemptions for the cookie to be exempt. Particular types of cookies An analysis of how these rules apply to particular types of cookies is also set out in the opinion and summarised below. The approach to first party analytics cookies is interesting. Whilst they do not fall within the exemptions, the Article 29 Working Party suggests that they are unlikely to present any privacy risks so long as they are only used to generate aggregated statistical data, and are accompanied by clear information and a user-friendly opt-out mechanism. This reflects the view of the UK Information Commissioner, who has indicated that it is very unlikely that he would take enforcement action Issue 63 July

9 over such cookies. However, this conflicts with an earlier opinion of the French CNIL which suggested that they might be exempt altogether. Hopefully the opinion will help to harmonise the application of these exemptions to these and other cookies. The Opinion 04/2012 on Cookie Consent Exemption is available here By Peter Church, London Purpose of Cookie Session Persistent User-input cookies e.g. shopping baskets Exempt (SN) No - unless limited to a few hours Authentication cookies e.g. to access a secure website User-centric security cookies e.g. to detect repeated failed log-ins Multimedia player cookies e.g. to record network speed, image quality or buffer information Load balancing cookies e.g. to allocate a user to a particular server to balance usage UI customisation cookies e.g. used to store preferences such as choice of language Social plug-in to share content (logged-in members) e.g. content sharing Social plug-in to share content (logged-out/non-members) e.g. content sharing Social plug-in tracking e.g. allows social network to track users on the internet Third party advertising e.g. behavioural advertising including frequency capping and click fraud First party analytics e.g. Google Analytics and other statistical measurement cookies Exempt (SN) Exempt (SN) Exempt (SN) Exempt (C) Exempt (SN) Exempt (SN) No No No No - but risk minimal for first party analytics No Exempt (SN) for limited periods No No No - unless limited to a few hours No No No No No - but risk minimal for first party analytics Exempt (SN): The cookie is exempt because it is strictly necessary for the provision of a service explicitly requested by the user. Exempt (C): The cookie is exempt because its sole purpose is to transmit a communication. Issue 63 July

10 EU New data protection mechanism to ease international outsourcings The Article 29 Working Party, the representative body for European data protection authorities, has issued its requirements for processor binding corporate rules. Outsourcing to service providers that implement these rules should become easier. Customers will be able to send personal data to the service provider and its sub-processors outside of the EU without the need for more onerous compliance mechanisms such as Model Contracts. We consider these rules in more detail below and their implications for the outsourcing market. Outsourcing and data protection In almost any outsourcing arrangement, a customer will want to ensure its information is held securely and that the supplier only uses that information to provide services to the customer. This means there is a close alignment between the intention of data protection laws and the commercial expectations of most outsourcing. However, complying with these laws in practice can be very burdensome. One of the reasons for this is the complex nature of many international outsourcings. They are often entered into for the benefit of a number of customer entities (typically all or part of the customer s group) and the services may be sub-contracted to a number of other entities, many of which may be based outside of the EU. This brings the restrictions on international transfers of personal data into play. There are a range of ways to comply with these restrictions depending on the exact structure of the outsourcing and the extent to which the parties are prepared to adopt a robust compliance solution. However, there are outsourcings in which Model Contracts (these are EU-approved data processing contracts) have been put in place between the majority of customer entities within the EU and the majority of the supplier entities outside of the EU. This web of contracts approach can require hundreds, if not thousands, of Model Contracts some of which will need to be notified or approved by local data protection regulators. This is clearly a burdensome exercise. Processor binding corporate rules The use of processor binding corporate rules would resolve many of these issues. The service provider (processor) would enter into a binding commitment to ensure all of the processing it carries out complies with data protection laws. The service provider commits to comply with these rules both through internally binding measures (such as intra-group agreement) and through its contract with its customer. The customer would then be able to transfer personal data to the service provider and its sub-processors, including those based outside of the EU, in full compliance with data protection laws. This should ease the compliance Issue 63 July

11 burden associated with any such outsourcing and could provide a competitive edge to suppliers who are able to offer this solution. Guidance from the Article 29 Working Party The Article 29 Working Party has recently issued a working document setting out its requirements for processor binding corporate rules. Whilst this is a significant step, it does not set out exactly how these frameworks will be adopted or approved in practice. For example, will the processor binding rules have to be approved by all of the data protection authorities from which personal data is transferred? If so, will service providers be able to use a mutual recognition process, similar to that used for binding corporate rules for controllers, to ease the application process? Is an approval even possible where the application is made by a processor rather than a controller? Finally, will controllers who rely on these rules still need to make their own notifications or seek their own approvals for these transfers? We understand that the Article 29 Working Party will issue further guidance to address these issues later on this summer. Requirements for processor binding corporate rules The working documents sets out the requirements for processor binding corporate rules in detail. The more important requirements can be summarised as follows: > Relevant exports and processing The rules must list out the entities that are subject to the rules and, at a high level, outline the nature of data likely to be transferred, anticipated purposes for which it will be processed and likely exporters. It appears this description can be general in nature and therefore not be tied to specific customers, thus allowing new customers to benefit from the rules when they obtain services from the service provider; > Internally binding The rules must be binding within the service provider s group and upon its employees, for example through the use of an intra-group agreement and appropriate provisions in employment contracts; > Externally binding The service provider should bind itself to the customer through a data protection service agreement under which it undertakes to comply with these rules. Importantly, the customer should have direct rights against all entities processing data. The service provider must also accept liability to individuals if the customer becomes insolvent or otherwise ceases to exist. The service provider must co-operate with data protection authorities including submitting to an audit by them; > Accountability The service provider must ensure that the rules are complied with in practice through a mixture of training programmes, Issue 63 July

12 complaint handling processes, audit and networks of data protection officers; > Safeguards The service provider must undertake a wide range of obligations to protect the personal data it processes including: (a) ensuring that personal data is processed securely; (b) only processing personal data on behalf of the customer and returning or destroying it at the end of that relationship; (c) co-operating with the customer to assist it to comply with data protection laws; and (d) being transparent where it is unable to comply with the rules due to changes in law or regulatory disclosure obligations; and > Updates and sub-processing The service provider can only change the processing conditions or sub-contract its processing with the customer s consent. This consent can be given in advance on a general basis but, even then, the customers must be notified of the change and have the option to object or terminate the contract. Service providers will need to consider these requirements carefully and determine if the benefit of implementing these rules outweighs the effort involved in obtaining and complying with them on an on-going basis. Some of the requirements, such as direct rights against members of the service provider s group and the ability for the customer to terminate where there is a change of sub-contractors, clearly have serious commercial ramifications. It will be interesting to see how the market influences the adoption of these rules. Use of these rules could become an expectation amongst customers keen to ease their own compliance burden and ensure their information is protected. If so, processor binding corporate rules could become the de facto standard in the outsourcing market. The Article 29 Working Party s paper is available here. Linklaters LLP has advised on five successful applications for binding corporate rules and has obtained approval for its own binding corporate rules. Linklaters is continuing to work on a number of other binding corporate rules applications for its clients, with further authorisations expected in the near future. By Tanguy Van Overstraeten, Brussels, and Sylvie Rousseau, Paris An extended version of this article will appear in the July edition of BNA World Data Protection Report (here). Issue 63 July

13 EU Working Party Opinion on developments in biometric technologies In April 2012, the Article 29 Working Party issued an Opinion on developments in biometric technologies, in particular vein pattern, fingerprints, facial and vocal recognition, DNA and signature biometrics (WP 193). The Opinion follows up on a working document of 2003 in which the working party had already explored the theme of biometrics (WP 80). The new Opinion aims to provide an updated framework of guidelines and recommendations on the implementation of data protection rules in biometric applications. The need for a revision and biometric technology The working party considers that particular care should be used when processing biometric data. It is closely linked to an individual s unique characteristics, may reveal sensitive data and allow tracking, tracing or profiling of individuals. Proper controls over the use of this data are increasingly important as, in recent years, biometric technology has been widely deployed in both the public and private sector for a variety of purposes (such as scientific research, forensics and access control) and is becoming much cheaper and faster to use. The Opinion provides a useful explanation of biometrics including a technical analysis of a number of specific biometric technologies, namely vein pattern, fingerprints, facial and vocal recognition, DNA and signature biometrics (i.e. a biometric analysis of an individual s signature). Biometrics and data protection Whilst new biometric technology can offer a range of benefits, it could lead to a gradual loss of privacy if adequate safeguards are not implemented. The working party notes that biometric data is in most cases personal data and its use must therefore comply with the applicable data protection principles. The following provisions of data protection law are particularly relevant: Legal ground for processing The processing of biometric data must, if it is personal data, satisfy a processing condition. The following provisions are likely to be relevant: > Consent. It is only possible to rely upon consent as a ground for processing if it is free and informed. The working party stresses that consent is not free in many cases in which biometric data is processed as there is no valid alternative to such processing. In addition, as biometric data may be used as a unique and universal identifier, information is crucial for consent to be valid. > Contract. The performance of a contract as a ground for processing is only likely to apply when pure biometric services are provided (e.g. DNA lab testing to match family members). Personal data is not an asset that can be asked for in exchange for a service (e.g. a social network which would make its use conditional upon biometric processing of users data, such as a picture). Issue 63 July

14 > Legitimate interests of the data controller. The working party considers that the use of biometrics for general security requirements can only be regarded as a legitimate interest if there are specific circumstances posing a considerable risk. The existence of these circumstances should be reviewed regularly. Informing data subjects - The working party stresses the importance of informing data subjects of the elements of processing, especially in view of the fact that some biometric technologies may operate unbeknownst to the data subject (e.g. facial recognition at a distance through CCTV). Role of national data protection authorities - Controllers who exploit systems that use biometric data as a key to interconnect multiple databases (which may lead to detailed profiling of an individual) should consult the competent national data protection authority before implementing such systems. Recommendations The Opinion contains a number of recommendations to the biometric industry. These include the following: Privacy by design - The working party urges the biometric industry to embed privacy proactively in the technology itself and, in particular, recommends that biometric systems be designed according to formal development lifecycles which include the following steps: > specification of requirements based on a risk analysis and/or a dedicated privacy impact assessment; > description and justification of how the design fulfils these requirements; > validation with functional and security tests; and > verification of compliance of the final design with the regulatory framework. This recommendation is interesting as it offers a practical methodology for implementing privacy by design, beyond the theoretical concept. Furthermore, the working party encourages the definition of certification schemes to ensure and enhance privacy by design. Privacy Impact Assessment (PIA) - The working party also encourages the biometric industry to perform PIAs to identify the risks of biometric technologies from a data protection perspective, provide adequate data protection measures and develop solutions to mitigate such risks. PIAs in the field of biometrics should, in particular, aim at avoiding or substantially limiting identity fraud, purpose diversion and data breaches. Issue 63 July

15 Technical and organisational measures Finally, the working party suggests a number of technical and organisational measures to prevent adverse effects in the event of a data breach. Technical measures include the storage of biometric data on a personal device rather than centralised, automated data erasure and biometric encryption (i.e. the use of biometric data as part of the encryption algorithm used to encrypt a specific identifier). As for organisational measures, the working party urges controllers to provide a clear procedure on who can access information and for what reasons, and the possibility to track all actions. In addition, the working party observes that outsourcing to external services is possible and increasingly popular due to the more frequent use of cloud computing. In such case, the working party believes that the controller must establish a detailed policy on how to control its contractors and must require specific guarantees. Conclusion The Opinion provides a valuable insight into issues relating to biometric technology from a data protection perspective and gives practical recommendations on how to address these. In addition, it offers a handful of useful definitions in the field of biometrics and a focused technical analysis of specific biometric technologies. The Opinion is available here. By Ronan Tigner, Brussels Issue 63 July

16 Belgium Implementation of the EU Telecom Package On 25 November 2009, the European Union adopted a revised regulatory framework for the European telecommunication sector, consisting of one Regulation and two Directives (together the EU Framework ). These Directives were due to be implemented in the EU Member States before 25 May However, the Belgian parliament has only recently adopted a law implementing the EU Framework into Belgian law (Law of 21 June 2012 introducing various provisions regarding electronic communications, hereafter the Law ). Once published and entered into force, the new Law will effect numerous changes. We look at how the Law implements two key provisions of the EU Framework under Belgian law, namely the data breach notification and the so-called EU cookie rule. Personal Data Breach Notification The eprivacy Directive already obliges providers of electronic communication services to implement appropriate technical and organisational protection measures to safeguard the security of their services (see Article 4(1)). The EU Framework goes a step further and obliges providers to notify personal data breaches, both to the competent national authority and to the individuals concerned by the breach. While notification to the regulator is required in all situations of breach, notification to individuals is required only when the breach is likely to adversely affect their personal data or privacy, but not when the regulator is satisfied that appropriate technological protection measures have been implemented (see Article 4(3)). The Law implements the notification regime by inserting a new Article 114/1 par. 3 in the law on electronic communications (Law of 13 June 2005 regarding electronic communications or e-communications Law ). Under the new rule, the notification must be made to the Belgian Institute for Postal Services and Telecommunications (the BIPT ), the supervisory body of the electronic communications sector. Although the Law transposes almost verbatim the provision of the EU Framework, it does contain a small but significant difference, namely that in the EU Framework a notification is triggered by a personal data breach, while under the Law, any endangering of the security of an electronic communication service with respect to personal data suffices to trigger the need for a notification. It is unclear how this provision would operate in practice but it is arguably wider and therefore could trigger the notification in a wider range of situations. The Cookie Rule Another heavily debated provision of the EU Framework is the so-called cookie rule. The storing of, or gaining access to, information on the terminal equipment of a subscriber, or user, is only allowed if they have been properly informed and have given their consent (Article 5(3) eprivacy Directive, as amended by the EU Framework). Issue 63 July

17 This provision regulates a range of technology including the use of cookies installed by website operators on the computers of users often without their knowledge. The key issue is how to obtain that consent. The eprivacy Directive suggests website operators may eventually be able to rely on the browser settings of the user, which may or may not prohibit the use of cookies. However, most Members States have concluded that current browser settings are not sufficient to demonstrate such consent, not least because the default setting is to allow cookies. The Law implements the cookie rule under Belgian law in Article 129 of the e- Communications Law. In doing so, it largely follows the text proposed by the EU Framework. However, it distinguishes more specifically the two conditions required, i.e. (a) clear and specific information regarding the purposes of the data processing and the rights of the individual based on the Belgian legislation protecting personal data, and (b) the obtaining of the individual s consent after the above information has been provided. The Law also emphasises that the data controller must allow users to withdraw their consent free of charge. It specifies that compliance with the above requirements does not exempt the website operator from applying the other relevant provisions of Belgian legislation protecting personal data. As in most other Member States, the Law does not consider how consent from users should be obtained and so it will be up to the regulators to issue relevant guidance. A first indication of the Belgian position is that, during its review of the draft bill, the regulator in charge of data protection indicated that consent may not be obtained through current browser settings (Privacy Commission Opinion 10/2012 of 21 March 2012 regarding the draft bill). Conclusion The Law demonstrates that, as in other Member States, the implementation of the EU Framework into local law is resulting in diverging positions. Although the Law does not specify how consent should be obtained with respect to cookies, Belgium seems inclined to follow a hard line and refuse current browser settings as a proper expression of consent. This is likely to negatively impact electronic business unless a more pragmatic approach is developed by the operators and accepted by the regulator. By Tanguy Van Overstraeten and Guillaume Couneson, Brussels This article first appeared in Global Business Magazine. Issue 63 July

18 Belgium Court condemns identity theft on Facebook In September 2011, the Ghent Court of First Instance found a woman guilty of creating false Facebook profiles to get back at her ex-employer, whom she alleged had repeatedly bullied her during employment. The decision is significant as it is one of the first times proceedings have been brought in Belgium for these activities. Creation of a false profile The fake profile was created by an ex-employee after being dismissed in She created a false Facebook profile of her ex-employer, added a picture of him and linked the profile to the company he worked in. In addition, she created two other Facebook profiles under the fictional names Daisy Seuil and Jeremy Boel, along with a profile picture for each she had taken off the internet. She then posted comments from the latter two profiles on the first profile which made it look like her ex-employer was having an adulterous relationship with Daisy Seuil and that Jeremy Boel was denouncing that affair. Criminal investigation The ex-employer filed a complaint with the examining magistrate, who conducted an investigation, identified the woman and summoned her before the Ghent Court of First Instance. The Court found the woman guilty of computer fraud (Art. 210bis of the criminal code), stalking (Art. 442bis of the criminal code), use of a false name (Art. 231 of the criminal code), attack on a person's honour or good name (Art. 444 of the criminal code) and use of electronic communications means to cause discomfort or harm to one s correspondent (Art of the law of 13 June 2005 on electronic communications). She was sentenced to seven months imprisonment (conditionally suspended) and a EUR 550 fine. It is interesting to note that the central issue in the judgment is a case of identity theft. However, there is currently no provision under Belgian criminal law which punishes identity theft as such. For example, notably, Article 231 of the criminal code in relation to the use of a false name aims primarily at ensuring individuals remain identifiable in society, rather than to punish identity theft. However, this did not prevent the Court from convicting the ex-employee through a combination of several existing criminal provisions. According to the Court: "social networks cannot be used to settle personal vendettas, to create fake profiles or even more so to assume the virtual identity of others. ( ). Social networks must be protected from users who create false profiles and usurp the identity of another with the sole intent of doing as much harm as possible to others, be it on the professional or private level" (unofficial translation). Issue 63 July

19 Discussions are currently ongoing in the Senate to amend the criminal law to explicitly make identity theft illegal. Meanwhile, the decision of the Ghent Court of First Instance remains significant as it is probably one of the first judgments in Belgium with respect to the creation and use of a false online profile and identity theft on a well-known social network such as Facebook. By Ronan Tigner, Brussels Issue 63 July

20 France The CNIL issues its investigation programme for 2012 The French data protection authority (the CNIL ) issued its investigations programme in April It intends to perform 450 on-site investigations in These investigations will focus on the following issues: smartphones, data breaches, security of health information, utilities, CCTV, police records and sport. Further details of these areas of investigation are set out below. Smartphones The CNIL intends to carry out an in-depth investigation into the monitoring of, and collection of personal data about, smartphone users. This will include the collection of personal data not only when subscribing to a provider, but also when downloading applications or using online services. The CNIL is concerned about the emergence of new uses for smartphones, and wishes to ensure the millions of users whose personal data is processed by providers and applications suppliers are properly protected. Data breach The CNIL also intends to investigate compliance with new breach notification requirements by providers of public electronic communication services (see Section 34 prime to the French Data Protection Act and Sections 25 and 26 of the decree of 30 March 2012). The new law includes strict notification requirements so it will be interesting to see how well these laws are complied with in practice. Security of health information The CNIL will also focus its investigation on medical research, online healthcare-related applications and health data hosting. Special attention will be given to remote storage of health records using cloud computing solutions. Several investigations are planned in large-scale healthcare infrastructures. Utilities In order to reassure citizens about the more routine processing of their personal data, investigations will be carried out on utility suppliers (such as water, gas and electricity) who handle the personal data of millions of customers. Motorway operators, who have deployed new technology such as contactless toll payments, anti-fraud measures and road safety measures, will also be investigated. CCTV Following on from its 2011 investigation programme, the CNIL plans to carry out 150 on-site inspections of organisations use of CCTV systems. The new inspections will be focused on large premises with large numbers of visitors and the use of CCTV to detect criminal offences. Issue 63 July

21 Police records In line with a recent parliamentary report, inspections will be conducted on the processing of personal data by several national and local police and gendarmerie services. Sport Further investigations will take place into the processing of personal data by sports federations regarding their licensees and spectators. The CNIL indicated that further time may be spent looking into anti-doping and into stadiums hosting sporting events. Overview of the investigation programme The CNIL s annual investigation programme allows it to keep up to date with the new methods and technologies used to collect and process personal data. It also provides a significant incentive to comply with French data protection laws considering the potential risks, both criminal and financial, that can result from a breach. Details of the investigation programme are available here (French only). By Sylvie Rousseau and Justine Massera, Paris Issue 63 July

22 France New data breach notification obligations take effect The obligation on providers of publicly available electronic communications services to notify data breaches has been brought into force. The changes implement the amended eprivacy Directive and have been made by the Ordinance of 24 August 2011, which inserts Section 34 prime into the Data Protection Act of 6 January Decree n of 30 March 2012 (the Decree ) provides further detail about the notification obligation and the CNIL has produced guidance on compliance with these new rules in practice ( Guidance ). Notification to the CNIL Under the new notification obligations, providers of publicly available electronic communication services (such as internet service providers and telecom operators) must notify without delay any breach of security leading accidentally or unlawfully to the destruction, loss and alteration, disclosure or unauthorised access to personal data, processed in the context of providing electronic communication services to the public. It is important to note that there is no de minimis threshold that might, for example, exclude less serious breaches from the notification obligation. The Guidance does, however, make it clear that the obligation only applies to information processed in the context of the provision of electronic communication services so, for example, the loss of data about the provider s employees would not trigger the notification obligation. The notification must be made by registered post and sent forthwith to the CNIL. The provider must specify the nature and consequences of the data breach, including an estimate of the number of people affected by the breach, and the steps taken or proposed to remedy the breach. In addition, the provider must provide the CNIL with details of any protective measures applied to the data and the impact of the data breach on the affected individuals. The CNIL will then assess, on a case-by-case basis, whether the security measures are appropriate and the gravity of the data breach. If the security measures are considered inappropriate or the CNIL does not respond within a twp month period, the provider will be required to notify the affected individual. Notification of the affected individuals The affected individuals only need be notified where: > the breach will adversely affect the personal data or privacy of that individual; and > appropriate measures were not in place to protect that personal data (e.g. encryption or anonymisation). Organisations can only rely on this exemption if the security measures are considered appropriate by the CNIL. Should the CNIL consider the security measures are Issue 63 July

23 inappropriate or fail to provide a response within the two-month timeframe, the provider should notify the affected individuals forthwith. The CNIL may issue a formal notice to the provider to notify the affected individuals in the event of a serious breach. The notification must specify the nature of the data breach and the provider must recommend measures to mitigate the negative fallout of this breach to the affected individuals. Conclusion The new decree of 30 March 2012 might be considered a step forward by encouraging organisations to take data security more seriously. However, the loose definition given to a data breach might result in an excessive number of notifications to data subjects, not to mention the risk the CNIL will be unable to deal with the administrative burden arising from the number of notifications submitted to it. The CNIL s guidance is available here (French only). By Thibault Soyer and Justine Massera, Paris Issue 63 July

24 Germany Working Paper on cloud computing published In April 2012, the non-governmental International Working Group on Data Protection in Telecommunications published a Working Paper on Cloud Computing Privacy and data protection issues Sopot Memorandum. The paper is broadly supportive of cloud computing as a means of achieving greater economic efficiency but makes a number of recommendations to ensure such arrangements also comply with data protection laws. Overview The paper is particularly interesting as some German data protection authorities have previously taken a very restrictive view of cloud computing. The group considers that cloud computing can be provided in compliance with the applicable data protection laws so long as appropriate measures are implemented to mitigate the risks of cloud computing. Accordingly, the group recommends implementing data protection agreements between the cloud provider and the data controller. Such agreements should address the following points: > It should be clear which locations are used to process personal data and to which recipients it is transferred. A location audit trail should be available to show such physical locations. > The data controller should ensure that the cloud provider only processes personal data in accordance with the data controller s instructions and for the data controller s purposes. > The data controller should have the right to conduct audits at the cloud provider either itself or by trusted third parties. > The data controller should perform a risk assessment prior to the start of the cloud services and regularly thereafter, based on the specific conditions and circumstances under which personal data will be processed by the cloud provider and its subcontractors. > The cloud provider should be obliged to implement effective and prompt procedures in order to enable the data subjects to exercise their rights of access, rectification, erasure or blocking of data. Effective technical and organisational measures should be provided. The data controller should consider whether at least one back-up copy of the data should reside outside the cloud provider s control. > In cases of data breaches, the cloud provider should be obliged to notify the data controller and/or the competent data protection authority. Existing requirements under German law The group s opinion is in line with existing requirements to commissioned data processing agreements under German legislation. As, in the group s view, cloud computing increases the risk of data protection breaches, the group puts even greater emphasis on the contractual standards and Issue 63 July

Cookies and consent. The Article 29 Working Party has identified seven types of cookies that are not subject to the consent requirement.

Cookies and consent. The Article 29 Working Party has identified seven types of cookies that are not subject to the consent requirement. Cookies and consent Cookies are small text files placed on a computer and accessed by the browser when opening a webpage. - DDMA 2012 The statutory requirements governing the placement of cookies were

More information

Processor Binding Corporate Rules (BCRs), for intra-group transfers of personal data to non EEA countries

Processor Binding Corporate Rules (BCRs), for intra-group transfers of personal data to non EEA countries Processor Binding Corporate Rules (BCRs), for intra-group transfers of personal data to non EEA countries Sopra HR Software as a Data Processor Sopra HR Software, 2014 / Ref. : 20141120-101114-m 1/32 1.

More information

Article 29 Working Party Issues Opinion on Cloud Computing

Article 29 Working Party Issues Opinion on Cloud Computing Client Alert Global Regulatory Enforcement If you have questions or would like additional information on the material covered in this Alert, please contact one of the authors: Cynthia O Donoghue Partner,

More information

Opinion 04/2012 on Cookie Consent Exemption

Opinion 04/2012 on Cookie Consent Exemption ARTICLE 29 DATA PROTECTION WORKING PARTY 00879/12/EN WP 194 Opinion 04/2012 on Cookie Consent Exemption Adopted on 7 June 2012 This Working Party was set up under Article 29 of Directive 95/46/EC. It is

More information

Align Technology. Data Protection Binding Corporate Rules Controller Policy. 2014 Align Technology, Inc. All rights reserved.

Align Technology. Data Protection Binding Corporate Rules Controller Policy. 2014 Align Technology, Inc. All rights reserved. Align Technology Data Protection Binding Corporate Rules Controller Policy Contents INTRODUCTION 3 PART I: BACKGROUND AND ACTIONS 4 PART II: CONTROLLER OBLIGATIONS 6 PART III: APPENDICES 13 2 P a g e INTRODUCTION

More information

Cookies Compliance Advisory

Cookies Compliance Advisory Cookies Compliance Advisory Note: this is an advisory notice that summarises the current position of the Article 29 Working Group and makes suggestions as to how organisations might practically achieve

More information

Recommendations for companies planning to use Cloud computing services

Recommendations for companies planning to use Cloud computing services Recommendations for companies planning to use Cloud computing services From a legal standpoint, CNIL finds that Cloud computing raises a number of difficulties with regard to compliance with the legislation

More information

Privacy and Electronic Communications Regulations

Privacy and Electronic Communications Regulations ICO lo Notification of PECR security breaches Privacy and Electronic Communications Regulations Contents Introduction... 2 Overview... 2 Relevant security breaches... 3 What is a service provider?... 3

More information

ESOMAR PRACTICAL GUIDE ON COOKIES JULY 2012

ESOMAR PRACTICAL GUIDE ON COOKIES JULY 2012 ESOMAR PRACTICAL GUIDE ON COOKIES JULY 2012 Copyright ESOMAR 2012 TABLE OF CONTENTS 2 Objectives 2 Introduction 3 Definitions 4 SECTION 1: APPLICABLE LAW 4 SECTION 2: WHAT YOU NEED TO KNOW SOME FAQs 5

More information

Auteur. Onderwerp. Datum

Auteur. Onderwerp. Datum Auteur DLA PIPER Be Aware Employment, Pensions and Benefits www.dlapiper.com Onderwerp Does the employee who uses a company car (even only occasionally) to transport a colleague have to possess a certificate

More information

Data protection issues on an EU outsourcing

Data protection issues on an EU outsourcing Data protection issues on an EU outsourcing Saam Golshani, Alastair Gorrie and Diego Rigatti, Orrick Herrington & Sutcliffe www.practicallaw.com/8-380-8496 Outsourcing can mean subcontracting a process

More information

1. Introduction. 2. Sectoral Areas Affected. 3. Data Security. 4. Data Breach Requirements. 5. Traffic Data

1. Introduction. 2. Sectoral Areas Affected. 3. Data Security. 4. Data Breach Requirements. 5. Traffic Data 1. Introduction Special data protection rules apply to the protection of Personal Data by Data Controllers in the electronic communications sector. These are in addition to the general obligations that

More information

PRIVACY POLICY AND INFORMATION ON COOKIES

PRIVACY POLICY AND INFORMATION ON COOKIES PRIVACY POLICY AND INFORMATION ON COOKIES This privacy policy governs the collection, storage and use of personal information (meaning any information about you which is personally identifiable namely:

More information

User tracking: Scope and Implementation eprivacy Directive Article 5(3)

User tracking: Scope and Implementation eprivacy Directive Article 5(3) User tracking: Scope and Implementation eprivacy Directive Article 5(3) Email Sender & Provider Coalition April 3, 2012 Presented By Karin Retzer 2012 Morrison & Foerster LLP All Rights Reserved mofo.com

More information

An overview of UK data protection law

An overview of UK data protection law An overview of UK data protection law Our team Vinod Bange Partner +44 (0)20 7300 4600 v.bange@taylorwessing.com Graham Hann Partner +44 (0)20 7300 4839 g.hann@taylorwessing.com Chris Jeffery Partner +44

More information

Protection. Code of Practice. of Personal Data RPC001147_EN_D_19

Protection. Code of Practice. of Personal Data RPC001147_EN_D_19 Protection of Personal Data RPC001147_EN_D_19 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Rules Responsibility

More information

ARTICLE 29 DATA PROTECTION WORKING PARTY

ARTICLE 29 DATA PROTECTION WORKING PARTY ARTICLE 29 DATA PROTECTION WORKING PARTY 00658/13/EN WP 204 Explanatory Document on the Processor Binding Corporate Rules Adopted on 19 April 2013 This Working Party was set up under Article 29 of Directive

More information

COMMISSION STAFF WORKING DOCUMENT. on the existing EU legal framework applicable to lifestyle and wellbeing apps. Accompanying the document

COMMISSION STAFF WORKING DOCUMENT. on the existing EU legal framework applicable to lifestyle and wellbeing apps. Accompanying the document EUROPEAN COMMISSION Brussels, 10.4.2014 SWD(2014) 135 final COMMISSION STAFF WORKING DOCUMENT on the existing EU legal framework applicable to lifestyle and wellbeing apps Accompanying the document GREEN

More information

Insurance Europe key messages on the European Commission's proposed General Data Protection Regulation

Insurance Europe key messages on the European Commission's proposed General Data Protection Regulation Position Paper Insurance Europe key messages on the European Commission's proposed General Data Protection Regulation Our reference: SMC-DAT-12-064 Date: 3 September 2012 Related documents: Proposal for

More information

The eighth data protection principle and international data transfers

The eighth data protection principle and international data transfers Data Protection Act 1998 The eighth data protection principle and international data transfers The Information Commissioner s recommended approach to assessing adequacy including consideration of the issue

More information

technical factsheet 176

technical factsheet 176 technical factsheet 176 Data Protection CONTENTS 1. Introduction 1 2. Register with the Information Commissioner s Office 1 3. Period protection rights and duties remain effective 2 4. The data protection

More information

AIRBUS GROUP BINDING CORPORATE RULES

AIRBUS GROUP BINDING CORPORATE RULES 1 AIRBUS GROUP BINDING CORPORATE RULES 2 Introduction The Binding Corporate Rules (hereinafter BCRs ) of the Airbus Group finalize the Airbus Group s provisions on the protection of Personal Data. These

More information

Data and Cyber Laws Up-date 9 July 2015

Data and Cyber Laws Up-date 9 July 2015 Data and Cyber Laws Up-date 9 July 2015 Janine Regan Alexia Zuber Viktoria Protokova Simon Holdsworth charlesrussellspeechlys.com Topics Updates on the key aspects of, and commentary on, the proposed GDPR

More information

FRANCE. Chapter XX OVERVIEW

FRANCE. Chapter XX OVERVIEW Chapter XX FRANCE Merav Griguer 1 I OVERVIEW France has an omnibus privacy, data protection and cybersecurity framework law. As a member of the European Union, France has implemented the EU Data Protection

More information

Corporate ICT & Data Management. Data Protection Policy

Corporate ICT & Data Management. Data Protection Policy 90 Corporate ICT & Data Management Data Protection Policy Classification: Unclassified Date Created: January 2012 Date Reviewed January Version: 2.0 Author: Owner: Data Protection Policy V2 1 Version Control

More information

Align Technology. Data Protection Binding Corporate Rules Processor Policy. 2014 Align Technology, Inc. All rights reserved.

Align Technology. Data Protection Binding Corporate Rules Processor Policy. 2014 Align Technology, Inc. All rights reserved. Align Technology Data Protection Binding Corporate Rules Processor Policy Confidential Contents INTRODUCTION TO THIS POLICY 3 PART I: BACKGROUND AND ACTIONS 4 PART II: PROCESSOR OBLIGATIONS 6 PART III:

More information

Guidelines on Executive Order on Information and Consent Required in Case of Storing and Accessing Information in End-User Terminal Equipment

Guidelines on Executive Order on Information and Consent Required in Case of Storing and Accessing Information in End-User Terminal Equipment Guidelines on Executive Order on Information and Consent Required in Case of Storing and Accessing Information in End-User Terminal Equipment ("Cookie Order") 2nd version, April 2013 Preface...3 1. Introduction...5

More information

The Role and Function of a Data Protection Officer in the European Commission s Proposed General Data Protection Regulation. Initial Discussion Paper

The Role and Function of a Data Protection Officer in the European Commission s Proposed General Data Protection Regulation. Initial Discussion Paper The Role and Function of a Data Protection Officer in the European Commission s Proposed General Data Protection Regulation 1. Introduction Initial Discussion Paper The data protection officer ( DPO )

More information

Briefly summarised, SURFmarket has submitted the following questions to the Dutch DPA:

Briefly summarised, SURFmarket has submitted the following questions to the Dutch DPA: UNOFFICIAL TRANSLATION Written opinion on the application of the Wet bescherming persoonsgegevens [Dutch Data Protection Act] in the case of a contract for cloud computing services from an American provider

More information

Cloud Computing. Introduction

Cloud Computing. Introduction Cloud Computing Introduction This information leaflet aims to advise organisations which are considering engaging cloud computing on the factors they should consider. It explains the relationship between

More information

Protection. Code of Practice. of Personal Data RPC001147_EN_WB_L_1

Protection. Code of Practice. of Personal Data RPC001147_EN_WB_L_1 Protection of Personal Data RPC001147_EN_WB_L_1 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Responsibility of Employees

More information

Application of Data Protection Concepts to Cloud Computing

Application of Data Protection Concepts to Cloud Computing Application of Data Protection Concepts to Cloud Computing By Denitza Toptchiyska Abstract: The fast technological development and growing use of cloud computing services require implementation of effective

More information

(a) the kind of data and the harm that could result if any of those things should occur;

(a) the kind of data and the harm that could result if any of those things should occur; Cloud Computing This information leaflet aims to advise organisations on the factors they should take into account in considering engaging cloud computing. It explains the relevance of the Personal Data

More information

OUTSOURCING, HOSTING AND DATA PRIVACY ISSUES

OUTSOURCING, HOSTING AND DATA PRIVACY ISSUES OUTSOURCING, HOSTING AND DATA PRIVACY ISSUES 4 April 2013 James Castro-Edwards Solicitor Monica Salgado Advogada / Portuguese Lawyer OUR TEAM Speechly Bircham is an ambitious, full-service law firm with

More information

Data protection compliance checklist

Data protection compliance checklist Data protection compliance checklist What is this checklist for? This checklist is drawn up on the basis of analysis of the relevant provisions of European law. Although European law aims at harmonizing

More information

Data Protection Policy

Data Protection Policy Data Protection Policy September 2015 Contents 1. Scope 2. Purpose 3. Data protection roles 4. Staff training and guidance 5. About the Data Protection Act 1998 6. Policy 7. The Information Commissioner's

More information

Data Protection Act 1998. Guidance on the use of cloud computing

Data Protection Act 1998. Guidance on the use of cloud computing Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered

More information

What's Up with Apps in Hong Kong July 2013

What's Up with Apps in Hong Kong July 2013 What's Up with Apps in Hong Kong July 2013 In May this year, the Hong Kong Privacy Commissioner for Personal Data ("Privacy Commissioner") joined the Global Privacy Enforcement Network ("GPEN") to conduct

More information

Corporate Compliance: A Global Perspective

Corporate Compliance: A Global Perspective Corporate Compliance: A Global Perspective 6/27/2012 37 Offices in 18 Countries Current Compliance Environment Ever-intensifying regulatory burden new areas of regulation existing regulations becoming

More information

Data Processing Agreement for Oracle Cloud Services

Data Processing Agreement for Oracle Cloud Services Data Processing Agreement for Oracle Cloud Services Version December 1, 2013 1. Scope and order of precedence This is an agreement concerning the Processing of Personal Data as part of Oracle s Cloud Services

More information

Information Security Risks when going cloud. How to deal with data security: an EU perspective.

Information Security Risks when going cloud. How to deal with data security: an EU perspective. Separating fact from fiction about new software licensing /SaaS/ cloud computing models: advantages, disadvantages and ethical implications. Information Security Risks when going cloud. How to deal with

More information

COMMISSION OF THE EUROPEAN COMMUNITIES GREEN PAPER

COMMISSION OF THE EUROPEAN COMMUNITIES GREEN PAPER EN EN EN COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 11.11.2009 COM(2009) 624 final GREEN PAPER on obtaining evidence in criminal matters from one Member State to another and securing its admissibility

More information

If you have any questions about our privacy practices, please refer to the end of this privacy policy for information on how to contact us.

If you have any questions about our privacy practices, please refer to the end of this privacy policy for information on how to contact us. c4m Privacy Policy Last Modified: July 20, 2015 Colbette II Ltd., Block 1, 195-197 Old Nicosia-Limassol Road, Dali Industrial Zone, Cyprus 2540 (hereinafter "c4m", Colbette we", "our" or "us") is always

More information

New EU Data Protection legislation comes into force today. What does this mean for your business?

New EU Data Protection legislation comes into force today. What does this mean for your business? 24 th May 2016 New EU Data Protection legislation comes into force today. What does this mean for your business? After years of discussion and proposals, the General Data Protection Regulation ( GDPR )

More information

AlixPartners, LLP. General Data Protection Statement

AlixPartners, LLP. General Data Protection Statement AlixPartners, LLP General Data Protection Statement GENERAL DATA PROTECTION STATEMENT 1. INTRODUCTION 1.1 AlixPartners, LLP ( AlixPartners ) is committed to fulfilling its obligations under the data protection

More information

STATUTORY INSTRUMENTS. S.I. No. 336 of 2011

STATUTORY INSTRUMENTS. S.I. No. 336 of 2011 STATUTORY INSTRUMENTS. S.I. No. 336 of 2011 EUROPEAN COMMUNITIES (ELECTRONIC COMMUNICATIONS NETWORKS AND SERVICES) (PRIVACY AND ELECTRONIC COMMUNICATIONS) REGULATIONS 2011 (Prn. A11/1165) 2 [336] S.I.

More information

Data controllers and data processors: what the difference is and what the governance implications are

Data controllers and data processors: what the difference is and what the governance implications are ICO lo : what the difference is and what the governance implications are Data Protection Act Contents Introduction... 3 Overview... 3 Section 1 - What is the difference between a data controller and a

More information

PRIVACY POLICY (LAST UPDATED: 29.05.2015)

PRIVACY POLICY (LAST UPDATED: 29.05.2015) PRIVACY POLICY (LAST UPDATED: 29.05.2015) CONTENTS 1 Personally Identifiable Information... 3 2 Collection of Personally Identifiable and Other Data and Information... 3 2.1 When visiting our website www.zanox.com...

More information

European Privacy Reporter

European Privacy Reporter Is this email not displaying correctly? Try the web version or print version. ISSUE 02 European Privacy Reporter An Update on Legal Developments in European Privacy and Data Protection November 2012 In

More information

Investigation Report: HKA Holidays Limited Leaked Customers Personal Data through the Mobile Application TravelBud

Investigation Report: HKA Holidays Limited Leaked Customers Personal Data through the Mobile Application TravelBud Published under Section 48(2) of the Personal Data (Privacy) Ordinance (Cap. 486) Investigation Report: HKA Holidays Limited Leaked Customers Personal Data through the Mobile Application TravelBud Report

More information

BCS, The Chartered Institute for IT Consultation Response to:

BCS, The Chartered Institute for IT Consultation Response to: BCS, The Chartered Institute for IT Consultation Response to: A Comprehensive Approach to Personal Data Protection in the European Union Dated: 15 January 2011 BCS The Chartered Institute for IT First

More information

Personal information, for purposes of this Policy, includes any information which relates to an identified or an identifiable person.

Personal information, for purposes of this Policy, includes any information which relates to an identified or an identifiable person. PART I: INTRODUCTION AND BACKGROUND Purpose This Data Protection Binding Corporate Rules Policy ( Policy ) establishes the approach of Fluor to compliance with European data protection law and specifically

More information

FIRST DATA CORPORATION PROCESSOR DATA PROTECTION STANDARDS

FIRST DATA CORPORATION PROCESSOR DATA PROTECTION STANDARDS FIRST DATA CORPORATION PROCESSOR DATA PROTECTION STANDARDS As a world leader in electronic commerce and payment services, First Data Corporation and its subsidiaries ( First Data entity or entities ),

More information

TERMS & CONDITIONS of SERVICE for MSKnote. Refers to MSKnote Limited. Refers to you or your organisation

TERMS & CONDITIONS of SERVICE for MSKnote. Refers to MSKnote Limited. Refers to you or your organisation TERMS & CONDITIONS of SERVICE for MSKnote Definitions: "Us or Our or We or Company" You or Your or Client Refers to MSKnote Limited Refers to you or your organisation Information about us: We are MSKnote

More information

DATA PROTECTION LAWS OF THE WORLD. India

DATA PROTECTION LAWS OF THE WORLD. India DATA PROTECTION LAWS OF THE WORLD India Date of Download: 6 February 2016 INDIA Last modified 27 January 2016 LAW IN INDIA There is no specific legislation on privacy and data protection in India. However,

More information

Standard conditions of purchase

Standard conditions of purchase Standard conditions of purchase 1 OFFER AND ACCEPTANCE 2 PROPERTY, RISK & DELIVERY 3 PRICES & RATES The Supplier shall provide all Goods and Services in accordance with the terms and conditions set out

More information

Personal Data (Privacy) (Amendment) Ordinance 2012 - Use and Sale of Personal Data for Direct Marketing.

Personal Data (Privacy) (Amendment) Ordinance 2012 - Use and Sale of Personal Data for Direct Marketing. July 2012 Personal Data (Privacy) (Amendment) Ordinance 2012 - Use and Sale of Personal Data for Direct Marketing. Contents Introduction On 27 June 2012, Hong Kong s Legislative Council ( LegCo ) passed

More information

Data Protection. Processing and Transfer of Personal Data in Kvaerner. Binding Corporate Rules Public Document

Data Protection. Processing and Transfer of Personal Data in Kvaerner. Binding Corporate Rules Public Document Data Protection Processing and Transfer of Personal Data in Kvaerner Binding Corporate Rules Public Document 1 of 19 1 / 19 Table of contents 1 Introduction... 4 1.1 Scope... 4 1.2 Definitions... 4 1.2.1

More information

Personal data and cloud computing, the cloud now has a standard. by Luca Bolognini

Personal data and cloud computing, the cloud now has a standard. by Luca Bolognini Personal data and cloud computing, the cloud now has a standard by Luca Bolognini Lawyer, President of the Italian Institute for Privacy and Data Valorization, founding partner ICT Legal Consulting Last

More information

Comments and proposals on the Chapter IV of the General Data Protection Regulation

Comments and proposals on the Chapter IV of the General Data Protection Regulation Comments and proposals on the Chapter IV of the General Data Protection Regulation Ahead of the trialogue negotiations later this month, EDRi, Access, Panoptykon Bits of Freedom, FIPR and Privacy International

More information

How To Protect Your Data In European Law

How To Protect Your Data In European Law Corporate Data Protection Code of Conduct for the Protection of the Individual s Right to Privacy in the Handling of Personal Data within the Deutsche Telekom Group 2010 / 04 We make ICT strategies work

More information

MIS Privacy Statement. Our Privacy Commitments

MIS Privacy Statement. Our Privacy Commitments MIS Privacy Statement Our Privacy Commitments MIS Training Institute Holdings, Inc. (together "we") respect the privacy of every person who visits or registers with our websites ("you"), and are committed

More information

EUROPEAN ECONOMIC AREA JOINT PARLIAMENTARY COMMITTEE. REPORT on E-Commerce and EEA legislation

EUROPEAN ECONOMIC AREA JOINT PARLIAMENTARY COMMITTEE. REPORT on E-Commerce and EEA legislation EUROPEAN ECONOMIC AREA 30 November 2000 Brussels JOINT PARLIAMENTARY COMMITTEE REPORT on E-Commerce and EEA legislation Co-rapporteurs: Ms. Marjo Matikainen-Kallstöm (EPP-ED, Finland) Mr. Vilhjálmur Egilsson

More information

IDT Financial Services Limited. Prime Card Privacy Policy

IDT Financial Services Limited. Prime Card Privacy Policy IDT Financial Services Limited Prime Card Privacy Policy Effective and Updated April 7, 2014 General IDT Financial Services Limited and its affiliates ( IDT, us, we, our ) are committed to protecting the

More information

PRIVACY POLICY. comply with the Australian Privacy Principles ("APPs"); ensure that we manage your personal information openly and transparently;

PRIVACY POLICY. comply with the Australian Privacy Principles (APPs); ensure that we manage your personal information openly and transparently; PRIVACY POLICY Our Privacy Commitment Glo Light Pty Ltd A.C.N. 099 730 177 trading as "Lighting Partners Australia of 16 Palmer Parade, Cremorne, Victoria 3121, ( LPA ) is committed to managing your personal

More information

Summary of Data Protection Requirements When transferring Data Outside the UK End Users

Summary of Data Protection Requirements When transferring Data Outside the UK End Users Summary of Data Protection Requirements When transferring Data Outside the UK End Users 14 May 2010 Background to transfers of the Data outside the UK Data can be transferred in a couple of ways in relation

More information

Multi-Jurisdictional Study: Cloud Computing Legal Requirements. Julien Debussche Associate January 2015

Multi-Jurisdictional Study: Cloud Computing Legal Requirements. Julien Debussche Associate January 2015 Multi-Jurisdictional Study: Cloud Computing Legal Requirements Julien Debussche Associate January 2015 Content 1. General Legal Framework 2. Data Protection Legal Framework 3. Security Requirements 4.

More information

slaughter and may The new EU Data Protection Regulation revolution or evolution?

slaughter and may The new EU Data Protection Regulation revolution or evolution? slaughter and may The new EU Data Protection Regulation revolution or evolution? BRIEFING April 2012 Reform of Europe s data protection regime moved one step closer this January with the publication of

More information

MRS Guidelines for Online Research. January 2012

MRS Guidelines for Online Research. January 2012 MRS Guidelines for Online Research January 2012 MRS is the world s largest association for people and organisations that provide or use market, social and opinion research, business intelligence and customer

More information

235.1. Federal Act on Data Protection (FADP) Aim, Scope and Definitions

235.1. Federal Act on Data Protection (FADP) Aim, Scope and Definitions English is not an official language of the Swiss Confederation. This translation is provided for information purposes only and has no legal force. Federal Act on Data Protection (FADP) 235.1 of 19 June

More information

Appendix 11 - Swiss Data Protection Act

Appendix 11 - Swiss Data Protection Act GLEIF- LOU Restricted Appendix 11 - Swiss Data Protection Act GLEIF Revision Version: 1.0 2015-09-23 Master Copy page 2 of 11 Applicable Provisions of the Swiss Data Protection Act (DPA) including the

More information

Working Document 02/2013 providing guidance on obtaining consent for cookies

Working Document 02/2013 providing guidance on obtaining consent for cookies ARTICLE 29 DATA PROTECTION WORKING PARTY 1676/13/EN WP 208 Working Document 02/2013 providing guidance on obtaining consent for cookies Adopted on 2 October 2013 This Working Party was set up under Article

More information

Into the Cloud: How will the Draft EU Data Protection Regulation affect cloud computing service providers and users?

Into the Cloud: How will the Draft EU Data Protection Regulation affect cloud computing service providers and users? 10 Juni 2013 Taylor Wessing - Essay Competition 2013 Into the Cloud: How will the Draft EU Data Protection Regulation affect cloud computing service providers and users? by Katarina Kesselová, LLM. Introduction

More information

GUIDANCE NOTE OUTSOURCING OF FUNCTIONS BY ENTITIES LICENSED UNDER THE PROTECTION OF INVESTORS (BAILIWICK OF GUERNSEY) LAW, 1987

GUIDANCE NOTE OUTSOURCING OF FUNCTIONS BY ENTITIES LICENSED UNDER THE PROTECTION OF INVESTORS (BAILIWICK OF GUERNSEY) LAW, 1987 GUIDANCE NOTE OUTSOURCING OF FUNCTIONS BY ENTITIES LICENSED UNDER THE PROTECTION OF INVESTORS (BAILIWICK OF GUERNSEY) LAW, 1987 CONTENTS Page 1. Introduction 3-4 2. The Commission s Policy 5 3. Outsourcing

More information

Data, Privacy, Cookies and the FTC in 2013. Kevin Stark - ExactTarget Maltie Maraj - ExactTarget Nicholas Merker - Ice Miller

Data, Privacy, Cookies and the FTC in 2013. Kevin Stark - ExactTarget Maltie Maraj - ExactTarget Nicholas Merker - Ice Miller Data, Privacy, Cookies and the FTC in 2013 Kevin Stark - ExactTarget Maltie Maraj - ExactTarget Nicholas Merker - Ice Miller BIOS Kevin Stark: Product Manager at ExactTarget. Focused on data security,

More information

The potential legal consequences of a personal data breach

The potential legal consequences of a personal data breach The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.

More information

A guide to affilinet s tracking technology

A guide to affilinet s tracking technology A guide to affilinet s tracking technology Content Introduction 1 What s covered in this Paper? 1 1. Why does affilinet use cookies? 1 Figure 1 the Commercial Model for Performance Marketing 1 2. How does

More information

Work programme 2016 2018

Work programme 2016 2018 ARTICLE 29 Data Protection Working Party 417/16/EN WP235 Work programme 2016 2018 Adopted on 2 February 2016 This Working Party was set up under Article 29 of Directive 95/46/EC. It is an independent European

More information

PAYMENT SERVICES AND SYSTEMS ACT (ZPlaSS) CHAPTER 1 GENERAL PROVISIONS SUBCHAPTER 1 CONTENT OF THE ACT. Article 1. (scope)

PAYMENT SERVICES AND SYSTEMS ACT (ZPlaSS) CHAPTER 1 GENERAL PROVISIONS SUBCHAPTER 1 CONTENT OF THE ACT. Article 1. (scope) Legal notice All effort has been made to ensure the accuracy of this translation, which is based on the original Slovenian text. All translations of this kind may, nevertheless, be subject to a certain

More information

The Manitowoc Company, Inc.

The Manitowoc Company, Inc. The Manitowoc Company, Inc. DATA PROTECTION POLICY 11FitzPatrick & Associates 4/5/04 1 Proprietary Material Version 4.0 CONTENTS PART 1 - Policy Statement PART 2 - Processing Personal Data PART 3 - Organisational

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY Reference number Approved by Information Management and Technology Board Date approved 14 th May 2012 Version 1.1 Last revised N/A Review date May 2015 Category Information Assurance Owner Data Protection

More information

How To Control Content On The Cloud

How To Control Content On The Cloud 1 EXPERT GROUP MEETING ON CLOUD COMPUTING CONTRACTS SYNTHESIS OF THE MEETING OF 30 APRIL 2014 On 30 April 2014, the Expert Group on Cloud Computing Contracts met for the sixth time. Three sessions were

More information

General Terms and Conditions of Trade for the use of the Bitplaces management platform and the Bitplaces software

General Terms and Conditions of Trade for the use of the Bitplaces management platform and the Bitplaces software General Terms and Conditions of Trade for the use of the Bitplaces management platform and the Bitplaces software I. Definitions, application area / conclusion of contract 1. Definitions 1.1 "App" in the

More information

Cloud Software Services for Schools

Cloud Software Services for Schools Cloud Software Services for Schools Supplier self-certification statements with service and support commitments Supplier name Address Contact name Contact email Contact telephone Parent Teacher Online

More information

Data Protection in Ireland

Data Protection in Ireland Data Protection in Ireland 0 Contents Data Protection in Ireland Introduction Page 2 Appointment of a Data Processor Page 2 Security Measures (onus on a data controller) Page 3 8 Principles Page 3 Fair

More information

Privacy Policy. If you have questions or complaints regarding our Privacy Policy or practices, please see Contact Us. Introduction

Privacy Policy. If you have questions or complaints regarding our Privacy Policy or practices, please see Contact Us. Introduction Privacy Policy This Privacy Policy will be effective from September 1 st, 2014. Please read Pelican Technologies Privacy Policy before using Pelican Technologies services because it will tell you how we

More information

UNILEVER PRIVACY PRINCIPLES UNILEVER PRIVACY POLICY

UNILEVER PRIVACY PRINCIPLES UNILEVER PRIVACY POLICY UNILEVER PRIVACY PRINCIPLES Unilever takes privacy seriously. The following five principles underpin our approach to respecting your privacy: 1. We value the trust that you place in us by giving us your

More information

South East Asia: Data Protection Update

South East Asia: Data Protection Update Data Privacy and Security Team To: Our Clients and Friends September 2013 South East Asia: Data Protection Update Europe has had data protection laws in place for over a decade. Such laws regulate how

More information

Merthyr Tydfil County Borough Council. Data Protection Policy

Merthyr Tydfil County Borough Council. Data Protection Policy Merthyr Tydfil County Borough Council Data Protection Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of the

More information

All rights reserved. 2011, EuroPriSe/ULD

All rights reserved. 2011, EuroPriSe/ULD January 2011 Position paper on certifiability of online behavioural advertising systems according to EuroPriSe Follow-up EuroPriSe - European Privacy Seal at the Unabhängiges Landeszentrum für Datenschutz

More information

The Data Protection Landscape. Before and after GDPR: General Data Protection Regulation

The Data Protection Landscape. Before and after GDPR: General Data Protection Regulation The Data Protection Landscape Before and after GDPR: General Data Protection Regulation Data Protection regulations across Europe Current regulations & guidance European Directives 95/46/EC (Data Protection)

More information

ROYAL AUSTRALASIAN COLLEGE OF SURGEONS

ROYAL AUSTRALASIAN COLLEGE OF SURGEONS 1. SCOPE This policy details the College s privacy policy and related information handling practices and gives guidelines for access to any personal information retained by the College. This includes personal

More information

ECSA EuroCloud Star Audit Data Privacy Audit Guide

ECSA EuroCloud Star Audit Data Privacy Audit Guide ECSA EuroCloud Star Audit Data Privacy Audit Guide Page 1 of 15 Table of contents Introduction... 3 ECSA Data Privacy Rules... 4 Governing Law... 6 Sub processing... 6 A. TOMs: Cloud Service... 7 TOMs:

More information

Position of the retail and wholesale sector on the Draft Data Protection Regulation in view of the trilogue 2015

Position of the retail and wholesale sector on the Draft Data Protection Regulation in view of the trilogue 2015 2 September 2015 Position of the retail and wholesale sector on the Draft Data Protection Regulation in view of the trilogue 2015 We support the efforts of EU legislators to create a harmonised data protection

More information

Food Law and Due Diligence Defence

Food Law and Due Diligence Defence The Society of Food Hygiene and Technology INTRODUCTION This document explains the general requirements of food law and covers the main EC and UK legislation on food imports and exports, safety, traceability,

More information

DESTINATION MELBOURNE PRIVACY POLICY

DESTINATION MELBOURNE PRIVACY POLICY DESTINATION MELBOURNE PRIVACY POLICY 2 Destination Melbourne Privacy Policy Statement Regarding Privacy Policy Destination Melbourne Limited recognises the importance of protecting the privacy of personally

More information

2015 No. 0000 FINANCIAL SERVICES AND MARKETS. The Small and Medium Sized Businesses (Credit Information) Regulations 2015

2015 No. 0000 FINANCIAL SERVICES AND MARKETS. The Small and Medium Sized Businesses (Credit Information) Regulations 2015 Draft Regulations to illustrate the Treasury s current intention as to the exercise of powers under clause 4 of the the Small Business, Enterprise and Employment Bill. D R A F T S T A T U T O R Y I N S

More information

BRING YOUR OWN DEVICE

BRING YOUR OWN DEVICE BRING YOUR OWN DEVICE Legal Analysis & Practical TIPs for an effective BYOD corporate Policy CONTENTS 1. What is BYOD? 2. Benefits and risks of BYOD in Europe 3. BYOD and existing Policies 4. Legal issues

More information

AN INSIDE VIEW FROM THE EU EXPERT GROUP ON CLOUD COMPUTING

AN INSIDE VIEW FROM THE EU EXPERT GROUP ON CLOUD COMPUTING AN INSIDE VIEW FROM THE EU EXPERT GROUP ON CLOUD COMPUTING 1. Overview and Background On 27 September 2012, the European Commission adopted a strategy for "Unleashing the potential of cloud computing in

More information

Behavioral Targeting Legal Developments in Europe and the Netherlands

Behavioral Targeting Legal Developments in Europe and the Netherlands 1 Behavioral Targeting Legal Developments in Europe and the Netherlands Frederik Zuiderveen Borgesius Ph.D researcher, focusing on behavioral targeting and privacy law Institute for Information Law, University

More information