Privacy & Data Security: The Future of the US-EU Safe Harbor
|
|
|
- Cameron Collins
- 10 years ago
- Views:
Transcription
1 Privacy & Data Security: The Future of the US-EU Safe Harbor NAOMI MCBRIDE, LISA J. SOTTO AND BRIDGET TREACY, HUNTON & WILLIAMS LLP, WITH PRACTICAL LAW US INTELLECTUAL PROPERTY & TECHNOLOGY AND UK IP&IT An article examining the safe harbor for transferring personal data from the EU to the US and its future viability in light of criticism from the European Commission and some EU data protection authorities, which has intensified following disclosure of the US government's surveillance programs. The US-EU Safe Harbor framework is an important cross-border data transfer mechanism that enables certified organizations to transfer personal data from the EU to the US in compliance with European data protection laws. Almost 3,500 organizations across a broad range of industries are Safe Harbor-certified. Recently, however, the Safe Harbor s future has been thrown into doubt. Following widespread concern about the US government's covert surveillance programs, European Commission Vice-President Viviane Reding announced in July 2013 a European Commission (Commission) plan to review the Safe Harbor and publish the results before the end of She observed that the Safe Harbor "may not be so safe after all," noting that it "could be a loophole for data transfers because "it allows data transfers from EU to US companies although US data protection standards are lower than our European ones." While it seems unlikely that the Safe Harbor will be suspended or reversed, companies in both the US and EU should closely monitor the political landscape. This article examines: The Safe Harbor framework, including the Commission s adequacy requirement and how onward transfers are made under the Safe Harbor. US enforcement of the Safe Harbor. EU concerns about the Safe Harbor and actions taken in response to these concerns. Key points in the debate on the Safe Harbor s viability. THE US-EU SAFE HARBOR FRAMEWORK The EU Data Protection Directive (Directive 95/46/EC), with limited exceptions, generally prohibits organizations from transferring personal data from the EU to countries outside the European Economic Area (EEA) unless there is an adequate level of data protection. Under Directive 95/46/EC, the adequacy requirement is met if the Commission recognizes that the data recipient's country's laws provide an adequate level of data protection. If the Commission does not recognize the country as providing adequate protection: The data recipient can include in its contract with the data exporter standard contractual clauses published by the Commission and approved or adopted under national law. The data recipient can comply with the Safe Harbor, a set of privacy principles (Safe Harbor Principles) and Frequently Asked Questions (FAQs) that the US Department of Commerce developed in collaboration with the Commission to meet the adequacy requirement. The Safe Harbor Principles address notice, choice, onward transfer, security, data integrity, access and enforcement. If the data transfer takes place between different entities from the same group of companies, the group may adopt binding corporate rules (BCRs) that allow it to meet the requirements of Directive 95/46/EC. For more information on transfer mechanisms, see Article, Solutions to the cross-border transfers of personal data from the EEA ( us.practicallaw.com/ ). As a country, the US does not meet the EU adequacy requirement. However, the Safe Harbor provides a mechanism for a US data importer that complies with the Safe Harbor framework to receive personal data from organizations located in the EEA. The Safe Harbor's onward transfer principle sets out the requirements for a service provider (or other third party) to receive personal data that originated in the EU from a US entity that has certified to the Safe Harbor (see Onward Transfers under the Safe Harbor).
2 For more information on Directive 95/46/EC, see Practice Note, Overview of EU data protection regime ( For more information on US privacy and data security law, see Practice Note, US Privacy and Data Security Law: Overview ( us.practicallaw.com/ ). To certify to the Safe Harbor, an organization must: Conform its relevant personal data practices to the Safe Harbor framework. File a self-certification form with the Department of Commerce. Publish a Safe Harbor privacy policy that states how the organization complies with the Safe Harbor. An organization must also annually verify and recertify its compliance with the Safe Harbor Principles. The US Department of Commerce's International Trade Administration (ITA) provides information on the Safe Harbor, including requirements for certification, on its website. For a model Safe Harbor privacy policy, see Standard Document, Safe harbor policy ( ONWARD TRANSFERS UNDER THE SAFE HARBOR After EU personal data are transferred to a Safe Harbor-certified US entity, further transfers from the importer to a third party (onward transfers) are subject to restrictions under the Safe Harbor. With limited exceptions, under the Safe Harbor a certified entity generally may disclose the personal data to a third party only under the following circumstances: The third party is acting as the certified entity's agent (that is, performing tasks on behalf of and under the instructions of the entity) and: 2 subscribes to the Safe Harbor Principles; is itself subject to Directive 95/46/EC; or enters into a written agreement requiring it to provide at least the level of protection required by the Safe Harbor Principles. If the third party is not the certified entity's agent, the data must be disclosed in accordance with the Safe Harbor's notice and choice principles. This means the certified entity may transfer personal data only if the affected data subjects have been: notified about the types of third parties to whom the data may be disclosed; and given the opportunity to opt out of those disclosures. Disclosing personal data in accordance with the Safe Harbor s notice and choice principles can be difficult to implement in cases where the Safe Harbor-certified entity does not have a direct contractual relationship with the affected data subjects. US ENFORCEMENT OF THE SAFE HARBOR Onward transfers under the Safe Harbor are subject to US law and Federal Trade Commission (FTC) oversight. However, an EU data protection authority (DPA) also can raise questions about compliance of an onward transfer made pursuant to the Safe Harbor, including: Questions of procedural compliance (for example, evidence of Safe Harbor certification). Questions of substantive compliance with the obligations imposed on the data exporter under local law (for example, entering into data processing agreements with processors). The Safe Harbor's enforcement framework arguably is sufficient to correct any non-compliance without resort to enforcement action by EU DPAs. The Safe Harbor's enforcement principle sets out an escalation procedure that encourages individuals first to address their complaints directly with the Safe Harbor-certified organization itself. These complaints typically are directed to the organization's chief privacy officer. If the organization does not sufficiently address the complaint, individuals may then seek to have them addressed by a third-party dispute resolution body, such as the American Arbitration Association. The dispute resolution body: Is selected by the Safe Harbor-certified organization. May order a range of remedies and sanctions for an organization's failure to comply with the Safe Harbor, including: publicity for findings of non-compliance; requiring the organization to delete data in certain circumstances; suspending certification and removing a privacy seal; monetary compensation to individuals for losses incurred as a result of the non-compliance; and injunctive orders. Some privacy advocates have expressed concerns that this process can be prohibitively expensive for individuals. If the organization fails to comply with the dispute resolution body's ruling, the FTC may take action. The FTC is responsible for determining whether any alleged non-compliance constitutes an unfair or deceptive act or practice under Section 5 of the Federal Trade Commission Act ( (FTC Act). If the FTC concludes that it has reason to believe Section 5 has been violated, it may seek an administrative cease and desist order prohibiting the challenged practice or file a complaint in a federal district court seeking a federal court order to the same effect. If an administrative order is violated, the FTC may seek civil monetary penalties. For information about FTC regulation of privacy and data security under the FTC Act, see Practice Note, US Privacy and Data Security Law: Overview: Federal Trade Commission Act (FTC Act) ( The FTC has brought a number of enforcement actions asserting violations of Safe Harbor commitments, including high-profile actions against MySpace LLC, Facebook, Inc. and Google, Inc. Despite this, many in the EU have expressed concern about whether the Safe Harbor's self-certification procedure is adequate. One 2013 study indicated that 427 organizations claimed on their websites to be members of the Safe Harbor when they were not current members. Although the study intended to use this finding to discredit the Safe Harbor, the false assertions of these organizations did not, in fact, constitute a violation of the Safe Harbor (though they may constitute a deceptive trade practice in violation of Section 5 of the FTC Act). The 2013 study also indicated that more than 30% of Safe-Harborcertified organizations did not identify an independent dispute resolution process for individuals. This too does not constitute a substantive violation of the Safe Harbor, though it does serve to fuel the rhetoric regarding concerns about the framework's adequacy.
3 EU ATTACKS ON THE SAFE HARBOR For some time, EU DPAs and EU data exporters have expressed concern about third-party access to personal data transferred from the EU to the US under the Safe Harbor. EU criticism has intensified following disclosure of PRISM, the US government's surveillance program, which reportedly gave the National Security Agency access to personal data that was transferred to online service providers in the US under the Safe Harbor DÜSSELDORFER KREIS RESOLUTION The Düsseldorfer Kreis, a working group comprised of 16 German state DPAs that are responsible for the private sector, issued a resolution on April 29, 2010, requiring German data exporters to exercise additional diligence when transferring data to Safe Harbor-certified organizations. By requiring additional diligence, the resolution appeared to question the Commission s decision that Safe Harbor certification is sufficient to demonstrate an adequate level of protection for personal data. Specifically, the resolution prohibits German data exporters from relying exclusively on Safe Harbor certification to determine whether a US data importer provides an adequate level of protection. German data exporters must also verify whether the data importer complies with certain minimum Safe Harbor requirements by: Verifying that the organization s certification is still valid. Ensuring that the organization complies with the Safe Harbor's notice principle, by providing notice of the data processing to relevant individuals. Documenting its assessment of the organization's adequacy under the Safe Harbor in order to be able to provide proof, if requested, by a German DPA. The resolution recommends that a German data exporter: Use standard contractual clauses or BCRs to ensure adequate protection if it doubts the importer's Safe Harbor compliance following an assessment. Inform the appropriate DPA if: it determines that an organization's Safe Harbor certification is no longer valid; the organization does not provide required processing notice to individuals; or it discovers other violations of the Safe Harbor Principles during the assessment. A German data exporter may face sanctions if it fails to carry out the required assessment and transfers data to a US Safe Harbor-certified organization that does not meet the required standards. Consequently, the Safe Harbor does not present a simple solution for German data exporters in the private sector as they are required to conduct further due diligence checks prior to commencing any data transfers ARTICLE 29 WORKING PARTY OPINION ON CLOUD COMPUTING The Article 29 Working Party adopted an opinion on cloud computing on July 1, It concluded that EU data exporters cannot rely solely on Safe Harbor certification. According to the Working Party, to rely on Safe Harbor transfers to cloud vendors located in the US, a data exporter must obtain evidence of the US organization's: Self-certification. Compliance with the Safe Harbor, in particular with the notice principle. The July 2012 opinion states that "sole self-certification with Safe Harbor may not be deemed sufficient in the absence of robust enforcement of data protection principles in the cloud environment." It also emphasizes that the data exporter must enter into a data processing agreement with the cloud vendors regardless of the data transfer mechanism. RESPONSES TO PRISM AND OTHER LAW ENFORCEMENT ACCESS TO PERSONAL DATA In June 2013, there were reports of US and EU authorities intercepting and accessing the electronic communications of EU citizens on an extensive scale, in part, pursuant to the PRISM program. Following these reports, in July 2013 the European Parliament called on the Commission to review the Safe Harbor. The European Parliament: Claimed that the PRISM program and US law enforcement agencies' access to personal data originating from the EU are serious violations of the Safe Harbor Agreement. Invited the Commission to reverse or suspend the Safe Harbor adequacy decision. Further to her comments concerning the Commission plan to review the Safe Harbor, Vice-President Reding announced that the Commission would present a "solid assessment" of the Safe Harbor framework to ministers before the end of She referred to the revelations regarding the PRISM program as a "wake-up call" to which the EU's ongoing data protection reforms are "Europe's answer." 2013 Decision of the German DPAs On July 24, 2013, the Conference of the German Data Protection Commissioners at both the federal and state levels issued a press release stating that surveillance activities by foreign intelligence and security agencies threaten international data traffic between Germany and countries outside the EEA. In light of recent developments, the German Commissioners decided to: Stop issuing approvals for international data transfers until the German government demonstrates that unlimited access to German citizens' personal data by foreign national intelligence services complies with fundamental principles of data protection law (that is, necessity, proportionality and purpose limitation). Review whether to suspend data transfers carried out pursuant to the Safe Harbor. The press release stated that the Commission has always stressed that national supervisory authorities may suspend data transfers if there is a "high probability" that the Safe Harbor Principles are being violated. The German Commissioners: Asserted that national security and law enforcement exceptions to compliance with the Safe Harbor Principles should be applied narrowly and used only as necessary. 3
4 Suggested that the Commission issue an indefinite suspension of its decision concerning the Safe Harbor Decision of the Irish DPA In contrast with the German Commissioners, following the PRISM disclosures, the Irish Office of the Data Protection Commissioner (ODPC) did not call the Safe Harbor into question or impose additional compliance requirements on Irish data exporters transferring data to Safe Harbor-certified importers. In a letter of response to formal complaints, the ODPC stressed "that an Irishbased data controller has met their data protection obligations in relation to the transfer of personal data to the US if the US based entity is 'Safe Harbor' registered." The ODPC also emphasised that under the Safe Harbor, onward transfers are permitted for purposes of law enforcement. Commission's Proposed Data Protection Regulation On January 25, 2012, the Commission released proposed revisions to the EU data protection framework comprised of a General Data Protection Regulation (Regulation) and a Police and Criminal Justice Directive. Together they would repeal and replace Directive 95/46/ EC. The Regulation is currently being negotiated. The Regulation s final form and when it may be adopted are unclear. In particular, the European Parliament (Parliament) recently passed a vote on a compromise text that departs significantly from the Commission s original draft. If adopted, the Regulation would take direct effect in all 28 EU Member States and would significantly alter the current EU data protection framework. As initially proposed, notable changes include that: The Commission would be able to make adequacy findings about territories or processing sectors in a country outside the EU. Individual DPAs would be able to approve standard contractual clauses, in addition to the Commission-approved standard contractual clauses. BCRs would be formally recognized. Under Article 41(8) of the Regulation, adequacy decisions made under Articles 25(6) or 26(4) of Directive 95/46/EC, including the Safe Harbor, would remain in force unless amended, replaced or repealed by the Commission. Under the Parliament s compromise text, the Safe Harbor and other adequacy findings of the Commission would only remain in force for a period of five years after the adoption of the Regulation, unless amended, replaced or repealed by the Commission. The Parliament s compromise text also proposes an additional transfer basis in the form of "European Data Protection Seals", which would enable certified organizations to rely on privacy seals as an adequate basis for transfers outside of the EEA. Significantly, likely as a direct result of the PRISM revelations, the compromise text prohibits the disclosure of personal data as ordered by a court, tribunal or administrative authority of a country that is not deemed "adequate" by the Commission. Under this provision, if the US government were to request that a business (for example, a search engine, social network or cloud provider) disclose personal data processed in the EU, the business would be required to: Notify the DPA of the request without undue delay. Obtain the DPA s prior authorization for the transfer. In virtually every instance, this provision would prohibit organizations from complying with governmental orders (often subject to criminal penalties) to disclose personal data. Leaked unofficicial versions of the Council of the European Union s compromise proposals indicate that the Safe Harbor and other adequacy findings of the Commission would remain in force unless amended, replaced or repealed by the Commission, and similarly include additional adequacy bases for transfers on grounds of approved codes of conduct and certification mechanisms. REVERSAL OR SUSPENSION OF THE SAFE HARBOR UNLIKELY Following the PRISM disclosures, there has been considerable debate about the future of the Safe Harbor, and speculation that EU DPAs may no longer recognize it as a valid data transfer mechanism. Many have speculated that the Safe Harbor may be reversed or suspended, but those options are unlikely in practice. SUSPENSION OF SAFE HARBOR DATA TRANSFERS BY NATIONAL DPAS National DPAs have only limited authority to suspend data transfers based on the Safe Harbor. Article 3(1) of the Commission s Decision 2000/520/EC identifies only the following limited circumstances in which EU DPAs may suspend a data transfer to a Safe Harborcertified recipient: There is a pending FTC enforcement action against the Safe Harbor-certified organization. A substantial likelihood exists that the Safe Harbor Principles are being violated and: there is a reasonable basis for believing that the Safe Harbor enforcement mechanisms are not taking or will not take adequate timely steps; permitting the transfer to proceed would create imminent risk of grave harm; and the DPA has made reasonable efforts to liaise with the Safe Harbor-certified organization. Decision 2000/520/EC describes these circumstances as exceptional and states that any suspension of data flows must be "justified, notwithstanding the finding of adequate protection." Except where there is FTC enforcement action, the test described above sets a high bar. A national DPA's decision to suspend data transfers would be a serious step and one likely to cause significant controversy. To date, no DPA has done so, although the recent decision of the German federal and state DPAs comes close (see above, 2013 Decision of the German DPAs). 4
5 REVERSAL OR SUSPENSION OF SAFE HARBOR ADEQUACY DECISION While the European Parliament s July 2, 2013 motion invites the Commission to reverse or suspend the Safe Harbor, it is not clear that the Commission is empowered to do so under current circumstances where no DPA has suspended Safe Harbor data flows under Articles 3(1)-(3) of Decision 2000/520/EC. Under Article 3(4) of Decision 2000/520/EC, if a national DPA suspends a Safe Harbor data flow and provides evidence that the FTC is failing to ensure compliance with the Safe Harbor Principles, the European Commission: Must inform the Department of Commerce. May present draft measures aimed at reversing, suspending or limiting the scope of Decision 2000/520/EC. FINAL THOUGHTS Despite the rhetoric, it seems unlikely that the Safe Harbor will be suspended, and even less likely that the Commission's Decision 2000/520/EC on the Safe Harbor will be reversed. Any such action would cause considerable uncertainty and would disrupt existing business arrangements that fuel the global economy. In addition, talk of suspending or reversing the Safe Harbor to address law enforcement access to personal data is misplaced. These issues are not specific to the Safe Harbor. They also arise in the context of other data transfer mechanisms, such as adequacy decisions, model clauses and BCRs. Article 3(3) of Decision 2000/520/EC requires both the Commission and individual DPAs to inform each other of any instances where the FTC is failing to ensure compliance with the Safe Harbor Principles. Article 3(4) appears to authorize the Commission to take action only where a national DPA has first suspended Safe Harbor data flows. DEPARTMENT OF COMMERCE RESPONSE The Department of Commerce has repeatedly asserted the importance of the Safe Harbor. Notwithstanding the resolution of the Düsseldorfer Kreis and the opinion of the Working Party, in April 2013 the Department of Commerce's International Trade Administration (ITA) issued a guidance document where it confirmed the Safe Harbor as a legitimate transfer mechanism for cloud vendors on the basis that cloud computing does not represent any unique issues for Safe Harbor. The ITA concluded that "[t]he existing Safe Harbor Privacy Principles are comprehensive and flexible enough to address the issues raised by the cloud computing model..." Former US Secretary of Commerce Cameron Kerry has emphasized the value of the Safe Harbor framework for both the EU and the US. In a 2012 editorial, Mr. Kerry wrote that "[t]he value of this mechanism cannot be overstated." He explained that, "[t]he US and EU privacy regimes differ because their legal systems and political structures are distinct, but our values are similar." He continued that [t]he US and the EU ultimately share the same goals - to protect privacy and facilitate trade and economic growth." In a Department of Commerce data privacy seminar in March 2013, Mr. Kerry once again noted the importance of the Safe Harbor in strengthening the relationship between the US and the EU. Mr. Kerry maintained his support for the Safe Harbor in the face of EU criticism after the PRISM disclosures. In his final speech as Secretary of Commerce in August 2013, Mr. Kerry warned that preventing the sharing of data between the EU and the US "would cause significant and immediate economic damage." ABOUT PRACTICAL LAW Practical Law provides legal know-how that gives lawyers a better starting point. Our expert team of attorney editors creates and maintains thousands of up-to-date, practical resources across all major practice areas. We go beyond primary law and traditional legal research to give you the resources needed to practice more efficiently, improve client service and add more value. If you are not currently a subscriber, we invite you to take a trial of our online services at practicallaw.com. For more information or to schedule training, call or [email protected] Use of Practical Law websites and services is subject to the Terms of Use ( and Privacy Policy ( 5
EU- US NGO Letter on 1 To Secretary Pritzker
November 13, 2015 Secretary Penny Pritzker U.S. Department of Commerce 1401 Constitution Ave., NW Washington, D.C. 20230 Commissioner Věra Jourová Justice, Consumers and Gender Equality European Commission
AIRBUS GROUP BINDING CORPORATE RULES
1 AIRBUS GROUP BINDING CORPORATE RULES 2 Introduction The Binding Corporate Rules (hereinafter BCRs ) of the Airbus Group finalize the Airbus Group s provisions on the protection of Personal Data. These
Safe Harbour Agreement no longer a valid basis for EEA to US transfers of personal data
Jisc Safe Harbour NOTE ON THE COURT OF JUSTICE OF THE EUROPEAN UNION'S JUDGMENT ON 'SAFE HARBOUR' ARRANGEMENTS FOR THE TRANSFER OF PERSONAL DATA FROM THE EEA TO THE USA KEY POINTS Safe Harbour Agreement
The reform of the EU Data Protection framework - Building trust in a digital and global world. 9/10 October 2012
The reform of the EU Data Protection framework - Building trust in a digital and global world 9/10 October 2012 Questionnaire addressed to national Parliaments Please, find attached a number of questions
AlixPartners, LLP. General Data Protection Statement
AlixPartners, LLP General Data Protection Statement GENERAL DATA PROTECTION STATEMENT 1. INTRODUCTION 1.1 AlixPartners, LLP ( AlixPartners ) is committed to fulfilling its obligations under the data protection
HIPAA Privacy and Security Changes in the American Recovery and Reinvestment Act
International Life Sciences Arbitration Health Industry Alert If you have questions or would like additional information on the material covered in this Alert, please contact the author: Brad M. Rostolsky
EU Data Protection Directive and U.S. Safe Harbor Framework: An Employer Update. By Stephen H. LaCount, Esq.
EU Data Protection Directive and U.S. Safe Harbor Framework: An Employer Update By Stephen H. LaCount, Esq. Overview The European Union Data Protection Directive 95/46/EC ( Directive ) went effective in
Processor Binding Corporate Rules (BCRs), for intra-group transfers of personal data to non EEA countries
Processor Binding Corporate Rules (BCRs), for intra-group transfers of personal data to non EEA countries Sopra HR Software as a Data Processor Sopra HR Software, 2014 / Ref. : 20141120-101114-m 1/32 1.
FRANCE. Chapter XX OVERVIEW
Chapter XX FRANCE Merav Griguer 1 I OVERVIEW France has an omnibus privacy, data protection and cybersecurity framework law. As a member of the European Union, France has implemented the EU Data Protection
Briefly summarised, SURFmarket has submitted the following questions to the Dutch DPA:
UNOFFICIAL TRANSLATION Written opinion on the application of the Wet bescherming persoonsgegevens [Dutch Data Protection Act] in the case of a contract for cloud computing services from an American provider
NEW YORK CITY FALSE CLAIMS ACT Administrative Code 7-801 through 7-810 *
NEW YORK CITY FALSE CLAIMS ACT Administrative Code 7-801 through 7-810 * 7-801. Short title. This chapter shall be known as the "New York city false claims act." 7-802. Definitions. For purposes of this
By Ross C. D Emanuele, John T. Soshnik, and Kari Bomash, Dorsey & Whitney LLP Minneapolis, MN
Major Changes to HIPAA Security and Privacy Rules Enacted in Economic Stimulus Package By Ross C. D Emanuele, John T. Soshnik, and Kari Bomash, Dorsey & Whitney LLP Minneapolis, MN The HITECH Act is the
GSK Public policy positions
Safeguarding Personally Identifiable Information A Summary of GSK s Binding Corporate Rules The Issue The processing of Personally Identifiable Information (PII) 1 and Sensitive Personally Identifiable
OVERVIEW. stakeholder engagement mechanisms and WP29 consultation mechanisms respectively.
Joint work between experts from the Article 29 Working Party and from APEC Economies, on a referential for requirements for Binding Corporate Rules submitted to national Data Protection Authorities in
Data Processing Agreement for Oracle Cloud Services
Data Processing Agreement for Oracle Cloud Services Version December 1, 2013 1. Scope and order of precedence This is an agreement concerning the Processing of Personal Data as part of Oracle s Cloud Services
Align Technology. Data Protection Binding Corporate Rules Processor Policy. 2014 Align Technology, Inc. All rights reserved.
Align Technology Data Protection Binding Corporate Rules Processor Policy Confidential Contents INTRODUCTION TO THIS POLICY 3 PART I: BACKGROUND AND ACTIONS 4 PART II: PROCESSOR OBLIGATIONS 6 PART III:
Listing and Admission to Trading Rules for. Short Term Paper. Release 2
Listing and Admission to Trading Rules for Short Term Paper Release 2 14 April 2014 Scope These Listing and Admission to Trading Rules ( Rules ) relate to the Listing and admission to trading on the Main
AN INTRODUCTION TO THE EU DIRECTIVE ON THE PROTECTION OF PERSONAL DATA
AN INTRODUCTION TO THE EU DIRECTIVE ON THE PROTECTION OF PERSONAL DATA By Peter K. Yu Introduction The Internet and new communications technologies have made shopping more convenient than ever. Online
Data Protection, Software Licenses and other Legal Issues in the Cloud
Data Protection, Software Licenses and other Legal Issues in the Cloud Dr. Hendrik Schöttle Rechtsanwalt, Fachanwalt für IT-Recht OSDC 2012, Nuremberg 26. April 2012 Overview Introduction Data Protection
Financial Services Act 2010
Financial Services Act 2010 CHAPTER 28 CONTENTS Objectives of FSA etc 1 Financial stability objective 2 Enhancing public understanding of financial matters etc 3 Meeting FSA s regulatory objectives Remuneration
The potential legal consequences of a personal data breach
The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.
Texas Security Freeze Law
Texas Security Freeze Law BUSINESS & COMMERCE CODE CHAPTER 20. REGULATION OF CONSUMER CREDIT REPORTING AGENCIES 20.01. DEFINITIONS. In this chapter: (1) "Adverse action" includes: (A) the denial of, increase
COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL. Rebuilding Trust in EU-US Data Flows
EUROPEAN COMMISSION Brussels, 27.11.2013 COM(2013) 846 final COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL Rebuilding Trust in EU-US Data Flows EN EN 1. INTRODUCTION: THE
OUTSOURCING, HOSTING AND DATA PRIVACY ISSUES
OUTSOURCING, HOSTING AND DATA PRIVACY ISSUES 4 April 2013 James Castro-Edwards Solicitor Monica Salgado Advogada / Portuguese Lawyer OUR TEAM Speechly Bircham is an ambitious, full-service law firm with
NEW STATUTORY DISMISSAL, DISCIPLINARY AND GRIEVANCE PROCEDURES
September 2004 NEW STATUTORY DISMISSAL, DISCIPLINARY AND GRIEVANCE PROCEDURES With effect from 1 October 2004, new statutory dismissal and disciplinary procedures ("DDP") and grievance procedures ("GP")
Accountability: Data Governance for the Evolving Digital Marketplace 1
Accountability: Data Governance for the Evolving Digital Marketplace 1 1 For the past three years, the Centre for Information Policy Leadership at Hunton & Williams LLP has served as secretariat for the
Technical Help Desk Terms of Service
Technical Help Desk Terms of Service This esecuritel Technical Help Desk Terms of Service (the Agreement ) is provided in connection with the eligible tablet enrolled in either the Advanced Protection
SENATE... No. 2299. The Commonwealth of Massachusetts. In the Year Two Thousand Fourteen
SENATE.............. No. 2299 The Commonwealth of Massachusetts In the Year Two Thousand Fourteen SENATE, Wednesday, July 23, 2014 The committee on Ways and Means, to whom was referred the Senate Bill
technical factsheet 176
technical factsheet 176 Data Protection CONTENTS 1. Introduction 1 2. Register with the Information Commissioner s Office 1 3. Period protection rights and duties remain effective 2 4. The data protection
The Role and Function of a Data Protection Officer in the European Commission s Proposed General Data Protection Regulation. Initial Discussion Paper
The Role and Function of a Data Protection Officer in the European Commission s Proposed General Data Protection Regulation 1. Introduction Initial Discussion Paper The data protection officer ( DPO )
29 October 2015 Conference of the Independent Data Protection Authorities of the Federation and the Federal States
29 October 2015 Conference of the Independent Data Protection Authorities of the Federation and the Federal States Key data protection points for the trilogue on the data protection directive in the field
FACEBOOK STATEMENT RICHARD ALLAN NOVEMBER 11, 2013. My name is Richard Allan, and I am the Director of Public Policy
FACEBOOK STATEMENT RICHARD ALLAN NOVEMBER 11, 2013 [I. INTRODUCTION] My name is Richard Allan, and I am the Director of Public Policy for Facebook in Europe, the Middle East and Africa. I have been with
Corporate Policy. Data Protection for Data of Customers & Partners.
Corporate Policy. Data Protection for Data of Customers & Partners. 02 Preamble Ladies and gentlemen, Dear employees, The electronic processing of virtually all sales procedures, globalization and growing
Data Protection in Clinical Studies Implications of the New EU General Data Protection Regulation
June 19, 2012 Practice Group(s): Health Care Life Sciences Data Protection in Clinical Studies Implications of the New EU General Data Protection Regulation By Mathias Schulze Steinen and Daniela Bohn
IC 24-4.5-7 Chapter 7. Small Loans
IC 24-4.5-7 Chapter 7. Small Loans IC 24-4.5-7-101 Citation Sec. 101. This chapter shall be known and may be cited as Uniform Consumer Credit Code Small Loans. As added by P.L.38-2002, SEC.1. IC 24-4.5-7-102
EXPLANATORY MEMORANDUM TO THE DATA RETENTION (EC DIRECTIVE) REGULATIONS 2007. 2007 No. 2199
EXPLANATORY MEMORANDUM TO THE DATA RETENTION (EC DIRECTIVE) REGULATIONS 2007 2007 No. 2199 1. This explanatory memorandum has been prepared by the Home Office and is laid before Parliament by Command of
COMMISSION IMPLEMENTING DECISION. of XXX
EUROPEAN COMMISSION Brussels, XXX [ ](2016) XXX draft COMMISSION IMPLEMTING DECISION of XXX pursuant to Directive 95/46/EC of the European Parliament and of the Council on the adequacy of the protection
Factsheet on the Right to be
101010 100101 1010 101 Factsheet on the Right to be 100 Forgotten ruling (C-131/12) 101 101 1) What is the case about and what did 100 the Court rule? 10 In 2010 a Spanish citizen lodged a complaint against
BILL ANALYSIS. C.S.S.B. 1309 By: Wentworth Civil Practices Committee Report (Substituted) BACKGROUND AND PURPOSE
BILL ANALYSIS C.S.S.B. 1309 By: Wentworth Civil Practices Committee Report (Substituted) BACKGROUND AND PURPOSE C.S.S.B. 1309 gives the State of Texas civil remedies to be invoked by the attorney general
ACT on Payment Services 1 ) 2 ) of 19 August 2011. Part 1 General Provisions
ACT on Payment Services 1 ) 2 ) of 19 August 2011 Part 1 General Provisions Article 1. This Act sets out rules for the provision of payment services, including: 1) the conditions for provision of payment
Sub. H.B. 9 * 126th General Assembly (As Reported by H. Civil and Commercial Law)
Aida S. Montano Bill Analysis Legislative Service Commission Sub. H.B. 9 * 126th General Assembly (As Reported by H. Civil and Commercial Law) Reps. Oelslager, Flowers, Buehrer, White, Trakas BILL SUMMARY
South East Asia: Data Protection Update
Data Privacy and Security Team To: Our Clients and Friends September 2013 South East Asia: Data Protection Update Europe has had data protection laws in place for over a decade. Such laws regulate how
Minnesota False Claims Act
Minnesota False Claims Act (Minn. Stat. 15C.01 to.16) i 15C.01 DEFINITIONS Subdivision 1. Scope. --For purposes of this chapter, the terms in this section have the meanings given them. Subd. 2. Claim.
Overview. Data protection in a swirl of change 28.03.2014. Cloud computing. Software as a service. Infrastructure as a service. Platform as a service
Data protection in a swirl of change Overview 1 Data protection issues in cloud computing 2 Consent for mobile applications Security Seminar 2014: Privacy Radboud University Nijmegen 3 The WhatsApp case
Data Protection and Cloud Computing: an Overview of the Legal Issues
Data Protection and Cloud Computing: an Overview of the Legal Issues Christopher Kuner Partner, Hunton & Williams, Brussels Research Assistant, University of Copenhagen Nordic IT Law Conference Copenhagen,
COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS
EUROPEAN COMMISSION Brussels, XXX [ ](2011) XXX draft COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS
Title 5: ADMINISTRATIVE PROCEDURES AND SERVICES
Title 5: ADMINISTRATIVE PROCEDURES AND SERVICES Chapter 337-A: PROTECTION FROM HARASSMENT Table of Contents Part 12. HUMAN RIGHTS... Section 4651. DEFINITIONS... 3 Section 4652. FILING OF COMPLAINT; JURISDICTION...
[Brought into force by appointed day notice on 16 th June 2003.]
[Brought into force by appointed day notice on 16 th June 2003.] AN ACT TO PROVIDE FOR THE LEGAL RECOGNITION OF ELECTRONIC WRITING, ELECTRONIC CONTRACTS, ELECTRONIC SIGNATURES AND ORIGINAL INFORMATION
CALIFORNIA FALSE CLAIMS ACT GOVERNMENT CODE SECTION 12650-12656
CALIFORNIA FALSE CLAIMS ACT GOVERNMENT CODE SECTION 12650-12656 12650. (a) This article shall be known and may be cited as the False Claims Act. (b) For purposes of this article: (1) "Claim" includes any
Data Protection Policy.
Data Protection Policy. Data Protection Policy Foreword 2 Foreword Ladies and Gentlemen, In the information age, we offer customers the means to be always connected, even in their cars. This requires data
Witness Protection Act 1995 No 87
New South Wales Witness Protection Act 1995 No 87 Status information Currency of version Current version for 5 October 2012 to date (generated 10 October 2012 at 19:15). Legislation on the NSW legislation
Cloud computing and personal data protection. Gwendal LE GRAND Director of technology and innovation CNIL
Cloud computing and personal data protection Gwendal LE GRAND Director of technology and innovation CNIL 1 Data protection in Europe Directive 95/46/EC Loi 78-17 du 6 janvier 1978 amended in 2004 (France)
Right to Financial Privacy Act
Background The Right to Financial Privacy Act of 1978 was enacted to provide the financial records of financial institution customers a reasonable amount of privacy from federal government scrutiny. The
Tilburg University. U.S. Subpoenas and European data protection legislation Moerel, Lokke; Jansen, Nani; Koëter, Jeroen
Tilburg University U.S. Subpoenas and European data protection legislation Moerel, Lokke; Jansen, Nani; Koëter, Jeroen Published in: International Data Privacy Law Document version: Preprint (usually an
Legislative Language
Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking
2015 No. 0000 FINANCIAL SERVICES AND MARKETS. The Small and Medium Sized Business (Finance Platforms) Regulations 2015
Draft Regulations to illustrate the Treasury s current intention as to the exercise of powers under clause 5 of the Small Business, Enterprise and Employment Bill. D R A F T S T A T U T O R Y I N S T R
Context. To cloud or not to cloud, that is a very serious question. Legal challenges in a post Safe Harbour and pre GDPR cloud world
To cloud or not to cloud, that is a very serious question EEMA / TrustCore Legal challenges in a post Safe Harbour and pre GDPR cloud world 18 November 2015 [email protected] Context Major cloud providers
FIRST DATA CORPORATION PROCESSOR DATA PROTECTION STANDARDS
FIRST DATA CORPORATION PROCESSOR DATA PROTECTION STANDARDS As a world leader in electronic commerce and payment services, First Data Corporation and its subsidiaries ( First Data entity or entities ),
Electronic Commerce ELECTRONIC COMMERCE ACT 2001. Act. No. 2001-07 Commencement LN. 2001/013 22.3.2001 Assent 14.3.2001
ELECTRONIC COMMERCE ACT 2001 Principal Act Act. No. Commencement LN. 2001/013 22.3.2001 Assent 14.3.2001 Amending enactments Relevant current provisions Commencement date 2001/018 Corrigendum 22.3.2001
(unofficial English translation)
REGULATION ON PREVENTION OF MONEY LAUNDERING AND FINANCING OF TERRORISM FOR MONEY TRANSFER BUSINESSES AND MONEY CHANGING BUSINESSES (unofficial English translation) REGULATION ON PREVENTION OF MONEY LAUNDERING
what your business needs to do about the new HIPAA rules
what your business needs to do about the new HIPAA rules Whether you are an employer that provides health insurance for your employees, a business in the growing health care industry, or a hospital or
DÁIL ÉIREANN. [No. 78a of 2014] [27 January, 2015]
DÁIL ÉIREANN AN BILLE FÁ GHLÉASANNA ÉIREANNACHA UM CHOMHBHAINISTIÚ SÓCMHAINNÍ, 2014 IRISH COLLECTIVE ASSET-MANAGEMENT VEHICLES BILL 2014 LEASUITHE TUARASCÁLA REPORT AMENDMENTS [No. 78a of 2014] [27 January,
Assembly Bill No. 5 CHAPTER 5
Assembly Bill No. 5 CHAPTER 5 An act to amend Sections 2016.020, 2031.010, 2031.020, 2031.030, 2031.040, 2031.050, 2031.060, 2031.210, 2031.220, 2031.230, 2031.240, 2031.250, 2031.260, 2031.270, 2031.280,
POLICY ON COMPLIANCE INCENTIVES FOR MUNICIPALITIES
POLICY ON COMPLIANCE INCENTIVES FOR MUNICIPALITIES (MUNICIPAL POLICY) POLICY ENF-97.003 I. INTRODUCTION A. PURPOSE AND INTENT This policy sets forth how the Department of Environmental Protection (DEP)
TABLE OF CONTENTS. Maintaining the Quality and Integrity of Information. Notification of an Information Security Incident
AGREEMENT BETWEEN THE UNITED STATES OF AMERICA AND THE EUROPEAN UNION ON THE PROTECTION OF PERSONAL INFORMATION RELATING TO THE PREVENTION, INVESTIGATION, DETECTION, AND PROSECUTION OF CRIMINAL OFFENSES
HP0868, LD 1187, item 1, 123rd Maine State Legislature An Act To Recoup Health Care Funds through the Maine False Claims Act
PLEASE NOTE: Legislative Information cannot perform research, provide legal advice, or interpret Maine law. For legal assistance, please contact a qualified attorney. Be it enacted by the People of the
The eighth data protection principle and international data transfers
Data Protection Act 1998 The eighth data protection principle and international data transfers The Information Commissioner s recommended approach to assessing adequacy including consideration of the issue
Terms and Conditions for Tax Services
Terms and Conditions for Tax Services In the course of delivering services relating to tax return preparation, tax advisory, and assistance in tax controversy matters, Brady, Martz & Associates, P.C. (we
Subtitle B Increasing Regulatory Enforcement and Remedies
H. R. 4173 466 activities and evaluates the effectiveness of the Ombudsman during the preceding year. The Investor Advocate shall include the reports required under this section in the reports required
The Business Enterprise Registration Act
Please note: The text below is a translation of the original Norwegian Act. Should any doubt arise, the Norwegian text of the Act is valid and binding. The Business Enterprise Registration Act Latest update:
TEXAS UNFAIR CLAIMS STATUTES AND REGULATIONS
TEXAS UNFAIR CLAIMS STATUTES AND REGULATIONS 541.060. UNFAIR SETTLEMENT PRACTICES. (a) It is an unfair method of competition or an unfair or deceptive act or practice in the business of insurance to engage
Whither Safe Harbor? While the United States has enacted several privacy laws to protect individuals personal data, more enforcement is necessary.
ELECTRONIC DISCOVERY US/EU Data Protection Conflicts Whither Safe Harbor? By Nicole B. Boehler and Gretchen A. Ramos While the United States has enacted several privacy laws to protect individuals personal
SAN FRANCISCO ADMINISTRATIVE CODE CHAPTER 96: COORDINATION BETWEEN THE POLICE DEPARTMENT AND THE OFFICE OF CITIZEN COMPLAINTS
SAN FRANCISCO ADMINISTRATIVE CODE CHAPTER 96: COORDINATION BETWEEN THE POLICE DEPARTMENT AND THE OFFICE OF CITIZEN COMPLAINTS SEC. 96.1. DEFINITIONS. (a) "Chief of Police" shall mean the Chief of the Police
Patents in Europe 2013/2014
In association with Unitary patent and Unified Patent Court: the proposed framework Rainer K Kuhnen Patents in Europe 2013/2014 Helping business compete in the global economy Unitary patent and Unified
By using the Cloud Service, Customer agrees to be bound by this Agreement. If you do not agree to this Agreement, do not use the Cloud Service.
1/9 CLOUD SERVICE AGREEMENT (hereinafter Agreement ) 1. THIS AGREEMENT This Cloud Service Agreement ("Agreement") is a binding legal document between Deveo and you, which explains your rights and obligations
Construction Defect Action Reform Act
COLORADO REVISED STATUTES Title 13. Courts and Court Procedure Damages Regulation of Actions and Proceedings Article 20. Actions Part 8. Construction Defect Actions for Property Loss and Damage Construction
The Anti-Corruption Compliance Platform
The Anti-Corruption Compliance Platform DATA COLLECTION RISK IDENTIFICATION SCREENING INTEGRITY DUE DILIGENCE CERTIFICATIONS GIFTS, TRAVEL AND ENTERTAINMENT TRACKING SECURITY AND DATA PROTECTION The ComplianceDesktop
BILL ANALYSIS. Senate Research Center C.S.S.B. 1309 By: Wentworth Jurisprudence 4/5/2007 Committee Report (Substituted)
BILL ANALYSIS Senate Research Center C.S.S.B. 1309 By: Wentworth Jurisprudence 4/5/2007 Committee Report (Substituted) AUTHOR'S / SPONSOR'S STATEMENT OF INTENT C.S.S.B. 1309 gives the State of Texas civil
Biller is the person or entity to which you wish a bill payment to be directed or from which you receive electronic bills, as the case may be.
SERVICE DEFINITIONS Service means the Bill Payment Service offered by Edward Jones through Fiserv, Inc.. Agreement means the Terms and Conditions of the bill payment service. Biller is the person or entity
Privacy Policy documents for
Privacy Policy documents for Praendex Incorporated doing business as PI Worldwide Product User Privacy Policy - For Customers, as well as those invited to our websites to complete a PI Survey or SSAT General
MINNESOTA FALSE CLAIMS ACT. Subdivision 1. Scope. --For purposes of this chapter, the terms in this section have the meanings given them.
As amended by Chapter 16 of the 2013 Minnesota Session Laws. 15C.01 DEFINITIONS MINNESOTA FALSE CLAIMS ACT Subdivision 1. Scope. --For purposes of this chapter, the terms in this section have the meanings
