This handbook on European data protection law is jointly prepared by the European Union Agency for Fundamental Rights (FRA) and the Council of Europe together with the Registry of the European Court of Human Rights. It is the third in a series of legal handbooks jointly prepared by FRA and the Council of Europe. In March 2011, a first handbook was published on European non-discrimination law and, in June 2013, a second one on European law relating to asylum, borders and immigration.
This handbook on European data protection law is jointly prepared by the European Union Agency for Fundamental Rights (FRA) and the Council of Europe together with the Registry of the European Court of Human Rights. It is the third in a series of legal handbooks jointly prepared by FRA and the Council of Europe. In March 2011, a first handbook was published on European non-discrimination law and, in June 2013, a second one on European law relating to asylum, borders and immigration.
HANDBOOK European Union Agency for Fundamental Rights, 2014 Council of Europe, 2014 The manuscript for this Handbook was completed in April 2014. Updates will become available in future on the FRA website at: fra.europa.eu, the Council of Europe website at coe.int/dataprotection, and on the European Court of Human Rights website under the Case-Law menu at: echr.coe.int. Reproduction is authorised, except for commercial purposes, provided the source is acknowledged. Europe Direct is a service to help you nd answers to your questions about the European Union Freephone number (*): 00 800 6 7 8 9 10 11 (*) The information given is free, as are most calls (though some operators, phone boxes or hotels may charge you). Photo credit (cover & inside): iStockphoto More information on the European Union is available on the Internet (http://europa.eu). Cataloguing data can be found at the end of this publication. Luxembourg: Publications Ofce of the European Union, 2014 ISBN 978-92-871-9934-8 (CoE) ISBN 978-92-9239-461-5 (FRA) doi:10.2811/69915 Printed in Belgium Printed on process chlorine-free recycled paper (PCF) This handbook was drafted in English. The Council of Europe (CoE) and the European Court of Human Rights (ECtHR) take no responsibility for the quality of the translations into other languages. The views expressed in this handbook do not bind the CoE and the ECtHR. The handbook refers to a selection of commentaries and manuals. The CoE and ECtHR take no responsibility for their content, nor does their inclusion on this list amount to any form of endorsement of these publications. Further publications are listed on the Internet pages of the ECtHR library at: echr.coe.int. Handbook on European data protection law 3 Foreword This handbook on European data protection law is jointly prepared by the European Union Agency for Fundamental Rights (FRA) and the Council of Europe together with the Registry of the European Court of Human Rights. It is the third in a series of legal handbooks jointly prepared by FRA and the Council of Europe. In March2011, a rst handbook was published on European non-discrimination law and, in June 2013, a second one on European law relating to asylum, borders and immigration. We have decided to continue our cooperation on a highly topical subject which affects all of us every day, namely the protection of personal data. Europe enjoys one of the most protective systems in this sphere, which is based on Council of Europe Convention108, European Union (EU)instruments, as well as the case law of the European Court of Human Rights(ECtHR) and of the Court of Justice of the European Union (CJEU). The aim of this handbook is to raise awareness and improve knowledge of data pro- tection rules in European Union and Council of Europe member states by serving as the main point of reference to which readers can turn. It is designed for non-special- ist legal professionals, judges, national data protection authorities and other persons working in the eld of data protection. With the entry into force of the Treaty of Lisbon in December 2009, the Charter of Fundamental Rights of the EU became legally binding, and with this the right to the protection of personal data was elevated to the status of a separate fundamental right. A better understanding of Council of Europe Convention108 and EU instru- ments, which paved the way for data protection in Europe, as well as of the CJEU and ECtHR case law, is crucial for the protection of this fundamental right. We would like to thank the Ludwig Boltzmann Institute of Human Rights for its con- tribution in drafting this handbook. We would also like to express our gratitude to the European Data Protection Supervisors ofce for its feedback during the drafting phase. We thank in particular the data protection unit of the European Commission during the preparation of this handbook. Philippe Boillat Director General of Human Rights andRule of Law Council of Europe Morten Kjaerum Director of the European Union Agency for Fundamental Rights 5 Contents FOREWORD ........................................................................................................................................................................................................................... 3 ABBREVIATIONS AND ACRONYMS ......................................................................................................................................................... 9 HOW TO USE THIS HANDBOOK ................................................................................................................................................................ 11 1. CONTEXT AND BACKGROUND OFEUROPEAN DATA PROTECTIONLAW ................................. 13 1.1. The right to data protection ....................................................................................................................................... 14 Key points ............................................................................................................................................................................................................... 14 1.1.1. The European Convention on Human Rights .................................................................................... 14 1.1.2. Council of Europe Convention108 ............................................................................................................. 15 1.1.3. European Union data protection law ........................................................................................................ 17 1.2. Balancing rights ........................................................................................................................................................................ 21 Key point .................................................................................................................................................................................................................. 21 1.2.1. Freedom of expression ......................................................................................................................................... 22 1.2.2. Access to documents .............................................................................................................................................. 26 1.2.3. Freedom of the arts and sciences ............................................................................................................... 30 1.2.4. Protection of property ............................................................................................................................................ 31 2. DATA PROTECTION TERMINOLOGY ......................................................................................................................................... 35 2.1. Personal data ............................................................................................................................................................................... 36 Key points ............................................................................................................................................................................................................... 36 2.1.1. Main aspects of the concept of personal data ................................................................................ 36 2.1.2. Special categories of personal data ........................................................................................................... 43 2.1.3. Anonymised and pseudonymised data ................................................................................................ 44 2.2. Data processing ........................................................................................................................................................................ 46 Key points ............................................................................................................................................................................................................... 46 2.3. The users of personal data ......................................................................................................................................... 48 Key points ............................................................................................................................................................................................................... 48 2.3.1. Controllers and processors ................................................................................................................................. 49 2.3.2. Recipients and third parties ............................................................................................................................... 54 2.4. Consent ............................................................................................................................................................................................... 55 Key points ............................................................................................................................................................................................................... 55 2.4.1. The elements of valid consent ....................................................................................................................... 56 2.4.2. The right to withdraw consent at any time ....................................................................................... 60 6 3. THE KEY PRINCIPLES OFEUROPEAN DATA PROTECTION LAW ............................................................. 61 3.1. The principle of lawful processing ...................................................................................................................... 62 Key points ............................................................................................................................................................................................................... 62 3.1.1. The requirements for a justied interference under the ECHR ........................................ 63 3.1.2. The conditions for lawful limitations undertheEU Charter ................................................. 66 3.2. The principle of purpose specication and limitation ................................................................ 68 Key points ............................................................................................................................................................................................................... 68 3.3. Data quality principles ....................................................................................................................................................... 70 Key points ............................................................................................................................................................................................................... 70 3.3.1. The data relevancy principle ............................................................................................................................ 70 3.3.2. The data accuracy principle ............................................................................................................................... 71 3.3.3. The limited retention of data principle .................................................................................................... 72 3.4. The fair processing principle ...................................................................................................................................... 73 Key points ............................................................................................................................................................................................................... 73 3.4.1. Transparency .................................................................................................................................................................. 74 3.4.2. Establishing trust ......................................................................................................................................................... 74 3.5. The principle of accountability ................................................................................................................................ 75 Key points ............................................................................................................................................................................................................... 75 4. THE RULES OF EUROPEAN DATA PROTECTION LAW ......................................................................................... 79 4.1. Rules on lawful processing ......................................................................................................................................... 81 Key points ............................................................................................................................................................................................................... 81 4.1.1. Lawful processing of non-sensitive data ............................................................................................. 81 4.1.2. Lawful processing of sensitive data .......................................................................................................... 87 4.2. Rules on security of processing ............................................................................................................................ 90 Key points ............................................................................................................................................................................................................... 90 4.2.1. Elements of data security ................................................................................................................................... 90 4.2.2. Condentiality ................................................................................................................................................................ 93 4.3. Rules on transparency of processing ............................................................................................................. 95 Key points ............................................................................................................................................................................................................... 95 4.3.1. Information ....................................................................................................................................................................... 96 4.3.2. Notication ....................................................................................................................................................................... 98 4.4. Rules on promoting compliance .......................................................................................................................... 99 Key points ............................................................................................................................................................................................................... 99 4.4.1. Prior checking .............................................................................................................................................................100 4.4.2. Personal data protection ofcials .............................................................................................................100 4.4.3. Codes of conduct .....................................................................................................................................................101 5. THE DATA SUBJECTS RIGHTS AND THEIR ENFORCEMENT ..................................................................... 103 5.1. The rights of data subjects ...................................................................................................................................... 105 7 Key points ........................................................................................................................................................................................................... 105 5.1.1. Right of access ...........................................................................................................................................................105 5.1.2. Right to object ............................................................................................................................................................112 5.2. Independent supervision .......................................................................................................................................... 114 Key points ........................................................................................................................................................................................................... 114 5.3. Remedies and sanctions ........................................................................................................................................... 118 Key points ........................................................................................................................................................................................................... 118 5.3.1. Requests to the controller ...............................................................................................................................119 5.3.2. Claims lodged with the supervisory authority .............................................................................120 5.3.3. Claim lodged with a court ................................................................................................................................121 5.3.4. Sanctions .........................................................................................................................................................................126 6. TRANSBORDER DATA FLOWS .................................................................................................................................................... 129 6.1. Nature of transborder data ows ................................................................................................................... 130 Key points ........................................................................................................................................................................................................... 130 6.2. Free data ows between Member States or between ContractingParties ............................................................................................................................................................ 131 Key points ........................................................................................................................................................................................................... 131 6.3. Free data ows to third countries .................................................................................................................. 133 Key points ........................................................................................................................................................................................................... 133 6.3.1. Free data ow because of adequate protection ........................................................................133 6.3.2. Free data ow in specic cases .................................................................................................................135 6.4. Restricted data ows to third countries .................................................................................................. 136 Key points ........................................................................................................................................................................................................... 136 6.4.1. Contractual clauses ................................................................................................................................................137 6.4.2. Binding corporate rules ......................................................................................................................................138 6.4.3. Special international agreements .............................................................................................................139 7. DATA PROTECTION IN THE CONTEXT OF POLICE AND CRIMINAL JUSTICE ........................... 143 7.1. CoElaw on data protection in police andcriminal justice matters ......................... 144 Key points ........................................................................................................................................................................................................... 144 7.1.1. The police recommendation .........................................................................................................................144 7.1.2. The Budapest Convention on Cybercrime ........................................................................................148 7.2. EUlaw on data protection in police andcriminal matters ................................................ 149 Key points ........................................................................................................................................................................................................... 149 7.2.1. The Data Protection Framework Decision ........................................................................................149 7.2.2. More specic legal instruments on data protection in police and law- enforcement cross-border cooperation ..............................................................................................151 7.2.3. Data protection at Europol and Eurojust .............................................................................................153 7.2.4. Data protection in the joint information systems at EU level ..........................................156 8 8. OTHER SPECIFIC EUROPEAN DATA PROTECTION LAWS ............................................................................. 165 8.1. Electronic communications ..................................................................................................................................... 166 Key points ........................................................................................................................................................................................................... 166 8.2. Employment data .............................................................................................................................................................. 170 Key points ........................................................................................................................................................................................................... 170 8.3. Medical data ............................................................................................................................................................................. 173 Key point .............................................................................................................................................................................................................. 173 8.4. Data processing for statistical purposes ................................................................................................. 175 Key points ........................................................................................................................................................................................................... 175 8.5. Financial data ........................................................................................................................................................................... 178 Key points ........................................................................................................................................................................................................... 178 FURTHER READING ............................................................................................................................................................................................. 181 CASE LAW ....................................................................................................................................................................................................................... 187 Selected case law of the European Court ofHuman Rights .................................................................. 187 Selected case law oftheCourt of Justice oftheEuropean Union ................................................... 191 INDEX .................................................................................................................................................................................................................................... 193 9 Abbreviations and acronyms BCR Binding corporate rule CCTV Closed circuit television CETS Council of Europe Treaty Series Charter Charter of Fundamental Rights of the European Union CIS Customs information system CJEU Court of Justice of the European Union (prior to December 2009, it was called the European Court of Justice, ECJ) CoE Council of Europe Convention 108 Convention for the Protection of Individuals with regard to Auto- matic Processing of Personal Data (Council of Europe) CRM Customer relations management C-SIS Central Schengen Information System EAW European Arrest Warrant EC European Community ECHR European Convention on Human Rights ECtHR European Court of Human Rights EDPS European Data Protection Supervisor EEA European Economic Area EFTA European Free Trade Association ENISA European Network and Information Security Agency ENU Europol National Unit ESMA European Securities and Markets Authority eTEN Trans-European Telecommunication Networks EU European Union EuroPriSe European Privacy Seal eu-LISA EU Agency for Large-scale IT Systems 10 FRA European Union Agency for Fundamental Rights GPS Global positioning system JSB Joint Supervisory Body NGO Non-governmental organisation N-SIS National Schengen Information System OECD Organisation for Economic Co-operation and Development PIN Personal identication number PNR Passenger name record SEPA Single Euro Payments Area SIS Schengen Information System SWIFT Society for Worldwide Interbank Financial Telecommunication TEU Treaty on European Union TFEU Treaty on the Functioning of the European Union UDHR Universal Declaration of Human Rights UN United Nations VIS Visa Information System 11 How to use this handbook This handbook provides an overview of the law applicable to data protection in rela- tion to the European Union(EU) and the Council of Europe(CoE). The handbook is designed to assist legal practitioners who are not specialised in the eld of data protection; it is intended for lawyers, judges or other practition- ers as well as those working for other bodies, including non-governmental organi- sations(NGOs), who may be confronted with legal questions relating to data protection. It is a rst point of reference on both EUlaw and the European Convention on Human Rights(ECHR) on data protection, and it explains how this eld is regulated under EUlaw and under theECHR as well as the CoE Convention for the Protection of Indi- viduals with regard to Automatic Processing of Personal Data (Convention 108) and other CoEinstruments. Each chapter rst presents a single table of the applicable legal provisions, including important selected case law under the two separate Euro- pean legal systems. Then the relevant laws of these two European orders are pre- sented one after the other as they may apply to each topic. This allows the reader to see where the two legal systems converge and where they differ. The tables at the beginning of each chapter outline the topics dealt with in that chapter, naming the applicable legal provisions and other relevant material, such as jurisprudence. The order of the topics may differ slightly from the structure of the text within the chapter, if this is deemed favourable for the concise presentation of the chapters content. The tables cover both CoE and EUlaw. This should help the users to nd the key information relating to their situation, especially if they are sub- ject only to CoElaw. Practitioners in non-EUstates that are member states of the CoE and parties to theECHR and Convention108 can access the information relevant to their own country by going straight to the sections on the CoE. Practitioners in EUMem- ber States will need to use both sections, as these states are bound by both legal orders. For those who need more information on a particular issue, a list of refer- ences to more specialised material can be found in the Further reading section of the handbook. 12 Handbook on European data protection law CoElaw is presented through short references to selected European Court of Human Rights (ECtHR) cases. These have been chosen from the large number of ECtHR judg- ments and decisions that exist on data protection issues. EUlaw is found in legislative measures that have been adopted, in relevant provi- sions of the treaties and in the Charter of Fundamental Rights of the European Union, as interpreted in the case law of the Court of Justice of the European Union (CJEU, otherwise referred to, before 2009, as the European Court of Justice (ECJ)). The case law described or cited in this handbook provides examples of an important body of both ECtHR and CJEU case law. The guidelines at the end of this handbook are intended to assist the reader in searching for case law online. In addition, the practical illustrations with hypothetical scenarios are provided in textboxes on a blue background, to further illustrate the application of European data protection rules in practice, particularly where no specic case law of the ECtHR or the CJEU exists on the topic. Other textboxes, presented on a grey background, provide examples taken from sources other than case law, such as legislation. The handbook begins with a brief description of the role of the two legal systems as established by the ECHR and EUlaw (Chapter1). Chapters2 to 8 cover the following issues: data protection terminology; key principles of European data protection law; rules of European data protection law; data subjects rights and their enforcement; transborder data ow; data protection in the context of police and criminal justice; other specic European data protection laws. 13 EU Issues covered CoE The right to data protection Directive95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data (Data Protection Directive), OJ1995L281 ECHR, Article8 (right to respect for private and family life, home and correspondence) Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data (Convention108) Balancing rights CJEU, Joined cases C-92/09 and C-93/09, Volker und Markus Schecke GbR and Hartmut Eifert v. Land Hessen, 2010 In general CJEU, C-73/07, Tietosuojavaltuutettu v. Satakunnan Markkinaprssi Oy and Satamedia Oy, 2008 Freedom ofexpression ECtHR, Axel Springer AG v. Germany, 2012 ECtHR, Mosley v. the UnitedKingdom, 2011 Freedom of arts and sciences ECtHR, Vereinigung bildender Knstler v. Austria, 2007 CJEU, C-275/06, Productores de Msica de Espaa (Promusicae) v. Telefnica de Espaa SAU, 2008 Protection ofproperty CJEU, C-28/08P, European Commission v. The Bavarian Lager Co. Ltd, 2010 Access to documents ECtHR, Trsasg a Szabadsgjogokrt v. Hungary, 2009 Context and background ofEuropean data protectionlaw 1 Handbook on European data protection law 14 1.1. The right to data protection Key points Under Article 8 of the ECHR, a right to protection against the collection and use of personal data forms part of the right to respect for private and family life, home and correspondence. CoE Convention108 is the rst international legally binding instrument dealing explic- itly with data protection. Under EUlaw, data protection was regulated for the rst time by the Data Protection Directive. Under EUlaw, data protection has been acknowledged as a fundamental right. A right to protection of an individuals private sphere against intrusion from others, especially from the state, was laid down in an international legal instrument for the rst time in Article12 of the UnitedNations(UN)Universal Declaration of Human Rights(UDHR) of 1948 on respect for private and family life. 1 The UDHR inuenced the development of other human rights instruments in Europe. 1.1.1. The European Convention on Human Rights The Council of Europe was formed in the aftermath of the Second World War to bring together the states of Europe to promote the rule of law, democracy, human rights and social development. For this purpose, it adopted the European Convention on Human Rights(ECHR) in1950, which entered into force in1953. States have an international obligation to comply with the ECHR. All CoEmember states have now incorporated or given effect to the ECHR in their national law, which requires them to act in accordance with the provisions of the Convention. To ensure that the Contracting Parties observe their obligations under theECHR, theEuropeanCourtofHumanRights(ECtHR), was set up in Strasbourg, France, in1959. The ECtHR ensures that states observe their obligations under the Con- vention by considering complaints from individuals, groups of individuals, NGOs or legal persons alleging violations of the Convention. In2013, the Council of Europe comprised 47 member states, 28 of which are also EUMember States. An applicant 1 UnitedNations(UN), Universal Declaration of Human Rights (UDHR), 10December1948. Context and background ofEuropean data protectionlaw 15 before the ECtHR does not need to be a national of one of the member states. TheECtHR can also examine inter-state cases brought by one or more CoEmember states against another member state. The right to protection of personal data forms part of the rights protected under Arti- cle8 of the ECHR, which guarantees the right to respect for private and family life, home and correspondence and lays down the conditions under which restrictions of this right are permitted. 2
Throughout its jurisprudence the ECtHR has examined many situations in which the issue of data protection arose, not least those concerning interception of communication, 3 various forms of surveillance 4 and protection against storage of personal data by public authorities. 5 It has claried that Article8 of the ECHR not only obliged states to refrain from any actions which might violate this Convention right, but that they were in certain circumstances also under positive obligations to actively secure effective respect for private and family life. 6 Many of these cases will be referred to in detail in the appropriate chapters. 1.1.2. Council of Europe Convention108 With of the emergence of information technology in the 1960s, a growing need developed for more detailed rules to safeguard individuals by protecting their (per- sonal) data. By the mid-1970s, the Committee of Ministers of the Council of Europe adopted various resolutions on the protection of personal data, referring to Article8 of the ECHR. 7 In1981, a Convention for the protection of individuals with regard to the automatic processing of personal data (Convention108) 8 was opened for 2 CoE, European Convention on Human Rights, CETSNo.005,1950. 3 See, for example: ECtHR, Malone v. the UnitedKingdom, No.8691/79, 2August1984; ECtHR, Copland v. the UnitedKingdom, No.62617/00, 3April2007. 4 See, for example: ECtHR, Klass and Others v. Germany, No.5029/71, 6September1978; ECtHR, Uzun v. Germany, No.35623/05, 2September2010. 5 See, for example: ECtHR, Leander v. Sweden, No.9248/81, 26March1987; ECtHR, S. and Marper v. the UnitedKingdom, Nos.30562/04 and 30566/04, 4December2008. 6 See, for example: ECtHR, I. v. Finland, No.20511/03, 17July2008; ECtHR, K.U. v. Finland, No.2872/02, 2December2008. 7 CoE, Committee of Ministers (1973), Resolution(73)22 on the protection of the privacy of individuals vis--vis electronic data banks in the private sector, 26September1973; CoE, Committee of Ministers (1974), Resolution(74)29 on the protection of the privacy of individuals vis--vis electronic data banks in the public sector, 20September1974. 8 CoE, Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data, Council of Europe, CETSNo.108,1981. Handbook on European data protection law 16 signature. Convention108 was, and still remains, the only legally binding interna- tional instrument in the data protection eld. Convention108 applies to all data processing carried out by both the private and public sector, such as data processing by the judiciary and law enforcement authori- ties. It protects the individual against abuses, which may accompany the collection and processing of personal data, and seeks, at the same time, to regulate the trans- border ow of personal data. As regards the collection and processing of personal data, the principles laid down in the convention concern, in particular, fair and lawful collection and automatic processing of data, stored for specied legitimate purposes and not for use for ends incompatible with these purposes nor kept for longer than is necessary. They also concern the quality of the data, in particular that they must be adequate, relevant and not excessive (proportionality) as well as accurate. In addition to providing guarantees on the collection and processing of personal data, it outlaws, in the absence of proper legal safeguards, the processing of sensi- tive data, such as on a persons race, politics, health, religion, sexual life or criminal record. The convention also enshrines the individuals right to know that information is stored on him or her and, if necessary, to have it corrected. Restrictions on the rights laid down in the convention are possible only when overriding interests, such as state security or defence, are at stake. Although the convention provides for free ow of personal data between State Par- ties to the convention, it also imposes some restrictions on those ows to states where legal regulation does not provide equivalent protection. In order to further develop the general principles and rules laid down in Conven- tion108, several recommendations that are not legally binding have been adopted by the Committee of Ministers of the CoE (see Chapters7 and8). All EU Member States have ratied Convention108. In1999, Convention108 was amended to enable the EU to become a Party. 9 In2001, an Additional Protocol to Convention108 was adopted, introducing provisions on transborder data flows 9 CoE, Amendments to the Convention for the protection of individuals with regard to automatic processing of Personal Data (ETS No.108) allowing the European Communities to accede, adopted by the Committee of Ministers, in Strasbourg, on 15June1999; Art.23(2) of the Convention108 in its amended form. Context and background ofEuropean data protectionlaw 17 to non-parties, so-called third countries, and on the mandatory establishment of national data protection supervisory authorities. 10 Outlook Following a decision to modernise Convention108, a public consultation carried out in2011 made it possible to conrm the two main objectives of that work: reinforc- ing the protection of privacy in the digital area and strengthening the conventions follow-up mechanism. Convention108 is open for accession to non-member states of the CoE, including non-European countries. The Conventions potential as a universal standard and its open character could serve as a basis for promoting data protection at global level. So far, 45 of the 46 Contracting Parties to Convention108 are member states of the CoE. Uruguay, the rst non-European country, acceded in August2013 and Morocco, which has been invited to accede to Convention108 by the Committee of Ministers, is in the process of formalising accession. 1.1.3. European Union data protection law EUlaw is composed of treaties and secondary EUlaw. The treaties, namely the Treaty on European Union(TEU) and the Treaty on the Functioning of the European Union(TFEU), have been approved by all EU Member States and are also referred to as primary EUlaw. The regulations, directives and decisions of the EU have been adopted by the EU institutions that have been given such authority under the trea- ties; they are often referred to as secondary EUlaw. The principal EU legal instrument on data protection is Directive 95/46/EC of the European Parliament and the Council of 24October1995 on the protection of indi- viduals with regard to the processing of personal data and on the free movement of such data (Data Protection Directive). 11 It was adopted in1995, at a time when sev- eral Member States had already adopted national data protection laws. Free move- ment of goods, capital, services and people within the internal market required the 10 CoE, Additional Protocol to the Convention for the protection of individuals with regard to automatic processing of personal data, regarding supervisory authorities and transborder data ows, CETSNo.181,2001. 11 Data Protection Directive, OJ1995L281, p.31. Handbook on European data protection law 18 free ow of data, which could not be realised unless the Member States could rely on a uniform high level of data protection. As the aim of adopting the Data Protection Directive was harmonisation 12 of data protection law at the national level, the directive affords a degree of specificity comparable to that of the (then) existing national data protection laws. For the CJEU, Directive 95/46 is intended [] to ensure that the level of protection of the rights and freedoms of individuals with regard to the processing of personal data is equiv- alent in all Member States. [] The approximation of the national laws applicable in this area must not result in any lessening of the protection they afford but must, on the contrary, seek to ensure a high level of protection in the EU. Accordingly, [] the harmonisation of those national laws is not limited to minimal harmonisation but amounts to harmonisation which is generally complete. 13 Consequently, the EUMember States have only limited freedom to manoeuvre when implementing the directive. The Data Protection Directive is designed to give substance to the principles of the right to privacy already contained in Convention108, and to expand them. The fact that all 15EU Member States in1995 were also Contracting Parties to Conven- tion108 rules out the adoption of contradictory rules in these two legal instruments. The Data Protection Directive, however, draws on the possibility, provided for in Arti- cle11 of Convention108, of adding on instruments of protection. In particular, the introduction of independent supervision as an instrument for improving compliance with data protection rules proved to be an important contribution to the effective functioning of European data protection law. (Consequently, this feature was taken over into CoElaw in2001 by the Additional Protocol to Convention 108.) The territorial application of the Data Protection Directive extends beyond the 28EU Member States, including also the non-EU Member States that are part of the Euro- peanEconomicArea(EEA) 14 namely Iceland, Liechtenstein and Norway. The CJEU in Luxembourg has jurisdiction to determine whether a Member State has fullled its obligations under the Data Protection Directive and to give preliminary rulings concerning the validity and interpretation of the directive, in order to ensure 12 See, for example, Data Protection Directive, Recitals1, 4, 7 and8. 13 CJEU, Joined cases C-468/10 and C-469/10, Asociacin Nacional de Establecimientos Financieros de Crdito (ASNEF) and Federacin de Comercio Electrnico y Marketing Directo (FECEMD) v. Administracin del Estado, 24November2011, paras.28-29. 14 Agreement on the European Economic Area, OJ1994L1, which entered into force on 1January1994. Context and background ofEuropean data protectionlaw 19 its effective and uniform application in the Member States. An important exemp- tion from the applicability of the Data Protection Directive is the so-called household exemption, namely the processing of personal data by private individuals for merely personal or household purposes. 15 Such processing is generally seen as part of the freedoms of the private individual. Corresponding to EU primary law in force at the time of the adoption of the Data Protection Directive, the material scope of the directive is limited to matters of the internal market. Outside its scope of application are, most importantly, matters of police and criminal justice cooperation. Data protection in these matters arises from different legal instruments, which are described in detail in Chapter7. As the Data Protection Directive could address only EU Member States, an additional legal instrument was needed in order to establish data protection for the processing of personal data by institutions and bodies of the EU. Regulation (EC) No.45/2001 on the protection of individuals with regard to the processing of personal data by the institutions and bodies of the Community and on the free movement of such data (EU Institutions Data Protection Regulation) fulls this task. 16 Additionally, even in areas covered by the Data Protection Directive, more detailed data protection provisions are often needed in order to achieve the necessary clarity in balancing other legitimate interests. Two examples are the Directive2002/58/EC on the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications) 17 and the Directive2006/24/EC on the retention of data generated or processed in con- nection with the provision of publicly available electronic communications services or of public communications networks and amending Directive2002/58/EC (Data Retention Directive, invalidated on 8April2014). 18 Other examples will be discussed in Chapter8. Such provisions must be in line with the Data Protection Directive. 15 Data Protection Directive, Art.3(2) second indent. 16 Regulation (EC) No.45/2001 of the European Parliament and of the Council of 18December2000 on the protection of individuals with regard to the processing of personal data by the institutions and bodies of the Community and on the free movement of such data, OJ2001L8. 17 Directive 2002/58/EC of the European Parliament and of the Council of 12July2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications), OJ2002L201. 18 Directive 2006/24/EC of the European Parliament and of the Council of 15March2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC, (Data Retention Directive), OJ2006L105, invalidated on 8April2014. Handbook on European data protection law 20 The Charter of Fundamental Rights of the European Union The original treaties of the European Communities did not contain any reference to human rights or their protection. As cases came before the then European Court of Justice (ECJ) alleging human rights violations in areas within the scope of EUlaw, however, it developed a new approach. To grant protection to individuals, it brought fundamental rights into the so-called general principles of European law. According to the CJEU, these general principles reect the content of human rights protection found in national constitutions and human rights treaties, in particular the ECHR. The CJEU stated that it would ensure the compliance of EUlaw with these principles. In recognising that its policies could have an impact on human rights and in an effort to make citizens feel closer to the EU, the EU in2000 proclaimed the Charter of Fundamental Rights of the European Union (Charter). This Charter incorporates the whole range of civil, political, economic and social rights of European citizens, by synthesising the constitutional traditions and international obligations common to the Member States. The rights described in the Charter are divided into six sections: dignity, freedoms, equality, solidarity, citizens rights and justice. Although originally only a political document, the Charter became legally binding 19
as EU primary law (see Article6(1) of the TEU) with the coming into force of the Lisbon Treaty on 1December2009. 20 EU primary law also contains a general EU competence to legislate on data protec- tion matters (Article16 of the TFEU). The Charter not only guarantees the respect for private and family life (Article7), but also establishes the right to data protection (Article8), explicitly raising the level of this protection to that of a fundamental right in EUlaw. EU institutions as well as Member States must observe and guarantee this right, which also applies to Mem- ber States when implementing Union law (Article51 of the Charter). Formulated several years after the Data Protection Directive, Article8 of the Charter must be understood as embodying pre-existing EU data protection law. The Charter, there- fore, not only explicitly mentions a right to data protection in Article8(1), but also refers to key data protection principles in Article8(2). Finally, Article8(3) of the 19 EU (2012), Charter of Fundamental Rights of the European Union, OJ2012C326. 20 See consolidated versions of European Communities (2012), Treaty on European Union, OJ2012C326; and of European Communities (2012), TFEU, OJ2012C326. Context and background ofEuropean data protectionlaw 21 Charter ensures that an independent authority will control the implementation of these principles. Outlook In January2012, the European Commission proposed a data protection reform pack- age, stating that the current rules on data protection needed to be modernised in light of rapid technological developments and globalisation. The reform package consists of a proposal for a General Data Protection Regulation, 21 meant to replace the Data Protection Directive, as well as a new General Data Protection Directive 22
which shall provide for data protection in the areas of police and judicial cooperation in criminal matters. At the time of the publication of this handbook, discussion on the reform package was ongoing. 1.2. Balancing rights Key point The right to data protection is not an absolute right; it must be balanced against other rights. The fundamental right to the protection of personal data under Article8 of the Char- ter is not, however, an absolute right, but must be considered in relation to its func- tion in society. 23 Article52(1) of the Charter thus accepts that limitations may be imposed on the exercise of rights such as those set forth in Articles7 and8 of the Charter, as long as these limitations are provided for by law, respect the essence of those rights and freedoms and, subject to the principle of proportionality, are 21 European Commission (2012), Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation), COM(2012)11 nal, Brussels, 25January2012. 22 European Commission (2012), Proposal for a Directive of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data by competent authorities for the purposes of prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, and the free movement of such data (General Data Protection Directive), COM(2012)10 nal, Brussels, 25January2012. 23 See, for example, CJEU, Joined cases C-92/09 and C-93/09, Volker and Markus Schecke GbR and Hartmut Eifert v. Land Hessen, 9November2010, para.48. Handbook on European data protection law 22 necessary and genuinely meet objectives of general interest recognised by the European Union or the need to protect the rights and freedoms of others. 24
In the ECHR system, data protection is guaranteed by Article 8 (right to respect for private and family life) and, as in the Charter system, this right needs to be applied while respecting the scope of other competing rights. Pursuant to Article 8(2) of the ECHR, There shall be no interference by a public authority with the exercise of this right except such as is in accordance with the law and is necessary in a democratic society [] for the protection of the rights and freedoms of others. Consequently, both the ECtHR and the CJEU have repeatedly stated that a balancing exercise with other rights is necessary when applying and interpreting Article8 of ECHR and Article8 of the Charter. 25 Several important examples will illustrate how this balance is reached. 1.2.1. Freedom of expression One of the rights likely to come into conict with the right to data protection is the right to freedom of expression. Freedom of expression is protected by Article11 of the Charter (Freedom of expres- sion and information). This right includes the freedom to hold opinions and to receive and impart information and ideas without interference by public authority and regardless of frontiers. Article11 corresponds to Article10 of the ECHR. Pursu- ant to Article 52(3) of the Charter, insofar as it contains rights which correspond to rights guaranteed by the ECHR, the meaning and scope of those rights shall be the same as those laid down by the said Convention. The limitations which may law- fully be imposed on the right guaranteed by Article11 of the Charter may therefore not exceed those provided for in Article 10(2) of the ECHR, that is to say, they must be prescribed by law and they must be necessary in a democratic society for the 24 Ibid., para.50. 25 ECtHR, Von Hannover v. Germany (No. 2) [GC], Nos.40660/08 and 60641/08, 7February2012; CJEU, Joined cases C-468/10 and C-469/10, Asociacin Nacional de Establecimientos Financieros de Crdito (ASNEF) and Federacin de Comercio Electrnico y Marketing Directo (FECEMD) v. Administracin del Estado, 24November2011, para.48; CJEU, C-275/06, Productores de Msica de Espaa (Promusicae) v. Telefnica de Espaa SAU, 29January2008, para.68. See also Council of Europe (2013), Case law of the European Court of Human Rights concerning the protection of personal data, DP (2013) Case law, available at: www.coe.int/t/dghl/standardsetting/dataprotection/Judgments/DP 2013 Case Law_Eng_ FINAL.pdf. Context and background ofEuropean data protectionlaw 23 protection [] of the reputation or rights of others . This concept covers the right to data protection. The relationship between the protection of personal data and freedom of expression is governed by Article9 of the Data Protection Directive, entitled Processing of per- sonal data and freedom of expression. 26 According to this article, Member States are required to provide for a number of derogations or limitations in relation to the pro- tection of data and, therefore, in relation to the fundamental right to privacy, speci- ed in ChaptersII, IV andVI of the directive. Those derogations must be made solely for journalistic purposes or the purpose of artistic or literary expression, which fall within the scope of the fundamental right to freedom of expression, in so far as they are necessary to reconcile the right to privacy with the rules governing freedom of expression. Example: In Tietosuojavaltuutettu v. Satakunnan Markkinaprssi Oy and Sata- media Oy, 27 the CJEU was asked to interpret Article9 of the Data Protection Directive and to dene the relationship between data protection and the free- dom of the press. The Court had to examine Markkinaprssi and Satamedias dissemination of tax data on some 1.2million natural persons lawfully obtained from the Finnish tax authorities. In particular, the Court had to verify whether the processing of personal data, which the tax authorities made available, in order to allow mobile telephone users to receive tax data relating to other natu- ral persons must be considered as an activity carried out solely for journalistic purposes. After having concluded that Satakunnans activities were process- ing of personal data within the meaning of Article3(1) of the Data Protection Directive, the Court went on to construe Article9 of the directive. The Court rst noted the importance of the right to freedom of expression in every demo- cratic society and held that notions relating to that freedom, such as journal- ism, should be interpreted broadly. It then observed that, in order to achieve a balance between the two fundamental rights, the derogations and limitations of the right to data protection must apply only insofar as is strictly necessary. In those circumstances, the Court considered that activities such as those car- ried out by Markkinaprssi and Satamedia concerning data from documents which are in the public domain under national legislation, may be classied as journalistic activities if their object is the disclosure to the public of information, 26 Data Protection Directive, Art.9. 27 CJEU, C-73/07, Tietosuojavaltuutettu v. Satakunnan Markkinaprssi Oy and Satamedia Oy, 16December2008, paras.56, 61 and62. Handbook on European data protection law 24 opinions or ideas, irrespective of the medium used to transmit them. The Court also ruled that these activities are not limited to media undertakings and may be undertaken for profit-making purposes. However, the CJEU left it to the national court to determine whether this was the case in this particular case. Concerning the reconciliation of the right to data protection with the right to free- dom of expression, the ECtHR has issued several landmark judgments. Example: In Axel Springer AG v. Germany, 28 the ECtHR held that a ban imposed by a domestic court on the owner of a newspaper who wanted to publish an article on the arrest and conviction of a well-known actor violated Article10 of the ECHR. The ECtHR reiterated criteria that it had established in its case law when balancing the right to freedom of expression against the right to respect for private life: rst, whether the event that the published article concerned was of general interest: the arrest and conviction of a person was a public judicial fact and therefore of public interest; second, whether the person concerned was a public gure: the person con- cerned was an actor sufciently well known to qualify as a public gure; third, how the information was obtained and whether it was reliable: the information had been provided by the public prosecutors office and the accuracy of the information contained in both publications was not in dispute between the parties. Therefore, the ECtHR ruled that the publication restrictions imposed on the com- pany had not been reasonably proportionate to the legitimate aim of protecting the applicants private life. The Court concluded that there had been a violation of Article10 of the ECHR. Example: In Von Hannover v. Germany (No.2), 29 the ECtHR found no violation of the right to respect for private life under Article8 of the ECHR, when Prin- cess Caroline of Monaco was refused an injunction against the publication of a 28 ECtHR, Axel Springer AG v. Germany [GC], No.39954/08, 7February2012, paras.90 and91. 29 ECtHR, Von Hannover v. Germany (No.2) [GC], Nos.40660/08 and 60641/08, 7February2012, paras.118 and124. Context and background ofEuropean data protectionlaw 25 photograph of her and her husband taken during a skiing holiday. The photo- graph was accompanied by an article reporting on, among other issues, Prince Rainiers poor health. The ECtHR concluded that the domestic courts had care- fully balanced the publishing companies right to freedom of expression against the applicants right to respect for their private life. The domestic courts char- acterisation of Prince Rainiers illness as an event of contemporary society could not be considered unreasonable and the ECtHR was able to accept that the pho- tograph, considered in light of the article, did at least to some degree contribute to a debate of general interest. The Court concluded that there had not been a violation of Article8 of the ECHR. In the ECtHR case law, one of the crucial criteria regarding the balancing of these rights is whether or not the expression at issue contributes to a debate of general public interest. Example: In Mosley v. the UnitedKingdom, 30 a national weekly newspaper pub- lished intimate photographs of the applicant. He then alleged a violation of Arti- cle8 of the ECHR because he had been unable to seek an injunction before the publication of the photos in question due to the absence of any pre-notication requirement for the newspaper in case of publication of material capable of vio- lating ones right to privacy. Although the dissemination of such material was generally for the purposes of entertainment rather than education, it undoubt- edly beneted from the protection of Article10 of the ECHR, which might yield to the requirements of Article8 of the ECHR where the information was of a pri- vate and intimate nature and there was no public interest in its dissemination. However, particular care had to be taken when examining constraints which might operate as a form of censorship prior to publication. Regarding the chill- ing effect to which a pre-notication requirement might give rise, to the doubts about its effectiveness and to the wide margin of appreciation in that area, the ECtHR concluded that the existence of a legally binding pre-notication require- ment was not required under Article8. Accordingly, the Court concluded that there had been no violation of Article8. Example: In Biriuk v. Lithuania, 31 the applicant claimed damages from a daily newspaper because it had published an article reporting that she was HIV posi- tive. That information had allegedly been conrmed by the medics at the local 30 ECtHR, Mosley v. the UnitedKingdom, No.48009/08, 10May2011, paras.129 and130. 31 ECtHR, Biriuk v. Lithuania, No.23373/03, 25November2008. Handbook on European data protection law 26 hospital. The ECtHR did not deem the article in question to contribute to any debate of general interest and reiterated that the protection of personal data, not least medical data, was of fundamental importance to a persons enjoyment of his or her right to respect for private and family life as guaranteed by Arti- cle8 of the ECHR. The Court attached particular signicance to the fact that, according to the report in the newspaper, medical staff of a hospital had pro- vided information about the applicants HIV infection in evident breach of their obligation to medical secrecy. Consequently, the state had failed to secure the applicants right to respect for her private life. The Court concluded that there had been a violation of Article8. 1.2.2. Access to documents Freedom of information according to Article11 of the Charter and Article10 of the ECHR protects the right not only to impart but also to receive information. There is a growing realisation of the importance of government transparency for the func- tioning of a democratic society. In the last two decades in consequence, the right to access documents held by public authorities has been acknowledged as an impor- tant right of every EU citizen, and any natural or legal person residing or having its registered ofce in a Member State. Under CoElaw, reference can be made to the principles enshrined in the Recom- mendation on access to ofcial documents, which inspired the drafters of the Con- vention on Access to Ofcial Documents (Convention205). 32 Under EUlaw, the right of access to documents is guaranteed by Regulation1049/2001 regarding public access to European Parliament, Council and Commission documents (Access to Doc- uments Regulation). 33 Article42 of the Charter and Article15(3) of the TFEU have extended this right of access to documents of the institutions, bodies, ofces and agencies of the Union, regardless of their form. In accordance with Article(52)2 of the Charter, the right of access to documents is also exercised under the con- ditions and within the limits for which provision is made in Article15(3) of TFEU. This right may come into conflict with the right to data protection if access to a document would reveal others personal data. Requests for access to documents or 32 Council of Europe, Committee of Ministers (2002), Recommendation Rec(2002)2 to member states on access to ofcial documents, 21February2002; Council of Europe, Convention on Access to Ofcial Documents, CETSNo.205,18June2009. The Convention has not yet entered into force. 33 Regulation (EC) No.1049/2001 of the European Parliament and of the Council of 30May2001 regarding public access to European Parliament, Council and Commission documents, OJ2001L145. Context and background ofEuropean data protectionlaw 27 information held by public authorities may therefore need balancing with the right to data protection of persons whose data are contained in the requested documents. Example: In European Commission v. Bavarian Lager, 34 the CJEU defined the scope of the protection of personal data in the context of access to documents of EU institutions and the relationship between Regulations Nos.1049/2001 (Access to Documents Regulation) and 45/2001 (Data Protection Regulation). Bavarian Lager, established in1992, imports bottled German beer into the United Kingdom, principally for public houses and bars. It encountered difcul- ties, however, because British legislation de facto favoured national producers. In response to Bavarian Lagers complaint, the European Commission decided to institute proceedings against the United Kingdom for failure to full its obli- gations, which led it to amend the disputed provisions and align them with EUlaw. Bavarian Lager then asked the Commission, among other documents, for a copy of the minutes of a meeting which had been attended by representa- tives of the Commission, the British authorities and the Confdration des Bras- seurs du March Commun (CBMC). The Commission agreed to disclose certain documents relating to the meeting, but blanked out ve names appearing in the minutes, two persons having expressly objected to the disclosure of their identity and the Commission having been unable to contact the three others. By decision of 18March2004, the Commission rejected a new Bavarian Lager application to obtain the full minutes of the meeting, citing in particular the protection of the private life of those persons, as guaranteed by the Data Pro- tection Regulation. Since it was not satised with this position, Bavarian Lager brought an action before the Court of First Instance, which annulled the Com- mission decision by judgment of 8November2007 (case T-194/04, Bavarian Lager v. Commission), considering in particular that the mere entry of the names of the persons in question on the list of persons attending a meeting on behalf of the body they represented did not constitute an undermining of private life and did not place the private lives of those persons in any danger. On appeal by the Commission, the CJEU annulled the judgment of the Court of First Instance. The CJEU held that the Access to Documents Regulation estab- lishes a specic and reinforced system of protection of a person whose per- sonal data could, in certain cases, be communicated to the public. According to the CJEU, where a request based on the Access to Documents Regulation 34 CJEU, C-28/08P, European Commission v. The Bavarian Lager Co. Ltd., 29June2010, paras.60, 63, 76, 78 and79. Handbook on European data protection law 28 thus seeks to obtain access to documents including personal data, the provi- sions of the Data Protection Regulation become applicable in their entirety. The CJEU then concluded that the Commission was right to reject the application for access to the full minutes of the meeting of October 1996. In the absence of the consent of the ve participants at that meeting, the Commission sufciently complied with its duty of openness by releasing a version of the document in question with their names blanked out. Moreover, according to the CJEU, as Bavarian Lager has not provided any express and legitimate justification or any convincing argument in order to demonstrate the necessity for those personal data to be transferred, the Com- mission has not been able to weigh up the various interests of the parties con- cerned. Nor was it able to verify whether there was any reason to assume that the data subjects legitimate interests might be prejudiced, as required by the Data Protection Regulation. According to this judgment, interference with the right to data protection with respect to access to documents needs a specic and justied reason. The right of access to documents cannot automatically overrule the right to data protection. 35
A particular aspect of an access request was addressed in the following judgment of theECtHR. Example: In Trsasg a Szabadsgjogokrt v. Hungary, 36 the applicant, a human rights NGO, had required from the Constitutional Court access to information about a pending case. Without consulting the member of parliament who had brought the case before it, the Constitutional Court refused the access request on the ground that complaints before it could be made available to outsiders only with the approval of the complainant. Domestic courts upheld this refusal, on the grounds that the protection of such personal data could not be overrid- den by other lawful interests, including the accessibility of public information. The applicant had acted as a social watchdog, whose activities warranted simi- lar protection to those afforded the press. In relation to freedom of the press, 35 See, however, the detailed deliberations in European Data Protection Supervisor (EDPS) (2011), Public access to documents containing personal data after the Bavarian Lager ruling, Brussels, 24March2011, available at: www.edps.europa.eu/EDPSWEB/webdav/site/mySite/shared/Documents/EDPS/ Publications/Papers/BackgroundP/11-03-24_Bavarian_Lager_EN.pdf. 36 ECtHR, Trsasg a Szabadsgjogokrt v. Hungary, No.37374/05, 14April2009; see paras.27, 3638. Context and background ofEuropean data protectionlaw 29 the ECtHR had consistently held that the public had the right to receive informa- tion of general interest. The information sought by the applicant was ready and available and did not require any collection of data. In such circumstances, the state had an obligation not to impede the ow of information sought by the applicant. In sum, the ECtHR considered that obstacles designed to hinder access to information of public interest might discourage those working in the media or related elds from performing their vital role of a public watchdog. The Court concluded that there had been a violation of Article10. Under EUlaw, the importance of transparency is rmly established. The principle of transparency is enshrined in Articles1and 10 of the TEU and in Article15(1) of the TFEU. 37 According to Recital2 of the Regulation (EC) No.1049/2001, it enables citizens to participate more closely in the decision-making process and guarantees that the administration enjoys greater legitimacy and is more effective and more accountable to the citizen in a democratic system. 38 Following this reasoning, Council Regulation (EC) No.1290/2005 on the nancing of the common agricultural policy and Commission Regulation (EC) No.259/2008 laying down detailed rules for its application require the publication of information on the beneciaries of certain EU funds in the agricultural sector and the amounts received per beneciary. 39 The publication should contribute to public control of the appropriate use of public funds by the administration. The proportionality of this publication was contested by several beneciaries. Example: In Volker and Markus Schecke and Hartmut Eifert v. Land Hessen, 40
the CJEU had to judge the proportionality of the publication, required by EU leg- islation, of the name of the beneciaries of EU agricultural subsidies and the amounts they received. 37 EU (2012), Consolidated versions of the Treaty on European Union and of the TFEU, OJ2012C326. 38 CJEU, C-41/00P, Interporc Im- und Export GmbH v. Commission of the European Communities, 6March2003, para.39; and CJEU, C-28/08P, European Commission v. The Bavarian Lager Co. Ltd., 29June2010, para.54. 39 Council Regulation (EC) No.1290/2005 of 21June2005 on the nancing of the common agricultural policy, OJ2005L209; and Commission Regulation (EC) No.259/2008 of 18March2008 laying down detailed rules for the application of Council Regulation (EC) No.1290/2005 as regards the publication of information on the beneciaries of funds deriving from the European Agricultural Guarantee Fund (EAGF) and the European Agricultural Fund for Rural Development (EAFRD), OJ2008L76. 40 CJEU, Joined cases C-92/09 and C-93/09, Volker and Markus Schecke GbR (C-92/09) and Hartmut Eifert (C-93/09) v. Land Hessen, 9November2010, paras.4752, 58, 6667, 75, 86 and92. Handbook on European data protection law 30 The Court, noting that the right to data protection is not absolute, argued that the publication on a website of data naming the beneciaries of two EU agri- cultural aid funds and the precise amounts received constitutes an interference with their private life, in general, and with the protection of their personal data, in particular. The Court considered that such interference with Articles7 and8 of the Charter was provided for by law and met an objective of general interest recognised by the EU, namely, including enhancing the transparency of community funds use. However, the CJEU held that the publication of the names of natural persons who are beneciaries of EU agricultural aid from these two funds and the exact amounts received constituted a disproportionate measure and was not justied having regard to Article52(1) Charter. The Court thus declared partially invalid EU legislation on the publication of information relating to the beneciaries of European agricultural funds. 1.2.3. Freedom of the arts and sciences Another right to balance against the right to respect for private life and to data pro- tection is the freedom of the arts and sciences, explicitly protected under Article13 of the Charter. This right is deduced primarily from the right to freedom of thought and expression and it is to be exercised having regard to Article1 of the Charter (Human dignity). The ECtHR considers that freedom of the arts is protected under Article10 of the ECHR. 41 The right guaranteed by Article13 of the Charter may also be subject to the limitations authorised by Article10 of theECHR. 42 Example: In Vereinigung bildender Knstler v. Austria, 43 the Austrian courts prohibited the applicant association from continuing to exhibit a painting that contained photos of the heads of various public gures in sexual positions. An Austrian parliamentarian, whose photo had been used in the painting, brought proceedings against the applicant association, seeking an injunction prohibiting it from exhibiting the painting. The domestic court issued an injunction accept- ing his request. The ECtHR reiterated that Article10 of the ECHR was applicable to communicating ideas that offended, shocked or disturbed the state or any 41 ECtHR, Mller and Others v. Switzerland, No.10737/84, 24May1988. 42 Explanations relating to the Charter of Fundamental Rights, OJ2007C303. 43 ECtHR, Vereinigung bildender Knstler v. Austria, No.68345/01, 25January2007; see especially paras.26 and34. Context and background ofEuropean data protectionlaw 31 section of the population. Those who created, performed, distributed or exhib- ited works of art contributed to the exchange of ideas and opinions and the state had the obligation not to encroach unduly on their freedom of expres- sion. Given that the painting was a collage and used photos of only the heads of persons, and that their bodies were painted in an unrealistic and exagger- ated manner, which obviously did not aim to reect or even suggest reality, the ECtHR further stated that the painting could hardly be understood to address details of [the depicteds] private life, but rather related to his public standing as a politician and that in this capacity [the depicted] had to display a wider tolerance in respect of criticism. Weighing the different interests at stake, the ECtHR found that the unlimited prohibition against further exhibiting the paint- ing was disproportionate. The Court concluded that there had been a violation of Article10 of theECHR. In relation to science, European data protection law is aware of the special value of science to society. Therefore, the general restrictions for the use of personal data are diminished. The Data Protection Directive and Convention108 both permit the retention of data for scientic research once they are no longer needed for the initial purpose of their collection. Furthermore, the subsequent use of personal data for scientic research shall not be considered an incompatible purpose. National law is charged with the task of developing more detailed provisions, including the neces- sary safeguards, to reconcile the interest in scientic research with the right to data protection (see also Sections3.3.3 and 8.4) . 1.2.4. Protection of property A right to the protection of property is enshrined in Article1 of the First Protocol to the ECHR and also in Article17(1) of the Charter. One important aspect of the right to property is the protection of intellectual property, explicitly mentioned in Arti- cle17(2) of the Charter. Several directives can be found in the EU legal order, aiming at the effective protection of intellectual property, in particular copyright. Intellectual property covers not only literary and artistic property but also patent, trademark and associated rights. As the CJEUs case law has made clear, the protection of the fundamental right to property must be balanced against the protection of other fundamental rights, in particular, against the right to data protection. 44 There have been cases where 44 ECtHR, Ashby Donald and others v. France, No.36769/08, 10January2013. Handbook on European data protection law 32 copyright protection institutions demanded that internet providers disclose the iden- tity of users of internet le-sharing platforms. Such platforms often make it possible for internet users to download music titles for free even though these titles are pro- tected by copyright. Example: Promusicae v. Telefnica de Espaa 45 concerned the refusal of a Span- ish internet access provider, Telefnica, to disclose to Promusicae, a non-prot organisation of music producers and publishers of musical and audiovisual recordings, the personal data of certain persons whom it provided with inter- net access services. Promusicae sought the informations disclosure so that it could initiate civil proceedings against those persons, whom it said were using a le exchange program that provided access to phonograms whose exploitation rights were held by Promusicae members. The Spanish Court referred the issue to the CJEU, asking whether such personal data must be communicated, under community law, in the context of civil pro- ceedings in order to ensure the effective protection of copyright. It referred to Directives2000/31, 2001/29 and 2004/48, read also in light of Articles17 and47 of the Charter. The Court concluded that these three directives, as well as the Directive on privacy and electronic communications (2002/58/EC), do not preclude Member States from laying down an obligation to disclose per- sonal data in the context of civil proceedings, to ensure the effective protection of copyright. The CJEU pointed out that the case therefore raised the question of the need to reconcile the requirements of the protection of different fundamental rights, namely the right to respect for private life with the rights to protection of prop- erty and to an effective remedy. The Court concluded that the Member States must, when transposing the directives mentioned above, take care to rely on an interpretation of those directives which allows a fair balance to be struck between the various fun- damental rights protected by the Community legal order. Further, when imple- menting the measures transposing those directives, the authorities and courts of the Member States must not only interpret their national law in a manner consistent with those directives but also make sure that they do not rely on an 45 CJEU, C-275/06, Productores de Msica de Espaa (Promusicae) v. Telefnica de Espaa SAU, 29January2008, paras.54 and60. Context and background ofEuropean data protectionlaw 33 interpretation of them which would be in conict with those fundamental rights or with the other general principles of Community law, such as the principle of proportionality. 46 46 Ibid., paras.65 and68; see also CJEU, C-360/10, SABAM v. Netlog N.V., 16February2012. 35 EU Issues covered CoE Personal data Data Protection Directive, Article2(a) CJEU, Joined cases C-92/09 and C-93/09, Volker and Markus Schecke GbR (C-92/09) and Hartmut Eifert (C-93/09) v. Land Hessen, 9November2010 CJEU, C-275/06, Productores de Msica de Espaa (Promusicae) v. Telefnica de Espaa SAU, 29January2008 Legal denition Convention108, Article 2(a) ECtHR, Bernh Larsen Holding AS and Others v. Norway, No.24117/08, 14March2013 Data Protection Directive, Article8(1) CJEU, C-101/01, Bodil Lindqvist, 6November2003 Special categories of personal data (sensitive data) Convention108, Article6 Data Protection Directive, Article6(1)(e) Anonymised and pseudonymised data Convention108, Article5(e) Convention108, Explanatory report, Article42 Processing of data Data Protection Directive, Article2(b) CJEU, C-101/01, Bodil Lindqvist, 6November2003 Denitions Convention108, Article2(c) Users of data Data Protection Directive, Article2(d) Controller Convention108, Article2(d) Proling Recommendation, Article1(g) * Data Protection Directive, Article2(e) CJEU, C-101/01, Bodil Lindqvist, 6November2003 Processor Proling Recommendation Article1(h) Data protection terminology 2 Handbook on European data protection law 36 Data Protection Directive, Article2(g) Recipient Convention108, Additional Protocol, Article2(1) Data Protection Directive, Article2(f) Third party Consent Data Protection Directive, Article2(h) CJEU, C-543/09, Deutsche Telekom AG v. Bundesrepublik Deutschland, 5May2011 Denition and requirements for valid consent Medical Data Recommendation, Article6, and various subsequent recommendations Note: *Council of Europe, Committee of Ministers (2010), Recommendation Rec(2010)13 to member states on the protection of individuals with regard to automatic processing of personal data in the context of proling (Proling Recommendation), 23November2010. 2.1. Personal data Key points Data are personal data if they relate to an identied or at least identiable person, the data subject. A person is identiable if additional information can be obtained without unreasonable effort, allowing the identication of the data subject. Authentication means proving that a certain person possesses a certain identity and/or is authorised to carry out certain activities. There are special categories of data, so-called sensitive data, listed in Convention108 and in the Data Protection Directive, which require enhanced protection and, therefore, are subject to a special legal regime. Data are anonymised if they no longer contain any identifiers; they are pseu- donymised if the identiers are encrypted. In contrast to anonymised data, pseudonymised data are personaldata. 2.1.1. Main aspects of the concept of personal data Under EUlaw as well as under CoElaw, personal data are dened as information relating to an identied or identiable natural person, 47 that is, information about a person whose identity is either manifestly clear or can at least be established by obtaining additional information. 47 Data Protection Directive, Art.2(a); Convention108, Art.2(a). Data protection terminology 37 If data about such a person are being processed, this person is called the data subject. A person The right to data protection developed out of the right to respect for private life. The concept of private life relates to human beings. Natural persons are, therefore, the primary beneciaries of data protection. According to the Opinion of the Article29 Working Party, furthermore, only a living being is protected under European data protection law. 48 The ECtHRs jurisprudence concerning Article8 of the ECHR shows that it may be dif- cult to completely separate matters of private and professional life. 49
Example: In Amann v. Switzerland, 50 authorities intercepted a business-related telephone call to the applicant. Based on that call, the authorities investigated the applicant and lled in a card on the applicant for the national security card index. Although the interception concerned a business-related telephone call, the ECtHR considered the storing of data about this call as relating to the pri- vate life of the applicant. It pointed out that the term private life must not be interpreted restrictively, in particular, since respect for private life comprised the right to establish and develop relationships with other human beings. Fur- thermore, there was no reason of principle to justify excluding activities of a professional or business nature from the notion of private life. Such a broad interpretation corresponded to that of Convention108. The ECtHR further found that the interference in the applicants case had not been in accordance with the law since domestic law did not contain specic and detailed provisions on the gathering, recording and storing of information. It thus concluded that there had been a violation of Article8 of theECHR. Furthermore, if matters of professional life may also be the subject of data protec- tion, it seems questionable that only natural persons should be afforded protection. Rights under the ECHR are guaranteed not only to natural persons but to everyone. 48 Article 29 Working Party (2007), Opinion 4/2007 on the concept of personal data, WP136, 20June2007, p.22. 49 See, for example: ECtHR, Rotaru v. Romania [GC], No.28341/95, 4May2000, para.43; ECtHR, Niemietz v. Germany, 13710/88, 16December1992, para.29. 50 ECtHR, Amann v. Switzerland [GC], No.27798/95, 16February2000, para.65. Handbook on European data protection law 38 There is jurisprudence of the ECtHR giving judgment on applications of legal persons alleging violation of their right to protection against the use of their data under Arti- cle8of the ECHR. The Court, however, examined the case under the right to respect for home and correspondence, rather than under private life: Example: Bernh Larsen Holding AS and Others v. Norway 51 concerned a com- plaint by three Norwegian companies about a tax authority decision ordering them to provide the tax auditors with a copy of all data on a computer server the three used jointly. The ECtHR found that such an obligation on the applicant companies consti- tuted an interference with their rights to respect for home and correspond- ence for the purpose of Article8 of the ECHR. The Court found, however, that the tax authorities had effective and adequate safeguards against abuse: the applicant companies had been notied well in advance; were present and able to make submissions during the on-site intervention; and the material was to be destroyed once the tax review was completed. In such circumstances, a fair balance had been struck between the applicant companies right to respect for home and correspondence and their interest in protecting the privacy of per- sons working for them, on the one hand, and the public interest in ensuring ef- cient inspection for tax assessment purposes, on the other. The Court held that there had, therefore, been no violation of Article8. According to Convention108, data protection deals, primarily, with the protection of natural persons; however, the contracting parties may extend data protection to legal persons, such as business companies and associations in their domestic law. EUdata protection law does not, in general, cover the protection of legal persons with regard to the data processing that concerns them. The national regulators are free to regulate on that subject. 52
Example: In Volker and Markus Schecke and Hartmut Eifert v. Land Hessen, 53
the CJEU, referring to the publication of personal data relating to beneciaries of agricultural aid, held that legal persons can claim the protection of Articles7 51 ECtHR, Bernh Larsen Holding AS and Others v. Norway, No.24117/08, 14March2013. See also, however, ECtHR, Liberty and Others v. the United Kingdom, No.58243/00, 1July2008. 52 Data Protection Directive, Recital24. 53 CJEU, Joined cases C-92/09 and C-93/09, Volker and Markus Schecke GbR (C-92/09) and Hartmut Eifert (C-93/09) v. Land Hessen, 9November2010, para.53. Data protection terminology 39 and 8 of the Charter in relation to such identication only in so far as the ofcial title of the legal person identies one or more natural persons. [T]he right to respect for private life with regard to the processing of personal data, recog- nised by Articles7 and8 of the Charter, concerns any information relating to an identied or identiable individual []. 54 Identiability of a person Under EUlaw as well as under CoElaw, information contains data about a person if: an individual is identied in this information; or if an individual, while not identied, is described in this information in a way which makes it possible to nd out who the data subject is by conducting further research. Both types of information are protected in the same manner under European data protection law. The ECtHR has repeatedly stated that the notion of personal data under the ECHR is the same as in Convention108, especially concerning the condi- tion of relating to identied or identiable persons. 55 The legal denitions of personal data do not further clarify when a person is con- sidered to be identied. 56 Evidently identication requires elements which describe a person in such a way that he or she is distinguishable from all other persons and recognisable as an individual. A persons name is a prime example of such elements of description. In exceptional cases, other identiers can have a similar effect to a name. For instance, for public gures it may be enough to refer to the position of the person, such as President of the European Commission. Example: In Promusicae, 57 the CJEU stated that it is not disputed that the com- munication sought by Promusicae of the names and addresses of certain users of [a certain internet file-sharing platform] involves the making available of 54 Ibid., para.52. 55 See ECtHR, Amann v. Switzerland [GC], No.27798/95, 16February2000, para.65 etal. 56 See also ECtHR, Odivre v. France [GC], No.42326/98, 13February2003; and ECtHR, Godelli v. Italy, No.33783/09, 25September2012. 57 CJEU, C-275/06, Productores de Msica de Espaa (Promusicae) v. Telefnica de Espaa SAU, 29January2008, para.45. Handbook on European data protection law 40 personal data, that is, information relating to identied or identiable natural persons, in accordance with the definition in Article2(a) of Directive95/46 []. That communication of information which, as Promusicae submits and Tel- efnica does not contest, is stored by Telefnica constitutes the processing of personal data within the meaning of the rst paragraph of Article2 of Direc- tive2002/58, read in conjunction with Article2(b) of Directive95/46. As many names are not unique, establishing the identity of a person may need additional identiers to ensure that a person is not confused with someone else. Date and place of birth are often used. In addition, personalised numbers have been introduced in some countries in order to better distinguish between citizens. Biom- etric data, such as ngerprints, digital photos or iris scans, are becoming increasingly important to identifying persons in the technologicalage. For the applicability of European data protection law, however, there is no need for high-quality identication of the data subject; it is sufcient that the person con- cerned be identiable. A person is considered identiable if a piece of information contains elements of identification through which the person can be identified, directly or indirectly. 58 According to Recital26 of the Data Protection Directive, the benchmark is whether it is likely that reasonable means for identication will be available and administered by the foreseeable users of the information; this includes third-party recipients (see Section2.3.2). Example: A local authority decides to collect data about cars speeding on local streets. It photographs the cars, automatically recording the time and location, in order to pass the data on to the competent authority so that it can ne those who violated the speed limits. A data subject les a complaint, claiming that the local authority has no legal basis under data protection law for such data collec- tion. The local authority maintains that it does not collect personal data. Licence plates, it says, are data about anonymous persons. The local authority has no legal authority to access the general vehicle register to nd out the identity of the car owner or driver. This reasoning does not accord with Recital26 of the Data Protection Direc- tive. Given that the purpose of the data collection is clearly to identify and ne speeders, it is foreseeable that identication will be attempted. Although the 58 Data Protection Directive, Art.2(a). Data protection terminology 41 local authorities do not have a means of identication directly available to them, they will pass on the data to the competent authority, the police, who do have such means. Recital26 also explicitly includes a scenario where it is foreseeable that further data recipients, other than the immediate data user, may attempt to identify the individual. In light of Recital26, the local authoritys action equates to collecting data about identifiable persons and, therefore, requires a legal basis under data protection law. Under CoElaw, identifiability is understood in a similar way. Article1(2) of the Payment Data Recommendation, 59 for instance, states that a person shall not be regarded as identiable if identication requires an unreasonable amount of time, cost or manpower. Authentication This is a procedure by which a person is able to prove that he or she possesses a certain identity and/or is authorised to do certain things, such as enter a security area, or withdraw money from a banking account. Authentication can be achieved by means of comparing biometric data, such as a photo or ngerprints in a pass- port, with the data of the person presenting himself or herself, for example, at immigration control; or by asking for information which should be known only to the person with a certain identity or authorisation, such as a personal identica- tion number (PIN) or password; or by requiring the presentation of a certain token, which should be exclusively in the possession of the person with a certain identity or authorisation, such as a special chip card or key to a banking safe. Apart from passwords or chip cards, sometimes together with PINs, electronic signatures are an instrument especially capable of identifying and authenticating a person in elec- tronic communications. Nature of the data Any kind of information can be personal data provided that it relates to a person. Example: A supervisors assessment of an employees work performance, stored in the employees personnel le, is personal data about the employee, even though it may just reflect, in part or whole, the superiors personal 59 CoE, Committee of Ministers (1990), Recommendation No.R Rec(90) 19 on the protection of personal data used for payment and other related operations, 13September1990. Handbook on European data protection law 42 opinion, such as: the employee is not dedicated to his work and not hard facts, such as: the employee has been absent from work for ve weeks during the last six months. Personal data covers information pertaining to the private life of a person as well as information about his or her professional or public life. In the Amann case, 60 the ECtHR interpreted the term personal data as not being lim- ited to matters of the private sphere of an individual (see Section2.1.1.). This mean- ing of the term personal data is also relevant for the Data Protection Directive: Example: In Volker and Markus Schecke and Hartmut Eifert v. Land Hessen, 61 the CJEU stated that it is of no relevance in this respect that the data published concerns activities of a professional nature []. The European Court of Human Rights has held on this point, with reference to the interpretation of Article8 of the Convention, that the term private life must not be interpreted restrictively and that there is no reason of principle to justify excluding activities of a profes- sional [] nature from the notion of private life. Data relate to persons also if the content of the information indirectly reveals data about a person. In some cases, where there is a close link between an object or an event e.g. a mobile phone, a car, an accident on the one hand, and a person e.g. as its owner, user, victim on the other, information about an object or about an event ought also to be considered personal data. Example: In Uzun v. Germany, 62 the applicant and another man were placed under surveillance via a global positioning system (GPS) device fitted in the other mans car because of their suspected involvement in bomb attacks. In this case, the ECtHR held that the applicants observation via GPS amounted to interference in his private life as protected by Article8 of the ECHR. However, the GPS surveillance had been in accordance with the law as well as proportion- ate to the legitimate aim of investigating several counts of attempted murder 60 See ECtHR, Amann v. Switzerland, No.27798/95, 16February2000, para.65. 61 Joined cases C-92/09 and C-93/09, Volker und Markus Schecke GbR and Hartmut Eifert v. Land Hessen, 9November2010, para.59. 62 ECtHR, Uzun v. Germany, No.35623/05, 2September2010. Data protection terminology 43 and was therefore necessary in a democratic society. The Court held that there had been no violation of Article8 of theECHR. Form of appearance of the data The form in which the personal data is stored or used is not relevant to the applica- bility of data protection law. Written or spoken communications may contain per- sonal data as well as images, 63 including closed-circuit television (CCTV) footage 64 or sound. 65 Electronically recorded information, as well as information on paper, may be personal data; even cell samples of human tissue may be personal data, as they record the DNA of aperson. 2.1.2. Special categories of personal data Under EUlaw as well as CoElaw, there are special categories of personal data which, by their nature, may pose a risk to the data subjects, when processed, and need enhanced protection. The processing of these special categories of data (sensitive data) must therefore be allowed only with specic safeguards. On the denition of sensitive data, both Convention108 (Article6) and the Data Pro- tection Directive (Article8) name the following categories: personal data revealing racial or ethnic origin; personal data revealing political opinions, religious or other beliefs; and personal data concerning health or sexual life. Example: In Bodil Lindqvist, 66 the CJEU stated that reference to the fact that an individual has injured her foot and is on half-time on medical grounds con- stitutes personal data concerning health within the meaning of Article8(1) of Directive95/46. 63 ECtHR, Von Hannover v. Germany, No.59320/00, 24June2004; ECtHR, Sciacca v. Italy, No.50774/99, 11January2005. 64 ECtHR, Peck v. the UnitedKingdom, No.44647/98, 28January2003; ECtHR, Kpke v. Germany, No.420/07, 5October2010. 65 Data Protection Directive, Recitals16 and17; ECtHR, P.G. and J.H. v. the UnitedKingdom, No.44787/98, 25September2001, paras.59 and60; ECtHR, Wisse v. France, No.71611/01, 20December2005. 66 CJEU, C-101/01, Bodil Lindqvist, 6November2003, para.51. Handbook on European data protection law 44 The Data Protection Directive additionally lists trade union membership as sensitive data, as this information can be a strong indicator of political belief or afliation. Convention108 also considers personal data relating to criminal convictions as sensitive. Article8(7) of the Data Protection Directive mandates EUMember States to deter- mine the conditions under which a national identication number or any other iden- tier of general application may be processed. 2.1.3. Anonymised and pseudonymised data According to the principle of limited retention of data, contained in the Data Protec- tion Directive as well as in Convention108 (and discussed in more detail in Chap- ter3), data must be kept in a form which permits identication of data subjects for no longer than is necessary for the purposes for which the data were collected or for which they are further processed. 67 Consequently, data would have to be anonymised if a controller wanted to store them after they were outdated and no longer served their initial purpose. Anonymised data Data are anonymised if all identifying elements have been eliminated from a set of personal data. No element may be left in the information which could, by exercising reasonable effort, serve to re-identify the person(s) concerned. 68 Where data have been successfully anonymised, they are no longer personal data. If personal data no longer serve their initial purpose, but are to be kept in a person- alised form for the purpose of historical, statistical or scientic use, the Data Protec- tion Directive and Convention108 allow this possibility on condition that appropriate safeguards against misuse are applied. 69 67 Data Protection Directive, Art.6(1)(e); and Convention108, Article5(e). 68 Ibid., Recital26. 69 Ibid., Art.6(1)(e); and Convention108, Article5(e). Data protection terminology 45 Pseudonymised data Personal information contains identifiers, such as a name, date of birth, sex and address. When personal information is pseudonymised, the identiers are replaced by one pseudonym. Pseudonymisation is achieved, for instance, by encryption of the identiers in personal data. Pseudonymised data are not explicitly mentioned in the legal denitions of either Convention108 or the Data Protection Directive. However, the Explanatory Report to Convention108 states in its Article42 that [t]he requirement [] concerning the time-limits for the storage of data in their name-linked form does not mean that data should after some time be irrevocably separated from the name of the person to whom they relate, but only that it should not be possible to link readily the data and the identiers. This is an effect which can be achieved by pseudonymising the data. For everyone who is not in possession of the decryption key, pseudonymised data can be identifiable with difficulty. The link to an identity still exists in form of the pseudonym plus the decryption key. For those who are entitled to use the decryption key re-identication is easily possible. Use of encryption keys by unau- thorised persons must be particularly guarded against. As pseudonymisation of data is one of the most important means of achieving data protection on a large scale, where it is not possible to entirely refrain from using per- sonal data, the logic and the effect of such action must be explained in more detail. Example: The sentence Charles Spencer, born 3April1967, is the father of a family of fourchildren, twoboys and twogirls can, for instance, be pseu- donymised as follows: C.S.1967 is the father of a family of fourchildren, twoboys and twogirls; or 324is the father of a family of fourchildren, twoboys and twogirls; or YESz320l is the father of a family of fourchildren, twoboys and twogirls. Users who access these pseudonymised data will usually have no ability to iden- tify Charles Spencer, born 3April1967 from 324 or YESz3201. Pseudonymised data are, therefore, more likely to be safe from misuse. Handbook on European data protection law 46 The rst example is, however, less safe. If the sentence C.S.1967 is father of a fam- ily of four children, two boys and two girls is used within the small village where Charles Spencer lives, MrSpencer may be easily recognisable. The method of pseu- donymisation affects the effectiveness of data protection. Personal data with encrypted identiers are used in many contexts as a means to keep secret the identity of persons. This is particularly useful where data controllers need to ensure that they are dealing with the same data subjects but do not require, or ought not to have, the data subjects real identities. This is the case, for example, where a researcher studies the course of a disease with patients, whose identity is known only to the hospital where they are treated and from which the researcher obtains the pseudonymised case histories. Pseudonymisation is therefore a strong link in the armoury of privacy-enhancing technology. It can function as an important element when implementing privacy by design. This means having data protection built into the fabric of advanced data-processing systems. 2.2. Data processing Key points The term processing refers primarily to automated processing. Under EUlaw, processing refers additionally to manual processing in structured ling systems. Under CoElaw, the meaning of processing can be extended by domestic law to include manual processing. Data protection under Convention108 and the Data Protection Directive is primarily focused on automated data processing. Under CoElaw, the definition of automatic processing recognises, however, that some stages of manual use of personal data may be required between automated operations. Similarly, under EUlaw, automated data processing is dened as opera- tions performed upon personal data, in whole or in part by automatic means. 70 70 Convention108, Art.2(c); and Data Protection Directive, Art.2(b) and Art.3(1). Data protection terminology 47 Example: In Bodil Lindqvist, 71 the CJEU held that: the act of referring, on an internet page, to various persons and identifying them by name or by other means, for instance by giving their telephone num- ber or information regarding their working conditions or hobbies, constitutes the processing of personal data wholly or partly by automatic means within the meaning of Article3(1) of Directive95/46. Manual data processing also requires data protection. Data protection under EUlaw is in no way limited to automated data processing. Accordingly, under EUlaw, data protection applies to the processing of personal data in a manual ling system, that is, a specially structured paper le. 72 The reason for this extension of data protection is that: paper les can be structured in a way which makes nding information quick and easy; and storing personal data in structured paper les makes it easy to circumvent the restrictions laid down by law for automated data processing. 73 Under CoElaw, Convention108 primarily regulates data processing in automated data les. 74 It also provides, however, for the possibility of extending protection to manual processing in domestic law. Many Parties to Convention108 have made use of this possibility and made declarations to this end to the CoE Secretary General. 75
Extension of data protection under such a declaration must pertain to all manual data processing and cannot be limited to processing in manual ling systems. 76 As for the nature of processing operations included, the concept of processing is comprehensive under both EU and CoElaw: processing of personal data [] shall mean any operation [] such as collection, recording, organisation, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, 71 CJEU, C-101/01, Bodil Lindqvist, 6November2003, para.27. 72 Data Protection Directive, Art.3(1). 73 Ibid., Recital27. 74 Convention108, Art.2(b). 75 See the declarations made under Convention108, Art.3(2)(c). 76 See the wording of Convention108, Art.3(2). Handbook on European data protection law 48 dissemination or otherwise making available, alignment or combination, blocking, erasure or destruction 77 performed upon personal data. The term processing also includes actions whereby the data leave the responsibility of one controller and are transferred to the responsibility of another controller. Example: Employers collect and process data about their employees, including information relating to their salaries. The legal ground for legitimately doing so is the labour contract. Employers will have to forward their staffs salary data to the tax authorities. This forwarding of data will also be processing under the meaning of this term in Convention108 and in the directive. The legal ground, however, for such dis- closure is not the labour contract. There must be an additional legal basis for the processing operations which result in the transfer of salary data from the employer to the tax authorities. This legal basis is usually contained in the provi- sions of national tax laws. Without such provisions, transferring data would be illegal processing. 2.3. The users of personal data Key points Whoever decides to process personal data of others is a controller under data protec- tion law; if several persons take this decision together, they may be joint controllers. A processor is a legally separate entity that processes personal data on behalf of a controller. A processor becomes a controller if he or she uses data for his or her own purposes, not following the instructions of a controller. Anybody who receives data from a controller is a recipient. A third party is a natural or legal person who does not act under instructions of the controller (and is not the data subject). A third party recipient is a person or entity that is legally separate from the controller, but receives personal data from the controller. 77 Data Protection Directive, Art.2(b). Similarly, see also Convention108, Art.2(c). Data protection terminology 49 2.3.1. Controllers and processors The most important consequence of being a controller or a processor is legal respon- sibility for complying with the respective obligations under data protection law. Only those who can be held responsible under the applicable law can therefore assume these positions. In the private sector, this is usually a natural or legal person; in the public sector, it is usually an authority. Other entities, such as bodies or institutions without legal personality, can be controllers or processors only where special legal provisions so provide. Example: When the marketing division of the Sunshine company plans to pro- cess data for a market survey, the Sunshine company, not the marketing divi- sion, will be the controller of such processing. The marketing division cannot be the controller, as it has no separate legal identity. In groups of companies, the parent company and each affiliate, being separate legal persons, count as separate controllers or processors. As a consequence of this legally separate status, the transfer of data between the members of a group of companies will need a special legal basis. There is no privilege permitting the exchange of personal data as such between the separate legal entities within the company group. The role of private individuals needs to be mentioned in this context. Under EUlaw, private individuals, when processing data about others in the course of a purely per- sonal or household activity, do not fall under the rules of the Data Protection Direc- tive; they are not deemed to be controllers. 78 However, jurisprudence has found that data protection law will, nevertheless, apply when a private person, in the course of using the internet, publishes data about others. Example: The CJEU maintained in Bodil Lindqvist 79 that: the act of referring, on an internet page, to various persons and identifying them by name or by other means [] constitutes the processing of personal 78 Data Protection Directive, Recital12 and Art.3(2) last indent. 79 CJEU, C-101/01, Bodil Lindqvist, 6November2003. Handbook on European data protection law 50 data wholly or partly by automatic means within the meaning of Article3(1) of Directive95/46. 80 Such personal data processing does not fall under purely personal or domes- tic activities, which are outside the scope of the Data Protection Directive, as this exception must [] be interpreted as relating only to activities which are carried out in the course of private or family life of individuals, which is clearly not the case with the processing of personal data consisting in publication on the internet so that those data are made accessible to an indenite number of people. 81 Controller Under EUlaw, a controller is dened as someone who alone or jointly with others determines the purposes and means of the processing of personal data. 82 A control- lers decision lays down why and how data shall be processed. Under CoElaw, the denition of controller mentions additionally that a controller decides which cat- egories of personal data should be stored. 83
Convention108 refers in its denition of a controller to a further aspect of controller- ship which requires consideration. This denition refers to the question of who may lawfully process certain data for a certain purpose. However, where allegedly illegal processing operations take place and the responsible controller must be found, it will be the person or entity, such as a company or an authority, who decided that the data should be processed, irrespective of whether it was legally entitled to do so or not 84 that will be considered the controller. A request for deletion must therefore always be addressed to the factual controller. Joint controllership The definition of controller in the Data Protection Directive provides that there might also be several legally separate entities who together or jointly with others act as controller. This means that they decide together to process data for a shared 80 Ibid., para.27. 81 Ibid., para.47. 82 Data Protection Directive, Art.2(d). 83 Convention108, Art.2(d). 84 See also Article29 Working Party (2010), Opinion 1/2010 on the concepts of controller and processor, WP169, Brussels, 16February2010, p.15. Data protection terminology 51 purpose. 85 This is legally possible, however, only in cases where a special legal basis provides for processing the data jointly for a common purpose. Example: A database run jointly by several credit institutions on their default- ing customers is a common example of joint controllership. When someone applies for a credit line from a bank that is one of the joint controllers, the banks check the database to help them make informed decisions about the applicants creditworthiness. Regulations do not explicitly state whether joint controllership requires the shared purpose to be the same for each of the controllers or whether it is sufcient if their purposes only partly overlap. However, no relevant jurisprudence is yet available at the European level and there is also no clarity about the consequences concerning liability. The Article29 Working Party advocates a broader interpretation of the con- cept of joint controllership with the aim of allowing some exibility in order to cater for the increasing complexity of current data-processing reality. 86 A case involving the Society for Worldwide Interbank Financial Telecommunication(SWIFT) illustrates the Working Partys position. Example: In the so-called SWIFT case, European banking institutions employed SWIFT, initially as a processor, to operate data transfer in the course of banking transactions. SWIFT disclosed such banking transaction data, stored in a com- puting service centre in the United States(US), to the USTreasury Department without being explicitly ordered to do so by the European banking institutions that employed it. The Article29 Working Party, when evaluating the lawful- ness of this situation, came to the conclusion that the European banking institu- tions employing SWIFT, as well as SWIFT itself, had to be seen as joint control- lers responsible to European customers for the disclosure of their data to the USauthorities. 87 SWIFT had, by deciding about disclosure, assumed unlawfully the role of controller; the banking institutions had evidently fallen short of their obligation to supervise their processor and therefore could not be completely absolved from their responsibility as controllers. This situation results in joint controllership. 85 Data Protection Directive, Art.2(d). 86 Article29 Working Party (2010), Opinion 1/2010 on the concepts of controller and processor, WP169, Brussels, 16February2010, p.19. 87 Article29 Working Party (2006), Opinion 10/2006 on the processing of personal data by the Society for Worldwide Interbank Financial Telecommunication (SWIFT), WP128, Brussels, 22November2006. Handbook on European data protection law 52 Processor A processor is dened under EUlaw as someone who processes personal data on behalf of a controller. 88 The activities entrusted to a processor may be limited to a very specic task or context or may be quite general and comprehensive. Under CoElaw, the meaning of a processor is the same as under EUlaw. Processors, besides processing data for others, will also be data controllers in their own right in relation to the processing they perform for their own purposes, e.g. the administration of their own employees, sales and accounts. Examples: The Everready company specialises in data processing for the admin- istration of human resource data for other companies. In this function, Ever- ready is a processor. Where Everready processes the data of its own employees, however, it is the controller of data-processing operations for the purpose of fullling its obliga- tions as an employer. The relationship between controller and processor As we have seen, the controller is dened as the one who determines the purposes and the means of processing. Example: The director of the Sunshine company decides that the Moonlight company, a specialist in market analysis, should conduct a market analysis of Sunshines customer data. Although the task of determining the means of pro- cessing will thus be delegated to Moonlight, the Sunshine company remains the controller and Moonlight is only a processor, as, according to the contract, Moonlight may use the customer data of the Sunshine company only for the purposes Sunshine determines. If the power to determine the means of processing is delegated to a processor, the controller must nonetheless be able to interfere with the decisions of the processor regarding the means of processing. Overall responsibility still lies with the controller, 88 Data Protection Directive, Art.2(e). Data protection terminology 53 who must supervise the processors to ensure that their decisions comply with data protection law. A contract forbidding the controller to interfere with the decisions of the processor would, therefore, probably be construed as resulting in joint controller- ship, with both parties sharing the legal responsibility of a controller. Furthermore, should a processor not honour the limitations of data use as prescribed by the controller, the processor will have become a controller at least to the extent of the breach of the controllers instructions. This will most likely make the proces- sor a controller, who acts unlawfully. In turn, the initial controller will have to explain how it was possible for the processor to breach its mandate. Indeed, the Article29 Working Party tends to presume joint controllership in such cases, since this results in the best protection of the data subjects interests. 89 An important consequence of joint controllership should be joint and several liability for damages, affording the data subjects a wider range of remedies. There may also be issues about the division of responsibility where a controller is a small enterprise and the processor is a large corporate company which has the power to dictate the conditions of its services. In such circumstances, however, the Article29 Working Party maintains that the standard of responsibility should not be lowered on the ground of economic imbalance and that the understanding of the concept of controller must be maintained. 90 For the sake of clarity and transparency, the details of the relationship between a controller and a processor should be recorded in a written contract. 91 Having no such contract is an infringement of the controllers obligation to provide written docu- mentation of mutual responsibilities, and could lead to sanctions. 92 Processors might want to delegate certain tasks to additional sub-processors. This is legally permissible and will depend in detail on the contractual stipulations between the controller and the processor, including whether the controllers authorisation is necessary in every single case, or whether informing alone is sufcient. 89 Article29 Working Party (2010), Opinion 1/2010 on the concepts of controller and processor, WP169, Brussels, 16February2010, p.25; and Article29 Working Party (2006), Opinion 10/2006 on the processing of personal data by the Society for Worldwide Interbank Financial Telecommunication (SWIFT), WP128, Brussels, 22November2006. 90 Article29 Working Party (2010), Opinion 1/2010 on the concepts of controller and processor, WP169, Brussels, 16February2010, p.26. 91 Data Protection Directive, Art.17(3) and(4). 92 Article29 Working Party (2010), Opinion 1/2010 on the concepts of controller and processor, WP169, Brussels, 16February2010, p.27. Handbook on European data protection law 54 Under CoElaw, the interpretation of the concepts of controller and processor, as explained above, is fully applicable, as is demonstrated by the recommendations which have been developed pursuant to Convention108. 93 2.3.2. Recipients and third parties The difference between these two categories of persons or entities, which were introduced by the Data Protection Directive, lies mainly in their relationship to the controller and, consequently, in their authorisation to access personal data held by the controller. A third party is someone who is legally different from the controller. Disclosing data to a third party will, therefore, always need a specic legal basis. According to Arti- cle2(f) of the Data Protection Directive, a third party is any natural or legal person, public authority, agency or any other body other than the data subject, the control- ler, the processor and the persons who, under the direct authority of the control- ler or the processor, are authorized to process the data. This means that persons working for an organisation which is legally different from the controller even if it belongs to the same group or holding company will be (or belong toa) third party. On the other hand, branches of a bank processing customers accounts under the direct authority of their headquarters would not be third parties. 94 Recipient is a broader term than third party. In the meaning of Article2(g) of the Data Protection Directive, a recipient means a natural or legal person, public author- ity, agency or any other body to whom data are disclosed, whether a third party or not. This recipient may either be a person outside the controller or processor this would then be a third party or someone inside the controller or processor, such as an employee or another division within the same company or authority. The distinction between recipients and third parties is important only because of the conditions for lawful disclosure of data. The employees of a controller or proces- sor may without further legal requirement be recipients of personal data if they are involved in the processing operations of the controller or processor. On the other hand, a third party, being legally separate from the controller or processor, is not authorised to use personal data processed by the controller, unless on specic legal 93 See, for example, Proling Recommendation, Art.1. 94 Article29 Working Party (2010), Opinion 1/2010 on the concept of controller and processor, WP169, Brussels, 16February2010, p.31. Data protection terminology 55 grounds in a specic case. Third-party recipients of data will, therefore, always need a legal basis for lawfully receiving personal data. Example: A processors employee, who uses personal data within the remit of tasks the employer entrusted to him or her, is a recipient of data, but not a third party, as he or she uses the data in the name and under the instructions of the processor. If, however, the same employee decides to use the data, which he or she is able to access as an employee of the processor, for his or her own purposes and sells them to another company, then the employee has acted as a third party. He or she is no longer following the orders of the processor (the employer). As a third party, the employee would need a legal basis for acquiring and selling the data. In this example, the employee certainly does not possess such a legal basis, so these actions are illegal. 2.4. Consent Key points Consent as a legal basis for processing personal data must be free, informed and specic. Consent must have been given unambiguously. Consent may either be given explicitly or implied by acting in a way which leaves no doubt that the data subject agrees to the processing of his or her data. Processing sensitive data on the basis of consent requires explicit consent. Consent can be withdrawn at any time. Consent means any freely given specic and informed indication of the data sub- jects wishes. 95 It is, in numerous cases, the legal basis for legitimate data process- ing (see Section4.1). 95 Data Protection Directive, Art.2(h). Handbook on European data protection law 56 2.4.1. The elements of valid consent EUlaw sets out three elements for consent to be valid, which aim to guarantee that data subjects truly meant to agree to the use of their data: the data subject must have been under no pressure when consenting; the data subject must have been duly informed about the object and conse- quences of consenting; and the scope of consent must be reasonably concrete. Only if all of these requirements are fullled will consent be valid in the sense of the data protection law. Convention108 does not contain a denition for consent; this is left to domestic law. However, under CoElaw, the elements of valid consent correspond to those explained earlier, as it is provided by the recommendations which have been devel- oped pursuant to Convention108. 96 The requirements for consent are the same as for a valid declaration of intention under European civil law. Additional requirements under civil law for valid consent, such as legal capacity, nat- urally apply also in the context of data protection, as such requirements are funda- mental legal prerequisites. Invalid consent of persons who do not have legal capac- ity will result in the absence of a legal basis for processing data about such persons. The consent can be given either explicitly 97 or non-explicitly. The former leaves no doubt about the intentions of the data subject and can be made either orally or in writing; the latter is concluded from the circumstances. Every consent must be given in an unambiguous way. 98 This means that there should be no reasonable doubt that the data subject wanted to communicate his or her agreement to allow processing of his or her data. Deducing consent from mere inactivity is not capable of deliver- ing unambiguous consent, for example. Where data to be processed are sensitive, explicit consent is mandatory and must be unambiguous. 96 See, for example, Convention 108, Statistical Data Recommendation, point6. 97 Data Protection Directive, Art.8(2). 98 Ibid., Art.7(a) and Art.26(1). Data protection terminology 57 Free consent The existence of free consent is valid only if the data subject is able to exercise a real choice and there is no risk of deception, intimidation, coercion or signicant negative consequences if he/she does not consent. 99 Example: In many airports, passengers need to go through body scanners in order to enter the boarding area. 100 Given that passengers data are processed during scanning, the processing must comply with one of the legal grounds under Article7 of the Data Protection Directive (see Section4.1.1). Going through body scanners is sometimes presented to passengers as an option, implying that their consent could justify the processing. Passengers might, how- ever, fear that their refusal to go through body scanners will create suspicion, or trigger additional controls, such as body searches. Many passengers consent to being scanned because by so doing they avoid potential problems or delays. Such consent is presumably not sufciently free. Therefore, a sound legitimate basis can only be found in an act of the legislator, based on Article7(e) of the Data Protection Directive, resulting in an obligation for passengers to cooperate because of overriding public interest. Such legisla- tion could still provide for a choice between scanning and pat-down, but only as part of additional measures of border control necessary under particular cir- cumstances. This is what the European Commission set out in two regulations covering security scanners in2011. 101 99 See also Article29 Working Party (2011), Opinion 15/2011 on the notion of consent, WP187, Brussels, 13July2011, p.12. 100 This example is taken from Ibid., p.15. 101 Commission Regulation (EU) No.1141/2011 of 10November2011 amending Regulation (EC) No.272/2009 supplementing the common basic standards on civil aviation security as regards the use of security scanners at EU airports, OJ2011L293, and Commission Implementing Regulation (EU) No.1147/2011 of 11November2011 amending Regulation (EU) No.185/2010 implementing the common basic standards on civil aviation security as regards the use of security scanners at EU airports, OJ2011L294. Handbook on European data protection law 58 Free consent could also be threatened in situations of subordination where there is a signicant economic or other imbalance between the controller securing consent and the data subject providing consent. 102 Example: A large company plans to create a directory containing the names of all employees, their function in the company and their business addresses, solely to improve internal company communications. The head of personnel proposes adding a photo of each employee to the directory to, for example, make it easier to recognise colleagues at meetings. Employees representatives demand that this should be done only if the individual employee consents. In such a situation, an employees consent should be acknowledged as the legal basis for processing the photos in the directory because it is clear that having a photo published in the directory does not have negative consequences in itself and, moreover, it is credible that the employee will not have to encounter nega- tive effects initiated by the employer if he or she does not agree to have his or her photo published in the directory. This does not mean, however, that consent can never be valid in circumstances where not consenting would have negative consequences. If, for instance, not con- senting to having a supermarkets customer card results only in not receiving deduc- tions from prices of certain goods, consent is still a valid legal basis for processing personal data of those customers who consented to having such a card. There is no situation of subordination between company and customer and, the consequences of not consenting are not serious enough for the data subject to prevent free choice. On the other hand, whenever sufficiently important goods or services can be obtained only and exclusively if certain personal data are disclosed to third parties, consent of the data subject to the disclosure of his or her data can usually not be considered a free decision and is, therefore, not valid under data protection law. Example: Agreement expressed by passengers to an airline that it transfers so- called passengernamerecords (PNR), namely data about their identity, eating habits or health problems to the immigration authorities of a specic foreign 102 See also Article29 Working Party (2001), Opinion 8/2001 on the processing of personal data in the employment context, WP48, Brussels, 13September2001; and Article29 Working Party (2005), Working document on a common interpretation of Article26(1) of Directive 95/46/EC of 24October1995, WP114, Brussels, 25November2005. Data protection terminology 59 country cannot be considered as valid consent under data protection law, as the travelling passengers have no choice if they want to visit this country. If such data are to be transferred lawfully, another legal basis than consent is required: most likely a special law. Informed consent The data subject must have sufcient information before taking his or her decision. Whether or not the information given is sufcient can be decided only on a case-by- case basis. Usually, informed consent will comprise a precise and easily understand- able description of the subject matter requiring consent and, additionally, outline the consequences of consenting or not consenting. The language used for information should be adapted to the foreseeable addressees of the information. Information must also be easily available to the data subject. Accessibility and vis- ibility of the information are important elements. In an online environment, layered information notices may be a good solution, as, in addition to a concise version of information, a more extensive version can also be accessed by the data subject. Specic consent To be valid, consent must also be specic. This goes hand in hand with the qual- ity of information given about the object of consent. In this context, the reasonable expectations of an average data subject will be relevant. The data subject must be asked again for consent if processing operations are to be added or changed in a way which could not reasonably have been foreseen when the initial consent was given. Example: In Deutsche Telekom AG, 103 the CJEU dealt with the question of whether a telecom provider that had to pass on personal data of subscribers under Article12 of the Directive on privacy and electronic communications 104
needed renewed consent from the data subjects, as the recipients were not originally named when consent was given. 103 CJEU, C-543/09, Deutsche Telekom AG v. Germany, 5May2011; see especially paras.53 and54. 104 Directive 2002/58/EC of the European Parliament and of the Council of 12July2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector, OJ2002L201 (Directive on privacy and electronic communications). Handbook on European data protection law 60 The CJEU held that under that article renewed consent before passing on the data was not necessary because the data subjects had, under this provision, the possibility of consenting only to the purpose of the processing, which is the publication of their data, and could not choose between different directories in which these data might be published. As the Court underlined, it follows from a contextual and systematic interpre- tation of Article12 of the Directive on privacy and electronic communications that the consent under Article12(2) relates to the purpose of the publication of personal data in a public directory and not to the identity of any particular direc- tory provider. 105 Moreover, it is the publication itself of the personal data in a public directory with a specic purpose which may turn out to be detrimental for a subscriber 106 and not who is the author of this publication. 2.4.2. The right to withdraw consent at any time The Data Protection Directive does not mention a general right to withdraw consent at any time. It is widely presumed, however, that such a right exists and that it must be possible for the data subject to exercise it at his or her discretion. There should be no requirement to give reasons for withdrawal and no risk of negative conse- quences over and above the termination of any benets which may have derived from the previously agreed data use. Example: A customer agrees to receive promotional mail to an address he or she provides to a data controller. Should the customer withdraw consent, the controller must immediately stop sending promotional mail. Nopunitive conse- quences such as fees should be imposed. If the customer was receiving a 5% reduction on the cost of a hotel room in return for agreeing to the use of his or her data for promotional mail, the with- drawal of consent to receiving promotional mail at a later stage should not result in having to pay back those reductions. 105 CJEU, C-543/09, Deutsche Telekom AG v. Germany, 5May2011; see especially para.61. 106 Ibid., see especially para.62. 61 EU Issues covered CoE Data Protection Directive, Article6(1)(a) and(b) CJEU, C-524/06, Huber v. Germany, 16December2008 CJEU, Joined cases C-92/09 and C-93/09, Volker and Markus Schecke GbR and Hartmut Eifert v. Land Hessen, 9November2010 The principle of lawful processing Convention108, Article5(a) and(b) ECtHR, Rotaru v. Romania [GC], No.28341/95, 4May2000 ECtHR, Taylor-Sabori v. the United Kingdom, No.47114/99, 22October2002 ECtHR, Peck v. the UnitedKingdom, No.44647/98, 28January2003 ECtHR, Khelili v. Switzerland, No.16188/07, 18October2011 ECtHR, Leander v. Sweden, No.9248/81, 26March1987 Data Protection Directive, Article6(1)(b) The principle of purpose specication and limitation Convention108, Article5(b) The data quality principles: Data Protection Directive, Article6(1)(c) Relevancy of data Convention108, Article5(c) Data Protection Directive, Article6(1)(d) Accuracy of data Convention108, Article5(d) The key principles ofEuropean data protection law 3 Handbook on European data protection law 62 Data Protection Directive, Article6(1)(e) Limited retention of data Convention108, Article5(e) Data Protection Directive, Article6(1)(e) Exemption for scientic research and statistics Convention108, Article9(3) Data Protection Directive, Article6(1)(a) The principle of fair processing Convention108, Article5(a) ECtHR, Haralambie v. Romania, No.21737/03, 27October2009 ECtHR, K.H. and Others v. Slovakia, No.32881/04, 28April2009 Data Protection Directive, Article6(2) The principle ofaccountability The principles set out in Article5 of Convention108 enshrine the essence of Euro- pean data protection law. They appear also in Article6 of the Data Protection Direc- tive as the starting point for more detailed provisions in the subsequent articles of the directive. All later data protection legislation at the CoE or EU level must comply with these principles and they must be kept in mind when interpreting such legisla- tion. Any exemptions from and restrictions to these key principles may be provided for at national level; 107 they must be provided for by law, pursue a legitimate aim and be necessary in a democratic society. All three conditions must be fullled. 3.1. The principle of lawful processing Key points In order to understand the principle of lawful processing, one has to refer to conditions for lawful limitations of the right to data protection in light of Article52(1) of the Char- ter and requirements of justied interference under Article8(2)ECHR. Accordingly, the processing of personal data is lawful only ifit: is in accordance with the law; and pursues a legitimate purpose; and is necessary in a democratic society in order to achieve the legitimate purpose. 107 Convention108, Art.9(2); Data Protection Directive, Art.13 (2). The key principles ofEuropean data protection law 63 Under EU and CoE data protection law, the principle of lawful processing is the rst named principle; it is expressed in nearly identical terms in Article5 of Conven- tion108 and in Article6 of the Data Protection Directive. Neither of these provisions contains a denition of what constitutes lawful process- ing. In order to understand this legal term, it is necessary to refer to justied inter- ference under the ECHR as interpreted by the jurisprudence of the ECtHR and condi- tions for lawful limitations under Article52 of the Charter. 3.1.1. The requirements for a justied interference under the ECHR The processing of personal data may constitute an interference with the right to respect for private life of the data subject. The right to respect for private life is, however, not an absolute right but must be balanced against and reconciled with other legitimate interests, be they of other persons (private interests) or of society as a whole (public interests). The conditions upon which state interference is justied are the following. In accordance with the law According to the jurisprudence of the ECtHR, interference is in accordance with the law if it is based on a provision of domestic law, which has certain qualities. The law must be accessible to the persons concerned and foreseeable as to its effects. 108
A rule is foreseeable if it is formulated with sufcient precision to enable any indi- vidual if need be with appropriate advice to regulate his conduct. 109 The degree of precision required of the law in this connection will depend on the particular subject-matter. 110 108 ECtHR, Amann v. Switzerland [GC], No.27798/95, 16February2000, para.50; see also ECtHR, Kopp v. Switzerland, No.23224/94, 25March1998, para.55 and ECtHR, Iordachi and Others v. Moldova, No.25198/02, 10February2009, para.50. 109 ECtHR, Amann v. Switzerland [GC], No.27798/95, 16February2000, para.56; see also ECtHR, Malone v. the UnitedKingdom, No.8691/79, 2August1984, para.66; ECtHR, Silver and Others v. the UnitedKingdom, Nos.5947/72, 6205/73, 7052/75, 7061/75, 7107/75, 7113/75, 25March1983, para.88. 110 ECtHR, The Sunday Times v. the UnitedKingdom, No.6538/74, 26April1979, para.49; see also ECtHR, Silver and Others v. the UnitedKingdom, Nos.5947/72, 6205/73, 7052/75, 7061/75, 7107/75, 7113/75, 25March1983, para.88. Handbook on European data protection law 64 Example: In Rotaru v. Romania, 111 the ECtHR found a violation of Article8 of the ECHR because Romanian law allowed for gathering, recording and archiving in secret les of information affecting national security without laying down lim- its on the exercise of those powers, which remained at the discretion of the authorities. For example, domestic law did not dene the type of information that could be processed, the categories of people against whom surveillance measures could be taken, the circumstances in which such measures could be taken or the procedure to be followed. Because of these deciencies, the Court concluded that domestic law did not comply with the requirement of foresee- ability under Article8 of the ECHR and that that Article had been violated. Example: In Taylor-Sabori v. the United Kingdom, 112 the applicant had been the target of surveillance by the police. Using a clone of the applicants pager, the police were able to intercept messages sent to him. The applicant was then arrested and charged with conspiracy to supply a controlled drug. Part of the prosecutions case against him consisted of the contemporaneous written notes of the pager messages which had been transcribed by the police. However, at the time of the applicants trial, there was no provision in British law govern- ing the interception of communications transmitted via a private telecommu- nications system. The interference with his rights had therefore not been in accordance with the law. The ECtHR concluded that there had been a violation of Article8 of theECHR. Pursuing a legitimate aim The legitimate aim may be either one of the named public interests or the rights and freedoms of others. Example: In Peck v. the UnitedKingdom, 113 the applicant attempted suicide on the street by cutting his wrists, unaware that a CCTV camera had lmed him during the attempt. After police, who were watching the CCTV cameras, rescued him, the police authority passed the CCTV footage to the media which published it without masking the applicants face. The ECtHR found that there were no 111 ECtHR, Rotaru v. Romania [GC], No.28341/95, 4May2000, para.57; see also ECtHR, Association for European Integration and Human Rights and Ekimdzhiev v. Bulgaria, No.62540/00, 28June2007; ECtHR, Shimovolos v. Russia, No.30194/09, 21June2011; and ECtHR, Vetter v. France, No.59842/00, 31May2005. 112 ECtHR, Taylor-Sabori v. the United Kingdom, No.47114/99, 22October2002. 113 ECtHR, Peck v. the UnitedKingdom, No.44647/98, 28January2003, especially para.85. The key principles ofEuropean data protection law 65 relevant or sufcient reasons which would justify the direct disclosure of the footage by the authorities to the public without having obtained the applicants consent or masking his identity. The Court concluded that there had been a vio- lation of Article8 of the ECHR. Necessary in a democratic society The ECtHR has stated that the notion of necessity implies that the interference cor- responds to a pressing social need and, in particular, that it is proportionate to the legitimate aim pursued. 114 Example: In Khelili v. Switzerland, 115 during a police check the police found the applicant to be carrying calling cards which read: Nice, pretty woman, late thir- ties, would like to meet a man to have a drink together or go out from time to time. Tel.no.[...]. The applicant alleged that, following that discovery, the police entered her name in their records as a prostitute, an occupation which she consistently denied. The applicant requested that the word prostitute be deleted from the police computer records. The ECtHR acknowledged in princi- ple that retaining an individuals personal data, on the ground that that person might commit another offence, might under certain circumstances be propor- tionate. However, in the applicants case, the allegation of unlawful prostitution appeared too vague and general, was not supported by concrete facts since she had never been convicted of unlawful prostitution and could therefore not be considered to meet a pressing social need within the meaning of Article8of the ECHR. Regarding it as a matter for the authorities to prove the accuracy of the data stored on the applicant, and to the seriousness of the interference with the applicants rights, the Court ruled that retention of the word prostitute in the police les for years had not been necessary in a democratic society. The Court concluded that there had been a violation of Article8of the ECHR. Example: In Leander v. Sweden, 116 the ECtHR ruled that secret scrutiny of per- sons applying for employment in posts of importance for national security was not, in itself, contrary to the requirement of being necessary in a democratic society. The special safeguards laid down in national law for protecting the interests of the data subject for example, controls exercised by parliament and 114 ECtHR, Leander v. Sweden, No.9248/81, 26March1987, para.58. 115 ECtHR, Khelili v. Switzerland, No.16188/07, 18October2011. 116 ECtHR, Leander v. Sweden, No.9248/81, 26March1987, paras.59 and67. Handbook on European data protection law 66 the Chancellor of Justice resulted in the ECtHRs conclusion that the Swedish personnel control system met the requirements of Article8(2) of the ECHR. Having regard to the wide margin of appreciation available to it, the respond- ent state was entitled to consider that in the applicants case the interests of national security prevailed over the individual ones. The Court concluded that there had not been a violation of Article8 of theECHR. 3.1.2. The conditions for lawful limitations undertheEU Charter The structure and wording of the Charter is different from that of the ECHR. The Charter does not talk about interferences with guaranteed rights but it contains a provision on limitation(s) on the exercise of the rights and freedoms recognised by the Charter. According to Article52(1), limitations on the exercise of the rights and freedoms recognised by the Charter and, accordingly on the exercise of the right to the protec- tion of personal data, such as the processing of personal data, are admissible only if they: are provided for by law; and respect the essence of the right to data protection; and are necessary, subject to the principle of proportionality; and meet objectives of general interest recognised by the Union or the need to pro- tect the rights and freedoms of others. Examples: In Volker and Markus Schecke, 117 the CJEU concluded that by imposing an obligation to publish personal data relating to each natural person who was a beneciary of aid from [certain agricultural funds] without drawing a distinc- tion based on relevant criteria such as the periods during which those persons received such aid, the frequency of such aid or the nature and amount thereof, 117 CJEU, Joined cases C-92/09 and C-93/09, Volker and Markus Schecke GbR and Hartmut Eifert v. Land Hessen, 9November2010, paras.89 and86. The key principles ofEuropean data protection law 67 the Council and the Commission had exceeded the limits imposed by the princi- ple of proportionality. Therefore, the CJEU found it necessary to declare invalid certain provisions of Council Regulation (EC) No.1290/2005 and to declare Regulation No.259/2008 invalid in its entirety. 118 In spite of the different wording, conditions for lawful processing in Article52(1) of the Charter are reminiscent of Article8(2)of the ECHR. Indeed, the conditions enu- merated in Article52(1) of the Charter must be seen to comply with those named in Article8(2)of the ECHR, as Article52(3) of the Charter states, in its rst sentence, that, in so far as the Charter contains rights which correspond to rights guaranteed by the Convention for the Protection of Human Rights and Fundamental Freedoms, the meaning and scope of those rights shall be the same as those laid down by the said Convention. However, pursuant to the last sentence of Article52(3), this provision shall not prevent Union law providing more extensive protection. In the context of compar- ing Article8(2)of the ECHR and the rst sentence of Article52(3), this can only mean that the conditions for justied interferences according to Article8(2)of the ECHR are the minimum requirements for the lawful limitations of the right to data protection according to the Charter. Consequently, lawful processing of personal data requires under EUlaw that the conditions of Article8(2) of the ECHR at the least be fullled; EUlaw could, however, lay down additional requirements for specic cases. Correspondence of the principle of lawful processing under EUlaw with the relevant provisions of the ECHR is further promoted by Article6(3) of the TEU, providing that fundamental rights, as guaranteed by the European Convention for the Protection of Human Rights and Fundamental Freedoms [], shall constitute general principles of the Unions law. 118 Council Regulation (EC) No.1290/2005 of 21June2005 on the nancing of the common agricultural policy, OJ2005L209; Commission Regulation (EC) No.259/2008 of 18March2008 laying down detailed rules for the application of Council Regulation (EC) No.1290/2005 as regards the publication of information on the beneciaries of funds deriving from the European Agricultural Guarantee Fund (EAGF) and the European Agricultural Fund for Rural Development (EAFRD), OJ2008L76. Handbook on European data protection law 68 3.2. The principle of purpose specication and limitation Key points The purpose of processing data must be visibly dened before processing is started. Under EUlaw, the purpose of processing must be explicitly dened; under CoElaw, this question is left to domesticlaw. Processing for undened purposes is not compliant with data protectionlaw. Further use of data for another purpose needs an additional legal basis if the new pur- pose of processing is incompatible with the originalone. Transfer of data to third parties is a new purpose needing an additional legalbasis. In essence, the principle of purpose specication and limitation means that the legit- imacy of processing personal data will depend on the purpose of the processing. 119
The purpose must have been specied and made manifest by the controller before the processing of data starts. 120 Under EUlaw, this must be done either by declara- tion, in other words by notication, to the appropriate supervisory authority or, at the least, by internal documentation which must be made available by the controller for inspection by the supervisory authorities and access by the data subject. The processing of personal data for undefined and/or unlimited purposes is unlawful. Every new purpose for processing data must have its own particular legal basis and cannot rely on the fact that the data were initially acquired or processed for another legitimate purpose. In turn, legitimate processing is limited to its initially specied purpose and any new purpose of processing will require a separate new legal basis. Disclosure of data to third parties will have to be considered especially carefully, as disclosure will usually constitute a new purpose and therefore require a legal basis, distinct from the one for collecting thedata. 119 Convention108, Art.5(b); Data Protection Directive, Art.6(1)(b). 120 See also Article29 Working Party (2013), Opinion 03/2013 on purpose limitation, WP203, Brussels, 2April2013. The key principles ofEuropean data protection law 69 Example: An airline collects data from its passengers to make bookings to oper- ate the ight properly. The airline will need data on: passengers seat numbers; special physical limitations, such as wheelchair needs; and special food require- ments, such as kosher or halal food. If airlines are asked to transfer these data, which are contained in the PNR, to the immigration authorities at the port of landing, these data are then being used for immigration control purposes, which differ from the initial data collection purpose. Transfer of these data to an immi- gration authority will therefore require a new and separate legal basis. When considering the scope and limits of a particular purpose, Convention108 and the Data Protection Directive resort to the concept of compatibility: the use of data for compatible purposes is allowed on the ground of the initial legal basis. What compatible means, however, is not dened and is left open to interpretation on a case-by-case basis. Example: I Selling the Sunshine companys customer data, which it acquired in the course of customer relations management (CRM), to a direct marketing company, the Moonlight company, which wants to use these data to assist the marketing campaigns of third companies, is a new purpose, which is incompat- ible with CRM, the Sunshine companys initial purpose for collecting the cus- tomer data. The sale of the data to the Moonlight company therefore needs its own legal basis. In contrast, the Sunshine companys use of CRM data for its own marketing pur- poses, that is sending marketing messages to its own customers for its own products, is generally accepted as a compatible purpose. The Data Protection Directive explicitly declares that the further processing of data for historical, statistical or scientic purposes shall not be considered as incompatible provided that Member States provide appropriate safeguards. 121 Examples: The Sunshine company has collected and stored CRM data about its customers. Further use of these data by the Sunshine company for a statisti- cal analysis of the buying behaviour of its customers is permissible, as statistics 121 An example of such national provisions is the Austrian Data Protection Act (Datenschutzgesetz), FederalLaw Gazette No.165/1999, para.46, available in English at: www.dsk.gv.at/DocView. axd?CobId=41936. Handbook on European data protection law 70 are a compatible purpose. No additional legal basis, such as consent of the data subjects, is needed. If the same data were to be passed on to a third party, the Starlight company, for exclusively statistical purposes, passing on would be permissible without additional legal basis, but only on the condition that appropriate safeguards were in place, such as masking the identity of the data subjects, as identities are usually not needed for statistical purposes. 3.3. Data quality principles Key points The principles of data quality must be implemented by the controller in all processing operations. The principle of limited retention of data makes it necessary to delete data as soon as they are no longer needed for the purposes for which they were collected. Exemptions from the principle of limited retention must be set out by law and need special safeguards for the protection of data subjects. 3.3.1. The data relevancy principle Only such data shall be processed as are adequate, relevant and not excessive in relation to the purpose for which they are collected and/or further processed. 122
The categories of data chosen for processing must be necessary in order to achieve the declared overall aim of the processing operations, and a controller should strictly limit collection of data to such information as is directly relevant for the specic pur- pose pursued by the processing. In contemporary society, the principle of data relevancy has an additional considera- tion: by making use of special privacy-enhancing technology, it is sometimes pos- sible to avoid using personal data at all, or to use pseudonymised data, which results in a privacy-friendly solution. This is particularly appropriate in more extensive pro- cessing systems. 122 Convention108, Art.5(c); and Data Protection Directive, Art.6(1)(c). The key principles ofEuropean data protection law 71 Example: A town council offers a chip card to regular users of the towns public transport system for a certain fee. The card carries the name of the user in writ- ten form on the cards surface and also in electronic form in the chip. When- ever a bus or tram is used, the chip card must be passed in front of the reading devices installed, for example, in buses and trams. The data read by the device are electronically checked against a database containing the names of the peo- ple who have bought the travel card. This system does not adhere to the relevancy principle in an optimal way: checking whether an individual is allowed to use transport facilities could be accommodated without comparing the personal data on the cards chip with a database. It would sufce, for instance, to have a special electronic image, such as a bar code, in the chip of the card which, upon being passed in front of the reading device, would conrm whether the card is valid or not. Such a sys- tem would not record who used which transport facility at what time. No per- sonal data would be collected, which is the optimal solution in the sense of the relevancy principle, as this principle results in the obligation to minimise data collection. 3.3.2. The data accuracy principle A controller holding personal information shall not use that information without tak- ing steps to ensure with reasonable certainty that the data are accurate and up to date. The obligation to ensure accuracy of data must be seen in the context of the pur- pose of data processing. Example: A furniture sales company collected a customers identity and address data in order to bill him or her. Six months later, the same company wants to start a marketing campaign and wishes to contact former customers. In order to reach them, the company wants to access the national residents register, which is likely to contain updated addresses, as residents are legally obliged to inform the register of their current address. Access to the data of this register is limited to persons who, and entities that, can provide a justifying reason. In this situation, the company cannot use the argument that data must be kept accurate and up to date to maintain that it is entitled to collect new address Handbook on European data protection law 72 data on all its former customers from the residents register. The data were col- lected in the course of billing; for this purpose, the address at the time of sale is relevant. There is no legal basis for collecting new address data, as marketing is not an interest which overrides the right to data protection and therefore cannot justify accessing the registers data. There may also be cases where updating stored data is legally prohibited, because the purpose of storing the data is principally to document events. Example: A medical operation protocol must not be changed, in other words updated, even if ndings mentioned in the protocol later on turn out to have been wrong. In such circumstances, only additions to the remarks in the proto- col may be made, as long as they are clearly marked as contributions made at a later stage. On the other hand, there are situations where regular checking of the accuracy of data, including updating, is an absolute necessity because of the potential damage which might be caused to the data subject if data were to remain inaccurate. Example: If somebody wants to conclude a contract with a banking institution, the bank will usually check the creditworthiness of the prospective customer. For this purpose, there are special databases available containing data on the credit history of private individuals. If such a database provides incorrect or out- dated data about an individual, this person may encounter serious problems. Controllers of such databases must therefore make special efforts to follow the principle of accuracy. Further, data which relate not to facts, but to suspicions, such as criminal investi- gations, may be collected and stored as long as the controller has a legal basis for collecting such information and is sufficiently justified in having formed such a suspicion. 3.3.3. The limited retention of data principle Article6 (1)(e) of the Data Protection Directive and, likewise, Article5(e) of Conven- tion108 require Member States to ensure that personal data are kept in a form which permits identication of data subjects for no longer than is necessary for the The key principles ofEuropean data protection law 73 purposes for which the data were collected or for which they are further processed. The data must therefore be erased when those purposes have been served. In S. and Marper, the ECtHR concluded that the core principles of the relevant instru- ments of the Council of Europe, and the law and practice of the other Contracting Parties, required retention of data to be proportionate in relation to the purpose of collection and limited in time, particularly in the police sector. 123 The time limitation for storing personal data applies, however, only to data kept in a form which permits identication of data subjects. Lawful storage of data which are no longer needed, could, therefore, be achieved by anonymisation of the data or pseudonymisation. Keeping data for future scientic, historical or statistical use is explicitly exempt from the principle of limited data retention in the Data Protection Directive. 124 Such ongo- ing storage and use of personal data must, however, be accompanied by special safeguards under nationallaw. 3.4. The fair processing principle Key points Fair processing means transparency of processing, especially vis--vis data subjects. Controllers must inform data subjects before processing their data, at least about the purpose of processing and about the identity and address of the controller. Unless specically permitted by law, there must be no secret and covert processing of personal data. Data subjects have the right to access their data wherever they are processed. The principle of fair processing governs primarily the relationship between the con- troller and the data subject. 123 ECtHR, S. and Marper v. the UnitedKingdom, Nos.30562/04 and 30566/04, 4December2008; see also, for example: ECtHR, M.M. v. the UnitedKingdom, No.24029/07, 13November2012. 124 Data Protection Directive, Art.6(1)(e). Handbook on European data protection law 74 3.4.1. Transparency This principle establishes an obligation for the controller to keep the data subjects informed about how their data are beingused. Example: In the case of Haralambie v. Romania, 125 the applicant requested access to the le which the secret service organisation had stored on him, but his request was granted only ve years later. The ECtHR reiterated that indi- viduals who were the subject of personal les held by public authorities had a vital interest in being able to access them. The authorities had a duty to pro- vide an effective procedure for obtaining access to such information. The ECtHR considered that neither the quantity of les transferred nor shortcomings in the archive system justied a delay of ve years in granting the applicants request for access to his les. The authorities had not provided the applicant with an effective and accessible procedure to enable him to obtain access to his per- sonal les within a reasonable time. The Court concluded that there had been a violation of Article8 of theECHR. Processing operations must be explained to the data subjects in an easily accessible way which ensures that they understand what will happen to their data. A data sub- ject also has the right to be told by a controller on request if his or her data are being processed, and, if so, whichones. 3.4.2. Establishing trust Controllers should document, to data subjects and to the general public, that they will process data in a lawful and transparent manner. Processing operations must not be performed in secret and should not have unforeseeable negative effects. Controllers should ensure that customers, clients or citizens are informed about the use of their data. Further, controllers, so far as possible, must act in a way which promptly complies with the wishes of the data subject, especially where his or her consent forms the legal basis for the data processing. Example: In the case of K.H. and Others v. Slovakia, 126 the applicants were eight women of Roma ethnic origin who had been treated in two hospitals in east- ern Slovakia during their pregnancies and deliveries. Afterwards, none of them 125 ECtHR, Haralambie v. Romania, No.21737/03, 27October2009. 126 ECtHR, K.H. and Others v. Slovakia, No.32881/04, 28April2009. The key principles ofEuropean data protection law 75 could conceive a child again despite repeated attempts. The national courts ordered the hospitals to permit the applicants and their representatives to con- sult and make handwritten excerpts of the medical records but dismissed their request to photocopy the documents allegedly with a view to preventing their abuse. The States positive obligations under Article8 of the ECHR necessarily included an obligation to make available to the data subject copies of his or her data les. It was for the State to determine the arrangements for copying per- sonal data les, or, where appropriate, to show compelling reasons for refusing to do so. In the applicants case, the domestic courts justied the prohibition on making copies of medical records principally on the need to protect the relevant information from abuse. However, the ECtHR failed to see how the applicants, who had in any event been given access to their entire medical les, could have abused information concerning themselves. Moreover, the risk of such abuse could have been prevented by means other than denying copies of the les to the applicants, such as by limiting the range of persons entitled to access the les. The State failed to show the existence of sufciently compelling reasons to deny the applicants effective access to information concerning their health. The Court concluded that there had been a violation of Article8. In relation to internet services, the features of data-processing systems must make it possible for data subjects to really understand what is happening with theirdata. Fair processing also means that controllers are prepared to go beyond the manda- tory legal minimum requirements of service to the data subject, should the legiti- mate interests of the data subject so require. 3.5. The principle of accountability Key points Accountability requires the active implementation of measures by controllers to pro- mote and safeguard data protection in their processing activities. Controllers are responsible for the compliance of their processing operations with data protection law. Controllers should be able at any time to demonstrate compliance with data protection provisions to data subjects, to the general public and to supervisory authorities. Handbook on European data protection law 76 The Organisation for Economic Co-operation and Development (OECD) adopted pri- vacy guidelines in2013 that highlighted that controllers have an important role in making data protection work in practice. The guidelines develop an accountability principle to the effect that a data controller should be accountable for complying with measures which give effect to the [material] principles stated above. 127 Whereas Convention108 makes no reference to the accountability of controllers, essentially leaving this topic to domestic law, Article6(2) of the Data Protection Directive states that the controller should ensure compliance with the principles relating to data quality included in paragraph1. Example: A legislative example for stressing the principle of accountability is the 2009 amendment 128 to the Directive on privacy and electronic communications (2002/58/EC). According to Article4 in its amended form, the directive imposes an obligation to implement a security policy, namely to ensure the implemen- tation of a security policy with respect to the processing of personal data. Thus, as far as the security provisions of that directive are concerned, the legislator decided that it was necessary to introduce an explicit requirement to have, and implement, a security policy. According to the Article29 Working Partys opinion, 129 the essence of accountability is the controllers obligation to: put in place measures which would under normal circumstances guarantee that data protection rules are adhered to in the context of processing operations; and have documentation ready which proves to data subjects and to supervisory authorities what measures have been taken to achieve adherence to the data protection rules. 127 OECD (2013), Guidelines on governing the Protection of Privacy and transborder ows of personal data, Art.14. 128 Directive2009/136/EC of the European Parliament and of the Council of 25November2009 amending Directive2002/22/EC on universal service and users rights relating to electronic communications networks and services, Directive2002/58/EC concerning the processing of personal data and the protection of privacy in the electronic communications sector and Regulation (EC) No.2006/2004 on cooperation between national authorities responsible for the enforcement of consumer protection laws, OJ2009L337, p.11. 129 Article29 Working Party, Opinion3/2010 on the principle of accountability, WP173, Brussels, 13July2010. The key principles ofEuropean data protection law 77 The principle of accountability thus requires controllers to actively demonstrate compliance and not merely wait for data subjects or supervisory authorities to point out shortcomings. 79 EU Issues covered CoE Rules on lawful processing of non-sensitive data Data Protection Directive, Article7(a) Consent Proling Recommendation, Articles3.4(b) and3.6 Data Protection Directive, Article7(b) (Pre-)contractual relationship Proling Recommendation, Article3.4(b) Data Protection Directive, Article7(c) Legal duties of the controller Proling Recommendation, Article3.4(a) Data Protection Directive, Article7(d) Vital interests of the data subject Proling Recommendation, Article3.4(b) Data Protection Directive, Article7(e) and Article8(4) CJEU, C-524/06, Huber v. Germany, 16December2008 Public interest and exercise of ofcial authority Proling Recommendation, Article3.4(b) Data Protection Directive, Article7(f), Article 8(2) and 8(3) CJEU, Joined cases C-468/10 and C-469/10, Asociacin Nacional de Establecimientos Financieros de Crdito (ASNEF) and Federacin de Comercio Electrnico y Marketing Directo (FECEMD) v. Administracin del Estado, 24November2011 Legitimate interests of others Proling Recommendation, Article3.4(b) Rules on lawful processing of sensitive data Data Protection Directive, Article8(1) General prohibition to process Convention108, Article6 Data Protection Directive, Article8(2)(4) Exemptions from the general prohibition Convention108, Article6 The rules of European data protection law 4 Handbook on European data protection law 80 Data Protection Directive, Article8(5) Processing data on (criminal) convictions Convention108, Article6 Data Protection Directive Article8(7) Processing identication numbers Rules on secure processing Data Protection Directive, Article17 Obligation to provide for secure processing Convention108, Article7 ECtHR, I. v. Finland, No.20511/03, 17July2008 Directive on privacy and electronic communications, Article4(2) Data breach notications Data Protection Directive, Article16 Obligation to condentiality Rules on transparency of processing Transparency in general Convention108, Article8(a) Data Protection Directive, Articles10 and 11 Information Convention108, Article8(a) Data Protection Directive, Articles10 and11 Exemptions from the obligation to inform Convention108, Article9 Data Protection Directive, Articles18 and19 Notication Proling Recommendation, Article9.2(a) Rules on promoting compliance Data Protection Directive, Article20 Prior checking Data Protection Directive, Article18(2) Personal data protection ofcials Proling Recommendation, Article8.3 Data Protection Directive, Article27 Codes of conduct Principles are necessarily of a general nature. Their application to concrete situa- tions leaves a certain margin of interpretation and choice of means. Under CoElaw, it is left to the Parties to Convention108 to clarify this margin of interpretation in their domestic law. The situation in EUlaw is different: for the establishment of data protection in the internal market, it was deemed necessary to have more detailed rules already at the EU level in order to harmonise the level of data protection of the national laws of the Member States. The Data Protection Directive establishes, under the principles set out in its Article6, a layer of detailed rules which must be faith- fully implemented in national law. The following remarks on detailed data protection rules at the European level deal, therefore, predominantly with EUlaw. The rules of European data protection law 81 4.1. Rules on lawful processing Key points Personal data may be lawfully processed if: the processing is based on the consent of the data subject; or vital interests of data subjects require the processing of their data; or legitimate interests of others are the reason for processing, but only as long as they are not overridden by interests in protecting the fundamental rights of the data subjects. Lawful processing of sensitive personal data is subject to a special, stricter regime. The Data Protection Directive contains two different sets of rules for lawful pro- cessing of data: one for non-sensitive data in Article7 and one for sensitive data in Article8. 4.1.1. Lawful processing of non-sensitive data ChapterII of Directive 95/46, entitled General rules on the lawfulness of the pro- cessing of personal data, provides that, subject to the exceptions permitted under Article13, all processing of personal data must comply, first, with the principles relating to data quality set out in Article6 of the Data Protection Directive and, sec- ondly, with one of the criteria for making data processing legitimate, listed in Arti- cle7. 130 This explains the cases which legitimise the processing of non-sensitive per- sonal data. Consent Under CoElaw, consent is not mentioned in Article8of the ECHR or in Conven- tion108. It is, however, mentioned in the ECtHR jurisprudence and several CoE rec- ommendations. Under EUlaw, consent as a basis for legitimate data processing is 130 CJEU, Joined cases C-465/00, C-138/01 and C-139/01. Rechnungshof v. sterreichischer Rundfunk and Others and Neukomm and Lauermann v. sterreichischer Rundfunk, 20May2003, para.65; CJEU, C-524/06, Huber v. Germany, 16December2008, para.48; CJEU, Joined cases C-468/10 and C-469/10, Asociacin Nacional de Establecimientos Financieros de Crdito (ASNEF) and Federacin de Comercio Electrnico y Marketing Directo (FECEMD) v. Administracin del Estado, 24November2011, para.26. Handbook on European data protection law 82 rmly established in Article7(a) of the Data Protection Directive and is also explic- itly mentioned in Article8 of the Charter. Contractual relationship Another basis for legitimate processing of personal data under EUlaw, enumerated in Article7(b) of the Data Protection Directive, is if it is necessary for the perfor- mance of a contract to which the data subject is party. This provision also covers precontractual relationships. For instance: a party intends to enter into a contract, but has not yet done so, possibly because some checks remain to be completed. If one party needs to process data for this purpose, such processing is legitimate as long as it is in order to take steps at the request of the data subject prior to entering into a contract. As concerns CoElaw, the protection of the rights and freedoms of others is men- tioned in Article8(2) of the ECHR as a reason for legitimate interference with the right to data protection. Legal duties of the controller EUlaw then explicitly mentions another criterion for making data processing legiti- mate, namely if it is necessary for compliance with a legal obligation to which the controller is subject (Article7(c) of the Data Protection Directive). This provision refers to controllers acting in the private sector; the legal obligations of public sec- tor data controllers fall under Article7(e) of the directive. There are many cases in which private sector controllers are obliged by law to process data about others; e.g. physicians and hospitals have the legal duty to store data about the treatment of patients for several years, employers must process data about their employees for reasons of social security and taxation and businesses must process data about their customers for reasons of taxation. In the context of the mandatory transfer of passenger data by airlines to foreign immigration control authorities, the question arose of whether or not legal obliga- tions under foreign law could form a legitimate basis to process data under EUlaw (this issue is discussed in more detail in Section6.2.). Legal obligations of the controller serve as a basis for legitimate data processing also under CoElaw. As has been pointed out before, legal obligations of a private sector The rules of European data protection law 83 controller are just one specic case of legitimate interests of others, as mentioned in Article8(2) of the ECHR. The above example is, therefore, also relevant for CoElaw. Vital interests of the data subject Under EUlaw, Article7(d) of the Data Protection Directive provides that the pro- cessing of personal data is lawful if it is necessary in order to protect the vital inter- ests of the data subject. Such interests, which are closely related to the survival of the data subject, could be the basis for the legitimate use of health data or of data about missing persons, for example. Under CoElaw, vital interests of the data subject are not mentioned in Article8 of the ECHR as a reason for legitimate interference with the right to data protection. In some of the CoE recommendations complementing Convention108 in particular elds, however, vital interests of the data subject are explicitly mentioned as a basis for legitimate data processing. 131 Vital interests of the data subject are evidently considered to be implied in the set of reasons justifying data processing: fundamen- tal rights protection should never endanger the vital interests of the person who is protected. Public interest and exercise of ofcial authority Given the many possible ways of organising public affairs, Article7(e) of the Data Protection Directive provides that personal data may lawfully be processed if it is necessary for the performance of a task carried out in the public interest or in the exercise of ofcial authority vested in the controller or in a third party to whom the data are disclosed []. 132 Example: In Huber v. Germany, 133 Mr Huber, an Austrian national residing in Ger- many, asked the Federal Ofce for Migration and Refugees to delete data on him in the Central Register of Foreign Nationals (theAZR). This register, which contains personal data on non-German EU nationals who are resident in Ger- many for more than three months, is used for statistical purposes and by law enforcement and judicial authorities when investigating and prosecuting crimi- nal activities or those which threaten public security. The referring court asked 131 Proling Recommendation, Art.3.4(b). 132 See Data Protection Directive, Recital32. 133 CJEU, C-524/06, Huber v. Germany, 16December2008. Handbook on European data protection law 84 whether the processing of personal data which is undertaken in a register such as the Central Register of Foreign Nationals, to which other public authorities also have access, is compatible with EUlaw given that no such register exists for German nationals. The CJEU holds rst that, under Article7(e) of the directive, personal data may lawfully be processed only if it is necessary for the performance of a task car- ried out in the public interest or in the exercise of an ofcial authority. According to the Court, having regard to the objective of ensuring an equiva- lent level of protection in all Member States, the concept of necessity laid down by Article7(e) of Directive95/46 [] cannot have a meaning which varies between Member States. It, therefore, follows that what is at issue is a concept which has its own independent meaning in Community law and which must be interpreted in a manner which fully reects the objective of that directive, as laid down in Article1(1) thereof. 134
The Court notes that the right of free movement of a Union citizen in the terri- tory of a Member State of which he or she is not a national, is not unconditional but may be subject to limitations and conditions imposed by the Treaty and by the measures adopted to give it effect. Thus, if it is, in principle, legitimate for a Member State to use a register such as theAZR to support the authorities responsible for applying the legislation relating to the right of residence, such a register must not contain any information other than what is necessary for that particular purpose. The Court concludes that such a system for process- ing personal data complies with EUlaw if it contains only the data necessary to apply that legislation and if its centralised nature makes the application of that legislation more effective. The national court must ascertain whether those conditions are satised in this particular case. If not, the storage and processing of personal data in a register such as theAZR for statistical purposes cannot, on any basis, be considered to be necessary within the meaning of Article7(e) of Directive95/46/EC. 135
Lastly, as regards the question of the use of the data contained in the register for the purposes of ghting crime, the Court holds that this objective neces- sarily involves the prosecution of crimes and offences committed, irrespective 134 Ibid., para.52. 135 Ibid., paras.54, 58, 59, 66-68. The rules of European data protection law 85 of the nationality of their perpetrators. The register at issue does not contain personal data relating to nationals of the Member State concerned and this dif- ference in treatment constitutes a discrimination prohibited by Article18 of the TFEU. Consequently, this provision, as interpreted by the Court, precludes the putting in place by a Member State, for the purpose of ghting crime, of a sys- tem for processing personal data specic to Union citizens who are not nationals of that Member State. 136 The use of personal data by authorities acting in the public arena is also subject to Article8 of theECHR. Legitimate interests pursued by the controller or by a third party The data subject is not the only one with legitimate interests. Article7(f) of the Data Protection Directive provides that personal data may lawfully be processed if it is necessary for the purposes of the legitimate interests pursued by the controller or by the third party or parties to whom the data are disclosed, except where such interests are overridden by the interests for fundamental rights and freedoms of the data subject which require protection []. In the following judgment, the CJEU ruled explicitly on Article7(f) of the directive: Example: In ASNEF and FECEMD, 137 the CJEU clarified that national law is not allowed to add conditions to those mentioned in Article7(f) of the Directive for Lawful Processing of data. This referred to a situation where Spanish data protection law contained a provision whereby other private parties could claim a legitimate interest in processing personal data only if the information had already appeared in public sources. The Court first noted that Directive 95/46/EC is intended to ensure that the level of protection of the rights and freedoms of individuals with regard to the processing of personal data is equivalent in all Member States. Nor must the approximation of the national laws applicable in this area result in any decrease of the protection they afford. It must instead seek to ensure a high level of 136 Ibid., paras.78 and81. 137 CJEU, Joined cases C-468/10 and C-469/10, Asociacin Nacional de Establecimientos Financieros de Crdito (ASNEF) and Federacin de Comercio Electrnico y Marketing Directo (FECEMD) v. Administracin del Estado, 24November2011. Handbook on European data protection law 86 protection in theEU. 138 Consequently, the CJEU held that it follows from the objective of ensuring an equivalent level of protection in all Member States that Article 7 of Directive 95/46 sets out an exhaustive and restrictive list of cases in which the processing of personal data can be regarded as being law- ful. Moreover, Member States cannot add new principles relating to the law- fulness of the processing of personal data to Article7 of the Directive 95/46 or impose additional requirements that have the effect of amending the scope of one of the six principles provided for in Article7. 139 The Court admitted that, in relation to the balancing which is necessary pursuant to Article7(f) of Direc- tive95/46/EC, it is possible to take into consideration the fact that the seri- ousness of the infringement of the data subjects fundamental rights resulting from the processing can vary depending on whether or not the data in question already appear in public sources. However, Article7(f) of the directive precludes a Member State from exclud- ing, in a categorical and generalised manner, the possibility of processing cer- tain categories of personal data, without allowing the opposing rights and inter- ests at issue to be balanced against each other in a particular case. In light of those considerations, the Court concluded that Article7(f) of the Directive95/46 must be interpreted as precluding national rules which, in the absence of the data subjects consent, and in order to allow such processing of that data subjects personal data as is necessary to pursue a legitimate interest of the data controller or of the third party or parties to whom those data are dis- closed, require not only that the fundamental rights and freedoms of the data subject be respected, but also that the data should appear in public sources, thereby excluding, in a categorical and generalised way, any processing of data not appearing in such sources. 140
Similar formulations can be found in recommendations of the CoE. The Proling Rec- ommendation acknowledges the processing of personal data for purposes of prol- ing as legitimate, if necessary for the legitimate interests of others, except where 138 Ibid., para.28. See Data Protection Directive, Recitals8 and10. 139 CJEU, Joined cases C-468/10 and C-469/10, Asociacin Nacional de Establecimientos Financieros de Crdito (ASNEF) and Federacin de Comercio Electrnico y Marketing Directo (FECEMD) v. Administracin del Estado, 24November2011, paras.30 and32. 140 Ibid., paras.40, 44, 48 and49. The rules of European data protection law 87 such interests are overridden by the fundamental rights and freedoms of the data subjects. 141 4.1.2. Lawful processing of sensitive data CoElaw leaves it to domestic law to lay down appropriate protection for using sen- sitive data, while EUlaw, in Article8 of the Data Protection Directive, contains a detailed regime for processing categories of data that reveal: racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership or infor- mation on health or sex life. The processing of sensitive data is prohibited in princi- ple. 142 There is, however, an exhaustive list of enumerated exemptions to this prohi- bition, which can be found in Article8(2) and(3) of the directive. These exemptions include explicit consent of the data subject, vital interests of the data subject, legiti- mate interests of others and public interest. Unlike in the case of processing non-sensitive data, a contractual relationship with the data subject is not viewed as a general basis for the legitimate processing of sensitive data. Therefore, if sensitive data are to be processed in the context of a contract with the data subject, use of these data requires the data subjects separate explicit consent, in addition to agreeing to enter into the contract. An explicit request by the data subject for goods or services which necessarily reveal sensitive data should, however, be considered to be as good as explicit consent. Example: If an airline passenger, in the context of booking a flight, requires that the airline provide a wheelchair and kosher food, the airline is allowed to use these data even if the passenger did not sign an extra consent clause say- ing that he or she agrees to the use of his data revealing information about his health and religious belief. Explicit consent of the data subject The rst condition for lawful processing of any data, regardless of whether they are non-sensitive or sensitive data, is the consent of the data subject. In the case of sen- sitive data, such consent must be explicit. National law may, however, provide that consenting to the use of sensitive data is not a sufcient legal basis to permit their 141 Proling Recommendation, Art.3.4(b). 142 Data Protection Directive, Art.8(1). Handbook on European data protection law 88 processing, 143 for example, where, in exceptional cases, processing involves unusual risks for the data subject. In one special case, even implicit consent is acknowledged as a legal basis for pro- cessing sensitive data: Article8(2)(e) of the directive provides that processing is not prohibited if it relates to data which are manifestly made public by the data subject. This provision evidently presumes that the action of the data subject, making his or her data public, must be interpreted as implying consent of the data subject to the use of suchdata. Vital interests of the data subject As in the case of non-sensitive data, sensitive data may be processed because of the vital interests of the data subject. 144
For the processing of sensitive data to be legitimate on this basis, it is necessary that it was impossible to submit the question to the data subject for deciding, because, for example, the data subject was unconscious or was absent and could not be reached. Legitimate interests of others As in the case of non-sensitive data, the legitimate interests of others may serve as a basis for processing sensitive data. For sensitive data, and according to Article8(2) of the Data Protection Directive, however, this applies only to the following cases: where processing is necessary because of the vital interests of another person 145
where the data subject is physically or legally incapable of giving his consent; where sensitive data are relevant in the eld of employment law, such as health data, such as in the context of a specically dangerous work place, or data on religious beliefs, such as in the context of holidays; 146 143 Ibid., Art.8(2)(a). 144 Ibid., Art.8(2)(c). 145 Ibid. 146 Ibid., Art.8(2)(b). The rules of European data protection law 89 where foundations, associations or other non-prot-seeking bodies with a politi- cal, philosophical, religious or trade union aim, process data about their members or sponsors or other interested parties (such data are sensitive because they are likely to reveal the religious or political beliefs of the individuals concerned); 147 where sensitive data are used in the context of legal proceedings before a court or administrative authority for the establishment, exercise or defence of a legal claim. 148 Moreover, according to Article 8(3) of the Data Protection Directive where health data are used for medical examination and treatment by healthcare pro- viders the management of these services is included in this exemption. As a special safeguard, persons are recognised as health care providers only if they are subject to specic professional obligations to condentiality. Public interest Additionally, according to Article8(4) of the Data Protection Directive, Member States may introduce further purposes for which sensitive data may be processed, as long as: processing data is for reasons of substantial public interest; and it is provided for by national law or by decision of the supervisory authority; and the national law or decision of the supervisory authority contains the necessary safeguards in order to effectively protect the interests of the data subjects. 149
A prominent example are electronic health file systems, which are about to be established in many Member States. Such systems permit health data, collected by health care providers in the course of treating a patient, to be made available to other health care providers of this patient on a large scale, usually nationwide. The Article29 Working Party concluded that the establishment of such systems could not occur under existing legal rules for processing data about patients based 147 Ibid., Art.8(2)(d). 148 Ibid., Art.8(2)(e). 149 Ibid., Art.8(4). Handbook on European data protection law 90 on Article8(3) of the Data Protection Directive. Assuming that the existence of such electronic health le systems constitutes a substantial public interest, however, it could be based on Article8(4) of the directive, requiring an explicit legal basis for their establishment, which also contains the necessary safeguards to ensure that the system is run securely. 150 4.2. Rules on security of processing Key points The rules on security of processing imply an obligation of the controller and the pro- cessor to implement appropriate technical and organisational measures in order to prevent any unauthorised interference with data processing operations. The necessary level of data security is determined by: the security features available in the market for any particular type of processing; and the costs; the sensitivity of the data processed. The secure processing of data is further safeguarded by the general duty on all per- sons, controllers or processors, to ensure that data remain condential. The obligation of controllers and processors to have adequate measures in place to ensure data security is, therefore, laid down in CoE data protection law as well as in EU data protectionlaw. 4.2.1. Elements of data security According to the relevant provisions in EUlaw: Member States shall provide that the controller must implement appropriate technical and organisational measures to protect personal data against accidental or unlawful destruction or accidental loss, alteration, 150 Article 29 Working Party (2007), Working Document on the processing of personal data relating to health in electronic health records (EHR), WP131, Brussels, 15February2007. The rules of European data protection law 91 unauthorised disclosure or access, in particular where the processing involves the transmission of data over a network and against all other unlawful forms of processing. 151 A similar provision exists under CoElaw: Appropriate security measures shall be taken for the protection of personal data stored in automated data les against accidental or unauthorised destruction or accidental loss as well as against unauthorised access, alteration or dissemination. 152 Often, there are also industrial, national and international standards which have been developed for safe processing of data. The European Privacy Seal (EuroPriSe), for instance, is an eTEN (Trans-European Telecommunications Networks) project of the EU which has explored the possibilities of certifying products, especially soft- ware, as compliant with European data protection law. The European Network and Information Security Agency (ENISA) was set up to enhance the ability of the EU, the EU Member States and the business community to prevent, address and respond to network and information security problems. 153 ENISA regularly publishes analyses of current security threats and advice on how to address them. Data security is not just achieved by having the right equipment hardware and software in place. It also requires appropriate internal organisational rules. Such internal rules would ideally cover the following issues: regular provision of information to all employees about data security rules and their obligations under data protection law, especially regarding their obligations of condentiality; clear distribution of responsibilities and a clear outline of competences in matters of data processing, especially regarding decisions to process personal data and to transfer data to third parties; 151 Data Protection Directive, Art.17(1). 152 Convention108, Art.7. 153 Regulation (EC) No.460/2004 of the European Parliament and of the Council of 10March2004 establishing the European Network and Information Security Agency, OJ2004L77. Handbook on European data protection law 92 use of personal data only according to the instructions of the competent person or according to generally laid down rules; protection of access to locations and to hard- and software of the controller or processor, including checks on authorisation for access; ensuring that authorisations to access personal data have been assigned by the competent person and require proper documentation; automated protocols on access to personal data by electronic means and regular checks of such protocols by the internal supervisory desk; careful documentation for other forms of disclosure than automated access to data in order to be able to demonstrate that no illegal data transmissions have taken place. Offering adequate data security training and education to staff members is also an important element of effective security precautions. Verication procedures must also be installed in order to ensure that appropriate measures not only exist on paper but are implemented and work in practice (such as internal or external audits). Measures for improving the security level of a controller or processor include instru- ments such as personal data protection ofcials, security education of employees, regular audits, penetration tests and quality seals. Example: In I. v. Finland, 154 the applicant was unable to prove that her health records had been accessed illegitimately by other employees of the hospital where she worked. Her claim of a violation of her right to data protection was, therefore, rejected by the domestic courts. The ECtHR concluded that there had been a violation of Article8 of the ECHR, as the hospitals register system for health les was such that it was not possible to retroactively clarify the use of patient records as it revealed only the ve most recent consultations and that this information was deleted once the le had been returned to the archives. For the Court, it was decisive that the records system in place in the hospital had clearly not been in accordance with the legal requirements contained in domes- tic law, a fact that was not given due weight by the domestic courts. 154 ECtHR, I. v. Finland, No.20511/03, 17July2008. The rules of European data protection law 93 Data breach notications A new instrument for dealing with infringements of data security has been intro- duced in the data protection law of several European countries: the obligation of pro- viders of electronic communications services to notify data breaches to the likely victims and to supervisory authorities. For telecommunications providers, this is mandatory under EUlaw. 155 The purpose of data breach notications to data subjects is to avoid damage: notication of data breaches and their possible consequences minimises the risk of negative effects on the data subjects. In cases of serious negli- gence, the providers could also be ned. Setting up internal procedures, in advance, for the effective management and reporting of security breaches will be necessary, as the timeframe for the obliga- tion to report to the data subjects and/or supervisory authority, according to national law, is usually rather short. 4.2.2. Condentiality Under EUlaw, the secure processing of data is further safeguarded by the gen- eral duty on all persons, controllers or processors, to ensure that data remain condential. Example: An employee of an insurance company receives a telephone call at her workplace from someone who says he is a client, requiring information con- cerning his insurance contract. The duty to keep clients data condential requires that the employee apply at least minimum security measures before disclosing personal data. This could be done, for example, by offering to return the call to a telephone number docu- mented in the clients le. 155 See Directive 2002/58/EC of the European Parliament and of the Council of 12July2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector, (Directive on privacy and electronic communications), OJ2002L201, Art.4(3), as amended by Directive 2009/136/EC of the European Parliament and of the Council of 25November2009 amending Directive2002/22/EC on universal service and users rights relating to electronic communications networks and services; see also Directive2002/58/EC concerning the processing of personal data and the protection of privacy in the electronic communications sector and Regulation (EC) No.2006/2004 on cooperation between national authorities responsible for the enforcement of consumer protection laws, OJ2009L337. Handbook on European data protection law 94 Article16 of the Data Protection Directive concerns condentiality only within a con- trollerprocessor relationship. Whether or not controllers have to keep data con- dential, in the sense that they may not disclose them to third parties, is dealt with under Articles7 and8 of the directive. The duty of condentiality does not extend to situations where data come to the knowledge of a person in his or her capacity as a private individual and not as an employee of a controller or processor. In this case, Article16 of the Data Protection Directive does not apply, as, in fact, the use of personal data by private individu- als is completely exempt from the directives remit where such use falls within the boundaries of the so-called household exemption. 156 The household exemption is the use of personal data by a natural person in the course of purely personal or household activity. 157 Since the CJEUs decision in the case of Bodil Lindqvist, 158 this exemption must, however, be interpreted narrowly, especially in regard to disclos- ing data. Particularly, the household exemption will not extend to the publication of personal data to an unlimited number of recipients on the internet (for more details on the case, see Sections2.1.2, 2.2, 2.3.1 and6.1). Under CoElaw, the obligation of condentiality is implied in the notion of data secu- rity in Article7 of Convention108, which deals with data security. For processors, condentiality means that they may use personal data entrusted to them by the controller only in line with the instructions given by the controller. For the employees of a controller or processor, condentiality requires that they use personal data only according to the instructions of their competent superiors. The obligation of condentiality must be included in any contract between control- lers and their processors. Further, controllers and processors will have to take spe- cic measures to establish for their employees a legal duty of condentiality, nor- mally achieved by inclusion of condentiality clauses in the employees employment contract. Infringement of professional duties to condentiality is punishable under criminal law in many EU Member States and Parties to Convention108. 156 Data Protection Directive, Art.3(2) second indent. 157 Ibid. 158 CJEU, C-101/01, Lindqvist, 6November2003. The rules of European data protection law 95 4.3. Rules on transparency of processing Key points Before starting to process personal data, the controller must, at the very least, inform the data subjects about the identity of the controller and the purpose of the data pro- cessing, unless the data subject already has this information. Where the data are collected from third parties, the obligation to provide information does not apply if: the data processing is provided for by law; or provision of information proves impossible or would involve a disproportionate effort. Before starting to process personal data, the controller must, additionally: notify the supervisory authority of the intended processing operations; or have the processing internally documented by an independent personal data pro- tection ofcial, if national law provides for such proceedings. The principle of fair processing requires transparency of processing. CoElaw lays down, to this end, that any person must be able to establish the existence of data- processing les, their purpose and the responsible controller. 159 How this should be achieved is left to domestic law. EUlaw is more specic, securing transparency for the data subject by way of the controllers obligation to inform the data subject, and for the general public by way of notication. Under both legal systems, exemptions and restrictions from the transparency obli- gations of the controller may exist in national law when such a restriction constitutes a necessary measure to safeguard certain public interests or the protection of the data subject or of the rights and freedoms of others, as long as this is necessary in a democratic society. 160 Such exemptions may, for example, be necessary in the con- text of investigating crime, but can also be justied in other circumstances. 159 Convention108, Art.8(a). 160 Ibid., Art.9(2); and Data Protection Directive, Art.13(1). Handbook on European data protection law 96 4.3.1. Information According to CoElaw as well as EUlaw, controllers of processing operations are obliged to inform the data subject in advance about their intended processing. 161
This obligation does not depend on a request from the data subject but must be complied with proactively by the controller, regardless of whether the data subject shows interest in the information or not. Content of the information The information must include the purpose of processing, as well as the identity and contact details of the controller. 162 The Data Protection Directive requires further information to be given where this is necessary, having regard to the specic cir- cumstances in which the data are collected, to guarantee fair processing in respect of the data subject. Articles10 and 11 of the directive outline, among other things, the categories of data processed and the recipients of such data, as well as the existence of the right of access to and the right to rectify the data. Where data are collected from the data subjects, the information should clarify whether replies to the questions are obligatory or voluntary, as well as the possible consequences of a failure to reply. 163
From the point of view of CoElaw, the provision of such information may be consid- ered good practice under the principle of fair data processing and is, to this extent, also part of CoElaw. The principle of fair processing requires that information be easily understandable by the data subjects. Language must be used which is appropriate for the address- ees. The level and type of language used would need to be different depending on whether the intended audience is, for example, adults or children, the general public or expert academics. Some data subjects will want to be informed only in a nutshell of how and why their data are being processed, whereas others will require a detailed explanation. How to balance this aspect of fair information is considered in an opinion of the Article 29 161 Convention108, Art.8(a); and Data Protection Directive Art.10 and11. 162 Convention108, Art.8(a); and Data Protection Directive, Art.10(a) and(b). 163 Data Protection Directive, Art.10(c). The rules of European data protection law 97 Working Party which promotes the idea of so-called layered notices, 164 allowing the data subject to decide which level of detail he or she prefers. Time of providing information The Data Protection Directive contains slightly different provisions regarding the time when information has to be provided, depending on whether data are collected from the data subject (Article10) or from a third party (Article11). Where data are collected from the data subject, information has to be provided, at the latest, at the time of collection. Where data are collected from third parties, information has to be provided, at the latest, either at the moment the controller records the data or before the data are disclosed to a third party for the rst time. Exemptions from the obligation to inform Under EUlaw, a general exemption from the obligation to inform the data subject exists where the data subject already has the information. 165 This refers to situa- tions where the data subject will, according to the circumstances of the case, already be aware that his or her data will be processed for a certain purpose by a certain controller. Article11 of the directive, which relates to the obligation to inform a data subject when the data have not been obtained from him or her, also says that there will be no such obligation, in particular for processing for statistical purposes or for the pur- poses of historical or scientic research, where: the provision of such information proves impossible; or it would involve a disproportionate effort; or the recording or disclosure of the data is expressly laid down by law. 166 Only Article11(2) of the Data Protection Directive states that data subjects need not be informed about processing operations if they are laid down by law. Given the 164 Article29 Working Party (2004), Opinion 10/2004 on More Harmonised Information Provisions, WP100, Brussels, 25November2004. 165 Data Protection Directive, Art.10 and 11(1). 166 Ibid., Recital40 and Article11(2). Handbook on European data protection law 98 general legal assumption that the law is known by its subjects, it could be argued that, where data are collected from a data subject under Article10 of the directive, the data subject has the information. But given that knowledge of the law is only an assumption, the principle of fair processing would require under Article10 that the data subject be informed even if processing is laid down by law, particularly as informing the data subject is not particularly burdensome where data are collected directly from the data subject. As concerns CoElaw, Convention108 provides explicitly for exemptions from its Article8. Again, the exemptions set out in Articles10 and11 of the Data Protection Directive may be seen as examples of good practice for exemptions under Article9 of Convention108. Different ways of providing information The ideal way of providing information would be to address every single data sub- ject, orally or in writing. If the data are collected from the data subject, giving infor- mation should go hand in hand with the collection. Especially where data are col- lected from third parties, however, given the evident practical difculties in reaching the data subjects personally, information can also be provided by appropriate publication. One of the most efcient ways to provide information will be to have appropriate information clauses on the home page of the controller, such as a website privacy policy. There is, however, a signicant part of the population that does not use the internet, and the information policy of a company or of a public authority ought to take this into account. 4.3.2. Notication National law can oblige controllers to notify the competent supervisory authority of their processing operations so that these can be published. Alternatively, national law can provide that controllers may employ a personal data protection ofcial, who is responsible in particular for keeping a register of processing operations carried out by the controller. 167 This internal register must be made available to members of the public on request. 167 Ibid., Art.18(2) second indent. The rules of European data protection law 99 Example: A notication, as well as documentation by an internal personal data protection ofcial, must describe the main features of the data processing in question. This will include information about the controller, the purpose of the processing, the legal basis of the processing, the categories of data processed, the likely third party recipients and whether or not transborder data ows are intended and, if so, which ones. The publication of notications by the supervisory authority must be in the form of a special register. In order to full its objective, access to this register ought to be easy and free of charge. The same applies to the documentation kept by a controllers personal data protection ofcial. Exemptions from the duties to notify the competent supervisory authority or to employ an internal data protection official may be provided by national law for processing operations which are unlikely to pose a specic risk to data subjects are listed in Article18(2) of the Data Protection Directive. 168 4.4. Rules on promoting compliance Key points Developing the principle of accountability, the Data Protection Directive mentions sev- eral instruments for promoting compliance: prior checking of intended processing operations by the national supervisory authority; personal data protection officials who shall provide the controller with special expertise in the eld of data protection; codes of conduct specifying the existing data protection rules for application in a branch of society, especially of business. CoElaw proposes similar instruments for promoting compliance in its Profiling Recommendation. 168 Ibid., Art.18(2) rst indent. Handbook on European data protection law 100 4.4.1. Prior checking According to Article20 of the Data Protection Directive, the supervisory authority must check processing operations which may cause specic risks to the rights and freedoms of the data subjects due to either the purpose or the circumstances of processing before processing begins. National law must determine which pro- cessing operations qualify for prior checking. Such checking may result in process- ing operations being prohibited, or in an order to change features in the proposed design of the processing operations. Article20 of the directive aims to ensure that unnecessarily risky processing does not even start, as the supervisory authority is empowered to prohibit such operations. The prerequisite for this mechanism to be effective is that the supervisory authority is indeed notied. In order to ensure that controllers full their notication obligation, supervisory authorities will need coer- cive powers, such as the ability to ne controllers. Example: If a company performs processing operations which, according to national law, are subject to prior checking, this company must submit documen- tation about the planned processing operations to the supervisory authority. The company is not allowed to start processing operations before receiving a positive response from the supervisory authority. In some Member States, national law provides alternatively that processing operations may be started if there is no reaction from the supervisory authority within a certain timeframe, for example, three months. 4.4.2. Personal data protection ofcials The Data Protection Directive allows the possibility for national law to provide that controllers may appoint an ofcial to act as a personal data protection ofcial. 169 The aim of such a functionary is to ensure that the rights and freedoms of the data sub- jects are unlikely to be adversely affected by the processing operations. 170
Example: In Germany, according to Section4f, Subsection1 of the German Fed- eral Data Protection Act (Bundesdatenschutzgesetz), privately owned compa- nies are required to appoint an internal personal data protection ofcial if they 169 Ibid., Art. 18(2) second indent. 170 Ibid. The rules of European data protection law 101 permanently employ 10 or more persons in the automated processing of per- sonal data. The ability to achieve this goal requires a certain amount of independence for the officials position within the controllers organisation, as is explicitly pointed out in the directive. Strong employment rights to guard against eventualities such as unjustied dismissal would also be necessary in order to support the effective func- tioning of thisofce. In order to promote compliance with national data protection law, the concept of internal personal data protection ofcials has also been adopted in some of the CoE Recommendations. 171 4.4.3. Codes of conduct To promote compliance, business and other sectors can draw up detailed rules that govern their typical processing activities, codifying best practices. The exper- tise of the members of the sector will favour nding solutions which are practical and, therefore, likely to be followed. Accordingly, Member States as well as the European Commission are encouraged to promote the drawing up of codes of con- duct intended to contribute to the proper implementation of the national provisions adopted by the Member States pursuant to the directive, taking account of the spe- cic features of the various sectors. 172 In order to ensure that these codes of conduct are in accordance with the nation- als provisions adopted pursuant to the Data Protection Directive, Member States must establish a procedure for evaluating the codes. This procedure would ordinarily require the involvement of the national authority, trade associations and other bod- ies representing other categories of controllers. 173 Draft Community codes and amendments or extensions to existing Commu- nity codes may be submitted to the Article29 Working Party for evaluation. After approval by this Working Party, the European Commission may ensure appropriate publicity for such codes. 174 171 See, for example, the Proling Recommendation, Art.8.3. 172 See the Data Protection Directive, Art.27(1). 173 Ibid., Art.27(2). 174 Ibid., Art.27(3). Handbook on European data protection law 102 Example: The Federation of European Direct and Interactive Marketing (FEDMA) developed a European Code of Practice for the use of personal data in direct marketing. The code was successfully submitted to the Article 29 Working Party. An annex, relating to electronic marketing communications, was added to the code in2010. 175 175 Article29 Working Party (2010), Opinion 4/2010 on the European code of conduct of the FEDMA for the use of personal data in direct marketing, WP 174, Brussels, 13July2010. 103 EU Issues covered CoE Right of access Data Protection Directive, Article12 CJEU, C-553/07, College van burgemeester en wethouders van Rotterdam v. M.E.E. Rijkeboer, 7May2009 Right of access to ones own data Convention108, Article8(b) Right to rectication, erasure (deletion) or blocking Convention108, Article8(c) ECtHR, Cemalettin Canli v. Turkey, No.22427/04, 18November2008 ECtHR, Segerstedt-Wiberg and Others v. Sweden, No.62332/00, 6June2006 ECtHR, Ciubotaru v. Moldova, No.27138/04, 27April2010 Right to object Data Protection Directive, Article14(1)(a) Right to object due to the data subjects particular situation Proling Recommendation, Article5.3 Data Protection Directive, Article14(1)(b) Right to object to further use of data for marketing purposes Direct Marketing Recommendation, Article4.1 Data Protection Directive, Article15 Right to object to automated decisions Proling Recommendation, Article5.5 Independent supervision The data subjects rights and their enforcement 5 Handbook on European data protection law 104 Charter, Article8(3) Data Protection Directive, Article28 EU Institutions Data Protection Regulation, ChapterV Data Protection Regulation CJEU, C-518/07, European Commission v. Federal Republic of Germany, 9March2010 CJEU, C-614/10, European Commission v. Republic of Austria, 16October2012 CJEU, C-288/12, European Commission v. Hungary, 8April2014 National supervisory authorities Convention108, Additional Protocol, Article1 Remedies and sanctions Data Protection Directive, Article12 Request to the controller Convention108, Article8(b) Data Protection Directive, Article28(4) EU Institutions Data Protection Regulation, Article32(2) Claims lodged with a supervisory authority Convention108, Additional Protocol, Article1(2)(b) Charter, Article47 Courts (in general) ECHR, Article13 Data Protection Directive, Article28(3) National courts Convention 108, Additional Protocol, Article1(4) TFEU, Article263(4) EU Institutions Data Protection Regulation, Article32(1) TFEU, Article267 CJEU ECtHR ECHR, Article34 Remedies and sanctions Charter, Article47 Data Protection Directive, Articles22 and 23 CJEU, C-14/83, Sabine von Colson and Elisabeth Kamann v. Land Nordrhein- Westfalen, 10April1984 CJEU, C-152/84, M.H. Marshall v. Southampton and South-West Hampshire Area Health Authority, 26February1986 For infringements of national data protection law ECHR, Article13 (only for CoE member states) Convention108, Article10 ECtHR, K.U. v. Finland, No.2872/02, 2December2008 ECtHR, Biriuk v. Lithuania, No.23373/03, 25November2008 EU Institutions Data Protection Regulation, Articles34 and49 CJEU, C-28/08P, European Commission v. The Bavarian Lager Co. Ltd, 29June2010 For infringements of EUlaw by EU institutions and bodies The effectiveness of legal rules in general and data subjects rights in particular, depends to a considerable extent on the existence of appropriate mechanisms to The data subjects rights and their enforcement 105 enforce them. In European data protection law, the data subject must be empow- ered by national law to protect his or her data. Independent supervisory authorities must also be established by national law to assist the data subjects in exercising their rights and to supervise the processing of personal data. Additionally, the right to an effective remedy, as guaranteed under the ECHR and the Charter, demands that judicial remedies be available to every person. 5.1. The rights of data subjects Key points Everyone shall have the right under national law to request from any controller infor- mation as to whether the controller is processing his or her data. Data subjects shall have the right under national law to: access their own data from any controller who processes such data; have their data rectied (or blocked, as appropriate) by the controller processing their data, if the data are inaccurate; have their data deleted or blocked, as appropriate, by the controller if the control- ler is processing their data illegally. Additionally, data subjects shall have the right to object to controllers about: automated decisions (made using personal data processed solely by automatic means); the processing of their data if it leads to disproportionate results; the use of their data for direct marketing purposes. 5.1.1. Right of access Under EUlaw, Article12 of the Data Protection Directive contains the elements of the data subjects right of access, including the right to obtain from the controller conrmation as to whether or not data relating to them are being processed and information at least as to the purposes of the processing, the categories of data concerned, and the recipients or categories of recipients to whom the data are dis- closed, as well as the rectication, erasure or blocking of data the processing of Handbook on European data protection law 106 which does not comply with the provisions of this Directive, in particular because of the incomplete or inaccurate nature of the data. In CoElaw, these same rights exist and must be provided for by domestic law (Arti- cle8 of Convention108). In several CoE recommendations, the term access is used and the different aspects of the right to access are described and proposed for implementation in domestic law in the same way as pointed out in the paragraph above. According to Article9 of Convention108 and Article13 of the Data Protection Direc- tive, the obligation of controllers to respond to a data subjects access request may be restricted as a result of the overriding legal interests of others. Overriding legal interests may involve public interests such as national security, public security and prosecuting of criminal offences, as well as private interests which are more com- pelling than data protection interests.
Any exemptions or restrictions must be neces- sary in a democratic society and proportionate to the aim pursued. In very excep- tional cases, for instance because of medical indications, the protection of the data subject may itself require a restriction of transparency; this relates especially to restricting the right of access of every data subject. Whenever data are processed solely for the purpose of scientic research or for sta- tistical purposes, the Data Protection Directive allows access rights to be restricted by national law; however, adequate legal safeguards must be in place. In particular, it must be ensured that no measures or decisions regarding any particular individual are taken in the context of such data processing and that there is clearly no risk of breaching the privacy of the data subject. 176 Similar provisions are contained in Arti- cle9(3) of Convention108. The right of access to ones own data Under CoElaw, the right to access ones own data is explicitly acknowledged by Arti- cle8 of the Convention108.The ECtHR has repeatedly held that there is a right to access information about ones personal data held or used by others, and that this right arises from the need to respect private life. 177 In the case of Leander, 178 the 176 Data Protection Directive, Art.13(2). 177 ECtHR, Gaskin v. the UnitedKingdom, No.10454/83, 7July1989; ECtHR, Odivre v. France [GC], No.42326/98, 13February2003; ECtHR, K.H. and Others v. Slovakia, No.32881/04, 28April2009; ECtHR, Godelli v. Italy, No.33783/09, 25September2012. 178 ECtHR, Leander v. Sweden, No.9248/81, 26March1987. The data subjects rights and their enforcement 107 ECtHR concluded that the right to access personal data stored by public authorities might, however, be limited in certain circumstances. Under EUlaw, the right to access ones own data is explicitly acknowledged by Arti- cle 12 of the Data Protection Directive and, as a fundamental right, in Article8(2) of the Charter. Article12(a) of the directive provides that Member States are to guarantee every data subject a right of access to their personal data and to information. In particu- lar, every data subject has a right to obtain from the controller conrmation as to whether or not data relating to him are being processed and information covering at least the following: the purposes of the processing; the categories of data concerned; the data undergoing processing; the recipients or categories of recipients to whom the data are disclosed; any available information about the source of the data undergoing processing; in the case of automated decisions, the logic involved in any automatic process- ing of data. National law may add information to be given by the controller, for instance quoting the legal basis authorising the data processing. Example: By accessing ones personal data, one is able to determine whether or not the data are accurate. It is, therefore, indispensable that the data sub- ject be informed about the categories of data processed as well as about the data content. It is thus insufcient for a controller to simply tell the data subject that it is processing his or her name, address, date of birth and sphere of inter- est. The controller must also disclose to the data subject that it is processing the name: N.N.; an address: 1040Vienna, Schwarzenbergplatz11, Austria; the date of birth: 10.10.1974; and sphere of interest (according to the data subjects Handbook on European data protection law 108 declaration): classical music. The last item contains, additionally, information on the data source. Communication to the data subject on the data undergoing processing and of any available information as to their source must be given in an intelligible form, which means that the controller may have to explain to the data subject in more detail what it is processing. For example, just quoting technical abbreviations or medical terms in response to an access request will usually not sufce, even if only such abbreviations or terms are stored. Information about the source of data which are processed by the controller must be given in the response to an access request as far as this information is available. This provision must be understood in light of the principles of fairness and of accountabil- ity. A controller may not destroy information about the source of data in order to be exempt from disclosing it, nor may it ignore the usual standard and acknowledged needs for documentation in the area of its activities. Keeping no documentation on the source of the data processed will usually not full the controllers obligations under the right of access. Where automated evaluations are performed, the general logic of the evaluation will need to be explained, including the particular criteria which have been consid- ered when evaluating the data subject. The directive does not make it clear whether the right to access information con- cerns the past and, if so, what period in the past. In that regard, as underlined in the case law of the CJEU, the right to access ones data may not be unduly restricted by time limits. Data subjects must also be given a reasonable opportunity to gain infor- mation about past data-processing operations. Example: In Rijkeboer, 179 the CJEU was asked to determine whether, pursuant to Article12(a) of the directive, an individuals right of access to information on the recipients or categories of recipient of personal data and on the content of the data communicated may be limited to one year preceding his or her request for access. 179 CJEU, C-553/07, College van burgemeester en wethouders van Rotterdam v. M. E. E. Rijkeboer, 7May2009. The data subjects rights and their enforcement 109 To determine whether Article12(a) of the Directive authorises such a time limit, the Court decided to interpret that article in light of the purposes of the direc- tive. The Court rst stated that the right of access is necessary to enable the data subject to exercise the right to have the controller rectify, erase or block his or her data (Article12(b)), or notify third parties to whom the data have been disclosed of that rectication, erasure or blocking (Article12(c)). The right of access is also necessary to enable the data subject to exercise his or her right to object to his personal data being processed (Article14) or his right of action where he suffers damage (Articles22 and23). In order to ensure the practical effect of the provisions referred to above, the Court held that that right must of necessity relate to the past. If that were not the case, the data subject would not be in a position effectively to exercise his right to have data presumed unlawful or incorrect rectied, erased or blocked or to bring legal proceedings and obtain compensation for the damage suffered. The right to rectication, erasure and blocking of data Any person must be able to exercise the right of access to data relating to him which are being processed, in order to verify in particular the accuracy of the data and the lawfulness of the processing. 180 In line with these principles, data subjects must have the right under national law to obtain from the controller the rectication, erasure or blocking of their data if they think that their processing does not comply with the provision of the directive, in particular because of the inaccurate or incom- plete nature of the data. 181 Example: In Cemalettin Canli v. Turkey, 182 the ECtHR found a violation of Article8 of the ECHR in incorrect police reporting in criminal proceedings. The applicant had twice been involved in criminal proceedings because of alleged membership in illegal organisations but was never convicted. When the applicant was again arrested and indicted for another criminal offence, the police submitted to the criminal court a report entitled information form on additional offences, in which the applicant appeared as a member of two 180 Data Protection Directive, Recital41. 181 Ibid., Art.12(b). 182 ECtHR, Cemalettin Canli v. Turkey, No.22427/04, 18November2008, paras.33, 42 and 43; ECtHR, Dalea v. France, No.964/07, 2February2010. Handbook on European data protection law 110 illegal organisations. The applicants request to have the report and the police records amended was unsuccessful. The ECtHR held that the information in the police report was within the scope of Article8 of the ECHR, as public informa- tion could also fall within the scope of private life where it was systematically collected and stored in les held by the authorities. Moreover, the police report was incorrect and its drafting and submission to the criminal court had not been in accordance with the law. The Court concluded that there had been a violation of Article8. Example: In Segerstedt-Wiberg and Others v. Sweden, 183 the applicants had been afliated with certain liberal and communist political parties. They sus- pected that information about them had been entered into security police records. The ECtHR was satised that the storage of the data at issue had a legal basis and pursued a legitimate aim. In respect of some of the applicants, the ECtHR found that the continued retention of the data was a disproportionate interference with their private lives. For instance, in the case of MrSchmid, the authorities retained information that in1969 he had allegedly advocated vio- lent resistance to police control during demonstrations. The ECtHR found that this information could not have pursued any relevant national security interest, particularly given its historical nature. The ECtHR concluded that there had been a violation of Article8 of the ECHR in respect of four out of the ve applicants. In some cases, it will be sufcient for the data subject to simply request rectica- tion of, for example, the spelling of a name, change of address or telephone num- ber. If, however, such requests are linked to legal issues, such as the data subjects legal identity, or the correct place of residence for the delivery of legal documents, requests for rectication may not be enough and the controller may be entitled to demand proof of the alleged inaccuracy. Such demands must not place an unreason- able burden of proof on the data subject and thereby preclude data subjects from having their data rectied. The ECtHR has found violations of Article8 of the ECHR in several cases where the applicant has been unable to challenge the accuracy of information kept in secret registers. 184 183 ECtHR, Segerstedt-Wiberg and Others v. Sweden, No.62332/00, 6June2006, paras.89 and90; see also, for example: ECtHR, M.K. v. France, No.19522/09, 18April2013. 184 ECtHR, Rotaru v. Romania, No.28341/95, 4May2000. The data subjects rights and their enforcement 111 Example: In Ciubotaru v. Moldova, 185 the applicant was unable to change the registration of his ethnic origin in ofcial records from Moldovan to Romanian allegedly due to the fact that he had failed to substantiate his request. The ECtHR considered it acceptable for States to require objective evidence when registering an individuals ethnic identity. When such a claim was based on purely subjective and unsubstantiated grounds, the authorities could refuse. However, the applicants claim had been based on more than the subjective perception of his own ethnicity; he had been able to provide objectively veri- able links with the Romanian ethnic group such as language, name, empathy and others. However, under domestic law, the applicant was required to provide evidence that his parents had belonged to the Romanian ethnic group. Given the historical realities of Moldova, such a requirement had created an insur- mountable barrier to registering an ethnic identity other than the one recorded in respect of his parents by the Soviet authorities. In preventing the applicant from having his claim examined in the light of objectively veriable evidence, the State had failed to comply with its positive obligation to secure to the appli- cant effective respect for his private life. The Court concluded that there had been a violation of Article8 of theECHR. During civil litigation or proceedings before a public authority to decide whether data are correct or not, the data subject can request that an entry or note be placed on his data le outlining that the accuracy is contested and that an ofcial decision is pending. During this period, the data controller must not present the data as certain or nal, especially to third parties. A data subjects request to have data erased or deleted is often based on a claim that the data processing does not have a legitimate basis. Such claims often arise where consent has been withdrawn, or where certain data are no longer needed to full the purpose of the data collection. The burden of proof that the data process- ing is legitimate will fall on the data controller, as it is responsible for the legitimacy of the processing. According to the principle of accountability, the controller must at any time be able to demonstrate that there is a sound legal basis to its data process- ing, otherwise the processing must be stopped. If the processing of data is contested because the data are allegedly incorrect or unlawfully processed, the data subject, in accordance with the principle of fair pro- cessing, can demand that the data under dispute be blocked. This means that the 185 ECtHR, Ciubotaru v. Moldova, No.27138/04, 27April2010, paras.51 and59. Handbook on European data protection law 112 data are not deleted but that the controller must refrain from using the data during the period of blockage. This would be particularly necessary where continued use of inaccurate or illegitimately held data could harm the data subject. National law should provide more details about when the obligation to block the use of data may arise and how it should be exercised. Data subjects additionally have the right to obtain from the controller the notica- tion to third parties of any blocking, rectication or erasure, if they had received data prior to these processing operations. As the disclosure of data to third parties ought to have been documented by the controller, it should be possible to identify the data recipients and request deletion. If the data have, however, been published in the meantime, on the internet, for example, it may be impossible to have the data deleted in all instances, as the data recipients cannot be found. According to the Data Protection Directive, contacting data recipients for the rectication, deletion or blocking of data is mandatory, unless this proves impossible or involves a dispro- portionate effort. 186 5.1.2. Right to object The right to object includes the right to object to automated individual decisions, the right to object due to the data subjects particular situation and the right to object to further use of data for direct marketing purposes. The right to object to automated individual decisions Automated decisions are decisions taken using personal data processed solely by automatic means. If such decisions are likely to have considerable impact on the lives of individuals as they relate, for instance, to creditworthiness, performance at work, conduct or reliability, special protection is necessary to avoid inappropri- ate consequences. The Data Protection Directive provides that automated decisions ought not to determine questions which are important for individuals, and requires that the individual should have the right to review the automated decision. 187 Example: An important practical example of automated decision making is credit scoring. In order to decide quickly about the creditworthiness of a future customer, certain data such as profession and family situation are collected 186 Data Protection Directive, Art.12(c), last half sentence. 187 Ibid., Art.15(1). The data subjects rights and their enforcement 113 from the customer and combined with data about the subject available from other sources, such as credit information systems. These data are automatically fed into a scoring algorithm, which calculates an overall value representing the creditworthiness of the potential customer. Thus the company employee can decide within seconds whether the data subject is acceptable as a customer ornot. Nevertheless, according to the directive, Member States shall provide that a per- son may be subjected to an automated individual decision where the interests of the data subject either are not at stake, because the decision was in the data sub- jects favour, or are safeguarded by other appropriate means. 188 A right to object to automated decisions is also inherent in CoElaw, as can be seen in the Proling Recommendation. 189 The right to object due to the data subjects particular situation There is no general right of data subjects to object to the processing of their data. 190
Article14(a) of the Data Protection Directive, however, empowers the data sub- ject to raise objection on compelling legitimate grounds relating to the data subjects particular situation. A similar right has been recognised in the CoE Proling Recom- mendation. 191 Such provisions aim at nding the correct balance between the data subjects data protection rights and the legitimate rights of others in processing the data subjects data. Example: A bank stores data for seven years on its customers who default on loan payments. A customer whose data are stored in this database applies for another loan. The database is consulted, an evaluation of the nancial situa- tion is given, and the customer is refused the loan. The customer can, however, object to having personal data recorded in the database and request the dele- tion of the data if he or she can prove that the payment default was merely the result of an error which had been corrected immediately after the customer had become aware ofit. 188 Ibid., Art.15(2). 189 Proling Recommendation, Art.5(5). 190 See also ECtHR, M.S. v. Sweden, No.20837/92, 27August1997, where medical data were communicated without consent or the possibility to object; or ECtHR, Leander v. Sweden, No.9248/81, 26March1987; or ECtHR, Mosley v. the UnitedKingdom, No.48009/08, 10May2011. 191 Proling Recommendation, Art.5(3). Handbook on European data protection law 114 The effect of a successful objection is that the data in question may no longer be processed by the controller. Processing operations performed on the data subjects data prior to the objection, however, remain legitimate. The right to object to further use of data for direct marketing purposes Article14(b) of the Data Protection Directive provides for a specic right to object to the use of ones data for the purposes of direct marketing. Such a right is also laid down in the CoEDirect Marketing Recommendation. 192 This kind of objection is meant to be raised before data are made available to third parties for the purpose of direct marketing. The data subject must, therefore, be given the opportunity to object before the data are transferred. 5.2. Independent supervision Key points In order to ensure effective data protection, independent supervisory authorities must be established under national law. National supervisory authorities must act with complete independence, which must be guaranteed by the founding law and reected in the specic organisational structure of the supervisory authority. Supervisory authorities have specic tasks, among others, to: monitor and promote data protection at the national level; advise data subjects and controllers as well as the government and the public at large; hear complaints and assist the data subject with alleged violations of data protec- tion rights; supervise controllers and processors; intervene if necessary by warning, admonishing or even ning controllers and processors, 192 CoE, Committee of Ministers (1985), Recommendation Rec(85)20 to member states on the protection of personal data used for the purposes of direct marketing, 25October1985, Art.4(1). The data subjects rights and their enforcement 115 ordering data to be rectied, blocked or deleted, imposing a ban on processing; refer matters to court. The Data Protection Directive requires independent supervision as an important mechanism to ensure effective data protection. The directive introduced an instru- ment for the enforcement of data protection which did not appear, at rst, in Con- vention108 or in the OECD Privacy Guidelines. Given that independent supervision proved to be indispensable for the development of effective data protection, a new provision of the revised OECD Privacy Guide- lines adopted in2013 calls on Member countries to establish and maintain privacy enforcement authorities with the governance, resources and technical expertise necessary to exercise their powers effectively and to make decisions on an objec- tive, impartial and consistent basis. 193 Under CoElaw, the Additional Protocol to Convention108 has made the establish- ment of supervisory authorities mandatory. This instrument contains in Article1 the legal framework for independent supervisory authorities which the Contracting Par- ties must implement in their domestic law. It uses similar formulations to describe the tasks and powers of these authorities as used in the Data Protection Directive. In principle, supervisory authorities should, therefore, function in the same manner under EU and CoElaw. Under EUlaw, the competences and organisational structure of supervisory authori- ties were first outlined in Article28(1) of the Data Protection Directive. The EU Institutions Data Protection Regulation 194 establishes the EDPS as the supervisory authority for data processing by the EU bodies and institutions. When outlining the supervisory authoritys roles and responsibilities, this regulation draws on the expe- rience gathered since the promulgation of the Data Protection Directive. 193 OECD (2013), Guidelines governing the protection of privacy and transborder ows of personal data, para.19(c). 194 Regulation (EC) No.45/2001 of the European Parliament and of the Council of 18December2000 on the protection of individuals with regard to the processing of personal data by the institutions and bodies of the Community and on the free movement of such data, OJ2001L8, Art.4148. Handbook on European data protection law 116 The independence of data protection authorities is guaranteed under Article16(2) of the TFEU and Article8(3) of the Charter. This last provision specically views con- trol by an independent authority as an essential element of the fundamental right to data protection. In addition, the Data Protection Directive requires Member States to establish supervisory authorities to monitor the application of the directive acting with complete independence. 195 Not only must the law underpinning a supervisory bodys creation contain provisions specically guaranteeing independence, but the specic organisational structure of the authority must demonstrate independence. In 2010, the CJEU dealt for the first time with the question of the scope of the requirement of independence of data protection supervisory authorities. 196 The fol- lowing examples illustrate its thinking. Example: In European Commission v. Germany, 197 the European Commission had requested the CJEU to declare that Germany had incorrectly transposed the requirement of complete independence of the supervisory authorities respon- sible for ensuring data protection and thus failed to full its obligations under Article28(1) of Data Protection Directive. In the Commissions view, the prob- lem was that Germany had put under State oversight the authorities responsi- ble for monitoring the processing of personal data outside the public sector in the different federal states (Lnder). The assessment of the substance of the action depended, according to the Court, on the scope of the requirement of independence contained in that provi- sion and, therefore, on its interpretation. The Court underlined that the words with complete independence in Arti- cle28(1) of the directive must be interpreted based on the actual wording of that provision and on the aims and scheme of the Data Protection Directive. 198
The Court stressed that the supervisory authorities are the guardians of rights related to personal data processing ensured in the directive and that their estab- lishment in Member States is thus considered as an essential component of the 195 Data Protection Directive, Art.28(1), last sentence; Convention108, Additional Protocol, Art.1(3). 196 See FRA (2010), Fundamental rights: challenges and achievements in2010, Annual report2010, p.59. The FRA addressed this issue in greater detail in its report on Data protection in the European Union: the role of National Data Protection Authorities, which was published in May2010. 197 CJEU, C-518/07, European Commission v. Federal Republic of Germany, 9March2010, para.27. 198 Ibid., paras.17 and29. The data subjects rights and their enforcement 117 protection of individuals with regard to the processing of personal data. 199 The Court concluded that when carrying out their duties, the supervisory authori- ties must act objectively and impartially. For that purpose, they must remain free from any external inuence, including the direct or indirect inuence of the State or the Lnder, and not of the inuence only of the supervised bodies. 200 The CJEU also found that the meaning of complete independence should be interpreted in light of the independence of the EDPS as dened in the EU Insti- tutions Data Protection Regulation. As underlined by the Court, Article44(2) thereof clarifies the concept of independence by adding that, in the perfor- mance of its duties, the EDPS may neither seek nor take instructions from any- body. This rules out state supervision of an independent data protection super- visory authority. 201
Accordingly, the CJEU held that the German data protection institutions at fed- eral state level responsible for monitoring the processing of personal data by non-public bodies were not sufciently independent because they were subject to oversight by the state. Example: In the European Commission v. Austria, 202 the CJEU highlighted similar problems concerning the position of certain members and the staff of the Aus- trian Data Protection Authority (Data Protection Commission, DSK). The Court concluded in this case that Austrian legislation precluded the Austrian Data Pro- tection Authority from exercising its functions with complete independence within the meaning of the Data Protection Directive. The independence of the Austrian DPA was not sufficiently assured, because the Federal Chancellery supplies the DSK with its workforce, oversees the DSK and has the right to be informed at all times about its work. Example: In European Commission v. Hungary, 203 the CJEU pointed out that the requirement [] to ensure that each supervisory authority is able to carry out the tasks entrusted to it in complete independence entails an obligation for the Member State concerned to allow that authority to serve its full term of ofce. 199 Ibid., para.23. 200 Ibid., para.25. 201 Ibid., para.27. 202 CJEU, C-614/10, European Commission v. Republic of Austria, 16October2012, paras.59 and63. 203 CJEU, C-288/12, European Commission v. Hungary, 8April2014, paras.50 and 67. Handbook on European data protection law 118 The court also held that by prematurely bringing to an end the term served by the supervisory authority for the protection of personal data, Hungary has failed to full its obligations under Directive 95/46/EC []. Supervisory authorities have, under national law, powers and capabilities to: 204 advise controllers and data subjects on all matters of data protection; investigate processing operations and intervene accordingly; warn or admonish controllers; order the rectication, blocking, erasure or destruction of data; impose a temporary or denitive ban on processing; refer the matter to court. To exercise its functions, a supervisory authority must have access to all personal data and information necessary for an enquiry, as well as access to any premises in which a controller keeps relevant information. There are considerable differences between domestic jurisdictions pertaining to the procedures and legal effect of a supervisory authoritys ndings. They can range from ombudsman-like recommendations to immediately executable decisions. Therefore, when analysing the efciency of remedies available within a jurisdiction, the remedial instruments must be judged in their context. 5.3. Remedies and sanctions Key points According to Convention108 as well as the Data Protection Directive, national law must set out appropriate remedies and sanctions against infringements of the right to data protection. 204 Data Protection Directive, Art.28; see further Convention108, Additional Protocol, Art.1. The data subjects rights and their enforcement 119 The right to an effective remedy requires, under EUlaw that national law set out judicial remedies against infringements of data protection rights, irrespective of the possibility of approaching a supervisory authority. Sanctions must be set out by national law that are effective, equivalent, propor- tionate and dissuasive. Before turning to the courts, one must rst approach a controller. Whether or not it is also mandatory to approach a supervisory authority before applying to a court, is left to regulation by national law. Data subjects may bring violations of data protection law, as a last resort and under certain conditions, before theECtHR. In addition, the CJEU can be approached by data subjects, but only to a very limited extent. Rights under data protection law can be exercised only by the person whose rights are at stake; this will be someone who is, or at least claims to be, the data subject. Such persons may be represented in the exercise of their rights by persons who, under national law, full the necessary requirements. Minors must be represented by their parents or guardians. Before the supervisory authorities, a person can also be represented by associations whose lawful aim is to promote data protection rights. 5.3.1. Requests to the controller The rights mentioned in Section3.2 must at rst be exercised vis--vis the controller. Approaching the national supervisory authority or a court directly would not help, as the authority could only advise that the controller must be addressed rst, and the court would nd an application inadmissible. The formal requirements for a legally relevant request to a controller, especially whether not it must be a written request, ought to be regulated by national law. The entity that was addressed as the controller must react to a request, even if it is not the controller. A response must, in any case, be delivered to the data subject within the timeframe set out by national law, even if it is only to say that no data are being processed about the requester. In compliance with the provisions of Arti- cle12(a) of the Data Protection Directive and Article8(b) of Convention108, that request must be handled with without excessive delay. National law should, there- fore, prescribe a response period which is short enough but, nevertheless, enables the controller to deal adequately with the request. Handbook on European data protection law 120 Prior to answering the request, the entity approached as controller must establish the requesters identity to determine whether he or she is indeed the person he or she claims to be and thus avoid a serious breach of condentiality. Where the requirements for establishing identity are not specically regulated by national law, they must be decided by the controller. The principle of fair processing would, how- ever, demand that controllers do not prescribe overly burdensome conditions for acknowledging identication (and the authenticity of the request, as discussed in Section2.1.1). National law must also deal with the question of whether or not controllers, before responding to requests, may require a fee to be paid by the requester: Article12(a) of the directive and Article8(b) of Convention108 provide that response to access requests must be given without excessive [] expense. National law in many Euro- pean countries provides that requests under data protection law must be responded to free of charge, as long as responding does not cause excessive and unusual effort; in turn, controllers are usually protected by national law against abuse of the right to obtain a response to requests. If the person, institution or body, approached as the controller, does not deny being the controller, this entity has, within the time frame prescribed by national law, to: either accede to the request and notify the requesting person how the request was complied with; or inform the requester why his or her request will not be complied with. 5.3.2. Claims lodged with the supervisory authority Where a person, having made a request for access or having put in an objection with a controller, does not receive an answer which is timely and satisfactory, this person can approach the national data protection supervisory authority with a claim for assistance. In the course of the proceedings before the supervisory authority, it should be claried whether or not the person, institution or body addressed by the requester was indeed obliged to react to the request and whether the reaction was correct and sufcient. The person concerned must be informed by the supervi- sory authority of the outcome of the proceedings dealing with the claim. 205 The legal effects of the results of proceedings before national supervisory authorities depend 205 Data Protection Directive, Art.28(4). The data subjects rights and their enforcement 121 on national law: whether the authoritys decisions can be legally executed, meaning that they are enforceable by ofcial authority, or whether it is necessary to appeal to a court if the controller does not follow the decisions (opinion, admonition, etc.) of the supervisory authority. In the event that data protection rights guaranteed under Article16 of theTFEU are allegedly infringed by EU institutions or bodies, the data subject may lodge a com- plaint with the EDPS, 206 the independent supervisory authority for data protection according to the EU Institutions Data Protection Regulation setting out the duties and powers of the EDPS. In the absence of a response from the EDPS within six months, the complaint shall be deemed to have been rejected. Against decisions by a national supervisory authority, there must be the possibility to appeal to the courts. This applies to the data subject as well as to controllers, hav- ing been a party to proceedings before a supervisory authority. Example: The United Kingdom Information Commissioner issued a decision on 24July2013 asking the Hertfordshire police to stop using a vehicle plate track- ing system that it considered unlawful. The data collected by cameras were stored both in local police force databases and in a centralised database. License plate photos were stored for two years and photographs of cars for 90 days. It was held that such an extensive use of cameras and other forms of surveillance was not proportionate to the problem it was trying to address. 5.3.3. Claim lodged with a court According to the Data Protection Directive, if the person, having made a request under data protection law to a controller, is not satisfied with the controllers response, this person must be entitled to bring a complaint before a national court. 207 Whether or not it is mandatory to approach the supervisory authority rst, before applying to a court, is left to regulation by national law. In most cases, however, it will be advantageous for the persons, exercising their data protection rights, to approach the supervisory authority first, as proceedings on claims for their 206 Regulation (EC) No.45/2001 of the European Parliament and of the Council of 18December2000 on the protection of individuals with regard to the processing of personal data by the institutions and bodies of the Community and on the free movement of such data, OJ2001L8. 207 Data Protection Directive, Art.22. Handbook on European data protection law 122 assistance should be non-bureaucratic and free of charge. The expertise docu- mented in the supervisory authoritys decision (opinion, admonition, etc.) may also help the data subject to pursue his or her rights before the courts. Under CoElaw, violations of data protection rights, allegedly performed at the national level of a Contracting Party to the ECHR and constituting at the same time a violation of Article8of the ECHR, may, additionally, be brought before the ECtHR after exhaustion of all available domestic remedies. Pleading a violation of Arti- cle8of the ECHR before the ECtHR must also meet other admissibility criteria (Arti- cles3437 of theECHR). 208 Although applications to the ECtHR can be directed only against Contracting Parties, they can also indirectly deal with actions or omissions of private parties, in so far as a Contracting Party has not fullled its positive obligations under the ECHR and not provided sufcient protection against infringements of data protection rights in its nationallaw. Example: In K.U. v. Finland, 209 the applicant, a minor, complained that an adver- tisement of a sexual nature had been posted about him on an internet dat- ing site. The identity of the person who had posted the information was not revealed by the service provider because of condentiality obligations under Finnish law. The applicant claimed that Finnish law did not provide sufcient protection against such actions of a private person placing incriminating data about the applicant on the internet. The ECtHR held that states were not only compelled to abstain from arbitrary interference with individuals private lives, but may also be subject to positive obligations which involve the adoption of measures designed to secure respect for private life even in the sphere of the relations of individuals between themselves. In the applicants case, his practi- cal and effective protection required that effective steps be taken to identify and prosecute the perpetrator. However, such protection was not afforded by the state, and the Court concluded that there had been a violation of Article8 of theECHR. 208 ECHR, Art.3437, available at: www.echr.coe.int/Pages/home.aspx?p=caselaw/ analysis&c=#n1347458601286_pointer. 209 ECtHR, K.U. v. Finland, No.2872/02, 2December2008. The data subjects rights and their enforcement 123 Example: In Kpke v. Germany, 210 the applicant had been suspected of theft at her workplace and therefore subjected to covert video surveillance. The ECtHR concluded that there was nothing to indicate that the domestic authori- ties failed to strike a fair balance, within their margin of appreciation, between the applicants right to respect for her private life under Article8 and both her employers interest in the protection of its property rights and the public interest in the proper administration of justice. The application was therefore declared inadmissible. If the ECtHR nds that a State Party has violated any of the rights protected by the ECHR, the State Party is obliged to execute the ECtHRs judgment. Execution meas- ures must rst put an end to the violation and remedy, as far as possible, its nega- tive consequences for the applicant. Execution of judgments may also require gen- eral measures to prevent violations similar to those found by the Court, whether through changes in legislation, case law or other measures. Where the ECtHR nds a violation of the ECHR, Article41 of the ECHR provides that it may award just satisfaction to the applicant at the expense of the State Party. Under EUlaw, 211 the victims of infringements of national data protection law, which implements the EU data protection law, can in some cases bring their cases before the CJEU. There are two possible scenarios for how a data subjects claim that his or her data protection rights have been infringed may lead to proceedings before theCJEU. In the rst scenario, the data subject would have to be the direct victim of an EU administrative or regulatory act which violates the individuals right to data protec- tion. According to Article263(4) of theTFEU: any natural or legal person may [...] institute proceedings against an act addressed to that person or which is of direct and individual concern to them, and against a regulatory act which is of direct concern to them and does not entail implementing measures. 210 ECtHR, Kpke v. Germany (dec.), No.420/07, 5October2010. 211 EU (2007), Treaty of Lisbon amending the Treaty on European Union and the Treaty establishing the European Community, signed at Lisbon, 13December2007, OJ2007C306. See also the consolidated versions of the Treaty on European Union, OJ2012C326 and of the TFEU, OJ2012C326. Handbook on European data protection law 124 Thus, victims of the unlawful processing of their data by an EU organ can appeal directly to the CJEUs General Court, which is its body with the competence to pro- vide judgment in matters of the EU Institutions Data Protection Regulation. The abil- ity to apply directly to the CJEU also exists if someones legal situation is directly affected by an EU legal provision. The second scenario concerns the competence of the CJEU (Court of Justice) to give preliminary rulings according to Article267 of theTFEU. Data subjects may, in the course of domestic proceedings, ask the national court to request clarication from the Court of Justice on the interpretation of the EU Treaties and on the interpretation and validity of acts of the institutions, bodies, ofces or agencies of the EU. Such clarications are known as preliminary rulings. This is not a direct remedy for the complainant, but it enables national courts to ensure that they apply the correct interpretation of EUlaw. If a party to the proceedings before the national courts requests referral of a ques- tion to the CJEU, only those national courts which act as a nal resort, against whose decisions there is no judicial remedy, are obliged to comply. Example: In Krntner Landesregierung and Others, 212 the Austrian Constitutional Court submitted questions to the CJEU concerning the validity of Articles3 to9 of Directive2006/24/EC (Data Retention Directive) in light of Articles7, 9 and11 of the Charter and whether or not certain provisions of the Austrian Federal Law on Telecommunications transposing the Data Retention Directive were incom- patible with aspects of the Data Protection Directive and of the EU Institutions Data Protection Regulation. Mr Seitlinger, one of the applicants in the Constitutional Courts proceedings, held that he uses the telephone, the internet and email both for work pur- poses and in his private life. Consequently, the information which he sends and receives passes over public telecommunication networks. Under the Austrian Telecommunications Act of2003, his telecommunications provider is legally required to collect and store data about his use of the network. Mr Seitlinger realised that this collection and storage of his personal data was in no way necessary for the technical purposes of getting the information fromA toB on the network. Nor, indeed, was the collection and storage of these data even 212 CJEU, Joined cases C-293/12 and C-594/12, Digital Rights Ireland and Seitling and Others, 8April2014. The data subjects rights and their enforcement 125 remotely necessary for billing purposes. Mr Seitlinger had certainly not con- sented to this use of his personal data. The sole reason for the collection and storage of all of these extra data was the Austrian Telecommunications Act of2003. Mr Seitlinger, therefore, brought an action before the Austrian Constitutional Court in which he alleged that the statutory obligations on his telecommuni- cations provider were breaching his fundamental rights under Article8 of the EUCharter. The CJEU gives a decision only on the constituent elements of the request for a pre- liminary ruling referred to it. The national court remains competent to decide the original case. On principle, the Court of Justice must answer the questions put to it. It cannot refuse to give its preliminary ruling on the grounds that this response would be neither rel- evant nor timely as regards the original case. It can, however, refuse if the question does not fall within its sphere of competence. Finally, if data protection rights, which are guaranteed by Article16of the TFEU, are allegedly infringed by an EU institution or body in the course of processing personal data, the data subject may bring the case before the General Court of the CJEU (Arti- cle32(1) and(4) of the EU Institutions Data Protection Regulation). The same applies to decisions of the EDPS concerning such infringements (Article32(3) of the EU Institutions Data Protection Regulation). While the CJEUs General Court is competent to provide judgment in matters of the EU Institutions Data Protection Regulation, if, however, a person in the capacity of a staff member of an EU institution or body seeks a remedy, this person must appeal to the EU Civil Service Tribunal. Example: The European Commission v. The Bavarian Lager Co. Ltd 213 illustrates the remedies available against activities or decisions of EU institutions and bod- ies relevant to data protection. 213 CJEU, C-28/08 P, European Commission v. The Bavarian Lager Co. Ltd, 29June2010. Handbook on European data protection law 126 Bavarian Lager requested from the European Commission access to the full minutes of a meeting held by the Commission and allegedly relating to legal questions relevant to the company. The Commission had rejected the com- panys request for access on grounds of overriding data protection interests. 214
Against this decision, the Bavarian Lager had, in application of Article32 of the EU Institutions Data Protection Regulation, brought a complaint before the CJEU; more precisely, before the Court of First Instance (the forerunner of the General Court). In its decision in case T-194/04, Bavarian Lager v. Commission, the Court of First Instance annulled the decision of the Commission to reject the access request. The European Commission appealed this decision to the Court of Justice of the CJEU. The Court of Justice gave judgment (in Grand Chamber) setting aside the judgment of the Court of First Instance and conrmed the European Com- missions rejection of the request foraccess. 5.3.4. Sanctions Under CoElaw, Article10 of Convention108 provides that appropriate sanctions and remedies must be established by each Party for violations of provisions of domestic law giving effect to the basic principles of data protection set out in Con- vention108. 215 Under EUlaw, Article24 of the Data Protection Directive rules that Member States shall adopt suitable measures to ensure the full implementation of the provisions of this Directive and shall in particular lay down the sanctions to be imposed in case of infringement of the provisions adopted []. Both instruments give Member States a wide margin of discretion in choosing the appropriate sanctions and remedies. Neither legal instrument offers particular guid- ance about the nature or type of appropriate sanctions, nor do they give examples of sanctions. However: although EU Member States enjoy a margin of discretion in determining what measures are most appropriate for safeguarding rights that individuals derive from EUlaw, in line with the principle of loyal cooperation as laid 214 For an analysis of the argument, see: EDPS (2011), Public access to documents containing personal data after the Bavarian Lager ruling, Brussels, EDPS, available at: www.secure.edps.europa.eu/EDPSWEB/ webdav/site/mySite/shared/Documents/EDPS/Publications/Papers/BackgroundP/11-03-24_Bavarian_ Lager_EN.pdf. 215 ECtHR, I. v. Finland, No.20511/03, 17July2008; ECtHR, K.U. v. Finland, No.2872/02, 2December2008. The data subjects rights and their enforcement 127 down in Article4(3) of the TEU, the minimum requirements of effectiveness, equivalence, proportionality and dissuasiveness should be respected. 216 The CJEU has repeatedly maintained that national law is not completely free to determine sanctions. Example: In Von Colson and Kamann v. Land Nordrhein-Westfalen, 217 the CJEU pointed out that all the Member States to which a directive is addressed are obliged to adopt, in their national legal systems, all necessary measures to ensure that it is fully effective, in accordance with the objective that it pursues. The Court held that, although it is up to the Member States to choose the ways and means of ensuring that a directive is implemented, that freedom does not affect the obligation imposed on them. In particular, an effective legal remedy must enable the individual to pursue and enforce the right in question to its full substantive extent. In order to achieve that true and effective protection, legal remedies must trigger penal and/or compensatory procedures leading to sanc- tions with a deterrent effect. Regarding the sanctions against infringements of EUlaw by EU institutions or bod- ies, because of the special remit of the EU Institutions Data Protection Regulation, sanctions are envisaged only in the form of disciplinary action. According to Arti- cle49 of the regulation, any failure to comply with the obligations pursuant to this Regulation, whether intentionally or through negligence on his or her part, shall make an ofcial or other servant of the European Communities liable to disciplinary action[]. 216 FRA (2012), Opinion of the EuropeanUnionAgencyforFundamentalRights on the proposed data protection reform package, 2/2012, Vienna, 1October2012, p.27. 217 CJEU, C-14/83, Sabine von Kolson and Elisabeth Kamann v. Land Nordrhein-Westfalen, 10April1984. 129 EU Issues covered CoE Transborder data ows Data Protection Directive, Article25(1) CJEU, C-101/01, Bodil Lindqvist, 6November2003 Denition Convention108, Additional Protocol, Article2(1) Free ow of data Data Protection Directive, Article1(2) Between EU Member States Between Contracting Parties to Convention108 Convention108, Article12(2) Data Protection Directive, Article25 To third countries with adequate level of data protection Convention108, Additional Protocol, Article2(1) Data Protection Directive, Article26(1) To third countries in specic cases Convention108, Additional Protocol, Article2(2)(a) Restricted ow of data to third countries Data Protection Directive, Article26(2) Data Protection Directive, Article26(4) Contractual clauses Convention108, Additional Protocol, Article2(2)(b) Guide to the preparation of contractual clauses Data Protection Directive, Article26(2) Binding corporate rules Examples: EUUS PNR-Agreement EUUS SWIFT-Agreement Special international agreements Transborder data ows 6 Handbook on European data protection law 130 The Data Protection Directive not only provides for the free ow of data between the Member States but also contains provisions on the requirements for the trans- fer of personal data to third countries outside the EU. The CoE also recognised the importance of implementing rules for transborder data ows to third countries and adopted the Additional Protocol to Convention108 in2001. This Protocol took over the main regulatory features on transborder data ows from convention parties and EU Member States. 6.1. Nature of transborder data ows Key points Transborder data ow is a transfer of personal data to a recipient who or which is sub- ject to a foreign jurisdiction. Article2(1) of the Additional Protocol to Convention108 describes transborder data ow as the transfer of personal data to a recipient who or which is subject to a for- eign jurisdiction. Article25(1) of the Data Protection Directive regulates transfer to a third country of personal data which are undergoing processing or are intended for processing after transfer []. Such data transfer is allowed only according to the rules set forth in Article2 of the Additional Protocol to Convention108 and, for EU Member States, additionally in Articles25 and26 of the Data Protection Directive. Example: In Bodil Lindqvist, 218 the CJEU held that the act of referring, on an internet page, to various persons and identifying them by name or by other means, for instance by giving their telephone number or information regarding their working conditions and hobbies, constitutes the processing of personal data wholly or partly by automatic means, within the meaning of Article3(1) of Directive95/46. The Court then pointed out that the directive also lays down specific rules intended to allow the Member States to monitor the transfer of personal data to third countries. 218 CJEU, C-101/01, Bodil Lindqvist, 6November2003, paras.27, 68 and69. Transborder data ows 131 However, given, rst, the state of development of the internet at the time the directive was drawn up and, second, the absence in the directive of criteria applicable to the use of the internet, one cannot presume that the Commu- nity legislature intended the expression transfer [of data] to a third country to cover the loading [...] of data onto an internet page, even if those data are thereby made accessible to persons in third countries with the technical means to accessthem. Otherwise, if the directive was interpreted to mean that there is transfer of data to a third country every time that personal data are loaded onto an inter- net page, that transfer would necessarily be a transfer to all the third countries where there are the technical means needed to access the internet. The special regime provided for [by the directive] would thus necessarily become a regime of general application, as regards operations on the internet. Thus, if the Com- mission found [...] that even one third country did not ensure adequate protec- tion, Member States would be obliged to prevent any personal data from being placed on the internet. The principle that mere publication of (personal) data is not to be considered as transborder data ow applies also to online public registers or to mass media, such as (electronic) newspapers and television. Only communication which is directed at specic recipients is eligible for the concept of transborder dataow. 6.2. Free data ows between Member States or between ContractingParties Key points Transfer of personal data to another member state of the European Economic Area or to another Contracting Party to Convention108 must be free from restrictions. According to Article12(2) of Convention108, under CoElaw there must be a free ow of personal data between the Parties to the convention. Domestic law may not restrict the export of personal data to a Contracting Party unless: Handbook on European data protection law 132 the special nature of the data so requires; 219 or the restriction is necessary to avoid circumvention of domestic legal provisions on transborder data ow to third parties. 220 Under EUlaw, restrictions or prohibitions on the free ow of data between Member States for reasons of data protection are forbidden by Article1(2) of the Data Pro- tection Directive. The area of free data ow has been extended by the Agreement on the European Economic Area(EEA), 221 which brings Iceland, Liechtenstein and Norway into the internal market. Example: If an afliate of an international group of companies, being estab- lished in several EU Member States, amongst them Slovenia and France, transfers personal data from Slovenia to France, such data ow must not be restricted or prohibited by Slovenian national law. If, however, the same Slovenian afliate wants to transfer the same personal data to the parent company in theUnited States, the Slovenian data exporter must go through the proceedings laid down in Slovenian law for transborder data ow to third countries without adequate data protection, unless the par- ent company had joined the Safe Harbor Privacy Principles, a voluntary Code of Conduct on providing an adequate level of data protection (see Section6.3.1). Transborder data ows to Member States of the EEA for purposes outside the remit of the internal market, such as for investigating crimes, are not, however, subject to the provisions of the Data Protection Directive and, therefore, not covered by the principle of free ow of data. As concerns CoElaw, all areas are included within the scope of Convention108 and the Additional Protocol to Convention108, although exemptions may be made by the Contracting Parties. All members of the EEA are also Parties to Convention108. 219 Convention108, Art.12(3)(a). 220 Ibid., Art.12(3)(b). 221 Decision of the Council and the Commission of 13December1993 on the conclusion of the Agreement on the EuropeanEconomicArea between the European Communities, their Member States and the Republic of Austria, the Republic of Finland, the Republic of Iceland, the Principality of Liechtenstein, the Kingdom of Norway, the Kingdom of Sweden and the Swiss Confederation, OJ1994L1. Transborder data ows 133 6.3. Free data ows to third countries Key points Transfer of personal data to third countries shall be free from restrictions under national data protection law, if: adequacy of data protection at the recipient has been ascertained; or it is necessary in the specic interests of the data subject or legitimate prevailing interests of others, especially important public interests. Adequacy of data protection in a third country means that the main principles of data protection have been effectively implemented in the national law of this country. Under EUlaw, the adequacy of data protection in a third country is assessed by the European Commission. Under CoElaw, it is left to domestic law to regulate how ade- quacy is assessed. 6.3.1. Free data ow because of adequate protection CoElaw permits domestic law to allow for the free ow of data to non-contracting states if the recipient state or organisation ensures an adequate level of protection for the intended data transfer. 222 Domestic law decides how to assess the level of data protection in a foreign country and who should assess it. Under EUlaw, the free flow of data to third countries with an adequate level of data protection is provided for in Article25(1) of the Data Protection Directive. The requirement of adequacy rather than equivalence makes it possible to honour different ways of implementing data protection. According to Article25(6) of the directive, the European Commission is competent to assess the level of data protec- tion in foreign countries through adequacy ndings and consults on the assessment with the Article29 Working Party which has substantially contributed to the inter- pretation of Articles25 and26. 223 222 Convention108, Additional Protocol, Art.2(1). 223 See, for example, Article29 Working Party (2003), Working document on transfers of personal data to third countries: applying Article26(2) of the EU Data Protection Directive to binding corporate rules for international data transfers, WP74, Brussels, 3June2003; and Article29 Working Party (2005), Working document on a common interpretation of Article26(1) of Directive 95/46/EC of 24October1995, WP114, Brussels, 25November2005. Handbook on European data protection law 134 An adequacy nding by the European Commission has binding effect. If the Euro- pean Commission publishes an adequacy nding for a certain country in the Ofcial Journal of the European Union, all member countries of the EEA and their organs are bound to follow the decision, meaning that data can ow to this country without checking or licensing procedures before national authorities. 224 The European Commission is also able to assess parts of a countrys legal system, or conne itself to singular topics. The Commission made an adequacy nding, for instance, solely concerning Canadas private commercial legislation. 225 There are also several adequacy ndings for transfers based on agreements between the EU and foreign states. These decisions refer exclusively to a single type of data transfer, such as the transmission of passenger name records by airlines to foreign border control authorities when the airline ies from theEU to certain overseas destinations (see Section6.4.3). More recent practice of data transfer based on special agree- ments between the EU and third countries generally does away with the need for adequacy ndings, assuming that the agreement itself offers an adequate level of data protection. 226 One of the most important adequacy decisions does not actually relate to a set of legal provisions. 227 Rather, it concerns rules, much like a Code of Conduct, known as Safe Harbour Privacy Principles. These principles were elaborated between the EU and the US for USbusiness companies. Membership in Safe Harbour is achieved by voluntary commitment declared before the US Commerce Department and docu- mented in a list published by that department. As one of the important elements of adequacy is the effectiveness of the implementation of data protection, the Safe Harbour Arrangement also provides for a certain amount of state supervision: only 224 For a continually updated list of countries that have received a nding of adequacy, see the homepage of the European Commission, Directorate-General for Justice, available at: http://ec.europa.eu/justice/ data-protection/document/international-transfers/adequacy/index_en.htm. 225 European Commission (2002), Decision 2002/2/EC of 20December2001 pursuant to Directive 95/46/EC of the European Parliament and of the Council on the adequate protection of personal data provided by the Canadian Personal Information Protection and Electronic Documents Act, OJ2002L2. 226 For instance, the Agreement between the United States of America and the European Union on the use and transfer of Passenger Name Records to the United States Department of Homeland Security (OJ2012L215, pp.514) or the Agreement between the European Union and the United States of America on the processing and transfer of Financial Messaging Data from the European Union to the United States for purposes of the Terrorist Finance Tracking Program, OJ2010L8, pp.1116. 227 European Commission (2000), Commission Decision 2000/520/EC of 26July2000 pursuant to Directive 95/46/EC of the European Parliament and of the Council on the adequacy of the protection provided by the safe harbour privacy principles and related frequently asked questions issued by the US Department of Commerce, OJ2000L215. Transborder data ows 135 those companies can join the Safe Harbour, which are subject to the supervision of the USFederal Trade Commission. 6.3.2. Free data ow in specic cases Under CoElaw, Article2(2) of the Additional Protocol to Convention108 allows for the transfer of personal data to third countries where there is no adequate data protection, as long as the transfer is provided for by domestic law and is necessary forthe: specic interests of the data subject; or legitimate prevailing interests of others, especially important public interests. Under EUlaw, Article26(1) of the Data Protection Directive contains provisions which are similar to those of the Additional Protocol to Convention108. Under the directive, interests of the data subject may justify the free ow of data to a third country if: the unambiguous consent of the data subject to the export of the data is given; or the data subject enters or prepares to enter into a contractual relationship which clearly requires that the data be transferred to a recipient abroad; or a contract between a data controller and a third party was closed in the interests of the data subject; or transfer is necessary in order to protect the vital interests of the data subject. for the transfer of data from public registers; this is an instance of prevailing interests in the general public to be able to access information stored in public registers. The legitimate interests of others may justify free transborder ow of data: 228 228 Data Protection Directive, Art.26(1)(d). Handbook on European data protection law 136 owing to an important public interest, other than matters of national or public security, as they are not covered by the Data Protection Directive;or to establish, exercise or defend legal claims. The cases referred to above must be understood as exemptions from the rule that uninhibited data transfer to other countries requires an adequate level of data pro- tection in the recipient country. Exemptions must always be interpreted restrictively. This has been underlined repeatedly by the Article29 Working Party in the context of Article26(1) of the Data Protection Directive, particularly if consent is the pur- ported basis for data transfer. 229 The Article29 Working Party has concluded that the general rules on the legal signicance of consent also apply to Article26(1) of the directive. If, in the context of labour relations, for example, it is unclear that the consent given by employees was actually free consent, then data transfers cannot be founded on Article26(1)(a) of the directive. In such cases, Article26(2), which requires national data protection authorities to issue a licence for data transfers, willapply. 6.4. Restricted data ows to third countries Key points Before exporting data to third countries not ensuring an adequate level of data protec- tion, the controller may be required to subject the intended data ow to examination by the supervisory authority. The controller who wants to export data must demonstrate two issues during this examination: that a legal basis exists for the data transfer to the recipient;and that measures are in place to safeguard adequate protection of the data at the recipient. Measures for establishing adequate data protection at the recipient may include: contractual stipulations between the data-exporting controller and the foreign data recipient;or 229 See especially Article29 Working Party (2005), Working document on a common interpretation of Article26(1) of Directive 95/46/EC of 24October1995, WP114, Brussels, 25November2005. Transborder data ows 137 binding corporate rules, usually applicable for data transfers within a multinational group ofcompanies. Data transfers to foreign authorities can also be governed by a special international agreement. The Data Protection Directive and the Additional Protocol to Convention108 permit domestic law to establish regimes for transborder data ows to third countries not ensuring an adequate level of data protection, so long as the controller has made special arrangements to ensure adequate data protection safeguards at the recipient and so long as the controller can prove this to a competent authority. This require- ment is explicitly mentioned only in the Additional Protocol to Convention108; however, it is also considered to be standard procedure under the Data Protection Directive. 6.4.1. Contractual clauses Both CoElaw and EUlaw mention contractual clauses between the data-exporting controller and the recipient in the third country as a possible means of safeguarding a sufcient level of data protection at the recipient. At the EU level, the European Commission with the assistance of the Article29 Working Party developed standard contractual clauses which were ofcially cer- tied by a Commission Decision as proof of adequate data protection. 230 As Com- mission decisions are binding in their entirety in the Member States, the national authorities in charge of supervising transborder data ows must acknowledge these standard contractual clauses in their procedures. 231 Thus, if the data-exporting con- troller and the third-country recipient agree and sign these clauses, this ought to provide the supervisory authority with sufcient proof that adequate safeguards are inplace. The existence of standard contractual clauses in the EU legal framework does not prohibit controllers from formulating other ad hoc contractual clauses. They would, however, have to produce the same level of protection as provided by the stand- ard contractual clauses. The most important features of the standard contractual clausesare: 230 Data Protection Directive, Art.26(4). 231 TFEU, Art.288. Handbook on European data protection law 138 a third-party beneciary clause which enables data subjects to exercise contrac- tual rights even though they are not a party to the contract; the data recipient or importer agreeing to be subject to the procedure of the data-exporting controllers national supervisory authority and/or courts in case of dispute. There are now two sets of standard clauses for controller-to-controller transfers available, from which the data-exporting controller can choose. 232 For controller-to- processor transfers, there is only one set of standard contractual clauses. 233 Within the context of CoElaw, the Consultative Committee of Convention108 drew up a guide on the preparation of contractual clauses. 234 6.4.2. Binding corporate rules Multilateral binding corporate rules (BCRs) very often involve several European data protection authorities at the same time. 235 In order for BCRs to be approved, the draft of the BCRs must be sent together with the standardised application forms to the lead authority. 236 The lead authority is identiable from the standardised applica- tion form. This authority then informs all of the supervisory authorities in EEA mem- ber countries where afliates of the group are established, although their participa- tion in the evaluation process of the BCRs is voluntary. Although it is not binding, all 232 SetI is contained in the Annex to the European Commission (2001), Commission Decision 2001/497/EC of 15June2001 on standard contractual clauses for the transfer of personal data to third countries, under Directive 95/46/EC, OJ2001L181; SetII is contained in the Annex to European Commission (2004), Commission Decision 2004/915/EC of 27December2004 amending Decision 2001/497/EC as regards the introduction of an alternative set of standard contractual clauses for the transfer of personal data to third countries, OJ2004L385. 233 European Commission (2010), Commission Decision2010/87 of 5February2010 on standard contractual clauses for the transfer of personal data to processors established in third countries under Directive95/46/EC of the European Parliament and of the Council, OJ2010L39. 234 CoE, Consultative Committee of the Convention108 (2002), Guide to the preparation of contractual clauses governing data protection during the transfer of personal data to third parties not bound by an adequate level of data. 235 The content and structure of appropriate binding corporate rules are explained in Article29 Working Party (2008), Working document setting up a framework for the structure of Binding Corporate Rules, WP154, Brussels, 24June2008; and in Article29 Working Party (2008), Working document setting up a table with the elements and principles to be found in Binding Corporate Rules, WP153, Brussels, 24June2008. 236 Article29 Working Party (2007), Recommendation 1/2007 on the standard application for approval of binding corporate rules for the transfer of personal data, WP133, Brussels, 10January2007. Transborder data ows 139 data protection authorities concerned should incorporate the result of the evaluation into their formal licensing procedures. 6.4.3. Special international agreements The EU has concluded special agreements for two types of data transfers: PassengerNameRecords Passenger Name Records (PNR) data are collected by air carriers during the reserva- tion process and include names, addresses, credit card details and seat numbers of air passengers. Under United States (US)law, air carrier companies are obliged to make these data available to the Department of Homeland Security prior to passen- ger departure. This applies to ights to or from the US. To ensure adequate protection of PNR data in accordance with the provisions of Directive 95/46/EC, a PNR package 237 was adopted in 2004. The package included the adequacy of the data processing carried out by the USDepartment of Homeland Security(DHS). Following the CJEUs annulment of the PNR package, 238 the EU and the United States signed two separate agreements with a twofold purpose: rst, to provide a legal basis for the disclosure of PNR data to the USauthorities, and second, to establish adequate data protection in the recipient country. The rst agreement on how EU countries and the United States share and manage data, signed in 2012, had several flaws and was replaced in the same year with another agreement to ensure better legal certainty. 239 The new agreement offers 237 Council Decision 2004/496/EC of 17May2004 on the conclusion of an Agreement between the European Community and the United States of America on the processing and transfer of PNR data by Air Carriers to the United States Department of Homeland Security, Bureau of Customs and Border Protection, OJ 2004 L 183, p.83, and Commission Decision 2004/535/EC of 14May2004 on the adequate protection of personal data contained in the Passenger Name Record of air passengers transferred to the United States Bureau of Customs and Border Protection, OJ 2004 L 235, pp. 11-22. 238 CJEU, Joined cases C-317/04 and C-318/04, European Parliament v. Council of the European Union, 30May2006, paras.57, 58 and 59, in which the Court ruled that both the adequacy decision and the agreement relating to the processing of data are excluded from the scope of Directive. 239 Council Decision2012/472/EU of 26April2012 on the conclusion of the Agreement between the United States of America and the European Union on the use and transfer of passenger name records to the United States Department of Homeland Security, OJ2012L215/4. The Agreements text is attached to this Decision, OJ2012L215, pp.5-14. Handbook on European data protection law 140 signicant improvements. It restricts and claries the purposes for which the infor- mation may be used, such as serious transnational crimes and terrorism, and it establishes the time period for which data may be retained: after six months, the data must be depersonalised and masked. Should their data be misused, every- one has the right to administrative and judicial redress in accordance with USlaw. They also have the right to access their own PNR data and seek rectication by the USDepartment of Homeland Security, including the possibility of erasure, if the information is inaccurate. The agreement, which entered into force on 1July2012, shall remain in force for seven years, until2019. InDecember2011, the Council of the European Union approved the conclusion of an updated EU-Australia Agreement on the processing and transfer of PNR data. 240
The agreement between the EU and Australia on PNR data is a further step in the EU agenda, which includes global PNR guidelines, 241 setting up an EU-PNR scheme 242
and negotiating agreements with third countries. 243 Financial messaging data The Belgian-based Society for Worldwide Interbank Financial Telecommunica- tion(SWIFT), which is the processor for most of the global money transfers from European banks, was operating with a mirror centre in the US and was confronted 240 Council Decision 2012/381/EU of 13December2011 on the conclusion of the Agreement between the European Union and Australia on the processing and transfer of Passenger Name Record (PNR) data by air carriers to the Australian Customs and Border Protection Service, OJ2012L186/3. The text of the Agreement, which replaced a previous 2008 agreement, is attached to this Decision, OJ2012 L186, pp.416. 241 See in particular the Communication of the Commission of 21September2010 on the global approach to transfers of Passenger Name Record (PNR) data to third countries, COM(2010)492 nal, Brussels, 21September2010. See also Article29 Working Group (2010), Opinion 7/2010 on the European Commissions Communication on the global approach to transfers of Passenger Name Record (PNR) data to third countries, WP 178, Brussels November 12, 2010. 242 Proposal for a Directive of the European Parliament and of the Council on the use of PNR data for the prevention, detection, investigation and prosecution of terrorist offences and serious crime, COM(2011)32 nal, Brussels, 2February2011. InApril2011, the European Parliament requested FRA to provide an opinion on this Proposal and its compliance with the Charter of Fundamental Rights of the European Union. See: FRA (2011), Opinion 1/2011 Passenger Name Record, Vienna, 14June2011. 243 The EU is negotiating a new PNR agreement with Canada, which will replace the 2006 agreement currently in force. Transborder data ows 141 with the request to disclose data to the USDepartment of the Treasury for terrorism investigation purposes. 244 From the EUperspective, there was no sufcient legal basis for disclosing these sub- stantially European data, which were accessible in the UnitedStates only because one of SWIFTs data service-processing centres was located there. A special agreement between theEU and the United States, known as the SWIFT Agreement, was concluded in2010 to provide the necessary legal basis and to secure adequate data protection. 245 Under this agreement, nancial data stored by SWIFT continue to be provided to the USTreasury Department for the purpose of the prevention, investigation, detection, or prosecution of terrorism or terrorist nancing. The USTreasury Department may request nancial data from SWIFT, provided that the request: identies as clearly as possible the nancial data; clearly substantiates the necessity of the data; is tailored as narrowly as possible to minimise the amount of data requested; does not seek any data relating to the Single Euro Payments Area(SEPA). Europol must receive a copy of each request by the USTreasury Department and verify whether or not the principles of the SWIFT Agreement are complied with. 246
If it is conrmed that they are, SWIFT must provide the nancial data directly to the 244 See, in this context, Article29 Working Party (2011), Opinion 14/2011 on data protection issues related to the prevention of money laundering and terrorist nancing, WP186, Brussels, 13June2011; Article29 Working Party (2006), Opinion 10/2006 on the processing of personal data by the Society for Worldwide Interbank Financial Telecommunications(SWIFT), WP128, Brussels, 22November2006; Belgium Commission for the protection of privacy (Commission de la protection de la vie prive) (2008), Control and recommendation procedure initiated with respect to the company SWIFT scrl, Decision, 9December2008. 245 Council Decision 2010/412/EU of 13July2010 on the conclusion of the Agreement between the European Union and the United States of America on the processing and transfer of Financial Messaging Data from the European Union to the United States for the purposes of the Terrorist Finance Tracking Program, OJ2010L195, pp.3 and4. The text of the Agreement is attached to this Decision, OJ 2010 L 195, pp.5-14. 246 The Joint Supervisory Body of Europol has conducted audits on Europols activities in this area, the results of which are available at: http://europoljsb.consilium.europa.eu/reports/inspection-report.aspx?lang=en. Handbook on European data protection law 142 USTreasury Department. The department must store the nancial data in a secure physical environment where they are accessed only by analysts investigating ter- rorism or its nancing, and the nancial data must not be interconnected with any other database. In general, nancial data received from SWIFT shall be deleted no later than five years from receipt. Financial data which are relevant for specific investigations or prosecutions may be retained for as long as the data are necessary for these investigations or prosecutions. The USTreasury Department may transfer information from the data received by SWIFT to specic law enforcement, public security or counter-terrorism authorities within or outside the United States exclusively for the investigation, detection, pre- vention or prosecution of terrorism and its nancing. Where the onward transfer of nancial data involves a citizen or resident of an EU Member State, any sharing of the data with the authorities of a third country is subject to the prior consent of the competent authorities of the concerned Member State. Exceptions may be made where the sharing of the data is essential for the prevention of an immediate and serious threat to public security. Independent overseers, including a person appointed by the European Commission, monitor compliance with the principles of the SWIFT Agreement. Data subjects have a right to obtain conrmation from the competent EU data pro- tection authority that their personal data protection rights have been complied with. Data subjects also have the right to rectication, erasure or blocking of their data collected and stored by the USTreasury Department under the SWIFT Agreement. However, the access rights of data subjects may be subject to certain legal limita- tions. Where access is refused, the data subject must be informed in writing of the refusal and their right to seek administrative and judicial redress in the United States. The SWIFT Agreement is valid for five years, until August2015. It automatically extends for subsequent periods of one year unless one of the parties noties the other, at least six months in advance, of its intention not to extend the agreement. 143 EU Issues covered CoE In general Convention108 Police Police Recommendation ECtHR, B.B. v. France, No.5335/06, 17December2009 ECtHR, S. and Marper v. the UnitedKingdom, Nos.30562/04 and 30566/04, 4December2008 ECtHR, Vetter v. France, No.59842/00, 31May2005 Cybercrime Cybercrime Convention Data protection in the context of cross-border cooperation of police and judicial authorities Data Protection Framework Decision In general Convention108 Police Recommendation Prm Decision For special data: ngerprints, DNA, hooliganism etc. Convention108 Police Recommendation Europol Decision Eurojust Decision Frontex Regulation By special agencies Convention108 Police Recommendation SchengenII Decision VIS Regulation Eurodac Regulation CIS Decision By special joint information systems Convention108 Police Recommendation ECtHR, Dalea v. France, No.964/07, 2February2010 Data protection in the context of police and criminal justice 7 Handbook on European data protection law 144 In order to balance the individuals interests in data protection and societys inter- ests in data collection for the sake of ghting crime and ensuring national and public safety, the CoE and the EU have enacted specic legal instruments. 7.1. CoElaw on data protection in police andcriminal justice matters Key points Convention108 and the CoE Police Recommendation cover data protection across all areas of police work. The Cybercrime Convention (Budapest Convention) is a binding international legal instrument dealing with crimes committed against and by means of electronic networks. At the European level, Convention108 covers all elds of processing personal data, and its provisions are intended to regulate the processing of personal data in gen- eral. Consequently, Convention108 applies to data protection in the area of police and criminal justice although the Contracting Parties may limit its application. The legal tasks of police and criminal justice authorities often require the process- ing of personal data which may entail serious consequences for the individuals con- cerned. The Police Data Recommendation adopted by the CoE in1987 gives guid- ance to the Contracting Parties on how they should give effect to the principles of Convention108 in the context of personal data processing by police authorities. 247 7.1.1. The police recommendation The ECtHR has consistently held that the storing and retention of personal data by police or national security authorities constitutes an interference with Article8(1) of the ECHR. Many ECtHR judgments deal with the justication of such interferences. 248 247 CoE, Committee of Ministers (1987), Recommendation Rec(87)15 to member states regulating the use of personal data in the police sector, 17September1987. 248 See, for example, ECtHR, Leander v. Sweden, No.9248/81, 26March1987; ECtHR, M.M. v. the United Kingdom, No.24029/07, 13November2012; ECtHR, M.K. v. France, No.19522/09, 18April2013. Data protection in the context of police and criminal justice 145 Example: In B.B. v. France, 249 the ECtHR decided that the inclusion of a convicted sex offender in a national judicial database fell under Article8 of the ECHR. However, given that sufficient data protection safeguards had been imple- mented, such as the right of the data subject to request erasure of the data, the limited length of data storage and the limited access to such data, a fair balance had been struck between the competing private and public interests at stake. The Court concluded that there had not been a violation of Article8 of the ECHR. Example: In S. and Marper v. the UnitedKingdom, 250 both applicants had been charged with, but not convicted of, criminal offences. Nonetheless, their nger- prints, DNA proles and cellular samples were kept and stored by the police. The unlimited retention of biometric data was permitted by statute where a person was suspected of a criminal offence even if the suspect was later acquit- ted or discharged. The ECtHR held that the blanket and indiscriminate retention of personal data, which was not time-limited and where acquitted individuals had only limited possibilities to request deletion, constituted a disproportionate interference with the applicants right to respect for private life. The Court con- cluded that there had been a violation of Article8 of theECHR. Many further ECtHR judgments deal with the justication of interference with the right to data protection by surveillance. Example: In Allan v. the United Kingdom, 251 private conversations of a prisoner with a friend in the prison visiting area and with a co-accused in a prison cell were secretly recorded by the authorities. The ECtHR held that the use of the audio- and video-recording devices in the applicants cell, the prison visiting area and on a fellow prisoner amounted to an interference with the applicants right to private life. Since there was no statutory system to regulate the use of covert recording devices by the police at the relevant time, the said interference was not in accordance with the law. The Court concluded that there had been a violation of Article8 of the ECHR. 249 ECtHR, B.B. v. France, No.5335/06, 17December2009. 250 ECtHR, S. and Marper v. the UnitedKingdom, Nos.30562/04 and 30566/04, 4December2008, paras.119 and125. 251 ECtHR, Allan v. the UnitedKingdom, No.48539/99, 5November2002. Handbook on European data protection law 146 Example: In Klass and Others v. Germany, 252 the applicants claimed that sev- eral German legislative acts allowing secret surveillance of mail, post and tel- ecommunication violated Article8 of the ECHR, notably because the person concerned was not informed of the surveillance measures and could not have recourse to the courts once such measures were terminated. The ECtHR held that a threat of surveillance necessarily interfered with freedom of communi- cation between users of the postal and telecommunication services. However, it found that sufficient safeguards against abuse had been put in place. The German legislature was justied in considering such measures necessary in a democratic society in the interests of national security and for the prevention of disorder or crime. The Court concluded that there had not been a violation of Article8 of theECHR. As data processing by police authorities may have a signicant impact on the per- sons concerned, detailed data protection rules for keeping databases in this area are especially necessary. The CoE Police Recommendation sought to address the issue by giving guidance on how data should be collected for police work; how data les in this area should be kept; who should be allowed access to these les, including the conditions for transferring data to foreign police authorities; how data subjects should be able to exercise their data protection rights; and how control by independ- ent authorities should be implemented. The obligation to provide adequate data security is also considered. The recommendation does not provide for an open-ended, indiscriminate collection of data by police authorities. It limits the collection of personal data by police author- ities to that which is necessary for the prevention of a real danger or the suppression of a specic criminal offence. Any additional data collection would have to be based on specic national legislation. Processing of sensitive data should be limited to that which is absolute necessity in the context of a particular inquiry. Where personal data are collected without the knowledge of the data subject, the data subject ought to be informed of the data collection as soon as such disclosure no longer inhibits investigations. The collection of data by technical surveillance or other automated means should also be based on specic legal provisions. 252 ECtHR, Klass and Others v. Germany, No.5029/71, 6September1978. Data protection in the context of police and criminal justice 147 Example: In Vetter v. France, 253 anonymous witnesses had accused the appli- cant of homicide. As the applicant regularly went to a friends home, the police installed listening devices there with the permission of the investigating judge. On the strength of the conversations that were recorded, the applicant was arrested and prosecuted for homicide. He applied to have the recording declared inadmissible in evidence, arguing in particular that it had not been provided for by law. For the ECtHR, the point at issue was whether or not the use of listening devices was in accordance with the law. The bugging of pri- vate premises was manifestly not within the scope of Articles100 et seq. of the Code of Criminal Procedure, since those provisions concerned the interception of telephone lines. Article81 of the Code did not indicate with reasonable clarity the scope or manner of exercise of the authorities discretion in allowing the monitoring of private conversations. Accordingly, the applicant had not enjoyed the minimum degree of protection to which citizens were entitled under the rule of law in a democratic society. The Court concluded that there had been a violation of Article8 of theECHR. The recommendation concludes that, when storing personal data, clear distinctions should be made between: administrative data and police data; different types of data subjects, such as suspects, convicted persons, victims and witnesses; and data considered to be hard facts and those based on suspicions or speculation. Police data should be strictly limited in purpose. This has consequences for the com- munication of police data to third parties: the transfer or communication of such data within the police sector should be governed by whether or not there is a legitimate interest in sharing the information. The transfer or communication of such data out- side the police sector should be allowed only where there is a clear legal obligation or authorisation. International transfer or communication should be restricted to for- eign police authorities and be based on special legal provisions, possibly interna- tional agreements, unless it is necessary for the prevention of serious and imminent danger. Data processing by the police must be subject to independent supervision to ensure compliance with domestic data protection law. Data subjects must have all of the access rights contained within Convention108. Where the access rights of data sub- jects have been restricted according to Article9 of Convention108 in the interest of effective police investigations, the data subject must have the right under domestic 253 ECtHR, Vetter v. France, No.59842/00, 31May2005. Handbook on European data protection law 148 law to appeal to the national data protection supervisory authority or to another independent body. 7.1.2. The Budapest Convention on Cybercrime As criminal activities increasingly use and affect electronic data-processing systems, new criminal legal provisions are needed to meet this challenge. The CoE, there- fore, adopted an international legal instrument, the Convention on Cybercrime also known as the Budapest Convention to address the issue of crimes committed against and by means of electronic networks. 254 This convention is open for acces- sion also by non-members of the CoE and, by mid-2013, four states outside the CoE Australia, the DominicanRepublic, Japan and the UnitedStates were parties to the convention and 12other non-members had signed it or been invited to accede. The Convention on Cybercrime remains the most influential international treaty deal-ing with breaches of law over the internet or other information networks. It requires parties to update and harmonise their criminal laws against hacking and other secu-rity infringements including copyright infringement, computer- facilitated fraud, child pornography and other illicit cyber-activities. The convention also provides for pro-cedural powers covering the search of computer networks and the interception of communications in the context of fighting cybercrime. Finally, it enables effective international cooperation. An additional protocol to the convention deals with the criminalisation of racist and xenophobic propaganda in computer networks. While the convention is not actually an instrument for promoting data protection, it criminalises activities which are likely to violate a data subjects right to the protec- tion of his or her data. It also obliges the Contracting Parties when implementing the convention to foresee adequate protection of human rights and liberties, including rights guaranteed under the ECHR, such as the right to data protection. 255 254 Council of Europe, Committee of Ministers (2001), Convention on Cybercrime, CETSNo.185, Budapest, 23November2001, entered into force on 1July2004. 255 Ibid., Art.15(1). Data protection in the context of police and criminal justice 149 7.2. EUlaw on data protection in police andcriminal matters Key points At the EU level, data protection in the police and criminal justice sector is regulated only in the context of cross-border cooperation of police and judicial authorities. Special data protection regimes exist for the European Police Ofce (Europol) and the EU Judicial cooperation unit (Eurojust), which are EU bodies assisting and promoting cross-border law enforcement. Special data protection regimes also exist for the joint information systems which are established at the EU level for cross-border information exchange between the com- petent police and judicial authorities. Important examples are SchengenII, the Visa Information System (VIS) and Eurodac, a centralised system containing the ngerprint data of third-country nations applying for asylum in one of the EU Member States. The Data Protection Directive does not apply to the area of police and criminal jus- tice. Section7.2.1 describes the most important legal instruments in this eld. 7.2.1. The Data Protection Framework Decision The Council Framework Decision 2008/977/JHA on the protection of personal data processed in the framework of police and judicial cooperation in criminal matters (Data Protection Framework Decision) 256 aims at providing protection of personal data of natural persons when their personal data are processed for the purpose of preventing, investigating, detecting or prosecuting a criminal offence or of executing a criminal penalty. Acting on behalf of the Member States or the EU are competent authorities working in the area of police and criminal justice. These authorities are EU agencies or bodies, as well as authorities of the Member States. 257 The applicability of the framework decision is limited to ensuring data protection in the cross-border cooperation between these authorities and does not extend to national security. 256 Council of the European Union (2008), Council Framework Decision 2008/977/JHA of 27November2008 on the protection of personal data processed in the framework of police and judicial cooperation in criminal matters (Data Protection Framework Decision), OJ2008L350. 257 Ibid., Art.2(h). Handbook on European data protection law 150 The Data Protection Framework Decision relies to a large extent on the principles and denitions which are contained in Convention108 and in the Data Protection Directive. Data must be used only by a competent authority and only for the purpose for which they were transmitted or made available. The receiving Member State must respect any restrictions on the exchange of data provided for in the law of the trans- mitting Member State. Use of data by the recipient state for a different purpose is, however, allowed under certain conditions. The logging and documenting of trans- missions is a specic duty of the competent authorities in order to assist with the clarification of responsibilities arising from complaints. Onward transfer of data, received in the course of cross-border cooperation, to third parties requires the con- sent of the Member State from which the data originate, although there are exemp- tions in urgent cases. The competent authorities must take the necessary security measures to protect personal data against any unlawful form of processing. Each Member State must ensure that one or more independent national supervisory authorities are responsible for advising and monitoring the application of the provi- sions adopted pursuant to the Data Protection Framework Decision. They shall also hear claims lodged by any person concerning the protection of his or her rights and freedoms regarding the processing of personal data by competent authorities. The data subject is entitled to information about the processing of his or her per- sonal data, and has the right of access, rectication, erasure or blocking. Where the exercise of these rights is refused on compelling grounds, the data subject must have a right to appeal to the competent national supervisory authority and/or to a court. If a person suffers damage due to violations of the national law implement- ing the Data Protection Framework Decision, this person is entitled to compensation from the controller. 258 Generally, data subjects must have access to a judicial rem- edy for any breach of their rights guaranteed by national law implementing the Data Protection Framework Decision. 259 258 Ibid., Art.19. 259 Ibid., Art.20. Data protection in the context of police and criminal justice 151 The European Commission proposed a reform, which consists of a General Data Pro- tection Regulation, 260 and a General Data Protection Directive. 261 This new Directive will replace the current Data Protection Framework Decision and apply general prin- ciples and rules to police and judicial cooperation in criminal matters. 7.2.2. More specic legal instruments on data protection in police and law-enforcement cross- border cooperation In addition to the Data Protection Framework Decision, exchange of information held by Member States in specic areas is regulated by a number of legal instru- ments such as Council Framework Decision2009/315/JHA on the organisation and content of the exchange of information extracted from the criminal record between Member States and the Council Decision concerning arrangements for cooperation between nancial intelligence units of the Member States in respect of exchanging information. 262 Importantly, cross-border cooperation 263 between the competent authorities increasingly involves the exchange of immigration data. This area of law does not belong to police and criminal justice matters but is in many respects relevant to the work of police and justice authorities. The same is true of data on goods being imported into or exported from the EU. The elimination of internal border controls within the EU has heightened the risk of fraud, making it necessary for Member States to intensify cooperation, notably by enhancing cross-border information 260 European Commission (2012), Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation), COM(2012)11 nal, Brussels, 25January2012. 261 European Commission (2012), Proposal for a Directive of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data by competent authorities for the purposes of prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, and the free movement of such data (General Data Protection Directive), COM(2012)10nal, Brussels, 25January2012. 262 Council of the European Union (2009), Council Framework Decision 2009/315/JHA of 26February2009 on the organisation and content of the exchange of information extracted from the criminal record between Member States, OJ2009L93; Council of the European Union (2000), Council Decision 2000/642/JHA of17October2000 concerning arrangements for cooperation between nancial intelligence units of the Member States in respect of exchanging information, OJ2000L271. 263 European Commission (2012), Communication from the Commission to the European Parliament and the Council Strengthening law enforcement cooperation in the EU: the European Information Exchange Model (EIXM), COM(2012)735nal, Brussels, 7December2012. Handbook on European data protection law 152 exchange, to more effectively detect and prosecute violations of national and EU customs law. The Prm Decision An important example of institutionalised cross-border cooperation by exchange of nationally held data is Council Decision2008/615/JHA on the stepping up of cross- border cooperation, particularly in combating terrorism and cross-border crime (Prm Decision), which incorporated the PrmTreaty into EUlaw in2008. 264 The Prm Treaty was an international police cooperation agreement signed in2005 by Austria, Belgium, France, Germany, Luxembourg, the Netherlands and Spain. 265 The aim of the Prm Decision is to help Member States improve information sharing for the purpose of preventing and combating crime in three elds: terrorism, cross- border crime and illegal migration. For this purpose, the decision sets out provisions with regard to: automated access to DNA proles, ngerprint dataand certain national vehicle registration data; the supply of data in relation to major events that have a cross-border dimension; the supply of information in order to prevent terrorist offences; other measures for stepping up cross-border police cooperation. The databases which are made available under the Prm Decision are governed entirely by national law, but the exchange of data is additionally governed by the decision and, more recently, the Data Protection Framework Decision. The com- petent bodies for supervision of such data ows are the national data protection supervisory authorities. 264 Council of the European Union (2008), Council Decision 2008/615/JHA of 23June2008 on the stepping up of cross-border cooperation, particularly in combating terrorism and cross-border crime, OJ2008L210. 265 Convention between the Kingdom of Belgium, the Federal Republic of Germany, the Kingdom of Spain, the French Republic, the Grand Duchy of Luxembourg, the Kingdom of the Netherlands and the Republic of Austria on the stepping up of cross-border cooperation, particularly in combating terrorism, cross- border crime and illegal migration; available at: http://register.consilium.europa.eu/pdf/en/05/st10/ st10900.en05.pdf. Data protection in the context of police and criminal justice 153 7.2.3. Data protection at Europol and Eurojust Europol Europol, the EUs law enforcement agency, is headquartered in The Hague, with Europol National Units (ENUs) in each Member State. Europol was established in1998; its present legal status as an EU institution is based on the Council Decision establishing the European Police Ofce (Europol Decision). 266 The object of Europol is to assist with the prevention and investigation of organised crime, terrorism and other forms of serious crime, as listed in the Annex of the Europol Decision, which affect two or more Member States. In order to achieve its aims, Europol has established the Europol Information Sys- tem, which provides a database for Member States to exchange criminal intelligence and information through their ENUs. The Europol Information System may be used to make available data which relate to: persons who are suspects or who have been convicted of a criminal offence which is subject to Europols competence; or persons regarding whom there are factual indications that they will commit such offences. Europol and ENUs may enter data directly into the Europol Information System and retrieve data from it. Only the party which entered the data into the system may modify, correct or delete them. Where necessary for the performance of its tasks, Europol may store, modify and use data concerning criminal offences in analysis work les. Analysis work les are opened for the purpose of assembling, processing or using data with the aim of assisting concrete criminal investigations which are conducted by Europol together with EU Member States. In response to new developments, the European Cybercrime Centre was established at Europol on 1January2013. 267 The centre serves as the EU information hub on cybercrime, contributing to faster reactions in the event of online crimes, developing 266 Council of the European Union (2009), Council Decision of 6April2009 establishing the European Police Ofce, OJ2009L121 (Europol). See also the Commissions proposal for a regulation therefore provides for a legal framework for a new Europol which succeeds and replaces Europol as established by the Council Decision 2009/371/JHA of 6April2009 establishing the European Police Ofce (Europol), and CEPOL as established by Council Decision 2005/681/JHA establishing the European Police College (CEPOL), COM(2013)173 nal. 267 See also EDPS (2012), Opinion of the Data Protection Supervisor on the Communication from the European Commission to the Council and the European Parliament on the establishment of a European Cybercrime Centre, Brussels, 29June2012. Handbook on European data protection law 154 and deploying digital forensic capabilities and delivering best practice on cybercrime investigations. The centre focuses on cybercrime which: is committed by organised groups to generate large criminal profits, such as online fraud; causes serious harm to the victim, such as online child sexual exploitation; affects critical infrastructure and information systems in theEU. The data protection regime governing Europols activities is enhanced. The Europol Decision states in its Article27 that the principles, which are set out in Conven- tion108 and in the Police Data Recommendation regarding the processing of auto- mated and non-automated data, apply. Data transmission between Europol and the Member States must also satisfy the rules contained in the Data Protection Frame- work Decision. To ensure compliance with applicable data protection law and, in particular, that the rights of the individual are not violated by the processing of personal data, the inde- pendent Europol Joint Supervisory Body (JSB) reviews and monitors the activities of Europol. 268 Every individual has a right of access to any personal data that Europol may be holding about him or her, in addition to a right to request that these personal data be checked, corrected or erased. If a person is not satised with Europols deci- sion regarding the exercise of these rights, he or she may appeal to the JSB Appeals Committee. If damage occurred as a result of legal or factual errors in data stored or processed at Europol, the injured party may seek redress only before the competent court of the Member State in which the event causing the damage occurred. 269 Europol will reim- burse the Member State if the damage is the result of a failure by Europol to comply with its legal obligations. 268 Europol Decision, Art.34. 269 Ibid., Art.52. Data protection in the context of police and criminal justice 155 Eurojust Eurojust, set up in2002, is an EU body, headquartered in The Hague, that promotes judicial cooperation in investigations and prosecutions relating to serious crime con- cerning at least two Member States. 270 Eurojust is competent to: stimulate and improve coordination of investigations and prosecutions between the competent authorities of the various Member States; facilitate the execution of requests and decisions relating to judicial cooperation. The functions of Eurojust are performed by national members. Each Member State delegates one judge or prosecutor to Eurojust, whose status is subject to the national law and is empowered with the necessary competences to perform the tasks necessary to stimulate and improve judicial cooperation. Additionally, the national members act jointly as a college to carry out special Eurojust tasks. Eurojust may process personal data as far as it is necessary to achieve its objec- tives. This is limited, however, to specic information regarding persons who are suspected of having committed or having taken part in, or have been convicted of, a criminal offence subject to Eurojusts competence. Eurojust may also process certain information regarding witnesses or victims of criminal offences subject to Eurojusts competence. 271 In exceptional circumstances, Eurojust may, for a limited period of time, process more extensive personal data relating to the circumstances of an offence where such data are immediately relevant to an ongoing investiga- tion. Within its remit of competence, Eurojust may cooperate with other EU insti- tutions, bodies and agencies and exchange personal data with them. Eurojust may also cooperate and exchange personal data with third countries and organisations. In relation to data protection, Eurojust must guarantee a level of protection at least equivalent to the principles of the Council of Europe Convention 108 and its 270 Council of the European Union (2002), Council Decision 2002/187/JHA of 28February2002 setting up Eurojust with a view to reinforcing the ght against serious crime, OJ2002L63; Council of the European Union (2003), Council Decision 2003/659/JHA of 18June2003 amending Decision 2002/187/JHA setting up Eurojust with a view to reinforcing the ght against serious crime, OJ2003L44; Council of the European Union (2009), Council Decision 2009/426/JHA of 16December2008 on the strengthening of Eurojust and amending Decision 2002/187/JHA setting up Eurojust with a view to reinforcing the ght against serious crime, OJ2009L138 (Eurojust Decisions). 271 Consolidated version of the Council Decision 2002/187/JHA as amended by Council Decision 2003/659/JHA and by Council Decision 2009/426/JHA, Art.15(2). Handbook on European data protection law 156 subsequent amendments. In cases of data exchange, specic rules and limitations must be observed, which are put in place either in cooperation agreement or work- ing arrangement in accordance with Eurojust Council Decisions and Eurojust Data Protection Rules. 272 An independent JSB has been established at Eurojust with the task of monitoring the processing of personal data performed by Eurojust. Individuals may appeal to the JSB if they are not satised with Eurojusts reply to a request for access, correction, blocking or erasure of personal data. Where Eurojust processes personal data unlaw- fully, Eurojust shall be liable in accordance with the national law of the Member State where its headquarters is located, the Netherlands, for any damage caused to the data subject. 7.2.4. Data protection in the joint information systems at EU level In addition to data exchange between Member States and the creation of special- ised EU authorities for ghting transborder crime, several joint information systems have been established at the EU level to serve as a platform for data exchange between the competent national and EU authorities for specied purposes of law enforcement, including immigration law and customs law. Some of these systems developed out of multilateral agreements which were subsequently supplemented by EU legal instruments and systems, such as the Schengen Information System, Visa Information System, Eurodac, Eurosur or Customs Information System. The European Agency for Large-scale information technology systems (eu-LISA), 273
established in2012, is responsible for the long-term operational management of the second-generation Schengen Information System (SISII), the Visa Information Sys- tem (VIS) and Eurodac. The core task of the eu-LISA is to ensure the effective, secure and continuous operation of the information technology systems. It is also respon- sible for the adoption of necessary measures to ensure the security of the systems and the security of data. 272 Rules of Procedure on the Processing and Protection of Personal Data at Eurojust, OJ2005C68/01, 19March2005, p.1. 273 Regulation (EU) No.1077/2011 of the European Parliament and of the Council of 25October2011 establishing a European Agency for the operational management of large-scale IT systems in the area of freedom, security and justice, OJ2011L286. Data protection in the context of police and criminal justice 157 The Schengen Information System In1985, several Member States of the former European Communities entered into the Agreement between the states of the Benelux Economic Union, Germany and France on the gradual abolition of checks at their common borders (Schengen Agreement), aiming to create an area for the free movement of persons, unhindered by border controls within the Schengen territory. 274 In order to counterbalance the threat to public security which could arise from open borders, strengthened border controls at the Schengen areas external borders were established, as well as close cooperation between national police and justice authorities. As a consequence of the accession of additional states to the Schengen Agree- ment, the Schengen system was nally integrated into the EUlegal framework by the Treaty of Amsterdam. 275 Implementation of this decision took place in1999. The newest version of the Schengen Information System, the so-called SISII, came into operation on 9April2013. It now serves all EUMember States plus Iceland, Liech- tenstein, Norway and Switzerland. 276 Europol and Eurojust also have access to SISII. SISII consists of a central system (C-SIS), a national system (N-SIS) in each Mem- ber State, and a communication infrastructure between the central system and the national systems. C-SIS contains certain data entered by the Member States on per- sons and objects. C-SIS is used by national border control, police, customs, visa and judicial authorities throughout the Schengen Area. Each of the Member States oper- ates a national copy of the C-SIS, known as National Schengen Information Systems (N-SIS), which are constantly updated, thereby updating the C-SIS. The N-SIS is con- sulted and will issue an alert where: the person does not have the right to enter or stay in the Schengen territory; or the person or object is sought by judicial or law enforcement authorities; or 274 Agreement between the Governments of the States of the Benelux Economic Union, the Federal Republic of Germany and the French Republic on the gradual abolition of checks at their common borders, OJ2000L239. 275 European Communities (1997), Treaty of Amsterdam amending the Treaty on European Union, the Treaties establishing the European Communities and certain related acts, OJ1997C340. 276 Regulation (EC) No.1987/2006 of the European Parliament and of the Council of 20December2006 on the establishment, operation and use of the second generation Schengen Information System, OJ2006L381 (SISII) and Council of the European Union (2007), Council Decision 2007/533/JHA of 12June2007 on the establishment, operation and use of the second generation Schengen Information System, (SISII), OJ2007L205. Handbook on European data protection law 158 the person has been reported as missing; or goods, such as banknotes, cars, vans, rearms and identity documents, have been reported as stolen or lost property. In case of an alert, follow-up activities are to be initiated via the National Schengen Information Systems. SISII has new functionalities, such as the possibility of entering: biometric data, such as ngerprints and photographs; or new categories of alerts, such as stolen boats, aircrafts, containers or means of payment; and enhanced alerts on persons and objects; copies of European Arrest Warrants(EAWs) on persons wanted for arrest, surrender or extradition. Council Decision 2007/533/JHA on the establishment, operation and use of the sec- ond generation Schengen Information System(SchengenII Decision) incorporates Convention108: Personal data processed in application of this decision shall be pro- tected in accordance with the Council of Europe Convention108. 277 Where the use of personal data by national police authorities is done in application of the Schen- genII Decision, the provisions of Convention108, as well as of the Police Data Rec- ommendation, must be implemented in national law. The competent national supervisory authority in each Member State supervises the domestic N-SIS. In particular, it must check on the quality of the data which the Member State enters into C-SIS via the N-SIS. The national supervisory authority must ensure that an audit of the data-processing operations within the domestic N-SIS takes place at least every four years. The national supervisory authorities and the EDPS cooperate and ensure coordinated supervision of the SIS, while the EDPS is responsible for the supervision of the C-SIS. For the sake of transparency, a joint report of activities shall be sent to the European Parliament, the Council and eu-LISA every twoyears. Access rights of individuals concerning the SISII may be exercised in any Member State, as every N-SIS is a precise copy of the C-SIS. 277 Council of the European Union (2007), Council Decision 2007/533/JHA of 12June2007 on the establishment, operation and use of the second generation Schengen Information System, OJ2007L205, Art.57. Data protection in the context of police and criminal justice 159 Example: In Dalea v. France, 278 the applicant was denied a visa to visit France, as the French authorities had reported to the Schengen Information System that he should be refused entry. The applicant unsuccessfully sought access and rec- tication or deletion of the data before the French Data Protection Commission and, ultimately, before the Council of State. The ECtHR held that the reporting of the applicant to the Schengen Information System had been in accordance with the law and had pursued the legitimate aim of protecting national security. Since the applicant did not show how he had actually suffered as a result of the denial of entry into the Schengen area, and since sufcient measures to pro- tect him from arbitrary decisions were in place, the interference with his right to respect for private life had been proportionate. The applicants complaint under Article8 was thus declared inadmissible. The Visa Information System The Visa Information System (VIS), also operated by the eu-LISA, was developed to support the implementation of a common EU visa policy. 279 The VIS allows Schen- gen states to exchange visa data through a system which connects the consulates of the Schengen states situated in non-EU countries with the external border-cross- ing points of all Schengen states. The VIS processes data regarding applications for short-stay visas to visit or to transit through the Schengen area. The VIS enables bor- der authorities to verify, with the help of biometric data, whether or not the person presenting a visa is its rightful holder and to identify persons with no or fraudulent documents. According to Regulation (EC) No.767/2008 of the European Parliament and of the Council concerning the Visa Information System (VIS) and the exchange of data between Member States on short-stay visas (VIS Regulation), only data on the appli- cant, his or her visas, photographs, ngerprints, links to previous applications, and 278 ECtHR, Dalea v. France (dec.), No.964/07, 2February2010. 279 Council of the European Union (2004), Council Decision of 8June2004 establishing the Visa Information System (VIS), OJ2004L213; Regulation (EC) No.767/2008 of the European Parliament and of the Council of 9July2008 concerning the Visa Information System (VIS) and the exchange of data between Member States on short-stay visas, OJ2008L218 (VIS Regulation); Council of the European Union (2008), Council Decision 2008/633/JHA of June232008 concerning access for consultation of the Visa Information System (VIS) by designated authorities of Member States and by Europol for the purposes of the prevention, detection and investigation of terrorist offences and of other serious criminal offences, OJ2008L218. Handbook on European data protection law 160 application les of persons accompanying him or her, may be recorded in the VIS. 280
Access to the VIS in order to enter, amend or delete data is restricted exclusively to the visa authorities of the Member States, whereas access for consulting data is provided to visa authorities and authorities competent for checks at the exter- nal border-crossing points, immigration checks and asylum. Under certain condi- tions, national competent police authorities and Europol may request access to data entered into the VIS for the purpose of preventing, detecting and investigating ter- rorist and criminal offences. 281 Eurodac Eurodacs name refers to dactylograms, or fingerprints. It is a centralised sys- tem containing the ngerprint data of third-country nationals applying for asylum in one of the EU Member States. 282 The system has been in operation since Janu- ary2003, and its purpose is to assist in determining which Member State should be responsible for examining a particular asylum application under Council Regula- tion (EC) No.343/2003 establishing the criteria and mechanisms for determining the Member State responsible for examining an asylum application lodged in one of the Member States by a third-country national (DublinII Regulation). 283 Personal data in Eurodac may be used only for the purpose of facilitating the application of the Dub- linII Regulation; any other use is subject to penalties. Eurodac consists of a central unit, operated by eu-LISA, for storing and compar- ing ngerprints, and a system for electronic data transmission between Member States and the central database. Member States take and transmit the ngerprints of every non-EU national or stateless person of at least 14 years of age who asks 280 Art.5 of the Regulation (EC) No.767/2008 of the European Parliament and of the Council of 9July2008 concerning the Visa Information System (VIS) and the exchange of data between Member States on short-stay visas (VIS Regulation), OJ2008L218. 281 Council of the European Union (2008), Council Decision 2008/633/JHA of June232008 concerning access for consultation of the Visa Information System (VIS) by designated authorities of Member States and by Europol for the purposes of the prevention, detection and investigation of terrorist offences and of other serious criminal offences, OJ2008L218. 282 Council Regulation (EC) No.2725/2000 of 11December2000 concerning the establishment of Eurodac for the comparison of ngerprints for the effective application of the Dublin Convention, OJ2000L316; Council Regulation (EC) No.407/2002 of 28February2002 laying down certain rules to implement Regulation (EC) No.2725/2000 concerning the establishment of Eurodac for the comparison of ngerprints for the effective application of the Dublin Convention, OJ2002L62 (Eurodac Regulations). 283 Council Regulation (EC) No.343/2003 of 18February2003 establishing the criteria and mechanisms for determining the Member State responsible for examining an asylum application lodged in one of the Member States by a third-country national, OJ2003L50 (DublinII Regulation). Data protection in the context of police and criminal justice 161 for asylum in their territory, or who is apprehended for the unauthorised crossing of their external border. Member States may also take and transmit the ngerprints of non-EU nationals or stateless persons found staying within their territory without permission. The fingerprint data are stored in the Eurodac database only in pseudonymised form. In the event of a match, the pseudonym, together with the name of the rst Member State which transmitted the ngerprint data, is disclosed to the second Member State. This second Member State will then approach the rst Member State because, according to the DublinII Regulation, the rst Member State is responsible for processing the asylum application. Personal data stored in Eurodac which relate to asylum applicants are kept for 10 years from the date on which the ngerprints were taken unless the data subject obtains the citizenship of an EU Member State. In this case, the data must be imme- diately erased. Data relating to foreign nationals apprehended for unauthorised crossing of the external border are stored for two years. These data must be erased immediately if the data subject receives a residence permit, leaves EU territory or obtains citizenship of a Member State. In addition to all EU Member States, Iceland, Norway, Liechtenstein and Switzerland also apply Eurodac on the basis of international agreements. Eurosur The European Border Surveillance System (Eurosur) 284 is designed to enhance the control of the Schengen external borders by detecting, preventing and combat- ing illegal immigration and cross-border crime. It serves to enhance information exchange and operational cooperation between national coordination centres and Frontex, the EU agency in charge of developing and applying the new concept of integrated border management. 285 Its general objectives are: to reduce the number of illegal migrants entering the EU undetected; 284 Regulation (EU) No.1052/2013 of the European Parliament and of the Council of 22October2013 establishing the European Border Surveillance System (Eurosur), OJ2013L295. 285 Regulation (EU) No.1168/2011 of the European Parliament and of the Council of 25October2011 amending Council Regulation (EC) No.2007/2004 establishing a European Agency for the Management of Operational Cooperation at the External Borders of the Member States of the European Union, OJ2011L394 (Frontex Regulation). Handbook on European data protection law 162 to reduce the number of deaths of illegal migrants by saving more lives atsea; to increase the internal security of the EU as a whole by contributing to the pre- vention of cross-border crime. 286 It took up its work on 2December2013 in all member states with external borders, and will begin from 1December2014 in the others. The regulation will apply to the surveillance of land, sea external borders and air borders of the Member States. Customs Information System Another important joint information system established at EU level is the Cus- toms Information System (CIS). 287 In the course of establishing an internal market, all checks and formalities in respect of goods moving within the EU territory were abolished, leading to a heightened risk of fraud. This risk was counterbalanced by intensied cooperation between the Member States customs administrations. The purpose of CIS is to assist the Member States in preventing, investigating and pros- ecuting serious violations of national and EU customs and agricultural laws. The information contained in CIS comprises personal data with reference to com- modities, means of transport, businesses, persons, goods and cash retained, seized or conscated. This information may be used solely for the purposes of sighting, reporting or carrying out particular inspections or for strategic or operational analy- ses concerning persons suspected of breaching customs provisions. Access to CIS is granted to the national customs, taxation, agricultural, public health and police authorities, as well as Europol and Eurojust. 286 See also: European Commission (2008), Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions: Examining the creation of a European Border Surveillance System (Eurosur), COM(2008)68 nal, Brussels, 13February2008; European Commission (2011), Impact Assessment accompanying the Proposal for a Regulation of the European Parliament and of the Council establishing the European Border Surveillance System (Eurosur), Staff working paper, SEC(2011)1536 nal, Brussels,12December2011, p.18. 287 Council of the European Union (1995), Council Act of 26July1995 drawing up the Convention on the use of information technology for customs purposes, OJ1995C316, amended by Council of the European Union (2009), Regulation No. 515/97 of 13March1997 on mutual assistance between the administrative authorities of the Member States and cooperation between the latter and the Commission to ensure the correct application of the law on customs and agricultural matters, Council Decision 2009/917/JHA of 30November2009 on the use of information technology for customs purposes, OJ2009L323 (CIS Decision). Data protection in the context of police and criminal justice 163 The processing of personal data must comply with the specic rules established by Regulation No.515/97 and the CISConvention, 288 as well as the provisions of the Data Protection Directive, the EU Institutions Data Protection Regulation, Con- vention108 and the Police Data Recommendation. The EDPS is responsible for the supervision of compliance of the CIS with Regulation(EC)No.45/2001 and convenes a meeting at least once a year with all national data protection supervisory authori- ties competent for CIS-related supervisory issues. 288 Ibid. 165 EU Issues covered CoE Data Protection Directive Directive on privacy and electronic communications Electronic communications Convention108 Telecommunication Services Recommendation Data Protection Directive, Article8(2)(b) Employment relations Convention108 Employment Recommendation ECtHR, Copland v. the UnitedKingdom, No.62617/00, 3April2007 Data Protection Directive, Article8(3) Medical data Convention108 Medical Data Recommendation ECtHR, Z. v. Finland, No.22009/93, 25February1997 Clinical Trials Directive Clinical trials Data Protection Directive, Article6(1)(b) and (e), Article13(2) Statistics Convention108 Statistical Data Recommendation Regulation (EC) No.223/2009 on European statistics CJEU, C-524/06, Huber v. Germany, 16December2008 Ofcial statistics Convention108 Statistical Data Recommendation Other specic European data protection laws 8 Handbook on European data protection law 166 Directive 2004/39/EC on markets in nancial instruments Regulation (EU) No.648/2012 on OTC derivatives, central counterparties and trade repositories Regulation (EC) No.1060/2009 on credit rating agencies Directive 2007/64/EC on payment services in the internal market Financial data Convention108 Recommendation 90(19) used for payments and other related operations ECtHR, Michaud v. France, No.12323/11, 6December2012 In several instances, special legal instruments have been adopted at the European level, which apply the general rules of Convention108 or of the Data Protection Directive in more detail to specic situations. 8.1. Electronic communications Key points Specic rules on data protection in the area of telecommunication, with particular ref- erence to telephone services, are contained in the CoE Recommendation from1995. The processing of personal data relating to the delivery of communications services at the EU level is regulated in the Directive on privacy and electronic communications. Confidentiality of electronic communications pertains not only to the content of a communication but also to trafc data, such as information about who communicated with whom, when and for how long, and location data, such as from where data were communicated. Communications networks have a heightened potential for unjustied interference with the personal sphere of the users, as they provide added technical possibilities for listening into and surveying communications performed on such networks. Con- sequently, special data protection regulations were deemed necessary in order to meet the particular risks for users of communications services. In1995, the CoE issued a Recommendation for data protection in the area of tel- ecommunication, with particular reference to telephone services. 289 According to 289 CoE, Committee of Ministers (1995), Recommendation Rec(95)4 to member states on the protection of personal data in the area of telecommunication services, with particular reference to telephone services, 7February1995. Other specic European data protection laws 167 this recommendation, the purposes of collecting and processing personal data in the context of telecommunications should be limited to: connecting a user to the net- work, making available the particular telecommunications service, billing, verifying, ensuring optimal technical operation and developing the network and service. Special attention was given also to the use of communications networks for sending direct marketing messages. As a general rule, direct marketing messages may not be directed at any subscriber who has expressly opted out of receiving advertising messages. Automated call devices for transmitting pre-recorded advertising mes- sages may be used only if a subscriber has given express consent. Domestic law shall provide for detailed rules in this area. As concerns the EU legal framework, after a rst attempt in1997, the Directive on privacy and electronic communications was adopted in2002 and amended in2009, with the purpose of complementing and particularising the provisions of the Data Protection Directive for the telecommunications sector. 290 The application of the Directive on privacy and electronic communications is limited to communication ser- vices in public electronic networks. The Directive on privacy and electronic communications distinguishes three main categories of data generated in the course of a communication: the data constituting the content of the messages sent during communication; these data are strictly condential; the data necessary for establishing and maintaining the communication, so- called trafc data, such as information about the communication partners, time and duration of the communication; within the trafc data, there are data specically relating to the location of the communication device, so-called location data; these data are at the same time 290 Directive 2002/58/EC of the European Parliament and of the Council of 12July2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector, OJ2002L201 (Directive on privacy and electronic communications) as amended by Directive2009/136/EC of the European Parliament and of the Council of 25November2009 amending Directive 2002/22/EC on universal service and users rights relating to electronic communications networks and services, Directive 2002/58/EC concerning the processing of personal data and the protection of privacy in the electronic communications sector and Regulation (EC) No.2006/2004 on cooperation between national authorities responsible for the enforcement of consumer protection laws, OJ2009L337. Handbook on European data protection law 168 data about the location of the users of the communication devices and particu- larly relevant concerning users of mobile communication devices. Trafc data may be used by the service provider only for billing and for technically providing the service. With the consent of the data subject, however, these data may be disclosed to other controllers offering added value services, such as giving information in relation to the users location on the next metro station or pharmacy or the weather forecast for this location. Other access to data about communications in electronic networks, such as access for the purpose of investigating crimes, must, according to Article15 of the e-Pri- vacy Directive, full the requirements for justied interference into the right to data protection as laid down in Article8(2)of the ECHR and conrmed by the Charter in its Articles8 and52. The amendments from2009 to the Directive on privacy and electronic communica- tions 291 introduced the following: The restrictions on sending emails for direct marketing purposes were extended to short message services, multimedia messaging services and other kinds of similar applications; marketing emails are prohibited unless prior consent was obtained. Without such consent, only previous customers may be approached with market- ing emails, if they have made their email address available and do not object. An obligation was placed on Member States to provide judicial remedies against violations of the ban on unsolicited communications. 292 Setting of cookies, software which monitors and records a computer users actions, is no longer allowed without the computer users consent. National law should regulate in more detail how consent should be expressed and obtained in order to offer sufcient protection. 293 291 Directive 2009/136/EC of the European Parliament and of the Council of 25November2009 amending Directive2002/22/EC on universal service and users rights relating to electronic communications networks and services, Directive2002/58/EC concerning the processing of personal data and the protection of privacy in the electronic communications sector and Regulation (EC) No.2006/2004 on cooperation between national authorities responsible for the enforcement of consumer protection laws, OJ2009L337. 292 See the amended Directive, Art.13. 293 See Ibid., Art.5; see also Article29 Working Party (2012), Opinion04/2012 on cookie consent exemption, WP194, Brussels, 7June2012. Other specic European data protection laws 169 Where a data breach occurs as a result of unauthorised access, loss or destruction of data, the competent supervisory authority must be informed immediately. The subscribers must be informed where possible damage to them is the consequence of a data breach. 294 The Data Retention Directive 295 (invalidated on 8April2014, see case example below) obliged communication service providers to keep trafc data available, spe- cically for the purposes of ghting serious crime, for a period of at least six but not more than 24months, regardless of whether or not the provider still needed these data for billing purposes or to technically provide the service. The EU Member States shall designate independent public authorities which are responsible for monitoring the security of the retained data. The retention of telecommunications data clearly interferes with the right to data protection. 296 Whether or not this interference is justied has been contested in sev- eral court procedures in EU Member States. 297 Example: In Digital Rights Ireland and Seitlinger and Others, 298 the CJEU declared the Data Retention Directive to be invalid. According to the Court, the wide- ranging and particularly serious interference of the directive with the funda- mental rights at issue is not sufciently circumscribed to ensure that that inter- ference is actually limited to what is strictly necessary. A crucial issue in the context of electronic communications is interference by pub- lic authorities. Means of surveillance or interception of communications, such as 294 See also Article 29 Working Party (2011), Working Document 01/2011 on the current EU personal data breach framework and recommendations for future policy developments, WP184, Brussels, 5April2011. 295 Directive2006/24/EC of the European Parliament and of the Council of 15March2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive2002/58/EC, OJ2006L105. 296 EDPS (2011), Opinion of 31May2011 on the Evaluation report from the Commission to the Council and the European Parliament on the Data Retention Directive (Directive 2006/24/EC), 31May2011. 297 Germany, Federal Constitutional Court (Bundesverfassungsgericht), 1BvR256/08, 2March2010; Romania, Federal Constitutional Court (Curtea Constituional a Romniei), No.1258, 8October2009; the Czech Republic, Constitutional Court (stavn soud esk republiky), 94/2011Coll., 22March2011. 298 CJEU, Joined cases C-293/12 and C-594/12, Digital Rights Ireland and Seitlinger and Others, 8April2014, para.65. Handbook on European data protection law 170 listening or tapping devices, are permissible only if this is provided for by law and if it constitutes a necessary measure in a democratic society in the interest of: protecting state security, public safety, the monetary interests of the state or the suppression of criminal offences; or protecting the data subject or the rights and freedoms of others. Example: In Malone v. the United Kingdom, 299 the applicant had been charged with a number of offences relating to dishonest handling of stolen goods. During his trial it emerged that a telephone conversation of the applicant had been intercepted on the authority of a warrant issued by the Secretary of State for the Home Department. Even though the manner in which the applicants communication had been inter- cepted was lawful in terms of domestic law, the ECtHR found that there had been no legal rules concerning the scope and manner of exercise of the discretion enjoyed by the public authorities in this area and that the interference resulting from the exist- ence of the practice in question had therefore not been in accordance with the law. The Court held that there had been a violation of Article8 of theECHR. 8.2. Employment data Key points Specic rules for data protection in employment relations are contained in the CoE Employment Data Recommendation. In the Data Protection Directive, employment relations are specically referred to only in the context of the processing of sensitive data. The validity of consent, which must have been freely given, as a legal basis for pro- cessing data about employees may be doubtful, considering the economic imbal- ance between employer and employees. The circumstances of consenting must be assessed carefully. There is no specific legal framework in the EU governing data processing in the context of employment. In the Data Protection Directive, employment relations are specically referred to only in Article8(2) of the directive, which concerns the 299 ECtHR, Malone v. the United Kingdom, No.8691/79, 2August1984. Other specic European data protection laws 171 processing of sensitive data. As regards the CoE, the Employment Data Recommen- dation was issued in1989 and is currently being updated. 300 A survey of the most common data protection problems specic to the employ- ment context can be found in a working document of the Article29 Working Par- ty. 301 The working party analysed the signicance of consent as a legal basis for processing employment data. 302 The working party found that the economic imbal- ance between the employer asking for consent and the employee giving consent will often raise doubts about whether consent was given freely or not. The circum- stances under which consent is requested should, therefore, be carefully considered when assessing the validity of consent in the employment context. A common data protection problem in todays typical working environment is the legitimate extent of monitoring employees electronic communications within the workplace. It is often claimed that this problem can easily be solved by prohibiting private use of communication facilities at work. Such a general prohibition could, however, be disproportionate and unrealistic. The following ECtHR judgment is of particular interest in this context: Example: In Copland v. UK, 303 the telephone, email and internet usage of a col- lege employee was secretly monitored in order to ascertain whether she was making excessive use of college facilities for personal purposes. The ECtHR held that telephone calls from business premises were covered by the notions of private life and correspondence. Therefore, such calls and emails sent from work, as well as information derived from the monitoring of personal internet usage were protected by Article8 of the ECHR. In the applicants case, no provi- sions existed which regulated the circumstances under which employers could monitor employees use of telephone, email and the internet. Therefore, the 300 Council of Europe, Committee of Ministers (1989), Recommendation Rec(89)2 to member states on the protection of personal data used for employment purposes, 18January1989. See further Consultative Committee to Convention108, Study on Recommendation No.R(89)2 on the protection of personal data used for employment purposes and to suggest proposals for the revision of the above-mentioned Recommendation, 9September2011. 301 Article29 Working Party (2001), Opinion 8/2001 on the processing of personal data in the employment context, WP48, Brussels, 13September2001. 302 Article29 Working Party (2005), Working document on a common interpretation of Article 26(1) of Directive 95/46/EC of 24October1995, WP114, Brussels, 25November2005. 303 ECtHR, Copland v. the UnitedKingdom, No.62617/00, 3April2007. Handbook on European data protection law 172 interference was not in accordance with the law. The Court concluded that there had been a violation of Article8 of theECHR. According to the CoE Employment Recommendation, personal data collected for employment purposes should be obtained from the individual employee directly. Personal data collected for recruitment must be limited to the information necessary to evaluate the suitability of candidates and their career potential. The recommendation also specically mentions judgmental data relating to the per- formance or potential of individual employees. Judgmental data must be based on fair and honest evaluations and must not be insulting in the way they are formu- lated. This is required by the principles of fair data processing and accuracy of data. A specic aspect of data protection law in the employeremployee relationship is the role of employees representatives. Such representatives may receive the per- sonal data of employees only in so far as this is necessary to allow them to repre- sent the interests of the employees. Sensitive personal data collected for employment purposes may only be pro- cessed in particular cases and according to the safeguards laid down by domestic law. Employers may ask employees or job applicants about their state of health or may examine them medically only if necessary to: determine their suitability for the employment; full the requirements of preventative medicine; or allow social ben- ets to be granted. Health data may not be collected from sources other than the employee concerned except when express and informed consent was obtained or when national law provides for it. Under the Employment Recommendation, employees should be informed about the purpose of the processing of their personal data, the type of personal data stored, the entities to which the data are regularly communicated and the purpose and legal basis of such communications. Employers should also inform their employees in advance about the introduction or adaptation of automated systems for the pro- cessing of personal data of employees or for monitoring the movements or the pro- ductivity of employees. Employees must have a right of access to their employment data as well as a right to rectication or erasure. If judgmental data are processed, employees must, further, have a right to contest the judgment. These rights may, however, be temporarily Other specic European data protection laws 173 limited for the purpose of internal investigations. If an employee is denied access, rectication or erasure of personal employment data, national law must provide appropriate procedures to contest such denial. 8.3. Medical data Key point Medical data are sensitive data and, therefore, enjoy specic protection. Personal data concerning the state of health of the data subject are qualied as sen- sitive data under Article8(1) of the Data Protection Directive and under Article6 of Convention108. In turn, medical data are subject to a stricter data-processing regime than non-sensitive data. Example: In Z. v. Finland, 304 the applicants ex-husband, who was infected with HIV, had committed a number of sexual offences. He was subsequently convicted of manslaughter on the ground that he had knowingly exposed his victims to the risk of HIV infection. The national court ordered that the full judgment and the case documents should remain confidential for 10years despite requests from the applicant for a longer period of condentiality. These requests were refused by the court of appeal, and its judgment contained the full names of both the applicant and her ex-husband. The ECtHR held that the interference was not considered necessary in a democratic society, because the protection of medical data was of fundamental importance to the enjoyment of the right to respect for private and family life, in particular when it came to information about HIV infections, given the stigma attached to this condition in many societies. Therefore, the Court concluded that granting access to the applicants identity and medical condition as described in the court of appeals judgment after a period of only 10 years after passing the judgment would vio- late Article8 of theECHR. 304 ECtHR, Z. v. Finland, No.22009/93, 25February1997, paras.94 and 112; see also ECtHR, M.S. v. Sweden, No.20837/92, 27August1997; ECtHR, L.L. v. France, No.7508/02, 10October2006; ECtHR, I. v. Finland, No.20511/03, 17July2008; ECtHR, K.H. and others v. Slovakia, No.32881/04, 28April2009; ECtHR, Szuluk v. the UnitedKingdom, No.36936/05, 2June2009. Handbook on European data protection law 174 Article8(3) of the Data Protection Directive allows for processing medical data where this is required for the purposes of preventative medicine, medical diagnosis, the provision of care or treatment, or the management of healthcare services. Pro- cessing is permissible, however, only where performed by a healthcare professional subject to an obligation of professional secrecy, or by another person subject to an equivalent obligation. 305 The CoE Medical Data Recommendation of 1997 applies the principles of Conven- tion108 to data processing in the medical eld in more detail. 306 The proposed rules are in line with those of the Data Protection Directive as concerns the legitimate pur- poses of processing medical data, the necessary professional secrecy obligations of persons using health data, and the rights of the data subjects to transparency and access, rectication and deletion. Moreover, medical data which are lawfully processed by healthcare professionals may not be transferred to law enforcement authorities unless sufcient safeguards to prevent disclosure inconsistent with the respect for [...] private life guaranteed under Article8 of the ECHR are provided. 307 Additionally, the Medical Data Recommendation contains special provisions on the medical data of unborn children and incapacitated persons, and on the processing of genetic data. Scientic research is explicitly acknowledged as a reason for conserv- ing data longer than they are needed, although this will usually require anonymi- sation. Article12 of the Medical Data Recommendation proposes detailed regula- tions for situations where researchers need personal data and anonymised data are insufcient. Pseudonymisation may be an appropriate means to satisfy scientific needs and at the same time protect the interests of the patients concerned. The concept of pseudonymisation in the context of data protection is explained in more detail in Section2.1.3. Intensive discussion has been taking place at the national and European levels on initiatives to store data on the medical treatment of a patient in an electronic health le. 308 A special aspect of having nationwide systems of electronic health les is 305 See also ECtHR, Biriuk v. Lithuania, No. 23373/03, 25November2008. 306 CoE, Committee of Ministers (1997), Recommendation Rec(97)5 to member states on the protection of medical data, 13February1997. 307 ECtHR, No.1585/09, Avilkina and Others v. Russia, No.1585/09, 6June2013, para.53 (not nal). 308 Article29 Working Party (2007), Working Document on the processing of personal data relating to health in electronic health records (EHR), WP131, Brussels, 15February2007. Other specic European data protection laws 175 their availability across borders: a topic of particular interest within the EU in the con- text of cross-border healthcare. 309 Another area under discussion concerning new provisions is clinical trials, in other words trying out new drugs on patients in a documented research environment; again, this topic has considerable data protection implications. Clinical trials on medi- cal products for human use are regulated by Directive 2001/20/EC of the European Parliament and of the Council of 4April2001 on the approximation of the laws, regulations and administrative provisions of the Member States relating to the implementation of good clinical practice in the conduct of clinical trials on medicinal products for human use (Clinical Trials Directive). 310 In December2012, the European Commission proposed a regulation to replace the Clinical Trials Directive with the aim of making trial procedures more uniform and efcient. 311 There are many other legislative and other initiatives pending at the EU level regard- ing personal data in the healthsector. 312 8.4. Data processing for statistical purposes Key points Data collected for statistical purposes may not be used for any other purpose. Data collected legitimately for any purpose may be further used for statistical pur- poses, provided that national law prescribes adequate safeguards which are met by the users. For this purpose, particularly anonymisation or pseudonymisation before transmission to third parties should be envisaged. 309 Directive 2011/24/EU of the European Parliament and of the Council of 9March2011 on the application of patients rights in cross-border healthcare, OJ2011L88. 310 Directive 2001/20/EC of the European Parliament and of the Council of 4April2001 on the approximation of the laws, regulations and administrative provisions of the Member States relating to the implementation of good clinical practice in the conduct of clinical trials on medicinal products for human use, OJ2001L121. 311 European Commission (2012), Proposal for a Regulation of the European Parliament and of the Council on clinical trials on medicinal products for human use, and repealing Directive 2001/20/EC, COM(2012)369 nal, Brussels, 17July2012. 312 EDPS (2013), Opinion of the European Data Protection Supervisor on the Communication from the Commission on eHealth Action Plan 20122020 Innovative healthcare for the 21 st century, Brussels, 27March2013. Handbook on European data protection law 176 In the Data Protection Directive, processing data for statistical purposes is men- tioned in the context of possible exemptions from data protection principles. In Arti- cle6(1)(b) of the directive, the principle of purpose limitation may be waived under national law in favour of the further use of data for statistical purposes, although national law must also lay down all necessary safeguards. Article13(2) of the directive allows for limitations of access rights by national law if data are processed exclusively for statistical purposes; again, adequate safeguards must exist under national law. In this context, the Data Protection Directive sets up a specic require- ment that none of the data acquired or created in the course of statistical research may be used for concrete decisions about data subjects. Although data which were lawfully collected by a controller for any purpose may be re-used by this controller for their own statistical purposes so-called secondary statistics the data would have to be anonymised or pseudonymised, depending on the context, before transmitting them to a third party for statistical purposes, unless the data subject consented to it or it is specically provided for by a national law. This follows from the requirement of appropriate safeguards under Article6(1)(b) of the Data Protection Directive. The most important cases of using data for statistical purposes are ofcial statistics, performed by the national and EU statistics bureaus based on national and EUlaws on ofcial statistics. According to these laws, citizens and businesses are usually obliged to disclose data to the statistics authorities. Ofcials working in statistics bureaus are bound by special professional secrecy obligations which are carefully observed, as they are essential for the high level of citizen trust which is necessary if data are to be made available to the statistics authorities. Regulation (EC) No.223/2009 on European statistics (European Statistics Regulation) contains essential rules for data protection in ofcial statistics and may, therefore, also be considered relevant for provisions on ofcial statistics at the national level. 313
313 Regulation (EC) No.223/2009 of the European Parliament and of the Council of 11March2009 on European statistics and repealing Regulation (EC, Euratom) No.1101/2008 of the European Parliament and of the Council on the transmission of data subject to statistical condentiality to the Statistical Ofce of the European Communities, Council Regulation (EC) No.322/97 on Community Statistics, and Council Decision89/382/EEC, Euratom establishing a Committee on the Statistical Programmes of the European Communities, OJ2009L87. Other specic European data protection laws 177 The Regulation maintains the principle that ofcial statistical operations need a suf- ciently precise legal basis. 314 Example: In Huber v. Germany, 315 the CJEU found that the collection and storage of personal data by an authority for statistical purposes was not a sufcient rea- son in itself for processing to be lawful. The law providing for the processing of personal data also needed to meet the requirement of necessity, which was not the case in the given context. In the context of the CoE, the Statistical Data Recommendation which was issued in1997 covers the performance of statistics in the public and private sectors. 316 This recommendation introduced principles which coincide with the main rules of the Data Protection Directive described above. More detailed rules are given concerning the following issues. Whereas data which were collected by a controller for statistical purposes may not be used for any other purpose, data which were collected for non-statistical pur- pose shall be available for further statistical use. The Statistical Data Recommenda- tion even allows for communicating data to third parties if this is for statistical pur- poses only. In such cases, the parties should agree and write down the extent of the legitimate further use for statistics. As this cannot substitute for the data subjects consent, it is to be assumed that there must be additional appropriate safeguards laid down in national law to minimise the risks of misusing personal data, such as an obligation to anonymise or pseudonymise the data before transmission. The people dealing professionally with statistical research should be bound by special professional secrecy obligations as is typical for ofcial statistics under national law. This should be extended also to interviewers, if they are employed in collecting data from data subjects or other persons. If a statistical survey using personal data is not prescribed by law, the data subjects would have to consent to the use of their data in order to make it legitimate, or 314 This principle is to be further detailed in Eurostats Code of Practice, which shall, in accordance with Article11 of the European Statistics Regulation, give ethical guidance on how to perform ofcial statistics, including considerate use of personal data; available at: http://epp.eurostat.ec.europa.eu/ portal/page/portal/about_eurostat/introduction. 315 CJEU, C-524/06, Huber v. Germany, 16December2008; see especially para.68. 316 Council of Europe, Committee of Ministers (1997), Recommendation Rec(97)18 to member states on the protection of personal data collected and processed for statistical purposes, 30September1997. Handbook on European data protection law 178 they should at least be given an opportunity to object. If personal data are collected for statistical purposes by interviewing persons, these persons must be clearly informed whether or not disclosing data is mandatory under national law. Sensitive data should never be collected in in such a way that an individual can be identied unless explicitly permitted by national law. Where a statistical survey cannot be performed without anonymous data, and personal data are indeed necessary, the data collected for this purpose should be anonymised as soon as feasible. The results of the statistical survey must not, at the least, allow for the identication of any data subjects, unless this would manifestly present norisk. After the statistical analysis has been concluded, the personal data used should either be deleted or rendered anonymous. In this case, the Statistical Data Recom- mendation proposes that identication data should be stored separately from other personal data. This means, for instance, that the data should be pseudonymised and either the encryption key or the list with the identifying synonyms should be stored separately from the pseudonymised data. 8.5. Financial data Key points Although nancial data are not sensitive data in the sense of Convention108 or of the Data Protection Directive, their processing needs particular safeguards to ensure accuracy and data security. Electronic payment systems need built-in data protection, so-called privacy by design. Particular data protection problems arise in this area from the need to have appropri- ate mechanisms for authentication in place. Example: In Michaud v. France, 317 the applicant, a French lawyer, challenged his obligation under French law to report suspicions regarding possible money- laundering activities by his clients. The ECtHR observed that requiring lawyers to 317 ECtHR, Michaud v. France, No.12323/11, 6December2012; see also ECtHR, Niemietz v. Germany, No.13710/88, 16December1992, para.29, and ECtHR, Halford v. the UnitedKingdom, No.20605/92, 25June1997, para.42. Other specic European data protection laws 179 report to the administrative authorities information concerning another person which came into their possession through exchanges with that person consti- tuted an interference with the lawyers right to respect for their correspondence and private life under Article8of the ECHR, as that concept covered activities of a professional or business nature. However, the interference was in accordance with the law and pursued a legitimate aim, namely the prevention of disorder and crime. Since lawyers were subject to the obligation to report suspicions only under very limited circumstances, the ECtHR held that this obligation was pro- portionate, concluding that there had not been a violation of Article8. An application of the general legal framework for data protection, as contained in Convention108, to the context of payments was developed by the CoE in Recom- mendation Rec(90)19 of1990. 318 This recommendation claries the scope of law- ful collection and use of data in the context of payments, especially by means of payment cards. It further proposes to the domestic legislators detailed regulations on the limits of communicating payment data to third parties, on time limits for the conservation of data, on transparency, data security and transborder data ows and, nally, on supervision and remedies. The solutions proposed correspond to what was later provided as the EUs general data protection framework in the Data Pro- tection Directive. A number of legal instruments are being created for regulating markets in nancial instruments and the activities of credit institutions and investment rms. 319 Other 318 CoE, Committee of Ministers (1990), Recommendation No.R(90)19 on the protection of personal data used for payment and other related operations, 13September1990. 319 European Commission (2011), Proposal for a Directive of the European Parliament and of the Council on markets in nancial instruments repealing Directive 2004/39/EC of the European Parliament and of the Council, COM(2011)656 nal, Brussels, 20October2011; European Commission (2011), Proposal for a Regulation of the European Parliament and of the Council on markets in nancial instruments and amending Regulation [EMIR] on OTC derivatives, central counterparties and trade repositories, COM(2011)652 nal, Brussels, 20October2011; European Commission (2011), Proposal for a Directive of the European Parliament and of the Council on the access to the activity of credit institutions and the prudential supervision of credit institutions and investment rms and amending Directive2002/87/EC of the European Parliament and of the Council on the supplementary supervision of credit institutions, insurance undertakings and investment rms in a nancial conglomerate, COM(2011)453 nal, Brussels, 20July2011. Handbook on European data protection law 180 legal instruments assist in ghting insider dealing and market manipulation. 320 The most critical issues in these areas which impact on data protection are: the retention of records on nancial transactions; the transfer of personal data to third countries; the recording of telephone conversations or electronic communications, includ- ing the power of the competent authorities to request telephone and data trafc records; the disclosure of personal information, including the publication of sanctions; the supervisory and investigatory powers of the competent authorities, includ- ing on-site inspections and entering private premises to seize documents; the mechanisms for reporting breaches, i.e. whistle-blowing schemes; and the cooperation between competent authorities of Member States and the Euro- pean Securities and Markets Authority (ESMA). There are also other issues in these areas that are specically addressed, including collecting data on the nancial status of data subjects 321 or cross-border payment via banking transfers, which inevitably leads to personal dataows. 322 320 European Commission (2011), Proposal for a Regulation of the European Parliament and of the Council on insider dealing and market manipulation (market abuse), COM(2011)651 nal, Brussels, 20October2011; European Commission (2011), Proposal for a Directive of the European Parliament and of the Council on criminal sanctions for insider dealing and market manipulation, COM(2011)654 nal, Brussels, 20October2011. 321 Regulation (EC) No.1060/2009 of the European Parliament and of the Council of 16September2009 on credit rating agencies, OJ2009L302; European Commission, Proposal for a Regulation of the European Parliament and of the Council on amending Regulation (EC) No.1060/2009 on credit rating agencies, COM(2010)289 nal, Brussels, 2June2010. 322 Directive 2007/64/EC of the European Parliament and of the Council of 13November2007 on payment services in the internal market amending Directives 97/7/EC, 2002/65/EC, 2005/60/EC and 2006/48/EC and repealing Directive 97/5/EC, OJ2007L319. 181 Chapter 1 Araceli Mangas, M. (ed.) (2008), Carta de los derechos fundamentales de la Unin Europea, Bilbao, Fundacin BBVA. Berka, W. (2012), Das Grundrecht auf Datenschutz im Spannungsfeld zwischen Frei- heit und Sicherheit, Vienna, Manzsche Verlags- und Universittsbuchhandlung. EDRi, An introduction to data protection, Brussels, available at: www.edri.org/les/ paper06_datap.pdf. Frowein, J. and Peukert, W. (2009), Europische Menschenrechtskonvention, Berlin, N.P. Engel Verlag. Grabenwarter, C. and Pabel,K. (2012), Europische Menschenrechtskonvention, Munich, C.H. Beck. Harris, D., OBoyle,M., Warbrick,C. and Bates,E. (2009), Law of the European Con- vention on Human Rights, Oxford, Oxford UniversityPress. Jarass, H. (2010), Charta der Grundrechte der Europischen Union, Munich, C.H. Beck. Mayer, J. (2011), Charta der Grundrechte der Europischen Union, Baden-Baden, Nomos. Further reading Handbook on European data protection law 182 Mowbray, A. (2012), Cases, materials, and commentary on the European Convention on Human Rights, Oxford, Oxford University Press. Nowak, M., Januszewski,K. and Hofsttter,T. (2012), All human rights for all Vienna manual on human rights, Antwerp, intersentia N. V., Neuer Wissenschaftlicher Verlag. Picharel, C. and Coutron,L. (2010), Charte des droits fondamentaux de lUnion euro- penne et convention europenne des droits de lhomme, Brussels, Emile Bruylant. Simitis, S. (1997), Die EU-Datenschutz-Richtlinie Stillstand oder Anreiz?, Neue Juris- tische Wochenschrift, No.5, pp.281288. Warren, S. and Brandeis,L. (1890), The right to privacy, Harvard Law Review, Vol.4, No.5, pp.193220, available at: http://www.english.illinois.edu/-people-/faculty/ debaron/582/582%20readings/right%20to%20privacy.pdf. White, R. and Ovey,C. (2010), The European Convention on Human Rights, Oxford, Oxford University Press. Chapter 2 Carey, P. (2009), Data protection: A practical guide to UK and EUlaw, Oxford, Oxford University Press. Delgado, L. (2008), Vida privada y proteccin de datos en la Unin Europea, Madrid, Dykinson S.L. Desgens-Pasanau,G. (2012), La protection des donnes caractre personnel, Paris, LexisNexis. Di Martino, A. (2005), Datenschutz im europischen Recht, Baden-Baden, Nomos. Morgan, R. and Boardman,R. (2012), Data protection strategy: Implementing data protection compliance, London, Sweet & Maxwell. Ohm, P. (2010), Broken promises of privacy: Responding to the surprising failure of anonymization, UCLA Law Review, Vol.57, No.6, pp.17011777. Further reading 183 Tinnefeld, M., Buchner,B. and Petri,T. (2012), Einfhrung in das Datenschutzrecht: Datenschutz und Informationsfreiheit in europischer Sicht, Munich, Oldenbourg Wissenschaftsverlag. United Kingdom Information Commissioners Office (2012), Anonymisation: managing data protection risk. Code of practice, available at: www.ico.org.uk/ for_organisations/data_protection/topic_guides/anonymisation. Chapters 3 to 5 Brhann,U. (2012), Richtlinie 95/46/EG zum Schutz natrlicher Personen bei der Verarbeitung personenbezogener Daten und zum freien Datenverkehr in: Grabitz, E., Hilf, M. and Nettesheim, M. (eds.), Das Recht der Europischen Union, BandIV, A.30, Munich, C.H. Beck. Conde Ortiz,C. (2008), La proteccin de datos personales, Cadiz, Dykinson. Coudray, L. (2010), La protection des donnes personnelles dans lUnion europe- nne, Saarbrucken, ditions universitaires europennes. Dammann, U. and Simitis,S. (1997), EG-Datenschutzrichtlinie, Baden-Baden, Nomos. FRA (European Union Agency for Fundamental Rights) (2010), Data Protection in the European Union: the role of National Data Protection Authorities (Strengthening the fundamental rights architecture in the EUII), Luxembourg, Publications Ofce of the European Union (Publications Ofce). FRA (2010), Developing indicators for the protection, respect and promotion of the rights of the child in the European Union (Conference edition), Vienna, FRA. FRA (2011), Access to justice in Europe: an overview of challenges and opportunities, Luxembourg, Publications Ofce. Simitis, S. (2011), Bundesdatenschutzgesetz, Baden-Baden, Nomos. United Kingdom Information Commissioners Ofce, Privacy Impact Assessment, available at: www.ico.org.uk/for_organisations/data_protection/topic_guides/ privacy_impact_assessment. Handbook on European data protection law 184 Chapter 6 Gutwirth, S., Poullet,Y., De Hert,P., De Terwangne,C. and Nouwt,S. (2009), Rein- venting data protection?, Berlin, Springer. Kuner, C. (2007), European data protection law, Oxford, Oxford University Press. Kuner, C. (2013), Transborder data flow regulation and data privacy law, Oxford, Oxford University Press. Chapter 7 Europol (2012), Data Protection at Europol, Luxembourg, Publications Ofce, availa- ble at: www.europol.europa.eu/sites/default/les/publications/europol_dpo_book- let_0.pdf. Eurojust, Data protection at Eurojust: A robust, effective and tailor-made regime, The Hague, Eurojust. Drewer, D. and Ellermann,J. (2012), Europols data protection framework as an asset in the ght against cybercrime, ERA Forum, Vol.13, No.3, pp.381395. Gutwirth, S., Poullet,Y. and De Hert,P. (2010), Data protection in a proled world, Dordrecht, Springer. Gutwirth, S., Poullet,Y., De Hert,P. and Leenes,R. (2011), Computers, privacy and data protection: An element of choice, Dordrecht, Springer. Konstadinides, T. (2011), Destroying democracy on the ground of defending it? The Data Retention Directive, the surveillance state and our constitutional ecosystem, European Law Review, Vol.36, No.5, pp.722776. Santos Vara, J. (2013), The role of the European Parliament in the conclusion of the Transatlantic Agreements on the transfer of personal data after Lisbon, Centre for the Law of External Relations, CLEER Working Papers 2013/2, available at: www.asser. nl/upload/documents/20130226T013310-cleer_13-2_web.pdf. Further reading 185 Chapter 8 Bllesbach, A., Gijrath,S., Poullet,Y. and Hacon,R. (2010), Concise European IT law, Amsterdam, Kluwer Law International. Gutwirth, S., Leenes,R., De Hert,P. and Poullet,Y. (2012), European data protection: In good health?, Dordrecht, Springer. Gutwirth, S., Poullet,Y. and De Hert,P. (2010), Data protection in a proled world, Dordrecht, Springer. Gutwirth, S., Poullet,Y., De Hert,P. and Leenes,R. (2011), Computers, privacy and data protection: An element of choice, Dordrecht, Springer. Konstadinides, T. (2011), Destroying democracy on the ground of defending it? The Data Retention Directive, the surveillance state and our constitutional ecosystem, European Law Review, Vol.36, No.5, pp.722776. Rosemary, J. and Hamilton,A. (2012), Data protection law and practice, London, Sweet & Maxwell. 187 Selected case law of the European Court ofHuman Rights Access to personal data Gaskin v. the UnitedKingdom, No.10454/83, 7July1989 Godelli v. Italy, No.33783/09, 25September2012 K.H. and Others v. Slovakia, No.32881/04, 28April2009 Leander v. Sweden, No.9248/81, 26March1987 Odivre v. France [GC], No.42326/98, 13February2003 Balancing data protection with freedom of expression Axel Springer AG v. Germany [GC], No.39954/08, 7February2012 Von Hannover v. Germany, No.59320/00, 24June2004 Von Hannover v. Germany (No. 2) [GC], Nos. 40660/08 and 60641/08, 7February2012 Challenges in online data protection K.U. v. Finland, No.2872/02, 2December2008 Correspondence Amann v. Switzerland [GC], No.27798/95, 16February2000 Bernh Larsen Holding AS and Others v. Norway, No.24117/08, 14March2013 Case law Handbook on European data protection law 188 Cemalettin Canli v. Turkey, No.22427/04, 18November2008 Dalea v. France, No.964/07, 2February2010 Gaskin v. the UnitedKingdom, No.10454/83, 7July1989 Haralambie v. Romania, No.21737/03, 27October2009 Khelili v. Switzerland, No.16188/07, 18October2011 Leander v. Sweden, No.9248/81, 26March1987 Malone v. the UnitedKingdom, No.8691/79, 2August1984 McMichael v. the UnitedKingdom, No.16424/90, 24February1995 M.G. v. the UnitedKingdom, No.39393/98, 24September2002 Rotaru v. Romania [GC], No.28341/95, 4May2000 S. and Marper v. the United Ki ngdom, Nos. 30562/04 and 30566/04, 4December2008 Shimovolos v. Russia, No.30194/09, 21June2011 Turek v. Slovakia, No.57986/00, 14February2006 Criminal record databases B.B. v. France, No.5335/06, 17December2009 M.M. v. the UnitedKingdom, No.24029/07, 13November2012 DNA databases S. and Marper v. the United Ki ngdom, Nos. 30562/04 and 30566/04, 4December2008. GPS data Uzun v. Germany, No.35623/05, 2September2010 Health data Biriuk v. Lithuania, No.23373/03, 25November2008 I. v. Finland, No.20511/03, 17July2008 L.L. v. France, No.7508/02, 10October2006 M.S. v. Sweden, No.20837/92, 27August1997 Szuluk v. the UnitedKingdom, No.36936/05, 2June2009 Z. v. Finland, No.22009/93, 25February1997 Identity Ciubotaru v. Moldova, No.27138/04, 27April2010 Case law 189 Godelli v. Italy, No.33783/09, 25September2012 Odivre v. France [GC], No.42326/98, 13February2003 Information concerning professional activities Michaud v. France, No.12323/11, 6December2012 Niemietz v. Germany, No.13710/88, 16December1992 Interception of communication Amann v. Switzerland [GC], No.27798/95, 16February2000 Copland v. the UnitedKingdom, No.62617/00, 3April2007 Cotlet v. Romania, No.38565/97, 3June2003 Kruslin v. France, No.11801/85, 24April1990 Lambert v. France, No.23618/94, 24August1998 Liberty and Others v. the UnitedKingdom, No.58243/00, 1July2008 Malone v. the UnitedKingdom, No.8691/79, 2August1984 Halford v. the UnitedKingdom, No.20605/92, 25June1997 Szuluk v. the UnitedKingdom, No.36936/05, 2June2009 Obligations for duty bearers B.B. v. France, No.5335/06, 17December2009 I. v. Finland, No.20511/03, 17July2008 Mosley v. the UnitedKingdom, No.48009/08, 10May2011 Photos Sciacca v. Italy, No.50774/99, 11January2005 Von Hannover v. Germany, No.59320/00, 24June2004 Right to be forgotten Segerstedt-Wiberg and Others v. Sweden, No.62332/00, 6June2006 Right to object Leander v. Sweden, No.9248/81, 26March1987 Mosley v. the UnitedKingdom, No.48009/08, 10May2011 M.S. v. Sweden, No.20837/92, 27August1997 Rotaru v. Romania [GC], No.28341/95, 4May2000 Handbook on European data protection law 190 Sensitive categories of data I. v. Finland, No.20511/03, 17July2008 Michaud v. France, No.12323/11, 6December2012 S. and Marper v. the United Ki ngdom, Nos. 30562/04 and 30566/04, 4December2008 Supervision and enforcement (role of different actors, including data protection authorities) I. v. Finland, No.20511/03, 17July2008 K.U. v. Finland, No.2872/02, 2December2008 Von Hannover v. Germany, No.59320/00, 24June2004 Von Hannover v. Germany (No. 2) [GC], Nos. 40660/08 and 60641/08, 7February2012 Surveillance methods Allan v. the UnitedKingdom, No.48539/99, 5November2002 Association 21 Dcembre 1989 and Others v. Romania, Nos.33810/07 and 18817/08, 24May2011 Bykov v. Russia [GC], No.4378/02, 10March2009 Kennedy v. the UnitedKingdom, No.26839/05, 18May2010 Klass and Others v. Germany, No.5029/71, 6September1978 Rotaru v. Romania [GC], No.28341/95, 4May2000 Taylor-Sabori v. the United Kingdom, No.47114/99, 22October2002 Uzun v. Germany, No.35623/05, 2September2010 Vetter v. France, No.59842/00, 31May2005 Video surveillance Kpke v. Germany, No.420/07, 5October2010 Peck v. the UnitedKingdom, No.44647/98, 28January2003 Voice samples P.G. and J.H. v. the UnitedKingdom, No.44787/98, 25September2001 Wisse v. France, No.71611/01, 20December2005 Case law 191 Selected case law oftheCourt of Justice oftheEuropean Union Jurisprudence related to the Data Protection Directive C-73/07, Tietosuojavaltuutettu v. Satakunnan Markkinaprssi Oy and Satamedia Oy, 16December2008 [Concept of journalistic activities within the meaning of Article9 Data Protection Directive] Joined cases C-92/09 and C-93/09, Volker and Markus Schecke GbR and Hartmut Eif- ert v. Land Hessen, 9November2010 [Proportionality of the legal obligation to publish personal data about the beneciaries of certain EU agricultural funds] C-101/01, Bodil Lindqvist, 6November2003 [Legitimacy of publishing data by a private person on the private life of others on the internet] C-131/12, Google Spain, S.L., Google Inc. v. Agencia Espaola de Proteccin de Datos, Mario Costeja Gonzlez, Reference for a preliminary ruling from the Audiencia Nacional (Spain) lodged on 9March2012, 25May2012, pending [Obligations of search engine providers to refrain, on request of the data subject, from showing personal data in the search results] C-270/11, European Commission v. Kingdom of Sweden, 30May2013 [Fine for not implementing a directive] C-275/06, Productores de Msica de Espaa (Promusicae) v. Telefnica de Espaa SAU, 29January2008 [Obligation of internet access providers to disclose identity of users of KaZaA file exchange programmes to intellectual property protection association] C-288/12, European Commission v. Hungary, 8April2014 [Legitimacy of removal of ofce of the national data protection supervisor] Handbook on European data protection law 192 C-291/12, Michael Schwarz v. Stadt Bochum, Opinion of the Advocate General, 13June2013 [Violation of EU primary law by Regulation(EC)2252/2004 providing that ngerprints have to be stored in passports] Joined cases C-293/12 and C-594/12, Digital Rights Ireland and Seitling and Others v. Ireland, 8 April 2014 [Violation of EU primary law by the Data Retention Directive] C-360/10, SABAM v. Netlog N.V., 16February2012 [Obligation of social network providers to prevent unlawful use of musical and audio- visual works by network users] Joined cases C-465/00, C-138/01 and C-139/01, Rechnungshof v. sterreichischer Rundfunk and Others and Neukomm and Lauermann v. sterreichischer Rundfunk, 20May2003 [Proportionality of legal obligation to publish personal data about salaries of employ- ees of certain categories of public sector related institutions] Joined cases C-468/10 and C-469/10, Asociacin Nacional de Establecimientos Financieros de Crdito (ASNEF) and Federacin de Comercio Electrnico y Marketing Directo (FECEMD) v. Administracin del Estado, 24November2011 [Correct implementation of Article7(f) of the Data Protection Directive legitimate interests of others in national law] C-518/07, European Commission v. Federal Republic of Germany, 9March2010 [Independence of a national supervisory authority] C-524/06, Huber v. Bundesrepublik Deutschland, 16December2008 [Legitimacy of holding data on foreigners in a statistical register] C-543/09, Deutsche Telekom AG v. Bundesrepublik Deutschland, 5May2011 [Necessity of renewed consent] C-553/07, College van burgemeester en wethouders van Rotterdam v. M.E.E. Rijke- boer, 7May2009 [Right of access of the data subject] Case law 193 C-614/10, European Commission v. Republic of Austria, 16October2012 [Independence of a national supervisory authority] Jurisprudence related to the EU Institutions Data Protection Regulation C-28/08P, European Commission v. The Bavarian Lager Co. Ltd., 29June2010 [Access to documents] C-41/00P, Interporc Im- und Export GmbH v. Commission of the European Communi- ties, 6March2003 [Access to documents] F-35/08, Dimitrios Pachtitis v. European Commission, 15June2010 [Use of personal data in the context of employment in EU institutions] F-46/09, V v. European Parliament, 5July2011 [Use of personal data in the context of employment in EU institutions] 195 Case-law of the Court of Justice of the European Union Asociacin Nacional de Establecimientos Financieros de Crdito (ASNEF) and Federacin de Comercio Electrnico y Marketing Directo (FECEMD) v. Administracin del Estado, Joined cases C-468/10 and C-469/10, 24November2011 ..................................................................18, 22, 79, 81, 85, 86, 192 Bodil Lindqvist, C-101/01, 6November2003 .........................................................35, 43, 47, 49, 94, 129, 130, 191 College van burgemeester en wethouders van Rotterdam v. M. E. E. Rijkeboer, C-553/07, 7May2009 ................................................................103, 108, 192 Deutsche Telekom AG v. Germany, C-543/09, 5May2011 .......................36, 59, 60, 192 Digital Rights Ireland and Seitlinger and Others, Joined cases C-293/12 and C-594/12, 8April2014 .......................................................................... 124, 169, 192 Dimitrios Pachtitis v. European Commission, F-35/08, 15June2010 .......................... 193 European Commission v. Federal Republic of Germany, C-518/07, 9March2010 ....................................................................................................104, 116, 192 European Commission v. Hungary, C-288/12, 8April2014 ......................... 104, 117, 191 European Commission v. Kingdom of Sweden, C-270/11, 30May2013.................... 191 European Commission v. Republic of Austria, C-614/10, 16October2012 .............................................................................................. 104, 117, 193 Index Handbook on European data protection law 196 European Commission v. The Bavarian Lager Co. Ltd., C-28/08 P, 29June2010 ................................................................................ 13, 27, 29, 104, 125, 193 European Parliament v. Council of the European Union, Joined cases C-317/04 and C-318/04, 30May2006 ......................................................................... 139 Google Spain, S.L., Google Inc. v. Agencia Espaola de Proteccin de Datos, Mario Costeja Gonzlez, C-131/12, Reference for a preliminary ruling from the Audiencia Nacional (Spain) lodged on 9March2012, 25May2012, pending ......................................................................... 191 Huber v. Germany, C-524/06, 16December2008 ...............................................................61, 79, 81, 83, 165, 177, 192 Interporc Im- und Export GmbH v. Commission of the European Communities, C-41/00, 6March2003 ....................................................................29, 193 M.H. Marshall v. Southampton and South-West Hampshire Area Health Authority, C-152/84, 26February1986 .......................................................... 104 Michael Schwarz v. Stadt Bochum, C-291/12, Opinion of the Advocate General, 13June2013 ...................................................................................................... 192 Productores de Msica de Espaa (Promusicae) v. Telefnica de Espaa SAU, C-275/06, 29January2008 ...................................13, 22, 32, 35, 39, 191 Rechnungshof v. sterreichischer Rundfunk and Others and Neukomm and Lauermann v. sterreichischer Rundfunk, Joined cases C-465/00, C-138/01 and C-139/01, 20May2003 ....................................81, 192 SABAM v. Netlog N.V., C-360/10, 16February2012 .................................................33, 192 Sabine von Colson and Elisabeth Kamann v. Land Nordrhein- Westfalen, C-14/83, 10April1984 .......................................................................104, 127 Tietosuojavaltuutettu v. Satakunnan Markkinaprssi Oy and Satamedia Oy, C-73/07, 16December2008 ..................................................13, 23, 191 V v. European Parliament, F-46/09, 5July2011 .............................................................. 193 Volker und Markus Schecke GbR and Hartmut Eifert v. Land Hessen, Joined cases C-92/09 and C-93/09, 9November2010 .......................................................13, 21, 29, 35, 38, 42, 61, 66, 191 Index 197 Case-law of the European Court of Human Rights Allan v. the United Kingdom, No. 48539/99, 5November2002 ........................ 145, 190 Amann v. Switzerland [GC], No.27798/95, 16February2000 .......................................................................... 37, 39, 42, 63, 187, 189 Ashby Donald and Others v. France, No. 36769/08, 10January2013 ...........................31 Association 21 Dcembre 1989 and Others v. Romania, Nos. 33810/07 and 18817/08, 24May2011 ...................................................................... 190 Association for European Integration and Human Rights and Ekimdzhiev v. Bulgaria, No.62540/00, 28June2007 ................................................64 Avilkina and Others v. Russia, No. 1585/09, 6June2013 (not nal) ............................174 Axel Springer AG v. Germany [GC], No.39954/08, 7February2012 ....................................................................................................13, 24, 187 B.B. v. France, No.5335/06, 17December2009 ................................. 143, 145, 188, 189 Bernh Larsen Holding AS and Others v. Norway, No. 24117/08, 14March2013 ...................................................................................................... 35, 38, 187 Biriuk v. Lithuania, No.23373/03, 25November2008 .........................25, 104, 174, 188 Bykov v. Russia [GC], No. 4378/02, 10March2009 ........................................................ 190 Cemalettin Canli v. Turkey, No.22427/04, 18November2008 .................103, 109, 188 Ciubotaru v. Moldova, No.27138/04, 27April2010 ..................................... 103, 111, 188 Copland v. the UnitedKingdom, No.62617/00, 3April2007 ............... 15, 165, 171, 189 Cotlet v. Romania, No.38565/97, 3June2003 ................................................................. 189 Dalea v. France, No.964/07, 2February2010 .......................................109, 143, 159, 188 Gaskin v. the UnitedKingdom, No.10454/83, 7July1989..........................106, 187, 188 Godelli v. Italy, No.33783/09, 25September2012 ................................ 39, 106, 187, 189 Halford v. the UnitedKingdom, No.20605/92, 25June1997 .............................178, 189 Haralambie v. Romania, No. 21737/03, 27October2009 ............................... 62, 74, 188 I. v. Finland, No.20511/03, 17July2008...............................................................15, 80, 92, 126, 173, 188, 189, 190 Iordachi and Others v. Moldova, No. 25198/02, 10 Feburary 2009 ...............................63 K.H. and Others v. Slovakia, No. 32881/04, 28April2009 ......................................................................................62, 74, 106, 173, 187 Handbook on European data protection law 198 K.U. v. Finland, No.2872/02, 2December2008 .................. 15, 104, 122, 126, 187, 190 Kennedy v. the UnitedKingdom, No.26839/05, 18May2010 .................................... 190 Khelili v. Switzerland, No.16188/07, 18October2011 ......................................61, 65, 188 Klass and Others v. Germany, No.5029/71, 6September1978 .................. 15, 146, 190 Kpke v. Germany, No.420/07, 5October2010 ..............................................43, 123, 190 Kopp v. Switzerland, No.23224/94, 25March1998..........................................................63 Kruslin v. France, No.11801/85, 24April1990 ................................................................. 189 L.L. v. France, No.7508/02, 10October2006 ..........................................................173, 188 Lambert v. France, No.23618/94, 24August1998......................................................... 189 Leander v. Sweden, No.9248/81, 26March1987................................................. 15, 61, 65, 106, 113, 144, 187, 188, 189 Liberty and Others v. The United Kingdom, No.58243/00, 1July2008 ............. 38, 189 M.G. v. the United Kingdom, No. 39393/98, 24September2002 ............................... 188 M.K. v. France, No.19522/09, 18April2013 ............................................................ 110, 144 M.M. v. the UnitedKingdom, No.24029/07, 13November2012 ...............73, 144, 188 M.S. v. Sweden, No. 20837/92, 27August1997 .................................. 113, 173, 188, 189 Malone v. the United Kingdom, No. 8691/79, 2August1984 ....................................................................................15, 63, 170, 188, 189 McMichael v. the UnitedKingdom, No.16424/90, 24February1995 ....................... 188 Michaud v. France, No. 12323/11, 6December2012 ......................... 166, 178, 189, 190 Mosley v. the UnitedKingdom, No.48009/08, 10May2011 ............... 13, 25, 113, 189 Mller and Others v. Switzerland, No.10737/84, 24May1988 .....................................30 Niemietz v. Germany, 13710/88, 16December1992 .................................... 37, 178, 189 Odivre v. France [GC], No.42326/98, 13February2003 ................... 39, 106, 187, 189 P.G. and J.H. v. the United Kingdom, No. 44787/98, 25September2001 .......... 43, 190 Peck v. the UnitedKingdom, No.44647/98, 28January2003 .............................................................................................43, 61, 64, 190 Rotaru v. Romania [GC], No. 28341/95, 4May2000 ......................................................................... 37, 61, 64, 110, 188, 189, 190 S. and Marper v. the UnitedKingdom, Nos.30562/04 and 30566/04, 4December2008 .................................................................... 15, 73, 143, 145, 188, 190 Sciacca v. Italy, No.50774/99, 11January2005 ........................................................ 43, 189 Index 199 Segerstedt-Wiberg and Others v. Sweden, No.62332/00, 6June2006 .......................................................................................................103, 110, 189 Shimovolos v. Russia, No.30194/09, 21June2011 .................................................. 64, 188 Silver and Others v. the UnitedKingdom, Nos.5947/72, 6205/73, 7052/75, 7061/75, 7107/75, 7113/75, 25March1983 ............................................63 Szuluk v. the UnitedKingdom, No.36936/05, 2June2009 ....................... 173, 188, 189 Trsasg a Szabadsgjogokrt v. Hungary, No.37374/05, 14April2009.............13, 28 Taylor-Sabori v. the United Kingdom, No. 47114/99, 22October2002 .................................................................................................. 61, 64, 190 The Sunday Times v. the UnitedKingdom, No.6538/74, 26April1979 .......................63 Turek v. Slovakia, No. 57986/00, 14February2006 ....................................................... 188 Uzun v. Germany, No.35623/05, 2September2010 ..............................15, 42, 188, 190 Vereinigung bildender Knstler v. Austria, No.68345/01, 25January2007 .............................................................................................................13, 30 Vetter v. France, No. 59842/00, 31May2005 ........................................ 64, 143, 147, 190 Von Hannover v. Germany (No. 2) [GC], Nos.40660/08 and 60641/08, 7February2012 .................................................................... 22, 24, 187, 190 Von Hannover v. Germany, No. 59320/00, 24June2004 ..................... 43, 187, 189, 190 Wisse v. France, No.71611/01, 20December2005 ................................................. 43, 190 Z. v. Finland, No. 22009/93, 25February1997 ..............................................165, 173, 188 Case-law of national courts Germany, Federal Constitutional Court (Bundesverfassungsgericht), 1BvR256/08, 2March2010 ..........................................................................................169 Romania, Federal Constitutional Court (Curtea Constituional a Romniei), No.1258, 8October2009 ..........................................................................169 The Czech Republic, Constitutional Court (stavn soud esk republiky), 94/2011Coll., 22March2011 ....................................................................169
European Union Agency for Fundamental Rights Council of Europe European Court of Human Rights Handbook on European data protection law 2014 199 pp. 14.8 21 cm ISBN 978-92-871-9934-8 (CoE) ISBN 978-92-9239-461-5 (FRA) doi:10.2811/69915 A great deal of information on the European Union Agency for Fundamental Rights is available on the Internet. It can be accessed through the FRA website at fra.europa.eu. More information on the Council of Europe is available on the Internet at hub.coe.int. Further information on the European Court of Human Rights is available on the Courts website: echr.coe.int. The HUDOC search portal provides access to judgments and decisions in English and/or French, translations into additional languages, legal summaries, press releases and other information on the work of the Court. HOW TO OBTAIN EU PUBLICATIONS Free publications: one copy: via EU Bookshop (http://bookshop.europa.eu); more than one copy or posters/maps: from the European Unions representations (http://ec.europa.eu/represent_en.htm); from the delegations in non-EU countries (http://eeas.europa.eu/delegations/index_ en.htm); by contacting the Europe Direct service (http://europa.eu/europedirect/index_en.htm) or calling 00 800 6 7 8 9 10 11 (freephone number from anywhere in the EU) (*). Priced publications: via EU Bookshop (http://bookshop.europa.eu); Priced subscriptions: via one of the sales agents of the Publications Ofce of the European Union (http://publications.europa.eu/others/agents/index_en.htm). (*) The information given is free, as are most calls (though some operators, phone boxes or hotels may charge you). How to obtain Council of Europe publications Council of Europe Publishing produces works in all the Organisations spheres of reference, including human rights, legal science, health, ethics, social affairs, the environment, education, culture, sport, youth and architectural heritage. Books and electronic publications from the extensive catalogue may be ordered online (http://book.coe.int/). A virtual reading room enables users to consult excerpts from the main works just published or the full texts of certain ofcial documents at no cost. Information on, as well as the full text of, the Council of Europe Conventions is available from the Treaty Ofce website: http://conventions.coe.int/. T K - 0 4 - 1 4 - 3 1 9 - E N - C
1 0 . 2 8 1 1 / 6 9 9 1 5 The rapid development of information and communication technologies underscores the growing need for the robust protection of personal data a right safeguarded by both European Union (EU) and Council of Europe (CoE) instruments. Technological advances expand the frontiers of, for example, surveillance, communication interception and data storage; all of these pose signicant challenges to the right to data protection. This handbook is designed to familiarise legal practitioners who are not specialised in the eld of data protection with this area of law. It provides an overview of the EUs and the CoEs applicable legal frameworks. It explains key jurisprudence, summarising major rulings of both the European Court of Human Rights (ECtHR) and the Court of Justice of the European Union (CJEU). Where no such case law exists, it presents practical illustrations with hypothetical scenarios. In a nutshell, this handbook aims to help ensure that the right to data protection is upheld with vigour and determination. EUROPEAN UNION AGENCY FOR FUNDAMENTAL RIGHTS Schwarzenbergplatz 11 - 1040 Vienna - Austria Tel. +43 (1) 580 30-60 - Fax +43 (1) 580 30-693 fra.europa.eu [email protected] COUNCIL OF EUROPE EUROPEAN COURT OF HUMAN RIGHTS 67075 Strasbourg Cedex - France Tel. +33 (0) 3 88 41 20 00 - Fax +33 (0) 3 88 41 27 30 echr.coe.int [email protected] ISBN 978-92-871-9934-8 (CoE) ISBN 978-92-9239-461-5 (FRA)
(Ius Comparatum - Global Studies in Comparative Law 27) Hans-W. Micklitz, Geneviève Saumier - Enforcement and Effectiveness of Consumer Law-Springer International Publishing (2018)