Handbook On EU Data Protection Law
Handbook On EU Data Protection Law
Handbook on European
data protection law
2018 edition
Updates will become available in future on the FRA website at fra.europa.eu, the Council of
Europe website at coe.int/dataprotection, on the European Court of Human Rights website under
the Case Law menu at echr.coe.int, and on the European Data Protection Supervisor website at
edps.europa.eu.
© European Union Agency for Fundamental Rights and Council of Europe, 2018
Reproduction is authorised, provided the source is acknowledged.
For any use or reproduction of photos or other material that is not under the European Union
Agency for Fundamental Rights/Council of Europe copyright, permission must be sought directly
from the copyright holders.
Neither the European Union Agency for Fundamental Rights/Council of Europe nor any person
acting on behalf of the European Union Agency for Fundamental Rights/Council of Europe is
responsible for the use that might be made of the following information.
This handbook was drafted in English. The Council of Europe (CoE) and the European Court of Human
Rights (ECtHR) take no responsibility for the quality of the translations into other languages. The
views expressed in this handbook do not bind the CoE and the ECtHR. The handbook refers to a
selection of commentaries and manuals. The CoE and ECtHR take no responsibility for their content,
nor does their inclusion on this list amount to any form of endorsement of these publications.
Further publications are listed on the internet pages of the ECtHR library at echr.coe.int.
The content of this handbook does not present an official position of the European Data Protection
Supervisor (EDPS) and does not bind the EDPS in the exercise of his competences. The EDPS takes
no responsibility for the quality of the translations into languages other than English.
European Data Protection Supervisor
Handbook on European
data protection law
2018 edition
Foreword
Our societies are becoming ever more digitised. The pace of technological develop-
ments and how personal data are being processed affects each of us every day and
in all sorts of ways in the light of these changes. Legal frameworks of the European
Union (EU) and the Council of Europe that safeguard the protection of privacy and
personal data have recently been reviewed.
Europe is at the forefront of data protection worldwide. The EU’s data protection
standards are based on Council of Europe Convention 108, EU instruments – includ-
ing the General Data Protection Regulation and the Data Protection Directive for
Police and Criminal Justice Authorities – as well as on the respective case law of the
European Court of Human Rights and of the Court of Justice of the European Union.
The data protection reforms carried out by the EU and the Council of Europe are
extensive and at times complex, with wide-ranging benefits and impact on individu-
als and businesses. This handbook aims to raise awareness and improve knowledge
of data protection rules, especially among non-specialist legal practitioners who
have to deal with data protection issues in their work.
The handbook has been prepared by the EU Agency for Fundamental Rights (FRA),
with the Council of Europe (together with the Registry of the European Court of
Human Rights) and the European Data Protection Supervisor. It updates a 2014 edi-
tion and is part of a series of legal handbooks co-produced by FRA and the Council
of Europe.
We express our thanks to the data protection authorities of Belgium, Estonia, France,
Georgia, Hungary, Ireland, Italy, Monaco, Switzerland and the United Kingdom for
their helpful feedback on the draft version of the handbook. In addition, we express
our appreciation to the European Commission’s Data Protection Unit and its Interna-
tional Data Flows and Protection Unit. We thank the Court of Justice of the European
Union for the documentary support provided during the preparatory works of this
handbook.
3
Contents
FOREWORD ....................................................................................................................................................................................................... 3
ABBREVIATIONS AND ACRONYMS ......................................................................................................................................... 9
HOW TO USE THIS HANDBOOK ............................................................................................................................................... 11
1 CONTEXT AND BACKGROUND OF EUROPEAN DATA PROTECTION LAW ....................... 15
1.1. The right to personal data protection ............................................................................................. 17
Key points ............................................................................................................................................................................................ 17
1.1.1. The right to respect for private life and the right to personal data
protection: a brief introduction ......................................................................................................... 18
1.1.2. International legal framework: United Nations ................................................................... 21
1.1.3. The European Convention on Human Rights ........................................................................ 22
1.1.4. Council of Europe Convention 108 ................................................................................................ 24
1.1.5. European Union data protection law ........................................................................................... 27
1.2. Limitations on the right to personal data protection ..................................................... 35
Key points ............................................................................................................................................................................................ 35
1.2.1. Requirements for justified interference under the ECHR ............................................ 37
1.2.2. Conditions for lawful limitations under the EU Charter of
Fundamental Rights ................................................................................................................................... 42
1.3. Interaction with other rights and legitimate interests ................................................... 52
Key points ............................................................................................................................................................................................ 52
1.3.1. Freedom of expression .......................................................................................................................... 54
1.3.2. Professional secrecy .................................................................................................................................. 69
1.3.3. Freedom of religion and belief .......................................................................................................... 72
1.3.4. Freedom of the arts and sciences .................................................................................................. 74
1.3.5. Protection of intellectual property ................................................................................................. 75
1.3.6. Data protection and economic interests ................................................................................... 78
5
2.3.1. Controllers and processors ................................................................................................................101
2.3.2. Recipients and third parties ..............................................................................................................110
2.4. Consent ...........................................................................................................................................................................111
Key points .........................................................................................................................................................................................111
3 KEY PRINCIPLES OF EUROPEAN DATA PROTECTION LAW ...........................................................115
3.1. The lawfulness, fairness and transparency of processing principles .........117
Key points .........................................................................................................................................................................................117
3.1.1. Lawfulness of processing ...................................................................................................................117
3.1.2. Fairness of processing ...........................................................................................................................118
3.1.3. Transparency of processing .............................................................................................................119
3.2. The principle of purpose limitation ..................................................................................................122
Key points .........................................................................................................................................................................................122
3.3. The data minimisation principle ..........................................................................................................125
Key points .........................................................................................................................................................................................125
3.4. The data accuracy principle .....................................................................................................................127
Key points .........................................................................................................................................................................................127
3.5. The storage limitation principle ...........................................................................................................129
Key points .........................................................................................................................................................................................129
3.6. The data security principle ........................................................................................................................131
Key points .........................................................................................................................................................................................131
3.7. The accountability principle .....................................................................................................................134
Key points .........................................................................................................................................................................................134
4 RULES OF EUROPEAN DATA PROTECTION LAW ......................................................................................139
4.1. Rules on lawful processing .......................................................................................................................141
Key points .........................................................................................................................................................................................141
4.1.1. Lawful grounds for processing data ..........................................................................................142
4.1.2. Processing special categories of data (sensitive data) ..............................................159
4.2. Rules on security of processing ...........................................................................................................165
Key points .........................................................................................................................................................................................165
4.2.1. Elements of data security ..................................................................................................................165
4.2.2. Confidentiality .............................................................................................................................................169
4.2.3. Personal data breach notifications .............................................................................................171
4.3. Rules on accountability and promoting compliance .....................................................174
Key points .........................................................................................................................................................................................174
4.3.1. Data Protection Officers ......................................................................................................................175
4.3.2. Records of processing activities ....................................................................................................178
4.3.3. Data protection impact assessment and prior consultation ..................................179
4.3.4. Codes of conduct .......................................................................................................................................181
4.3.5. Certification ....................................................................................................................................................183
4.4. Data protection by design and by default ..............................................................................183
6
5 INDEPENDENT SUPERVISION .......................................................................................................................................187
Key points .........................................................................................................................................................................................188
5.1. Independence .........................................................................................................................................................191
5.2. Competence and powers ...........................................................................................................................194
5.3. Cooperation ...............................................................................................................................................................197
5.4. The European Data Protection Board ............................................................................................199
5.5. The GDPR Consistency Mechanism ................................................................................................201
6 DATA SUBJECTS’ RIGHTS AND THEIR ENFORCEMENT .......................................................................203
6.1. The rights of data subjects ........................................................................................................................206
Key points .........................................................................................................................................................................................206
6.1.1. Right to be informed ..............................................................................................................................207
6.1.2. Right to rectification ...............................................................................................................................219
6.1.3. Right to erasure (‘the right to be forgotten’) .....................................................................221
6.1.4. Right to restriction of processing .................................................................................................227
6.1.5. Right to data portability .......................................................................................................................228
6.1.6. Right to object .............................................................................................................................................229
6.1.7. Automated individual decision-making, including profiling ...................................233
6.2. Remedies, liability, penalties and compensation .............................................................236
Key points .........................................................................................................................................................................................236
6.2.1. Right to lodge a complaint with a supervisory authority .........................................237
6.2.2. Right to an effective judicial remedy ........................................................................................238
6.2.3. Liability and the right to compensation ..................................................................................246
6.2.4. Sanctions .........................................................................................................................................................247
7
Key points .........................................................................................................................................................................................273
8.1.1. The police recommendation ............................................................................................................275
8.1.2. The Budapest Convention on Cybercrime ............................................................................279
8.2. EU law on data protection in police and criminal justice matters ...................280
Key points .........................................................................................................................................................................................280
8.2.1. The Data Protection Directive for Police and Criminal Justice Authorities ...281
8.3. Other specific legal instruments on data protection in law
enforcement matters ......................................................................................................................................291
8.3.1. Data protection in EU judicial and law enforcement agencies .............................300
8.3.2. Data protection in EU-level joint information systems .............................................308
FURTHER READING ............................................................................................................................................................................371
CASE LAW ....................................................................................................................................................................................................379
Selected case law of the European Court of Human Rights ......................................................379
Selected case law of the Court of Justice of the European Union .......................................385
INDEX ................................................................................................................................................................................................................391
8
Abbreviations and acronyms
BCR Binding corporate rule
CCTV Closed circuit television
CETS Council of Europe Treaty Series
Charter Charter of Fundamental Rights of the European Union
CIS Customs information system
CJEU Court of Justice of the European Union (prior to December 2009,
European Court of Justice, ECJ)
CoE Council of Europe
Convention 108 Convention for the Protection of Individuals with regard to Auto-
matic Processing of Personal Data (Council of Europe).
The amending Protocol (CETS No. 223) to Convention 108 was
adopted by the Committee of Ministers of the Council of Europe on
18 May 2018 on the occasion of its 128th session held in Elsinore,
Denmark. References to the ‘Modernised Convention 108’ refer to
the Convention as amended by Protocol CETS No. 223.
CRM Customer relations management
C-SIS Central Schengen Information System
DPO Data Protection Officer
DPA Data Protection Authority
EAW European Arrest Warrant
EDPB European Data Protection Board
EC European Community
ECHR European Convention on Human Rights
ECtHR European Court of Human Rights
EDPS European Data Protection Supervisor
EEA European Economic Area
EFSA European Food and Safety Authority
EFTA European Free Trade Association
ENISA European Network and Information Security Agency
9
ENU Europol National Unit
EPPO European Prosecutor’s Office
ESMA European Securities and Markets Authority
eTEN Trans-European Telecommunication Networks
EU European Union
EuroPriSe European Privacy Seal
eu-LISA EU Agency for Large-scale IT Systems
FRA European Union Agency for Fundamental Rights
GDPR General Data Protection Regulation
GPS Global positioning system
ICCPR International Covenant on Civil and Political Rights
ICT Information and communications technology
ISP Internet service provider
JSB Joint Supervisory Body
NGO Non-governmental organisation
N-SIS National Schengen Information System
OECD Organisation for Economic Co-operation and Development
OJ Official Journal
PIN Personal identification number
PNR Passenger name record
SCG Supervision Coordination Group
SEPA Single Euro Payments Area
SIS Schengen Information System
SWIFT Society for Worldwide Interbank Financial Telecommunication
TEU Treaty on European Union
TFEU Treaty on the Functioning of the European Union
UDHR Universal Declaration of Human Rights
UN United Nations
VIS Visa Information System
10
How to use this handbook
This handbook outlines the legal standards relating to data protection set by the
European Union (EU) and the Council of Europe (CoE). It is designed to assist practi-
tioners not specialised in the field of data protection, including lawyers, judges and
other legal practitioners, as well as individuals working for other bodies, such as
non-governmental organisations (NGOs), who may be confronted with legal ques-
tions relating to data protection.
The handbook serves as a first point of reference on relevant EU law and the
European Convention on Human Rights (ECHR), as well as the CoE Convention for
the Protection of Individuals with regard to Automatic Processing of Personal Data
(Convention 108) and other CoE instruments.
Each chapter begins with a table that identifies the legal provisions relevant to the
topics dealt with in the specific chapter. The tables cover both CoE and EU law, and
include selected case law of the European Court of Human Rights (ECtHR) and the
Court of Justice of the European Union (CJEU). The relevant laws of the two different
European orders, as they apply to the specific topics addressed, are then presented
in sequence. This allows the reader to see where the two legal systems converge
and where they differ. It should also help readers find the key information relating
to their situation, especially if they are subject only to CoE law. In some chapters,
where this helps the concise presentation of the content, the order of the topics in
the tables may differ slightly from that within the chapter itself. The handbook also
provides a brief overview of the United Nations framework.
Practitioners in non-EU states that are member states of the CoE and parties to
the ECHR and Convention 108 can access the information relevant to their own
country by going straight to the sections on the CoE. Practitioners in non-EU states
must also bear in mind that, since the adoption of the EU General Data Protection
Regulation, EU data protection rules apply to organisations and other entities that
are not established in the EU, if they process personal data and offer goods and ser-
vices to data subjects in the Union or monitor the behaviour of such data subjects.
11
Handbook on European data protection law
CoE law is presented through short references to selected ECtHR cases. These have
been chosen from the large number of ECtHR judgments and decisions that exist on
data protection issues.
Relevant EU law comprises legislative measures that have been adopted, relevant
provisions of the treaties and the Charter of Fundamental Rights of the European
Union, as interpreted in the case law of the CJEU. In addition, the handbook pre-
sents opinions and guidelines adopted by the Article 29 Working Party, the advi-
sory body tasked under the Data Protection Directive with providing expert advice
to EU Member States, and that will be superseded by the European Data Protection
Board (EDPB) from 25 May 2018 onwards. Opinions of the European Data Protection
Supervisor also provide important insights into the interpretation of EU law and so
are included in this handbook.
12
How to use this handbook
The handbook begins with a brief description of the role of the two legal systems as
established by the ECHR and EU law (Chapter 1). Chapters 2 to 10 cover the following
issues:
• independent supervision;
13
1
Context and background
of European data
protection law
EU Issues CoE
covered
The right to data protection
Treaty on the Functioning of the European ECHR, Article 8 (right to
Union, Article 16 respect for private and
Charter of Fundamental Rights of the family life, home and
European Union (the Charter), Article 8 correspondence)
(right to protection of personal data) Modernised Convention
Directive 95/46/EC on the protection of for the Protection
individuals with regard to the processing of of Individuals with
personal data and on the free movement regard to Automatic
of such data (Data Protection Directive), Processing of Personal
OJ 1995 L 281 (in effect until May 2018) Data (Modernised
Convention 108)
Council Framework Decision 2008/977/
JHA on the protection of personal data
processed in the context of police and
judicial cooperation in criminal matters,
OJ 2008 L 350 (in effect until May 2018)
Regulation (EU) 2016/679 on the protection
of natural persons with regard to the
processing of personal data and on the
free movement of such data, and repealing
Directive 95/46/EC (General Data Protection
Regulation), OJ 2016 L 119
Directive (EU) 2016/680 on the protection
of natural persons with regard to the
processing of personal data by competent
authorities for the purposes of the
prevention, investigation, detection or
prosecution of criminal offences or the
execution of criminal penalties, and on the
free movement of such data, and repealing
15
Handbook on European data protection law
EU Issues CoE
covered
Council Framework Decision 2008/977/
JHA (Data Protection for Police and Justice
Authorities), OJ 2016 L 119
Directive 2002/58/EC concerning the
processing of personal data and the
protection of privacy in the electronic
communications sector (Directive on
privacy and electronic communications),
OJ 2002 L 201
Regulation (EC) No. 45/2001 on the protection
of individuals with regard to the processing of
personal data by the Community institutions
and bodies and on the free movement of
such data (EU Institutions Data Protection
Regulation), OJ 2001 L 8
Limitations on the right to protection of personal data
The Charter, Article 52 (1)
General Data Protection Regulation,
Article 23 ECHR, Article 8 (2)
CJEU, Joined cases C-92/09 and C-93/09, Modernised Convention 108,
Volker und Markus Schecke GbR and Article 11
Hartmut Eifert v. Land Hessen [GC], 2010 ECtHR, S. and Marper
v. the United Kingdom [GC],
Nos. 30562/04 and
30566/04, 2008
Balancing rights
CJEU, Joined cases C-92/09 and C-93/09,
Volker und Markus Schecke GbR and In general
Hartmut Eifert v. Land Hessen [GC], 2010
CJEU, C-73/07, Tietosuojavaltuutettu Freedom of ECtHR, Axel Springer
v. Satakunnan Markkinapörssi Oy and expression AG v. Germany [GC],
Satamedia Oy [GC], 2008 No. 39954/08, 2012
CJEU, C-131/12, Google Spain SL, Google Inc. ECtHR, Mosley v.
v. Agencia Española de Protección de Datos the United Kingdom,
(AEPD), Mario Costeja González [GC], 2014 No. 48009/08, 2011
ECtHR, Bohlen v. Germany,
No. 53495/09, 2015
CJEU, C-28/08 P, European Commission v. Access to ECtHR, Magyar Helsinki
The Bavarian Lager Co. Ltd [GC], 2010 documents Bizottság v. Hungary [GC],
CJEU, C-615/13P, ClientEarth, PAN Europe v. No. 18030/11, 2016
EFSA, 2015
General Data Protection Regulation, Professional ECtHR, Pruteanu v.
Article 90 secrecy Romania, No. 30181/05,
2015
General Data Protection Regulation, Freedom of
Article 91 religion or
belief
16
Context and background of European data protection law
EU Issues CoE
covered
Freedom ECtHR, Vereinigung
of arts and bildender Künstler v.
sciences Austria, No. 68345/01,
2007
CJEU, C-275/06, Productores de Música de Protection
España (Promusicae) v. Telefónica de España of property
SAU [GC], 2008
CJEU, C-131/12, Google Spain SL, Google Inc. Economic
v. Agencia Española de Protección de Datos rights
(AEPD), Mario Costeja González [GC], 2014
CJEU, C-398/15, Camera di Commercio,
Industria, Artigianato e Agricoltura di Lecce
v. Salvatore Manni, 2017
• Under Article 8 of the ECHR, a person’s right to protection with respect to the process-
ing of personal data forms part of the right to respect for private and family life, home
and correspondence.
• CoE Convention 108 is the first and, to date, the only international legally binding
instrument dealing with data protection. The Convention underwent a modernisation
process, completed with the adoption of amending Protocol CETS No. 223.
• Under EU law, data protection was regulated for the first time by the Data Protection
Directive in 1995.
• Together with the General Data Protection Regulation, the EU adopted legislation on
the processing of personal data by state authorities for law enforcement purposes.
Directive (EU) 2017/680 establishes the data protection rules and principles that gov-
ern personal data processing for the purposes of preventing, investigating, detecting
and prosecuting criminal offences or executing criminal penalties.
17
Handbook on European data protection law
1.1.1. The right to respect for private life and the right
to personal data protection: a brief introduction
The right to respect for private life and the right to personal data protection,
although closely related, are distinct rights. The right to privacy – referred to in Euro-
pean law as the right to respect for private life – emerged in international human
rights law in the Universal Declaration of Human Rights (UDHR), adopted in 1948, as
one of the fundamental protected human rights. Soon after adoption of the UDHR,
Europe too affirmed this right – in the European Convention on Human Rights (ECHR),
a treaty that is legally binding on its Contracting Parties and that was drafted in
1950. The ECHR provides that everyone has the right to respect for his or her private
and family life, home and correspondence. Interference with this right by a public
authority is prohibited, except where the interference is in accordance with the law,
pursues important and legitimate public interests and is necessary in a democratic
society.
The UDHR and the ECHR were adopted well before the development of computers
and the internet and the rise of the information society. These developments have
brought considerable advantages to individuals and society, improving quality of life,
efficiency and productivity. At the same time, they present new risks to the right to
respect for private life. In response to the need for specific rules governing the col-
lection and use of personal information, a new concept of privacy emerged, known
in some jurisdictions as ‘informational privacy’ and in others as the ‘right to infor-
mational self-determination’.1 This concept led to the development of special legal
regulations that provide personal data protection.
Data protection in Europe began in the 1970s, with the adoption of legislation – by
some states – to control the processing of personal information by public authori-
ties and large companies.2 Data protection instruments were then established at
18
Context and background of European data protection law
European level3 and, over the years, data protection developed into a distinct value
that is not subsumed by the right to respect for private life. In the EU legal order, data
protection is recognised as a fundamental right, separate to the fundamental right
to respect for private life. This separation raises the question of the relationship and
differences between these two rights.
The right to respect for private life and the right to the protection of personal data
are closely related. Both strive to protect similar values, i.e. the autonomy and
human dignity of individuals, by granting them a personal sphere in which they can
freely develop their personalities, think and shape their opinions. They are thus an
essential prerequisite for the exercise of other fundamental freedoms, such as free-
dom of expression, freedom of peaceful assembly and association, and freedom of
religion.
The two rights differ in their formulation and scope. The right to respect for private
life consists of a general prohibition on interference, subject to some public inter-
est criteria that can justify interference in certain cases. The protection of personal
data is viewed as a modern and active right,4 putting in place a system of checks
and balances to protect individuals whenever their personal data are processed. The
processing must comply with the essential components of personal data protection,
namely independent supervision and the respect for the data subject’s rights.5
Article 8 of the EU Charter of Fundamental Rights (the Charter) not only affirms the
right to personal data protection, but also spells out the core values associated with
this right. It provides that the processing of personal data must be fair, for specified
purposes, and based on either the consent of the person concerned or a legitimate
basis laid down by law. Individuals must have the right to access their personal data
and to have it rectified, and compliance with this right must be subject to control by
an independent authority.
3 The Council of Europe Convention for the Protection of Individuals with regard to Automatic Processing
of Personal Data (Convention 108) was adopted in 1981. The EU adopted its first comprehensive data
protection instrument in 1995: Directive 95/46/EC on the protection of individuals with regard to the
processing of personal data and on the free movement of such data.
4 Advocate General Sharpston described the case as involving two separate rights: the “classic” right to
the protection of privacy and a more “modern” right, the right to data protection. See CJEU, Joined cases
C-92/09 and C-93/02, Volker und Markus Schecke GbR v. Land Hessen, Opinion of Advocate General
Sharpston, 17 June 2010, para. 71.
5 Hustinx, P., EDPS Speeches & Articles, EU Data Protection Law: the Review of Directive 95/46/EC and the
Proposed General Data Protection Regulation, July2013.
19
Handbook on European data protection law
The right to personal data protection comes into play whenever personal data are
processed; it is thus broader than the right to respect for private life. Any process-
ing operation of personal data is subject to appropriate protection. Data protection
concerns all kinds of personal data and data processing, irrespective of the relation-
ship and impact on privacy. Processing of personal data may also infringe on the
right to private life, as shown in the examples below. However, it is not necessary to
demonstrate an infringement on private life for data protection rules to be triggered.
The right to privacy concerns situations where a private interest, or the “private life”
of an individual, has been compromised. As demonstrated throughout this hand-
book, the concept of “private life” has been broadly interpreted in the case law, as
covering intimate situations, sensitive or confidential information, information that
could prejudice the perception of the public against an individual, and even aspects
of one’s professional life and public behaviour. However, the assessment of whether
or not there is, or has been, an interference with “private life” depends on the con-
text and facts of each case.
By contrast, any operation involving the processing of personal data could fall under
the scope of data protection rules and trigger the right to personal data protection.
For example, where an employer records information relating to the names of and
remuneration paid to employees, the mere recording of this information cannot be
regarded as an interference with private life. Such an interference could, however,
be argued if, for instance, the employer transferred the employees’ personal infor-
mation to third parties. Employers must in any case comply with data protection
rules because recording employees’ information constitutes data processing.
Example: In Digital Rights Ireland,6 the CJEU was called upon to decide on the
validity of Directive 2006/24/EC in light of the fundamental rights to personal
data protection and respect for private life, affirmed in the EU Charter of
Fundamental Rights. The directive required providers of publicly available
electronic communication services or public communication networks to
retain citizens’ telecommunication data for up to two years, to ensure that
the data were available for the purposes of preventing, investigating and
prosecuting serious crime. The measure only concerned metadata, location
data and data necessary to identify the subscriber or user. It did not apply
to the content of electronic communications.
6 CJEU, Joined cases C-293/12 and C-594/12, Digital Rights Ireland Ltd v. Minister for Communications,
Marine and Natural Resources and Others and Kärntner Landesregierung and Others [GC], 8 April 2014.
20
Context and background of European data protection law
The CJEU deemed the directive an interference with the fundamental right to
personal data protection “because it provides for the processing of personal
data”.7 In addition, it found that the directive interfered with the right to
respect of private life.8 When taken as a whole, the personal data retained
pursuant to the directive, which could be accessed by competent authorities,
could allow “very precise conclusions to be drawn concerning the private
lives of the persons whose data has been retained, such as the habits of
everyday life, permanent or temporary places of residence, daily or other
movements, the activities carried out, the social relationships of those
persons and the social environments frequented by them”.9 The interference
with the two rights was wide-ranging and particularly serious.
The CJEU declared Directive 2006/24/EC invalid, finding that even though it
pursued a legitimate aim, the interference with the rights to personal data
protection and private life was serious and not limited to what was strictly
necessary.
7 Ibid., para. 36.
8 Ibid., paras. 32-35.
9 Ibid., para. 27.
10 United Nations (UN), Universal Declaration of Human Rights (UDHR), 10 December 1948.
21
Handbook on European data protection law
Since 2013, the United Nations has adopted two resolutions on privacy issues enti-
tled “the right to privacy in the digital age”11 in response to the development of new
technologies and to revelations on mass surveillance undertaken in some states
(the Snowden revelations). They strongly condemn mass surveillance and highlight
the impact such surveillance can have on the fundamental rights to privacy and
freedom of expression, and on the functioning of a vibrant and democratic soci-
ety. Though not legally binding, they sparked an important international, high-level
political debate about privacy, new technologies and surveillance. They also led to
the establishment of a Special Rapporteur on the right to privacy, with a mandate
to promote and protect this right. The rapporteur’s specific tasks include gathering
information on national practices and experiences in relation to privacy and the chal-
lenges arising from new technologies, the exchange and promotion of best practice,
and identifying potential obstacles.
While earlier resolutions focused on the negative effects of mass surveillance and
the responsibility of states to constrain the powers of intelligence authorities, more
recent resolutions reflect a key development in the debate on privacy in the United
Nations.12 The resolutions adopted in 2016 and 2017 reaffirm the need to limit the
powers of intelligence agencies and condemn mass surveillance. However, they also
explicitly state that “the increasing capabilities of business enterprises to collect,
process and use personal data can pose a risk to the enjoyment of the right to pri-
vacy in the digital age”. Thus, in addition to the responsibility of state authorities, the
resolutions point to the private sector’s responsibility to respect human rights, and
call for companies to inform users about the collection, use, sharing and retention of
personal data and to establish transparent processing policies.
11 See UN, General Assembly, Resolution on the right to privacy in the digital age, A/RES/68/167, New
York, 18 December 2013; and UN, General Assembly, Revised draft resolution on the right to privacy in
the digital age, A/C.3/69/L.26/Rev.1, New York, 19 November 2014.
12 UN, General Assembly, Revised draft resolution on the right to privacy in the digital age, A/C.3/71/L.39/
Rev.1, New York, 16 November 2016; UN, Human Rights Council, The right to privacy in the digital age,
A/HRC/34/L.7/Rev.1, 22 March 2017.
22
Context and background of European data protection law
Contracting Parties have an international obligation to comply with the ECHR. All
CoE member states have now incorporated or given effect to the ECHR in their
national law, which requires them to act in accordance with the convention’s provi-
sions. Contracting Parties must respect the rights stipulated in the convention when
exercising any activity or power. This includes activities undertaken for national
security. Landmark judgments of the European Court of Human Rights (ECtHR) have
involved state activities in the sensitive areas of national security law and practice.13
The Court has not hesitated to affirm that surveillance activities constitute an inter-
ference with the respect for private life.14
To ensure that the Contracting Parties observe their obligations under the ECHR,
the ECtHR was set up in Strasbourg, France in 1959. The ECtHR ensures that states
observe their obligations under the Convention by considering complaints from
individuals, groups of individuals, NGOs or legal persons alleging violations of the
convention. The ECtHR can also examine inter-state cases brought by one or more
CoE member states against another member state.
The right to personal data protection forms part of the rights protected under
A rticle 8 of the ECHR, which guarantees the right to respect for private and
family life, home and correspondence, and lays down the conditions under which
restrictions of this right are permitted.15
The ECtHR has examined many situations involving data protection issues. These
include interception of communications,16 various forms of surveillance by both
the private and public sectors,17 and protection against storage of personal data
13 See, for example: ECtHR, Klass and Others v. Germany, No. 5029/71, 6 September 1978; ECtHR, Rotaru
v. Romania [GC], No. 28341/95, 4 May 2000 and ECtHR, Szabó and Vissy v. Hungary, No. 37138/14,
12 January 2016.
14 Ibid.
15 Council of Europe, European Convention on Human Rights, CETS No. 005, 1950.
16 See, for example: ECtHR, Malone v. the United Kingdom, No. 8691/79, 2 August 1984; ECtHR, Copland
v. the United Kingdom, No. 62617/00, 3 April 2007, or ECtHR, Mustafa Sezgin Tanrıkulu v. Turkey,
No. 27473/06, 18 July 2017.
17 See, for example: ECtHR, Klass and Others v. Germany, No. 5029/71, 6 September 1978; ECtHR, Uzun v.
Germany, No. 35623/05, 2 September 2010.
23
Handbook on European data protection law
by public authorities.18 The respect for private life is not an absolute right, as the
exercise of the right to privacy could compromise other rights, such as freedom of
expression and access to information and vice versa. Hence, the Court strives to find
a balance between the different rights at stake. It has clarified that Article 8 of the
ECHR not only obliges states to refrain from any actions that might violate this con-
vention right, but that they are in certain circumstances also under positive obliga-
tions to actively secure effective respect for private and family life.19 The appropriate
chapters describe many of these cases in detail.
Convention 108 applies to all data processing carried out by both the private and
public sectors, including data processing by the judiciary and law enforcement
authorities. It protects individuals against abuses that may accompany the pro-
cessing of personal data, and seeks, at the same time, to regulate the transborder
flows of personal data. As regards the processing of personal data, the principles
laid down in the convention concern, in particular, fair and lawful collection and
automatic processing of data, for specified legitimate purposes. This means that the
data should not be used for ends incompatible with these purposes and should be
kept for no longer than is necessary. They also concern the quality of the data, in
18 See, for example: ECtHR, Roman Zakharov v. Russia, No. 47143/06, 4 December 2015; ECtHR, Szabó
and Vissy v. Hungary, No. 37138/14, 12 January 2016.
19 See for example: ECtHR, I v. Finland, No. 20511/03, 17 July 2008; ECtHR, K.U. v. Finland, No. 2872/02,
2 December 2008.
20 Council of Europe, Committee of Ministers (1973), Resolution (73) 22 on the protection of the privacy of
individuals vis-à-vis electronic data banks in the private sector, 26 September 1973; Council of Europe,
Committee of Ministers (1974), Resolution (74) 29 on the protection of the privacy of individuals vis-à-
vis electronic data banks in the public sector, 20 September 1974.
21 Council of Europe, Convention for the Protection of Individuals with regard to Automatic Processing of
Personal Data, CETS No. 108, 1981.
24
Context and background of European data protection law
particular that they must be adequate, relevant and not excessive (proportionality),
as well as accurate.
The convention also enshrines the individual’s right to know that information
is stored on him or her and, if necessary, to have it corrected. Restrictions on the
rights laid down in the convention are possible only when overriding interests, such
as state security or defence, are at stake. In addition, the convention provides for
the free flow of personal data between its Contracting Parties and imposes some
restrictions on flows to states where legal regulation does not provide equivalent
protection.
It should be noted that Convention 108 is binding for states that have ratified it. It is
not subject to the judicial supervision of the ECtHR, but has been taken into consid-
eration in the case law of the ECtHR within the context of Article 8 of the ECHR. Over
the years, the Court has ruled that personal data protection is an important part of
the right to respect for private life (Article 8), and has been guided by the principles
of Convention 108 in determining whether or not there has been an interference
with this fundamental right.22
To further develop the general principles and rules laid down in Convention 108,
the CoE’s Committee of Ministers adopted several non-legally binding recommen-
dations. These recommendations have influenced the development of data protec-
tion law in Europe. For example, for years, the only instrument in Europe providing
guidance on the use of personal data in the police sector was the Police Recom-
mendation.23 The principles contained in the recommendation, such as the means
of retaining data files and the need to implement clear rules on the persons allowed
access to those files, were further developed and are reflected in the subsequent EU
legislation.24 More recent recommendations seek to address the challenges of the
25
Handbook on European data protection law
digital age – for instance, in relation to data processing in the context of employment
(see Chapter 9).
Convention 108 is open for accession by non-Contracting Parties of the CoE. The
Convention’s potential as a universal standard, together with its open character,
serve as a basis for promoting data protection at global level. To date, 51 countries
are parties to Convention 108. They include all member states of the Council of
Europe (47 countries); Uruguay, the first non-European country to accede in August
2013; and Mauritius, Senegal and Tunisia, which acceded in 2016 and 2017.
25 Council of Europe, Amendments to the Convention for the protection of individuals with regard to
automatic processing of Personal Data (ETS No. 108) adopted by the Committee of Ministers, in
Strasbourg, on 15 June 1999.
26 Council of Europe, Additional Protocol to the Convention for the protection of individuals with regard to
automatic processing of personal data, regarding supervisory authorities and transborder data flows,
CETS No. 181, 2001. With the modernisation of Convention 108, this Protocol is no longer applied as its
provisions have been updated and integrated into the Modernised Convention 108.
26
Context and background of European data protection law
the increased use of profiling in the online world, the convention also establishes the
right of the individual not to be subject to decisions solely based on automated pro-
cessing without having their own views taken into consideration. Effective enforce-
ment of data protection rules by independent supervisory authorities in the Con-
tracting Parties is considered central to the convention’s practical implementation. To
this end, the modernised convention underlines the need for supervisory authorities
to be vested with effective powers and functions and to enjoy genuine independ-
ence when fulfilling their mission.
The original treaties of the European Communities did not contain any reference to
human rights or their protection, given that the European Economic Community was
initially envisaged as a regional organisation focused on economic integration and
the establishment of a common market. A fundamental principle underpinning the
creation and development of the European Communities – and one which is equally
valid today – is the principle of conferral. According to this principle, the EU acts
only within the limits of the competences conferred upon it by the Member States,
as reflected in the EU treaties. In contrast to the Council of Europe, the EU treaties
include no explicit competence on fundamental rights matters.
As cases came before the CJEU alleging human rights violations in areas within the
scope of EU law, however, the CJEU provided an important interpretation of the
treaties. To grant protection to individuals, it brought fundamental rights into the
so-called general principles of European law. According to the CJEU, these general
principles reflect the content of human rights protection found in national constitu-
tions and human rights treaties, in particular the ECHR. The CJEU stated that it would
ensure compliance of EU law with these principles.
In recognising that its policies could have an impact on human rights and in an effort
to make citizens feel ‘closer’ to the EU, the EU in 2000 proclaimed the Charter of
27
Handbook on European data protection law
Originally only a political document, the Charter became legally binding27 as EU pri-
mary law (see Article 6 (1) of the TEU) when the Lisbon Treaty came into force on
1 December 2009.28 The provisions of the Charter are addressed to EU institutions and
bodies, obliging them to respect the rights listed therein while fulfilling their duties.
The Charter’s provisions also bind Member States when they implement EU law.
The Charter not only guarantees the respect for private and family life (Article 7),
but also establishes the right to the protection of personal data (Article 8). The
Charter explicitly raises the level of this protection to that of a fundamental right
in EU law. EU institutions and bodies must guarantee and respect this right, as do
Member States when implementing Union law (Article 51 of the Charter). Formu-
lated several years after the Data Protection Directive, Article 8 of the Charter must
be understood as embodying pre-existing EU data protection law. The Charter,
therefore, not only explicitly mentions a right to data protection in Article 8 (1), but
also refers to key data protection principles in Article 8 (2). Finally, Article 8 (3) of the
Charter requires an independent authority to control the implementation of these
principles.
The adoption of the Lisbon Treaty is a landmark in the development of data protec-
tion law, not only for elevating the Charter to the status of a binding legal document
at the level of primary law, but also for providing for the right to personal data protec-
tion. This right is specifically provided for in Article 16 of the TFEU, under the part of
the treaty dedicated to the general principles of the EU. Article 16 also creates a new
legal basis, granting the EU the competence to legislate on data protection matters.
This is an important development because EU data protection rules – notably the Data
Protection Directive – were initially based on the internal market legal basis, and on
the need to approximate national laws so that the free movement of data within the
EU was not inhibited. Article 16 of the TFEU now provides an independent legal basis
for a modern, comprehensive approach to data protection, which covers all matters
28
Context and background of European data protection law
From 1995 until May 2018, the principal EU legal instrument on data protection was
Directive 95/46/EC of the European Parliament and the Council of 24 October 1995
on the protection of individuals with regard to the processing of personal data and
on the free movement of such data (Data Protection Directive).29 It was adopted
in 1995, at a time when several Member States had already adopted national data
protection laws,30 and emerged from the need to harmonise these laws to ensure
a high level of protection and the free flow of personal data among the different
Member States. Free movement of goods, capital, services and people within the
internal market required the free flow of data, which could not be realised unless the
Member States could rely on a uniform high level of data protection.
The Data Protection Directive reflected the data protection principles already con-
tained in national laws and in Convention 108, while often expanding them. It drew
on the possibility, provided for in Article 11 of Convention 108, of adding on instru-
ments of protection. In particular, the introduction in the directive of independent
supervision as an instrument for improving compliance with data protection rules
proved to be an important contribution to the effective functioning of European data
protection law. Consequently, this feature was incorporated into CoE law in 2001 by
the Additional Protocol to Convention 108. This illustrates the close interaction and
positive influence of the two instruments upon one another over the years.
29 Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection
of individuals with regard to the processing of personal data and on the free movement of such data,
OJ 1995 L 281.
30 The German state of Hesse adopted the world’s first data protection law in 1970, which only applied to
that state. Sweden adopted the Datalagen in 1973; Germany adopted the Bundesdatenschutzgestez
in 1976; and France adopted the Loi relatif à l’informatique, aux fichiers et aux libertés in 1977. In the
United Kingdom, the Data Protection Act was adopted in 1984. Finally, the Netherlands adopted the Wet
Persoonregistraties in 1989.
29
Handbook on European data protection law
directives do not apply directly and must be transposed into the national laws of
the Member States. Inevitably, Member States have a margin of discretion in trans-
posing the directive’s provisions. Even though the directive was meant to provide
complete harmonisation31 (and a full level of protection), in practice it was trans-
posed differently in the Member States. This resulted in the establishment of diverse
data protection rules across the EU, with definitions and rules interpreted differently
in national laws. The levels of enforcement and the severity of sanctions also var-
ied across the Member States. Finally, there were significant changes in informa-
tion technology since the drafting of the directive in the mid-1990s. Taken together,
these reasons prompted the reform of EU data protection legislation.
The reform led to the adoption of the General Data Protection Regulation in
April 2016, after years of intense discussion. The debates on the need to modern-
ise EU data protection rules began in 2009, when the Commission launched a public
consultation about the future legal framework for the fundamental right to personal
data protection. The proposal for the regulation was published by the Commission
in January 2012, starting a long legislative process of negotiations between the
European Parliament and the Council of the EU. After adoption, the General Data Pro-
tection Regulation provided for a two year-transitional period. It became fully appli-
cable on 25 May 2018, when the Data Protection Directive was repealed.
The adoption of the General Data Protection Regulation in 2016 modernised EU data
protection legislation, making it fit for protecting fundamental rights in the context of
the digital age’s economic and social challenges. The GDPR preserves and develops the
core principles and rights of the data subject provided for in the Data Protection Direc-
tive. In addition, it introduced new obligations requiring organisations to implement
data protection by design and by default; to appoint a Data Protection Officer in certain
circumstances; to comply with a new right to data portability; and to comply with the
principle of accountability. Under EU law, regulations are directly applicable; there is no
need for national implementation. The General Data Protection Regulation thus pro-
vides for a single set of data protection rules across the EU. This creates consistent data
protection rules throughout the EU, establishing an environment of legal certainty from
which economic operators and individuals as “data subjects” may benefit.
However, even though the General Data Protection Regulation is directly applicable,
Member States are expected to update their existing national data protection laws
31 CJEU, Joined cases C-468/10 and C-469/10, Asociación Nacional de Establecimientos Financieros de
Crédito (ASNEF) and Federación de Comercio Electrónico y Marketing Directo (FECEMD) v. Administración
del Estado, 24 November 2011, para. 29.
30
Context and background of European data protection law
to fully align with the regulation, while also reflecting a margin of discretion for spe-
cific provisions in recital 10. The main rules and principles established in the regula-
tion, and the strong rights it affords to individuals, form a large part of the handbook
and are presented in the following chapters. The regulation has comprehensive rules
on territorial scope. It applies to businesses established in the EU, and also applies to
controllers and processors not established in the EU that offer goods or services to
data subjects in the EU or monitor their behaviour. As several overseas technology
businesses have a key share in the European market and millions of EU customers,
subjecting these organisations to EU data protection rules is important to ensure the
protection of individuals, as well as to ensure a level playing field.
The first EU legal instrument to regulate this matter was Council Framework
Decision 2008/977/JHA on the protection of personal data processed in the frame-
work of police and judicial cooperation in criminal matters. Its rules applied only to
police and judicial data when exchanged between Member States. Domestic process-
ing of personal data by law enforcement was excluded from its scope of application.
Directive 2016/680 on the protection of natural persons with regard to the pro-
cessing of personal data by competent authorities for the purposes of the preven-
tion, investigation, detection or prosecution of criminal offences or the execution
of criminal penalties, and on the free movement of such data,32 referred to as the
Data Protection Directive for Police and Criminal Justice Authorities, remedied this
situation. Adopted in parallel with the General Data Protection Regulation, the
32 Directive (EU) 2016/680 of the European Parliament and of the Council of 27 April 2016 on the
protection of natural persons with regard to the processing of personal data by competent authorities
for the purposes of the prevention, investigation, detection or prosecution of criminal offences or the
execution of criminal penalties, and on the free movement of such data, OJ L 119, 4 May 2016.
31
Handbook on European data protection law
To this end, the directive affirms the right to personal data protection and the core
principles that should cover data processing, closely following the rules and princi-
ples enshrined in the General Data Protection Regulation. The rights of individuals
and the obligations imposed on controllers – for example, in relation to data security,
data protection by design and by default, and data breach notifications – resemble
the rights and obligations in the General Data Protection Regulation. The directive
also takes into consideration, and tries to address, serious emerging technological
challenges that can have a particularly onerous impact on individuals, such as the
use of profiling techniques by law enforcement authorities. In principle, decisions
based solely on automated processing, including profiling, must be prohibited.33 In
addition, they must not be based on sensitive data. Such principles are subject to
certain exceptions provided in the directive. Additionally, such processing must not
result in discrimination against any person.34
The directive also contains rules to ensure the accountability of controllers. They
must designate a data protection officer to monitor compliance with the data
protection rules, to inform and advise the entity and employees carrying out the
processing of their obligations, and to cooperate with the supervisory authority.
33 Data Protection Directive for Police and Criminal Justice Authorities, Art. 11 (1).
34 Ibid., Art. 11 (2) and (3).
32
Context and background of European data protection law
Processing of personal data in the police and criminal justice sector is now subject to
the supervision of independent supervisory authorities. Both the general data pro-
tection legal regime and the special data protection regime for law enforcement and
criminal matters must equally comply with the requirements of the EU Charter of
Fundamental Rights.
The special regime for data processing in the context of police and judicial coop-
eration established by the Data Protection Directive for Police and Criminal Justice
Authorities is described in detail in Chapter 8.
The establishment of special data protection rules was also deemed necessary in
the sector of electronic communications. With the development of the internet, lan-
dline and mobile telephony, it was important to ensure that users’ rights to privacy
and confidentiality would be respected. Directive 2002/58/EC35 concerning the pro-
cessing of personal data and the protection of privacy in electronic communications
(Directive on privacy and electronic communications or e-Privacy Directive) sets out
rules on the security of personal data in these networks, the notification of personal
data breaches, and the confidentiality of communications.
35 Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the
processing of personal data and the protection of privacy in the electronic communications, OJ L 201
(Directive on privacy and electronic communications or e-Privacy Directive).
36 Directive on privacy and electronic communications, Art. 4 (1).
37 Ibid., Art. 4 (2).
38 Ibid., Art. 4 (3).
33
Handbook on European data protection law
As the Data Protection Directive could apply only to EU Member States, an additional
legal instrument was needed to establish data protection for the processing of per-
sonal data by EU institutions and bodies. Regulation (EC) No. 45/2001 on the protec-
tion of individuals with regard to the processing of personal data by the institutions
and bodies of the Community and on the free movement of such data (EU Institu-
tions Data Protection Regulation) fulfils this task.39
Regulation No. 45/2001 closely follows the principles of the general EU data pro-
tection regime, and applies those principles to data processing carried out by EU
39 Regulation (EC) No. 45/2001 of the European Parliament and of the Council of 18 December 2000 on
the protection of individuals with regard to the processing of personal data by the institutions and bodies
of the Community and on the free movement of such data, OJ 2001 L 8.
34
Context and background of European data protection law
The CJEU has jurisdiction in determining whether or not a Member State has fulfilled
its obligations under EU data protection law, and in interpreting EU legislation to
ensure its effective and uniform application throughout the Member States. Since
adoption of the Data Protection Directive in 1995, a considerable body of case law
has accumulated, clarifying the scope and meaning of the data protection principles
and the fundamental right to personal data protection as enshrined in Article 8 of
the Charter. Even though the directive has been repealed and a new legal instru-
ment – the General Data Protection Regulation – is now in force, that pre-existing
case law remains relevant and valid for the interpretation and application of EU data
protection principles, to the extent that the core principles and concepts of the Data
Protection Directive were kept in the GDPR.
• The right to personal data protection is not an absolute right; it may be limited if nec-
essary for an objective of general interest or to protect the rights and freedoms of
others.
35
Handbook on European data protection law
• The conditions for limiting the rights to respect for private life and to personal data
protection are listed in Article 8 of the ECHR and Article 52 (1) of the Charter. They have
been developed and interpreted through the case law of the ECtHR and the CJEU.
• Under CoE data protection law, processing personal data constitutes lawful interfer-
ence with the right to respect for private life and can only be carried out if it:
• The EU legal order places similar conditions on limitations on the exercise of the funda-
mental rights protected by the Charter. Any limitation to any fundamental right, includ-
ing to personal data protection, can be lawful only if it:
• pursues an objective of general interest recognised by the EU, or the need to pro-
tect the rights of others.
The fundamental right to personal data protection under Article 8 of the Charter is
not an absolute right, “but must be considered in relation to its function in society”.40
Article 52 (1) of the Charter thus recognises that limitations may be imposed on the
exercise of rights such as those set forth in Articles 7 and 8 of the Charter, as long
as those limitations are provided for by law, respect the essence of those rights and
freedoms and, subject to the principle of proportionality, are necessary and genu-
inely meet objectives of general interest recognised by the EU or the need to protect
the rights and freedoms of others.41 Similarly, in the ECHR system, data protection is
guaranteed by Article 8, and the exercise of that right may be limited where neces-
sary to pursue a legitimate purpose. This section refers to the conditions for inter-
ference under the ECHR, as interpreted by the case law of the ECtHR, as well as the
conditions for lawful limitations under Article 52 of the Charter.
40 See, for example, CJEU, Joined cases C-92/09 and C-93/09, Volker und Markus Schecke GbR and
Hartmut Eifert v. Land Hessen [GC], 9 November 2010, para. 48.
41 Ibid., para. 50.
36
Context and background of European data protection law
Where the ECtHR considers that the processing operation at stake affects the indi-
viduals’ right to respect for private life, it will examine whether the interference is
justified. The right to respect for private life is not an absolute right, but must be bal-
anced against, and reconciled with, other legitimate interests and rights, be they of
other persons (private interests) or of society as a whole (public interests).
According to the case law of the ECtHR, an interference is in accordance with the law
if it is based on a provision of domestic law that has certain qualities. The law must
be “accessible to the persons concerned and foreseeable as to its effects”.43 A rule
is foreseeable “if it is formulated with sufficient precision to enable any individual –
if need be with appropriate advice – to regulate his conduct”.44 Furthermore, “[t]he
42 ECtHR, S. and Marper v. the United Kingdom [GC], Nos. 30562/04 and 30566/04, 8 December 2008,
para. 67.
43 ECtHR, Amann v. Switzerland [GC], No. 27798/95, 16 February 2000, para. 50; see also ECtHR, Kopp
v. Switzerland, No. 23224/94, 25 March 1998, para. 55 and ECtHR, Iordachi and Others v. Moldova,
No. 25198/02, 10 February 2009, para. 50.
44 ECtHR, Amann v. Switzerland [GC], No. 27798/95, 16 February 2000, para. 56; see also ECtHR, Malone v.
the United Kingdom, No. 8691/79, 2 August 1984, para. 66; ECtHR, Silver and Others v. the United
Kingdom, Nos. 5947/72, 6205/73, 7052/75, 7061/75, 7107/75, 7113/75, 25 March 1983, para. 88.
37
Handbook on European data protection law
degree of precision required of ‘the law’ in this connection will depend on the par-
ticular subject-matter”.45
In Taylor-Sabori v. the United Kingdom,47 the applicant had been the target
of police surveillance. Using a ‘clone’ of the applicant’s pager, the police
were able to intercept messages sent to him. The applicant was arrested
and charged with conspiracy to supply a controlled drug. Part of the
prosecution’s case against him consisted of the contemporaneous written
notes of the pager messages, which the police had transcribed. However,
at the time of the applicant’s trial, there was no provision in British law
governing the interception of communications transmitted via a private
telecommunications system. The interference with his rights had therefore
not been “in accordance with the law”. The ECtHR concluded that this violated
Article 8 of the ECHR.
45 ECtHR, The Sunday Times v. the United Kingdom, No. 6538/74, 26 April 1979, para. 49; see also ECtHR,
Silver and Others v. the United Kingdom, Nos. 5947/72, 6205/73, 7052/75, 7061/75, 7107/75,
7113/75, 25 March 1983, para. 88.
46 ECtHR, Rotaru v. Romania [GC], No. 28341/95, 4 May 2000, para. 57; see also ECtHR, Association for
European Integration and Human Rights and Ekimdzhiev v. Bulgaria, No. 62540/00, 28 June 2007;
ECtHR, Shimovolos v. Russia, No. 30194/09, 21 June 2011; and ECtHR, Vetter v. France, No. 59842/00,
31 May 2005.
47 ECtHR, Taylor-Sabori v. the United Kingdom, No. 47114/99, 22 October 2002.
38
Context and background of European data protection law
The legitimate aim may be either one of the named public interests or protection
of the rights and freedoms of others. Legitimate aims that could justify an interfer-
ence are, pursuant to Article 8 (2) of the ECHR, the interests of national security,
public safety or the economic well-being of a country, the prevention of disorder or
crime, the protection of health or morals, and the protection of rights and freedoms
of other persons.
39
Handbook on European data protection law
The ECtHR has stated that “the notion of necessity implies that the interference
corresponds to a pressing social need and, in particular, that it is proportionate to
the legitimate aim pursued”.50 When assessing whether a measure is necessary to
address a pressing social need, the ECtHR examines its relevance and suitability in
relation to the pursued aim. To this end, it may take into consideration whether the
interference tries to address an issue which, if not addressed, could have a detri-
mental effect on society, whether there is evidence that the interference may miti-
gate such detrimental effect, and what the broader societal views on the issue at
stake are. 51 For instance, the collection and storing of personal data by security ser-
vices of particular individuals found to have links with terrorist movements would
be an interference with the individuals’ right to respect for private life, which nev-
ertheless serves a serious, pressing social need: national security and the fight
against terrorism. To meet the necessity test, the interference will also have to be
proportionate. In the case law of the ECtHR, proportionality is addressed within the
concept of necessity. Proportionality requires that an interference with the rights
protected under the ECHR should not go any further than what is needed to fulfil the
legitimate aim pursued. Important factors to take into account when performing the
proportionality test is the scope of the interference, notably the number of persons
affected, and the safeguards or caveats put in place to limit its scope or detrimental
effects on the rights of individuals.52
40
Context and background of European data protection law
Given the wealth of genetic and health information contained in the cellular
samples, the interference with the applicants’ right to private life was
particularly intrusive. Fingerprints and samples could be taken from arrested
persons, and retained indefinitely in the police database, irrespective of the
nature and gravity of the offence, and even for minor offences not punishable
54 ECtHR, S. and Marper v. the United Kingdom [GC], Nos. 30562/04 and 30566/04, 4 December 2008.
55 Ibid., para. 119.
41
Handbook on European data protection law
Example: In Leander v. Sweden,57 the ECtHR ruled that the secret scrutiny
of people applying for employment in posts of importance for national
security was not, in itself, contrary to the requirement of being necessary
in a democratic society. The special safeguards laid down in national law
for protecting the interests of the data subject – for example, controls
exercised by parliament and the Chancellor of Justice – resulted in the
ECtHR’s conclusion that the Swedish personnel control system met the
requirements of Article 8 (2) of the ECHR. Having regard to the wide margin
of appreciation available to it, the respondent state was entitled to consider
that in the applicant’s case the interests of national security prevailed over
the individual ones. The Court concluded that there had not been a violation
of Article 8 of the ECHR.
56 Ibid., para. 124.
57 ECtHR, Leander v. Sweden, No. 9248/81, 26 March 1987, paras. 59 and 67.
42
Context and background of European data protection law
• meet objectives of general interest recognised by the Union or the need to pro-
tect the rights and freedoms of others.
Limitations on the right to personal data protection must be provided for by law.
This requirement implies that limitations must be based on a legal basis that is ade-
quately accessible and foreseeable and formulated with sufficient precision to ena-
ble individuals to understand their obligations and regulate their conduct. The legal
basis must also clearly define the scope and manner of the exercise of the power by
the competent authorities to protect individuals against arbitrary interference. This
interpretation resembles the requirement for “lawful interference” under the ECtHR
case law,59 and it has been argued that the meaning of the expression “provided for
by law” used in the Charter should be the same as that ascribed to it in connection
with the ECHR.60 The case law of the ECtHR, and especially the concept of “quality
of the law” it has developed throughout the years, is a relevant consideration to be
taken into account by the CJEU when interpreting the scope of Article 52 (1) of the
Charter.61
58 On assessing the necessity of measures limiting the fundamental right to the protection of personal
data, see: EDPS (2017), Necessity Toolkit, Brussels, 11 April 2017.
59 EDPS (2017), Necessity Toolkit, Brussels, 11 April 2017, p. 4; see also CJEU, Opinion 1/15 of the Court
(Grand Chamber), 26 July 2017.
60 CJEU, Joined cases C-203/15 and C-698/15, Tele2 Sverige AB v. Post- och telestyrelsen and Secretary of
State for the Home Department v. Tom Watson, Peter Brice, Geoffrey Lewis, Opinion of Advocate General
Saugmandsgaard Øe, delivered on 19 July 2016, para. 140.
61 CJEU, C-70/10, Scarlet Extended SA v. Société belge des auteurs compositeurs et éditeurs (SABAM),
Opinion of Advocate General Cruz Villalón, delivered on 14 April 2011, para. 100.
43
Handbook on European data protection law
In the EU legal order, any limitation on the fundamental rights protected under the
Charter must respect the essence of those rights. This means that limitations that
are so extensive and intrusive so as to devoid a fundamental right of its basic con-
tent cannot be justified. If the essence of the right is compromised, the limitation
must be considered unlawful, without a need to further assess whether it serves an
objective of general interest and satisfies the necessity and proportionality criteria.
44
Context and background of European data protection law
Moreover, the CJEU observed that “legislation not providing for any possibility
for an individual to pursue legal remedies in order to have access to personal
data relating to him, or to obtain the rectification or erasure of such data”
is incompatible with the fundamental right to effective judicial protection
(Article 47 of the Charter). Thus, the Safe Harbour Decision failed to ensure
a level of fundamental rights protection by the US essentially equivalent to
that guaranteed within the EU under the directive read in the light of the
Charter. The CJEU consequently invalidated the decision.63
63 The CJEU decision to invalidate Commission Decision 520/2000/EC was also based on other grounds
that will be examined in other sections of this handbook. Notably, the CJEU considered that the decision
unlawfully restricted the powers of national data protection supervisory authorities. In addition, under
the Safe Harbour regime, there were no judicial remedies available for individuals in case they wished to
access the personal data concerning them and/or obtain their rectification or deletion. Thus, the essence
of the fundamental right to effective judicial protection, enshrined in Article 47 of the Charter, was also
compromised.
64 CJEU, Joined cases C-293/12 and C-594/12, Digital Rights Ireland Ltd v. Minister for Communications,
Marine and Natural Resources and Others and Kärntner Landesregierung and Others [GC], 8 April 2014.
45
Handbook on European data protection law
A limitation may be necessary if there is a need to adopt measures for the public
interest objective pursued – but necessity, as interpreted by the CJEU, also implies
that the measures adopted must be less intrusive compared to other options for
achieving the same goal. For limitations on the rights to respect for private life and
protection of personal data, the CJEU applies a strict necessity test, holding that “der-
ogations and limitations must apply only in so far as strictly necessary”. If a limita-
tion is deemed to be strictly necessary, there is also a need to assess whether it is
proportionate.
Proportionality means that the advantages resulting from the limitation should
outweigh the disadvantages the latter causes on the exercise of the fundamental
rights at stake.65 To reduce disadvantages and risks to the enjoyment of the rights
to privacy and data protection, it is important that limitations contain appropriate
safeguards.
46
Context and background of European data protection law
Example: In Digital Rights Ireland,68 the CJEU held that the interference
with the right to privacy caused by the Data Retention Directive did not
compromise the essence of that right as it prohibited retention of the content
of electronic communications. However, it concluded that the directive was
incompatible with Article 7 and 8 of the Charter, and declared it invalid.
Because traffic and location data, aggregated and taken as a whole, could
be analysed and depict a detailed picture of individuals’ private lives, it
constituted a serious interference with these rights. The CJEU took into
consideration that the directive required the retention of all metadata
concerning fixed telephony, mobile telephony, internet access, internet email
and internet telephony, applying to all means of electronic communication –
the use of which is very widespread in people’s everyday lives. Practically,
it constituted an interference that affected the entire European population.
Considering the extent and seriousness of this interference, traffic and
location data retention could, according to the CJEU, be justified only for the
purpose of fighting serious crime. In addition, the directive did not lay down
any objective criteria that would ensure that access of the competent national
authorities to the retained data is limited to what is strictly necessary.
66 CJEU, Joined cases C-92/09 and C-93/09, Volker und Markus Schecke GbR and Hartmut Eifert v. Land
Hessen [GC], 9 November 2010, paras. 89 and 86.
67 Council Regulation (EC) No. 1290/2005 of 21 June 2005 on the financing of the common agricultural
policy, OJ 2005 L 209; Commission Regulation (EC) No. 259/2008 of 18 March 2008 laying down
detailed rules for the application of Council Regulation (EC) No. 1290/2005 as regards the publication
of information on the beneficiaries of funds deriving from the European Agricultural Guarantee Fund
(EAGF) and the European Agricultural Fund for Rural Development (EAFRD), OJ 2008 L 76.
68 CJEU, Joined Cases C-293/12 and C-594/12, Digital Rights Ireland Ltd v. Minister for Communications,
Marine and Natural Resources and Others and Kärntner Landesregierung and Others [GC], 8 April 2014,
para. 39.
47
Handbook on European data protection law
The CJEU came to a similar conclusion in the joined cases Tele2 Sverige
AB v. Post- och telestryrelsen and Secretary of State for the Home Department
v. Tom Watson and Others.69 These concerned the retention of traffic and
location data of “all subscribers and registered users and all means of
electronic communication as well as metadata” without “differentiation,
limitation or exception according to the objective pursued”.70 In the case at
hand, whether or not a person was linked, directly or indirectly, to serious
criminal offences, or whether or not his or her communications were relevant
for national security, was not a condition to have their data retained. In view
of the absence of either a required link between the retained data and a
threat to public security or time period or geographical area restrictions,
the CJEU concluded that the national legislation exceeded the limits of what
was strictly necessary for the purpose of fighting against serious crime.71
To be justified, any limitation on the exercise of the rights recognised by the Charter
must also genuinely meet objectives of general interest recognised by the Union
or the need to protect the rights and freedoms of other persons. Concerning the
need to protect the rights and freedoms of others, the right to protection of per-
sonal data often interacts with other fundamental rights. Section 1.3 provides a
detailed analysis of such interactions. As to objectives of general interest, these
69 CJEU, Joined cases C-203/15 and C-698/15, Tele2 Sverige AB v. Post- och telestryrelsen and Secretary of
State for the Home Department v. Tom Watson and Others [GC], 21 December 2016, para. 105–106.
70 Ibid., para. 105.
71 Ibid., para. 107.
72 EDPS (2017), Necessity Toolkit, Brussels, 11 April 2017.
48
Context and background of European data protection law
include the general objectives of the EU affirmed in Article 3 of the Treaty on the
European Union (TEU), such as the promotion of peace and of the well-being of its
peoples, social justice and protection and the establishment of an area of freedom,
security and justice in which free movement of persons is ensured, in conjunction
with appropriate measures to prevent and combat crime, as well as other objectives
and interests protected by specific provisions of the treaties.73 The General Data
Protection Regulation further specifies Article 52 (1) of the Charter in this regard:
Article 23 (1) of the regulation lists a series of objectives of general interest con-
sidered legitimate for limiting the rights of individuals, provided that the limitation
respects the essence of the right to personal data protection and is necessary and
proportionate. National security and defence, crime prevention, the protection of
important economic and financial interests of the EU or Member States, public health
and social security are among the public interest aims mentioned therein.
73 Explanations relating to the Charter of Fundamental Rights (2007/C 303/02), OJ 2007 No. C 303, pp.
17–35.
74 EDPS (2017), Necessity Toolkit, Brussels, 11 April 2017, p. 4.
75 CJEU, C-291/12, Michael Schwarz v. Stadt Bochum, 17 October 2013.
76 Ibid., paras. 33–36.
49
Handbook on European data protection law
The CJEU pointed out that fingerprints constitute personal data, as they
objectively contain unique information about individuals that allows them to
be identified with precision, while taking and storing fingerprints constitute
processing. The latter processing, which is governed by Article 1 (2) of
Regulation No. 2252/2004, constitutes a threat to the rights to respect for
private life and personal data protection.77 However, Article 52 (1) of the
Charter allows for limitations on the exercise of those rights, so long as
these limitations are provided for by law, respect the essence of those rights
and, in accordance with the principle of proportionality, are necessary and
genuinely meet objectives of general interest recognised by the Union or
the need to protect the rights and freedoms of others.
In the present case, the CJEU first noted that the limitation arising from
the taking and storing of fingerprints when issuing passports must be
considered to be provided for by law since those operations are provided
for by Article 1 (2) of Regulation No. 2252/2004. Second, the latter regulation
was designed to prevent the falsification of passports and their fraudulent
use. Thus, Article 1 (2) is in place to prevent, among others, illegal entry into
the EU, and so pursues an objective of general interest recognised by the
Union. Third, it was not apparent from the evidence available to the CJEU,
nor had it been claimed, that the limitations placed on the exercise of these
rights in the present case did not respect the essence of those rights. Fourth,
the storage of fingerprints on a highly secure storage medium as provided
for by that provision requires sophisticated technology. Such storage is likely
to reduce the risk of passports being falsified and to facilitate the work of
the authorities responsible for checking the authenticity of passports at
EU borders. The fact that the method is not wholly reliable is not decisive.
Although the method does not prevent all unauthorised persons from being
accepted, it is enough that it significantly reduces the likelihood of such
acceptance. In light of the foregoing, the CJEU found that the taking and
storing of fingerprints referred to in Article 1 (2) of Regulation No. 2252/2004
were appropriate for attaining the aims pursued by that regulation and, by
extension, the objective of preventing illegal entry to the EU.78
The CJEU next assessed whether such processing is necessary, noting that
the action at issue involved no more than the taking of prints of two fingers,
77 Ibid., paras. 27–30.
78 Ibid., paras. 35–45.
50
Context and background of European data protection law
Despite involving different wording, conditions for lawful limitations on the rights in
Article 52 (1) of the Charter are reminiscent of Article 8 (2) of the ECHR concerning
the right to respect for private life. In their case law, the CJEU and the ECtHR often
refer to each other’s judgments, as part of the constant dialogue between the two
courts to seek a harmonious interpretation of data protection rules. Article 52 (3) of
51
Handbook on European data protection law
the Charter states that, “in so far as this Charter contains rights which correspond to
rights guaranteed by the Convention for the Protection of Human Rights and Fun-
damental Freedoms, the meaning and scope of those rights shall be the same as
those laid down by the said Convention”. However, Article 8 of the Charter does not
directly correspond to an article in the ECHR.81 Article 52 (3) of the Charter concerns
the content and scope of the rights protected by each legal order, rather than the
conditions for their limitation. However, in view of the wider context of dialogue and
cooperation between the two courts, the CJEU may take into account in its analyses
the criteria for lawful limitation under Article 8 of the ECHR, as interpreted by the
ECtHR. The opposite scenario, by which the ECtHR may refer to the conditions for
lawful limitation under the Charter, is also possible. In any case, it should also be
taken into account that there is no perfect equivalent of Article 8 of the Charter in
the ECHR that refers to the protection of personal data, and notably to the rights of
the data subject, the legitimate grounds for processing and the supervision by an
independent authority. Some components of Article 8 of the Charter can be founded
in the ECtHR case law developed under Article 8 of the ECHR and relating to Conven-
tion 108.82 This link ensures the existence of mutual inspiration between the CJEU
and the ECtHR on matters related to data protection.
• The right to data protection often interacts with other rights, such as freedom of
expression and the right to receive and impart information.
• This interaction is often ambivalent: while there are situations where the right to per-
sonal data protection is in tension with a specific right, there are also situations where
the right to personal data protection effectively ensures the respect of the same spe-
cific right. For instance, this is the case for freedom of expression, given that profes-
sional secrecy is a component of the right to respect for private life.
• The need to protect the rights and freedoms of others is one of the criteria used to
assess the lawful limitation of the right to personal data protection.
52
Context and background of European data protection law
• When different rights are at stake, courts must carry out a balancing exercise to rec-
oncile them.
• The General Data Protection Regulation requires Member States to reconcile the right
to personal data protection with freedom of expression and information.
• Member States may also adopt specific rules in national law to reconcile the right to
personal data protection with public access to official documents and obligations of
professional secrecy.
The right to personal data protection is not an absolute right; the conditions for the
lawful limitation of this right have been detailed above. One of the criteria for lawful
limitations on rights, recognised both under CoE and EU law, is that the interference
with data protection is necessary for the protection of the rights and freedoms of
others. Where data protection interacts with other rights, both the ECtHR and the
CJEU have repeatedly stated that a balancing exercise with other rights is necessary
when applying and interpreting Article 8 of the ECHR and Article 8 of the Charter.83
Several important examples will illustrate how this balance is reached.
In addition to the balancing exercise carried out by these courts, states may, if nec-
essary, adopt legislation to reconcile the right to personal data protection with other
rights. For this reason, the General Data Protection Regulation provides a number of
areas of national derogation.
With respect to freedom of expression, the GDPR requires Member States to recon-
cile, by law, “the right to the protection of personal data pursuant to this Regulation
with the right to freedom of expression and information, including processing for
journalistic purposes and the purposes of academic, artistic or literary expression”.84
Member States can also adopt laws to reconcile data protection with public access to
official documents and obligations of professional secrecy protected as a form of the
right to respect for private life.85
83 ECtHR, Von Hannover v. Germany (No. 2) [GC], Nos. 40660/08 and 60641/08, 7 February 2012; CJEU,
Joined cases C-468/10 and C-469/10, Asociación Nacional de Establecimientos Financieros de Crédito
(ASNEF) and Federación de Comercio Electrónico y Marketing Directo (FECEMD) v. Administración del
Estado, 24 November 2011, para. 48; CJEU, C-275/06, Productores de Música de España (Promusicae) v.
Telefónica de España SAU [GC], 29 January 2008, para. 68.
84 General Data Protection Regulation, Art. 85.
85 Ibid., Art. 86 and 90.
53
Handbook on European data protection law
Limitations on the freedom of expression must comply with the criteria provided for
in Article 52 (1) of the Charter, described above. Additionally, Article 11 corresponds
to Article 10 of the ECHR. Pursuant to Article 52 (3) of the Charter, insofar as it con-
tains rights that correspond to rights guaranteed by the ECHR, “the meaning and
scope of those rights shall be the same as those laid down by the said Convention”.
The limitations that may lawfully be imposed on the right guaranteed by Article 11
of the Charter may therefore not exceed those provided for in Article 10 (2) of the
ECHR – that is to say, they must be prescribed by law and be necessary in a demo-
cratic society “for the protection [...] of the reputation or rights of others”. Such rights
encompass, notably, the right to respect for private life and the right to personal
data protection.
The relationship between the protection of personal data and freedom of expres-
sion is governed by Article 85 of the General Data Protection Regulation, entitled
“Processing and freedom of expression and information”. According to this article,
Member States shall reconcile the right to personal data protection with the right to
freedom of expression and information. In particular, exemptions and derogations
from specific chapters of the General Data Protection Regulation shall be made for
journalistic purposes or the purpose of academic, artistic or literary expression, inso-
far as they are necessary to reconcile the right to personal data protection with the
freedom of expression and information.
54
Context and background of European data protection law
The same case was also examined by the ECtHR, after the national court
decided, based on the guidance from the CJEU, that the supervisory authority’s
order to discontinue publication of all tax information was a justified interference
with the company’s freedom of expression. The ECtHR upheld this approach.88 It
found that, even though there was an interference with the companies’ right to
87 The case concerned the interpretation of the Data Protection Directive, Art. 9 – now replaced by Art. 85
of the General Data Protection Regulation – which read: “Member States shall provide for exemptions or
derogations from the provisions of this Chapter, Chapter IV and Chapter VI for the processing of personal
data carried out solely for journalistic purposes or the purpose of artistic or literary expression only if
they are necessary to reconcile the right to privacy with the rules governing freedom of expression”.
88 ECtHR, Satakunnan Markkinapörssi Oy and Satamedia Oy v. Finland, No. 931/13, 27 June 2017.
55
Handbook on European data protection law
impart information, the interference was in accordance with the law, pursued
a legitimate aim and was necessary in a democratic society.
The Court recalled the case law criteria that should guide national authorities,
and the ECtHR itself, when balancing freedom of expression with the right
to respect for private life. Where political speech or a debate on a matter of
public interest are at stake, there is little scope for restriction of the right to
receive and impart information as the public has a right to be informed, “and
this is an essential right in a democratic society”.89 However, press articles
aiming solely to satisfy the curiosity of a particular readership regarding
details of a person’s private life cannot be deemed to contribute to a debate
of public interest. The derogation from data protection rules for journalistic
purposes is intended to allow journalists to access, collect and process data to
be able to perform their journalistic activities. Thus, there was indeed a public
interest in providing access to, and allowing the applicant companies to collect
and process, the large amounts of taxation data at stake. By contrast, the
Court found that there was no public interest in the bulk dissemination of such
raw data by the newspapers, in unaltered form and without any analytical
input. The information on taxation might have enabled curious members of
the public to categorise individuals according to their economic status and
satisfy the public’s thirst for information about the private lives of others. This
could not be regarded as contributing to a debate of public interest.
Example: In Google Spain,90 the CJEU considered whether Google was obliged
to delete outdated information about the applicant’s financial difficulties
from its search list results. When a search was undertaken on the Google
search engine using the applicant’s name, the results of the search provided
links to old newspaper articles mentioning his connection with bankruptcy
proceedings. The applicant considered this an infringement on his rights
to respect for private life and for the protection of personal data, as the
proceedings had been concluded years ago, making such references irrelevant.
The CJEU first clarified that internet search engines and search results
providing personal data can establish a detailed profile of an individual. In
light of an increasingly digitised society, the requirement for personal data
89 Ibid., para. 169.
90 CJEU, C-131/12, Google Spain SL, Google Inc. v. Agencia Española de Protección de Datos (AEPD), Mario
Costeja González [GC], 13 May 2014, paras. 81–83.
56
Context and background of European data protection law
On examining whether Google was required to remove the links related to the
applicant, the CJEU held that, under certain conditions, individuals have the
right to obtain erasure of their personal data from an internet search engine’s
search results. This right may be invoked where information relating to an
individual is inaccurate, inadequate, irrelevant or excessive for the purposes
of the data processing. The CJEU acknowledged that this right is not absolute;
it needs to be balanced with other rights, in particular the interest and right of
the general public in having access to the information. Each request for erasure
needs a case-by-case assessment to seek a balance between the fundamental
rights to personal data protection and private life of the data subject on the
one hand, and the legitimate interests of all internet users on the other. The
CJEU provided guidance on the factors to take into consideration during the
balancing exercise. The nature of the information in question is a particularly
important factor. If information is sensitive to the private life of the individual,
and where there is no public interest in the availability of the information, data
protection and privacy would override the right of the general public to have
access to the information. On the contrary, if it appears that the data subject
is a public figure, or that the information is of such nature to justify granting
the general public access to such information, then the interference with the
fundamental rights to data protection and privacy is justified.
91 Article 29 Working Party (2014), Guidelines on the implementation of the CJEU judgment on “Google
Spain and Inc v. Agencia Española de Protección de Datos (AEPD) and Mario Costeja González” C-131/12,
WP 225, Brussels, 26 November 2014.
57
Handbook on European data protection law
Concerning the reconciliation of the right to data protection with the right to freedom
of expression, the ECtHR has issued several landmark judgments.
• whether the event that the published article concerned was of general
interest;
The ECtHR found that the actor’s arrest and conviction was a public judicial
fact and was therefore of public interest; that the actor was sufficiently
well-known to qualify as a public figure; and that the information had
been provided by the public prosecutor’s office and its accuracy was not in
dispute by the parties. Therefore, the publication restrictions imposed on
the company had not been reasonably proportionate to the legitimate aim
of protecting the applicant’s private life. The Court concluded that there had
been a violation of Article 10 of the ECHR.
58
Context and background of European data protection law
The publishers of the magazine brought the case before the ECtHR, claiming
that the judgment of the French courts interfered unjustifiably with their
right to freedom of expression. The ECtHR had to balance Prince Albert’s
right to respect for private life with the publisher’s right of expression and
the general public’s right to have the information. The right of Ms Coste to
share her story with the public and the child’s interest in having the father-
child relationship officially established were also important considerations.
In the ECtHR case law, one of the crucial criteria regarding the balancing of these
rights is whether or not the expression in question contributes to a debate of gen-
eral public interest.
94 Ibid., paras. 104–116.
95 ECtHR, Mosley v. the United Kingdom, No. 48009/08, 10 May 2011, paras. 129 and 130.
59
Handbook on European data protection law
The ECtHR noted that, although the dissemination of such material was
generally for the purposes of entertainment rather than education, it
undoubtedly benefited from the protection of Article 10 of the ECHR,
which might yield to the requirements of Article 8 of the ECHR where the
information was of a private and intimate nature and there was no public
interest in its dissemination. However, particular care had to be taken
when examining constraints which might operate as a form of censorship
prior to publication. In light of the chilling effect to which a pre-notification
requirement might give rise, the doubts about its effectiveness, and the wide
margin of appreciation in that area, the ECtHR concluded that the existence
of a legally binding pre-notification requirement was not required under
Article 8. Accordingly, the Court concluded that there had been no violation
of Article 8.
Example: In Biriuk v. Lithuania,97 the applicant argued before the ECtHR that
Lithuania had failed to fulfil its obligation to secure respect of her right
to private life, because even though a serious violation of her privacy
had been committed by a major newspaper, she was awarded a derisory
sum of pecuniary damages by the national courts examining the case.
When awarding the non-pecuniary damages, national courts had applied
60
Context and background of European data protection law
The ECtHR recalled that the protection of personal data, not least medical
data, is of fundamental importance to the right to respect of private life under
the ECHR. The confidentiality of health data is particularly important, since
disclosure of medical data (the HIV status of the applicant in this case) may
dramatically affect a person’s private and family life, his or her employment
situation, and inclusion in society. The Court attached particular significance
to the fact that, according to the report in the newspaper, the hospital’s
medical staff had provided information about the applicant’s HIV status in an
evident breach of their obligation to medical secrecy. There had thus been
no legitimate interference with the applicant’s right to private life.
The article had been published by the press, and freedom of expression is
also a fundamental right under the ECHR. However, when examining whether
the existence of a public interest justified the publication of that type of
information about the applicant, the Court found that the main purpose of
the publication was to increase the newspaper’s sales by satisfying reader
curiosity. Such a purpose could not be deemed to contribute to any debate of
general interest to society. As this was a case of “outrageous abuse of press
freedom”, the severe limitations in redressing the damage and the low sum of
non-pecuniary damages provided under national law meant that Lithuania had
failed to fulfil its positive obligation to protect the applicant’s right to private
life. The ECtHR found that there had been a violation of Article 8 of the ECHR.
The right to freedom of expression and the right to personal data protection are not
always in conflict. There are instances where the effective protection of personal
data guarantees freedom of expression.
Example: The CJEU in Tele2 Sverige stated that the interference caused
by Directive 2006/24 (Data Retention Directive) with the fundamental
rights laid down in Articles 7 and 8 of the Charter was “wide-ranging, and
61
Handbook on European data protection law
Concerning the right to receive information, which also forms part of freedom of
expression, there is a growing realisation of the importance of government trans-
parency for the functioning of a democratic society. Transparency is an objective
of general interest that could thus justify an interference with the right to data pro-
tection, if necessary and proportionate, as explained in Section 1.2. In the past two
decades, in consequence, the right to access documents held by public authorities
has been acknowledged as an important right of every EU citizen, and any natural or
legal person residing or having its registered office in a Member State.
Under CoE law, reference can be made to the principles enshrined in the Recom-
mendation on access to official documents, which inspired the drafters of the Con-
vention on Access to Official Documents (Convention 205).99
98 CJEU, Joined cases C-203/15 and C-698/15, Tele2 Sverige AB v. Post- och telestyrelsen and Secretary of
State for the Home Department v. Tom Watson and Others [GC], 21 December 2016, para. 37 and 101;
CJEU, Joined cases C-293/12 and C-594/12, Digital Rights Ireland Ltd v. Minister for Communications,
Marine and Natural Resources and Others and Kärntner Landesregierung and Others [GC], 8 April 2014,
para. 28.
99 Council of Europe, Committee of Ministers (2002), Recommendation Rec (81) 19 and Recommendation
Rec (2002) 2 to member states on access to official documents, 21 February 2002; Council of Europe,
Convention on Access to Official Documents, CETS No. 205, 18 June 2009. The Convention has not yet
entered into force.
100 Regulation (EC) No. 1049/2001 of the European Parliament and of the Council of 30 May 2001
regarding public access to European Parliament, Council and Commission documents, OJ 2001 L 145.
62
Context and background of European data protection law
of the institutions, bodies, offices and agencies of the Union, regardless of their
form”.
This right may come into conflict with the right to data protection if access to a docu-
ment would reveal others’ personal data. Article 86 of the General Data Protection
Regulation clearly provides that personal data in official documents held by pub-
lic authorities and bodies may be disclosed by the authority or body concerned in
accordance with Union101 or Member State law to reconcile public access to official
documents with the right to data protection pursuant to the regulation.
Example: In Volker und Markus Schecke and Hartmut Eifert v. Land Hessen,102
the CJEU had to judge the proportionality of the publication, required by EU
legislation, of the name of the beneficiaries of EU agricultural subsidies and
the amounts they received. The publication aimed to enhance transparency
and contribute to public control of the appropriate use of public funds by
the administration. Several beneficiaries contested the proportionality of
this publication.
The CJEU, noting that the right to data protection is not absolute, argued
that the publication on a website of data naming the beneficiaries of two
EU agricultural aid funds and the precise amounts received constitutes an
interference with their private life, in general, and with the protection of
their personal data, in particular.
The CJEU found that such interference with Articles 7 and 8 of the Charter
was provided for by law and met an objective of general interest recognised
by the EU – namely, enhancing the transparency of community funds use.
However, the CJEU held that the publication of the names of natural persons
who are beneficiaries of EU agricultural aid from these two funds and the
exact amounts received constituted a disproportionate measure and was not
justified having regard to Article 52 (1) of the Charter. It acknowledged the
101 Article 42 of the Charter, Article 15 (3) of the TFEU and Regulation 1049/2009.
102 CJEU, Joined cases C-92/09 and C-93/09, Volker und Markus Schecke GbR and Hartmut Eifert v. Land
Hessen [GC], 9 November 2010, paras. 47–52, 58, 66–67, 75, 86 and 92.
63
Handbook on European data protection law
The CJEU considered that the EU institutions had not properly carried out
this balancing exercise, since it was possible to envisage measures which
would affect less adversely the fundamental rights of the individuals, while
also effectively contributing to the transparency objective pursued by
the publication. For instance, instead of a general publication affecting all
beneficiaries, giving their name and the precise amounts received by each
of them, a distinction could be drawn based on relevant criteria such as the
periods during which those persons had received the aid, the frequency of
the aid or its amount and nature.104 The CJEU thus declared partially invalid the
EU legislation on the publication of information relating to the beneficiaries
of European agricultural funds.
64
Context and background of European data protection law
been necessary in a democratic society to achieve that aim. The CJEU noted
that the Austrian legislation pursued a legitimate aim, as its objective was to
keep salaries of public employees within reasonable limits – a consideration
that is also related to the economic well-being of the country. However,
Austria’s interest in ensuring the best use of public funds had to be balanced
against the seriousness of the interference with the right of the persons
concerned to respect for their private life.
In subsequent cases, it became evident that the balancing between data protection
and access to documents requires a detailed, case-by-case analysis. Neither right
can automatically overrule the other. The CJEU had the opportunity to interpret the
right to access to documents containing personal data in two cases.
106 CJEU, C-28/08 P, European Commission v. The Bavarian Lager Co. Ltd. [GC], 29 June 2010.
65
Handbook on European data protection law
to the disclosure of their identity and the Commission having been unable
to contact the three others. By decision of 18 March 2004, the Commission
rejected a new Bavarian Lager application to obtain the full minutes of the
meeting, citing in particular the protection of the private life of those persons,
as guaranteed by the EU Institutions Data Protection Regulation.
Since it was not satisfied with this position, Bavarian Lager brought an action
before the Court of First Instance. That court annulled the Commission decision
by judgment of 8 November 2007 (case T-194/04, The Bavarian Lager Co. Ltd v.
Commission of the European Communities), finding that the mere entry of the
names of the persons in question on the list of persons attending a meeting
on behalf of the body they represented did not undermine private life and
did not place the private lives of those persons in any danger.
On appeal by the Commission, the CJEU annulled the Court of First Instance’s
judgment. The CJEU held that the Access to Documents Regulation establishes
“a specific and reinforced system of protection of a person whose personal
data could, in certain cases, be communicated to the public”. According to
the CJEU, where a request based on the Access to Documents Regulation thus
seeks to obtain access to documents that include personal data, the provisions
of the EU Institutions Data Protection Regulation become applicable in their
entirety. The CJEU then concluded that the Commission was right to reject
the application for access to the full minutes of the meeting of October 1996.
In the absence of the consent of the five participants at that meeting, the
Commission sufficiently complied with its duty of openness by releasing a
version of the document in question with their names blanked out.
Moreover, according to the CJEU, “as Bavarian Lager has not provided any
express and legitimate justification or any convincing argument in order
to demonstrate the necessity for those personal data to be transferred,
the Commission has not been able to weigh up the various interests of the
parties concerned. Nor was it able to verify whether there was any reason
to assume that the data subjects’ legitimate interests might be prejudiced”,
as required by the EU Institutions Data Protection Regulation.
Example: In Client Earth and PAN Europe v. EFSA,107 the CJEU examined
whether the decision of the European Food and Safety Authority (EFSA)
107 CJEU, C-615/13P, ClientEarth, Pesticide Action Network Europe (PAN Europe) v. European Food Safety
Authority (EFSA), European Commission, 16 July 2015.
66
Context and background of European data protection law
On appeal by the applicants, the CJEU reversed the judgment of first instance.
It concluded that the transfer of personal data in that case was necessary
to ascertain the impartiality of each of the external experts in carrying out
their tasks as scientists and to ensure that the decision-making process
in EFSA remains transparent. According to the CJEU, EFSA did not specify
how revealing the names of the external experts who had made specific
comments on the draft guidance document would prejudice the experts’
legitimate interests. A general argument that disclosure is likely to undermine
privacy does not suffice if it is unsupported by evidence specific to each case.
According to these judgments, interference with the right to data protection in the
context of access to documents needs a specific and justified reason. The right of
access to documents cannot automatically overrule the right to data protection.108
This approach is similar to that of the ECtHR with regard to privacy and access to
documents, as the following judgment demonstrates. In the Magyar Helsinki judg-
ment, the ECtHR stated that Article 10 did not confer on the individual a right of
access to information held by a public authority or oblige the government to impart
such information to the individual. However, such a right or obligation could arise –
firstly, where disclosure of the information is imposed by a judicial order that has
gained legal force; secondly, where access to the information is instrumental for an
individual’s exercise of his or her right to freedom of expression – particularly the
freedom to receive and impart information – and where its denial would interfere
108 See, however, the detailed deliberations in EDPS (2011), Public access to documents containing personal
data after the Bavarian Lager ruling, Brussels, 24 March 2011.
67
Handbook on European data protection law
with that right.109 Whether, and to which extent, the denial of access to informa-
tion constitutes an interference with an applicant’s freedom of expression has to be
assessed in each individual case and in light of its particular circumstances, includ-
ing: (i) the purpose of the information request; (ii) the nature of the information
sought; (iii) the role of the applicant; and (iv) whether the information was ready
and available.
In its reasoning, the Court noted that the study undertaken by the NGO
concerned the operation of justice and the right to a fair hearing, which
was a right of paramount importance under the ECHR. Since the information
requested did not involve data outside the public domain, the privacy rights
of the data subjects concerned (the ex officio public defenders) would not
109 ECtHR, Magyar Helsinki Bizottság v. Hungary [GC], No. 18030/11, 8 November 2016, para. 148.
110 Ibid., paras. 181, 187–200.
68
Context and background of European data protection law
have been compromised were the police to give access to the information to
the applicant. The information requested by the applicant was of a statistical
nature, relating to the number of times the ex officio counsel had been
appointed to represent defendants in public criminal proceedings.
For the Court, given that the study aimed to contribute to an important
debate on a matter of general interest, any restrictions on the NGO proposed
publication ought to have been subjected to the utmost scrutiny. The
information at stake was of public interest, as public interest covers “matters
which are capable of giving rise to considerable controversy, which concern
an important social issue, or which involve a problem that the public would
have an interest in being informed about”.111 It would thus certainly cover
a discussion on the conduct of justice and fair trials, which was the subject
matter of the applicant’s study. Balancing the different rights at stake and
applying the proportionality principle, the ECtHR held that there had been
an unjustified violation of the applicant’s rights under Article 10 of the ECHR.
69
Handbook on European data protection law
Mr Pruteanu claimed that this interfered with his right to respect for his
private life and correspondence. In its judgment, the ECtHR highlighted
the status and importance of a lawyer’s relationship with his or her client.
The interception of a lawyer’s conversations with his client undoubtedly
infringed upon professional secrecy, which was the foundation of the
relationship between those two people. In such a case, the lawyer could
also complain about an interference with his right to respect for private
life and correspondence. The CJEU held that there had been a violation of
Article 8 of the ECHR.
When the case reached the ECtHR, the Court held that accessing the
applicant’s bank statements constituted an interference with her right
to respect for professional confidentiality, which falls within the scope of
private life. The interference had a legal basis, as it was based on the code
of criminal procedure, and pursued a legitimate aim. However, examining the
necessity and proportionality of the interference, the ECtHR pointed to the
fact that the proceedings for lifting confidentiality were conducted without
the applicant’s participation or knowledge. The applicant was thus unable
to submit her arguments. In addition, even though domestic law provided
70
Context and background of European data protection law
The interaction between professional secrecy and data protection is often ambiva-
lent. On the one hand, data protection rules and safeguards established in legislation
help ensure professional secrecy. For instance, rules requiring controllers and pro-
cessors to implement robust data security measures seek to prevent, among other
things, loss of confidentiality of personal data protected by professional secrecy. In
addition, the EU General Data Protection Regulation enables the processing of health
data, which constitute special categories of personal data meriting stronger protec-
tion, but makes it subject to the existence of suitable and specific measures to safe-
guard the rights of data subjects, in particular professional secrecy.115
The General Data Protection Regulation (GDPR) provides for the possibility of Mem-
ber States adopting, in law, specific rules to safeguard the professional or other
equivalent secrecy obligations and reconcile the right to personal data protection
with the obligation of professional secrecy.117
The GDPR provides that Member States may adopt specific rules on the powers of
supervisory authorities in relation to controllers or processors that are subject to an
obligation of professional secrecy. These specific rules relate to the power to obtain
71
Handbook on European data protection law
The GDPR requires that Member States notify the Commission of the rules they
adopt to reconcile data protection and the principles established in the regulation
with the obligation of professional secrecy.
Example: The applicant in Sinak Isik v. Turkey118 was a member of the Alevi
religious community, whose faith is influenced by Sufism and other pre-
Islamic beliefs and is considered by some scholars as a separate religion
and by others as part of the Islamic religion. The applicant complained that,
against his wishes, his identity card contained a box indicating his religion
as “Islam” rather than “Alevi”. The domestic courts rejected his request to
change his identity card to “Alevi” on the grounds that that word designated
a sub-group of Islam and not a separate religion. He then complained before
the ECtHR that he had been obliged to disclose his faith, without his consent,
because it was mandatory to indicate a person’s religion on the identity card
and that this was in breach of his right to freedom of religion and conscience,
especially given that the designation of “Islam” on his identity card was
incorrect.
72
Context and background of European data protection law
The ECtHR reiterated that religious freedom entails the freedom to manifest
a person’s religion in community with others, in public and within the
circle of persons sharing the same faith, but also alone and in private. The
domestic legislation applicable at the time obliged individuals to carry an
identity card, a document that had to be shown at the request of any public
authority or private enterprises, indicating their religion. Such obligation
failed to recognise that the right to manifest one’s religion also conferred
the reverse, i.e. the right not to be obliged to disclose one’s beliefs. Even
though the government argued that national legislation had been amended
so that individuals could request that the religion box in their identity cards
be left blank, in the Court’s view the mere fact of having to apply for religion
to be deleted could constitute disclosure of information of their attitudes to
religion. In addition, when identity cards have a religion box, leaving it empty
has a special connotation, as holders of an identity card without information
on religion would stand out from those who have a card indicating their
beliefs. The ECtHR concluded that domestic legislation was in breach of
Article 9 of the ECHR.
Religious organisations may undertake the processing of personal data for several
reasons – for example, to maintain contact with their congregation or to communi-
cate information about religious or charity events and festivities being organised. In
certain states, churches need to keep registers of their members for tax reasons, as
membership of religious establishments can have an impact on the taxes payable
by individuals. In any case, under European law, data revealing religious beliefs are
sensitive data, and churches must be accountable for their handling and processing
73
Handbook on European data protection law
74
Context and background of European data protection law
European data protection law also acknowledges the special value of science to
society. The General Data Protection Regulation and Modernised Convention 108
permit the retention of data for longer periods insofar as the personal data will be
processed solely for scientific or historical research purposes. Furthermore, and irre-
spectively of the original purpose of a specific processing activity, the subsequent
use of personal data for scientific research shall not be considered an incompati-
ble purpose.123 At the same time, appropriate safeguards for such processing must
be implemented to protect the rights and freedoms of data subjects. EU or Mem-
ber State law may provide derogations from the data subject’s rights, such as for
instance the right to access, rectification, restriction of processing, and to object
when it comes to processing their personal data for scientific research, historical or
statistical purposes (see also Section 6.1 and Section 9.4).
As the CJEU’s case law has made clear, the protection of the fundamental right to
property must be balanced against the protection of other fundamental rights, in
particular the right to data protection.124 There have been cases where copyright
protection institutions demanded that internet access providers disclose the identity
of users of internet file-sharing platforms. Such platforms often make it possible for
internet users to download music titles for free even though these titles are pro-
tected by copyright.
123 General Data Protection Regulation, Art. 5 (1) (b) and Modernised Convention 108, Art. 5 (4) (b).
124 CJEU, C-275/06, Productores de Música de España (Promusicae) v. Telefónica de España SAU [GC],
29 January 2008, paras. 62–68.
125 Ibid., paras. 54 and 60.
75
Handbook on European data protection law
The Spanish court referred the issue to the CJEU, asking whether such
personal data must be communicated, under community law, in the context
of civil proceedings to ensure the effective protection of copyright. It referred
to Directives 2000/31, 2001/29 and 2004/48, read also in light of Articles 17
and 47 of the Charter. The CJEU concluded that these three directives, as well
as the e-Privacy Directive (Directive 2002/58), do not preclude Member
States from laying down an obligation to disclose personal data in the context
of civil proceedings to ensure effective copyright protection.
The CJEU pointed out that the case therefore raised the question of the need
to reconcile the requirements of the protection of different fundamental
rights – namely, the right to respect for private life with the rights to
protection of property and to an effective remedy.
It concluded that “the Member States must, when transposing the directives
mentioned above, take care to rely on an interpretation of those directives
which allows a fair balance to be struck between the various fundamental
rights protected by the Community legal order. Further, when implementing
the measures transposing those directives, the authorities and courts of
the Member States must not only interpret their national law in a manner
consistent with those directives but also make sure that they do not rely on
an interpretation of them which would be in conflict with those fundamental
rights or with the other general principles of Community law, such as the
principle of proportionality”.126
126 Ibid., paras. 65 and 68; see also CJEU, C-360/10, Belgische Vereniging van Auteurs, Componisten en
Uitgevers CVBA (SABAM) v. Netlog NV, 16 February 2012.
127 CJEU, C-461/10, Bonnier Audio AB, Earbooks AB, Norstedts Förlagsgrupp AB, Piratförlaget AB, Storyside
AB v. Perfect Communication Sweden AB, 19 April 2012.
76
Context and background of European data protection law
The Swedish court referred the issue to the CJEU, asking whether Directive
2006/24 precludes the application of a national provision based on Article 8
of Directive 2004/48 (Intellectual Property Rights Enforcement Directive),
which allows issuing an injunction requiring ISPs to transmit to copyright
holders information on subscribers whose IP addresses were allegedly
used in infringements. The question was based on the assumption that the
applicant has adduced clear evidence of the infringement of a particular
copyright and that the measure is proportionate.
The CJEU pointed out that Directive 2006/24 dealt exclusively with the
handling and retention of data generated by electronic communication
service providers for the purpose of the investigation, detection, and
prosecution of serious crime and their communication to competent national
authorities. Thus, a national provision transposing the Intellectual Property
Rights Enforcement Directive is outside the scope of Directive 2006/24 and
therefore not precluded by that directive.128
The CJEU concluded that Directives 2002/58 and 2004/48 must be interpreted
as not precluding national legislation such as that at issue in the main
proceedings, insofar as that legislation enables the national court seized
77
Handbook on European data protection law
Example: In Google Spain,131 the CJEU held that, under certain conditions,
individuals have the right to request search engines to remove search
results from their search index. In its reasoning, the CJEU pointed to the fact
that the use of search engines and the listed search results can establish
a detailed profile of an individual. This information may concern a vast
aspect of an individual’s private life and could not have been easily found
or interconnected without a search engine. It thus constituted a potentially
serious interference with the data subjects’ fundamental rights to privacy
and protection of personal data.
The CJEU then examined whether the interference could be justified. With
regard to the search engine company’s economic interest in conducting the
processing, the CJEU stated that “it is clear that [the interference] cannot
be justified by merely the economic interest which the operator of such an
engine has in that processing”, and that “as a rule” the fundamental rights
under Articles 7 and 8 of the Charter override such economic interest and
the interest of the general public in finding that information upon a search
relating to the data subject’s name.132
130 See, for example, Financial Times (2016), “Data is the new oil… who’s going to own it?”, 16 November 2016.
131 CJEU, C-131/12, Google Spain SL, Google Inc. v. Agencia Española de Protección de Datos (AEPD), Mario
Costeja González [GC], 13 May 2014.
132 Ibid., paras. 81 and 97.
78
Context and background of European data protection law
One of the key considerations of European data protection law is to provide individu-
als with more control over their personal data. Especially in the digital age, there is
an imbalance between the power of business entities that process and have access
to vast amounts of personal data and the power of the individuals to whom those
personal data belong to control their information. The CJEU takes a case-by-case
approach when balancing data protection and economic interests – such as the inter-
ests of third parties in relation to joint stock and limited liability companies, as illus-
trated in the Manni judgment.
The CJEU was called upon to determine if EU law recognised a right to erasure
in that case. In reaching its conclusion, it balanced EU data protection rules
and Mr Manni’s commercial interest in removing the information about
his former company’s bankruptcy, with the public interest in access to the
information. It took due note of the fact that disclosure to the public registry
of companies was provided for by law, and particularly by an EU Directive
aiming to make company information more easily accessible to third parties.
The disclosure was important to protect the interests of third parties who
may want to conduct business with a specific company, because the only
safeguards offered by joint-stock companies and limited liability companies
to third parties are their assets. Therefore, “the basic documents of the
company concerned should be disclosed in order that third parties may
be able to ascertain their contents and other information concerning the
company, especially particulars of the persons who are authorised to bind
the company”.134
133 CJEU, C-398/15, Camera di Commercio, Industria, Artigianato e Agricoltura di Lecce v. Salvatore Manni,
9 March 2017.
134 Ibid., para. 49.
79
Handbook on European data protection law
personal data, as the need to protect the interests of third parties in relation
to joint-stock and limited liability companies, and to ensure legal certainty,
fair trading and thus the proper functioning of the internal market, took
precedence over his rights under data protection legislation. This was
particularly so in view of the fact that individuals choosing to participate in
trade through a joint stock or limited liability company are aware that they
are required to disclose information relating to their identity and functions.
While finding that there were no grounds to obtain erasure in this case, the
CJEU did acknowledge the existence of a right to object to the processing,
noting: “it cannot be excluded […] that there may be specific situations in
which the overriding and legitimate reasons relating to the specific case
of the person concerned justify exceptionally that access to personal data
entered in the register is limited, upon the expiry of a sufficiently long
period […] to third parties who can demonstrate a specific interest in their
consultation”.135
The CJEU stated that it is up to the national courts to assess in each case,
and having regard to all the relevant circumstances of the individual, the
existence or absence of legitimate and overriding reasons which could
exceptionally justify the restriction of third parties’ access to personal data
contained in company registers. However, it clarified that, in the case of
Mr Manni, the mere fact that disclosure of his personal data in the register
allegedly affected his clientele could not be considered such a legitimate and
overriding reason. Potential clients of Mr Manni have a legitimate interest in
information regarding the bankruptcy of his previous company.
The interference with the fundamental rights of Mr Manni and other persons
included in the registry to respect for private life and to protection of personal
data as guaranteed by Articles 7 and 8 of the Charter served an objective of
general interest and was necessary and proportionate.
In Manni, therefore, the CJEU held that the rights to data protection and privacy did
not prevail over the interest of third parties to access the information in the compa-
nies’ register in relation to joint-stock companies and limited liability companies.
80
2
Data protection
terminology
Note: * Council of Europe, Committee of Ministers (2010), Recommendation CM/Rec(2010)13 of the Com-
mittee of Ministers to member states on the protection of individuals with regard to automatic processing
of personal data in the context of profiling (Profiling Recommendation), 23 November 2010.
82
Data protection terminology
• Data are personal data if they relate to an identified or identifiable person, the ‘data
subject’.
• Authentication means proving that a certain person possesses a certain identity and/or
is authorised to carry out certain activities.
• There are special categories of data, so-called sensitive data, listed in Modernised
Convention 108 and in EU Data Protection law, which require enhanced protection and,
therefore, are subject to a special legal regime.
• The principles and rules of data protection do not apply to anonymised information.
However, they do apply to pseudonymised data.
If data about such a person are being processed, this person is called the ‘data
subject’.
83
Handbook on European data protection law
Under EU law, natural persons are the only beneficiaries of data protection rules138
and only living beings are protected under European data protection law.139 The
General Data Protection Regulation (GDPR) defines personal data as any information
relating to an identified or identifiable natural person.
CoE law, notably Modernised Convention 108, also refer to the protection of individ-
uals regarding the processing of their personal data. There too, personal data means
any information relating to an identified or identifiable individual. This natural person
or individual, as referred to in the GDPR and Modernised Convention 108 respec-
tively, is known in data protection law as the data subject.
Legal persons also have some protection. ECtHR case law exists giving judgment on
applications of legal persons alleging violations of their right to protection against
the use of their data under Article 8 of the ECHR. Article 8 of the ECHR covers both
the right to respect for private and family life, and for home and correspondence. The
Court can therefore examine cases under the latter, rather than under private life.
84
Data protection terminology
in protecting the privacy of persons working for them, on the one hand,
and the public interest in ensuring efficient inspection for tax assessment
purposes, on the other. The Court held that there had, therefore, been no
violation of Article 8.
Example: In Volker und Markus Schecke and Hartmut Eifert v. Land Hessen,144
the CJEU, referring to the publication of personal data relating to beneficiaries
of agricultural aid, held that “legal persons can claim the protection of
Articles 7 and 8 of the Charter in relation to such identification only in so
far as the official title of the legal person identifies one or more natural
persons. [...T]he right to respect for private life with regard to the processing
of personal data, recognised by Articles 7 and 8 of the Charter, concerns any
information relating to an identified or identifiable individual […]”.145
85
Handbook on European data protection law
Any kind of information can be personal data provided that it relates to an identified
or identifiable person.
Personal data covers information pertaining to the private life of a person, which also
includes professional activities, as well as information about his or her public life.
In the Amann case,147 the ECtHR interpreted the term ‘personal data’ as not being
limited to matters of the private sphere of an individual. This meaning of the term
‘personal data’ is also relevant for the GDPR.
86
Data protection terminology
Example: In Volker und Markus Schecke and Hartmut Eifert v. Land Hessen,148
the CJEU stated that “it is of no relevance in this respect that the data
published concerns activities of a professional nature [...]. The European Court
of Human Rights has held on this point, with reference to the interpretation
of Article 8 of Convention 108, that the term ‘private life’ must not be
interpreted restrictively and that there is no reason of principle to justify
excluding activities of a professional [...] nature from the notion of private
life”.
The ECtHR’s case law concerning Article 8 of the ECHR confirms that it may be dif-
ficult to completely separate matters of private and professional life.150
148 CJEU, Joined cases C-92/09 and C-93/09, Volker und Markus Schecke GbR and Hartmut Eifert v. Land
Hessen [GC], 9 November 2010, para. 59.
149 CJEU, Joined cases C-141/12 and C-372/12, YS v. Minister voor Immigratie, Integratie en Asiel and
Minister voor Immigratie, Integratie en Asiel v. M and S, 17 July 2014, para. 39.
150 See, for example, ECtHR, Rotaru v. Romania [GC], No. 28341/95, 4 May 2000, para. 43; ECtHR, Niemietz
v. Germany, No. 13710/88, 16 December 1992, para. 29.
151 ECtHR, Bărbulescu v. Romania [GC], No. 61496/08, 5 September 2017, para. 121.
87
Handbook on European data protection law
Under EU law as well as under CoE law, information contains data about a person if:
• an individual, while not identified, can be singled out by this information in a way
which makes it possible to find out who the data subject is by conducting further
research.
Both types of information are protected in the same manner under European data
protection law. Direct or indirect identifiability of individuals requires continuous
assessment, “taking into consideration the available technology at the time of the
processing and technology developments”.152 The ECtHR has repeatedly stated that
the notion of ‘personal data’ under the ECHR is the same as in Convention 108, espe-
cially concerning the condition of relating to identified or identifiable persons.153
The GDPR stipulates that a natural person is identifiable when he or she “can be
identified, directly or indirectly, in particular by reference to an identifier such as a
88
Data protection terminology
89
Handbook on European data protection law
As many names are not unique, establishing the identity of a person may need addi-
tional attributes to ensure that a person is not mistaken for someone else. Some-
times, direct and indirect attributes may have to be combined to identify the indi-
vidual to whom the information relates. Date and place of birth are often used. In
addition, personalised numbers have been introduced in some countries to better
distinguish between citizens. Transferred tax data,159 data pertaining to an applicant
for a residence permit contained in an administrative document,160 and documents
concerning banking and fiduciary relationships161 may be personal data. Biometric
data, such as fingerprints, digital photos or iris scans, location data and online attrib-
utes are increasingly used to identify persons in the technological age.
For the applicability of European data protection law, however, there is no need for
actual identification of the data subject; it is sufficient that the person concerned be
identifiable. A person is considered identifiable if there are enough elements avail-
able through which the person can be directly or indirectly identified.162 Accord-
ing to Recital 26 of the GDPR, the benchmark is whether it is likely that reasonable
means for identification will be available and administered by the foreseeable users
of the information; this includes information held by third-party recipients (see
Section 2.3.2).
159 CJEU, C-201/14, Smaranda Bara and Others v. Casa Naţională de Asigurări de Sănătate and Others,
1 October 2015.
160 CJEU, YS v. Minister voor Immigratie, Integratie en Asiel and Minister voor Immigratie, Integratie en Asiel
v. M and S, 17 July 2014.
161 ECtHR, M.N. and Others v. San Marino, No. 28005/12, 7 July 2015.
162 General Data Protection Regulation, Art. 4 (1).
90
Data protection terminology
personal data. Licence plates, it says, are anonymous. The local authority
has no legal authority to access the general vehicle register to find out the
identity of the car owner or driver.
This reasoning is not in accordance with Recital 26 of the GDPR. Given that
the purpose of the data collection is clearly to identify and fine speeders,
it is foreseeable that identification will be attempted. Although the local
authorities do not have a means of identification directly available to them,
they will pass on the data to the competent authority, the police, who does
have such means. Recital 26 also explicitly includes a scenario where it
is foreseeable that further data recipients, other than the immediate data
user, may attempt to identify the individual. In light of Recital 26, the local
authority’s action equates to collecting data about identifiable persons and,
therefore, requires a legal basis under data protection law.
To “ascertain whether means are reasonably likely to be used to identify the natu-
ral person, account should be taken of all objective factors, such as the cost of and
the amount of time required for identification, taking into consideration the available
technology at the time of the processing and technological developments”.163
91
Handbook on European data protection law
required that all information enabling the identification of the data subject
must be held in the hands of one person” for information to constitute
personal data. Users of a dynamic IP address registered by an internet
service provider may be identified in certain situations, for instance within
the framework of criminal proceedings in the event of cyber-attacks, with the
assistance of other persons.166 According to the CJEU, when the provider “has
the legal means which enable it to identify the data subject with additional
data which the internet provider has about that person”, this constitutes “a
means likely reasonable to be used to identify the data subject”. Therefore,
such data are considered personal data.
As to the form in which the personal data is stored or used, it is important to note
that it is not relevant to the applicability of data protection law. Written or spoken
communications may contain personal data as well as images,169 including closed-
166 CJEU, C-70/10, Scarlet Extended SA v. Société belge des auteurs, compositeurs et éditeurs SCRL
(SABAM), 24 November 2011, paras. 47–48.
167 Explanatory Report of Modernised Convention 108, para. 18.
168 Ibid., para. 17.
169 ECtHR, Von Hannover v. Germany, No. 59320/00, 24 June 2004; ECtHR, Sciacca v. Italy, No.
50774/99, 11 January 2005; CJEU, C-212/13, František Ryneš v. Úřad pro ochranu osobních údajů,
11 December 2014.
92
Data protection terminology
Anonymisation
According to the principle of storage limitation contained in both the GDPR and Mod-
ernised Convention 108 (discussed in more detail in Chapter 3), data must be kept
“in a form which permits identification of data subjects for no longer than is neces-
sary for the purposes for which the personal data are processed”.174 Consequently,
data would have to be erased or anonymised if a controller wanted to store them
after they were no longer needed and no longer served their initial purpose.
The process of anonymising data means that all identifying elements are eliminated
from a set of personal data so that the data subject is no longer identifiable.175 In
its Opinion 05/2014, the Article 29 Working Party analyses the effectiveness and
limits of different anonymisation techniques.176 It acknowledges the potential value
of such techniques, but underlines that certain techniques do not necessarily work
in all cases. To find the optimal solution in a given situation, the appropriate pro-
cess of anonymisation should be decided on a case-by-case basis. Irrespective of
the technique used, identification must be prevented, irreversibly. This means that
for data to be anonymised, no element may be left in the information which could,
by exercising reasonable effort, serve to re-identify the person(s) concerned.177 The
risk of re-identification can be assessed by taking into account “the time, effort or
170 ECtHR, Peck v. the United Kingdom, No. 44647/98, 28 January 2003; ECtHR, Köpke v. Germany (dec.),
No. 420/07, 5 October 2010; EDPS (2010), The EDPS video-surveillance guidelines, 17 March 2010.
171 ECtHR, P.G. and J.H. v. the United Kingdom, No. 44787/98, 25 September 2001, paras. 59–60; ECtHR,
Wisse v. France, No. 71611/01, 20 December 2005 (French language version).
172 See Article 29 Working Party (2007), Opinion 4/2007 on the concept of personal data, WP136,
20 June 2007, p. 9; Council of Europe, Recommendation No. Rec (2006) 4 of the Committee of Ministers
to member states on research on biological materials of human origin, 15 March 2006.
173 General Data Protection Regulation, Art. 4 (13).
174 Ibid., Art. 5 (1) (e); Modernised Convention 108, Art. 5 (4) (e).
175 General Data Protection Regulation, Recital 26.
176 Article 29 Working Party (2014), Opinion 05/2014 on Anonymization Techniques, WP216, 10 April 2014.
177 General Data Protection Regulation, Recital 26.
93
Handbook on European data protection law
resources needed in light of the nature of the data, the context of their use, the
available re-identification technologies and related costs”.178
When data have been successfully anonymised, they are no longer personal data
and data protection legislation no longer applies.
The GDPR provides that the person or organisation controlling the personal data
processing cannot be obliged to maintain, acquire or process additional informa-
tion to identify the data subject for the sole purpose of complying with the regu-
lation. However, this rule has a significant exemption: whenever the data subject,
for the purpose of exercising the rights of access, rectification, erasure, restriction
of the processing and data portability, provides additional information to the con-
troller enabling his or her identification, then those data which were previously
anonymised become personal data again.179
Pseudonymisation
Personal information contains attributes, such as name, date of birth, sex, address,
or other elements that could lead to identification. The process of pseudonymising
personal data means that these attributes are replaced by a pseudonym.
178 Council of Europe, Committee of Convention 108 (2017), Guidelines on the protection of individuals with
regard to the processing of personal data in a world of Big Data, 23 January 2017, para. 6.2.
179 General Data Protection Regulation, Art. 11.
180 Ibid., Art. 4 (5).
181 Ibid., Art. 25 (1).
94
Data protection terminology
used to process personal data for purposes other than for which they were initially
collected.182
Pseudonymisation is not explicitly mentioned in the legal definition of the CoE Mod-
ernised Convention 108. However, the Explanatory Report of Modernised Conven-
tion 108 clearly states that “the use of a pseudonym or of any digital identifier/
digital identity does not lead to anonymisation of the data as the data subject can
still be identifiable or individualised”.183 One way to pseudonymise data is through
data encryption. Once data has been pseudonymised, the link to an identity exists in
the form of the pseudonym plus a decryption key. Without such a key, it is difficult
to identify pseudonymised data. However, for those entitled to use the decryption
key, re-identification is easily possible. The use of encryption keys by unauthorised
persons must be particularly guarded against. Therefore, “[p]seudonymous data is
[...] to be considered a personal data [...]” covered by Modernised Convention 108.184
Authentication
This is a procedure by which a person is able to prove that he or she possesses a cer-
tain identity and/or is authorised to do certain things, such as enter a security area,
or withdraw money from a banking account. Authentication can be achieved by
comparing biometric data, such as a photo or fingerprints in a passport, with the data
of the person presenting himself or herself, for example, at immigration control;185
or by asking for information which should be known only to the person with a
certain identity or authorisation, such as a personal identification number (PIN)
or password; or by requiring the presentation of a certain token, which should be
exclusively in the possession of the person with a certain identity or authorisa-
tion, such as a special chip card or key to a banking safe. Apart from passwords or
chip cards, electronic signatures – sometimes together with PINs – are an instru-
ment especially capable of identifying and authenticating a person in electronic
communications.
95
Handbook on European data protection law
• genetic data and biometric data processed for the purpose of identifying a
person;
186 CJEU, C-101/01, Criminal proceedings against Bodil Lindqvist, 6 November 2003, para. 51.
187 Former Directive 95/46/EC, Art. 8 (1), now General Data Protection Regulation Art. 9 (1).
188 Modernised Convention 108, Art. 6 (1).
96
Data protection terminology
article. Article 10 of the GDPR stipulates that processing such data may only be car-
ried out “under the control of official authority or when the processing is authorised
by Union or Member State law providing for appropriate safeguards for the rights
and freedoms of data subjects”. Comprehensive registers holding information on
criminal convictions, on the other hand, can only be kept under the control of spe-
cific official authorities.189 In the EU, processing personal data in the context of law
enforcement is governed by a specific legal instrument, Directive 2016/680/EU.190
The directive stipulates specific rules for data protection, which are binding upon
competent authorities when they process personal data specifically to prevent,
investigate, detect and prosecute criminal offences (see Section 8.2.1).
97
Handbook on European data protection law
Employers will have to forward their staff’s salary data to the tax authorities.
This transmission of data will also be ‘processing’ under the meaning of this
term in Modernised Convention 108 and in the GDPR. The legal ground for
such disclosure, however, is not the employment agreements. There must
be an additional legal basis for the processing operations which result in
employer’s transmitting salary data to the tax authorities. This legal basis
is usually to be found in the provisions of national tax laws. Without such
provisions – and in the absence of any other legitimate ground for processing –
this transmission of personal data would be unlawful processing.
98
Data protection terminology
99
Handbook on European data protection law
lists of search results”.200 The CJEU concluded that such actions constitute
‘processing’, “regardless of the fact that the operator of the search engine
also carries out the same operations in respect of other types of information
and does not distinguish between the latter and the personal data”.
• paper files can be structured in a way which makes finding information quick
and easy;
• storing personal data in structured paper files makes it easy to circumvent the
restrictions laid down by law for automated data processing.202
Under CoE law, the definition of automatic processing recognises that some stages
of manual use of personal data may be required between automated operations.203
Article 2 (c) of Modernised Convention 108 states that “(w)here automated pro-
cessing is not used, data processing means an operation or set of operations per-
formed upon personal data within a structured set of such data which is accessible
or retrievable according to specific criteria”.
100
Data protection terminology
• Whoever determines the means and purposes of processing the personal data of
others is a ‘controller’ under data protection law; if several persons take this decision
together, they may be ‘joint controllers’.
• A processor becomes a controller if it determines the means and purposes of data pro-
cessing itself.
• A ‘third party’ is a natural or legal person other than the data subject, the controller,
the processor and persons who are authorised to process personal data under the
direct authority of the controller or processor.
• Consent as a legal basis for processing personal data must be freely given, informed,
specific and an unambiguous indication of wishes by a clear affirmative act signifying
agreement to processing.
• Processing special categories of data on the basis of consent requires explicit consent.
101
Handbook on European data protection law
Whether a person has the capacity to decide and determine the purpose and means
of processing will depend on the factual elements or circumstances of the case.
According to the definition of controller in the GDPR, natural persons, legal persons
or any other bodies can be a controller. However, the Article 29 Working Party has
emphasised that to provide individuals with a more stable entity for the exercise of
their rights, “preference should be given to consider as controller the company or
the body as such, rather than a specific person within the company or the body”.208
For example, a company selling healthcare supplies to practitioners is the controller
of compiling and maintaining the distribution list of all practitioners in a certain area,
and not the sales manager that actually uses and maintains the list.
Natural persons can be controllers under both EU and CoE law. However, when pro-
cessing data about others regarding a purely personal or household activity, private
individuals do not fall under the rules of the GDPR and Modernised Convention 108,
and are not deemed to be controllers.209 An individual who keeps his or her cor-
respondence, a personal diary describing incidents with friends and colleagues and
health records of family members, may be exempt from data protection rules, as
these activities could be purely personal or merely household activities. The GDPR
further specifies that personal or household activities could also include social net-
working and online activity when undertaken within the context of such activities.210
To the contrary, data protection rules fully apply to controllers and processors who
102
Data protection terminology
provide the means for processing personal data for personal or household activities
(for example, social networking platforms). 211
Citizens’ access to the internet and the possibility to use e-commerce platforms,
social networks and blogging sites to share personal information about themselves
and other individuals make it increasingly difficult to separate personal from non-
personal processing.212 Whether activities are purely personal or household depends
on the circumstances.213 Activities that have professional or commercial aspects
cannot fall under the household exemption.214 Thus, where the scale and frequency
of data processing suggests a professional or full-time activity, a private individual
could be considered as controller. In addition to the professional or commercial char-
acter of the processing activity, another factor that must be taken into account is
whether personal data are made available to a large number of persons, obviously
external to the private sphere of the individual. Case law under the Data Protection
Directive has found that data protection law will apply when a private person, in the
course of using the internet, publishes data about others on a public website. The
CJEU has not yet ruled on similar facts under the GDPR, which provides more guid-
ance on the topics that could be considered outside the scope of the data protection
legislation under the ‘household exception’, such as use of social media for personal
purposes.
103
Handbook on European data protection law
Such personal data processing does not fall under purely personal or
domestic activities, which are outside the scope of EU data protection rules,
as this exception “must [...] be interpreted as relating only to activities which
are carried out in the course of private or family life of individuals, which
is clearly not the case with the processing of personal data consisting in
publication on the internet so that those data are made accessible to an
indefinite number of people.”217
According to the CJEU, the visual recordings of a privately installed security camera
can also be covered by EU data protection legislation under certain circumstances.
The CJEU stated that “[t]o the extent that video surveillance [...] covers,
even partially, a public space and is accordingly directed outwards from the
private setting of the person processing the data in that manner, it cannot
be regarded as an activity which is a purely ‘personal or household’ [...].” 219
Controller
Under EU law, a controller is defined as someone who “alone or jointly with others
determines the purposes and means of the processing of personal data”.220 A con-
troller’s decision establishes why and how data shall be processed.
217 CJEU, C-101/01, Criminal proceedings against Bodil Lindqvist, 6 November 2003, para. 47.
218 CJEU, C-212/13, František Ryneš v. Úřad pro ochranu osobních údajů, 11 December 2014, para. 33.
219 Former Directive 95/46/EC, Art. 3 (2) second indent, now General Data Protection Regulation,
Art. 2 (2) (c).
220 General Data Protection Regulation, Art. 4 (7).
221 Modernised Convention 108, Art. 2 (d).
104
Data protection terminology
the processing, as well as the data categories to be processed and access to the
data.222 Whether this power derives from a legal designation or from factual circum-
stances must be decided on a case-by-case basis.223
The CJEU was asked whether Google, as the operator of a search engine, was
the ‘controller’ of the data within the meaning of Article 2 (d) of the Data
Protection Directive.225 The CJEU considered a broad definition of the notion
‘controller’ to ensure “effective and complete protection of data subjects”.226
The CJEU found that the search engine operator determined the purposes
and means of the activity and that it rendered data loaded on internet pages
by publishers of websites accessible to any internet user who carries out
a search on the basis of the data subject’s name. 227 Therefore, the CJEU
determined that Google can be regarded as the ‘controller’.228
When a controller or processor is established outside of the EU, that company needs
to appoint, in writing, a representative within the EU.229 The GDPR underlines that
the representative must be established “in one of the Member States where the
data subjects, whose personal data are processed in relation to the offering of goods
and services to them, or whose behaviour is monitored”.230 If no representative is
designated, legal action can still be initiated against the controller or the processor
themselves.231
105
Handbook on European data protection law
Joint controllership
The GDPR provides that where two or more controllers jointly determine the pur-
pose and means of processing, they are considered joint controllers. This means
that they decide together to process data for a shared purpose.232 The Explanatory
Report of Modernised Convention 108 states that multiple controllers or co-control-
lership is also possible within the CoE framework.233
The Article 29 Working Party points out that joint controllership may take different
forms, and that participation of the different controllers in the control activities may
be unequal.234 Such flexibility makes it possible to cater for increasingly complex
data processing realities.235 Joint controllers must therefore determine their respec-
tive responsibilities for compliance with the obligations under the regulation in a
specific agreement.236
Legal provisions do not explicitly state whether joint controllership requires the
shared purpose to be the same for each of the controllers or whether it is sufficient
if their purposes only partly overlap. As of yet, no relevant case law is available at
the European level. In its 2010 Opinion on controllers and processors, the Article 29
106
Data protection terminology
Working Party states that joint controllers may either share all purposes and means
of processing or they may share only some purposes or means or part thereof.239
Whereas the former would imply a very close relationship between the different
actors, the latter would indicate a looser relationship.
Processor
239 Article 29 Working Party (2010), Opinion 1/2010 on the concepts of “controller” and “processor”,
WP 169, Brussels, 16 February 2010, p. 19.
240 Ibid.
241 Article 29 Working Party (2006), Opinion 10/2006 on the processing of personal data by the Society for
Worldwide Interbank Financial Telecommunication (SWIFT), WP 128, Brussels, 22 November 2006.
242 General Data Protection Regulation, Art. 4 (8).
243 Modernised Convention 108, Art. 2 (f).
107
Handbook on European data protection law
Processors, besides processing data for others, will also be data controllers in their
own right in relation to the processing they perform for their own purposes, for
example, the administration of their own employees, sales and accounts.
As we have seen, the controller is defined as the one who determines the purposes
and the means of processing. The GDPR clearly states that the processor may only
process personal data on instructions from the controller, unless the EU or Mem-
ber State law requires the processor to do so.244 The contract between the control-
ler and the processor is an essential element of their relationship, and is a legal
requirement.245
Example: The director of the Sunshine Company decides that the Cloudy
Company – a specialist in cloud-based data storage – should manage
Sunshine’s customer data. The Sunshine Company remains the controller and
Cloudy Company is only a processor, as, according to the contract, Cloudy may
only use Sunshine company’s customer data for the purposes that Sunshine
determines.
Furthermore, should a processor not respect the conditions for data processing as
prescribed by the controller, the processor will have become a controller at least to
108
Data protection terminology
the extent of the breach of the controller’s instructions. This will most likely make
the processor a controller who acts unlawfully. In turn, the initial controller will have
to explain how it was possible for the processor to breach its mandate.246 Indeed, the
Article 29 Working Party tends to presume joint controllership in such cases, since
this results in the best protection of the data subjects’ interests.247
There may also be issues about the division of responsibility where a controller is
a small enterprise and the processor is a large corporate company which has the
power to dictate the conditions of its services. In such circumstances, however, the
Article 29 Working Party maintains that the standard of responsibility should not be
lowered on the ground of economic imbalance and that the understanding of the
concept of controller must be maintained.248
For the sake of clarity and transparency, the details of the relationship between a
controller and a processor must be recorded in a written contract.249 The contact
must include in particular the subject matter, nature, purpose and duration of the
processing, the type of personal data and the categories of data subjects. It should
also stipulate the controller’s and the processor’s obligations and rights, such as
requirements regarding confidentiality and security. Having no such contract is an
infringement of the controller’s obligation to provide written documentation of
mutual responsibilities, and could lead to sanctions. When damage is caused as a
result of acting outside or failing to comply with the controller’s lawful instructions, it
is not just the controller who can be held liable, but also the processor.250 The proces-
sor must keep records of all categories of processing activities it carries out on behalf
of the controller.251 These records must be made available to the supervisory author-
ity at its request, as the controller and the processor must both cooperate with that
authority in the performance of its tasks.252 Controllers and processors also have the
109
Handbook on European data protection law
A ‘third party’ is someone who is different from the controller and the processor.
According to Article 4 (10) of the GDPR, a third party is “a natural or legal person,
public authority, agency or body other than the data subject, controller, proces-
sor and persons who, under the direct authority of the controller or processor, are
authorised to process personal data”. This means that persons working for an organ-
isation which is different from the controller – even if it belongs to the same group or
holding company – will be (or belong to a) ‘third party’. On the other hand, branches
of a bank processing customer’s accounts under the direct authority of their head-
quarters would not be ‘third parties’.256
110
Data protection terminology
The distinction between recipients and third parties is important only because of
the conditions for lawful disclosure of data. The employees of a controller or proces-
sor may be recipients of personal data without further legal requirement if they are
involved in the processing operations of the controller or processor. Whereas, a third
party, being separate from the controller or processor, is not authorised to use the
personal data a controller processes, unless on specific legal grounds in a specific
case.
Example: A controller’s employee, who uses personal data within the remit
of tasks the employer entrusted to him or her, is a recipient of data, but not a
third party, as he or she uses the data in the name and under the instructions
of the controller. For example, if an employer discloses personal data on
its employees to its human resources department in view of upcoming
performance evaluations, the human resources team will be recipients of
personal data, as the data have been disclosed to them in the course of
processing for the controller.
2.4. Consent
Key points
• Consent as a legal basis for processing personal data must be freely given, informed,
specific and an unambiguous indication of wishes by a clear affirmative act signifying
agreement to processing.
111
Handbook on European data protection law
EU law sets out several elements for consent to be valid, which aim to guarantee
that data subjects truly meant to agree to a particular use of their data:258
• Consent must be given by a clear affirmative act establishing a freely given, spe-
cific, informed and unambiguous indication of the data subject’s agreement to
the processing of his or her personal data. Such an act may be an action or a
statement.
• The data subject must have the right to withdraw consent at any time.
• Within the context of a written declaration that also covers other matters, such
as ‘terms of service’, requests for consent must be in clear and plain language
and in an intelligible and easily accessible form, which clearly distinguishes con-
sent from other matters; if a part of this declaration violates the GDPR it shall not
be binding.
Consent will only be valid in the context of data protection law if all of these require-
ments are fulfilled. It is the controller’s responsibility to demonstrate that the data
subject consented to the processing of his or her data.259 The elements of valid con-
sent will be discussed further in Section 4.1.1 on lawful grounds for processing per-
sonal data.
Convention 108 does not contain a definition for consent; this is left to domestic
law. However, under CoE law, the elements of valid consent correspond to those
explained earlier.260
Additional requirements under civil law for valid consent, such as legal capacity, nat-
urally apply also in the context of data protection, as such requirements are funda-
mental legal prerequisites. Invalid consent of persons who do not have legal capacity
will result in the absence of a legal basis for processing data about such persons.
257 General Data Protection Regulation, Art. 4 (11). See also Modernised Convention 108, Art. 5 (2).
258 General Data Protection Regulation, Art. 7.
259 Ibid., Art. 7 (1).
260 Modernised Convention 108, Art. 5 (2); Explanatory Report of Modernised Convention 108, paras. 42–45.
112
Data protection terminology
Concerning the legal capacity of minors to enter contracts, the GDPR provides that
its rules on the minimum age to obtain valid consent do not affect the general con-
tract law of Member States.261
Consent must be given in a clear manner so as to leave no doubt about the inten-
tion of the data subject.262 Consent must be explicit when it concerns the processing
of sensitive data, and can be done orally or in writing.263 The latter can be done by
electronic means.264 Within the framework of both EU and CoE law, agreement to
the processing of one’s personal data must be given by a statement or by a clear
affirmative action.265 Thus, consent cannot be derived from silence, pre-ticked boxes,
pre-completed forms or inactivity.266
113
3
Key principles of European
data protection law
115
Handbook on European data protection law
Article 5 of the General Data Protection Regulation sets out the principles governing
the processing of personal data. These principles cover:
• purpose limitation;
• data minimisation;
• data accuracy;
• storage limitation;
The principles serve as the starting point for more detailed provisions in the subse-
quent articles of the regulation. They appear also in Articles 5, 7, 8 and 10 of Mod-
ernised Convention 108. All later data protection legislation at the CoE or EU level
must comply with these principles and they must be kept in mind when interpret-
ing such legislation. Under EU law, restrictions to processing principles are only
allowed to the extent that they correspond to rights and obligations provided for in
Articles 12 to 22 and they must respect the essence of the fundamental rights and
freedoms. Any exemptions from and restrictions to these key principles may be pro-
vided for at EU or national level;267 they must be provided for by law, pursue a legiti-
mate aim and be necessary and proportionate measures in a democratic society. 268
All three conditions must be fulfilled.
116
Key principles of European data protection law
• The principles of lawfulness, fairness and transparency apply to all personal data
processing.
• a legal obligation;
• necessity to protect the vital interests of the data subject or of another person;
• necessity for the legitimate interests of the controller or a third party, if they are
not overridden by the interests and rights of the data subject.
• The data subject must be informed of the risk to ensure that processing does not
have unforeseeable negative effects.
• Controllers must inform data subjects before processing their data, among other
details, about the purpose of processing and about the identity and address of the
controller.
• Data subjects have the right to access their data wherever they are processed.
117
Handbook on European data protection law
Controllers should notify data subjects and the general public that they will process
data in a lawful and transparent manner and must be able to demonstrate the com-
pliance of processing operations with the GDPR. Processing operations must not be
performed in secret and data subjects should be aware of potential risks. Further-
more, controllers, so far as possible, must act in a way which promptly complies with
the wishes of the data subject, especially where his or her consent forms the legal
basis for the data processing.
270 Charter of Fundamental Rights of the European Union, Art. 8 (2); General Data Protection Regulation,
Recital 40 and Art. 6–9; Modernised Convention 108, Art. 5 (2); Explanatory Report of Modernised
Convention 108, para. 41.
271 General Data Protection Regulation, Art. 5 (1) (a); Modernised Convention 108, Art. 5 (4) (a).
272 ECtHR, K.H. and Others v. Slovakia, No. 32881/04, 28 April 2009.
118
Key principles of European data protection law
compelling reasons for refusing to do so. In the applicants’ case, the domestic
courts justified prohibiting the applicants from making copies of their medical
records principally on the need to protect the relevant information from
abuse. However, the ECtHR failed to see how the applicants, who had in
any event been given access to their entire medical files, could have abused
information concerning themselves. Moreover, the risk of such abuse could
have been prevented by means other than denying copies of the files to
the applicants, such as by limiting the range of persons entitled to access
the files. The state failed to show the existence of sufficiently compelling
reasons to deny the applicants effective access to information concerning
their health. The Court concluded that there had been a violation of Article 8.
In relation to internet services, the features of data processing systems must make it
possible for data subjects to really understand what is happening with their data. In
any case, the principle of fairness goes beyond transparency obligations and could
also be linked to processing personal data in an ethical manner.
273 General Data Protection Regulation, Art. 5 (1) (a); Modernised Convention 108, Art. 5 (4) (a) and 8.
119
Handbook on European data protection law
This principle establishes an obligation for the controller to take any a ppropriate
measure in order to keep the data subjects – who may be users, customers or
clients – informed about how their data are being used.274 Transparency may refer to
the information given to the individual before the processing starts,275 the informa-
tion that should be readily accessible to data subjects during the processing,276 but
also to the information given to data subjects following a request of access to their
own data.277
120
Key principles of European data protection law
CoE law also specifies that certain essential information has to be compulsorily pro-
vided in a proactive manner by the controller to the data subjects. Information on
the name and address of the controller (or co-controllers), the legal basis and the
purposes of the data processing, the categories of data processed and recipients, as
well as the means of exercising the rights can be provided in any appropriate for-
mat (either through a website, technological tools on personal devices, etc.) as long
as the information is fairly and effectively presented to the data subject. The infor-
mation presented should be easily accessible, legible, understandable and adapted
to the relevant data subjects (in a child friendly language where necessary for
instance). Any additional information that is necessary to ensure fair data processing
or that is useful for such purpose, such as the preservation period, the knowledge of
the reasoning underlying the data processing, or information on data transfers to a
recipient in another Party or non-Party (including whether that particular non-Party
provides an appropriate level of protection or the measures taken by the controller
to guarantee such an appropriate level of data protection) is also to be provided. 282
Pursuant to the right of access,283 a data subject has the right to be told by a control-
ler at his/her request if his/her data are being processed, and, if so, which data are
subject to such processing.284 Additionally, pursuant to the right to information,285 the
persons whose data are processed must be informed by controllers or processors
pro-actively about the purposes, length, means of processing, among other details,
in principle before the processing activity starts.
121
Handbook on European data protection law
for transmitting the data before these data were processed by the National
Health Insurance Fund. The CJEU held that where a public administrative body
of a Member State transmits personal data to another public administrative
body that further processes those data, the data subjects must be informed
about that transmission or processing.
In certain situations, derogations are allowed from the obligation to inform data sub-
jects about data processing, and these will be discussed in more detail in Section 6.1
on the rights of the data subject.
• There can be no further processing of data in a way that is incompatible with the origi-
nal purpose, though the General Data Protection Regulation foresees exceptions to this
rule for archiving purposes in the public interest, scientific or historical research pur-
poses and statistical purposes.
• In essence, the principle of purpose limitation means that any processing of personal
data must be done for a specific well-defined purpose and only for additional, speci-
fied, purposes that are compatible with the original one.
The principle requires that any processing of personal data must be done for a spe-
cific, well-defined purpose and only for additional purposes that are compatible with
the original purpose.288 The processing of personal data for undefined and/or unlim-
ited purposes is thus unlawful. The processing of personal data without a certain
287 Article 29 Working Party (2013), Opinion 3/2013 on purpose limitation, WP 203, 2 April 2013.
288 General Data Protection Regulation, Art. 5 (1) (b).
122
Key principles of European data protection law
purpose, just based on the consideration they may be useful sometime in the future,
is also not lawful. The legitimacy of processing personal data will depend on the pur-
pose of the processing, which must be explicit, specified and legitimate.
Every new purpose for processing data which is not compatible with the original one
must have its own particular legal basis and cannot rely on the fact that the data
were initially acquired or processed for another legitimate purpose. In turn, legitimate
processing is limited to its initially specified purpose and any new purpose of process-
ing will require a separate new legal basis. For instance, disclosure of personal data to
third parties for a new purpose will have to be carefully considered, as such disclosure
will likely need an additional legal basis, distinct from the one for collecting the data.
When considering the scope and limits of a particular purpose, Modernised Conven-
tion 108 and the General Data Protection Regulation rely on the concept of com-
patibility: the use of data for compatible purposes is allowed on the grounds of the
initial legal basis. Further processing of the data may not, therefore, be done in a
way that is unexpected, inappropriate or objectionable for the data subject.289 To
assess whether the further processing is to be considered compatible, the controller
should take the following into account (among others things):
• “any link between those purposes and the purposes of the intended further
processing;
• the context in which the personal data have been collected, in particular con-
cerning the reasonable expectations of data subjects based on their relationship
with the controller on its further use;
123
Handbook on European data protection law
• the consequences of the intended further processing for data subjects; and
• the existence of appropriate safeguards in both the original and intended further
processing operations.”290 This could be done, for instance, through encryption or
pseudonymisation.
By contrast, the Sunshine company’s use of CRM data for its own marketing
purposes, that is sending marketing messages to its own customers for its
own products, is generally accepted as a compatible purpose.
The General Data Protection Regulation and Modernised Convention 108 declare
that the “further processing for archiving purposes in the public interest, scientific or
historical research purposes or statistical purposes” is a priori considered compatible
with the initial purpose.291 However, appropriate safeguards such as the anonymisa-
tion, encryption or pseudonymisation of the data, and restriction of access to the
data, must be put in place when further processing personal data.292 The General
Data Protection Regulation adds that “[w]here the data subject has given con-
sent or the processing is based on Union or Member State law which constitutes
a necessary and proportionate measure in a democratic society to safeguard, in
290 General Data Protection Regulation, Recital 50 and Art. 6 (4); Explanatory Report of Modernised
Convention 108, para. 49.
291 General Data Protection Regulation, Art. 5 (1) (b); Modernised Convention 108, Art. 5 (4) (b).
An example of such national provisions is the Austrian Data Protection Act (Datenschutzgesetz),
Federal Law Gazette I No. 165/1999, para. 46.
292 General Data Protection Regulation Art. 6 (4); Modernised Convention 108, Art. 5 (4) (b); Explanatory
Report of Modernised Convention 108, para. 50.
124
Key principles of European data protection law
Example: The Sunshine company has collected and stored Customer Relations
Management (CRM) data about its customers. Further use of these data by
the Sunshine company for a statistical analysis of the buying behaviour of its
customers is permissible, as statistics are a compatible purpose. No additional
legal basis, such as consent of the data subjects, is needed. However, for
the further processing of the personal data for statistical purposes, the
Sunshine company must put in place appropriate safeguards for the rights
and freedoms of the data subject. The technical and organisational measures
that Sunshine must implement may include pseudonymisation.
• The processing of personal data should only take place when the purpose of the pro-
cessing cannot be reasonably fulfilled by other means.
• Data processing may not disproportionately interfere with the interests, rights and
freedoms at stake.
Only such data shall be processed as are “adequate, relevant and not excessive in
relation to the purpose for which they are collected and/or further processed”.295
The categories of data chosen for processing must be necessary in order to achieve
the declared overall aim of the processing operations, and a controller should strictly
limit collection of data to such information as is directly relevant for the specific pur-
pose pursued by the processing.
125
Handbook on European data protection law
Example: In the Digital Rights Ireland case, 296 the CJEU considered the
validity of the Data Retention Directive, which aimed to harmonise national
provisions for retaining personal data generated or processed by publicly
available electronic communications services or networks for their possible
transmission to competent authorities to fight serious crime, such as
organised crime and terrorism. Notwithstanding that this was considered
a purpose that genuinely satisfies an objective of general interest, the
generalised way in which the Directive covered “all individuals and all
means of electronic communication as well as all traffic data without any
differentiation, limitation or exception being made in the light of the objective
of fighting against serious crime”, was considered problematic.297
Example: A town council offers a chip card to regular users of the town’s
public transport system for a certain fee. The card carries the name of the
user in written form on the card’s surface and also in electronic form in the
chip. Whenever a bus or tram is used, the chip card must be passed in front
of the reading devices installed, for example, in buses and trams. The data
read by the device are electronically checked against a database containing
the names of the people who have bought the travel card.
This system does not adhere to the data minimisation principle in an optimal
way: checking whether an individual is allowed to use transport facilities
could be accommodated without comparing the personal data on the
card’s chip with a database. It would suffice, for instance, to have a special
electronic image, such as a bar code, in the chip of the card which, upon
being passed in front of the reading device, would confirm whether the card
is valid or not. Such a system would not record who used which transport
facility at what time. This would be the optimal solution in the sense of the
296 CJEU, Joined cases C-293/12 and C-594/12, Digital Rights Ireland Ltd v. Minister for Communications,
Marine and Natural Resources and Others and Kärntner Landesregierung and Others [GC], 8 April 2014.
297 Ibid., paras. 44 and 57.
126
Key principles of European data protection law
• The principle of data accuracy must be implemented by the controller in all processing
operations.
• Data may need to be checked regularly and kept up to date to secure accuracy.
A controller holding personal information shall not use that information without tak-
ing steps to ensure with reasonable certainty that the data are accurate and up to
date.299
The obligation to ensure accuracy of data must be seen in the context of the pur-
pose of data processing.
Example: In the Rijkeboer case,300 the CJEU considered the request of a Dutch
national to receive information from the local administration of the city of
Amsterdam on the identity of the persons to whom the records on him held
by the local authority had been communicated in the two preceding years,
298 Explanatory Report of Modernised Convention 108, para. 52; General Data Protection Regulation,
Art. 5 (1) (c).
299 General Data Protection Regulation, Art. 5 (1) (d); Modernised Convention 108, Art. 5 (4) (d).
300 CJEU, C-553/07, College van burgemeester en wethouders van Rotterdam v. M. E. E. Rijkeboer,
7 May 2009.
127
Handbook on European data protection law
and also on the content of the disclosed data. The CJEU stated that the “right
to privacy means that the data subject may be certain that his personal data
are processed in a correct and lawful manner, that is to say, in particular,
that the basic data regarding him are accurate and that they are disclosed to
authorised recipients.” The CJEU then referred to the preamble of the Data
Protection Directive, which states that data subjects must enjoy the right
of access to their personal data in order to be able to check that the data
are correct.301
There may also be cases where updating stored data is legally prohibited, because
the purpose of storing the data is principally to document events as a historical
‘snap-shot’.
On the other hand, there are situations where it is absolute necessity to update and
regularly check the accuracy of data, due to the potential damage which might be
caused to the data subject if data were to remain inaccurate.
128
Key principles of European data protection law
• The principle of storage limitation means that personal data must be deleted or
anonymised as soon as they are no longer needed for the purposes for which they
were collected.
In S. and Marper, the ECtHR concluded that the core principles of the relevant instru-
ments of the Council of Europe, and the law and practice of the other Contracting
Parties, required data retention to be proportionate in relation to the purpose of col-
lection and limited in time, particularly in the police sector.303
Example: In S. and Marper, 304 the ECtHR ruled that indefinite retention of
the fingerprints, cell samples and DNA profiles of the two applicants was
disproportionate and unnecessary in a democratic society, considering that
the criminal proceedings against both applicants had been terminated by an
acquittal and a discontinuance, respectively.
The time limitation for storing personal data only applies to data kept in a form
which permits identification of data subjects. Lawful storage of data which are no
longer needed could, therefore, be achieved by anonymising data.
Archiving data for public interest, scientific or historical purposes, or for statistical
use, may be stored for longer periods, providing such data will be used solely for
129
Handbook on European data protection law
Example: In the Digital Rights Ireland case,307 the CJEU reviewed the validity of
the Data Retention Directive, which aimed to harmonise national provisions
on the retention of personal data generated or processed by publicly available
electronic communications services or networks to fight serious crime, such
as organised crime and terrorism. The Data Retention Directive imposed a
data retention period of “at least six months, without any distinction being
made between the categories of data set out in Article 5 of that Directive
on the basis of their possible usefulness for the purposes of the objective
pursued or according to the persons concerned”.308 The CJEU also raised the
issue of the absence of objective criteria in the Data Retention Directive, on
the basis of which the exact period of data retention – which could vary from
a minimum of six months to a maximum of 24 months – must be determined
to ensure such a period is limited to what is strictly necessary.309
305 General Data Protection Regulation, Art. 5 (1) (e); Modernised Convention 108, Art. 5 (4) (b) and 11 (2).
306 Modernised Convention 108, Art. 11.1; Explanatory Report of Modernised Convention 108,
paras. 91–98.
307 CJEU, Joined cases C-293/12 and C-594/12, Digital Rights Ireland Ltd v. Minister for Communications,
Marine and Natural Resources and Others and Kärntner Landesregierung and Others [GC], 8 April 2014.
308 Ibid., para. 63.
309 Ibid., para. 64.
130
Key principles of European data protection law
• The security and confidentiality of personal data are key to preventing adverse effects
for the data subject.
310 General Data Protection Regulation, Recital 39 and Art. 5 (1) (f); Modernised Convention 108, Art. 7.
311 General Data Protection Regulation, Art. 32 (1).
312 Ibid.
131
Handbook on European data protection law
Users who access pseudonymised data will usually have no ability to identify
“Charles Spencer, born 3 April 1967” from “324” or “YESz3201”. Such data are,
therefore, more likely to be safe from misuse.
The first example is, however, less safe. If the sentence “C.S. 1967 is father of a fam-
ily of four children, two boys and two girls” is used within the small village where
Charles Spencer lives, Mr Spencer may be easily recognisable. The pseudonymisa-
tion method can affect the effectiveness of data protection.
Personal data with encrypted or separately kept attributes are used in many con-
texts as a means of keeping personal identities secret. This is particularly useful
where data controllers need to ensure that they are dealing with the same data sub-
jects but do not require, or ought not to have, the data subjects’ real identities. This
is the case, for example, where a researcher studies the course of a disease with
patients, whose identity is known only to the hospital where they are treated and
from which the researcher obtains the pseudonymised case histories. Pseudonymi-
sation is therefore a strong link in the armoury of privacy-enhancing technology. It
can function as an important element when implementing privacy by design. This
means having data protection built into the fabric of data processing systems.
Article 25 of the GDPR, which addresses data protection by design, explicitly refers
to pseudonymisation as an example of an appropriate technical and organisational
measure that controllers should implement to accommodate the data protection
principles and integrate the necessary safeguards. In doing so, controllers will meet
the requirements of the regulation and will protect the rights of data subjects when
processing their personal data.
132
Key principles of European data protection law
security measures for the protection of personal data in passenger name record sys-
tems. These include holding data in a secure physical environment, limiting access
control via layered logins and protecting the communication of data with strong
cryptography.314
Example: Social networking sites and email providers make it possible for
users to add an extra layer of data security to the services they provide
through the introduction of two-tier authentication. In addition to entering
a personal password, users must complete a second sign-in to enter their
personal account. The latter could be, for instance, the entry of a security
code sent to the mobile number connected to the personal account. In this
way, two-step verification provides better protection of personal information
against unauthorised access to personal accounts via hacking.
In cases where a personal data breach takes place, both Modernised Convention 108
and the GDPR require the controller to notify the competent supervisory authority of
the breach with risks for rights and freedoms of individuals without undue delay.318
A similar communication obligation to the data subject exists when the personal
314 Council of Europe, Committee of Convention 108, Opinion on the Data protection implications of the
processing of Passenger Name Records, T-PD(2016)18rev, 19 August 2016, p. 9.
315 Explanatory Report of Modernised Convention 108, para. 56.
316 Ibid., para. 62.
317 Ibid., para. 63.
318 Modernised Convention 108, Art. 7 (2); General Data Protection Regulation, Art. 33 (1).
133
Handbook on European data protection law
data breach is likely to result in a high risk to his or her rights and freedoms.319
Communication of such breaches to the data subjects must be in clear and plain
language.320 If the processor becomes aware of a personal data breach, the
controller must be notified immediately.321 In certain situations, exceptions to the
notification obligation may apply. For instance, the controller is not required to notify
the supervisory authority when “the personal data breach is unlikely to result in a
risk to the rights and freedoms of natural persons”.322 Nor is it necessary to notify
the data subject when implemented security measures render the data unintelligible
for non-authorised persons or when subsequent measures ensure that the high risk
is no longer likely to materialise.323 If communication of a personal breach to the data
subjects would involve disproportionate effort on behalf of the controller, a public
communication or similar measure can ensure that “the data subjects are informed
in an equally effective manner”.324
• Controllers and processors are responsible for compliance of their processing opera-
tions with data protection law and their respective obligations.
The GDPR and Modernised Convention 108 set out that the controller is responsible
for, and must be able to demonstrate compliance with, the personal data process-
ing principles described in this chapter.325 To this end, the controller must implement
134
Key principles of European data protection law
EU and CoE data protection laws also determine that the controller is responsible for,
and should be able to ensure, compliance with the data protection principles dis-
cussed in Sections 3.1 to 3.6.327 The Article 29 Working Party points out that “the
type of procedures and mechanisms would vary according to the risks represented
by the processing and the nature of the data”.328
Controllers can facilitate compliance with this requirement in various ways, which
include:
• implementing modalities and procedures for the exercise of the rights of the
data subjects;333
135
Handbook on European data protection law
The Organisation for Economic Co-operation and Development (OECD) adopted pri-
vacy guidelines in 2013 that highlighted that controllers have an important role in
making data protection work in practice. The guidelines comprise an accountability
principle to the effect that “a data controller should be accountable for complying
with measures which give effect to the [material] principles stated above.”338
136
Key principles of European data protection law
340 Article 29 Working Party, Opinion 3/2010 on the principle of accountability, WP 173, Brussels,
13 July 2010.
137
4
Rules of European data
protection law
139
Handbook on European data protection law
140
Rules of European data protection law
• Personal data may be lawfully processed if they meet one of the following criteria:
141
Handbook on European data protection law
• the processing is necessary for compliance with a legal obligation of the controller;
• vital interests of data subjects or of another person require the processing of their
data;
• the processing is needed for the performance of a task in the public interest;
• legitimate interests of controllers or third parties are the reason for processing, but
only as long as they are not overridden by the interests or the fundamental rights
of the data subjects.
Irrespective of the lawful ground for processing that a controller relies on to initiate
a personal data processing operation, the controller will also have to apply the safe-
guards provided for in the general data protection law regime.
Consent
341 CJEU, Joined cases C-465/00, C-138/01 and C-139/01, Rechnungshof v. Österreichischer Rundfunk
and Others and Christa Neukomm and Jospeh Lauermann v. Österreichischer Rundfunk, 20 May 2003,
para. 65; CJEU, C-524/06, Heinz Huber v. Bundesrepublik Deutschland [GC], 16 December 2008,
para. 48; CJEU, Joined cases C-468/10 and C-469/10, Asociación Nacional de Establecimientos
Financieros de Crédito (ASNEF) and Federación de Comercio Electrónico y Marketing Directo (FECEMD) v.
Administración del Estado, 24 November 2011, para. 26.
342 See for example, Council of Europe, Committee of Ministers (2010), Recommendation CM/Rec(2010)13
of the Committee of Ministers to the Member States on the protection of individuals with regard to
automatic processing of personal data in the context of profiling, 23 November 2010, Art. 3.4 (b).
142
Rules of European data protection law
EU law, consent as a basis for lawful data processing is firmly established in Article 6
of the GDPR and is also explicitly referred to in Article 8 of the Charter. The charac-
teristics of valid consent are explained in the definition of consent in Article 4, while
the conditions for obtaining valid consent are detailed in Article 7 and the special
rules for child’s consent in relation to information society services are established in
Article 8 of the GDPR.
As explained in Section 2.4, consent must be freely given, informed, specific, and
unambiguous. Consent must be a statement or clear affirmative action signifying
agreement to the processing, and the person has the right to withdraw their consent
at any time. Controllers have the duty to keep a verifiable record of the consent.
Free consent
Within the CoE framework of Modernised Convention 108, consent of the data sub-
ject must “represent the free expression of an intentional choice”.343 The existence
of free consent is only valid “if the data subject is able to exercise a real choice and
there is no risk of deception, intimidation, coercion or significant negative conse-
quences if he/she does not consent”.344 In this regard, EU law stipulates that consent
is not considered freely given “if the data subject has no genuine or free choice or
is unable to refuse or withdraw consent without detriment”.345 The GDPR stresses
that “(w)hen assessing whether consent is freely given, utmost account shall be
taken of whether, inter alia, the performance of a contract, including the provision
of a service, is conditional on consent to the processing of personal data that is not
necessary for the performance of that contract”.346 The Explanatory Report of Mod-
ernised Convention 108 states that “[n]o undue influence or pressure (which can
be of an economic or other nature) whether direct or indirect, may be exercised on
the data subject and consent should not be regarded as freely given where the data
subject has no genuine choice or is unable to refuse or withdraw consent without
prejudice”.347
143
Handbook on European data protection law
348 Article 29 Working Party (2011), Opinion 15/2011 on the definition of consent, WP187, Brussels,
13 July 2011, p. 16. Further examples of cases where data processing cannot be based on consent, but
requires a different legal ground for legitimising the processing, can be found in pp. 14 and 17 of the
opinion.
349 See also Article 29 Working Party (2001), Opinion 8/2001 on the processing of personal data in the
employment context, WP 48, Brussels, 13 September 2001; Article 29 Working Party (2005), Working
document on a common interpretation of Article 26 (1) of Directive 95/46/EC of 24 October 1995,
WP 114, Brussels, 25 November 2005; Article 29 Working Party (2017), Opinion 2/2017 on data
processing at work, WP 249, Brussels, 8 June 2017.
350 Article 29 Working Party, Opinion 2/2017 on data processing at work, WP 249, Brussels, 8 June 2017.
144
Rules of European data protection law
This does not mean, however, that consent can never be valid in circumstances where
not consenting would have some negative consequences. For instance, if not con-
senting to having a supermarket’s customer card only results in not receiving a small
reduction in the price of certain goods, consent could be a valid legal basis for process-
ing the personal data of those customers who consented to having such a card. There
is no subordination between company and customer and the consequences of not
consenting are not serious enough to prevent the data subject’s free choice (provided
that the price reduction is small enough not to affect their free choice).
However, where goods or services can only be obtained if certain personal data are
disclosed to the controller or further on to third parties, the data subject’s consent to
disclose their data, which are not necessary for the contract, cannot be considered
145
Handbook on European data protection law
a free decision and is, therefore, not valid under data protection law.351 The GDPR is
rather strict in forbidding the bundling of consent with the provision of goods and
services.352
Informed consent
The data subject must have sufficient information before exercising his or her
choice. Informed consent will usually comprise a precise and easily understand-
able description of the subject matter requiring consent. As the Article 29 Working
Party explains, consent must be based upon an appreciation and understanding of
the facts and implications of the data subject’s action to consent to the processing.
Therefore, “[t]he individual concerned must be given, in a clear and understandable
manner, accurate and full information of all relevant issues […] such as the nature of
the data processed, purposes of the processing, the recipients of possible and the
rights of the data subject.”353 For consent to be informed, individuals must also be
aware of the consequences of not consenting to processing.
In view of the importance of informed consent, the GDPR and the Explanatory
Report of Modernised Convention 108 sought to clarify the notion. The recitals of
the GDPR stipulate that informed consent means that “the data subject should be
aware at least of the identity of the controller and the purposes of the processing for
which the personal data” processed are intended.354
146
Rules of European data protection law
possible risks of such a transfer, due to the absence of an adequacy decision and
appropriate safeguards, for that consent to be considered valid.355
The quality of the information is important. Quality of information means that the
information’s language should be adapted to its foreseeable recipients. Informa-
tion must be given without jargon, in a clear and plain language that a regular user
should be able to understand.357 Information must also be easily available to the
data subject and can be provided orally or in writing. Accessibility and visibility of
the information are important elements: the information must be clearly visible and
prominent. In an online environment, layered information notices may be a good
solution, as these allow data subjects to choose whether to access concise or more
extensive versions of information.
Specific consent
For consent to be valid, it must also be specific to the processing purpose, which
must be described clearly, and in unambiguous terms. This goes hand-in-hand with
the quality of information given about the purpose of the consent. In this context,
the reasonable expectations of an average data subject will be relevant. The data
subject must be asked again for consent if processing operations are to be added or
changed in a way which could not have reasonably been foreseen when the initial
consent was given and thus lead to a change of purpose. When the processing has
multiple purposes, consent should be given for all of them.358
147
Handbook on European data protection law
directories needed renewed consent from the data subjects,360 as the data’s
recipients were not originally named when consent was given.
The CJEU held that, under Article 12 of the Directive on privacy and electronic
communications, renewed consent was not necessary before passing on the
data. Since the data subjects only had the option to consent to the purpose
of the processing – which was the publication of their data – they could not
choose between different directories in which these data might be published.
360 Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the
processing of personal data and the protection of privacy in the electronic communications sector,
OJ 2002 L 201 (Directive on privacy and electronic communications).
361 CJEU, C-543/09, Deutsche Telekom AG v. Bundesrepublik Deutschland, 5 May 2011; para. 61.
362 Ibid., para. 62.
363 CJEU, C-536/15, Tele2 (Netherlands) BV and Others v. Autoriteit Consument en Markt (AMC),
15 March 2017.
364 Directive 2002/22/EC of the European Parliament and of the Council of 7 March 2002 on universal
service and users’ rights relating to electronic communications networks and services (Universal Service
Directive), OJ 2002 L 108, p. 51, as amended by Directive 2009/136/EC of the European Parliament and
of the Council of 25 November 2009 (Universal Services Directive), OJ 2009 L 337, p. 11.
148
Rules of European data protection law
Unambiguous consent
All consent must be given in an unambiguous way.367 This means that there should
be no reasonable doubt that the data subject wanted to express his or her agree-
ment to allow the processing of his or her data. For instance, inactivity from a data
subject does not indicate unambiguous consent.
This would be the case for controller’s obtaining consent with statements in their
privacy policies such as “by using our service, you consent to the processing of your
personal data”. In that case, controllers might have to ensure that users manually
and individually consent to such policies.
If consent is given in a written form which is part of a contract, consent for process-
ing personal data must be individualised and in any case “safeguards should ensure
that the data subject is aware of the fact that and the extent to which consent is
given.”368
The GDPR provides specific protection for children in the context of provid-
ing information society services, because “they may be less aware of the risks,
365 CJEU, C-536/15, Tele2 (Netherlands) BV and Others v. Autoriteit Consument en Markt (AMC),
15 March 2017, para. 36.
366 Ibid., paras. 40-41.
367 General Data Protection Regulation, Art. 4 (11).
368 Ibid., Recital 42.
149
Handbook on European data protection law
consequences and safeguards concerned and their rights in relation to the process-
ing of personal data”.369 Therefore, under EU law, when providers of information
society services process personal data of children under the age of 16 years on the
basis of consent, such processing will be lawful “only if, and to the extent that, con-
sent is given or authorised by the holder of parental responsibility over the child”.370
Member States may provide for a lower age in national law, though not lower than
13 years.371 Consent by the holder of parental responsibility is not necessary “in the
context of preventive or counselling services offered directly to a child.”372 Informa-
tion and communication where processing is addressed to a child should be in clear
and plain language easily understandable by the child.373
The GDPR includes a general right to withdraw consent at any time.374 The data sub-
ject must be informed of such a right prior to giving consent and he or she may
exercise this right at his or her discretion. There should be no requirement to give
reasons for withdrawal and no risk of negative consequences over and above the
termination of any benefits which may have derived from the previously agreed
data use. Withdrawing consent should be as easy as giving it.375 There can be no free
consent if the data subject is unable to withdraw his or her consent without detri-
ment or if withdrawal is not as easy as giving consent had been.376
150
Rules of European data protection law
Under EU law, Article 6 (1) (b) of the GDPR provides another basis for legitimate pro-
cessing, namely if it is “necessary for the performance of a contract to which the
data subject is party”. This provision also covers pre-contractual relationships. For
instance, in cases where a party intends to enter into a contract, but has not yet
done so, possibly because some checks remain to be completed. If one party needs
to process data for this purpose, such processing is legitimate as long as it is “neces-
sary in order to take steps at the request of the data subject prior to entering into a
contract”.378
The notion of data processing as a “legitimate basis laid down by law” in Article 5 (2)
of Modernised Convention 108 also encompasses “data processing for the fulfil-
ment of a contract (or pre-contractual measures at the request of the data subject)
to which the data subject is party”.379
EU law sets out another ground for making data processing legitimate, namely if “it
is necessary for compliance with a legal obligation to which the controller is sub-
ject” (Article 6(1) (c) of the GDPR). This provision refers to controllers acting in both
the private and public sector; the legal obligations of public sector data controllers
can also fall under Article 6 (1) (e) of the GDPR. There are many examples of situa-
tions where the law obliges private sector controllers to process data about concrete
data subjects. For instance, employers must process data about their employees for
social security and taxation reasons, and businesses must process data about their
customers for tax purposes.
151
Handbook on European data protection law
The legal obligation can originate in Union or Member State law, which could be the
basis for one or several processing operations. It should be for the law to determine
the purpose of processing, establish specifications to determine the controller, the
type of personal data subject to processing, the data subjects concerned, the entities
to which the data can be disclosed, the purpose limitations, the storage period and
other measures to ensure lawful and fair processing.380 Any such law that is the basis
for personal data processing must comply both with Articles 7 and 8 of the Charter
and Article 8 of the ECHR.
The controller’s legal obligations also serve as a basis for legitimate data processing
under CoE law.381 As previously pointed out, the legal obligations of a private sector
controller are just one specific case of the legitimate interests of others, as men-
tioned in Article 8 (2) of the ECHR. The example on employers processing data about
their employees is, therefore, also relevant for CoE law.
Under EU law, Article 6 (1) (d) of the GDPR provides that personal data processing
is lawful if it “is necessary in order to protect the vital interests of the data subject
or of another natural person”. This legitimate ground may only be invoked for pro-
cessing personal data based on the vital interests of another natural person, if such
processing “cannot be manifestly based on another legal basis”.382 Sometimes a
type of processing may be based on the grounds of both public interest and the vital
interests of the data subject or that of another person. This is the case, for example,
when monitoring epidemics and their development, or where there is a humanitar-
ian emergency.
Under CoE law, the vital interests of the data subject are not mentioned in Article 8
of the ECHR. However, the vital interests of the data subject are considered to be
implied in the notion of ‘legitimate basis’ of Article 5 (2) of Modernised Conven-
tion 108, which deals with the legitimacy of personal data processing.383
152
Rules of European data protection law
Given the many possible ways of organising public affairs, Article 6 (1) (e) of the
GDPR provides that personal data may lawfully be processed if it “is necessary for
the performance of a task carried out in the public interest or in the exercise of offi-
cial authority vested in the controller [...]”.384
153
Handbook on European data protection law
The CJEU noted that the right of free movement of a Union citizen in a Member
State’s territory of which he or she is not a national is not unconditional
and may be subject to limitations and conditions imposed by the Treaty
Establishing the European Community and by the measures adopted to
give it effect. Thus, if it is, in principle, legitimate for a Member State to
use a register such as the AZR to support the authorities responsible for
applying the legislation relating to the right of residence, such a register
must not contain any information other than what is necessary for that
particular purpose. The CJEU concluded that such a system for processing
personal data complies with EU law if it only contains the data necessary to
apply that legislation and if its centralised nature makes the application of
that legislation more effective. The national court must ascertain whether
those conditions are satisfied in this particular case. If not, the storage and
processing of personal data in a register such as the AZR for statistical
purposes cannot, on any basis, be considered to be necessary within the
meaning of by Article 7 (e) 389 of Directive 95/46.390
Lastly, as regards the question of the use of the data contained in the
register for the purposes of fighting crime, the CJEU held that this objective
“necessarily involves the prosecution of crimes and offences committed,
irrespective of the nationality of their perpetrators”. The register at issue
does not contain personal data relating to nationals of the Member State
concerned and this difference in treatment constitutes a discrimination
prohibited by Article 18 of the TFEU. Consequently, the CJEU found that this
provision “precludes the putting in place by a Member State, for the purpose
of fighting crime, of a system for processing personal data specific to Union
citizens who are not nationals of that Member State.”391
The use of personal data by authorities acting in the public arena is also subject to
Article 8 of the ECHR and is meant to be covered, where appropriate, by Article 5 (2)
of Modernised Convention 108.392
389 Former Data Protection Directive, Art. 7 (e), now General Data Protection Regulation, Art. 6 (1) (e).
390 CJEU, C-524/06, Heinz Huber v. Bundesrepublik Deutschland [GC], 16 December 2008, paras. 54, 58–59
and 66–68.
391 Ibid., paras. 78 and 81.
392 Explanatory Report of Modernised Convention 108, paras. 46 and 47.
154
Rules of European data protection law
Under EU law, the data subject is not the only one with legitimate interests. Arti-
cle 6 (1) (f) of the GDPR provides that personal data may lawfully be processed if it
“is necessary for the purposes of the legitimate interests pursued by the controller
or by the third party or parties [except public authorities in the performance of their
tasks] to whom the data are disclosed, except where such interests are overrid-
den by the interests or fundamental rights and freedoms of the data subject which
require protection [...]”.393
In the GDPR recitals, some examples are given as to what constitutes a legitimate
interest of the data controller concerned. For instance, the processing personal data
is allowed without the data subject’s consent when it is done for direct marketing
393 Compared to Directive 95/46, the General Data Protection Regulation provides more examples of cases
that are considered to constitute a legitimate interest.
394 General Data Protection Regulation, Preamble, Recital 47.
395 Article 29 Working Party (2014), Opinion 06/2014 on the notion of legitimate interests of the data
controller under Article 7 of Directive 95/46/EC, 4 April 2014.
396 Ibid.
397 Ibid.
155
Handbook on European data protection law
purposes or when such processing is “strictly necessary for the purposes of prevent-
ing fraud”.398
In its case law, the CJEU has expanded on the test to determine what constitutes a
legitimate interest.
The Latvian referring court asked the CJEU to deliver a preliminary ruling on
whether EU data protection legislation imposes an obligation to disclose all
the personal data necessary to launch civil proceedings against the person
allegedly responsible for an administrative offence.400
The CJEU clarified that EU data protection law includes the possibility – not
an obligation – of communicating data to a third party for the purposes of
the legitimate interests pursued by that party.401 The CJEU set out three
cumulative conditions that must be fulfilled for personal data processing to be
lawful on the ‘legitimate interests’ ground.402 Firstly, the third party to whom
the data are disclosed must pursue a legitimate interest. In this specific case,
this means that requesting personal information to sue a person for causing
property damage constitutes a legitimate interest of a third party. Secondly,
the processing of personal data must be necessary for the purposes of the
legitimate interests pursued. In this case, obtaining personal information
such as the address and/or ID number is strictly necessary to identify that
person. Thirdly, the fundamental rights and freedoms of the data subject
must not take precedence over the controller’s or third parties’ legitimate
156
Rules of European data protection law
In the ASNEF and FECEMD judgment, the CJEU ruled explicitly on processing data
based on the ‘legitimate interests’ lawful ground, which at that time was enshrined
in Article 7 (f) of the Data Protection Directive.403
Example: In ASNEF and FECEMD,404 the CJEU clarified that national law is not
allowed to add conditions to those mentioned in Article 7 (f) of the Directive
for lawful processing of data.405 This referred to a situation where Spanish
data protection law contained a provision whereby other private parties could
claim a legitimate interest in processing personal data only if the information
had already appeared in public sources.
The CJEU first noted that Directive 95/46 406 is intended to ensure that the
level of protection of the rights and freedoms of individuals regarding the
processing of personal data is equivalent in all Member States. Nor must
the approximation of the national laws applicable in this area result in any
decrease of the protection they afford. It must instead seek to ensure a
high level of protection in the EU.407 Consequently, the CJEU held that “it
follows from the objective of ensuring an equivalent level of protection in
all Member States that Article 7 of Directive 95/46408 sets out an exhaustive
and restrictive list of cases in which the processing of personal data can
be regarded as being lawful”. Moreover, “Member States cannot add new
403 Former Data Protection Directive, Art. 7 (f), now General Data Protection Regulation, Art. 6 (1) (f).
404 CJEU, Joined cases C-468/10 and C-469/10, Asociación Nacional de Establecimientos Financieros de
Crédito (ASNEF) and Federación de Comercio Electrónico y Marketing Directo (FECEMD) v. Administración
del Estado, 24 November 2011.
405 Former Data Protection Directive, Art. 7 (f), now General Data Protection Regulation, Art. 6 (1) (f).
406 Former Data Protection Directive, now General Data Protection Regulation.
407 CJEU, Joined cases C-468/10 and C-469/10, Asociación Nacional de Establecimientos Financieros de
Crédito (ASNEF) and Federación de Comercio Electrónico y Marketing Directo (FECEMD) v. Administración
del Estado, 24 November 2011, para. 28. See Data Protection Directive, Recitals 8 and 10.
408 Former Data Protection Directive, Art. 7, now General Data Protection Regulation, Art. 6 (1) (f).
157
Handbook on European data protection law
Whenever personal data is processed under the ‘legitimate interests’ ground, the
individual has the right to object at any time to the processing, on grounds relating
to his or her particular situation, according to Article 21 (1) of the GDPR. The control-
ler must stop the processing, unless it demonstrates compelling legitimate grounds
to continue it.
409 Former Data Protection Directive, Art. 7, now General Data Protection Regulation, Art. 6.
410 Ibid.
411 Former Data Protection Directive, Art. 7 (f), now General Data Protection Regulation, Art. 6 (1) (f).
412 CJEU, Joined cases C-468/10 and C-469/10, Asociación Nacional de Establecimientos Financieros de
Crédito (ASNEF) and Federación de Comercio Electrónico y Marketing Directo (FECEMD) v. Administración
del Estado, 24 November 2011, paras. 40, 44 and 48–49.
158
Rules of European data protection law
159
Handbook on European data protection law
There is, however, an exhaustive list of exemptions to this prohibition, which can be
found in Article 9 (2) of the regulation and which amount to lawful grounds for pro-
cessing sensitive data. These exemptions include situations where:
• processing is necessary:
• to carry out the obligations of, and to exercise the specific rights of, the con-
troller or of the data subject in the employment, social security and social
protection context;
• to protect the vital interests of the data subject or another natural person
(when the data subject cannot give consent);
• to establish, exercise or defend legal claims or when courts act in their judi-
cial capacity;
160
Rules of European data protection law
To process special categories of data, a contractual relationship with the data subject
is thus not viewed as a legal basis for the legitimate processing of sensitive data,
except for a contract with a health professional subject to the obligation of profes-
sional secrecy.417
Under EU law, the first possible ground for lawful processing of any data, irrespec-
tive of whether they are non-sensitive or sensitive data, is the consent of the data
subject. In the case of sensitive data, such consent must be explicit. Union or Mem-
ber State law may, however, provide that the prohibition on processing special cat-
egories of data may not be lifted by the individual.418 This could be the case, for
example, when processing involves unusual risks for the data subject.
Under EU law, the prohibition of Article 9 paragraph 1 can be lifted if the process-
ing is necessary for carrying out obligations or rights of the controller or the data
subject in the field of employment or social security. However, the processing needs
to be authorised by EU law, national law or a collective agreement under national
law, which provide appropriate safeguards for the fundamental rights and interests
of the data subject.419 Employment records held by an organisation may include
sensitive personal data under certain conditions specified in the GDPR and relevant
national law. Examples of sensitive data may include trade union membership or
health information.
Under EU law, as in the case for non-sensitive data, sensitive data may be processed
because of the vital interests of the data subject or another natural person.420 Where
processing is based on the vital interests of another person, this legitimate ground
may only be invoked if such processing “cannot be manifestly based on another
legal basis”.421 In some cases, processing personal data may protect both individual
161
Handbook on European data protection law
and public interests, for instance when processing is necessary for humanitarian
purposes.422
For the processing of sensitive data to be legitimate on this basis, it would have to
be impossible to ask the data subject for consent, because, for example, the data
subject was unconscious or was absent and could not be reached. In other words,
the person was physically or legally incapable of giving consent.
Processing personal data is also allowed in the course of the legitimate activities of
foundations, associations or other non-profit-seeking bodies with a political, philo-
sophical, religious or trade union aim. However, the processing must relate solely
to the members or former members of the body, or to those who have regular con-
tact with the body.423 The sensitive data cannot be disclosed outside of those bodies
without the data subject’s consent.
The fact that the data subject had made public the processed personal data does not
exempt controllers from their obligations under data protection law. For instance,
422 Ibid.
423 Ibid., Art. 9 (2) (d).
162
Rules of European data protection law
the principle of purpose limitation continues to apply to personal data even if such
data have been made publicly available.424
Legal claims
The processing of special categories of data which “is necessary for the establish-
ment, exercise or defence of legal claims”, whether in court proceedings or in an
administrative or out-of-court procedure,425 is also allowed under the GDPR.426 In this
case, processing must be relevant to a specific legal claim and its exercise or defence
respectively, and may be requested by any one of the disputing parties.
When acting in their judicial capacity, courts may process special categories of data
within the context of resolving a legal dispute.427 Examples of these special catego-
ries of data processed in this context could include for example, genetic data when
establishing parentage, or health status when part of the evidence concerns details
of an injury sustained by a victim of crime.
According to Article 9 (2) (g) of the GDPR, Member States may introduce further cir-
cumstances in which sensitive data may be processed, as long as:
• the European or national law is proportionate, respects the right to data protec-
tion and provides suitable and specific measures to safeguard the rights and
interests of the data subject.428
A prominent example are electronic health file systems. Such systems permit health
data, collected by health care providers in the course of treating a patient, to be
424 Article 29 Working Party (2013), Opinion 3/13 on purpose limitation, WP 203, Brussels, 2 April 2013, p. 14.
425 General Data Protection Regulation, Preamble Recital 52.
426 Ibid., Art. 9 (2) (f).
427 Ibid.
428 Ibid., Art. 9 (2) (g).
163
Handbook on European data protection law
made available to other health care providers of this patient on a large scale, usually
nationwide.
The Article 29 Working Party concluded that the establishment of such systems
could not occur under existing legal rules for processing data about patients.429 How-
ever, it is possible for electronic health file systems to exist if they are based on “rea-
sons of substantial public interest”.430 This would require an explicit legal basis for
their establishment, which would also contain the necessary safeguards to ensure
that the system is run securely.431
The GDPR provides that sensitive data can be processed where processing is neces-
sary for:432
• reasons of public interest in the area of public health, such as protecting against
serious cross-border threats to health, or ensuring high standards of quality and
safety of health care and of medicinal products or medical devices, on the basis
of EU or Member State law. The law must provide for suitable and specific meas-
ures to safeguard the rights of the data subject;
429 Article 29 Working Party (2007), Working Document on the processing of personal data relating to
health in electronic health records (EHR), WP 131, Brussels, 15 February 2007. See also General Data
Protection Regulation, Art. 9 (3).
430 General Data Protection Regulation, Art. 9 (2) (g).
431 Article 29 Working Party (2007), Working Document on the processing of personal data relating to
health in electronic health records (EHR), WP 131, Brussels, 15 February 2007.
432 General Data Protection Regulation, Art. 9 (2) (h), (i) and (j).
164
Rules of European data protection law
The GDPR also allows Member States to introduce or maintain additional conditions,
including limitations for processing genetic, biometric and health-related data.433
• The rules on security of processing obligate the controller and the processor to imple-
ment appropriate technical and organisational measures to prevent any unauthorised
interference with data processing operations.
• the security features available in the market for any particular type of processing;
• the costs;
• the risks of processing the data for fundamental rights and freedoms of data
subjects.
Under both EU and CoE law, controllers have the general obligation to be transpar-
ent and accountable when processing personal data, and, in particular, about data
breaches where such breaches occur. In case of personal data breaches, control-
lers must notify the supervisory authorities, unless the breach is unlikely to result
in a risk to the rights and freedoms of natural persons. Data subjects should also be
informed about the personal data breach when it is likely to result in a high risk to
the rights and freedoms of natural persons.
“Taking into account the state of the art, the costs of implementation and
the nature, scope, context and purposes of processing, as well as the risk
165
Handbook on European data protection law
of varying likelihood and severity for the rights and freedoms of natural
persons, the controller and the processor shall implement appropriate
technical and organisational measures to ensure a level of security
appropriate to the risk [...].”434
• ensuring that the processing system and service maintain confidentiality, integ-
rity, availability and resilience;436
• restoring the availability of and access to personal data in the event of data loss
in a timely manner;437
• a process for testing, assessing and evaluating the effectiveness of the meas-
ures to ensure the security of processing.438
“Each Party shall provide that the controller and, where applicable, the
processor takes appropriate security measures against risks such as
accidental or unauthorised access to, destruction, loss, use, modification or
disclosure of personal data.”439
Under EU and CoE law, a data breach that may have an impact on the rights and
freedoms of individuals obliges the controller to notify the supervisory authority of
the breach (see Section 4.2.3).
Often, there are also industrial, national and international standards which have
been developed for safe data processing. The European Privacy Seal (EuroPriSe),
for instance, is an eTEN (Trans-European Telecommunications Networks) project of
166
Rules of European data protection law
Data security is not just achieved by having the right equipment – hardware and
software – in place. It also requires appropriate internal organisational rules. Such
internal rules would ideally cover the following issues:
• regular provision of information to all employees about data security rules and
their obligations under data protection law, especially regarding their confidenti-
ality obligations;
• use of personal data only according to the instructions of the competent person
or according to generally laid down rules;
• ensuring that authorisations to access personal data have been assigned by the
competent person and require proper documentation;
440 Regulation (EC) No. 526/2013of the European Parliament and of the Council of 21 May 2013 concerning
the European Union Agency for Network and Information Security (ENISA) and repealing Regulation (EC)
No. 460/, OJ 2013 L 165.
441 For example, ENISA, (2016), Cyber Security and Resilience of smart cars. Good practices and
recommendations; ENISA (2016), Security of Mobile Payments and Digital Wallets.
167
Handbook on European data protection law
Offering adequate data security training and education to staff members is also an
important element of effective security precautions. Verification procedures must
also be put in place to ensure that appropriate measures not only exist on paper but
are implemented and work in practice (such as internal or external audits).
Measures for improving the security level of a controller or processor include instru-
ments such as personal data protection officials, security education of employees,
regular audits, penetration tests and quality seals.
Example: In I v. Finland,442 the applicant was unable to prove that her health
records had been accessed illegitimately by other employees of the hospital
where she worked. Her claim of a violation of her right to data protection
was, therefore, rejected by the domestic courts. The ECtHR concluded that
there had been a violation of Article 8 of the ECHR, as the hospital’s register
system for health files “was such that it was not possible to retroactively
clarify the use of patient records as it revealed only the five most recent
consultations and that this information was deleted once the file had been
returned to the archives”. For the Court, it was decisive that the records
system in place in the hospital had clearly not been in accordance with the
legal requirements contained in domestic law, a fact that was not given due
weight by the domestic courts.
The EU has put in place the Directive on security of network and information sys-
tems (the NIS Directive),443 which is the first EU-wide legal instrument on cybersecu-
rity. The Directive aims to improve cybersecurity at national level on the one hand,
and to increase the level of cooperation within the EU on the other. It also imposes
obligations on operators of essential services (including operators in the sectors of
energy, health, banking, transport, digital infrastructure, etc.) and digital services
providers to manage risks, ensure the security of their network and information sys-
tems, and report security incidents.
168
Rules of European data protection law
Outlook
4.2.2. Confidentiality
Under EU law, the GDPR recognises confidentiality of personal data as part of a gen-
eral principle.445 Providers of publicly available electronic communications services
need to ensure confidentiality. They are also under obligation to safeguard the secu-
rity of their services.446
The duty to keep clients’ data confidential requires that the employee apply
at least minimum security measures before disclosing personal data. This
could be done, for example, by offering to return the call to a telephone
number documented in the client’s file.
444 Proposal for a Regulation of the European Parliament and of the Council on ENISA, the “EU Cybersecurity
Agency”, and repealing Regulation (EU) 526/2013, and on Information and Communication Technology
cybersecurity certification (Cybersecurity Act), COM(2017)477, 13 September 2017, p. 6.
445 General Data Protection Regulation, Art. 5 (1) (f).
446 Directive on privacy and electronic communications, Art. 5 (1).
169
Handbook on European data protection law
By virtue of Article 32, the controller and the processor must implement techni-
cal and organisational measures to ensure a high level of security. Such measures
include, among others, the pseudonymisation and encryption of personal data, the
ability to ensure the ongoing confidentiality, integrity, availability and resilience of
the processing, the evaluation and testing of the effectiveness of the measures, and
the ability to restore the processing in the event of a physical or technical incident.
Additionally, adherence to an approved code of conduct or an approved certifica-
tion mechanism may be used as an element to demonstrate compliance with the
principle of integrity and confidentiality. In addition, according to Article 28 of the
GDPR, the contract binding the controller to the processor must stipulate that the
processor ensures that persons authorised to process the personal data have com-
mitted themselves to confidentiality or are under an appropriate statutory obligation
of confidentiality.
The duty of confidentiality does not extend to situations where data come to the
knowledge of a person in his or her capacity as a private individual and not as an
employee of a controller or processor. In this case, Articles 32 and 28 of the GDPR
do not apply, as the use of personal data by private individuals is completely exempt
from the regulation’s remit where such use falls within the boundaries of the so-
called household exemption.447 The household exemption is the use of personal data
“by a natural person in the course of purely personal or household activity”.448 Since
the CJEU’s decision in the case of Bodil Lindqvist,449 this exemption must, however,
be interpreted narrowly, especially regarding data disclosure. Particularly, the house-
hold exemption will not extend to the publication of personal data to an unlimited
number of recipients on the internet, or to data processing that has professional
or commercial aspects (for more details on the case, see Sections 2.1.2, 2.2.2 and
2.3.1).
170
Rules of European data protection law
any persons other than users, or without the consent of the users, from listening,
tapping, storage or other kinds of interception or surveillance of communications
and the related metadata.450 National law may authorise exceptions from this princi-
ple only for reasons of national security, defence, prevention or detection of crimes,
and only if such measures are necessary and proportionate for the aims pursued.451
The same rules will apply under the future e-Privacy Regulation, yet the scope of
the legal act on e-Privacy will be extended from publicly available electronic com-
munications services to also cover communications done through over-the-top ser-
vices (such as mobile applications).
Under CoE law, the obligation of confidentiality is implied in the notion of data secu-
rity in Article 7 (1) of Modernised Convention 108, which deals with data security.
For processors, confidentiality means that they may not disclose the data to third
parties or other recipients without authorisation. For the employees of a controller
or processor, confidentiality requires that they use personal data only according to
the instructions of their competent superiors.
171
Handbook on European data protection law
Data breaches can be very detrimental to the privacy and data protection rights
of individuals who, as a result of the breach, lose control over their personal data.
Breaches may lead to identity theft or fraud, financial loss or material damages, loss
of confidentiality of personal data protected by professional secrecy, and damage
to the data subject’s reputation. In its Guidelines on Personal data breach notifica-
tion under Regulation 2016/679, the Article 29 Working Party explains that breaches
may have three types of impact on personal data: disclosure, loss, and/or altera-
tion.453 In addition to the obligation to take measures to ensure the security of pro-
cessing, as explained in Section 4.2, it is equally important to ensure that when
breaches occur, controllers address them in an appropriate and timely manner.
Under the CoE Modernised Convention 108, Contracting Parties must, as a minimum,
require controllers to notify the competent supervisory authority of data breaches
that may seriously interfere with the rights of the data subjects. Such notification
should be completed ‘without delay’.454
EU law establishes a detailed regime regulating the timing and content of the noti-
fications.455 Accordingly, controllers must notify certain data breaches to the super-
visory authorities without undue delay and, where feasible, within 72 hours of the
moment they become aware of the breach. If they exceed the 72-hour timeframe,
the notification needs to be accompanied with an explanation for the delay. Control-
lers are exempt from the notification requirement only where they are able to dem-
onstrate that the data breach is unlikely to result in a risk to the rights and freedoms
of the individuals concerned.
453 Article 29 Working Party (2017), Guidelines on Personal data breach notification under Regulation
2016/679, WP250, 3 October 2017, p. 6.
454 Modernised Convention 108, Art. 7 (2); Explanatory Report of Modernised Convention 108,
paras. 64-66.
455 General Data Protection Regulation, Art. 33 and 34.
172
Rules of European data protection law
If a data breach is likely to cause high risks to the rights and freedoms of individuals,
controllers must inform these individuals (the data subjects) of the breach without
undue delay.457 The information to the data subjects, including the description of the
data breach, must be drafted in clear and plain language, and include information
similar to that required for notifications to supervisory authorities. In certain circum-
stances, controllers may be exempt from the obligation to notify data subjects of
such breaches. Exemptions apply where the controller has implemented appropriate
technical and organisational protection measures, and those measures were applied
to the personal data affected by the personal data breach, in particular those that
render the personal data unintelligible to any person who is not authorised to access
it, such as encryption. Action taken by the controller after the breach to ensure that
the harm to the rights of data subjects will no longer materialise may also exempt
the controller from the obligation to notify the data subjects. Finally, if notifica-
tion entails disproportionate effort on behalf of the controller, data subjects can be
informed about the breach through other means, such as a public communication or
similar measures.458
The obligation to notify data breaches to the supervisory authorities and data sub-
jects is addressed to controllers. However, data breaches may occur irrespective of
whether processing is carried out by a controller or processor. For this reason, it is
essential to ensure that processors are also required to report data breaches. In this
case, processors must notify data breaches to the controller without undue delay.459
The controller is then responsible for notifying the supervisory authorities and the
data subjects affected, subject to the aforementioned rules and timeframe.
173
Handbook on European data protection law
• The General Data Protection Regulation sets out several instruments for promoting
compliance:
• codes of conduct for controllers and processors specifying the application of the
regulation in various processing sectors;
• CoE law proposes similar instruments for promoting compliance in Modernised Con-
vention 108.
174
Rules of European data protection law
Contrary to CoE law, in the EU, the appointment of a DPO is not always at the dis-
cretion of controllers and processors but is mandatory in certain conditions. The
GDPR recognises the DPO as playing a key role in the new governance system and
includes detailed provisions regarding the officer’s appointment, position, duties and
tasks.461
The GDPR makes appointing a DPO mandatory in three specific cases: where a pub-
lic authority or body carries out the processing; where the controller’s or proces-
sor’s core activities consist of processing operations which require the regular and
systematic monitoring of data subjects on a large scale or where the core activities
consist of large-scale processing of special categories of data or personal data relat-
ing to criminal convictions and offences.462 Even though terms such as ‘systematic
monitoring on a large scale’ and ‘core activities’ are not defined in the regulation, the
Article 29 Working Party has issued guidelines on how they should be interpreted.463
175
Handbook on European data protection law
Additionally, Article 37 (4) of the GDPR provides that in cases other than the three
mandatory ones required under Article 37 (1), the controller, processor or associations
and other bodies representing categories of controllers or processors may, or where
required by Union or Member State law shall, designate a data protection officer.
All other organisations are not legally obliged to designate a DPO. However, the GDPR
provides that controllers and processors may choose to voluntarily designate a DPO,
while also allowing the possibility for Member States to make such designation man-
datory for more types of organisations than those foreseen under the regulation.464
Once a controller appoints a DPO, they must ensure that he or she “is involved, prop-
erly and in a timely manner, in all issues which relate to the protection of personal
data” within the organisation.465 For instance, DPOs should be involved in provid-
ing advice on carrying out data protection impact assessments, and in creating
and keeping records of processing activities in an organisation. To enable DPOs to
176
Rules of European data protection law
effectively carry out their tasks, controllers and processors must provide them with
the necessary resources, including financial resources, infrastructure and equipment.
Additional requirements, include providing DPOs with sufficient time to fulfil their
functions and continuous training to enable them to develop their expertise and stay
up to date with all developments in data protection law.466
The GDPR establishes some basic guarantees to ensure that DPOs act in an inde-
pendent manner. Controllers and processors must ensure that in exercising their
tasks related to data protection, DPOs do not receive any instructions from the com-
pany, including persons at the highest management level. In addition, they must not
be dismissed or penalised in any way for performing their tasks.467 Take, for exam-
ple, a case where the DPO advises a controller or processor to conduct a data protec-
tion impact assessment because he or she considers that the processing is likely to
result in high risk for data subjects. The company disagrees with the DPO’s advice,
does not consider it to be well-founded and consequently decides not to proceed
with an impact assessment. The company can ignore the advice but cannot dismiss
or penalise the DPO for providing it.
Finally, the tasks and duties of DPOs are detailed in Article 39 of the GDPR. These
include the requirements to inform and advise the companies and employees carry-
ing out the processing of their obligations pursuant to the legislation and to monitor
compliance with EU and national data protection rules, through carrying out audits
and training staff involved in processing operations. DPOs must also cooperate
with the supervisory authority and act as the contact point for the latter on matters
related to data processing, such as, for instance, a data breach.
466 Article 29 Working Party (2017), Guidelines on Data Protection Officers (‘DPOs’), WP 243 rev.01, last
revised and adopted 5 April 2017, para. 3.1.
467 General Data Protection Regulation, Art. 38 (2) and (3).
468 See Art. 24 (1) of Regulation (EC) No. 45/2001 for the complete list of tasks of DPOs.
177
Handbook on European data protection law
with the necessary staff and resources.469 DPOs must be notified before an EU insti-
tution or body (or of departments of these organisations) carries out any processing
operations and they must keep a register of all notified processing operations.470
• name and contact details of the controller, and of the joint controller, the control-
ler’s representative and the DPO, where applicable;
• where possible, the time limits foreseen for the deletion of the different catego-
ries of personal data, as well as an overview of the technical measures adopted
to ensure the security of processing.472
178
Rules of European data protection law
The obligation to keep records of processing activities under the GDPR concerns not
only controllers, but also processors. This is an important development as, prior to
the adoption of the regulation, the contract concluded between the controller and
the processor primarily covered the processor’s obligations. Their record-keeping
obligation is now directly foreseen under law.
The GDPR provides for an exception from this obligation. The requirement to keep
records does not apply to an enterprise or organisation (controller or processor)
which employs fewer than 250 persons. The exception is, however, subject to the
requirements that the organisation concerned does not undertake processing likely
to result in a risk to the rights and freedoms of data subjects, that processing is only
occasional and that it does not include special categories of data as referred to in
Article 9 (1) or personal data relating to criminal convictions and offences referred to
in Article 10.
Data protection impact assessments are foreseen under both CoE and EU law. In the
CoE legal framework, Article 10 (2) of Modernised Convention 108 requires Con-
tracting Parties to ensure that controllers and processors “examine the likely impact
179
Handbook on European data protection law
of intended data processing on the rights and fundamental freedoms of data sub-
jects prior to the commencement of such processing” and, following the assess-
ment, design the processing in such a manner as to prevent or minimise the risks
linked to the processing.
EU law imposes a similar, more detailed, obligation on controllers falling within the
scope of the GDPR. Article 35 provides that an impact assessment must be car-
ried out where processing is likely to result in a high risk to the rights and freedoms
of individuals. The regulation does not define how the likelihood of risk is to be
assessed but, rather, indicates what those risks might be.473 It contains a list of pro-
cessing operations considered high risk and for which a prior impact assessment is
particularly necessary, namely in cases where:
• personal data are processed for making decisions concerning natural persons,
following any systematic and extensive evaluation of personal aspects relating
to the individuals (profiling);
• sensitive data or personal data relating to criminal convictions and offences are
processed on a large scale;
The supervisory authorities must adopt and publish a list of the kind of processing
operations that need to be subject to impact assessments. They may also establish a
list of processing operations exempted from this obligation.474
Where an impact assessment is required, controllers must assess the necessity and
proportionality of the processing and the possible risks to the rights of individuals.
The impact assessment must also contain the planned security measures to address
the risks identified. To establish the lists, the Member States’ supervisory authori-
ties are required to cooperate with each other and with the European Data Protec-
tion Board. This will ensure a consistent approach across the EU to those operations
requiring an impact assessment and controllers will face similar requirements irre-
spective of their location.
180
Rules of European data protection law
If, following an impact assessment, it appears that the processing will result in high
risk for the rights of individuals and no measures were introduced to mitigate the
risk, the controller must consult the relevant supervisory authority before starting
the processing operation.475
The Article 29 Working Party has issued guidelines on data protection impact
assessments and how to determine whether or not processing is likely to result in
high risk.476 It developed nine criteria to help to determine whether a data protec-
tion impact assessment is required in a specific case:477 (1) evaluation or scoring;
(2) automated decision-making with legal or similar significant effect; (3) systematic
monitoring; (4) sensitive data; (5) data processed on a large scale; (6) datasets that
have been matched or combined; (7) data concerning vulnerable data subjects; (8)
innovative use or applying technological or organisational solutions; (9) when the
processing in itself “prevents data subjects from exercising a right or using a service
or a contract”. The Article 29 Working Party introduced the rule of thumb that pro-
cessing operations which meet fewer than two criteria pose lower risk levels and do
not require a data protection assessment, whereas those which meet two or more
criteria will require such an assessment. In cases where it is unclear whether a data
protection impact assessment is required, the Article 29 Working Party recommends
carrying out such an assessment because it is “a useful tool to help data control-
lers comply with data protection law”.478 Where a new data processing technology is
introduced, it is important that a data protection impact assessment is carried out.479
475 Ibid., Art. 36 (1); Article 29 Working Party (2017), Guidelines on Data Protection Impact Assessment
(DPIA) and determining whether processing is “likely to result in high risk” for the purposes of
Regulation 2016/679, WP 248 rev.01, Brussels, 4 October 2017.
476 Article 29 Working Party (2017), Guidelines on Data Protection Impact Assessment (DPIA) and
determining whether processing is “likely to result in high risk” for the purposes of Regulation
2016/679, WP 248 rev.01, Brussels, 4 October 2017.
477 Ibid., pp. 9–11.
478 Ibid., p. 9.
479 Ibid.
181
Handbook on European data protection law
To ensure that the codes of conduct comply with the rules established under the
GDPR, the codes must be submitted to the competent supervisory authority before
being adopted. The supervisory authority then provides an opinion on whether the
draft code provided furthers compliance with the regulation and, if it finds that the
code provides appropriate safeguards, it approves the code.481 Supervisory authori-
ties must publish the approved codes of conduct as well as the criteria upon which
their approval was based. Where a draft code of conduct relates to processing activi-
ties in several Member States, the competent supervisory authority, before approv-
ing the draft code, amendment or extension, shall submit the code to the European
Data Protection Board which shall provide an opinion on the compliance of the code
with the GDPR. The Commission may, by way of implementing acts, decide that the
approved code of conduct submitted to it has general validity within the Union.
182
Rules of European data protection law
Under CoE law, Modernised Convention 108 provides that the level of data protec-
tion guaranteed by national law may be usefully reinforced by voluntary regulation
measures, such as codes of good practice or codes of professional conduct. How-
ever, these only constitute voluntary measures under Modernised Convention 108:
one cannot derive any legal obligation to put such measures in place, although it is
advisable, and such measures are not, by themselves, sufficient to ensure full com-
pliance with the convention.483
4.3.5. Certification
In addition to codes of conduct, certification mechanisms and data protection seals and
marks are another means by which controllers and processors can demonstrate com-
pliance with the GDPR. To this end, the regulation provides for a voluntary certification
system, whereby certain bodies or supervisory authorities may issue certifications.
Controllers and processors opting to adhere to a certification mechanism may gain
more visibility and credibility, as certifications, seals and marks allow data subjects to
quickly assess an organisations’ level of protection for data processing. Importantly,
the fact that a controller or processor possesses such a certification does not reduce its
duties and responsibilities to comply with all the requirements of the regulation.
EU law requires that controllers put in place measures to effectively implement data
protection principles and to integrate the necessary safeguards to meet the require-
ments of the regulation and protect the rights of data subjects.484 These measures
should be implemented both at the time of processing and when determining the
means for processing. In implementing these measures, the controller needs to take
into account the state of the art, the costs of implementation, the nature, scope and
purposes of personal data processing and the risks and severity for the rights and
freedoms of the data subject.485
183
Handbook on European data protection law
CoE law requires that controllers and processors assess the likely effect of process-
ing personal data on the rights and freedoms of the data subjects before beginning
the processing. In addition, controllers and processors are obliged to design the data
processing in such a way as to prevent or minimise the risk of interference with
those rights and freedoms, and implement technical and organisational measures
which take into account the implications of the right to the protection of personal
data at all stages of the data processing.486
CoE law requires that controllers and processors implement technical and organi-
sational measures to consider the implications of the right to data protection, and
implement technical and organisational measures which take into account the
implications of the right to the protection of personal data at all stages of the data
processing.489
486 Modernised Convention 108, Art. 10 (2) and (3), Explanatory Report of Modernised Convention 108,
para 89.
487 General Data Protection Regulation, Art. 25 (2).
488 European Data Protection Supervisor (EDPS), (2017), Necessity Toolkit, Brussels, 11 April 2017.
489 Modernised Convention 108, Art. 10 (3), Explanatory Report of Modernised Convention 108, para. 89.
490 ENISA, PETs controls matrix: A systematic approach for assessing online and mobile privacy tools,
20 December 2016.
184
Rules of European data protection law
are difficult to implement in practice may have very low adoption levels by the gen-
eral public, even if they offer very strong privacy guarantees. Additionally, the crite-
rion of the maturity and stability of the privacy tool – meaning the way that a tool
evolves over time and responds to existing or new challenges related to privacy –
is of crucial importance. Other privacy enhanced technologies, for example, in the
context of secure communications, include end-to-end encryption (communication
where the only people who can read the messages are the people communicat-
ing); client-server encryption (encrypting the communication channel established
between a client and a server); authentication (verification of communicating par-
ties’ identities); and anonymous communication (no third party can identify the
communicating parties).
185
5
Independent supervision
187
Handbook on European data protection law
Key points
• Supervisory authorities must act with complete independence, which must be guaran-
teed by the founding law and reflected in the specific organisational structure of the
supervisory authority.
• Supervisory authorities have specific powers and tasks. These include, among others,
to:
• advise data subjects and controllers as well as the government and the public at
large;
• hear complaints and assist data subjects with alleged violations of data protection
rights;
• As personal data processing often involves controllers, processors and data subjects
located in different states, supervisory authorities are required to cooperate with one
another on cross-border issues to ensure the effective protection of individuals in
Europe.
188
Independent supervision
authority – of the main or single establishment – will consult and submit its draft deci-
sion with the other concerned supervisory authorities.
• Similarly to the current Article 29 Working Party, the supervisory authority of each
Member State and the European Data Protection Supervisor (EDPS) will be part of the
European Data Protection Board.
• The tasks of the European Data Protection Board include, for example, monitoring the
correct application of the regulation, advising the Commission on relevant issues, and
issuing opinions, guidelines or best practices on a variety of topics.
• The main difference is that the European Data Protection Board will not only issue
opinions, as under Directive 95/46/EC. It will also issue binding decisions regarding
cases where a supervisory authority has raised a relevant and reasoned objection in
cases of one-stop-shops; where there are conflicting views on which of the supervi-
sory authorities is the lead; and, finally, where the competent supervisory authority
does not request or does not follow the opinion of the EDPB. The objective is to ensure
a consistent application of the regulation throughout the Member States.
The importance of independent supervision for data protection law has also been
acknowledged in case law.
Example: In Schrems,491 the CJEU was concerned with whether or not the
forwarding of personal data to the United States (US) under the first EU-
US Safe Harbour Agreement was in accordance with EU data protection
law, in light of Edward Snowden’s revelations on the US National Security
Agency’s conduct of mass surveillance. The transfer of personal data to the
US was based on a European Commission decision adopted in 2000, which
allowed personal data to be transferred from the EU to US organisations that
491 CJEU, C-362/14, Maximilliam Schrems v. Data Protection Commissioner [GC], 6 October 2015.
189
Handbook on European data protection law
self-certify under the Safe Harbour scheme, on the basis that the scheme
ensures an adequate level of protection of personal data. When requested
to investigate the applicant’s complaint as to the legality of data transfers
after the Snowden revelations, the Irish supervisory authority rejected the
complaint on the ground that the existence of the Commission decision
on the adequacy of the US data protection regime reflected in the Safe
Harbour principles (the ‘Safe Harbour Decision’), prevented it from further
investigating the complaint.
The CJEU, however, held that the existence of a Commission decision allowing
data transfers to third countries that ensure adequate levels of protection
does not eliminate or reduce the powers of national supervisory authorities.
The CJEU noted that the powers of these authorities to monitor and ensure
compliance with EU rules on data protection derive from the primary law of
the EU, in particular Article 8 (3) of the Charter and Article 16 (2) of the TFEU.
“The establishment of independent supervisory authorities is therefore […]
an essential component of the protection of individuals with regard to the
processing of personal data.”492
The CJEU therefore decided that even where the transfer of personal data
has been subject to a Commission adequacy decision, where a complaint is
lodged with a national supervisory authority, the authority must examine the
complaint with diligence. The supervisory authority may reject the complaint
if it finds that it is unfounded. In such a case, the CJEU emphasised that the
right to an effective judicial remedy requires that individuals must be able
to challenge such a decision before the national courts, who may refer the
matter to the CJEU for a preliminary ruling on the validity of the Commission
decision. Where the supervisory authority considers the complaint well-
founded, it must be able to engage in legal proceedings and bring the matter
before the national courts. The national courts may refer the case to the CJEU,
as it is the only body with the power to decide the validity of a Commission
adequacy decision.493
The CJEU then examined the validity of the Safe Harbour Decision to
establish whether or not the transfers system was in accordance with EU
data protection rules. It found that Article 3 of the Safe Harbour Decision
492 CJEU, C-362/14, Maximillian Schrems v. Data Protection Commissioner [GC], 6 October 2015, para. 41.
493 Ibid., paras. 53–66.
190
Independent supervision
5.1. Independence
EU law and CoE law require each supervisory authority to act with complete inde-
pendence in performing its tasks and when exercising its powers.496 The independ-
ence of the supervisory authority and its members, as well as of staff from direct
or indirect external influences, is fundamental in guaranteeing full objectivity when
deciding on data protection matters. Not only must the law underpinning a super-
visory body’s creation contain provisions specifically guaranteeing independence,
but the organisational structure of the authority must demonstrate independence.
In 2010, the CJEU – for the first time – examined the extent to which data protection
supervisory authorities are required to be independent.497 The highlighted examples
illustrate the CJEU’s definition of the meaning of ‘complete independence’.
191
Handbook on European data protection law
The CJEU underlined that the words ‘with complete independence’ must be
interpreted based on the actual wording of that provision and on the aims and
scheme of EU Data Protection law.499 The CJEU stressed that the supervisory
authorities are ‘the guardians’ of rights related to personal data processing.
Thus, their establishment in Member States is considered “as an essential
component of the protection of individuals with regard to the processing of
personal data”.500 The CJEU concluded that “when carrying out their duties,
the supervisory authorities must act objectively and impartially. For that
purpose, they must remain free from any external influence, including the
direct or indirect influence by public authorities”.501
The CJEU also held that the meaning of ‘complete independence’ should be
interpreted in light of the independence of the EDPS as defined in the EU
Institutions Data Protection Regulation. In this regulation, the concept of
independence requires that the EDPS may neither seek nor take instructions
from anybody.
498 CJEU, C-518/07, European Commission v. Federal Republic of Germany [GC], 9 March 2010, para. 27.
499 Ibid., paras. 17 and 29.
500 Ibid., para. 23.
501 Ibid., para. 25.
502 CJEU, C-614/10, European Commission v. Republic of Austria [GC], 16 October 2012, paras. 59 and 63.
192
Independent supervision
The notion and criteria of ‘complete independence’ are now explicitly provided in
the GDPR, which incorporates the principles established through the described CJEU
judgments. Pursuant to the regulation, complete independence in performing their
tasks and exercising their powers entails that:504
• the members of each supervisory authority must remain free from external
influence – direct or indirect – and must not take instructions from anybody;
• the members of each supervisory authority must refrain from any action incom-
patible with their duties, to prevent conflicts of interest;
• Member States must provide each supervisory authority with the necessary
human, technical and financial resources and infrastructure for the effective per-
formance of their tasks;
• Member States must ensure that each supervisory authority chooses its own
staff;
503 CJEU, C-288/12, European Commission v. Hungary [GC], 8 April 2014, paras. 50 and 67.
504 General Data Protection Regulation, Art. 69.
193
Handbook on European data protection law
The supervisory authority is the main body in national law that ensures compliance
with EU Data Protection law. Supervisory authorities have a comprehensive cata-
logue of tasks and powers beyond monitoring, which include proactive and preven-
tive supervision activities. To carry out these tasks, supervisory authorities must
have appropriate investigative, corrective and advisory powers as enumerated in
Article 58 of the GDPR, such as to:507
194
Independent supervision
• require the submission of any information relevant for the supervision of control-
ler activities;
To exercise its functions, a supervisory authority must have access to all personal
data and information necessary for an enquiry, as well as access to any premises in
which a controller keeps relevant information. According to the CJEU, the powers of
the supervisory authority must be interpreted broadly to ensure full effectiveness of
data protection for data subjects in the EU.
Example: In Schrems, the CJEU was concerned with whether the transfer of
personal data to the US under the first EU-US Safe Harbour Agreement was
in accordance with EU data protection law, in light of the revelations made
by Edward Snowden. The CJEU’s reasoning held that national supervisory
authorities – acting in their capacity as independent monitors of data
processing by controllers – can prevent personal data from being transferred
to a third country despite the existence of an adequacy decision if there is
reasonable evidence that the adequate protection is no longer guaranteed
in the third country.508
508 CJEU, C-362/14, Maximilian Schrems v. Data Protection Commissioner [GC], 6 October 2015,
paras. 26–36 and 40–41.
195
Handbook on European data protection law
196
Independent supervision
With the adoption of the GDPR, detailed rules are now in place regarding the com-
petence of supervisory authorities in cross-border cases. The regulation establishes
a ‘one-stop-shop mechanism’ and includes provisions mandating cooperation
between different supervisory authorities. For effective cooperation in cross-bor-
der cases, the GDPR requires a lead supervisory authority to be established as the
supervisory authority of the controller’s or processor’s main establishment or sin-
gle establishment.510 The lead supervisory authority is in charge of cross-border
cases, is the controller’s or processor’s sole interlocutor and coordinates coopera-
tion with other supervisory authorities to reach consensus. The cooperation includes
exchanging information, mutually assisting with monitoring and investigating and
adopting binding decisions.511
In CoE law, the supervisory authorities’ competences and powers are provided in
Article 15 of Modernised Convention 108. These powers correspond to those given
to supervisory authorities under EU law, including powers of investigation and inter-
vention, powers to issue decisions and impose administrative sanctions regarding
violations of the provisions of the convention, and powers to engage in legal pro-
ceedings. Independent supervisory authorities also have the competence to deal
with requests and complaints lodged by data subjects, to raise public awareness of
data protection law and to provide advice to national decision makers for any legis-
lative or administrative measures which provide for personal data processing.
5.3. Cooperation
The GDPR establishes a general framework for cooperation between supervisory
authorities and provides more specific rules on the cooperation of supervisory
authorities in cross-border activities of data processing.
Under the GDPR supervisory authorities shall provide mutual assistance and
share relevant information to implement and apply the regulation in a consistent
197
Handbook on European data protection law
manner.512 This includes the requested supervisory authority carrying out consul-
tations, inspections and investigations. Supervisory authorities can carry out joint
operations, including joint investigations and joint enforcement measures whereby
staff of all supervisory authorities are involved.513
Identifying the lead authority entails determining the location of the main estab-
lishment of a business in the EU. The term ‘main establishment’ is defined in the
GDPR. In addition, the Article 29 Working Party has issued guidelines for identifying
a controller or processor’s lead supervisory authority, which include the criteria for
identifying the main establishment. 514
To ensure a high level of data protection throughout the EU, the lead supervisory
authority does not act alone. It must cooperate with the other supervisory authori-
ties concerned to adopt decisions on personal data processing by controllers and
processors, in an endeavour to reach consensus and ensure consistency. Coopera-
tion among the relevant supervisory authorities includes exchanging information,
mutually assisting each other, conducting joint investigations and monitoring activi-
ties.515 When providing mutual assistance to each other, supervisory authorities
198
Independent supervision
must accurately deal with information requests made by other supervisory authori-
ties and exercise supervisory measures, such as, for example, prior authorisations
and consultations with the data controller on its processing activities, inspections or
investigations. Mutual assistance to supervisory authorities in other Member States
must be provided on request without undue delay and no later than one month
after receiving the request.516
Where the controller has establishments in multiple Member States, the supervisory
authorities can conduct joint operations including investigations and enforcement
measures in which staff members of the supervisory authorities of other Member
States are involved.517
The GDPR established the EDPB as an EU body with legal personality.520 It is the
successor to the Article 29 Working Party,521 which the Data Protection Directive
established to advise the Commission on any EU measures affecting the rights of
199
Handbook on European data protection law
individuals regarding personal data processing and privacy, to promote the uniform
application of the directive, and to provide expert opinion to the Commission on data
protection related matters. The Article 29 Working Party consisted of representa-
tives of EU Member State supervisory authorities, together with representatives
from the Commission and the EDPS.
Similar to the Working Party, the EDPB comprises the heads of the supervisory
authorities of each Member State and the EDPS, or their representatives.522 The EDPS
enjoys equal voting rights, with the exception of cases related to dispute resolution,
where it may vote only on decisions concerning principles and rules applicable to EU
institutions which correspond in substance with those of the GDPR. The Commission
has the right to participate in the EDPB’s activities and meetings, but does not have
voting rights.523 The Board elects a Chair (who is entrusted with its representation)
and two Deputy Chairs from among its members by simple majority for a five-year
term. Furthermore, the EDPB also has a secretariat at its disposal, which the EDPS
provides so that the Board has analytical, administrative and logistical support.524
The EDPB’s tasks are detailed in Articles 64, 65 and 70 of the GDPR and include com-
prehensive duties which can be dived into three main activities:
• Consistency: The EDPB can issue legally binding decisions in three cases: where
a supervisory authority has raised a relevant and reasoned objection in cases
of one-stop-shops, where there are conflicting views on which of the super-
visory authorities is the ‘lead’ and, finally, where the competent supervisory
authority does not request or does not follow the EDPB’s opinion.525 The EDPB’s
main responsibility is to ensure that the GDPR is consistently applied through-
out the EU and it plays a key role in the consistency mechanism, as described in
Section 5.5.
• Consultation: EDPB tasks include advising the Commission on any issue related
to protecting personal data in the Union, such as GDPR amendments, revisions to
EU legislation which involve data processing and could be in conflict with EU data
protection rules or the issuing of Commission adequacy decisions which enable
the transfer of personal data to a third country or international organisation.
200
Independent supervision
• Guidance: The Board also issues guidelines, recommendations and best practice
to encourage the consistent application of the regulation, and promotes coop-
eration and knowledge exchanges between supervisory authorities. In addition,
it must encourage associations of controllers or processors to draw up codes of
conduct, as well as to establish data protection certification mechanisms and
seals.
201
6
Data subjects’ rights and
their enforcement
203
Handbook on European data protection law
204
Data subjects’ rights and their enforcement
The effectiveness of legal rules in general, and data subjects’ rights in particular,
depends to a considerable extent on the existence of appropriate mechanisms
to enforce them. In the digital age, data processing has become ubiquitous and
increasingly difficult for individuals to understand. To mitigate power imbalances
between data subjects and controllers, individuals have been given certain rights
to exercise greater control over the processing of their personal information. The
right to access to one’s own data and the right to have it rectified are enshrined in
205
Handbook on European data protection law
• Every data subject has the right to information about any data controller’s processing
of his or her personal data, subject to limited exemptions.
• access their own data and obtain certain information about the processing;
• have their data rectified by the controller processing their data, if the data are
inaccurate;
• have the controller erase their data, as appropriate, if the controller is processing
their data illegally;
206
Data subjects’ rights and their enforcement
• Additionally, data subjects shall have the right to object to processing on:
• Data subjects have the right not to be subject to decisions based solely on automated
processing, including profiling, that have legal effects or that significantly affect him or
her. Data subjects also have the right to:
• express their point of view and contest a decision based on automated processing.
Under EU law, the transparency principle requires that any personal data processing
should generally be transparent to individuals. Individuals have the right to know
how and which personal data are collected, used or otherwise processed, as well as
to be made aware of the risks, safeguards and their rights regarding processing.527
207
Handbook on European data protection law
Article 12 of the GDPR thus establishes a broad comprehensive obligation for con-
trollers in providing transparent information and/or communicating how data sub-
jects can exercise their rights.528 The information must be concise, transparent, intel-
ligible and easily accessible, using clear and plain language. It must be provided in
written form, including electronically where appropriate, and it may even be pro-
vided orally at the data subject’s request and if his or her identity is proven beyond
doubt. The information shall be provided without excessive delay or expense.529
Article 13 and Article 14 of the GDPR deal with the right of data subjects to be
informed, either in situations where personal data were collected directly from
them, or in situations where the data were not obtained from them, respectively.
The scope of the right to information and its limitations under EU law have been
clarified in CJEU case law.
The national court had doubts about the value of the detectives’ evidence,
given the possibility that it had been obtained without respecting the data
protection requirements of Belgian legislation, in particular the obligation to
inform data subjects of the processing of their personal data before collecting
that information. The CJEU noted that Article 13 (1) stated that Member States
‘may’, but have no obligation to, provide in their national law for exceptions
208
Data subjects’ rights and their enforcement
The CJEU considered that the requirement under EU law to inform the data
subject about the processing of their personal data is “all the more important
since it affects the exercise by the data subjects of their right of access
to, and the right to rectify, the data being processed […] and their right
to object to the processing of those data”. The principle of fair processing
requires informing data subjects about the transfer of their data to another
public body for further processing by the latter. According to Article 13 (1)
of Directive 95/46, Member States may restrict the right to be informed
if it is deemed necessary to safeguard an important economic interest of
the state, including taxation matters. However, such restrictions must be
imposed by legislative measures. As neither the definition of the data to
be transferred nor the detailed arrangements for the transferring were laid
down in a legislative measure, but rather solely in a protocol between the
two public authorities, the derogation conditions under EU law were not
met. The applicants should have been informed in advance of the transfer of
their data to the National Health Insurance Fund and the body’s subsequent
processing of this data.
531 CJEU, C-201/14, Smaranda Bara and Others v. Casa Naţională de Asigurări de Sănătate and Others,
1 October 2015.
209
Handbook on European data protection law
Under the GDPR, when personal data are collected from the data subject, the con-
troller is obliged to provide the following information to the data subject at the time
the personal data are obtained:532
• the controller’s identity and contact details, including the DPO’s details, if any;
• the purpose and legal basis for the processing, i.e. a contract or legal obligation;
• the data controller’s legitimate interest, if this provides the basis for processing;
• the period for which the personal data will be stored, and if establishing that
period is not possible, the criteria used to determine the data storage period;
• the data subjects’ rights regarding processing, such as the rights of access, recti-
fication, erasure, and to restrict or object to processing;
532 General Data Protection Regulation, Art. 13 (1); Modernised Convention 108, Art. 7 bis (1).
210
Data subjects’ rights and their enforcement
In cases where the personal data is not obtained from the data subject directly, the
data controller must notify the individual about the origin of the personal data. In
any case, the controller must, among other things, inform data subjects about the
existence of automated decision-making, including profiling.533 Finally, if a controller
intends to process personal data for a purpose other than that originally stated to
the data subject, the principles of purpose limitation and transparency require that
the controller provide the data subject with information about this new purpose.
Controllers must provide information prior to any further processing. In other terms,
in cases where the data subject provided consent for the personal data processing,
the controller must receive the data subject’s renewed consent if the data process-
ing purpose changes or if further purposes are added.
The GDPR distinguishes between two scenarios and two points in time at which the
data controller must provide information to the data subject:
• Where the personal data is obtained directly from the data subject, the controller
must notify the data subject about all of his or her related information and rights
under the GDPR at the time the data are obtained.534
211
Handbook on European data protection law
If the controller intends to further process the personal data for a different pur-
pose, the controller shall provide all the relevant information prior to the pro-
cessing taking place.
• Where the personal data has not been obtained from the data subject directly,
the controller is obliged to provide the information about the processing to the
data subject “within a reasonable period after obtaining the personal data, but
at the latest within one month”, or before data are disclosed to a third party.535
Under both CoE and EU law, the information the controller must provide to data sub-
jects must be concise, transparent, intelligible and easily accessible. It must be in
writing, or by other means, including electronic means, using clear, plain and easily
understandable language. When providing information, the controller can use stand-
ardised icons to provide the information in an easily visible and intelligible manner.537
For example, an icon representing a lock might be used to signal that the data is
safely collected and/or encrypted. Data subjects can request to have the information
provided by oral means. Information must be free of charge, unless the data sub-
ject’s requests are manifestly unfounded or excessive (i.e. of a repetitive nature).538
Easy access to the information provided is paramount to the data subject’s ability to
exercise his or her rights provided under EU data protection law.
535 Ibid., Art. 13 (3) and 14 (3); see also the reference to reasonable intervals and without excessive delay
under the Modernised Convention 108, Art. 8 (1) (b).
536 Explanatory Report of Modernised Convention 108, para. 70.
537 The European Commission will further develop information to be presented by the icons and the
procedures for providing standardised icons by means of delegated acts; see General Data Protection
Regulation, Art. 12 (8).
538 General Data Protection Regulation, Art. 12 (1), (5) and (7) and Modernised Convention 108,
Art. 9 (1) (b).
212
Data subjects’ rights and their enforcement
the intended audience is, for example, an adult or a child, the general public or an
academic expert. The question of how to balance this aspect of understandable
information is considered in the Article 29 Working Party Opinion on More Harmo-
nised Information Provisions. This promotes the idea of so-called layered notices,539
allowing the data subject to decide which level of detail he or she prefers. However,
this way of presenting information does not relieve the controller from its obligation
under Article 13 and Article 14 of the GDPR. The controller must still provide all infor-
mation to the data subject.
One of the most efficient ways to provide information is to place appropriate infor-
mation clauses on the controller’s home page, such as a website privacy policy. There
is, however, a significant part of the population that does not use the internet, and a
company’s or public authority’s information policy should take this into account.
A privacy notice about personal data processing on a web page could look as follows:
The personal data information notice forms part of the terms and conditions
governing our hotel services.
We collect the following personal data from you: your name, postal address,
telephone number, email address, stay information, credit and debit card
number and IP addresses or domain names of the computers you used to
connect to our website.
We process your data on the basis of your consent and for the purposes of
carrying out reservations, for concluding and fulfilling the contracts related
539 Article 29 Working Party (2004), Opinion 10/2004 on More Harmonised Information Provisions,
WP 100, Brussels, 25 November 2004.
213
Handbook on European data protection law
to the services we offer to you and for complying with requirements imposed
by law, for instance the Local Fees Act, which requires us to collect personal
data to enable payment of the city tax for accommodation.
Your personal data will be retained for a period of three months. Your data
are not subject to automatic decision procedures.
Our Bed and Breakfast C&U follows strict security procedures to ensure
that your personal information is not damaged, destroyed, or disclosed to
a third party without your permission and to prevent unauthorised access.
The computers storing the information are kept in a secure environment with
restricted physical access. We use secure firewalls and other measures to
restrict electronic access. If the data must be transferred to a third party, we
require them to have in place similar measures to protect your personal data.
You have the right to access your data, to obtain a copy of your data, to
request their erasure or rectification, or request your data to be ported to
another controller.
You have the right to access your data, to be provided, on request, with
knowledge of the reasoning underlying data processing, to request their
214
Data subjects’ rights and their enforcement
The GDPR requires the controller to inform data subjects about enforcement
mechanisms under national and EU law for cases of personal data breaches. The
controller must inform data subjects about their right to lodge a complaint about a
personal data breach with a supervisory authority and, if necessary, with a national
court.540 CoE law also prescribes the right of data subjects to be informed of the
means of exercising their rights, including the right to have a remedy laid down in
Article 9 (1) (f).
The GDPR provides exception to the obligation to inform. Under Article 13 (4) and
Article 14 (5) of the GDPR, the obligation to inform data subjects does not apply
if the data subject already has all of the relevant information.541 In addition, where
the personal data have not been obtained from the data subject, the obligation to
inform will not apply if the provision of information is impossible or disproportionate,
in particular where the personal data is processed for archiving purposes in the pub-
lic interest, scientific or historical research purposes or statistical purposes.542
Furthermore, Member States enjoy a margin of discretion under the GDPR to restrict
obligations and rights provided to individuals under the regulation if this is a nec-
essary and proportionate measure in a democratic society, for instance, to safe-
guard national and public security, defence, protection of judicial investigations and
215
Handbook on European data protection law
Where data are collected for scientific or historical research purposes, statistical pur-
poses or for archiving purposes in the public interest, Union or Member States law
can provide derogations from the obligation to inform if it is likely to render impos-
sible or seriously impair the achievement of the specific purposes.547
Similar limitations exist under CoE law, where rights granted to data subjects under
Article 9 of Modernised Convention 108 can be subject to possible restrictions under
Article 11 of Modernised Convention 108, under strict conditions. Furthermore,
according to Article 8 (2) of Modernised Convention 108 the obligation of transpar-
ency of processing imposed to controllers does not apply where the data subject
already has the information.
Under CoE law, the right of access to an individual’s own data is explicitly acknowl-
edged in Article 9 of Modernised Convention 108. This provides that every individual
has the right to obtain, upon request, information about the processing of personal
data relating to him or her, which is communicated in an intelligible manner. The right
of access has been recognised not only in the provisions of Modernised Conven-
tion 108, but also in ECtHR case law. The ECtHR has repeatedly held that individuals
216
Data subjects’ rights and their enforcement
have a right to access information about their personal data, and that this right arises
from the need to respect private life.548 However, the right to access personal data
stored by public or private organisations may in certain circumstances be limited.549
Under EU law, the right to access one’s own data is explicitly acknowledged in Arti-
cle 15 of the GDPR and it is also set out as an element of the fundamental right to
the protection of personal data in Article 8 (2) of the EU Charter of Fundamental
Rights.550 An individual’s right to gain access to his or her own personal data is a key
element of European data protection law.551
The GDPR provides that every data subject has the right to access his or her per-
sonal data and certain information about the processing, which the controllers must
provide.552 In particular, every data subject has a right to obtain (from the controller)
confirmation as to whether or not data relating to him or her are being processed,
and information about at least the following:
• processing purposes;
• period for which the data is intended to be stored, or, if not possible, the criteria
used to determine that period;
548 ECtHR, Gaskin v. the United Kingdom, No. 10454/83, 7 July 1989; ECtHR, Odièvre v. France [GC],
No. 42326/98, 13 February 2003; ECtHR, K.H. and Others v. Slovakia, No. 32881/04, 28 April 2009;
ECtHR, Godelli v. Italy, No. 33783/09, 25 September 2012.
549 ECtHR, Leander v. Sweden, No. 9248/81, 26 March 1987.
550 Also see CJEU, Joined cases C-141/12 and C-372/12, YS v. Minister voor Immigratie, Integratie en Asiel
and Minister voor Immigratie, Integratie en Asiel v. M and S, 17 July 2014; CJEU, C-615/13 P, ClientEarth,
Pesticide Action Network Europe (PAN Europe) v. European Food Safety Authority (EFSA), European
Commission, 16 July 2015.
551 CJEU, Joined cases C-141/12 and C-372/12, YS v. Minister voor Immigratie, Integratie en Asiel and
Minister voor Immigratie, Integratie en Asiel v. M and S, 17 July 2014.
552 General Data Protection Regulation, Art. 15 (1).
217
Handbook on European data protection law
• any available information about the source of the data undergoing processing if
the data are not collected from the data subject;
• in the case of automated decisions, the logic involved in any automated process-
ing of data.
The data controller must provide the data subject with a copy of the personal data
being processed. Any information communicated to the data subject must be pro-
vided in an intelligible form, which means that the controller must make sure the
data subject can understand the information being provided. For example, including
technical abbreviations, coded terms or acronyms in response to an access request
will usually not suffice, unless the meaning of these terms is explained. Where auto-
mated decision-making is carried out, including profiling, the general logic involved
in the automated decision-making will need to be explained, including the criteria
which have been considered when evaluating the data subject. Similar requirements
exist under CoE law.553
Example: Accessing his or her personal data will help a data subject to
determine whether or not the data are accurate. It is, therefore, essential
that the data subject is informed, in an intelligible form, not only of the actual
personal data that are being processed, but also the categories under which
these personal data are processed, such as name, IP address, geolocation
coordinates, credit card number, etc.
Information about the source of data – when the data are not collected from the data
subject – must be given in the response to an access request, as far as this informa-
tion is available. This provision must be understood in the context of the principles of
fairness, transparency and accountability. A controller may not destroy information
about the source of data in order to be exempt from disclosing it, – unless the dele-
tion would have taken place despite the access request having being received – and
it must still comply with its general ‘accountability’ requirements.
As set out in CJEU case law, the right to access personal data may not be unduly
restricted by time limits. Data subjects must also be given a reasonable opportunity
to gain information about data processing operations that took place in the past.
218
Data subjects’ rights and their enforcement
To ensure the practical effect of the rights given to data subjects, the CJEU
held that “that right must of necessity relate to the past. If that were not
the case, the data subject would not be in a position effectively to exercise
his right to have data presumed unlawful or incorrect rectified, erased or
blocked or to bring legal proceedings and obtain compensation for the
damage suffered”.
554 CJEU, C-553/07, College van burgemeester en wethouders van Rotterdam v. M. E. E. Rijkeboer,
7 May 2009.
555 General Data Protection Regulation, Art. 15 (1) (c) and (f), 16, 17 (2) and 21, and Chapter VIII.
556 Ibid., Art. 16 and Recital 65; Modernised Convention 108, Art. 9 (1) (e).
557 ECtHR, Ciubotaru v. Moldova, No. 27138/04, 27 April 2010, paras. 51 and 59.
219
Handbook on European data protection law
In some cases, it will be sufficient for the data subject to simply request rectifica-
tion of, for example, the spelling of a name, a change of address or a telephone
number. According to EU law and CoE law, inaccurate personal data must be recti-
fied without undue or excessive delay.558 If, however, such requests are linked to
legally significant matters, such as the data subject’s legal identity, or the correct
place of residence for the delivery of legal documents, requests for rectification may
not be enough and the controller may be entitled to demand proof of the alleged
inaccuracy. Such demands must not place an unreasonable burden of proof on the
data subject and thereby preclude data subjects from having their data rectified.
The ECtHR has found violations of Article 8 of the ECHR in several cases where the
applicant had been unable to challenge the accuracy of information kept in secret
registers.559
220
Data subjects’ rights and their enforcement
When the applicant was again arrested and indicted for another criminal
offence, the police submitted to the criminal court a report entitled
“information form on additional offences”, in which the applicant was said
to be a member of two illegal organisations. The applicant’s request to have
the report and the police records amended was unsuccessful. The ECtHR held
that the information in the police report fell within the scope of Article 8
of the ECHR, as systematically collected public information stored in files
held by the authorities could also fall within the meaning of ‘private life’.
Moreover, the police report was incorrect in its drafting, and its submission
to the criminal court had not been in accordance with domestic law. The
Court concluded that there had been a violation of Article 8.
During civil litigation or proceedings before a public authority to decide whether data
are correct or not, the data subject can ask for an entry or note to be placed on his
or her data file stating that the accuracy is contested and that an official decision is
pending.561 During this period, the data controller must not present the data as cor-
rect or not subject to amendment, particularly to third parties.
221
Handbook on European data protection law
their private lives. For example, in the case of one applicant, the authorities
retained information that in 1969, he had allegedly advocated violent
resistance to police control during demonstrations. The ECtHR found that
this information could have no relevant national security interest, particularly
given its historical nature. The Court found a violation of Article 8 of the ECHR
regarding four of the five applicants as, given the lengthy time lapse since the
applicants’ alleged acts, the continued storage of their data lacked relevance.
Under EU law, Article 17 of the GDPR gives effect to data subjects’ requests to have
data erased or deleted. The right to have one’s personal data erased without undue
delay applies where:
• the personal data are no longer necessary regarding the purposes for which
they were collected or otherwise processed;
• the data subject withdraws the consent on which the processing is based and
there is no other legal ground for the processing;
222
Data subjects’ rights and their enforcement
• the data subject objects to the processing and there are no overriding legitimate
grounds for the processing;
• the personal data have to be erased for compliance with a legal obligation in
Union or Member State law to which the controller is subject;
• the personal data have been collected concerning the offer of information soci-
ety services to children pursuant to Article 8 of the GDPR.566
The burden of proof that the data processing is legitimate will fall on the data con-
trollers, as they are responsible for the lawfulness of the processing.567 According
to the principle of accountability, the controller must at any time be able to demon-
strate that there is a sound legal basis to its data processing, otherwise the process-
ing must be stopped.568 The GDPR defines exceptions to the right to be forgotten,
including where the processing of personal data is necessary for:
The CJEU has affirmed the importance of the right to erasure to ensure a high level
of data protection.
223
Handbook on European data protection law
Example: In Google Spain,570 the CJEU was concerned with whether Google
was required to delete outdated information regarding financial difficulties
about the applicant from its search list results. Among other things, Google
contested being responsible, arguing that it merely provides a hyperlink to
the publisher’s web page that hosts the information, in this case a newspaper
reporting on the applicant’s insolvency issues. 571 Google argued that the
request to delete outdated information from a web page should be made
to the host of the web page and not to Google, which simply provides a
link to the original page. The CJEU concluded that Google, when it searches
the web for information and web pages, and when it indexes content to
provide search results, becomes a data controller to which responsibilities
and obligations under EU law apply.
The CJEU clarified that internet search engines and search results providing
personal data can establish a detailed profile of an individual. 572 Search
engines render the information contained in such a list of results ubiquitous.
In light of its potential seriousness, that interference cannot be justified by
merely the economic interest which the operator of such an engine has in
that processing. A fair balance must be sought in particular between the
legitimate interest of internet users in access to information and the data
subject’s fundamental rights under Articles 7 and 8 of the EU Charter of
Fundamental Rights. In an increasingly digitised society, the requirement for
personal data to be accurate and not go beyond what is necessary (i.e. for
public information) is fundamental to ensure a high level of data protection
to individuals. The “controller in respect of that processing must ensure,
within the framework of its responsibilities, powers and capabilities, that
that processing meets the requirements” of EU law, so that the established
legal guarantees have full effect.573 This means that the right to have one’s
570 CJEU, C-131/12, Google Spain SL, Google Inc. v. Agencia Española de Protección de Datos (AEPD), Mario
Costeja González [GC], 13 May 2014, paras. 55–58.
571 Google also contested the application of the EU data protection rules due to the fact that Google Inc. is
established in the US and the processing of the personal data at issue in the case was also carried out
in the US. A second argument for the inapplicability of EU data protection law related to the claim that
search engines cannot be regarded as ‘controllers’ in respect of the data displayed in their results, as
they have no knowledge of the data nor do they exercise control over them. The CJEU dismissed both
arguments, holding that Directive 95/46/EC was applicable in that case, and continued with examining
the scope of the rights it guaranteed, in particular the right to erasure of the personal data.
572 Ibid., paras. 36, 38, 80–81 and 97.
573 Ibid., paras. 81–83.
224
Data subjects’ rights and their enforcement
Considering whether or not Google was required to remove the links related
to the applicant, the CJEU held that under certain conditions, individuals
have the right to request personal data to be erased. This right may be
invoked where information relating to an individual is inaccurate, inadequate,
irrelevant or excessive for the data processing purposes. The CJEU
acknowledged that this right is not absolute; it must be balanced with other
rights and interests, in particular the interest of the general public in having
access to certain information. Each request for erasure must be assessed
on a case-by-case basis to strike a balance between the fundamental rights
to the protection of personal data and private life of the data subject on
the one hand, and the legitimate interests of all internet users, including
publishers, on the other. The CJEU provided guidance on the factors to
consider during this balancing exercise. The nature of the information in
question is a particularly important factor. If the information relates to the
private life of the individual, and there is no public interest in the availability
of the information, data protection and privacy would override the right of
the general public to have access to the information. On the contrary, if it
appears that the data subject is a public figure, or that the information is of
such a nature as to justify it being available to the general public, then the
general public’s preponderant interest in having access to the information
may justify the interference with the data subject’s fundamental rights to
data protection and privacy.
Following the judgment, the Article 29 Working Party adopted guidelines for imple-
menting the CJEU ruling.575 The guidelines include a list of common criteria for the
supervisory authorities to use when handling complaints related to individuals’
requests for deletion, explaining what that right to erasure entails, and guiding them
in this balancing of rights exercise. The guidelines reiterate that assessments need
574 CJEU, C-131/12, Google Spain SL, Google Inc. v. Agencia Española de Protección de Datos (AEPD),
Mario Costeja González [GC], 13 May 2014, para. 88. See also Article 29 Data Protection Working Party
(2014), Guidelines on the implementation of the CJEU judgment on “Google Spain and Inc v. Agencia
Española de Protección de Datos (AEPD) and Mario Costeja González” C-131/12, WP 225, Brussels,
26 November 2014 and Recommendation CM/Rec 2012(3) of the Committee of Ministers to member
states on the protection of human rights with regard to search engines, 4 April 2012.
575 Article 29 Working Party (2014), Guidelines on the implementation of the CJEU judgment on “Google
Spain and Inc v. Agencia Española de Protección de Datos (AEPD) and Mario Costeja González”
C-131/12, WP 225, Brussels, 26 November 2014.
225
Handbook on European data protection law
In balancing Mr Manni’s right to the protection of his personal data with the
general public’s interest in access to the information, the CJEU first examined
the purpose of the public registry. It pointed to the fact that disclosure was
provided for by law, and in particular by an EU directive aiming to make
company information more easily accessible to third parties. Third parties
should thus have access and be able to examine the basic documents of
a company and other information concerning the company, “especially
particulars of the persons who are authorised to bind the company”. The
purpose of the disclosure was also to guarantee legal certainty in view of
intensified trade between Member States, by ensuring that third parties
have access to all of the relevant information about companies across the EU.
The CJEU further noted that even after the passage of time, and even after
a company is dissolved, rights and legal obligations related to the company
often continue to exist. Disputes related to dissolution may be lengthy, and
questions concerning a company, its managers and liquidators may arise
for many years after a company has ceased to exist. The CJEU held that, in
view of the range of possible scenarios and the differences in the limitation
periods provided in each Member States, “it seems impossible, at present,
to identify a single time limit, as from the dissolution of a company, at the
end of which the inclusion of such data in the register and their disclosure
would no longer be necessary”. Due to the legitimate aim of the disclosure
and the difficulties in establishing a period at the end of which the personal
576 CJEU, C-398/15, Camera di Commercio, Industria, Artigianato e Agricoltura di Lecce v. Salvatore Manni,
9 March 2017.
226
Data subjects’ rights and their enforcement
data could be deleted from the registry without harming the interests of third
parties, the CJEU found that EU data protection rules do not guarantee a right
to erasure of personal data for persons in Mr Manni’s situation.
Where the controller has made personal data public and is required to delete the
information, the data controller is obliged and must take ‘reasonable’ steps to inform
other controllers who process the same data, about the data subject’s request for
erasure. The controller’s activities must take into account available technologies and
the cost of implementation.577
• the processing is unlawful and the data subject requests that the use of the per-
sonal data be restricted instead of erased;
• the data must be kept for the exercise or defence of legal claims;
The methods in which a controller can restrict personal data processing can include,
for example, temporary movement of the selected data to another processing sys-
tem, making the data unavailable to users or the removal of personal data on a tem-
porary basis.579 The controller must notify the data subject before the restriction on
processing is lifted.580
227
Handbook on European data protection law
The controller must communicate any rectification or erasure of personal data or any
processing restriction to each recipient to whom the controller disclosed the per-
sonal data, insofar as this is neither impossible nor disproportionate.581 If the data
subject requests information about those recipients the controller must provide him
or her with this information.582
If the right to data portability is applicable, data subjects are entitled to have their
personal data transmitted directly from one controller to another if this is technically
feasible.584 To facilitate this, the controller should develop interoperable formats that
enable data portability for data subjects.585 The GDPR specifies that these formats
must be structured, commonly used and machine-readable to facilitate interopera-
bility.586 Interoperability can be defined in a broad sense as the information systems’
ability to exchange data and to enable information sharing.587 While the purpose of
the formats used is to achieve interoperability, the GDPR does not impose particular
recommendations on the specific format to be provided: formats may differ across
sectors.588
581 Ad hoc Committee on Data Protection (CAHDATA), Explanatory Report of the Modernised Convention for
the Protection of Individuals with regard to Automatic Processing of Personal Data, para. 79.
582 General Data Protection Regulation, Art. 19.
583 Ibid., Recital 68 and Art. 20 (1).
584 Ibid., Art. 20 (2).
585 Ibid., Recital 68 and Art. 20 (1).
586 Ibid., Recital 68.
587 European Commission, Communication on stronger and smarter information systems for borders and
security, COM(2016) 205 final, 2 April 2016.
588 Article 29 Working Party (2016), Guidelines on the right to data portability, WP 242, 13 December 2016
and revised on 5 April 2017, p. 13.
228
Data subjects’ rights and their enforcement
According to the Article 29 Working Party guidelines, the right to data portability
“supports user choice, user control and user empowerment”, aiming to give data
subjects control over their own personal data.589 The guidelines clarify the main ele-
ments of data portability, which include:
• the data subjects’ right to receive their own personal data processed by the
controller in a structured, commonly used, machine-readable and interoperable
format;
• the right to transmit personal data from one data controller to another data con-
troller without hindrance if this is technically feasible;
• the exercise of the right to data portability is without prejudice to any other right
as is the case with any other rights in the GDPR.
Data subjects do not have a general right to object to the processing of their data.590
Article 21 (1) of the GDPR empowers the data subject to raise objections on grounds
relating to their particular situation where the legal basis for the processing is the
controller’s performance of a task carried out in the public interest, or where the
processing is based on the controller’s legitimate interests.591 The right to object
589 Ibid.
590 See also ECtHR, M.S. v. Sweden, No. 20837/92, 27 August 1997 (where medical data were communicated
without consent or the possibility to object); ECtHR, Leander v. Sweden, No. 9248/81, 26 March 1987;
ECtHR, Mosley v. the United Kingdom, No. 48009/08, 10 May 2011.
591 General Data Protection Regulation, Recital 69; Art. 6 (1) (e) and (f).
229
Handbook on European data protection law
The right to object on grounds relating to the data subject’s particular situation aims
to strike the correct balance between the data subject’s data protection rights and
the legitimate rights of others in processing their data. The CJEU, however, has clari-
fied that the data subject’s rights override ‘as a general rule’ the economic interests
of a data controller depending on “the nature of the information in question and
its sensitivity for the data subject’s private life and on the interest of the public in
having that information”.593 Under the GDPR, the burden of proof is vested in control-
lers, who must show compelling grounds for continuing the processing.594 Similarly,
the Explanatory Report of Modernised Convention 108 clarifies that the legitimate
grounds for data processing (which may override the data subjects’ right to object)
will have to be demonstrated on a case-by-case basis.595
Example: In Manni,596 the CJEU held that because of the legitimate purpose of
the disclosure of personal data in the company registry, in particular the need to
protect the interests of third parties and ensure legal certainty, in principle, Mr
Manni did not have a right to obtain the erasure of his personal data from the
company registry. However, it acknowledged the existence of a right to object
to the processing, by stating that “it cannot be excluded […] that there may be
specific situations in which the overriding and legitimate reasons relating to the
specific case of the person concerned justify exceptionally that access to personal
data entered in the register is limited, upon the expiry of a sufficiently long period
[…] to third parties who can demonstrate a specific interest in their consultation”.
230
Data subjects’ rights and their enforcement
The effect of a successful objection is that the controller may no longer process the
data in question. Processing operations performed on the data subject’s data prior to
the objection, however, remain legitimate.
Article 21 (2) of the GDPR provides for a specific right to object to the use of per-
sonal data for the purposes of direct marketing, bringing further clarification to Arti-
cle 13 of the e-Privacy Directive. Such a right is also laid down in the Modernised
Convention 108, as well as in the CoE Direct Marketing Recommendation.597 The
Explanatory Report of Modernised Convention 108 clarifies that objections to data
processing for direct marketing purposes should lead to unconditional erasure or
removal of the personal data in question.598
The data subject has the right to object to the use of his or her personal data for
direct marketing purposes at any time and free of charge. Data subjects must be
informed of this right in a clear manner, separate from any other information.
Where personal information is used and processed for information society services,
the data subject may exercise his or her right to object to the processing of his or her
personal data by automated means.
Information society services are defined as any service normally provided for remu-
neration, at a distance, by electronic means and at the individual request of a recipi-
ent of services.599
597 Council of Europe, Committee of Ministers (1985), Recommendation Rec(85)20 to member states on
the protection of personal data used for the purposes of direct marketing, 25 October 1985, Art. 4 (1).
598 Explanatory Report of Modernised Convention 108, para. 79.
599 Directive 98/34/EC as amended by Directive 98/48/EC laying down a procedure for the provision of
information in the field of technical standards and regulations, Art. 1 (2).
231
Handbook on European data protection law
Data controllers offering information society services must have in place appropriate
technical arrangements and procedures to ensure that the right to object by auto-
mated means can be exercised effectively.600 For example, this may involve blocking
cookies on web pages or turning off the tracking of internet browsing.
232
Data subjects’ rights and their enforcement
However, the Explanatory Report (paragraph 41) also recognises that data subjects
should have the opportunity to give their consent only to certain areas of research
or parts of research projects to the extent that the intended purpose allows, and
object in case they perceived the processing to excessively encroach on their rights
and freedoms without a legitimate ground.
233
Handbook on European data protection law
According to the Article 29 Working Party, the right not to be subject to decisions
based solely on automated processing that may result in legal effects for the data sub-
ject or that significantly affect him or her equates to a general prohibition and does not
require the data subject to proactively seek an objection to such a decision.607
The GDPR also provides that among the controller’s obligations regarding the informa-
tion to be provided where personal data are collected, data subjects must be told about
the existence of automated decision-making, including profiling.609 The right to access
the personal data processed by the controller remains unaffected.610 The information
should not only indicate the fact that profiling will occur, it should also contain mean-
ingful information about the logic involved in the profiling and the envisaged conse-
quences for individuals of the processing.611 For instance, a health insurance company
using automated decision-making on applications should provide data subjects with
general information on how the algorithm works, and which factors the algorithm uses
to calculate their insurance premiums. Similarly, when exercising their ‘right of access’,
data subjects can request information from the controller on the existence of auto-
mated decision-making and meaningful information about the logic involved.612
607 Article 29 Working Party, Guidelines on Automated Individual Decision-Making and profiling for the
purposes of Regulation 2016/679, WP 251, 3 October 2017, p. 15.
608 General Data Protection Regulation, Art. 22 (2).
609 Ibid., Art. 12.
610 Ibid., Art. 15.
611 Ibid., Art. 13 (2) (f).
612 Ibid., Art. 15 (1) (h).
234
Data subjects’ rights and their enforcement
includes at least the right to obtain human intervention on the part of the controller
and the possibility for the data subject to express a point of view and to contest a
decision based on the automated processing of their personal data.613
The Article 29 Working Party has provided further guidance on the use of auto-
mated decision-making under the GDPR.614
Under CoE law, individuals have a right not to be subject to a decision which will
significantly affect them and which is based solely on automated processing without
having their views taken into consideration.615 The requirement to consider the data
subject’s views when decisions are based solely on automated processing means
that they have a right to challenge such decisions, and should be able to contest any
inaccuracy in the personal data the controller uses, and challenge whether any pro-
file applied to them is relevant.616 However, an individual cannot exercise this right
if the automated decision is authorised by a law to which the controller is subject
and which also lays down suitable measures to safeguard the data subject’s rights,
freedoms and legitimate interests. In addition, data subjects have the right to obtain,
upon request, knowledge of the reasoning underlying the data processing carried
out.617 The Explanatory Report of Modernised Convention 108 gives the example of
credit scoring. Individuals should be entitled to know not only the positive or nega-
tive scoring decision itself but also the logic underpinning the processing of their
personal data, which resulted in such a decision. “Having an understanding of these
elements contributes to the effective exercise of other essential safeguards such as
the right to object and the right to complain to a competent authority”.618
The Profiling Recommendation, albeit not legally binding, specifies the conditions
for the collection and processing of personal data in the context of profiling.619
It includes provisions on the need to ensure that the processing in the context of
profiling should be fair, lawful, proportionate and for specified and legitimate
235
Handbook on European data protection law
• In the EU, the GDPR provides for remedies for data subjects in cases of violation of
their rights, as well as for sanctions against controllers and processors who do not
comply with the provisions of the regulation. It also provides for the right to compen-
sation and liability.
• Data subjects have the right to lodge a complaint to a supervisory authority for
alleged infringements of the regulation, as well as the right to an effective judicial
remedy and to receive compensation.
• The controller or processor is liable for any material and non-material damage as a
result of the infringement.
• The supervisory authorities have the power to impose administrative fines for
infringements of the regulation up to € 20,000,000 or in the case of an undertak-
ing, 4 % of the total worldwide annual turnover – whichever is higher.
• Data subjects may bring violations of data protection law, as a last resort and under
certain conditions, before the ECtHR.
• Any natural or legal person has the right to bring an action for annulment of decisions
of the European Data Protection Board before the CJEU under the conditions provided
for in the Treaties.
Adopting legal instruments is not sufficient to ensure the protection of personal data
within Europe. To make European data protection rules effective, it is necessary to
236
Data subjects’ rights and their enforcement
establish mechanisms that enable individuals to counter violations of their rights and
to seek compensation for any damage suffered. It is also important that supervisory
authorities have the power to impose sanctions that are effective, dissuasive and
proportionate to the infringement in question.
Rights under data protection law can be exercised by the person whose rights are
at stake; this will be someone who is the data subject. However, other persons –
who fulfil the necessary requirements under national law – may also represent data
subjects in exercising their rights. Under a number of national legislations, children
and persons with intellectual disabilities must be represented by their guardians.620
Under EU data protection law, an association – whose lawful aim is to promote data
protection rights – may represent data subjects before a supervisory authority or a
court.621
Modernised Convention 108 recognises the right of data subjects to benefit from the
assistance of a supervisory authority in exercising their rights under the convention,
irrespective of their nationality or residence.622 A request for assistance may only be
rejected in exceptional circumstances, and data subjects should not cover the costs
and fees related to the assistance.623
Similar provisions can be found in the EU legal system. The GDPR requires supervi-
sory authorities to adopt measures to facilitate the submission of complaints, such
as the creation of an electronic complaint submission form.624 The data subject can
lodge the complaint with the supervisory authority in the Member State of his or her
620 FRA (2015), Handbook on European law relating to the rights of the child, Luxembourg, Publications
Office; FRA (2013), Legal capacity of persons with intellectual disabilities and persons with mental
health problems, Luxembourg, Publications Office.
621 General Data Protection Regulation, Art. 80.
622 Modernised Convention 108, Art. 18.
623 Ibid., Art. 16–17.
624 General Data Protection Regulation, Art. 57 (2).
237
Handbook on European data protection law
There must be the possibility to appeal to the courts against decisions by a national
supervisory authority. This applies to the data subject as well as to controllers and
processors that have been a party to proceedings before a supervisory authority.
238
Data subjects’ rights and their enforcement
Under EU law, the importance of providing data subjects with effective legal rem-
edies in case there is a violation of their rights is clear from both the provisions of the
GDPR – which establishes a right to an effective judicial remedy against supervisory
authorities, controllers and processors – and from CJEU case law.
Concerning the violation of the rights to privacy and data protection, the
CJEU highlighted that US legislation permitted certain public authorities to
access the personal data transferred from the Member States to the US and
process it in a way that was incompatible with its original transfer purposes
and beyond what was strictly necessary and proportionate to the protection
of national security. On the right to an effective remedy, it noted that the
data subjects had no administrative or judicial means of redress to enable
the data relating to them to be accessed and rectified or erased, as the case
may be. The CJEU concluded that legislation not providing for any possibility
of pursuing legal remedies to access, rectify or erase their personal data
“does not respect the essence of the fundamental right to effective judicial
protection, as enshrined in Article 47 of the Charter”. It highlighted that the
existence of a judicial remedy guaranteeing compliance with legal rules is
inherent in the rule of law.
629 CJEU, C-362/14, Maximillian Schrems v. Data Protection Commissioner [GC], 6 October 2015.
630 General Data Protection Regulation, Art. 78.
239
Handbook on European data protection law
action before a court.631 The court action must be brought before the courts of the
Member State where the relevant supervisory authority is established.632
In cases where a controller or processor infringe a data subject’s rights, data subjects
are entitled to bring a complaint before a court.633 For proceedings initiated against
a controller or processor, it is particularly important that individuals are given the
option to choose where to bring the action. They may choose to do so either in the
Member State in which the controller or processor has an establishment, or in the
Member State in which the data subjects concerned have their habitual residence.634
The second possibility greatly facilitates individuals in exercising their rights, as it
enables them to bring actions in the state where they reside and within a familiar
jurisdiction. Restricting the venue for proceedings against controllers and proces-
sors to the Member State in which the latter have an establishment could discour-
age data subjects residing in other Member States from bringing a court action, as
it would entail travelling and additional costs, and the proceedings could be in a for-
eign language and jurisdiction. The only exception concerns cases where the con-
troller or processor are public authorities and processing is undertaken in the exer-
cise of their public powers. In this case, only the courts of the state of the relevant
public authority are competent for a claim.635
While, in most instances, cases concerning data protection rules will be decided in
the courts of the Member States, some cases may be brought before the CJEU. The
first possibility is where a data subject, a controller, processor or supervisory author-
ity seeks an action for annulment of an EDPB decision. The action, however, is sub-
ject to the conditions of Article 263 of the TFEU, which means that in order to be
admissible, these individuals and entities need to demonstrate that the Board deci-
sion is of direct and individual concern to them.
240
Data subjects’ rights and their enforcement
The CJEU gave judgment (in the Grand Chamber) setting aside the judgment
of the Court of First Instance and confirming the European Commission’s
rejection of the request for access to the full minutes of the meeting, in
order to protect the personal data of the persons at the meeting. The CJEU
considered the Commission correct in refusing to disclose that information,
given that the participants had not given their consent to the disclosure of
their personal data. In addition, Bavarian Lager had not demonstrated the
necessity of accessing that information.
241
Handbook on European data protection law
and Others639 and Schrems640 – which greatly affected the development of EU data
protection law, reached the CJEU.
639 CJEU, Joined cases C-293/12 and C-594/12, Digital Rights Ireland Ltd v. Minister for Communications,
Marine and Natural Resources and Others and Kärntner Landesregierung and Others [GC], 8 April 2014.
640 CJEU, C-362/14, Maximilian Schrems v. Data Protection Commissioner [GC], 6 October 2015.
641 CJEU, Joined cases C-293/12 and C-594/12, Digital Rights Ireland Ltd v. Minister for Communications,
Marine and Natural Resources and Others and Kärntner Landesregierung and Others [GC], 8 April 2014.
242
Data subjects’ rights and their enforcement
Austrian Constitutional Court referred the matter to the CJEU to decide the
compatibility of the directive with the rights to privacy and data protection
enshrined in the EU Charter of Fundamental Rights.
The CJEU Grand Chamber decided the case, which resulted in the annulment
of the EU Data Retention Directive. The CJEU found that the directive entailed
a particularly serious interference with the fundamental rights to privacy and
data protection, without that interference being limited to what is strictly
necessary. The directive pursued a legitimate aim, as it allowed national
authorities to have additional opportunities to investigate and prosecute
serious crimes and was thus a valuable tool for criminal investigations.
However, the CJEU noted that limitations to fundamental rights should apply
only if strictly necessary and should be accompanied with clear and precise
rules regarding their scope, together with safeguards for individuals.
According to the CJEU, the directive failed to meet this necessity test.
Firstly, it did not establish clear and precise rules limiting the extent of the
interference. Instead of requiring a relationship between the retained data
and serious crime, the directive applied to all metadata of all users of all
electronic communication means. It thus constituted an interference with the
rights to privacy and data protection of practically the entire EU population,
which could be considered disproportionate. It did not contain conditions
to limit the persons authorised to access the personal data, nor was such
access subject to procedural conditions such as the requirement to have the
approval of an administrative authority or court prior to access. Finally, the
directive did not set out clear safeguards for the protection of retained data.
It therefore failed to ensure effective protection of the data against the risk
of abuse and against any unlawful access and use of the data.642
In principle, the CJEU must answer referred questions and it cannot refuse to give
its preliminary ruling on the grounds that this response would be neither relevant
nor timely in respect of the original case. It can, however, refuse if the question
does not fall within its sphere of competence.643 The CJEU gives a decision only on
642 CJEU, Joined cases C-293/12 and C-594/12, Digital Rights Ireland Ltd v. Minister for Communications,
Marine and Natural Resources and Others and Kärntner Landesregierung and Others [GC], 8 April 2014,
para. 69.
643 CJEU, C-244/80, Pasquale Foglia v. Mariella Novello (No. 2), 16 December 1981; CJEU, C-467/04,
Criminal Proceedings against Gasparini and Others, 28 September 2006.
243
Handbook on European data protection law
the constituent elements of the request referred for a preliminary ruling, while the
national court retains its competence to decide the original case.644
Under CoE law, Contracting Parties must establish appropriate judicial and non-
judicial remedies for violations of the provisions of Modernised Convention 108.645
Allegations data protection rights violations contravening Article 8 of the ECHR
against a Contracting Party to the ECHR, may, additionally, be brought before the
ECtHR when all available domestic remedies have been exhausted. A plea of viola-
tion of Article 8 of the ECHR before the ECtHR must also meet other admissibility
criteria (Articles 34–35 of the ECHR).646
Although applications to the ECtHR can be directed only against Contracting Parties,
they can also indirectly deal with actions or omissions of private parties, insofar as
a Contracting Party has not fulfilled its positive obligations under the ECHR and has
not provided sufficient protection against infringements of data protection rights in
its national law.
644 CJEU, C-438/05, International Transport Workers’ Federation, Finnish Seamen’s Union v. Viking Line ABP,
OÜ Viking Line Eesti [GC], 11 December 2007, para. 85.
645 Modernised Convention 108, Art. 12.
646 ECHR, Art. 34–37.
647 ECtHR, K.U. v. Finland, No. 2872/02, 2 December 2008.
244
Data subjects’ rights and their enforcement
If the ECtHR finds that a Contracting Party has violated any of the rights protected by
the ECHR, that Contracting Party is obliged to execute the ECtHR’s judgment (Article 46
of the ECHR). Execution measures must first put an end to the violation and remedy,
as far as possible, its negative consequences for the applicant. Execution of judgments
may also require general measures to prevent violations similar to those found by the
Court, whether through changes in legislation, case law or other measures.
Where the ECtHR finds a violation of the ECHR, Article 41 of the ECHR provides that it
may award “just satisfaction” to the applicant at the expense of the Contracting Party.
This representation right enables individuals to benefit from the expertise and
organisational and financial capacity of such non-profit entities, thereby greatly
facilitating individuals in exercising their rights. The GDPR allows these entities to
bring collective claims on behalf of multiple data subjects. This also benefits the
functioning and efficiency of the judicial system, as similar claims are grouped and
examined together.
245
Handbook on European data protection law
Compensation must be ‘full and effective’ in relation to the damage suffered. Where
damage is caused by the processing of several controllers and processors, each
controller or processor must be held liable for the entire damage. This rule seeks
to ensure effective compensation for data subjects and a coordinated approach to
compliance by the controllers and processors involved in processing activities.
Example: Data subjects are not required to bring a case and claim
compensation from all the entities responsible for the damage, as this might
entail expensive and lengthy proceedings. It is sufficient to bring a case
against one of the joint controllers, which may then be held liable for the
full damage. In such cases, a controller or processor who pays the damage
is subsequently entitled to recover the sum paid from the other entities
involved in the processing and responsible for the violation, for their part of
246
Data subjects’ rights and their enforcement
the responsibility for the damage. These proceedings between the different
joint controllers and processors take place after the data subject has received
compensation and the data subject is not part of them.
6.2.4. Sanctions
Under CoE law, Article 12 of Modernised Convention 108 provides that appropriate
sanctions and remedies must be established by each Contracting Party for violations
of domestic law provisions that give effect to the basic principles of data protection
set out in Convention 108. The convention does not establish or impose a particu-
lar set of sanctions. On the contrary, it clearly indicates that each Contracting Party
has the discretion to determine the nature of judicial or non-judicial sanctions, which
may be criminal, administrative or civil. The Explanatory Report of Modernised Con-
vention 108 provides that sanctions must be effective, proportionate and dissua-
sive.655 Contracting Parties must respect this principle when determining the nature
and severity of sanctions available in their domestic legal order.
247
Handbook on European data protection law
The GDPR follows a tiered approach to fines. The supervisory authorities have the
power to impose administrative fines for infringements of the regulation of up to
€ 20,000,000 or, in the case of an undertaking, 4 % of its total worldwide annual
turnover – whichever is higher. Infringements that can trigger this level of fine
include breaches of the basic principles for processing and the conditions for con-
sent, breaches of data subjects’ rights and of the regulation’s provisions governing
the transfer of personal data to recipients in third countries. For other infringements,
supervisory authorities may impose fines of up to € 10,000,000 or, in the case of an
undertaking, two percent of its total worldwide annual turnover – whichever is higher.
When determining the type and level of fine to be imposed, supervisory authorities
must take a series of factors into account.656 For instance, they must duly consider
the nature, gravity and duration of the infringement, the categories of personal data
affected, and whether it had an intentional or negligent character. Where a control-
ler or processor has taken action to mitigate the damage suffered by data subjects,
this should also be taken into consideration. Similarly, the degree of cooperation
with the supervisory authority following the infringement, and the manner in which
the supervisory authority learned of the infringement (for example, whether it was
reported by the entity responsible for the processing, or by a data subject whose
rights were violated) are other important factors guiding the supervisory authorities
in their decision.657
248
7
International data transfers
and flows of personal data
249
Handbook on European data protection law
Under EU law, the General Data Protection Regulation provides for the free flow of data
within the European Union. However, it contains specific requirements relating to the
personal data transfers to third countries outside the EU and to international organisa-
tions. The regulation recognises the importance of such transfers, especially in view of
international trade and cooperation, but also recognises the increased risk to personal
data. The regulation therefore aims to offer the same level of protection to personal
data being transferred to third countries as they enjoy within the EU.658 CoE law also
recognises the importance of implementing rules for transborder data flows, based on
a free flow between parties and specific requirements for transfers to non-parties.
• EU and CoE laws have rules on personal data transfers to recipients in third countries or
to international organisations.
• Ensuring the data subject’s rights are safeguarded when data are transferred outside
the EU allows the protection afforded by EU law to follow the personal data originating
in the EU.
250
International data transfers and flows of personal data
Under CoE law, transborder data flows are described as personal data transfers to
recipients who are subject to a foreign jurisdiction.659 Transborder data flows to a
recipient who is not subject to the jurisdiction of a Contracting Party are only allowed
if there is an appropriate level of protection.660
EU law regulates transfers “of personal data which are undergoing processing or are
intended for processing after transfer to a third country or to an international organi-
sation [...]”.661 Such data flows are only allowed if they comply with the rules set out
in Chapter V of the GDPR.
Cross-border flows of personal data are allowed to a recipient who is subject to the
jurisdiction of a Contracting Party or Member State under CoE law or EU law, respec-
tively. Both legal systems also allow data to be transferred to a country that is not a
Contracting Party or a Member State, provided that certain conditions are fulfilled.
• The flow of personal data throughout the EU, as well as personal data transfers among
Contracting Parties to Modernised Convention 108, must be free from restrictions.
However, as not all Contracting Parties to Modernised Convention 108 are Member
States of the EU, transfers from an EU Member State to a third country that is, never-
theless, a Contracting Party to Convention 108, are not possible unless they meet the
conditions set out in the GDPR.
Under CoE law, there must be a free flow of personal data between Contracting
Parties to Modernised Convention 108. However, the transfer may be prohibited
if there is a “real and serious risk that the transfer to another Party would lead to
circumventing the provisions of the Convention” or if a Party is bound to do so by
251
Handbook on European data protection law
If, however, the same Slovenian affiliate wants to transfer the same personal
data to the parent company in Malaysia, then the Slovenian data exporter
must take into account the rules in Chapter V of the GDPR. These provisions
are intended to safeguard the personal data of data subjects who are subject
to EU jurisdiction.
Under EU law, flows of personal data to Member States of the EEA for purposes
related to the prevention, investigation, detection or prosecution of criminal offences
or the execution of criminal penalties are subject to Directive 2016/680.665 This
also ensures that the exchange of personal data by competent authorities within
the Union is not restricted or prohibited for data protection reasons. Under CoE law,
processing of all personal data (including their cross-border flow with other parties
to Convention 108), with no exceptions based on purposes or fields of action, are
252
International data transfers and flows of personal data
• Both the CoE and the EU allow for personal data transfers to third countries or inter-
national organisations, provided that certain conditions are met for the protection of
personal data.
• Under CoE law, an appropriate level of protection can be achieved by the law of
the State or international organisation or by having appropriate standards in place.
• Under EU law, transfers may take place if the third country ensures an adequate
level of protection or if the data controller or processor provides appropriate safe-
guards, including enforceable data subject rights and legal remedies, through
means such as standard data protection clauses or binding corporate rules.
• Both CoE law and EU law provide for derogation clauses allowing for the transfer of
personal data in specific circumstances even where neither an adequate level of pro-
tection nor appropriate safeguards are in place.
While both CoE law and EU law allow for data flows to third countries or to interna-
tional organisations, they lay down different conditions. Each set of conditions takes
account of the respective organisation’s different structure and purposes.
Under EU law, there are, in principle, two ways of allowing the transfer of per-
sonal data to third countries or to international organisations. Transfers of per-
sonal data may take place on the basis of: an adequacy decision by the European
Commission;666 or, in the absence of such an adequacy decision, where the controller
or processor provides appropriate safeguards, including enforceable rights and legal
remedies for the data subject.667 In the absence of either an adequacy decision or
appropriate safeguards, a number of derogations are available.
253
Handbook on European data protection law
Under CoE law, however, free data transfers to non-parties to the convention are
only allowed on the basis of:
• the law of that state or international organisation, including the applicable inter-
national treaties or agreements guaranteeing appropriate safeguards;
The European Commission assesses the level of data protection in foreign countries
by looking at their national law and applicable international obligations. A country’s
participation in multilateral or regional systems, in particular regarding the protec-
tion of personal data, is to be taken into account as well. If the European Commis-
sion finds that the third country or international organisation ensures an adequate
level of protection, it can issue an adequacy decision which has binding effect.671
Nevertheless, the CJEU has stated that national supervisory authorities still have
the competence to examine the claim of a person concerning the protection of their
254
International data transfers and flows of personal data
personal data which has been transferred to a third country that has been deemed
by the Commission as ensuring an adequate level of protection, where that person
contends that the law and practices in force in the third country do not ensure an
adequate level of protection.672
The European Commission can also assess the adequacy of a territory within a third
country, or confine itself to specific sectors, as was the case for Canada’s private
commercial legislation, for example.673 There are also adequacy findings for trans-
fers based on agreements between the EU and third countries. These decisions refer
exclusively to a single type of data transfer, such as an airline’s transmission of pas-
senger name records (PNR) to foreign border control authorities when the airline
flies from the EU to certain overseas destinations (see Section 7.3.4).
672 CJEU, C-362/14, Maximilian Schrems v. Data Protection Commissioner [GC], 6 October 2015, paras. 63
and 65–66.
673 European Commission (2002), Decision 2002/2/EC of 20 December 2001 pursuant to
Directive 95/46/EC of the European Parliament and of the Council on the adequate protection of
personal data provided by the Canadian Personal Information Protection and Electronic Documents Act,
OJ 2002 L 2.
255
Handbook on European data protection law
Harbour principles’.674 The CJEU invalidated this decision in 2015 and a new adequacy
decision was adopted in July 2016, allowing companies to join as of 1 August 2016.
The CJEU ruled that the Commission’s decision on the adequacy of the
Safe Harbour framework was invalid. The CJEU first noted that the decision
allowed the applicability of the Safe Harbour data protection principles to be
limited on the basis of national security, public interest or law enforcement
requirements or on the basis of domestic US legislation. The decision
therefore enabled interference with the fundamental rights of those persons
whose personal data was or could be transferred to the US.676 It further noted
that the decision did not contain any findings on the existence of rules in the
US intended to limit such interference, nor on the existence of any effective
legal protection against such interference.677 The CJEU highlighted that the
level of protection of fundamental rights and freedoms guaranteed within
the EU required legislation interfering with Articles 7 and 8 to lay down
clear and precise rules defining the scope and application of a measure, and
imposing minimum safeguards, derogations, and limitations regarding the
674 Commission Decision 2000/520/EC of 26 July 2000 pursuant to Directive 95/46/EC of the European
Parliament and of the Council on the adequacy of the protection provided by the safe harbour privacy
principles and related frequently asked questions issued by the US Department of Commerce, OJ L 215.
The Decision was declared invalid by the CJEU in C-632/14, Maximilian Schrems v. Data Protection
Commissioner [GC].
675 CJEU, C-362/14, Maximilian Schrems v. Data Protection Commissioner [GC], 6 October 2015.
676 Ibid., para. 84.
677 Ibid., paras. 88–89.
256
International data transfers and flows of personal data
protection of personal data.678 Given that the Commission decision did not
state that the US in fact ensures such a level of protection by reason of its
domestic law or its international commitments, the CJEU concluded that it
failed to meet the requirements of the relevant transfer provision in the Data
Protection Directive and was therefore invalid.679
The US’ level of protection was thus not ‘essentially equivalent’ to the
fundamental rights and freedoms guaranteed by the EU.680 The CJEU argued
that various articles of the EU Charter of Fundamental Rights were violated.
Firstly, the essence of Article 7 was compromised, as US legislation was
“permitting the public authorities to have access on a generalised basis to the
content of electronic communications”. Secondly, the essence of Article 47
was also violated, as the legislation did not provide individuals with legal
remedies concerning access to personal data or rectification or erasure of
personal data. Lastly, given that the Safe Harbour arrangement violated the
above articles, personal data were no longer lawfully processed, resulting
in a violation of Article 8.
After the CJEU declared the Safe Harbour arrangement invalid, the Commission and
the US agreed on a new framework, the EU-US Privacy Shield. On 12 July 2016, the
Commission adopted a decision declaring that the US ensures an adequate level of
protection for personal data transferred from the Union to organisations in the US
under the Privacy Shield.681
Similarly to the Safe Harbour arrangement, the EU-US Privacy Shield framework
aims to protect personal data that are transferred from the EU to the US for com-
mercial purposes.682 US companies can voluntarily self-certify their adherence to the
257
Handbook on European data protection law
Privacy Shield list by committing to meet the framework’s data protection stand-
ards. The competent US authorities monitor and verify the compliance of the certi-
fied companies with these standards.
• data protection obligations on companies receiving personal data from the EU;
The US government has written commitments and assurances that accompany the
Privacy Shield decision. These provide limitations and safeguards for the US govern-
ment’s access to personal data for law enforcement and national security purposes.
683 For more information, see the European Commission web page on the EU-U.S. Privacy Shield.
684 European Commission, Report from the Commission to the European Parliament and the Council
on the first annual review of the functioning of the EU–U.S. Privacy Shield, COM(2017) 611 final,
18 October 2017.
685 General Data Protection Regulation, Art. 46.
258
International data transfers and flows of personal data
• codes of conduct;
• certification mechanisms.686
Under CoE law, data flows to a state or international organisation that is not a party
to the Modernised Convention 108 are allowed, provided that an appropriate level of
protection is secured. This can be achieved by:
Both CoE law and EU law recognise contractual clauses between the data-exporting
controller and the recipient in the third country as being a possible means of safe-
guarding a sufficient level of data protection for the recipient.689
259
Handbook on European data protection law
At the EU level, the European Commission with the assistance of the Article 29
Working Party developed standard data protection clauses which were officially
certified by a Commission decision as proof of adequate data protection.690 As Com-
mission decisions are binding in their entirety in the Member States, the national
authorities that supervise data transfers must acknowledge these standard con-
tractual clauses in their procedures.691 Thus, if the data-exporting controller and the
third-country recipient agree and sign these clauses, this ought to provide the super-
visory authority with sufficient proof that adequate safeguards are in place. Yet in
the Schrems case, the CJEU held that the European Commission does not have the
competence to restrict the powers of the national supervisory authorities to over-
see the transfer of personal data to a third country which has been the subject of a
Commission adequacy decision.692 Thus, national supervisory authorities are not pre-
vented from exercising their powers, including the power to suspend or ban a trans-
fer of personal data when the transfer is carried out in violation of EU or national
data protection law, such as, for instance, when the data importer does not respect
the standard contractual clauses.693
The existence of standard data protection clauses in the EU legal framework does
not prevent controllers from formulating other ad hoc, individual contractual clauses,
as long as the supervisory authority has approved these clauses.694 They would,
however, have to ensure the same level of protection as provided by the standard
data protection clauses. When approving ad hoc clauses, supervisory authorities are
required to apply the consistency mechanism, so as to ensure a consistent regula-
tory approach across the EU.695 This means that the competent supervisory author-
ity has to communicate its draft decision on the clauses to the EDPB. The EDPB will
issue an opinion on the matter, and the supervisory authority must take utmost
account of this opinion in proceeding with its decision. If it does not intend to follow
260
International data transfers and flows of personal data
the EDPB opinion, the dispute resolution mechanism within the EDPB will be trig-
gered and the Board will adopt a binding decision.696
• the data recipient or importer agreeing to be subject to the authority of the data-
exporting controller’s national supervisory authority and/or courts in the case of
a dispute.
There are now two sets of standard clauses available for controller-to-controller
transfers from which the data-exporting controller can choose.697 For controller-to-
processor transfers, there is only one set of standard contractual clauses.698 However,
these standard contractual clauses are currently the subject of legal proceedings.
Example: After the CJEU declared the Safe Harbour Decision invalid,699
personal data transfers to the US could no longer be based on that adequacy
decision. While negotiations with the US authorities were ongoing, and
pending the adoption of a new adequacy decision (eventually adopted on
12 July 2016),700 transfers could only be carried out under other legal bases,
such as standard contractual clauses or binding corporate rules. Several
companies, including Facebook Ireland (against which the case that led to
261
Handbook on European data protection law
EU law also allows for personal data transfers based on binding corporate rules
for international transfers that take place within the same group of enterprises or
undertakings that are part of a joint economic activity.702 Before binding corporate
rules can be relied upon as a tool for the transfer of personal data, the competent
supervisory authority needs to approve them, in accordance with binding corporate
rules, making use of the consistency mechanism.
In order to be approved, binding corporate rules need to be legally binding, cover all
the essential data protection principles and apply to – and be enforced by – every
member of the group. They must expressly confer enforceable rights on data sub-
jects, include all essential data protection principles and comply with certain for-
mal requirements, such as stating the structure of the undertaking, describing the
701 For more information, see the revised complaint of the Irish Data Protection Commissioner against
Facebook Ireland Ltd and Maximilian Schrems on 1 December 2015.
702 General Data Protection Regulation, Art. 47.
262
International data transfers and flows of personal data
transfers and how data protection principles will be applied. This includes providing
such information to data subjects. Binding corporate rules must specify, amongst
other things, data subjects’ rights and provisions on liability for any breach of the
rules.703 When approving binding corporate rules, the consistency mechanism for the
cooperation of the supervisory authorities (described in Chapter 5) will be triggered.
Under CoE law, the ad hoc or standardised safeguards, which are embedded in a
legally binding document,705 also include binding corporate rules.
• the data subject gives explicit consent for the data transfer;
• to conclude a contract between a data controller and a third party in the inter-
ests of the data subject;
703 For a more detailed description, see General Data Protection Regulation, Art. 47.
704 Ibid., Art. 57 (1) (s), 58 (1) (j), 64 (1) (f), 65 (1) and (2).
705 Modernised Convention 108, Art. 14 (3) (b).
263
Handbook on European data protection law
• for the transfer of data from public registers (this is an instance of prevailing
interests of the general public to be able to access information stored in public
registers).706
Where none of these conditions applies, and where the transfers cannot be based
on an adequacy decision or appropriate safeguards, a transfer may take place only
when it is not repetitive, concerns a limited number of data subjects and is neces-
sary for the purposes of the data controller’s compelling legitimate interests, pro-
vided that the data subject’s rights do not override these.707 In these cases, the
controller needs to assess the circumstances surrounding the transfer and to provide
safeguards. It must also inform the supervisory authority and the data subjects
affected of both the transfer and the legitimate interest justifying it.
The fact that derogations are a last resort for lawful transfers708 (to be used only
in the absence of an adequacy decision and if no other safeguards are in place)
emphasises their exceptional nature, and is further highlighted in the GDPR’s recit-
als. As such, derogations are accepted as a possibility “for transfers in certain cir-
cumstances” on the basis of consent, and where “the transfer is occasional and
necessary”709 in relation to a contract or a legal claim.
264
International data transfers and flows of personal data
Unless an adequacy decision is in place, the EU or its Member States are empowered
to set limits on the transfer of specific categories of personal data to a third country,
despite other conditions for such transfers being met, for important reasons of pub-
lic interest. These limits ought to be perceived as exceptional, and Member States
are required to communicate the relevant provisions to the Commission.712
CoE law allows for data flows to territories that do not have appropriate data protec-
tion in cases where:
712 See especially Article 29 Working Party (2005), Working document on a common interpretation of
Article 26 (1) of Directive 95/46/EC of 24 October 1995, WP 114, Brussels, 25 November 2005.
713 Modernised Convention 108, Art. 14 (4).
265
Handbook on European data protection law
Member States may also conclude international agreements with third countries or
international organisations that provide an appropriate level of protection of the fun-
damental rights and freedoms of individuals, insofar as those agreements do not
affect the application of the GDPR.
Examples of international agreements involving the transfer of personal data are the
passenger name records (PNR) agreements.
Passenger Name Records
PNR data are collected by air carriers during the flight reservation process and
include, among others, the names, addresses, credit card details and seat numbers
of air passengers. Air carriers also collect this information for their own commercial
purposes. The EU has entered into agreements with certain third countries (Aus-
tralia, Canada and the US) for the transfer of PNR data to prevent, detect, inves-
tigate and prosecute terrorist offences or serious transnational crime. In addition,
the Union adopted Directive (EU) 2016/861 – known as the EU-PNR Directive715 –
in 2016. This directive provides a legal framework for EU Member States to trans-
fer PNR data to competent authorities in other third countries, to similarly prevent,
detect, investigate or prosecute terrorist offences and serious crimes. PNR transfers
to third country authorities are on a case-by-case basis and are subject to an indi-
vidual assessment on whether the transfer is necessary for the purposes specified
in the directive and provided that fundamental rights are respected.
Concerning PNR agreements between the EU and third countries, their compatibility
with the fundamental rights to privacy and data protection enshrined in the EU Char-
ter of Fundamental Rights has been contested. When – following negotiations with
Canada – the EU signed an agreement on the transfer and processing of PNR data in
2014, the European Parliament decided to refer the matter to the CJEU to assess the
266
International data transfers and flows of personal data
legality of the agreement with EU law, and in particular with Articles 7 and 8 of the
Charter.
The interference with the fundamental rights that the envisaged agreement
brought pursued an objective of general interest, namely public security and
the fight against terrorism and serious transnational crime. However, the
CJEU recalled that to be justified, an interference must be limited to what is
strictly necessary to achieve the pursued aim. After analysing its provisions,
the CJEU concluded that the envisaged agreement did not meet the ‘strict
necessity’ criterion. Among the factors that the CJEU considered to reach
that conclusion were the following:
• The fact that the envisaged agreement entailed the transfer of sensitive
data. The PNR collected pursuant to the envisaged agreement could
include sensitive data, such as information revealing racial or ethnic
origin, religious beliefs or the health status of a passenger. The transfer
and processing of sensitive data by the Canadian authorities could present
a risk to the principle of non-discrimination, and thus required a precise
and solid justification, based on grounds other than public security and
the fight against serious crime. The envisaged agreement failed to
provide such justification.717
267
Handbook on European data protection law
• The continued storage of the PNR data of all passengers, for a period
of five years, even after passengers departed from Canada was also
considered to exceed the limits of strict necessity. The CJEU considered
that it would be permissible for Canadian authorities to retain the data
of passengers whom objective evidence suggests may present a threat
to public security, even after those persons have departed from Canada.
By contrast, the storage of personal data of all passengers, for whom
there is not even indirect evidence presenting them as a risk to public
security, is not justified.718
The Consultative Committee of Convention 108 has provided an opinion on the data
protection implications of PNR agreements under CoE law.719
Messaging data
From the EU perspective, there was no sufficient legal basis for disclosing these data –
mainly about citizens in the EU – to the US simply on the grounds that only because
one of SWIFT’s data service-processing centres were located there.
A special agreement between the EU and the US, known as the SWIFT Agreement,
was concluded in 2010 to provide the necessary legal basis and to ensure adequate
data protection standards.721
268
International data transfers and flows of personal data
Under this agreement, financial data stored by SWIFT continue to be provided to the
US Treasury Department for the purpose of the prevention, investigation, detection,
or prosecution of terrorism or terrorist financing. The US Treasury Department may
request financial data from SWIFT, provided that the request:
• does not seek any data relating to the Single Euro Payments Area (SEPA).722
Europol must receive a copy of each request made by the US Treasury Department
and verify whether or not the principles of the SWIFT Agreement are being complied
with.723 If it is confirmed that they are, SWIFT must provide the financial data directly
to the US Treasury Department. The department must store the financial data in a
secure physical environment where they are accessed only by analysts investigat-
ing terrorism or its financing, and the financial data must not be interconnected with
any other database. In general, financial data received from SWIFT must be deleted
no later than five years from its receipt. Financial data which are relevant to specific
investigations or prosecutions may be retained only for as long as the data are nec-
essary for these investigations or prosecutions.
The US Treasury Department may transfer information from the data received by
SWIFT to specific law enforcement, public security or counter-terrorism authorities
within or outside the US exclusively for the investigation, detection, prevention or
prosecution of terrorism and its financing. Where the onward transfer of financial
data involves a citizen or resident of an EU Member State, any sharing of the data
with the authorities of a third country is subject to the prior consent of the compe-
tent authorities of the concerned Member State. Exceptions may be made where the
sharing of the data is essential for the prevention of an immediate and serious threat
to public security.
269
Handbook on European data protection law
the possibility to review in real time and retroactively all searches made of the pro-
vided data, to request additional information to justify the terrorism nexus of these
searches, and the authority to block any or all searches that appear to be in breach
of the safeguards laid down in the agreement.
Data subjects have a right to obtain confirmation from the competent EU supervi-
sory authority that their personal data protection rights have been complied with.
Data subjects also have the right to the rectification, erasure or blocking of their data
that has been collected and stored by the US Treasury Department under the SWIFT
Agreement. However, the access rights of data subjects may be subject to certain
legal limitations. Where access is refused, the data subject must be informed in writ-
ing of the refusal and of their right to seek administrative and judicial redress in the
US.
The SWIFT Agreement is valid for five years, its first period of validity lasted until
August 2015. It automatically extends for subsequent periods of one year unless
one of the parties notifies the other, at least six months in advance, of its intention
not to extend the agreement. The automatic prolonging has been applied in August
2015, 2016 and 2017 and ensures the validity of the SWIFT Agreement until at least
August 2018.724
270
8
Data protection in the
context of police and
criminal justice
EU Issues covered CoE
Data Protection Directive for In general Modernised Convention 108
Police and Criminal Justice
Authorities
Police Police Recommendation
Practical Guide on the use of
personal data in the police
sector
Surveillance ECtHR, B.B. v. France,
No. 5335/06, 2009
ECtHR, S. and Marper v.
the United Kingdom [GC],
Nos. 30562/04 and 30566/04,
2008
ECtHR, Allan v. the United
Kingdom, No. 48539/99, 2002
ECtHR, Malone v. the United
Kingdom, No. 8691/79, 1984
ECtHR, Klass and Others v.
Germany, No. 5029/71, 1978
ECtHR, Szabó and Vissy v.
Hungary, No. 37138/14, 2016
ECtHR, Vetter v. France,
No. 59842/00, 2005
Cybercrime Cybercrime Convention
271
Handbook on European data protection law
In order to balance the individual’s interests in data protection and society’s inter-
ests in data collection for the sake of fighting crime and ensuring national and pub-
lic safety, the CoE and the EU have enacted specific legal instruments. This section
provides an overview of CoE (Section 8.1) and EU law (Section 8.2) in relation to data
protection in police and criminal justice matters.
272
Data protection in the context of police and criminal justice
• The Modernised Convention 108 and the CoE Police Recommendation apply to data
protection across all areas of police work.
One important distinction between CoE and EU law is that CoE law, unlike EU law,
also applies to the national security area. This means that Contracting Parties need
to stay within the remit of Article 8 of the ECHR even for activities related to national
security. Several of the ECtHR’s judgments concern state activities in the sensitive
areas of national security law and practice.725
Concerning police and criminal justice, at the European level, Modernised Conven-
tion 108 covers all fields of the processing of personal data, and its provisions are
intended to regulate the processing of personal data in general. Consequently, Mod-
ernised Convention 108 applies to data protection in the area of police and criminal
justice. The processing of genetic data, personal data relating to offences, criminal
proceedings and convictions and any related security measures, biometric data that
uniquely identify a person, as well as any sensitive personal data, is only allowed
where appropriate safeguards exist against the risks that the processing of such
data may pose to the interests, rights and fundamental freedoms of the data sub-
ject; notably, the risk of discrimination.726
The legal tasks of police and criminal justice authorities often require the process-
ing of personal data, which may have serious consequences for the individuals
concerned. The Police Recommendation adopted by the CoE in 1987 gives guid-
ance to the CoE member states on how they should give effect to the principles
725 See, for example, ECtHR, Klass and Others v. Germany, No. 5029/71, 6 September 1978; ECtHR, Rotaru
v. Romania [GC], No. 28341/95, 4 May 2000 and ECtHR, Szabó and Vissy v. Hungary, No. 37138/14,
12 January 2016.
726 Modernised Convention 108, Art. 6.
273
Handbook on European data protection law
727 Council of Europe, Committee of Ministers (1987), Recommendation Rec(87)15 to member states
regulating the use of personal data in the police sector, 17 September 1987.
728 Council of Europe (2018), Consultative Committee of Convention 108, Practical Guide on the use of
personal data in the police sector, T-PD(2018)1.
729 ECtHR, D.L. v. Bulgaria, No. 7472/14, 19 May 2016.
730 ECtHR, Dragojević v. Croatia, No. 68955/11, 15 January 2015.
274
Data protection in the context of police and criminal justice
731 See, for example, ECtHR, Leander v. Sweden, No. 9248/81, 26 March 1987; ECtHR, M.M. v. the United
Kingdom, No. 24029/07, 13 November 2012; ECtHR, M.K. v. France, No. 19522/09, 18 April 2013, or
ECtHR, Aycaguer v. France, No. 8806/12, 22 June 2017.
732 ECtHR, B.B. v. France, No. 5335/06, 17 December 2009.
733 ECtHR, S. and Marper v. the United Kingdom [GC], Nos. 30562/04 and 30566/04, 4 December 2008,
paras. 119 and 125.
275
Handbook on European data protection law
• public safety;
Many further ECtHR judgments deal with the justification of interference with the
right to privacy through carrying out surveillance.
276
Data protection in the context of police and criminal justice
Example: In Szabó and Vissy v. Hungary,736 the applicants claimed that Hungarian
legislation violated Article 8 of the ECHR, as it was not sufficiently detailed or
precise. Furthermore, it was argued that the legislation did not provide sufficient
guarantees against abuse and arbitrariness. The ECtHR held that Hungarian law did
not require surveillance to be subject to authorisation by a court. Nevertheless, the
Court noted that while it was subjected to the approval of the Minister of Justice,
this supervision was eminently political and incapable of ensuring the required
assessment of ‘strict necessity’. Furthermore, the national law did not provide for
judicial review, given that no notification would be sent to the subjects. The Court
concluded that there had been a violation of Article 8 of the ECHR.
As data processing by police authorities may have a significant impact on the per-
sons concerned, detailed data protection rules for the processing of personal data
in this area are especially necessary. The CoE Police Recommendation sought to
address this issue by giving guidance on how personal data should be collected for
police work; how data files in this area should be kept; who should be allowed to
access these files, including the conditions for transferring personal data to foreign
police authorities; how data subjects should be able to exercise their data protec-
tion rights; and how control by independent authorities should be implemented. The
obligation to provide adequate data security was also considered.
The recommendation does not provide for the open-ended, indiscriminate collec-
tion of personal data by police authorities. It limits the collection of personal data by
police authorities to that which is necessary for the prevention of a real danger or
the prosecution of a specific criminal offence. Any additional data collection would
have to be based on specific national legislation. Processing of sensitive data should
be limited to that which is absolutely necessary in the context of a particular inquiry.
Where personal data are collected without the knowledge of the data subject, the
data subject has to be informed of the data collection as soon as such disclosure no
longer prejudices an investigation. The collection of data by technical surveillance or
other automated means must have a specific legal basis.
277
Handbook on European data protection law
The CoE Police Recommendation provides that, when storing personal data, clear
distinctions must be made between: administrative data and police data; the per-
sonal data of different types of data subjects, such as suspects, convicted persons,
victims and witnesses; and data considered to be hard facts and those based on
suspicions or speculation.
The purpose for which police data may be used must be strictly limited. This has
consequences for the disclosure of police data to third parties: the transfer or dis-
closure of such data within the police sector should be governed by whether or not
there is a legitimate interest in sharing the information. The transfer or disclosure
of such data outside the police sector should be allowed only where there is a clear
legal obligation or authorisation.
278
Data protection in the context of police and criminal justice
279
Handbook on European data protection law
outside the CoE740 were parties to the convention and seven other non-members
have been invited to accede.
The Convention on Cybercrime remains the most influential international treaty deal-
ing with breaches of law over the internet or other information networks. It requires
parties to update and harmonise their criminal laws against hacking and other secu-
rity infringements, including copyright infringement, computer-facilitated fraud, child
pornography and other illicit cyber-activities. The convention also provides for pro-
cedural powers covering the search of computer networks and the interception of
communications in the context of fighting cybercrime. Finally, it enables effective
international cooperation. An additional protocol to the convention deals with the
criminalisation of racist and xenophobic propaganda in computer networks.
While the convention is not an instrument aimed at promoting data protection, it crimi-
nalises activities that are likely to violate a data subject’s right to the protection of his or
her data. Furthermore, it requires Contracting Parties to adopt legislative measures to
enable their national authorities to intercept traffic and content data.741 It also obliges
the Contracting Parties, when implementing the convention, to foresee adequate pro-
tection of human rights and liberties, including the rights guaranteed under the ECHR,
such as the right to data protection.742 Contracting parties are not required to also join
Convention 108 in order to join the Budapest Convention on Cybercrime.
• Within the EU, data protection in the police and criminal justice sector is regulated in
the context of both national and cross-border processing by police and criminal justice
authorities of the Member States and EU actors.
• At the Member State level, the Data Protection Directive for Police and Criminal Justice
Authorities needs to be incorporated into national law.
740 Australia, Canada, Chile, the Dominican Republic, Israel, Japan, Mauritius, Panama, Senegal, Sri Lanka,
Tonga and the United States. See Chart of signatures and ratifications of Treaty 185, status as of July
2017.
741 Council of Europe, Committee of Ministers (2001), Convention on Cybercrime, CETS No. 185, Budapest,
23 November 2001, Art. 20 and 21.
742 Ibid., Art. 15 (1).
280
Data protection in the context of police and criminal justice
• Specific legal instruments govern data protection in police and law enforcement cross-
border cooperation, particularly in combating terrorism and cross-border crime.
• Special data protection rules exist for the European Police Office (Europol), the EU
Judicial cooperation unit (Eurojust), and the newly established European Public
Prosecutor’s Office, which are EU bodies assisting and promoting cross-border law
enforcement.
• Special data protection rules also exist for the joint information systems that have
been established at the EU level for cross-border information exchanges between the
competent police and judicial authorities. Important examples are the Schengen Infor-
mation System II (SIS II), the Visa Information System (VIS) and Eurodac, a centralised
system containing the fingerprint data of third-country nationals and stateless persons
applying for asylum in one of the EU Member States.
• The EU is in the process of updating the data protection provisions set out above, so as
to be in line with the provisions of the Data Protection Directive for Police and Criminal
Justice Authorities.
743 Directive 2016/680/EU of the European Parliament and of the Council of 27 April 2016, on the
protection of natural persons with regard to the processing of personal data by competent authorities
for the purposes of the prevention, investigation, detection or prosecution of criminal offences or
the execution of criminal penalties, and on the free movement of such data, and repealing Council
Framework Decision 2008/977/JHA, OJ 2016 L 119, p. 89 (Data Protection Directive for Police and
Criminal Justice Authorities).
281
Handbook on European data protection law
• in cases where police or other law-enforcement authorities act to uphold the law
and to safeguard against and prevent threats to public security and to the funda-
mental rights of the society which could constitute a criminal offence.
The Data Protection Directive for Police and Criminal Justice Authorities protects the
personal data of different categories of individuals involved in criminal proceedings,
such as witnesses, informants, victims, suspects and accomplices. Police and crimi-
nal justice authorities are obliged to comply with the directive’s provisions whenever
they process such personal data for law enforcement purposes, within both the per-
sonal and the material scope of the directive.744
However, the use of data for a different purpose is also allowed under certain condi-
tions. The processing of data for a different law enforcement purpose than that for
which it was collected is only permitted if this is lawful, necessary and proportionate
according to national or EU law.745 For other purposes, the rules of the General Data
Protection Regulation apply. The logging and documenting of data sharing is one of
the competent authorities’ specific duties to assist with the clarification of responsi-
bilities arising from complaints.
Competent authorities working in the area of police and criminal justice are public
authorities, or authorities empowered by national law and public powers to p erform
the functions of a public authority,746 e.g. privately run prisons.747 The directive’s
applicability extends both to data processing at the domestic level and to cross-
border processing between Member States’ police and judicial authorities, as well
as to international transfers by the competent authorities to third countries and
international organisations.748 It does not cover national security or the processing of
personal data by the EU institutions, bodies, offices and agencies.749
744 Data Protection Directive for Police and Criminal Justice Authorities, Art. 2 (1).
745 Ibid., Art. 4 (2).
746 Ibid., Art. 3 (7).
747 European Commission (2016), Communication from the Commission to the European Parliament
pursuant to Article 294 (6) of the Treaty on the Functioning of the European Union concerning the
position of the Council on the adoption of a Directive of the European Parliament and of the Council on
the protection of individuals with regard to the processing of personal data by competent authorities for
the purposes of prevention, investigation, detection or prosecution of criminal offences or the execution
of criminal penalties, and on the free movement of such data, and repealing Council Framework Decision
2008/977/JHA, COM(2016) 213 final, Brussels, 11 April 2016.
748 Data Protection Directive for Police and Criminal Justice Authorities, Chapter V.
749 Ibid., Art. 2 (3).
282
Data protection in the context of police and criminal justice
The directive relies, to a large extent, on the principles and definitions contained
in the General Data Protection Regulation, taking account of the specific nature of
the police and criminal justice fields. Supervision may be carried out by the same
Member State authorities that exercise it under the General Data Protection Regu-
lation as well. The appointment of Data Protection Officers and the carrying out of
Data Protection Impact Assessments have been introduced into the directive as new
obligations for police and criminal justice authorities.750 Although these concepts are
inspired by the General Data Protection Regulation, the directive addresses the spe-
cific nature of police and criminal justice authorities. Compared to data processing for
commercial purposes, which is regulated by the regulation, security-related process-
ing may require some level of flexibility. For instance, providing data subjects with
the same level of protection in terms of rights to information, access to, or deletion
of their personal data as under the General Data Protection Regulation could mean
that any surveillance operation carried out for law enforcement purposes would
become ineffective in the context of law enforcement. The directive therefore does
not contain the principle of transparency. Similarly, the principles of data minimisa-
tion and purpose limitation, requiring that personal data be limited only to what is
necessary in relation to the purposes for which they are processed, and to be pro-
cessed for specified and explicit aims, also need to be applied flexibly in security-
related processing. The information collected and stored by competent authorities
for a particular case may be found extremely useful in resolving future cases.
The Data Protection Directive for Police and Criminal Justice Authorities sets out
some key safeguards regarding the use of personal data. It also spells out the prin-
ciples guiding the processing of these data. Member States need to ensure that per-
sonal data are:
• collected for specified, explicit and legitimate purposes and not processed in a
manner that is incompatible with those purposes;
• adequate, relevant and not excessive in relation to the purposes for which they
are processed;
283
Handbook on European data protection law
• accurate and, where necessary, kept up to date; every reasonable step must be
taken to ensure that personal data that are inaccurate, having regard to the pur-
poses for which they are processed, are erased or rectified without delay;
• kept in a form which permits identification of data subjects for no longer than is
necessary for the purposes for which they are processed;
Under the directive, processing is lawful only when it occurs to the extent neces-
sary to perform the relevant task. Furthermore, this should be done by a competent
authority in pursuit of the objectives specified in the directive and be based on EU
or national law.752 Data must not be kept for longer than is necessary and must be
erased or periodically reviewed within certain time-limits. It must only be used by a
competent authority and for the purpose for which the data were collected, trans-
mitted or made available.
The directive also sets out the rights of the data subject. These include:
• The right to receive information. Member States must oblige the data controller
to make available to the data subject the 1) the identity and contact details of
the controller, 2) the contact details of the data protection officer, 3) the pur-
poses of the intended processing, 4) the right to lodge a complaint with the
supervisory authority and its contact details and 5) the right to access personal
data, to rectify or erase them and to restrict the processing of the data.753 In
addition to these general information requirements, the directive provides that,
in specific cases, and to enable the exercise of their rights, controllers must
give to the data subjects information about the legal basis for the processing
and about how long the data will be stored. If personal data are to be transmit-
ted to other recipients, including in third countries or international organisations,
284
Data protection in the context of police and criminal justice
• The right to access personal data. Member States must ensure that the data sub-
ject enjoys the right to know whether or not his or her personal data are being
processed. If they are, the data subject should have access to certain informa-
tion, such as the categories of data being processed.755 However, this right may
be restricted – for example, to prevent the obstruction of investigation or preju-
dicing the prosecution of a crime, or to protect public security and the rights and
freedoms of others.756
• The right to rectify personal data. Member States are obliged to ensure that a
data subject can, without undue delay, obtain the rectification of incorrect per-
sonal data. Furthermore, the data subject also has the right to have incomplete
personal data completed.757
• The right to erase personal data and restrict processing. In certain cases, the con-
troller needs to erase personal data. Furthermore, the data subject may secure
the erasure of their personal data, but only when they are being unlawfully pro-
cessed.758 In certain situations, the processing of personal data may be restricted
rather than erased. This can occur in cases where 1) the accuracy of the personal
data has been challenged but this cannot be ascertained or 2) where the per-
sonal data are needed for the purpose of evidence.759
Whenever the controller refuses to rectify or to erase personal data, or to restrict the
processing of the data, the data subject must be informed of this in writing. Member
States may restrict this right to information to, amongst other things, protect public
285
Handbook on European data protection law
security or the rights and freedoms of others, for the same reasons as for restricting
the right to access.760
The data subject is normally entitled to information about the processing of his or
her personal data, and has the right of access, rectification, or erasure of the restric-
tion of processing, which he or she can exercise directly with the controller. As a
fall-back, the indirect exercise of the data subject rights, through its data protec-
tion supervisory authority, is also possible under the Police and Criminal Justice Data
Protection Directive, and it comes into effect when the controller restricts the right
of the data subject.761 Article 17 of the directive requires that Member States adopt
measures ensuring that the rights of data subjects may also be exercised through
their supervisory authority. That is why the data controller must inform the data
subject of the possibility of indirect access.
In the context of the Data Protection Directive for Police and Criminal Justice Authori-
ties, data controllers are competent public authorities, or other bodies with the rel-
evant public powers and public authority, who determine the purposes and means
of the processing of personal data. The directive establishes several obligations for
data controllers to ensure a high level of protection for personal data processed for
law enforcement purposes.
Competent authorities must keep logs for the processing operations they carry
out in automated processing systems. Logs must be kept at least for the collection,
alteration, consultation, disclosure including transfers, combination and erasure of
the personal data.762 The directive provides that the logs of consultation and disclo-
sure must make it possible to determine the date and time of the operations, their
justification, and as far as possible, the identification of the person who consulted
the system or disclosed the personal data, and the recipients of the personal data
concerned. The logs must be used only with the aim of verifying the lawfulness of
processing, for self-monitoring, for ensuring the integrity and security of the per-
sonal data, and for criminal proceedings.763 On request of the supervisory authority,
the controller and processor must make the logs available to it.
286
Data protection in the context of police and criminal justice
287
Handbook on European data protection law
exempt from that obligation courts and other independent judicial authorities.769 The
duties of the DPO resemble those under the General Data Protection Regulation. He
or she monitors compliance with the directive, provides information and advises
employees who carry out data processing of their obligations under data protection
legislation. The DPO also issues advice about the need to carry out a data protection
impact assessment and acts as the contact point for the supervisory authority.
• The personal data are transferred to a competent authority, within the mean-
ing of the directive, of the third country or international organisation – although
there is a derogation from this rule in individual and specific cases.771
288
Data protection in the context of police and criminal justice
offence and the level of data protection in the country of destination of the
second international transfer.772
Under the directive, transfers of personal data may take place if one of three condi-
tions has been met. The first one is when the European Commission has issued an
adequacy decision under the directive. The decision can apply to the whole territory
of a third country, or for specific sectors of a third country or for an international
organisation. However, this can only be done if an adequate level of protection is
ensured and the conditions defined in the directive are met.773 In such cases, the
transfer of personal data is not subject to the authorisation of the Member State.774
The European Commission has to monitor developments that could affect the func-
tioning of the adequacy decisions. In addition, the decision has to include a mech-
anism for periodic review. The Commission may also repeal, amend or suspend a
decision where available information reveals that the conditions in the third country
or international organisation no longer ensure an adequate level of protection. If so,
the Commission has to enter into consultations with the third country or interna-
tional organisation, trying to remedy the situation.
289
Handbook on European data protection law
data subject or another person and the prevention of an immediate and serious
threat regarding the public security of the Member State or a third country.777
Finally, and in relation to third countries and international organisations, the directive
also requires the development of international cooperation mechanisms to facilitate
the effective enforcement of the legislation, and so helps data protection supervi-
sory authorities to cooperate with their foreign counterparts.779
Each Member State must ensure that one or more independent national supervisory
authorities are responsible for advising and monitoring the application of the provi-
sions adopted pursuant to the directive.780 The supervisory authority established for
the purpose of the directive may be the same as the supervisory authority estab-
lished under the General Data Protection Regulation, but Member States are free
to designate a different authority, provided it meets the criteria of independence.
Supervisory authorities shall also hear claims lodged by any person concerning the
protection of his or her rights and freedoms regarding the processing of personal
data by competent authorities.
Where the exercise of the data subject’s rights is refused on compelling grounds,
the data subject must have a right to appeal to the competent national supervi-
sory authority and/or to a court. If a person suffers damage due to a violation of
the national law implementing the directive, he or she is entitled to compensation
290
Data protection in the context of police and criminal justice
from the controller or any other authority competent under Member State law.781
Generally, data subjects must have access to a judicial remedy for any breach of
their rights guaranteed by national law implementing the directive.782
291
Handbook on European data protection law
in serious and organised crime and terrorism, which can involve international travel
and has revealed a need for increased police and law-enforcement cross-border
cooperation in many cases.785
The Prüm Decision aims to help signatory Member States improve information shar-
ing for the purpose of preventing and combating crime in three fields: terrorism,
cross-border crime and illegal migration. For this purpose, the decision sets out pro-
visions with regard to:
785 See European Commission (2011), Proposal for a Directive of the European Parliament and of the Council
on the use of Passenger Name Record data for the prevention, detection, investigation and prosecution
of terrorist offences and serious crime, COM(2011) 32 final, Brussels, 2 February 2011, p. 1.
786 Council of the European Union (2008), Council Decision 2008/615/JHA of 23 June 2008 on the
stepping up of cross-border cooperation, particularly in combating terrorism and cross-border crime,
OJ 2008 L 210.
787 Convention between the Kingdom of Belgium, the Federal Republic of Germany, the Kingdom of Spain,
the French Republic, the Grand Duchy of Luxembourg, the Kingdom of the Netherlands and the Republic
of Austria on the stepping up of cross-border cooperation, particularly in combating terrorism, cross-
border crime and illegal migration.
292
Data protection in the context of police and criminal justice
The databases that are made available under the Prüm Decision are governed
entirely by national law, but the exchange of data is additionally governed by the
decision, whose compatibility with the Data Protection Directive for Police and Crimi-
nal Justice Authorities will have to be assessed. The competent bodies for supervi-
sion of such data flows are the national data protection supervisory authorities.
According to this instrument, the use of the information and intelligence exchanged
must be subject to the national data protection provisions of the Member State
receiving the information, according to the same rules as if they had been gathered
in that Member State. Article 8 goes further by stating that when providing informa-
tion and intelligence, the competent law enforcement authority may impose condi-
tions that are in accordance with its national law on their use by the receiving com-
petent law enforcement authority. Those conditions may also apply to the reporting
of the result of the criminal investigation or to criminal intelligence operations for
which the exchange of information and intelligence had been required. However,
when national law provides for exceptions to the restrictions on use (e.g. for judi-
cial authorities, legislative bodies, etc.), the information and intelligence may only be
used after prior consultation with the communicating Member State.
Processing for other purposes can be permitted, but only upon prior authorisation of
the communicating Member State.
788 Council of the European Union (2006), Council Framework Decision 2006/960/JHA of
18 December 2006 on simplifying the exchange of information and intelligence between
law enforcement authorities of the Member States of the European Union, OJ L 386/89 of
29 December 2006.
293
Handbook on European data protection law
The Swedish Initiative further states that the personal data processed must be
protected in accordance with international instruments such as the:
Passenger Name Record (PNR) data relate to the information on air passengers
collected by and held in the carriers’ reservation and departure control systems
for their own commercial purposes. These data contain several different types of
information, such as travel dates, travel itinerary, ticket information, contact details,
the travel agent where the flight was booked, means of payment used, seat num-
ber and baggage information.792 Processing PNR data may help law enforcement
authorities identify known or potential suspects and carry out assessments based
on travel patterns and other indicators typically associated with criminal activities.
An analysis of PNR data also allows retrospective tracking of the travel routes and
contacts of persons suspected to have been involved in criminal activities, which
can enable law enforcement authorities to identify criminal networks.793 The EU has
concluded some agreements with third countries for the exchange of PNR data,
as explained in Section 7. In addition, it has introduced PNR data processing within
the EU, through Directive 2016/681/EU on the use of PNR data for the prevention,
789 Council of Europe (1891), Convention for the Protection of Individuals with regard to Automatic
Processing of Personal Data, ETS n. 108.
790 Council of Europe (2001), Additional Protocol to the Convention for the Protection of Individuals with
regard to Automatic Processing of Personal Data regarding supervisory authorities and transborder data
flows, ETS n. 108.
791 Council of Europe (1987), Recommendation No. R (87) 15 of the Committee of Ministers to member
states regulating the use of personal data in the police sector (Adopted by the Committee of Ministers
on 17 September 1987 at the 410th meeting of the Ministers’ Deputies).
792 European Commission (2011), Proposal for a Directive of the European Parliament and of the Council on
the use of Passenger Name Record data for the prevention, detection, investigation and prosecution of
terrorist offences and serious crime, COM(2011) 32 final, Brussels, 2 February 2011, p. 1.
793 European Commission (2015), Fact Sheet Fighting terrorism at EU level, an overview of Commission’s
actions, measures and initiatives, Brussels, 11 January 2015.
294
Data protection in the context of police and criminal justice
detection, investigation and prosecution of terrorist offences and serious crime (EU
PNR Directive).794 This directive provides for obligations for air carriers to transmit
PNR data to the competent authorities and establishes strict data protection safe-
guards for the processing and collection of such data. The EU PNR Directive applies
to international flights to and from the EU, but also to intra-EU flights if a Member
State so decides.795
The PNR data collected must only contain the information allowed by the EU PNR
Directive. It must be retained in a single information unit, within a secure location in
each Member State. PNR data must be depersonalised six months after its transmis-
sion from the air-carrier and retained for a maximum period of five years.796 PNR
data are exchanged between Member States; between Member States and Europol;
and with third countries, but only on a case-by-case basis.
The transmission and processing of the PNR data and the rights safeguarded for
data subjects must be in line with the Data Protection Directive for Police and Crimi-
nal Justice Authorities and must ensure the high level of protection of privacy and
personal data required by the Charter, Modernised Convention 108 and the ECHR.
The independent national supervisory authorities competent under the Data Pro-
tection Directive for Police and Criminal Justice Authorities are also responsible for
advising on and monitoring the application of the provisions adopted by the Mem-
ber States, pursuant to the EU PNR Directive.
The Data Retention Directive797 – declared invalid on 8 April 2014 in Digital Rights
Ireland – obliged communication service providers to keep metadata available for
the specific purpose of fighting serious crime, for at least six but no more than
24 months, regardless of whether or not the provider still needed these data for bill-
ing purposes or to technically provide the service.
794 Directive (EU) 2016/681 of the European Parliament and of the Council of 27 April 2016 on the use
of passenger name record (PNR) data for the prevention, detection, investigation and prosecution of
terrorist offences and serious crime, OJ 2016 L 119, p. 132.
795 PNR Directive, L 119, p. 132, Art. 1 (1) and Art. 2 (1).
796 Ibid., Art. 12 (1) and Art. 12 (2).
797 Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention
of data generated or processed in connection with the provision of publicly available electronic
communications’ services or of public communications’ networks and amending Directive 2002/58/EC,
OJ 2006 L 105.
295
Handbook on European data protection law
The retention of telecommunications data clearly interferes with the right to data
protection.798 Whether or not this interference is justified has been contested in sev-
eral court procedures in EU Member States.799
In addressing these requests for preliminary rulings, the CJEU declared the
Data Retention Directive to be invalid. According to the CJEU, the data that
could be retained under the directive provided precise information about
individuals when taken as a whole. Furthermore, the CJEU examined the
seriousness of the interference with the fundamental rights to respect for
private life and to the protection of personal data. It found that the retention
satisfies an objective of public interest – namely the fight against serious crime
and, thus, public security. Nevertheless, the CJEU stated that the EU legislator
had violated the principle of proportionality by adopting the directive. Even
though the directive may be appropriate to obtaining the required goal, “the
wide-ranging and particularly serious interference of the Directive with the
fundamental rights to respect privacy and the protection of personal data
is not sufficiently circumscribed to ensure that that interference is actually
limited to what is strictly necessary.”
798 EDPS (2011), Opinion of 31 May 2011 on the Evaluation report from the Commission to the Council and
the European Parliament on the Data Retention Directive (Directive 2006/24/EC), 31 May 2011.
799 Germany, Federal Constitutional Court (Bundesverfassungsgericht), 1 BvR 256/08, 2 March 2010;
Romania, Federal Constitutional Court (Curtea Constituþionalã a României), No. 1258, 8 October 2009; the
Czech Republic, Constitutional Court (Ústavní soud České republiky), 94/2011 Coll., 22 March 2011.
800 CJEU, Joined cases C-293/12 and C-594/12, Digital Rights Ireland Ltd v. Minister for Communications,
Marine and Natural Resources and Others and Kärntner Landesregierung and Others [GC], 8 April 2014,
para. 65.
296
Data protection in the context of police and criminal justice
Outlook
801 Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the
processing of personal data and the protection of privacy in the electronic communications’ sector
(Directive on privacy and electronic communications), OJ 2002 L 201.
802 CJEU, Joined cases C-293/12 and C-594/12, Digital Rights Ireland Ltd v. Minister for Communications,
Marine and Natural Resources and Others and Kärntner Landesregierung and Others [GC], 8 April 2014.
803 CJEU, Joined cases C-203/15 and C-698/15, Tele2 Sverige AB v. Post- och telestyrelsen and Secretary of
State for the Home Department v. Tom Watson and Others [GC], 21 December 2016.
297
Handbook on European data protection law
On 1 February 2017, the EU-US Umbrella agreement for the processing of per-
sonal data for the prevention, investigation, detection, and prosecution of criminal
offences with the US came into force.807 The EU-US Umbrella agreement aims to
ensure a high level of data protection for EU citizens while enhancing the coopera-
tion of EU and US law enforcement authorities. It complements existing EU-US and
Member State-US agreements between law enforcement authorities while also
helping to put in place clear and harmonised data protection rules for future agree-
ments in this field. In that regard, the agreement aims to establish a lasting legal
framework to facilitate the exchange of information.
The agreement does not in itself provide a suitable legal basis for the exchange
of personal data, but instead offers suitable data protection safeguards to the
804 European Commission (2017), Proposal for a Regulation of the European Parliament and of the Council
concerning the respect for private life and the protection of personal data in electronic communications
and repealing Directive 2002/58/EC (Regulation on Privacy and Electronic Communications),
COM(2017) 10 final, Brussels, 10 January 2017.
805 Ibid., Recital 26.
806 See the explanatory memorandum to the Proposal for a Regulation on Privacy and Electronic
Communications COM(2017) 10 final, point 1.3.
807 See Council of the EU (2016), “Enhanced data protection rights for EU citizens in law enforcement
cooperation: EU and US sign ‘Umbrella agreement’”, Press Release 305/16, 2 June 2016.
298
Data protection in the context of police and criminal justice
individuals concerned. It covers all processing of personal data necessary for the
prevention, investigation, detection, and prosecution of criminal offences, including
terrorism.808
The agreement sets out multiple safeguards to ensure that personal data are only
used for the purposes specified in the agreement. In particular, it provides the fol-
lowing protection to EU citizens:
• limitations on the use of data: personal data may only be used for the purpose of
preventing, investigating, detecting or prosecuting criminal offences;
• data quality: personal data need to be kept considering their accuracy, relevance,
timeliness and completeness;
• retention periods: personal data may not be retained for longer than necessary
or appropriate;
• access and rectification rights: any individual is entitled to access their personal
data, subject to certain conditions, and will be able to request the data is cor-
rected if it is inaccurate;
808 Agreement between the United States of America and the European Union on the protection of
personal information relating to the prevention, investigation, detection, and prosecution of criminal
offenses of 18 May 2016, (OR.en) 8557/16, Art. 3(1). See also Commission notification on the EU-US
data protection agreement negotiations of 26 May 2010, MEMO/10/216 and the EU Commission
Press Release (2010) on high privacy standards in EU-US data protection agreement of 26 May 2010,
IP/10/609.
299
Handbook on European data protection law
• judicial redress and enforceability: EU citizens have the right809 to seek judicial
redress before US courts in cases where the US authorities deny access or rectifi-
cation, or unlawfully disclose their personal data.
Under the ‘Umbrella agreement’, a system has also been set up to notify the com-
petent supervisory authority in the Member State of affected individuals about any
data protection breaches, where necessary. The legal safeguards provided by the
agreement ensure the equal treatment of EU citizens in the US where there is a pri-
vacy breach.810
Europol, the EU’s law enforcement agency, is headquartered in The Hague, with
Europol National Units (ENUs) in each Member State. Europol was established
in 1998; its present legal status as an EU institution is based on the Regulation on the
European Union Agency for Law Enforcement Cooperation (Europol Regulation).811
The object of Europol is to assist with the prevention and investigation of organised
crime, terrorism and other forms of serious crime, as listed in Annex I of the Europol
Regulation, which affect two or more Member States. It does so by exchanging
809 The US Judicial Redress Act was signed into law by President Obama on 24 February 2016.
810 The European Data Protection Supervisor issued an Opinion on the EU-US Agreement recommending,
among others, the following adaptations: 1) adding ‘for the specific purposes for which they were
transferred’ to the article dealing with retention of data not longer than necessary and appropriate
and 2) excluding bulk transfer of sensitive data, which may be possible. See European Data Protection
Supervisor, Opinion 1/2016, Preliminary Opinion on the agreement between the United State of
America and the European Union on the protection of personal information relating to the prevention,
investigation, detection and prosecution of criminal offences, § 35.
811 Regulation (EU) 2016/794 of the European Parliament and of the Council of 11 May 2016 on the
European Union Agency for Law Enforcement Cooperation (Europol) and replacing and repealing
Council Decisions 2009/371/JHA, 2009/934/JHA, 2009/935/JHA, 2009/936/JHA and 2009/968/JHA,
OJ 2016 L 135, p. 53.
300
Data protection in the context of police and criminal justice
To achieve its aims, Europol has established the Europol Information System, which
provides a database for Member States to exchange criminal intelligence and infor-
mation through their ENUs. The Europol Information System may be used to make
available data which relate to: persons who are suspects or who have been con-
victed of a criminal offence which is subject to Europol’s competence; or persons
regarding whom there are factual indications that they will commit such offences.
Europol and ENUs may enter data directly into the Europol Information System and
retrieve data therefrom. Only the party which entered the data into the system may
modify, correct or delete them. EU bodies, third countries and international organisa-
tions may also provide information to Europol.
Information, including personal data, can also be obtained by Europol from publicly
available sources such as the internet. Transfers of personal data to EU bodies are
allowed only if necessary for the performance of the task of Europol or the recipient
EU body. Transfers of personal data to third countries or international organisations
are allowed only if the European Commission decides that the country or interna-
tional organisation in question ensures an adequate level of data protection (‘ade-
quacy decision’), or if there is an international or cooperation agreement. Europol
can receive and process personal data from private parties and private persons
under the strict conditions that those data are transferred by an ENU in accordance
with its national law, by a contact point in a third country or an international organ-
isation with which there is established cooperation through a cooperation agree-
ment, or by an authority of a third country or an international organisation which
is subject to an adequacy decision or with which the EU has concluded an interna-
tional agreement. All information exchanges are done through a Secure Information
Exchange Network Application (SIENA).
812 See also EDPS (2012), Opinion of the Data Protection Supervisor on the Communication from the
European Commission to the Council and the European Parliament on the establishment of a European
Cybercrime Centre, Brussels, 29 June 2012.
301
Handbook on European data protection law
• causes serious harm to the victim, such as online child sexual exploitation;
The data protection regime governing Europol’s activities is enhanced and draws on
the principles of the EU Institutions Data Protection Regulation815 and is also con-
sistent with the Data Protection Directive for Police and Criminal Justice Authorities,
Modernised Convention 108 and the Police Recommendation.
302
Data protection in the context of police and criminal justice
Europol’s objectives and if those data supplement other personal data processed by
Europol.817 In both these cases only Europol can access the relevant data.818
The storage of data is allowed only for a necessary and proportionate period of time
and its continuation is subject to a review every three years, without which the data
are erased automatically.819
The EDPS is responsible for monitoring and ensuring the protection of fundamental
rights and freedoms of natural persons with regard to the processing of personal
data by Europol, and for advising Europol and data subjects on all matters concern-
ing the processing of personal data. To that end, the EDPS acts as an investigating
and complaints body and acts in close cooperation with the national supervisory
authorities.823 EDPS and the national supervisory authorities will meet at least twice
a year in the Cooperation Board, which has an advisory function.824 Member States
are obliged to establish a supervisory authority by law, competent to monitor the
permissibility of the transfer of personal data from state level to Europol and the
retrieval and any communication with Europol of personal data by the Member
State.825 Member States are also required to ensure that the national supervisory
authority can act completely independently when performing their tasks and duties
under the Europol Regulation.826 To verify the lawfulness of data processing, self-
monitor its activities and ensure data integrity and security, Europol keeps logs or
303
Handbook on European data protection law
An appeal against a decision of the EDPS can be brought before the CJEU.828 Any indi-
vidual who has suffered damage as a result of an unlawful data processing opera-
tion has the right to receive compensation for damage suffered, either from Europol
or from the responsible Member State, by bringing an action before the CJEU in the
first case, or before the competent national court in the second case.829 In addition, a
specialised Joint Parliamentary Scrutiny Group (JPSG) of the national parliaments and
the European Parliament can scrutinise Europol’s activities.830 Every individual has a
right of access to any personal data that Europol may be holding about him or her,
in addition to a right to request that these personal data be checked, corrected or
erased. These may be subject to exemptions and limitations.
Eurojust
304
Data protection in the context of police and criminal justice
Eurojust may process personal data as far as this is necessary to achieve its objec-
tives. This is limited, however, to specific information regarding persons who are
suspected of having committed or having taken part in, or have been convicted
of, a criminal offence subject to Eurojust’s competence. Eurojust may also process
certain information regarding witnesses or victims of criminal offences subject to
Eurojust’s competence.832 In exceptional circumstances, Eurojust may, for a limited
period of time, process more extensive personal data relating to the circumstances
of an offence where such data are immediately relevant to an ongoing investiga-
tion. Within its remit of competence, Eurojust may cooperate with other EU insti-
tutions, bodies and agencies and exchange personal data with them. Eurojust may
also cooperate and exchange personal data with third countries and organisations.
An independent Joint Supervisory Body (JSB) has been established at Eurojust with
the task of monitoring the processing of personal data performed by Eurojust. Indi-
viduals may appeal to the JSB if they are not satisfied with Eurojust’s decision to a
request for access, correction, blocking or erasure of personal data. Where Eurojust
processes personal data unlawfully, Eurojust shall be liable in accordance with the
national law of the Member State where its headquarters is located, the Nether-
lands, for any damage caused to the data subject.
Outlook
832 Consolidated version of the Council Decision 2002/187/JHA as amended by Council Decision
2003/659/JHA and by Council Decision 2009/426/JHA, Art. 15 (2).
833 Rules of Procedure on the Processing and Protection of Personal Data at Eurojust, OJ 2005 C 68/01,
19 March 2005, p. 1.
305
Handbook on European data protection law
functions and structure to be line with the Lisbon Treaty. Furthermore, the reform’s
goal is to establish a clear division between the operational tasks of Eurojust, per-
formed by the Eurojust College, and its administrative tasks. This will also enable
Member States to focus more on the operational tasks. A new Executive Board will
be established to assist the college when performing administrative tasks.834
The EPPO will be competent to investigate and prosecute EU fraud and other crimes
affecting EU financial interests, with an aim of efficiently coordinating investigations
and prosecutions across the different national legal orders and of improving the use
of resources and the exchange of information at European level.839
306
Data protection in the context of police and criminal justice
The EPPO will be headed by a European Public Prosecutor, with at least one
delegated European Prosecutor located in each Member State in charge of carrying
out the investigations and prosecutions in that Member State.
The proposal sets out strong safeguards to guarantee the rights of the persons
involved in the EPPO’s investigations as laid down in national law, EU law and the EU
Charter of Fundamental Rights. Investigatory measures that touch mostly on funda-
mental rights will need prior authorisation by a national court.840 The EPPO’s investi-
gations will be subject to judicial review by the national courts.841
The proposal contains provisions on the rights of data subjects, notably the rights to
information, to access their personal data, to rectification, erasure and restriction of
processing, and provides that such rights may also be exercised indirectly, through
the EDPS. It also embodies the principles of security of processing and accountability,
requiring that the EPPO implements appropriate technical and organisational meas-
ures to ensure a level of security appropriate to the risks posed by the processing,
840 European Commission (2013), Proposal for a Council Regulation on the establishment of the European
Public Prosecutor’s Office, COM(2013) 534 final, Brussels, 17 July 2013, Art. 26 (4).
841 Ibid., Art. 36.
842 Regulation (EC) No. 45/2001 of the European Parliament and of the Council of 18 December 2000 on
the protection of individuals with regard to the processing of personal data by the institutions and bodies
of the Community and on the free movement of such data, OJ 2001 L 8.
307
Handbook on European data protection law
to keep records of all processing activities and to carry out a data protection impact
assessment prior to the processing, where a type of processing (for example, pro-
cessing involving the use of new technologies) is likely to result in high risk to the
rights of individuals. Finally, the proposal provides for the designation of a Data Pro-
tection Officer by the college, who must be properly involved in all matters relating
to the protection of personal data and must ensure the EPPO’s compliance with the
applicable data protection legislation.
843 See the European Data Protection Supervisor’s webpage on Supervision Coordination.
844 Regulation (EU) No. 1077/2011 of the European Parliament and of the Council of 25 October 2011
establishing a European Agency for the operational management of large-scale IT systems in the area of
freedom, security and justice, OJ 2011 L 286.
308
Data protection in the context of police and criminal justice
and Eurodac. The core task of the eu-LISA is to ensure the effective, secure and
continuous operation of the information technology systems. It is also responsible
for the adoption of necessary measures to ensure the security of the systems and
the security of data.
In 1985, several Member States of the former European Community entered into
the Agreement between the states of the Benelux Economic Union, Germany and
France on the gradual abolition of checks at their common borders (Schengen
Agreement), aiming to create an area for the free movement of persons, unhindered
by border controls within the Schengen territory.845 To counterbalance the threat to
public security that could arise from open borders, strengthened border controls at
the Schengen area’s external borders were established, as well as close cooperation
between national police and justice authorities.
SIS II consists of a central system (C-SIS), a national system (N-SIS) in each Mem-
ber State, and a communication infrastructure between the central system and
the national systems. C-SIS contains certain data entered by the Member States
on persons and objects. SIS is used by national border control, police, customs, visa
845 Agreement between the Governments of the States of the Benelux Economic Union, the Federal
Republic of Germany and the French Republic on the gradual abolition of checks at their common
borders, OJ 2000 L 239.
846 European Communities (1997), Treaty of Amsterdam amending the Treaty on European Union, the
Treaties establishing the European Communities and certain related acts, OJ 1997 C 340.
847 Croatia, Cyprus and Ireland are carrying out preparatory activities to integrate into the SIS II, but are not
yet part thereof. See the information on the Schengen Information System available on the website of
the European Commission Directorate General for Migration and Home Affairs.
848 Regulation (EC) No. 1987/2006 of the European Parliament and of the Council of 20 December 2006
on the establishment, operation and use of the second generation Schengen Information System,
OJ 2006 L 381 (SIS II) and Council of the European Union (2007), Council Decision 2007/533/JHA of
12 June 2007 on the establishment, operation and use of the second generation Schengen Information
System, (SIS II), OJ 2007 L 205.
309
Handbook on European data protection law
and judicial authorities throughout the Schengen Area. Each of the Member States
operates a national copy of the C-SIS, known as National Schengen Information Sys-
tems (N-SIS), which are constantly updated, thereby updating the C-SIS. There are
different types of alerts in SIS:
• the person does not have the right to enter or stay in the Schengen territory; or
• goods, such as banknotes, cars, vans, firearms and identity documents, have
been reported as stolen or lost property.
Where there is an alert, follow-up activities are to be initiated via the SIRENE
bureaux. SIS II has new functionalities, such as the possibility of entering: biomet-
ric data, such as fingerprints and photographs; or new categories of alerts, such as
stolen boats, aircrafts, containers or means of payment; enhanced alerts on persons
and objects; and copies of European Arrest Warrants (EAWs) on persons wanted for
arrest, surrender or extradition.
The SIS II is based on two acts that complement each other: the SIS II Decision849 and
the SIS II Regulation.850 The EU legislator used different legal basis for the adoption of
the decision and the regulation. The decision governs the use of SIS II for purposes
covered by police and judicial cooperation in criminal matters (the former third pillar
of the EU). The regulation applies to alert procedures falling under visas, asylum,
immigration and other policies related to the free movement of persons (formerly
the first pillar). The alert procedures for each pillar had to be regulated by separate
acts, given that the two legal acts were adopted before the Treaty of Lisbon and the
abolition of the pillars structure.
849 Council Decision 2007/533/JHA of 12 June 2007 on the establishment, operation and use of the second
generation Schengen Information System (SIS II), OJ L 205, 7 August 2007.
850 Regulation (EC) No. 1987/2006 of the European Parliament and of the Council of 20 December 2006
on the establishment, operation and use of the second generation Schengen Information System (SIS II),
OJ L 381, 28 December 2006.
310
Data protection in the context of police and criminal justice
Both legal acts contain rules on data protection. The SIS II Decision prohibits the
processing of sensitive data.851 The processing of personal data shall be covered by
the scope of Modernised Convention 108.852 Furthermore, persons have the right to
have access to the personal data related to them, which is entered in SIS II.853
The SIS II Regulation regulates the conditions and procedures for entering and pro-
cessing alerts regarding refusals for entry or stay of non-EU citizens. It also provides
rules for exchanging supplementary and additional information for the purposes of
entry or stay in a Member State.854 This regulation also contains rules on data pro-
tection. Sensitive categories of data, as referred to in Article 9(1) of the General Data
Protection Regulation, are not allowed to be processed.855 The SIS II Regulation also
contains certain rights for the data subject, which are:
• the right to be informed if there is an alert issued against the data subject. The
information shall be in writing and be accompanied with a copy or a reference to
the national decision to issue the alert.859
The right to be informed shall not be provided, if 1) the personal data have not
been obtained from the data subject and providing that information is impossible or
requires a disproportionate effort, 2) the data subject already possesses the infor-
mation or 3) if national law allows for a restriction based on, amongst other things,
safeguarding national security or preventing criminal offences.860
311
Handbook on European data protection law
For both the SIS II Decision and SIS II Regulation, access rights of individuals
concerning the SIS II may be exercised in any Member State, and will be dealt with in
accordance with the national law of that Member State.861
Example: In Dalea v. France,862 the applicant was denied a visa to visit France,
as the French authorities had reported to the Schengen Information System
that he should be refused entry. The applicant unsuccessfully sought access
and rectification or deletion of the data before the French Data Protection
Commission and, ultimately, before the Council of State. The ECtHR held that
the reporting of the applicant to the Schengen Information System had been
in accordance with the law and had pursued the legitimate aim of protecting
national security. Since the applicant did not show how he had actually
suffered as a result of the denial of entry into the Schengen area, and since
sufficient measures to protect him from arbitrary decisions were in place, the
interference with his right to respect for private life had been proportionate.
The applicant’s complaint under Article 8 was thus declared inadmissible.
The competent national supervisory authority in each Member State supervises the
domestic N-SIS. The national supervisory authority must ensure that an audit of the
data-processing operations within the domestic N-SIS takes place at least every four
years.863 The national supervisory authorities and the EDPS cooperate and ensure
coordinated supervision of the N-SIS, while the EDPS is responsible for the supervi-
sion of the C-SIS. For the sake of transparency, a joint report of activities shall be sent
to the European Parliament, the Council and eu-LISA every two years. The SIS II’s
Supervision Coordination Group (SCG) has been set up to ensure the SIS’s supervision
coordination and it meets up to twice a year. This group consists of the EDPS and
representatives of the supervisory authorities of those Member States that have
implemented SIS II, as well as Iceland, Liechtenstein, Norway and Switzerland, since
the SIS applies to them as well, given that they are members of Schengen.864 Cyprus,
Croatia and Ireland are not yet part of SIS II and therefore only participate as observ-
ers to the SCG. Within the context of the SCG, the EDPS and the national supervi-
sory authorities cooperate actively, by exchanging information, assisting each
other in the conducting of audits and inspections, designing harmonised proposals
312
Data protection in the context of police and criminal justice
Outlook
In 2016, the European Commission carried out an evaluation of the SIS867 showing
that national mechanisms have been put in place to enable data subjects to access,
correct, and delete their personal data in SIS II or to obtain compensation in connec-
tion with inaccurate data. To improve the efficiency and effectiveness of SIS II, the
European Commission brought forward three proposals for regulations:
• a regulation on the establishment, operation and use of the SIS in the field of
border checks, which will repeal the SIS II Regulation;
• a regulation on the establishment, operation and use of the SIS in the field of
police cooperation and judicial cooperation in criminal matters, which will repeal,
among other things, the SIS II Decision; and
• a regulation on the use of the SIS for the return of illegally-staying third country
nationals.
Importantly, the proposals allow the processing of other categories of biometric data
– in addition to photographs and fingerprints, which are already part of the current
SIS II regime. Facial fingerprints, palm prints and DNA profiles will also be stored in
the SIS database. In addition, while the SIS II Regulation and SIS II decision provided
for a possibility to search with fingerprints to identify a person, the proposals make
this search mandatory if the identity of the person cannot be ascertained in any
other way. Facial images, photographs and palm prints will be used to search the
system and identify people, when this becomes technically possible. The new rules
on biometric attributes pose particular risks for the rights of individuals. In its opinion
313
Handbook on European data protection law
on the Commission proposals,868 the EDPS noted that biometric data are highly
sensitive and their introduction into such a large-scale database should be based
on an evidence-based assessment of the need to include them in the SIS. In other
words, the necessity of processing the new attributes should be demonstrated. The
EDPS also considered that there is a need to further clarify what type of information
can be included in the DNA profile. Since the DNA profile can include sensitive infor-
mation (the most notable example would be information-revealing health issues),
the DNA profiles stored in the SIS should contain: “only the minimum information
which is strictly necessary for the identification of the missing persons and exclude
explicitly health information, racial origin and any other sensitive information.”869
The proposals, however, establish additional safeguards to limit the collection
and further processing of data to that which is strictly necessary and operation-
ally required, and access is restricted to persons who have an operational need to
process the personal data.870 The proposals also empower eu-LISA to produce data
quality reports for Member States at regular intervals, in order to regularly review
alerts to ensure data quality.871
The Visa Information System (VIS), also operated by the eu-LISA, was developed to
support the implementation of a common EU visa policy.872 The VIS allows Schen-
gen states to exchange data concerning visa applicants through a fully centralised
system which connects the consulates and embassies of the Schengen states situ-
ated in non-EU countries with the external border-crossing points of all Schengen
states. The VIS processes data regarding applications for short-stay visas to visit or
868 EDPS (2017), EDPS Opinion on the new legal basis of the Schengen Information System,
Opinion 7/2017, 2 May 2017.
869 Ibid., para. 22.
870 European Commission (2016), Proposal for a Regulation of the European Parliament and of the Council
on the establishment, operation and use of the Schengen Information System (SIS) in the field of police
cooperation and judicial cooperation in criminal matters, amending Regulation (EU) No. 515/2014 and
repealing Regulation (EC) No. 1986/2006, Council Decision 2007/533/JHA and Commission Decision
2010/261/EU, COM(2016) 883 final, Brussels, 21 December 2016.
871 Ibid., p. 15.
872 Council of the European Union (2004), Council Decision 2004/512/EC of 8 June 2004 establishing
the Visa Information System (VIS), OJ 2004 L 213; Regulation (EC) No. 767/2008 of the European
Parliament and of the Council of 9 July 2008 concerning the Visa Information System (VIS) and the
exchange of data between Member States on short-stay visas, OJ 2008 L 218 (VIS Regulation); Council
of the European Union (2008), Council Decision 2008/633/JHA of June 23 2008 concerning access for
consultation of the Visa Information System (VIS) by designated authorities of Member States and by
Europol for the purposes of the prevention, detection and investigation of terrorist offences and of other
serious criminal offences, OJ 2008 L 218.
314
Data protection in the context of police and criminal justice
to transit through the Schengen area. The VIS enables border authorities to verify,
with the help of biometric attributes, notably fingerprints, whether or not the person
presenting a visa is its rightful holder and to identify persons with no or fraudulent
documents.
Under certain conditions, competent national police authorities and Europol may
request access to data entered into the VIS for the purpose of preventing, detecting
or investigating terrorist and criminal offences.875 Since the VIS has been designed
as an instrument to support the implementation of the common visa policy, the
principle of purpose limitation which, as explained in Chapter 3.2, requires that per-
sonal data is processed only for specified, explicit and legitimate persons, and must
be adequate, relevant and not excessive in relation to the purposes for which the
data are processed, would be violated if the VIS would turned into a law enforce-
ment tool. For this reason, national law enforcement authorities and Europol are
not granted routine access to the VIS database. Access may only be granted on a
case-by-case basis and be accompanied by strict safeguards. The conditions and
safeguards for access and consultation of the VIS by these authorities have been
regulated in Council Decision 2008/633/JHA.876
315
Handbook on European data protection law
Furthermore, the VIS Regulation provides for rights of data subjects. These are:
• The right to be informed by the responsible Member State of the identity and
contact details of the data controller in charge of the processing of personal data
within that Member State, the purposes for which their personal data will be
processed within the VIS, the categories of persons to whom the data may be
transmitted (recipients), and the data retention period. In addition, visa appli-
cants must be informed of the fact that the collection of their personal data
under VIS is mandatory for the examination of their application, while Member
States must also inform them about the existence of their right to access their
data, request their rectification or deletion, and about the procedures enabling
them to exercise these rights.877
• The right to access the personal data related to them which have been recorded
in the VIS.878
To ensure supervision of VIS, the VIS SCG was set up. It consists of representatives of
the EDPS and the national supervisory authorities, which meet up twice a year. This
group consists of the representatives of the 28 EU Member States and from Iceland,
Liechtenstein, Norway and Switzerland.881
Eurodac
316
Data protection in the context of police and criminal justice
for asylum in one of the EU Member States.882 The system has been in operation
since January 2003, with the adoption of Council Regulation No. 2725/2000; a recast
became applicable in 2015. Its purpose is primarily to assist in determining which
Member State should be responsible for examining a particular asylum applica-
tion under Regulation (EC) No. 604/2013. That regulation establishes the criteria
and mechanisms for determining the Member State responsible for examining an
application for international protection lodged in one of the Member States by a
third-country national or a stateless person (Dublin III Regulation).883 Personal data
in Eurodac mainly serve the purpose of facilitating the application of the Dublin III
Regulation.884
National law enforcement authorities and Europol are allowed to compare finger-
prints linked to criminal investigations with the fingerprints contained in Eurodac,
but only for the purpose of preventing, detecting or investigating terrorist or other
serious criminal offences. Since Eurodac has been designed as an instrument for
supporting the implementation of the EU’s asylum policy, and not as a law enforce-
ment tool, law enforcement authorities have access to the database only in specific
cases, under specific circumstances, and under strict conditions.885 For further use
of the data for law-enforcement purposes, the Data Protection Directive for Police
and Criminal Justice Authorities applies, whereas data used for the main purpose
of facilitating the Dublin III Regulation is protected under the General Data Protec-
tion Regulation. Further transfer of personal data obtained by a Member State or
882 Council Regulation (EC) No. 2725/2000 of 11 December 2000 concerning the establishment of Eurodac
for the comparison of fingerprints for the effective application of the Dublin Convention, OJ 2000 L 316;
Council Regulation (EC) No. 407/2002 of 28 February 2002 laying down certain rules to implement
Regulation (EC) No. 2725/2000 concerning the establishment of Eurodac for the comparison of
fingerprints for the effective application of the Dublin Convention, OJ 2002 L 62 (Eurodac Regulations),
Regulation (EU) No. 603/2013 of the European Parliament and of the Council of 26 June 2013 on the
establishment of ‘Eurodac’ for the comparison of fingerprints for the effective application of Regulation
(EU) No. 604/2013 establishing the criteria and mechanisms for determining the Member State
responsible for examining an application for international protection lodged in one of the Member States
by a third-country national or a stateless person and on requests for the comparison with Eurodac
data by Member States’ law enforcement authorities and Europol for law enforcement purposes,
and amending Regulation (EU) No. 1077/2011 establishing a European Agency for the operational
management of large-scale IT systems in the area of freedom, security and justice, OJ 2013 L 180, p. 1
(Eurodac Recast Regulation).
883 Regulation (EU) No. 604/2013 of the European Parliament and of the Council of 26 June 2013
establishing the criteria and mechanisms for determining the Member State responsible for examining
an application for international protection lodged in one of the Member States by a third-country
national or a stateless person, OJ 2013 L 180 (Dublin III Regulation).
884 Eurodac Recast Regulation, OJ 2013 L 180, p. 1, Art. 1 (1).
885 Ibid., Art. 1 (2).
317
Handbook on European data protection law
Europol pursuant to the Eurodac Recast Regulation to any third country, international
organisation or private entity established in or outside the EU, is prohibited.886
Eurodac consists of a central unit, operated by eu-LISA, for storing and comparing
fingerprints, and a system for electronic data transmission between Member States
and the central database. Member States take and transmit the fingerprints of every
person of at least 14 years of age who asks for asylum in their territory, and of every
non-EU national or stateless person of at least 14 years of age who is apprehended
for the unauthorised crossing of their external border. Member States may also take
and transmit the fingerprints of non-EU nationals or stateless persons who are found
staying within their territory without permission.
Even though any Member States can consult Eurodac and request comparisons with
fingerprint data, only the Member State that has collected the fingerprints and has
transmitted them to the central unit has the right to amend the data, by correcting,
supplementing or erasing them.887 The eu-LISA keeps records of all data process-
ing to monitor data protection and to ensure data security.888 The national supervi-
sory authorities assist and advise the data subjects on the exercise of their rights.889
Collection and transmission of fingerprint data is subject to judicial review by the
national courts.890 The EU Institutions Data Protection Regulation891 and supervi-
sion by the EDPS apply to processing activities of the Central System, which is man-
aged by eu-LISA concerning Eurodac.892 If a person suffers damage as a result of an
unlawful processing operation, or from any act that is incompatible with the Eurodac
regulation, this person is entitled to compensation from the Member State respon-
sible for the damage.893 It should be stressed, however, that asylum seekers are a
particularly vulnerable group of people who have often undertaken long and risky
travel. Because of their vulnerability and the precarious situation they are often in
while examination of their asylum application is pending, in practice, exercising their
rights, including the right to compensation, may prove difficult.
318
Data protection in the context of police and criminal justice
To use Eurodac for law enforcement purposes, Member States have to designate
the authorities that will have the right to request access, as well as the authorities
that will verify that the requests for comparison are lawful.894 Access of national
authorities, and of Europol, to the Eurodac fingerprint data is subject to very strict
conditions. The requesting authority must submit a reasoned electronic request
only after comparing the data with that in other available information systems, such
as national fingerprint databases and the VIS. There has to be an overriding public
security concern that renders the comparison proportionate. The comparison must
be truly necessary, relate to a specific case and there must be reasonable grounds to
consider that the comparison will substantially contribute to the prevention, detec-
tion or investigation of any of the criminal offences in question, in particular where
there is a substantiated suspicion that the suspect, perpetrator or victim of a terror-
ist offence or other serious criminal offence falls in a category that is subject to the
collection of fingerprints within the Eurodac system. The comparison must be made
solely with fingerprint data. Europol must also obtain authorisation from the Mem-
ber State that collected the fingerprint data.
Personal data stored in Eurodac that relate to asylum applicants are kept for 10 years
from the date on which the fingerprints were taken, unless the data subject obtains
the citizenship of an EU Member State. In this case, the data must be immediately
erased. Data relating to foreign nationals apprehended for unauthorised crossing of
the external border are stored for 18 months. These data must be erased immedi-
ately if the data subject receives a residence permit, leaves EU territory or obtains
the citizenship of a Member State. The data of the persons who were granted asy-
lum remain available for comparison in the context of preventing, detecting and
investigating terrorist and other serious criminal offences for three years.
The Eurodac SCG has been set up to ensure supervision of Eurodac. It consists of
representatives of the EDPS and the national supervisory authorities, which meet up
twice a year. This group consists of the representatives of the 28 EU Member States
and those of Iceland, Liechtenstein, Norway and Switzerland.895
894 Roots, L. (2015), ‘The New EURODAC Regulation: Fingerprints as a Source of Informal Discrimination’,
Baltic Journal of European Studies Tallinn University of Technology, Vol. 5, No. 2, pp. 108–129.
895 See the European Data Protection Supervisor’s webpage on Eurodac.
319
Handbook on European data protection law
Outlook
In May 2016, the Commission issued a proposal on a new recast Eurodac Regula-
tion, as part of a reform aiming to improve the functioning of the Common European
Asylum System (CEAS).896 The proposed recast is important, as it will significantly
extend the scope of the original Eurodac database. Eurodac was initially created to
support the implementation of the CEAS, by providing fingerprint evidence to ena-
ble the determination of which Member State is responsible for examining an asy-
lum application lodged in the EU. The proposed recast will extend the scope of the
database to facilitate the return of irregular migrants.897 National authorities will be
able to consult the database for purposes of identifying third country nationals who
stay in the EU irregularly, or who have entered the EU irregularly, in order to obtain
evidence to assist Member States to return these individuals. In addition, while the
legal regime currently in place only requires the collection and storage of finger-
prints, the proposal introduces the collection of individuals’ facial images,898 which is
another type of biometric data. The proposal would also lower the minimum age of
children from whom the biometric data can be taken – to six years899 instead of 14
years, which is the minimum age under the 2013 regulation. The extended scope of
the proposal means that it will constitute an interference with the rights to privacy
and the data protection of more individuals who may be included in the database.
To counterbalance this interference, the proposal, and the amendments proposed
896 European Commission, Proposal for a Regulation of the European Parliament and of the Council on
the establishment of ‘Eurodac’ for the comparison of fingerprints for the effective application of
[Regulation (EU) No. 604/2013 establishing the criteria and mechanisms for determining the Member
State responsible for examining an application for international protection lodged in one of the Member
States by a third-country national or a stateless person], for identifying an illegally staying third-country
national or stateless person and on requests for the comparison with Eurodac data by Member States’
law enforcement authorities and Europol for law enforcement purposes (recast), COM(2016) final,
4 May 2016.
897 See the explanatory memorandum to the proposal, p. 3.
898 European Commission, Proposal for a Regulation of the European Parliament and of the Council on
the establishment of ‘Eurodac’ for the comparison of fingerprints for the effective application of
[Regulation (EU) No. 604/2013 establishing the criteria and mechanisms for determining the Member
State responsible for examining an application for international protection lodged in one of the Member
States by a third-country national or a stateless person], for identifying an illegally staying third-country
national or stateless person and on requests for the comparison with Eurodac data by Member States’
law enforcement authorities and Europol for law enforcement purposes (recast), COM(2016) final,
4 May 2016, Art. 2 (1).
899 Ibid., Art. 2 (2).
320
Data protection in the context of police and criminal justice
Eurosur
• to reduce the number of deaths of irregular migrants by saving more lives at sea;
Eurosur started its work on 2 December 2013 in all Member States with e xternal
borders, and on 1 December 2014 in the others. The regulation applies to the
surveillance of external land, sea and air borders of the Member States. Eurosur
900 European Parliament, Report on the proposal for a regulation of the European Parliament and of the
Council on the establishment of ‘Eurodac’ for the comparison of fingerprints for the effective application of
[Regulation (EU) No. 604/2013 establishing the criteria and mechanisms for determining the Member State
responsible for examining an application for international protection lodged in one of the Member States by
a third-country national or a stateless person], for identifying an illegally staying third-country national or
stateless person and on requests for the comparison with Eurodac data by Member States’ law enforcement
authorities and Europol for law enforcement purposes (recast), PE 597.620v03-00, 9 June 2017.
901 Regulation (EU) No. 1052/2013 of the European Parliament and of the Council of 22 October 2013
establishing the European Border Surveillance System (Eurosur), OJ 2013 L 295.
902 Regulation (EU) No. 2916/1624 of the European Parliament and of the Council of 14 September 2016on
the European Border and Coast Guard and amending Regulation (EU) 2016/399 of the European
Parliament and of the Council and repealing Regulation (EC) No. 863.2007 of the European Parliament
and of the Council, Council Regulation (EC) No. 2007/2004 and Council Decision 2005/267/EC, OJ L 251.
903 See also: European Commission (2008), Communication from the Commission to the European
Parliament, the Council, the European Economic and Social Committee and the Committee of the
Regions: Examining the creation of a European Border Surveillance System (Eurosur), COM(2008) 68
final, Brussels, 13 February 2008; European Commission (2011), Impact Assessment accompanying
the Proposal for a Regulation of the European Parliament and of the Council establishing the
European Border Surveillance System (Eurosur), Staff working paper, SEC(2011) 1536 final,
Brussels,12 December 2011, p. 18.
321
Handbook on European data protection law
exchanges and processes personal data to a very limited extent, as Member States
and Frontex are only entitled to exchange ship identification numbers. Eurosur
exchanges operational information, such as the location of patrols and incidents, and
as a general rule, the information exchanged cannot include personal data.904 In the
exceptional cases where personal data are being exchanged within the framework
of Eurosur, the regulation provides that the general EU legal framework on data pro-
tection applies fully.905
Eurosur thus ensures the right to data protection, namely by stating that exchanges
of personal data must comply with the criteria and safeguards set by the Data Pro-
tection Directive for Police and Criminal Justice Authorities and the General Data Pro-
tection Regulation.906
904 European Commission, EUROSUR: Protecting the Schengen external borders – protecting migrants’ lives.
EUROSUR in a nutshell, 29 November 2013.
905 Regulation 1052/2013, Recital 13 and Art. 13.
906 Ibid., Recital 13 and Art. 13.
907 Council of the European Union (1995), Council Act of 26 July 1995 drawing up the Convention on
the use of information technology for customs purposes, OJ 1995 C 316, amended by Council of the
European Union (2009), Regulation No. 515/97 of 13 March 1997 on mutual assistance between
the administrative authorities of the Member States and cooperation between the latter and the
Commission to ensure the correct application of the law on customs and agricultural matters, Council
Decision 2009/917/JHA of 30 November 2009 on the use of information technology for customs
purposes, OJ 2009 L 323 (CIS Decision).
322
Data protection in the context of police and criminal justice
confiscated. The categories of data that can be processed are clearly defined, and
include the names, nationality, sex, place and date of birth of the individuals con-
cerned, the reason for the inclusion of their data in the system and the registration
number of the means of transport.908 This information may be used solely for the
purposes of sighting, reporting or carrying out particular inspections or for strategic or
operational analyses concerning persons suspected of breaching customs provisions.
Access to CIS is granted to the national customs, taxation, agricultural, public health
and police authorities, as well as Europol and Eurojust.
The processing of personal data must comply with the specific rules established
by Regulation No. 515/97 and Council Decision 2009/917/JHA, as well as the provi-
sions of the General Data Protection Regulation, the EU Institutions Data Protection
Regulation, Modernised Convention 108 and the Police Recommendation. The EDPS
is responsible for supervising CIS’s compliance with Regulation (EC) No. 45/2001. It
convenes a meeting at least once a year with all national data protection supervi-
sory authorities with competence regarding CIS-related supervisory issues.
323
Handbook on European data protection law
910 Council of the European Union (2005), The Hague Programme: Strengthening Freedom, Security and
Justice in the European Union, OJ 2005 C 53, European Commission (2010), Communication from
the Commission to the European Parliament and the Council: Overview of information management
in the area of freedom, security and justice, COM(2010) 385 final, European Commission (2016),
Communication from the Commission to the European Parliament and the Council: Stronger and Smarter
Information Systems for Borders and Security, COM(2016) 205 final, Brussels, 6 April 2016, European
Commission (2016), Commission Decision of 17 June 2016 setting up the High Level Expert Group on
Information Systems and Interoperability, OJ 2016 C 257.
911 European Commission (2016), Communication from the Commission to the European Parliament and
the Council: Stronger and Smarter Information Systems for Borders and Security, COM(2016) 205 final,
Brussels, 6 April 2016, p. 14.
912 Ibid., pp. 4–5.
913 European Commission (2016), Proposal for a Regulation of the European Parliament and of the Council
establishing an Entry/Exit System (EES) to register entry and exit data and refusal of entry data of
third country nationals crossing the external borders of the Member States of the European Union
and determining the conditions for access to the EES for law enforcement purposes and amending
Regulation (EC) No. 767/2008 and Regulation (EU) No. 1077/2011, COM(2016) 194 final, Brussels,
6 April 2016.
914 European Commission (2016), Communication from the Commission to the European Parliament and
the Council: Stronger and Smarter Information Systems for Borders and Security, COM(2016) 205 final,
Brussels, 6 April 2016, p. 5.
915 European Commission (2016), Proposal for a Regulation of the European Parliament and of the Council
establishing a European Travel Information and Authorisation System (ETIAS) and amending Regulations
(EU) No. 515/2014, (EU) 2016/399, (EU) 2016/794 and (EU) 2016/1624, COM(2016) 731 final,
16 November 2016.
324
9
Specific types of data
and their relevant data
protection rules
EU Issues covered CoE
General Data Protection Regulation Electronic Modernised
Directive on privacy and electronic communications Convention 108
communications Telecommunication
Services
Recommendation
General Data Protection Regulation, Employment Modernised
Article 89 relations Convention 108
Employment
Recommendation
ECtHR, Copland v.
the United Kingdom,
No. 62617/00, 2007
General Data Protection Regulation, Medical data Modernised
Article 9 (2) (h) and (i) Convention 108
Medical Data
Recommendation
ECtHR, Z v. Finland,
No. 22009/93, 1997
Clinical Trials Regulation Clinical trials
General Data Protection Regulation, Statistics Modernised
Article 6 (4), Article 89 Convention 108
Statistical Data
Recommendation
Regulation (EC) No. 223/2009 on Official statistics Modernised
European statistics Convention 108
CJEU, C-524/06, Huber v. Statistical Data
Bundesrepublik Deutschland [GC], 2008 Recommendation
325
Handbook on European data protection law
In several instances, special legal instruments have been adopted at European level
to apply the general rules of Modernised Convention 108 or of the General Data Pro-
tection Regulation in more detail to specific situations.
In 1995, the CoE issued a Recommendation for data protection in the area of tel-
ecommunications, with particular reference to telephone services.916 According to
this recommendation, the purposes of collecting and processing personal data in
the context of telecommunications should be limited to: connecting a user to the
916 Council of Europe, Committee of Ministers (1995), Recommendation Rec(95)4 to member states on
the protection of personal data in the area of telecommunication services, with particular reference to
telephone services, 7 February 1995.
326
Specific types of data and their relevant data protection rules
Special attention was also given to the use of communications networks for send-
ing direct marketing messages. As a general rule, direct marketing messages may
not be directed at any subscriber who has expressly opted out of receiving them.
Automated call devices for transmitting pre-recorded advertising messages may be
used only if a subscriber has given express consent. Domestic law shall provide for
detailed rules in this area.
Within the EU legal framework, after a first attempt in 1997, the Directive on privacy
and electronic communications was adopted in 2002 and amended in 2009. This
was done with the purpose of complementing and tailoring the provisions of the
previous Data Protection Directive to the telecommunications sector.917
• the data constituting the content of the messages sent during communication –
these data are strictly confidential;
• within the metadata, there are data specifically relating to the location of the
communication device, so-called location data – these data are at the same time
917 Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning
the processing of personal data and the protection of privacy in the electronic communications
sector, OJ 2002 L 201 (Directive on privacy and electronic communications) as amended by
Directive 2009/136/EC of the European Parliament and of the Council of 25 November 2009 amending
Directive 2002/22/EC on universal service and users’ rights relating to electronic communications
networks and services, Directive 2002/58/EC concerning the processing of personal data and the
protection of privacy in the electronic communications sector and Regulation (EC) No. 2006/2004 on
cooperation between national authorities responsible for the enforcement of consumer protection laws,
OJ 2009 L 337.
327
Handbook on European data protection law
data about the location of the users of the communication devices, particularly
where users of mobile communication devices are concerned.
Traffic data may be used by the service provider only for billing and for techni-
cally providing the service. With the consent of the data subject, however, these
data may be disclosed to other controllers offering added value services, such as
giving information in relation to the user’s location about the next metro station or
pharmacy or the weather forecast for this location.
According to Article 15 of the e-Privacy Directive, other access to data about com-
munications in electronic networks must fulfil the requirements for justified inter-
ference of the right to data protection as laid down in Article 8 (2) of the ECHR and
confirmed by the EU Charter of Fundamental Rights in Articles 8 and 52. Such access
might include access for the purpose of investigating crimes.
• The restrictions on sending emails for direct marketing purposes were extended
to short message services, multimedia messaging services and other kinds of
similar applications; marketing emails are prohibited unless prior consent was
obtained. Without such consent, only previous customers may be approached
with marketing emails, if they have made their email address available and do
not object.
• Setting of cookies, software that monitors and records a computer user’s actions,
is no longer allowed without the computer user’s consent. National law should
918 Directive 2009/136/EC of the European Parliament and of the Council of 25 November 2009 amending
Directive 2002/22/EC on universal service and users’ rights relating to electronic communications
networks and services, Directive 2002/58/EC concerning the processing of personal data and the
protection of privacy in the electronic communications sector and Regulation (EC) No. 2006/2004 on
cooperation between national authorities responsible for the enforcement of consumer protection laws,
OJ 2009 L 337.
919 See the amended directive, Art. 13.
328
Specific types of data and their relevant data protection rules
regulate in more detail how consent should be expressed and obtained to offer
sufficient protection.920
Outlook
The regulation would adapt the previous directive’s provisions to new technologies
and market reality and would build a comprehensive and consistent framework
with the General Data Protection Regulation. In this sense, the e-Privacy Regulation
920 See Ibid., Art. 5; see also Article 29 Working Party (2012), Opinion 04/2012 on cookie consent
exemption, WP 194, Brussels, 7 June 2012.
921 See also Article 29 Working Party (2011), Working Document 01/2011 on the current EU personal
data breach framework and recommendations for future policy developments, WP 184, Brussels,
5 April 2011.
922 Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention
of data generated or processed in connection with the provision of publicly available electronic
communications services or of public communications networks and amending Directive 2002/58/EC,
OJ 2006 L 105.
923 Proposal for a Regulation of the European Parliament and of the Council concerning the respect for
private life and the protection of personal data in electronic communications and repealing Directive
2002/58/EC (Regulation on Privacy and Electronic Communications) (COM(2017) 10 final), Art. 1.
329
Handbook on European data protection law
would be lex specialis to the General Data Protection Regulation, tailoring it to elec-
tronic communications data that constitute personal data. The new regulation covers
the processing of “electronic communications data”, including electronic communi-
cations content and metadata that are not necessarily personal data. The territorial
scope is limited to the EU, including when data obtained in the EU are processed
outside it, and extends to over-the-top communications service providers. These
are service providers that deliver content, services or applications over the internet,
without the direct involvement of a network operator or internet service provider
(ISP). Examples of such providers include Skype (voice and video calling), What-
sApp (messaging), Google (search), Spotify (music) or Netflix (video content). The
enforcement mechanisms of the General Data Protection Regulation would apply to
the new regulation.
• Specific rules for data protection in employment relations are outlined in the CoE
Employment Data Recommendation.
• The validity of consent, which must have been freely given, as a legal basis for pro-
cessing data about employees may be questionable, considering the economic imbal-
ance between employer and employees. The circumstances surrounding consent must
be assessed carefully.
924 For more information, see European Commission (2017), “Commission proposes high level of privacy
rules for all electronic communications and updates data protection rules for EU institutions”, press
release, 10 January 2017.
330
Specific types of data and their relevant data protection rules
Under the General Data Protection Regulation, the employee should be enabled to
clearly distinguish the data to which he or she freely consents to being processed/
stored and the purposes for which his or her data are stored. Employees should also
be informed of their rights and the length of time the data will be stored, before con-
sent can be given. Should a breach of personal data likely to result in a high risk to
the rights and freedoms of natural persons occur, the employer must communicate
this breach to the employee. Article 88 of the regulation permits Member States to
establish more specific rules to ensure the protection of employees’ rights and free-
doms in respect of their personal data in the employment context.
Example: In the Worten case,926 the data included a record of working time
containing the daily work and rest periods, which constitute personal data.
National law may require an employer to make the records of working time
available to the national authorities responsible for monitoring working
conditions. This would allow immediate access to the relevant personal data.
However, access to the personal data is necessary to allow the national
authority to monitor the legislation on working conditions.927
As regards the CoE, the Employment Data Recommendation was issued in 1989
and revised in 2015.928 The recommendation covers the processing of personal data
for employment purposes in both private and public sectors. The processing must
comply with certain principles and restrictions, such as the principle of transparency
925 Regulation (EC) No. 45/2001 of the European Parliament and of the Council of 18 December 2000
on the protection of individuals with regard to the processing of personal data by the Community
institutions and bodies and on the free movement of such data, OJ 2001 L 8.
926 CJEU, C-342/12, Worten – Equipamentos para o Lar SA v. Autoridade para as Condições de Trabalho
(ACT), 30 May 2013, para. 19.
927 Ibid., para. 43.
928 Council of Europe, Committee of Ministers (2015), Recommendation Rec(2015)5 to member states on
the processing of personal data in the context of employment, April 2015.
331
Handbook on European data protection law
A survey of the most common data protection problems specific to the employment
context can be found in a working document of the Article 29 Working Party.929 The
working party analysed the significance of consent as a legal basis for processing
employment data.930 It found that the economic imbalance between the employer
asking for consent and the employee giving consent will often raise doubts about
whether or not consent was given freely. The circumstances under which consent is
relied on as the legal basis for data processing should therefore be carefully consid-
ered when assessing the validity of consent in the employment context.
929 Article 29 Working Party (2017), Opinion 2/2017 on data processing at work, WP 249, Brussels,
8 June 2017.
930 Article 29 Working Party (2005), Working document on a common interpretation of Article 26(1) of
Directive 95/46/EC of 24 October 1995, WP 114, Brussels, 25 November 2005.
931 ECtHR, Copland v. the United Kingdom, No. 62617/00, 3 April 2007.
332
Specific types of data and their relevant data protection rules
In this case, the ECtHR found a violation of Article 8 because the domestic
authorities had not afforded adequate protection of the applicant’s right to
respect for his private life and correspondence, and had consequently failed
to strike a fair balance between the interests at stake.
333
Handbook on European data protection law
Personal data collected for recruitment must be limited to the information necessary
to evaluate the suitability of candidates and their career potential.
The recommendation also specifically mentions judgmental data relating to the per-
formance or potential of individual employees. Judgmental data must be based on
fair and honest evaluations and must not be insulting in the way they are formu-
lated. This is required by the principles of fair data processing and accuracy of data.
Sensitive personal data collected for employment purposes may only be processed
in particular cases and according to safeguards laid down by domestic law. Employ-
ers may ask employees or job applicants about their state of health or may exam-
ine them medically only where this is necessary. This may be to: determine their
suitability for the employment; fulfil the requirements of preventative medicine;
safeguard the vital interests of the data subject or other employees and individuals;
allow social benefits to be granted; or respond to judicial requests. Health data may
not be collected from sources other than the employee concerned, except when
express and informed consent was obtained or when national law provides for this.
Employees must have a right of access to their employment data as well as a right to
rectification or erasure. If judgmental data are processed, employees must, further,
have a right to contest the judgment. These rights may, however, be temporarily
limited for the purpose of internal investigations. If an employee is denied access,
rectification or erasure of personal employment data, national law must provide
appropriate procedures to contest such denial.
334
Specific types of data and their relevant data protection rules
• Medical data are sensitive data and therefore enjoy specific protection.
Personal data concerning the health of the data subject qualify as sensitive data under
Article 9 (1) of the General Data Protection Regulation and under Article 6 of Modern-
ised Convention 108. Accordingly, health-related data are subject to a stricter data-
processing regime than non-sensitive data. The General Data Protection Regulation
prohibits the processing of “personal data concerning health” (understood as “all data
pertaining to the health status of a data subject which reveal information relating to
the past, current or future physical or mental health status of the data subject”)933, as
well as genetic data and biometric data, unless it is authorised under Article 9 (2). Both
types of data have been added to the list of “special categories of data”.934
335
Handbook on European data protection law
Under EU law, Article 9 (2) (h) of the General Data Protection Regulation allows for
processing medical data where this is required for the purposes of preventative
medicine, medical diagnosis, the provision of care or treatment, or the management
of healthcare services. Processing is permissible, however, only where performed
by a healthcare professional subject to an obligation of professional secrecy, or by
another person subject to an equivalent obligation.936
Under CoE law, the CoE Medical Data Recommendation of 1997 applies the princi-
ples of Convention 108 to data processing in the medical field in more detail.937 The
proposed rules are in line with those of the General Data Protection Regulation as
concerns the legitimate purposes of processing medical data, the necessary profes-
sional secrecy obligations of persons using health data, and the rights of the data
subjects to transparency and access, rectification and deletion. Moreover, medical
data which are lawfully processed by healthcare professionals may not be trans-
ferred to law enforcement authorities unless “sufficient safeguards to prevent dis-
closure inconsistent with the respect for [...] private life guaranteed under Article 8
of the ECHR” are provided.938 The national law must also be “formulated with suffi-
cient precision and afforded adequate legal protection against arbitrariness”.939
936 See also ECtHR, Biriuk v. Lithuania, No. 23373/03, 25 November 2008.
937 Council of Europe, Committee of Ministers (1997), Recommendation Rec(97)5 to member states on the
protection of medical data, 13 February 1997. Note that this Recommendation is in the process of being
revised.
938 ECtHR, Avilkina and Others v. Russia, No. 1585/09, 6 June 2013, para. 53.
939 ECtHR, L.H. v. Latvia, No. 52019/07, 29 April 2014, para. 59.
336
Specific types of data and their relevant data protection rules
The 2016 CoE Recommendation on data resulting from genetic tests also applies to
data processing in the medical field.940 This recommendation is of great importance
to eHealth, where ICT is used to facilitate medical care. An example is sending a
patient’s parental test results from one healthcare provider to another. This recom-
mendation aims to protect the rights of persons whose personal data are processed
for insurance purposes to insure against risks related to a person’s health, physical
integrity, age or death. Insurers need to justify the processing of health-related data
and it should be proportionate to the nature and importance of the risk being con-
sidered. The processing of this kind of data is dependent on the subject’s consent.
Insurers should also have safeguards in place for the storage of health-related data.
Clinical trials – which involve assessing the effects of new drugs on patients in
documented research environments – have considerable data protection implica-
tions. Clinical trials of medical products for human use are regulated by Regulation
(EU) No. 536/2014 of the European Parliament and of the Council of 16 April 2014
on clinical trials on medicinal products for human use, and repealing Directive
2001/20/EC (Clinical Trials Regulation).941 The main elements of the Clinical Trials
Regulation are:
• an ethics committee being part of the assessment, in accordance with the law
of the Member States ( and European law defining the time periods involved);944
and
940 Council of Europe, Committee of Ministers (2016), Recommendation Rec(2016)8 to member states
on the processing of personal health-related data for insurance purposes, including data resulting from
genetic tests, 26 October 2016.
941 Regulation (EU) No. 536/2014 of the European Parliament and of the Council of 16 April 2014 on
clinical trials on medicinal products for human use, and repealing Directive 2001/20/EC (Clinical Trials
Regulation), OJ 2014 L 158.
942 Clinical Trials Regulation, Art. 5 (1).
943 Ibid., Art. 5 (2)–(5).
944 Ibid., Art. 2 (11).
945 Ibid., Art. 9 (1) and Recital 67.
337
Handbook on European data protection law
The General Data Protection Regulation specifies that for the purposes of consent-
ing to participation in scientific research activities in clinical trials, Regulation (EU)
No. 536/2014 applies.946
Many other legislative and other initiatives on personal data in the health sector are
pending at EU level.947
Example: Mr. A has taken out an insurance policy with company B, the
insurer. The latter will collect some health-related information from A, such as
ongoing health issues or illnesses. The insurer should store A’s health-related
personal data separately from other data. The insurer also needs to store
the health-related personal data separately from other personal data. This
means that only A’s case handler will have access to A’s health-related data.
Nevertheless, certain data protection issues are raised by electronic health files,
such as their accessibility, proper storage, and access by the data subject.
338
Specific types of data and their relevant data protection rules
emerging and rapidly growing field that has the potential to transform healthcare
and increase its efficiency and quality. The term covers medical and public health
practice supported by mobile devices, such as mobile phones, patient monitoring
devices, personal digital assistants, and other wireless devices, as well as applica-
tions (for example, well-being applications) that may connect to medical devices or
sensors.949 The paper outlines the risks to the right to protection of personal data
that the development of mHealth could entail, and provides that, given the sensitive
nature of health data, the development should contain specific and suitable security
safeguards for patient data, such as encryption, and appropriate patient authentica-
tion mechanisms to mitigate security risks. Compliance with personal data protec-
tion rules, including the obligation to provide information to the data subject, data
security and the principle of lawful processing of personal data is vital for building
trust in mHealth solutions.950 To this end, a Code of Conduct has been drafted by the
industry, based on inputs from a wide range of stakeholders, containing representa-
tives with expertise in data protection, self- and co-regulation, ICT and health care.951
At the time of drafting of the handbook, the draft code of conduct had been submit-
ted for comments to the Article 29 Data Protection Working Party, pending its formal
approval.
• Data collected for statistical, scientific or historical research purposes may not be used
for any other purpose.
• Data collected legitimately for any purpose may be further used for statistical, scien-
tific or historical research purposes, provided that adequate safeguards are in place.
For this purpose, anonymisation or pseudonymisation before the transmission of data
to third parties can provide these safeguards.
EU law allows for the processing of data for statistical and scientific or historical
research purposes, provided that appropriate safeguards for the rights and freedoms
949 European Commission (20140), Green paper on mobile Health (“mHealth”), COM(2014) 219 final,
Brussels, 10 April 2014.
950 Ibid., p. 8.
951 Draft Code of Conduct on privacy for mobile health applications, 7 June 2016.
339
Handbook on European data protection law
of the data subjects are in place. These may include pseudonymisation.952 EU law or
national law may provide for certain derogations from the rights of data subjects if
these rights are likely to render impossible, or seriously impair, the achievement of
the legitimate purpose of the research.953 Derogations can be introduced from the
right of access by the data subject, the right to rectification, the right to restriction of
processing and the right to object.
Although data lawfully collected by a controller for any purpose may be re-used by
this controller for their own statistical, scientific or historical research purposes, the
data would have to be anonymised or subject to measures such as pseudonymisa-
tion, depending on the context, before transmitting them to a third party for statisti-
cal, scientific or historical research purposes, unless the data subject consented to
it, or it is specifically provided for in national law. Data subject to pseudonymisation
remain subject to the General Data Protection Regulation, unlike anonymous data.954
The regulation thus accords research special treatment in respect of the general data
protection rules to avoid limitations to research development and to comply with
the objective of achieving a European research area, as set out in Article 179 TFEU.
It provides for the broad interpretation of the processing of personal data for sci-
entific research purposes, including technological development and demonstration,
basic research, applied research and privately funded research. It also recognises
the importance of the compilation of data in registries for research purposes and
the possible difficulty in fully identifying the subsequent purpose of personal data
processing for scientific research purposes at the time of data collection.955 For this
reason, the regulation allows the processing of data for these purposes, without the
data subjects’ consent, provided the relevant safeguards are in place.
An important example of the use of data for statistical purposes are official sta-
tistics, obtained by the national and EU statistics bureaus pursuant to national and
EU laws on official statistics. According to these laws, citizens and businesses are
usually obliged to disclose data to the relevant statistics authorities. Officials work-
ing in statistics bureaus are bound by special professional secrecy obligations which
must be complied with properly, as they are essential for the high-level of citizen
trust necessary if data are to be made available to the statistics authorities.956
340
Specific types of data and their relevant data protection rules
In the context of the CoE, further processing of data can be carried out for scientific,
historical or statistical purposes where this is in the public interest, and must be sub-
ject to appropriate safeguards.960 Data subjects’ rights may also be restricted when
processing data for statistical purposes, provided that there is no recognisable risk of
infringing their rights and freedoms.961
957 Regulation (EC) No. 223/2009 of the European Parliament and of the Council of 11 March 2009 on
European statistics and repealing Regulation (EC, Euratom) No. 1101/2008 of the European Parliament
and of the Council on the transmission of data subject to statistical confidentiality to the Statistical Office
of the European Communities, Council Regulation (EC) No. 322/97 on Community Statistics, and Council
Decision 89/382/EEC, Euratom establishing a Committee on the Statistical Programmes of the European
Communities, OJ 2009 L 87, as amended by Regulation (EU) 2015/759 of the European Parliament
and of the Council of 29 April 2015 amending Regulation (EC) No. 223/2009 on European statistics,
OJ 2015 L 123.
958 This principle is to be further detailed in Eurostat’s Code of Practice, which shall, in accordance with
Article 11 of the European Statistics Regulation, give ethical guidance on how to perform official
statistics, including considerate use of personal data.
959 CJEU, C-524/06, Heinz Huber v. Bundesrepublik Deutschland [GC], 16 December 2008; see especially
para. 68.
960 Modernised Convention 108, Art. 5 (4) (b).
961 Ibid., Art. 11 (2).
341
Handbook on European data protection law
Data collected by a controller for statistical purposes may not be used for any other
purpose. Data collected for non-statistical purposes shall be available for further sta-
tistical use. The Statistical Data Recommendation also allows for the communication
of data to third parties, provided this is for statistical purposes only. In such cases,
the parties should agree and write down the extent of the legitimate further use for
statistics. As this cannot replace the data subject’s consent – if needed – there must
be appropriate safeguards laid down in national law to minimise the risks of misus-
ing personal data, such as an obligation to anonymise or pseudonymise the data
before disclosure.
If a statistical survey using personal data is not authorised by law, the data subjects
may have to consent to the use of their data to make it legitimate, or they may need
to be given an opportunity to object. If personal data are collected for statistical pur-
poses by interviewers, they must be informed clearly of whether or not providing
data is mandatory under national law.
Where a statistical survey cannot be performed using anonymous data, and per-
sonal data are needed, the data collected for this purpose must be anonymised as
soon as possible. The results of the statistical survey must not, at the least, allow for
the identification of any data subjects, unless this would clearly present no risk.
After the statistical analysis has been concluded, the personal data used should
either be deleted or anonymised. In cases like this, the Statistical Data Recom-
mendation advises that identification data must be stored separately from other
personal data. This means, for instance, that either the encryption key or the list
containing the identifying synonyms must be stored separately to the other data.
962 Council of Europe, Committee of Ministers (1997), Recommendation Rec(97)18 to member states on
the protection of personal data collected and processed for statistical purposes, 30 September 1997.
342
Specific types of data and their relevant data protection rules
• Although financial data are not considered sensitive data under Modernised Conven-
tion 108 or the General Data Protection Regulation, their processing requires particular
safeguards to ensure accuracy and data security.
• Electronic payment systems particularly need built-in data protection, i.e. privacy or
data protection by design and by default.
• Particular data protection problems can arise in this area because of the need to have
appropriate authentication mechanisms in place.
Example: In M.N. and Others v. San Marino,964 the applicant, an Italian citizen,
concluded a fiduciary agreement with a company under investigation. This
meant that the company was subject to the search and seizure of copies
of (electronic) documentation. The applicant filed a complaint with the San
Marino court, claiming that there was no link between him and the alleged
crimes. However, the court declared his complaint inadmissible, as he was
not an “interested party”. The ECtHR held that the applicant had been at
963 ECtHR, Michaud v. France, No. 12323/11, 6 December 2012. See also ECtHR, Niemietz v. Germany,
No. 13710/88, 16 December 1992, para. 29, and ECtHR, Halford v. the United Kingdom, No. 20605/92,
25 June 1997, para. 42.
964 ECtHR, M.N. and Others v. San Marino, No. 28005/12, 7 July 2015.
343
Handbook on European data protection law
Application of the general legal framework for data protection (as set out in
Convention 108) to the context of payments, was developed by the CoE in Recom-
mendation Rec(90)19 of 1990.966 This recommendation clarifies the scope of the
lawful c ollection and use of data in the context of payments, especially by means
of payment cards. It also provides domestic legislators with detailed recommenda-
tions on the rules for disclosing payment data to third parties, on time limits for the
retention of data, on transparency, data security and transborder data flows, and on
supervision and remedies. The CoE has also developed an Opinion on the transfer
of tax data,967 which provides recommendations and issues to be taken into account
when dealing with the transfer of tax data.
The ECtHR allows for the transmission of financial data – specifically, the details of an
individual’s bank account – under Article 8 ECHR, if it is prescribed by law, pursues a
legitimate aim and is proportionate to the public interest at stake.968
In terms of EU law, electronic payment systems that involve the processing of per-
sonal data must comply with the General Data Protection Regulation. Therefore,
these systems must ensure data protection by design and by default. Data protec-
tion by design obliges the controller to put appropriate technical and organisational
measures in place to implement the data protection principles. Data protection by
default means that the controller must ensure that only the personal data which
344
Specific types of data and their relevant data protection rules
are necessary for a specific purpose can be processed by default (see Section 4.4).
Concerning financial data, the CJEU held that transferred tax data may constitute
personal data.969 The Article 29 Data Protection Working Party issued related guide-
lines for Member States, including criteria to ensure compliance with data protection
rules when automatically exchanging personal data for tax purposes by automated
means.970 In addition, a number of legal instruments have been enacted to regulate
the financial markets and the activities of credit institutions and investment firms.971
Other legal instruments assist in fighting insider dealing and market manipulation.972
The main areas that have an impact on data protection are:
969 CJEU, C-201/14, Smaranda Bara and Others v. Casa Naţională de Asigurări de Sănătate and Others,
1 October 2015, para. 29.
970 Article 29 Data Protection Working Party (2015), Statement of the WP29 on automatic inter-state
exchanges of personal data for tax purposes, 14/EN WP 230.
971 Directive 2014/65/EU of the European Parliament and of the Council of 15 May 2014 on markets in
financial instruments and amending Directive 2002/92/EC and Directive 2011/61/EU, OJ 2014 L 173;
Regulation (EU) No. 600/2014 of the European Parliament and of the Council of 15 May 2014 on
markets in financial instruments and amending Regulation (EU) No. 648/2012, OJ 2014 L 173; Directive
2013/36/EU of the European Parliament and of the Council of 26 June 2013 on access to the activity of
credit institutions and the prudential supervision of credit institutions and investment firms, amending
Directive 2002/87/EC and repealing Directives 2006/48/EC and 2006/49/EC, OJ 2013 L 176.
972 Regulation (EU) No. 596/2014 of the European Parliament and of the Council of 16 April 2014 on
market abuse (market abuse regulation) and repealing Directive 2003/6/EC of the European Parliament
and of the Council and Commission Directives 2003/124/EC, 2003/125/EC and 2004/72/EC,
OJ 2014 L 173.
345
Handbook on European data protection law
Other issues in these areas are also specifically addressed, including collecting data
on the financial status of data subjects973 or cross-border payment via banking
transfers, which inevitably leads to personal data flows.974
973 Regulation (EC) No. 1060/2009 of the European Parliament and of the Council of 16 September 2009
on credit rating agencies, OJ 2009 L 302, and most recently amended by Directive 2014/51/EU of
the European Parliament and of the Council of 16 April 2014 amending Directives 2003/71/EC and
2009/138/EC and Regulations (EC) No. 1060/2009, (EU) No. 1094/2010 and (EU) No. 1095/2010 with
respect to the powers of the European Supervisory Authority (European Insurance and Occupational
Pensions Authority) and the European Supervisory Authority (European Securities and Markets
Authority), OJ 2014 L 153; Regulation (EU) No. 462/2013 of the European Parliament and of the Council
of 21 May 2013 amending Regulation (EC) No. 1060/2009 on credit rating agencies, OJ 2013 L 146.
974 Directive 2007/64/EC of the European Parliament and of the Council of 13 November 2007 on
payment services in the internal market amending Directives 97/7/EC, 2002/65/EC, 2005/60/EC and
2006/48/EC and repealing Directive 97/5/EC, OJ 2007 L 319, as amended by Directive 2009/111/EC of
the European Parliament and of the Council of 16 September 2009 amending Directives 2006/48/EC,
2006/49/EC and 2007/64/EC regarding banks that are affiliated to central institutions, certain own-
funds items, large exposures, supervisory arrangements, and crisis management, OJ 2009 L 302.
346
10
Modern challenges in
personal data protection
Despite its multiple benefits, the digital age also poses challenges to privacy and
data protection, as huge amounts of personal information are being collected and
processed in increasingly complex and opaque ways. Technological progress has
led to the development of massive data sets that can be easily cross-checked and
further analysed to look for patterns, or for the adoption of decisions based on
975 Council of Europe, Consultative Committee of Convention 108, Guidelines on the protection of individuals
with regard to the processing of personal data in a world of big data, T-PD(2017)01, Strasbourg,
23 January 2017.
347
Handbook on European data protection law
algorithms, which can provide unprecedented insight into human behaviour and
private life.976
New technologies are powerful and can be particularly dangerous if they fall into
the wrong hands. State authorities undertaking mass surveillance activities that may
make use of these technologies are an example of the significant impact these tech-
nologies can have on the rights of individuals. In 2013, Edward Snowden’s revela-
tions on the operation of large-scale internet and phone surveillance programmes
by intelligence agencies in some states sparked significant concerns about the dan-
gers surveillance activities entail for privacy, democratic governance and freedom of
expression. Mass surveillance and technologies allowing for globalised storage and
processing of personal information and bulk access to data may impinge on the very
essence of the right to privacy.977 In addition, they can have a negative effect on
political culture and a chilling effect on democracy, creativity and innovation.978 The
mere fear that the state may be constantly tracking and analysing the behaviour
and actions of citizens can discourage them from expressing their views on certain
matters and result in wariness and caution.979 These challenges have prompted a
number of public authorities, research centres and civil society organisations to ana-
lyse potential impacts of new technologies on society. In 2015, the European Data
Protection Supervisor launched several initiatives aimed at assessing the impact of
big data and the Internet of Things on ethics. Notably, it has set up an Ethics Advi-
sory Group that aims to stimulate “an open and informed discussion on digital eth-
ics, which allows the EU to realise the benefits of technology for society and the
economy and at the same time reinforces the rights and freedoms of individuals,
particularly their rights to privacy and data protection.”980
Personal data processing is also a powerful tool in the hands of corporations. Today,
it can reveal detailed information about a person’s health or financial situation,
976 European Parliament (2017), Resolution on fundamental rights implications of big data: privacy, data
protection, non-discrimination, security and law enforcement (P8_TA-PROV(2017)0076, Strasbourg,
14 March 2017.
977 See UN, General Assembly, Report of the Special Rapporteur on the promotion and protection of
human rights and fundamental freedoms while countering terrorism, Ben Emmerson, A/69/397,
23 September 2014, para. 59. See also ECtHR, Factsheet on Mass surveillance, July 2017.
978 EDPS (2015), Meeting the challenges of big data, Opinion 7/2015, Brussels, 19 November 2015.
979 See notably CJEU, Joined cases C-293/12 and C-594/12, Digital Rights Ireland Ltd v. Minister for
Communications, Marine and Natural Resources and Others and Kärntner Landesregierung and Others
[GC], 8 April 2014, para. 37.
980 EDPS, Decision of 3 December 2015 establishing an external advisory group on the ethical dimensions
of data protection (‘the Ethics Advisory Group’), 3 December 2015, Recital 5.
348
Modern challenges in personal data protection
• Disruptive innovations in ICT are shaping a new way of life, where social relations,
business, private and public services are digitally interconnected, thereby generating
an increasingly large amount of data, many of which are personal data.
• The concept of big data refers to both the data and analytics thereof.
• Personal data processed through big data analytics fall under EU and CoE legislation.
• Derogations from data protection rules and rights are limited to selected rights and
to specific situations in which the enforcement of a right would prove impossible or
would require disproportionate efforts by data controllers.
• Awareness among and control by individuals are key to ensuring rights enforcement.
349
Handbook on European data protection law
In our increasingly digitised world, every activity leaves a digital trace that can be
collected, processed and evaluated or analysed. With new information and com-
munication technologies, more and more data are collected and recorded.981 Until
recently, no technology was able to analyse or evaluate the mass of data or to draw
useful conclusions. The data were simply too numerous to evaluate, too complex,
poorly structured and fast-moving to identify trends and habits.
The term “big data” is a buzzword that may refer to several concepts, depending on
the context. It commonly encompasses “the growing technological ability to collect
process and extract new and predictive knowledge from great volume, velocity, and
variety of data”.982 The concept of big data therefore covers both the data them-
selves and the data analytics.
The sources of the data are of various types, and include people and their personal
data, machines or sensors, climate information, satellite imagery, digital pictures and
videos, or GPS signals. A great deal of the data and information, however, are per-
sonal data – anything from a name, photo, email address, bank details, GPS tracking
data, posts on social networking websites, medical information or a computer’s IP
address.983
Big data also refers to the processing, analysis and evaluation of the masses of data
and available information, i.e. to gain useful information for the purposes of big
data analysis. This means that the data and information collected can be used for
981 European Commission, Communication from the Commission to the European Parliament, the Council,
the European Economic and Social Committee and the Committee of the Regions towards a thriving data
economy COM(2014) 442 final, Brussels, 2 July 2014.
982 Council of Europe, Consultative Committee of Convention 108, Guidelines on the protection of individuals
with regard to the processing of personal data in a world of Big Data, 23 January 2017, p. 2; European
Commission, Communication from the Commission to the European Parliament, the Council, the
European Economic and Social Committee and the Committee of the Regions towards a thriving data
economy COM(2014) 442 final, Brussels, 2 July 2014, p. 4; International Telecommunications Union
(2015), Recommendation Y.3600. Big Data – Cloud computing based requirements and capabilities.
983 EU Commission Fact Sheet on The EU Data Protection Reform and Big Data; Council of Europe,
Consultative Committee of Convention 108 Guidelines on the protection of individuals with regard to the
processing of personal data in a world of Big Data, 23 January 2017, p. 2.
350
Modern challenges in personal data protection
purposes than those originally intended, e.g. statistical trends, or more tailored ser-
vices such as advertising. In fact, where the technologies do exist to collect, process
and evaluate big data, any kind of information can be combined and re-evaluated:
financial transactions, creditworthiness, medical treatment, private consumption,
professional activity, tracking and routes taken, internet use, electronic cards and
smartphones, video or communication monitoring. Big data analysis brings about a
new quantitative dimension of data, one which can be evaluated and used in real-
time, for example, to deliver tailored services to consumers.
Similarly to big data analytics, AI, and the automated decision-making it produces,
requires the compilation and processing of large amounts of data. These data can
come from the device itself (heat of the brakes, fuel, etc.) or from the surround-
ing environment. Profiling, for example, is a process that may rely on automated
decision-making according to predetermined patterns or factors.
Profiling based on big data involves looking for patterns that reflect
“characteristics of a type of personality” – for example, when online shopping
companies propose products “you may also like” based on information
gathered from the products previously placed into a customer’s shopping
cart. The more data, the clearer the mosaic. The smartphone, for example,
984 Stuart Russel and Peter Norvig, Artificial Intelligence: A Modern Approach (2nd ed.), 2003, Upper Saddle
River, New Jersey: Prentice Hall, pp. 27, 32–58, 968–972; Stuart Russel and Peter Norvig, Artificial
Intelligence: A Modern Approach (3rd ed.), 2009, Upper Saddle River, New Jersey: Prentice Hall, p. 2.
351
Handbook on European data protection law
The mass of profiles that are created through big data analysis techniques are
subsequently compared to identify similar patterns and to construe clusters
of personalities. The information about behaviour and attitudes of certain
personalities is, therefore, inverted. With access to and use of big data, the
personality test is turned around, with information about behaviour and
attitude now used to describe the personality of the individual. By having the
combined information about “likes” in social networks, tracking data, music
listened to or movies watched, a clear picture can emerge of the personality
of an individual, allowing businesses to communicate tailored advertising
and/or information according to the “personality” of that person. Above all,
this information can be processed in real-time.985
985 Processing techniques and new software evaluate the information about what a person likes, looks at
when online shopping or adds to an online shopping cart in real-time and can propose “products” that
might be of interest based on the information gathered.
352
Modern challenges in personal data protection
Big data analytics can reveal patterns between different sources and data sets, ena-
bling useful insights in areas like science and medicine. This is the case, for exam-
ple, in fields such as health, food security, intelligent transport systems, energy
efficiency or urban planning. This real-time analysis of information can be used to
improve the systems implemented. In research, new insights can be gained by com-
bining large amounts of data and statistical evaluations, especially in disciplines in
which a great deal of data have, until today, only been evaluated manually. New
treatments can be developed, tailored to individual patients, based on compari-
sons with the mass of information available. Companies hope that the analysis of
big data will enable them to gain competitive advantage, generate potential sav-
ings and create new business areas through direct, individualised customer ser-
vice. Government agencies hope to achieve improvements in criminal justice. The
Commission’s Digital Single Market Strategy for Europe recognises the potential of
986 The development of software for the processing of Big Data is still in an early phase. Nevertheless,
analytical programmes have recently been developed, especially for the analysis of mass data and
information in real time, relating to activities of individuals. The possibility of analysing and processing
Big Data in a structured way has provided new means of profiling and targeted advertising. European
Commission, Communication from the Commission to the European Parliament, the Council, the
European Economic and Social Committee and the Committee of the Regions towards a thriving data
economy COM(2014) 442 final, Brussels, 2 July 2014; EU Commission Fact Sheet on The EU Data
Protection Reform and Big Data and Council of Europe, Guidelines on the protection of individuals with
regard to the processing of personal data in a world of Big Data, 23 January 2017, p. 2.
987 EU Commission Fact Sheet on EU Data Protection Reform and Big Data.
988 International Conference of Data Protection and Privacy Commissioners (2014), Resolution on Big Data
and European Commission, Communication from the Commission to the European Parliament, the Council,
the European Economic and Social Committee and the Committee of the Regions towards a thriving
data economy COM(2014) 442 final, Brussels, 2 July 2014, p. 2; EU Commission Fact Sheet on EU Data
Protection Reform and Big Data and Council of Europe, Guidelines on the protection of individuals with
regard to the processing of personal data in a world of Big Data, 23 January 2017, p. 1.
353
Handbook on European data protection law
data-driven technologies, services and big data to act as a catalyst for economic
growth, innovation and digitisation in the EU.989
However, big data also carries risks, generally associated with its “three Vs” attrib-
utes: volume, velocity and variety of the data processed. The volume refers to the
amount of data processed, variety to the number and diversity of types of data,
while velocity refers to the speed of data processing. Specific considerations for
data protection arise notably when big data analytics are used on large sets of data
to extract new and predictive knowledge for decision-making purposes concern-
ing individuals and/or groups.990 The risks for data protection and privacy related to
big data have been highlighted in Opinions of the EDPS and the Article 29 Work-
ing Party, resolutions of the European Parliament and in Council of Europe policy
documents.991
Risks may include the mishandling of big data by those with access to the mass of
information through manipulation, discrimination or oppression of individuals or spe-
cific groups in society.992 Where masses of personal data or information about indi-
vidual behaviour are collected, processed and evaluated, their exploitation can lead
to significant violations of fundamental rights and freedoms going beyond the right
to privacy. Measuring exactly the extent to which privacy and personal data may be
affected is not possible. The European Parliament identified a lack of methodology
to make an evidence-based assessment of the total impact of big data, but there is
evidence to suggest that big data analytics can have a significant horizontal impact
across both the public and private sector.993
989 European Parliament resolution of 14 March 2017 on fundamental rights implications of Big Data:
privacy, data protection, non-discrimination, security and law-enforcement (2016/2225 (INI)).
990 Council of Europe, Consultative Committee of Convention 108, Guidelines on the protection of individuals
with regard to the processing of personal data in a world of Big Data, 23 January 2017, p. 2.
991 See, for example, EDPS (2015), Meeting the Challenges of big data, Opinion 7/2015,
19 November 2015; EDPS (2016), Coherent enforcement of fundamental rights in the age of Big Data,
Opinion 8/2016, 23 September 2016; European Parliament (2016), Resolution on fundamental rights
implications of Big Data: privacy, data protection, non-discrimination, security and law enforcement,
P8_TA(2017)0076, Strasbourg, 14 March 2017; Council of Europe, Consultative Committee of
Convention 108, Guidelines on the protection of individuals with regard to the processing of personal
data in a world of Big Data, T-PD(2017)01, Strasbourg, 23 January 2017.
992 International Conference of Data Protection & Privacy Commissioners (2014), Resolution on Big Data.
993 European Parliament resolution of 14 March 2017 on fundamental rights implications of Big Data:
privacy, data protection, non-discrimination, security and law-enforcement (2016/2225(INI)).
354
Modern challenges in personal data protection
The General Data Protection Regulation includes provisions on the right not to be
subject to automated decision-making, including profiling.994 The privacy issue
arises where the exercise of the right to object requires human intervention, allow-
ing data subjects to express their point of view and to contest the decision.995 This
can give rise to challenges in ensuring an adequate level of protection for personal
data if, for example, no human intervention is possible or where the algorithms are
too complex and the amount of data involved is too big to provide individuals with
justifications for certain decisions, and/or prior information to obtain their consent.
An example of the use of AI and automated decision-making is found in recent
developments in mortgage applications or during recruiting processes. Applica-
tions are refused or turned down based on the fact that the applicants do not meet
predetermined parameters or factors.
Big data and AI raise several questions in relation to the identification of controllers
and processors, and their liability: when such a large amount of data is collected and
processed, who is the owner of the data? When data are processed by intelligence
machines and software, who is the controller? What are the exact responsibilities of
each actor in the processing? And for what purposes may big data be used?
The question of liability in the context of AI will become all the more challenging
when an AI takes a decision grounded on data processing it has developed itself.
The General Data Protection Regulation provides a legal framework for the liabil-
ity of data controller and processor. Unlawful processing of personal data gives rise
355
Handbook on European data protection law
to liability for the data controller and the data processor.997 Artificial intelligence and
automated decision-making raise questions about who is liable for violations affect-
ing the privacy of data subjects where the complexity and amount of processed
data cannot be ascribed with certainty. Where AI and algorithms are considered as
products, this raises issues between personal liability, which is regulated under the
General Data Protection Regulation, and product liability, which is not.998 This would
require rules on liability to fill the gap between personal liability and product liability
for robotics and AI, including automated decision-making, for example.999
The nature, analysis and use of big data described above challenge the application of
some of the traditional, fundamental principles of European data protection law.1000
Such challenges mainly relate to the principles of lawfulness, data minimisation, pur-
pose limitation, and transparency.
The same applies to the principle of purpose limitation, which requires that data
must be processed for specified aims, and cannot be used for purposes that are
incompatible with the initial purpose of collection, unless such processing is based
on a legal ground – such as, but not limited to, consent of the data subject (see
Section 4.1.1).
Finally, big data also challenges the principle of accuracy of data, as big data applica-
tions tend to collect data from a variety of sources without having the possibility to
check and/or maintain the accuracy of the data collected.1001
356
Modern challenges in personal data protection
The general rule remains that personal data being processed through big data ana-
lytics fall under the scope of data protection legislation. Specific rules or derogations
for specific cases in relation to algorithmic complex data processing have neverthe-
less been introduced in EU and CoE law.
In CoE law, Modernised Convention 108 grants new rights to the data subject to
enable a more effective control on his or her personal data in the big data era. It is
precisely the case for instance with Article 1(a), (c) and (d) of Modernised Conven-
tion on the right not to be subject to a decision significantly affecting him or her
based solely on an automated processing of data without having his or her views
taken into consideration; the right to obtain, on request, knowledge of the reasoning
underlying data processing where the results of such processing are applied to him
or her as well as the right to object. Other provisions of Modernised Convention 108,
notably on transparency and additional obligations are complementary elements of
the protective mechanism established with Modernised Convention 108 to tackle
digital challenges.
In EU law, aside from cases listed in Article 23 of the GDPR, transparency must be
ensured for all processing of personal data. It is especially important in relation to
internet services and other complex automated data processing, such as the use
of algorithms for decision-making. Here, the features of data processing systems
must make it possible for data subjects to really understand what is happening
with their data. To ensure fair and transparent processing, the General Data Protec-
tion Regulation requires the controller to provide the data subject with meaningful
information about the logic involved in automated decision-making, including profil-
ing.1002 In its Recommendation on the protection and promotion of the right to free-
dom of expression and the right to private life, in respect of network neutrality, the
Committee of Ministers of the Council of Europe recommended that internet service
providers “provide users with clear, complete and publicly available information with
regard to any traffic management practices which may affect users’ access to and
distribution of content, applications or services”.1003 Reports on internet traffic man-
agement practices, drawn up by competent authorities in all Member States, should
357
Handbook on European data protection law
Data controllers must inform data subjects – either when the data were collected
from them or when they were not – not only of specific information on the data
collected and the processing envisaged (see Section 6.1.1), but also, where rel-
evant, of the existence of automated decision-making processes, providing them
with “meaningful information about the logic involved”,1005 the objectives and the
potential consequences of such processes. The General Data Protection Regulation
also clarifies (only in cases where personal data have not been obtained from the
data subject), that the controller is not obliged to provide the data subject with such
information when “the provision of such information would prove impossible or
would involve a disproportionate effort”.1006 However, as emphasised by the Arti-
cle 29 Working Party in its Guidelines on automated individual decision-making and
profiling for the purposes of Regulation 2016/679, the complexity of the processing
should not, in itself, preclude the data controller form providing data subject with
clear explanations on the objectives and analytics used in the data processing.1007
Data subjects’ rights to access, rectify and erase their personal data, as well as their
right to restrict the processing, do not include a similar exemption. However, the
obligation for the data controller to notify the data subject of any rectification or
erasure of their personal data (see Section 6.1.4) may also be lifted when such notifi-
cation would “prove impossible or involves a disproportionate effort”.1008
Data subjects also have a right to object, as per Article 21 of the GDPR (see
Section 6.1.6), to any processing of their personal data, including in cases of big data
analytics. Whilst data controllers may be exempted from this obligation if they can
demonstrate overriding legitimate interests, they may not enjoy such exemption in
processing for direct marketing purposes.
358
Modern challenges in personal data protection
Specific derogations to these rights may also be raised by data controllers when pro-
cessing personal data for archiving purposes in the public interest, scientific or his-
torical research purposes or statistical purposes.1009
Individual control
The complexity of, and lack of transparency around, big data analytics may require
rethinking ideas of individual control of personal data. This should be tailored to the
given social and technological context, taking into account the lack of knowledge on
the part of individuals. Therefore, data protection in relation to big data should adopt
a broader idea of control over the use of data, according to which individual control
evolves into a more complex process of multiple impact assessments of the risks
related to the use of data.1012
How good a big data application is depends on how well it can predict the desires or
behaviour of test individuals (or consumers). Present prediction models based on big
data analytics are constantly being refined. Recent developments include not only
using data to categorise personalities (i.e. the behaviour and attitudes) but analysing
behaviour through analysing voice patterns and the intensity with which messages
are typed, or body temperature. All of this information can be used in real-time
against the knowledge drawn from big data evaluations to assess creditworthi-
ness during a meeting with a bank representative, for example. The assessment is
359
Handbook on European data protection law
not made on the merits of the individual applying for the credit, but rather on the
behavioural characteristics drawn from analysis and evaluation of big data informa-
tion, i.e. the candidate speaking with a strong voice or flattering voice, his or her
body language or body temperature.
Profiling and targeted advertising may not necessarily be a problem if individuals are
aware that they are subject to tailored adverts. Profiling becomes a problem when
it is used to manipulate individuals, i.e. to search for certain personalities or groups
of people for political campaigning. For example, groups of undecided voters can be
addressed via political messages tailored to their “personality” and attitudes. Another
issue could be the use of such profiling to refuse access to goods and services to cer-
tain individuals. One safeguard that can provide protection against abuse of big data
and personal information is pseudonymisation (see Section 2.1.1).1013 Where personal
data are truly anonymised, i.e. there is no information leaving traces connecting to the
data subject, these cases fall outside the scope of the General Data Protection Regu-
lation. Consent of data subjects and individuals in big data processing also presents
a challenge for data protection law. This covers consent to being subject to tailored
advertisements and profiling, which may be justified for “customer experience” rea-
sons, and consent to the use of masses of personal data to refine and develop infor-
mation-based, analytical tools. The awareness, or absence of awareness, of the big
data processing raises several questions in relation to the means by which data sub-
jects can exercise their rights, given that big data processing can rely on both pseu-
donymised and anonymised information subject to algorithms. While pseudonymised
data fall under the General Data Protection Regulation, the regulation does not apply
to anonymised data. Individual control on, and awareness of, their personal data pro-
cessing is crucial in big data analytics: without it, they will not have a clear idea of who
the data controller or processor is, preventing them to effectively exercise their rights.
• Social Networking Services (SNS) are online communication platforms that enable indi-
viduals to join or create networks of like-minded users.
360
Modern challenges in personal data protection
• The Internet of Things is the connection of objects to the internet, and the interconnec-
tion of objects among themselves.
• Data subjects’ consent is the most common legal basis for lawful data processing by
data controllers on social networks.
• Social network users are generally protected by the “household exemption”; however,
this derogation may be lifted in specific contexts.
• Privacy by design and by default are crucial to ensure data security in this field.
1014 European Commission (2016), Advancing the Internet of Things in Europe, SWD(2016) 110 final.
1015 Article 29 Working Party (2009), Opinion 5/2009 on online social networking, WP 163, 12 June 2009, p. 4.
361
Handbook on European data protection law
Example: Nora is very happy because her partner proposed marriage. She
wants to share the good news with her friends and family and decides
to write an emotional post on a social network expressing her joy, and to
change her relationship status to “engaged”. In the coming days, when she
logs into her account, Nora sees ads about wedding dresses and flower
shops. Why is this so?
The Internet of Things (IoT) represents the next step in the development of the
internet: the Web 3.0 era. With the IoT, devices may be connected and interact with
other devices through the internet. This enables objects and people to be intercon-
nected through communication networks, to report about their status and/or about
the status of the surrounding environment.1018 The IoT and connected devices are
already a reality and are expected to grow substantially in the next few years, with
the creation and further development of smart devices that will lead to the creation
of smart cities, smart homes and smart businesses.
362
Modern challenges in personal data protection
Similarly, the IoT is expected to bring significant benefits to the economy and is part
of the EU strategy to develop a Digital Single Market. Within the EU, it is estimated
that in 2020 the number of IoT connections will increase to six billion. This expan-
sion of connectivity is expected to bring important economic benefits, through
the development of innovative services and applications, better healthcare, better
understanding of the needs of consumers and increased efficiency.
363
Handbook on European data protection law
At the same time, given the huge amount of personal information generated by
social media users and subsequently processed by the service operators, the expan-
sion of SNS comes with a growing concern about the ways in which privacy and
personal data can be protected. SNS may threaten the right to private life and the
right to freedom of expression. Such threats may include: “lack of legal, and pro-
cedural, safeguards surrounding processes that can lead to the exclusion of users;
inadequate protection of children and young people against harmful content or
behaviours; lack of respect for others’ rights; lack of privacy-friendly default set-
tings; lack of transparency about the purposes for which personal data are collected
and processed”.1019 European data protection law has tried to respond to the privacy/
data protection challenges brought about by social media. Principles such as con-
sent, privacy/data protection by design and by default, and the rights of individuals
are particularly important in the context of social media and networking services.
In the context of IoT, the vast volume of personal data generated from the vari-
ous interconnected devices also entails risks for privacy and data protection. While
transparency is an important principle of European data protection law, due to the
multitude of connected devices it is not always clear who is able to collect, access
and use the data collected from IoT devices.1020 However, under EU and CoE law, the
transparency principle establishes an obligation for controllers to keep the data sub-
jects informed about how their data are being used, in clear and plain language. The
risks, rules, safeguards and rights in respect of the processing of their personal data
must be made clear to the individuals concerned. IoT connected devices and the
multiple processing operations and data involved could also challenge the require-
ment for clear and informed consent to data processing – when such processing is
based on consent. Individuals often lack understanding of the technical functioning
of such processing, and, therefore, of the consequences of their consent.
Another major concern is security, given that connected devices are particularly vul-
nerable to security risks. Connected devices have varying levels of security. As they
operate beyond the standard IT infrastructure, they may lack the adequate process-
ing power and storage capability to host security software or employ techniques
such as encryption, pseudonymisation or anonymisation to protect users’ personal
information.
1019 Council of Europe, Recommendation Rec(2012)4 to member states on the protection of human rights
with regard to social networking services, 4 April 2012.
1020 European Data Protection Supervisor (2017), Understanding the Internet of Things.
364
Modern challenges in personal data protection
In Europe, the processing of personal data is lawful only if it is permitted under Euro-
pean data protection law. For SNS providers, the consent of the data subjects gener-
ally provides a lawful basis for data processing. Consent must be given freely and be
specific, informed and unambiguous (see Section 4.1.1).1021 ‘Freely given’ essentially
means that data subjects must have the ability to exercise a real and genuine choice.
Consent is ‘specific’ and ‘informed’ where it is intelligible, referring clearly and pre-
cisely to the full scope, purposes and consequences of the data processing. In the
context of social media, whether consent is free, specific and informed for all types
of processing carried out by the SNS operator and third parties can be questioned.
1021 General Data Protection Regulation, Art. 4 and Art. 7; Modernised Convention 108, Art. 5.
365
Handbook on European data protection law
Under the General Data Protection Regulation, the personal data of children under
the age of 16 cannot, in principle, be processed based on their consent.1023 If consent
for the processing is necessary, it must be given by the child’s parent or guardian.
Children merit specific protection due to the fact that they may be less aware of the
risks and consequences involved in the data processing. This is very important in the
context of social media, as children are more vulnerable to some of the negative
effects the use of such media may entail, such as cyber-bulling, online stalking or
identify theft.
The processing of personal data inherently entails security risks, given the constant
possibility of a security breach leading to the accidental or unlawful destruction, loss,
alteration, unauthorised access or disclosure of the personal data processed. Under
European data protection law, controllers and processors are required to implement
appropriate technical and organisational measures to prevent any unauthorised
interference with data processing operations. Social networking services providers
falling within the scope of European data protection rules must also comply with this
obligation.
1022 Article 29 Working Party (2011), Opinion 15/2011 on the definition of consent, WP 187, 13 July 2011,
p. 18.
1023 See General Data Protection Regulation, Art. 8. EU Member States may provide by law for a lower age,
provided that this is not below 13 years.
366
Modern challenges in personal data protection
put in place. In such cases, service providers must notify the users affected where it
is likely to result in a high risk to the rights and freedoms of the data subject.1024
Rights of individuals
SNS providers must respect the rights of individuals (see Section 6.1), including the
right to be informed about the purpose of processing and how personal data may
be used for direct marketing purposes. Individuals must also be given the right to
access the personal data they have generated in the social networking platform
and request their deletion. Even where persons have consented to the processing
367
Handbook on European data protection law
of personal data and uploaded information online, they should be able to ask to “be
forgotten” if they no longer want to receive the social network’s services. The right
to data portability further enables users to receive a copy of the personal data they
provided to the social networking services provider in a structured, commonly used
and machine-readable format and to transfer their data from one social networking
services provider to another.1025
Controllers
A difficult question that often arises in the context of social media is the question of
who the controller is, meaning: who is the person with the obligation and responsi-
bility to comply with the data protection rules. Social networking service providers
are considered controllers under European data protection law. This is evident given
the broad definition of “controller” and the fact that these service providers deter-
mine the purpose and means for the processing of the personal data shared by indi-
viduals. Under EU law, if they offer services to data subjects in the EU, controllers are
required to comply with the provisions of the General Data Protection Regulation,
even if they are not established in the EU.
368
Modern challenges in personal data protection
a case where Sarah, who does not use social networks, finds out from their
common friend Nick that a photo of her at a party with Paul was posted
online. In such a case, Paul’s data processing will not fall under EU law as it
is covered by the “household exemption”.
However, it remains crucial for users to be aware and mindful that uploading infor-
mation about other individuals without their consent may infringe upon these indi-
viduals’ privacy and data protection rights. Even where the household exemption
applies – for example, if a user has a profile that is only made public to a list of con-
tacts selected by him or her – the publication of personal information about oth-
ers might still make the user liable. Although data protection rules do not apply if
the household exemption does, liability might arise from the application of other
national rules, such as defamation or violation of personality. Finally, only users of
SNS are protected by the household exemptions: controllers and processors that
provide the means for such private processing fall under EU data protection law.1026
With the reform of the Directive on privacy and electronic communications, the
data protection, privacy and security rules that are applicable to telecommunication
services providers under the current legal framework will also apply to machine-
to-machine communications and electronic communications services, including, for
instance, over the top services.
369
Further reading
Chapter 1
Araceli Mangas, M. (ed.) (2008), Carta de los derechos fundamentales de la Unión
Europea, Bilbao, Fundación BBVA.
Docksey, C. ‘Four fundamental rights: finding the balance’, International Data Privacy
Law, Vol. 6, No. 3, pp. 195–209.
González Fuster, G. and Gellert, G. (2012), ‘The fundamental right of data protection
in the European Union: in search of an uncharted right’, International Review of Law,
Computers and Technology, Vol. 26 (1), pp. 73–82.
Gutwirth, S., Poullet, Y., de Hert, P., de Terwange, C. and Nouwt, S. (Eds.) (2009),
Reinventing Data Protection, Springer.
Hijmans, H. (2016), The European Union as Guardian of Internet Privacy – the Story of
Art 16 TFEU, Springer.
Hustinx, P. (2016), ‘EU Data Protection Law: the review of Directive 95/46/EC and the
Proposed General Data Protection Regulation’.
371
Handbook on European data protection law
Kokott, J. and Sobotta, C. (2013), ‘The distinction between privacy and data protec-
tion in the case law of the CJEU and the ECtHR’, International Data Privacy Law, Vol. 3,
No. 4, pp. 222–228.
Harris, D., O’Boyle, M., Warbrick, C. and Bates, E. (2009), Law of the European
Convention on Human Rights, Oxford, Oxford University Press.
Jarass, H. (2010), Charta der Grundrechte der Europäischen Union, Munich, C. H. Beck.
Nowak, M., Januszewski, K. and Hofstätter, T. (2012), All human rights for all – Vienna
manual on human rights, Antwerp, intersentia N. V., Neuer Wissenschaftlicher Verlag.
372
Further reading
Warren, S. and Brandeis, L. (1890), ‘The right to privacy’, Harvard Law Review, Vol. 4,
No. 5, pp. 193–220.
White, R. and Ovey, C. (2010), The European Convention on Human Rights, Oxford,
Oxford University Press.
Chapter 2
Acquisty, A., and Gross R. (2009), ‘Predicting Social Security numbers from public
data’, Proceedings of the National Academy of Science, 7 July 2009.
Carey, P. (2009), Data protection: A practical guide to UK and EU law, Oxford, Oxford
University Press.
de Montjoye, Y.-A., Hidalgo, C. A., Verleysen, M., and Blondel V. D. (2013), ‘Unique in
the Crowd: the Privacy Bounds of Human Mobility’, Nature Scientific Reports, Vol. 3,
2013.
373
Handbook on European data protection law
Chapters 3 to 6
Brühann, U. (2012), ‘Richtlinie 95/46/EG zum Schutz natürlicher Personen bei der
Verarbeitung personenbezogener Daten und zum freien Datenverkehr’ in: Grabitz,
E., Hilf, M. and Nettesheim, M. (eds.), Das Recht der Europäischen Union, Band IV,
A. 30, Munich, C. H. Beck.
Curren, L. and Kaye, J. (2010), ‘Revoking consent: a ‘blind spot’ in data protection
law?’, Computer Law & Security Review, Vol. 26, No. 3 pp. 273–283.
De Hert, P. and Papakonstantinou, V. (2012), ‘The Police and Criminal Justice Data
Protection Directive: Comment and Analysis’, Computers & Law Magazine of SCL,
Vol. 22, No. 6, pp. 1–5.
374
Further reading
the Lisbon treaty: Taking rights seriously’, European Review of Private Law, Vol. 20,
No. 2, pp. 473–506.
FRA (European Union Agency for Fundamental Rights) (2010), Data Protection in
the European Union: the role of National Supervisory authorities (Strengthening the
fundamental rights architecture in the EU II), Luxembourg, Publications Office of the
European Union (Publications Office).
FRA (2010), Developing indicators for the protection, respect and promotion of the
rights of the child in the European Union (Conference edition), Vienna, FRA.
Irish Health Information and Quality Authority (2010), Guidance on Privacy Impact
Assessment in Health and Social Care.
Kierkegaard, S., Waters, N., Greenleaf, G., Bygrave, L. A., Lloyd, I. and Saxby, S.
(2011), ‘30 years on – The review of the Council of Europe Data Protection Conven-
tion 108’, Computer Law & Security Review, Vol. 27, No. 3, pp. 223–231.
Chapter 7
European Data Protection Supervisor (2014), Position paper on transfer of personal
data to third countries and international organisations by EU institutions and bodies.
Kuner, C. (2007), European data protection law, Oxford, Oxford University Press.
Kuner, C. (2013), Transborder data flow regulation and data privacy law, Oxford,
Oxford University Press.
375
Handbook on European data protection law
Chapter 8
Blasi Casagran, C. (2016) Global Data Protection in the Field of Law Enforcement, an
EU Perspective, London, Routledge.
Boehm, F. (2012), Information Sharing and Data Protection in the Area of Freedom,
Security and Justice. Towards Harmonised Data Protection Principles for Information
Exchange at EU-level, Berlin, Springer.
Eurojust, Data protection at Eurojust: A robust, effective and tailor-made regime, The
Hague, Eurojust.
De Hert, P. and Papakonstantinou, V. (2012), ‘The Police and Criminal Justice Data
Protection Directive: Comment and Analysis’, Computers & Law Magazine of SCL,
Vol. 22, No. 6, pp. 1–5.
Gutwirth, S., Poullet, Y. and De Hert, P. (2010), Data protection in a profiled world,
Dordrecht, Springer.
Gutwirth, S., Poullet, Y., De Hert, P. and Leenes, R. (2011), Computers, privacy and
data protection: An element of choice, Dordrecht, Springer.
Santos Vara, J. (2013), The role of the European Parliament in the conclusion of the
Transatlantic Agreements on the transfer of personal data after Lisbon, Centre for the
Law of External Relations, CLEER Working Papers 2013/2.
376
Further reading
Chapter 9
Büllesbach, A., Gijrath, S., Poullet, Y. and Hacon, R. (2010), Concise European IT law,
Amsterdam, Kluwer Law International.
Gutwirth, S., Leenes, R., De Hert, P. and Poullet, Y. (2012), European data protection:
In good health?, Dordrecht, Springer.
Gutwirth, S., Poullet, Y. and De Hert, P. (2010), Data protection in a profiled world,
Dordrecht, Springer.
Gutwirth, S., Poullet, Y., De Hert, P. and Leenes, R. (2011), Computers, privacy and
data protection: An element of choice, Dordrecht, Springer.
Rosemary, J. and Hamilton, A. (2012), Data protection law and practice, London,
Sweet & Maxwell.
Chapter 10
El Emam, K. and Álvarez, C. (2015), ‘A critical appraisal of the Article 29 Working
Party Opinion 05/2014 on data anonymization techniques’, International Data
Privacy Law, Vol. 5, No. 1, pp. 73–87.
Rubistein, I. (2013), ‘Big Data: The End of Privacy or a New Beginning?’, International
Data Privacy Law, Vol. 3, No. 2, pp. 74–87.
377
Case law
Balancing data protection with freedom of expression and the right to information
379
Handbook on European data protection law
Correspondence
380
Case law
Data security
DNA databases
GPS data
Health data
Identity
381
Handbook on European data protection law
Interception of communication
Personal data
Photos
Right to be forgotten
Right to object
382
Case law
Surveillance methods
383
Handbook on European data protection law
Video surveillance
Voice samples
384
Case law
C-13/16, Valsts policijas Rīgas reģiona pārvaldes Kārtības policijas pārvalde v. Rīgas
pašvaldības SIA ‘Rīgas satiksme’, 4 May 2017
[Lawful processing principle: legitimate interest pursued by a third party]
Joined cases C-203/15 and C-698/15, Tele2 Sverige AB v. Post- och telestryrelsen
and Secretary of State for the Home Department v. Tom Watson and Others [GC],
21 December 2016
[Confidentiality of electronic communications; providers of electronic communica-
tions services; obligation relating to the general and indiscriminate retention of traffic
and location data; no prior review by a court or independent administrative authority;
Charter of Fundamental Rights of the European Union; compatibility with EU law]
385
Handbook on European data protection law
Joined cases C-293/12 and C-594/12, Digital Rights Ireland Ltd v. Minister for Com-
munications, Marine and Natural Resources and Others and Kärntner Landesre-
gierung and Others [GC], 8 April 2014
[Violation of EU primary law by the Data Retention Directive; lawful processing;
purpose and storage limitation]
C-131/12, Google Spain SL, Google Inc. v. Agencia Española de Protección de Datos
(AEPD), Mario Costeja González [GC], 13 May 2014
[Obligations of search engine providers to refrain, on request of the data subject, from
showing personal data in the search results; applicability of the Data Protection Direc-
tive; concept of “data processing”; meaning of “controllers”; balancing data protection
with freedom of expression; the right to be forgotten]
386
Case law
Joined cases C-92/09 and C-93/09, Volker und Markus Schecke GbR and Hartmut
Eifert v. Land Hessen [GC], 9 November 2010
[Concept of “personal data”; proportionality of the legal obligation to publish personal
data about the beneficiaries of certain EU agricultural funds]
387
Handbook on European data protection law
388
Case law
C-28/08 P, European Commission v. The Bavarian Lager Co. Ltd. [GC], 29 June 2010
[Access to documents]
Joined cases C-203/15 and C-698/15, Tele2 Sverige AB v. Post- och telestryrelsen
and Secretary of State for the Home Department v. Tom Watson and Others [GC],
21 December 2016
[Confidentiality of electronic communications; providers of electronic communica-
tions services; obligation relating to the general and indiscriminate retention of traffic
and location data; no prior review by a court or independent administrative authority;
Charter of Fundamental Rights of the European Union; compatibility with EU law]
C-461/10, Bonnier Audio AB, Earbooks AB, Norstedts Förlagsgrupp AB, Piratförlaget
AB, Storyside AB v. Perfect Communication Sweden AB, 19 April 2012
[Copyright and related rights; processing of data by internet; infringement of an exclu-
sive right; audio books made available via an FTP server via internet by an IP address
supplied by an internet service provider; injunction issued against the internet service
provider ordering it to provide the name and address of the user of the IP address]
389
Index
391
Handbook on European data protection law
392
Index
Volker und Markus Schecke GbR and Hartmut Eifert v. Land Hessen [GC],
Joined cases C-92/09 and C-93/09, 9 November 2010���� 16, 36, 47, 63, 81, 85, 87
393
Handbook on European data protection law
394
Index
K.H. and Others v. Slovakia, No. 32881/04, 28 April 2009����������������� 115, 118, 217, 335
K.U. v. Finland, No. 2872/02, 2 December 2008����������������������������������������������24, 205, 244
Karabeyoğlu v. Turkey, No. 30083/10, 7 June 2016�����������������������������������������������238, 279
Khelili v. Switzerland, No. 16188/07, 18 October 2011������������������������������������������������������40
Klass and Others v. Germany, No. 5029/71, 6 September 1978������������������23, 271, 273
Köpke v. Germany, No. 420/07, 5 October 2010������������������������������������������������������� 93, 245
Kopp v. Switzerland, No. 23224/94, 25 March 1998���������������������������������������������������������37
395
Handbook on European data protection law
396
Index
397
A great deal of information on the European Union Agency for Fundamental Rights is available
on the internet. It can be accessed through the FRA website at fra.europa.eu.
Further information on the case law of the European Court of Human Rights is available on
the Court’s website: echr.coe.int. The HUDOC search portal provides access to judgments and
decisions in English and/or French, translations into additional languages, legal summaries,
press releases and other information on the work of the Court.
The rapid development of information technology has exacerbated the need for robust personal
data protection, the right to which is safeguarded by both European Union (EU) and Council of
Europe (CoE) instruments. Safeguarding this important right entails new and significant challenges
as technological advances expand the frontiers of areas such as surveillance, communication
interception and data storage. This handbook is designed to familiarise legal practitioners not
specialised in data protection with this emerging area of the law. It provides an overview of the
EU’s and the CoE’s applicable legal frameworks. It also explains key case law, summarising major
rulings of both the Court of Justice of the European Union and the European Court of Human
Rights. In addition, it presents hypothetical scenarios that serve as practical illustrations of the
diverse issues encountered in this ever-evolving field.