Data & The Law Tuesday 14 May THE BRITISH COMPUTER SOCIETY

advertisement
Data & The Law
Tuesday 14th May
THE BRITISH COMPUTER SOCIETY
INFORMATION RISK MANAGEMENT & AUDIT GROUP
Paul Golding
Nabarro Nathanson – TMT Sector Group
p.golding@nabarro.com
020 7524 6711
Agenda
Data Protection
- securing compliance generally
- securing adequate usage rights
- overseas transfers
- data sharing in the public sector
- security obligations
Evidential issues (the movement towards the paperless office)
- [discovery] disclosure
- admissibility
- weight
- formation of contracts
- retention policies
Information Offences
- Computer Misuse Act
- European Cybercrime Convention
2
Agenda (cont’)
Interception of employee communications
- RIPA
- Information Commissioner draft Code of Practice
IP Developments
- software patents
- implementation of Copyright Directive
- interpretation of new database right
- account aggregation issues
On-line trading
- implementation of the E-Commerce Directive
Tax
- tax relief
- VAT
3
Data Protection
Securing compliance generally
Audit - know what data you have; what you use it for and might want
to use it for; where you get it from and who you disclose it to; who
holds data of your behalf; in which countries data is held.
Appoint a compliance officer.
Develop a corporate compliance/guidance manual.
Information Commissioner’s audit guidance:
www.dataprotection.gov.uk/dpaudit
4
Securing adequate usage rights
Processing must be “fair and lawful” and
either -
data subject consents or
legitimate interests without prejudice …
lawful -
within limits of legal powers (NB data sharing
proposals of the PIU for the public sector)
consistent with European Convention on Human Rights/
Human Rights Act
fair -
legitimate expectation
consent -
quite limited – cannot be inferred from failure to respond
NB: opt-out not ticked will not amount to consent but may signify
legitimate interests condition satisfied.
Commissioner takes broad view of “legitimate interests”.
5
Fair processing notices
- identity of data controller
- purpose(s) for which data processed
- any further information to render “fair”.
Such notices must be provided to data subjects or
made “readily available”.
6
s11 – right to prevent processing for
purposes of “direct marketing”
Art 7 E-Commerce Directive – senders of unsolicited e-mails must
respect opt-out registers. Not directly transposed in UK
Regulations.
E-mail preference service:
www.dma.org.uk/shared/PrefServices.asp
Unsolicited e-mails must be clearly identifiable as such.
The opt-in/opt-out debate – Proposal for Directive concerning
processing of personal data and protection of privacy in electronic
communications. Common Position 28 January 2002.
http://register.consilium.eu.int/pdf/en/01/st15/15396-r2en1/pdf
7
Overseas transfers
external to the European Economic Area
Prohibited unless adequate protection in
receiving territory.
Approved countries:
US Safe Harbor Privacy Principles
Transfers made subject to approved
contractual terms
http://europa.ev.int/comm/internalmarket/dataprot/modelcontracts/index
8
Security obligations
The Seventh Principle
“Appropriate technical and organisational
measures must be taken against unauthorised
or unlawful processing or disclosure of
personal data”
“Keeping personal data secure means guarding
against unauthorised access to, alteration,
disclosure or destruction and accidental loss or
destruction”
9
Express reference to both technical and
organisational (procedural/non-technical) measures
Regard to:•
•
•
•
State of technology
Cost
Harm which might result
Nature of data
Data controller must:take reasonable steps to ensure reliability
of employees with access to data
check identity of those seeking access
to information
10
Employee IT Code of Practice





Access rights
Switching off terminals
Personal use
Protection of passwords
Virus checking





Objectional material
Copyright infringement
Confidentiality
Audit Rights
Delivery up
11
Security - Processing by Third Parties
Data controller must select data processor providing
sufficient guarantees regarding both technical and
organisational measures and
must take reasonable steps to ensure measures are
complied with.
Data processing contract must be in writing requiring
data processor:
• only to act on instructions of data controller
• to comply with equivalent security obligations as
imposed on data controller.
Who determines what is ‘appropriate’ from time to time?
12
Evidential issues
In the event of a dispute all electronic documents/e-mails
material to the dispute have to be disclosed (what used
to be discovery)
Computerised records are now fully admissible in court
proceedings as evidence.
Civil Evidence Act 1995
Criminal Evidence Act 1999
“Weight” afforded to those records a matter for the Judge.
Important to be able to demonstrate security of systems.
13
Formation of Contracts
Subject to very limited exceptions (eg. land) valid and binding contracts
can and always have been capable of being formed by electronic
means of communication such as e-mail.
eg. Shattuck –v- Klotzback (US) 2002
Retention of hard copies/electronic records.
No generally applicable requirement to retain.
Usual reference point is Limitation Act 1980 – generally 6 years
NB: McCabe –v- BAT (2002) Australia
Sector specific obligations
Rules change once litigation becomes possibility.
No general requirement for hard copy writing/signatures
Again specific obligations.
Electronic Communications Act 2000
Electronic Signatures Regulations 2002
14
Information Offences
Computer Misuse Act 1990:
theft of information not currently an offence
Council of Europe Convention on Cybercrime
9 Offences
illegal access
interception
data interference
system interference
misuse of devices
computer related forgery
computer related fraud
child pornography
copyright infringement
15
Information Offences (cont’)
All offences require conduct to be “without right” and
“intentional”.
Procedural issues – expedited preservation of data,
expedited search and seizure of data.
NB Possible corporate liability where failure to
supervise or control facilitates commission of an
offence
16
Monitoring e-mails
Human Rights Act 1998 - effective 2 October 2000
European Convention on Human Rights Halford v United Kingdom - reasonable
expectation of privacy
Regulation of Investigatory Powers Act 2000
The Telecommunications (Lawful Business Practice)
(Interception of Communications) Regulations 2000 effective 24 October 2000
17
Authorised interceptions
Businesses may monitor or record communications
without consent:•
•
•
to establish existence of facts relevant to the business;
to prevent or detect crime;
investigate or detect unauthorised use;
but only where they have made reasonable efforts to inform all
users that this may be done.
Reserve contractual right to audit computer and telephone use.
Such a reservation of rights may not be effective.
18
Conflict with the Data
Protection Act
“The right to respect for correspondence creates
substantive limitations on employers which cannot be
avoided through advance warnings”.
Information Commissioner - draft Code of Practice
Ensure that information gathering exercises have a
legitimate purpose and invade privacy as little as
possible. First establish there is a problem. Monitoring
only where real business need - proportionality.
19
IP Developments
Software patents
Draft Directive on patent protection for computer
implemented inventions
Computer implemented invention which makes
“technical contribution” patentable
not -
computer programs per se
business methods
www.europa.eu.net/comm/internal_market/en/
indprop/index.htm
20
Copyright Directive
www.europa.eu.net/comm/internal_market/en/indprop/docs
harmonisation of copyright and related rights in the information
society.
to be implemented by December 2002.
clarification of reproduction and distribution rights,
introduction of new right of communication to the public.
protection for copy protection devices and other “technical
measures”.
protection of rights management information.
draft Statutory Instrument awaited imminently.
21
Database Right
British Horseracing Board –v- William Hill (2002)
High Court – bookmaker’s publication of racing
information extracted from the BHB database
infringed database right as constituted “repeated
and substantial extraction and re-utilisation of data”.
Court of Appeal – referred interpretation of Directive
to ECJ. Result awaited
22
Account aggregation
Emergence of new personal, finance account
aggregation services
-
-
breach of customer terms
breach of Computer Misuse Act – unauthorised
access to computer material
breach of copyright/database right
breach of s55 Data Protection Act –
obtaining personal data without consent of
data controller.
23
On-line Trading
Implementation of e-commerce Directive
Should have been implemented 17 January 2002.
Separate consultations on implementation in financial services and
otherwise ended on 2 May.
Specific information requirements
“Country of origin” principle – “fixed establishment”
the place where the service provider has the centre of its activities
- protection of consumers is an exception
- location of technology not definitive
Tax
New regime providing company tax relief for cost of acquisition and
development of intangible assets.
www.inlandrevenue.gov.uk/budget2002/revbn10/htm
Directive on application of VAT electronically delivered services. To be
implemented by 1 July 2003.
http://europa.eu.int/comm/taxation_customs/whatsnew.htm
24
Download