European Privacy - International Association of Privacy Professionals

advertisement
European FM
8/15/11
3:56 PM
Page i
EUROPEAN PRIVACY
Law and Practice for Data
Protection Professionals
Executive Editor
Eduardo Ustaran
Partner, Field Fisher Waterhouse
An IAPP Publication
European FM
8/15/11
3:56 PM
Page ii
©2012 by the International Association of Privacy Professionals (IAPP)
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, mechanical, photocopying, recording or
otherwise, without the prior written permission of the publisher, International Association
of Privacy Professionals, Pease International Tradeport, 75 Rochester Ave., Suite 4,
Portsmouth, NH 03801, United States of America.
Editor: Elissa Myers, CAE
Cover design: Noelle Grattan, -ing designs, llc.
Copy editor: Sarah Weaver
Compositor: Eric Rosenbloom, Kirby Mountain Composition
Indexer: Jan Bednarczuk, Jandex Indexing
ISBN 978-0-9795901-5-3
Library of Congress Control Number: 2011932958
European FM
8/15/11
3:56 PM
Page iii
CONTENTS
About the IAPP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii
Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
Richard Soule
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi
Bojana Bellamy
Introduction
SECTION ONE: Introduction to European Data Protection
Chapter 1: Origins and Historical Context of Data Protection Law
Sian Rudgard
Rationale for data protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Human rights law . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Early laws and regulations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
The need for a harmonised European approach . . . . . . . . . . . . . . . . . . . . . . . . . . 11
The Treaty of Lisbon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Chapter 2: European Union Institutions
Michelle Levin and Lilly Taranto
Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
European Parliament . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
European Council . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Council of the European Union (Council of Ministers) . . . . . . . . . . . . . . . . . . . . 24
European Commission . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
European Court of Human Rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Court of Justice of the European Union . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Article 29 Working Party . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
iii
European FM
8/15/11
3:56 PM
Page iv
CONTENTS
Chapter 3: Legislative Framework
Brian Davidson
Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
The Council of Europe Convention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
The Data Protection Directive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
The Privacy and Electronic Communications Directive . . . . . . . . . . . . . . . . . . . . 40
The Data Retention Directive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Impact on member states . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
SECTION TWO: European Data Protection Law and Regulation
Chapter 4: Data Protection Concepts
Nuria Pastor
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Personal data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Sensitive personal data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Controller and processor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Data subject . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Chapter 5: Application of the Law
Antonis Patrikios
Applicability criteria under the Directive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Establishment in the EU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
No establishment in the EU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
The e-Privacy Directive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
The Data Retention Directive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Chapter 6: Data Protection Principles
Lilly Taranto
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Fairness and lawfulness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Purpose limitation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Proportionality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Data quality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Chapter 7: Legitimate Processing Criteria
Victoria Hordern
Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Processing personal data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Processing sensitive data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
iv
European FM
8/15/11
3:56 PM
Page v
CONTENTS
Chapter 8: Information Provision Obligations
Hannah Jackson
The Transparency Principle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Exemptions to the obligation to provide information to data subjects . . . . . . . . . 112
Privacy Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Chapter 9: Data Subjects’ Rights
Michelle Levin
Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
The right of access under Article 12 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
The right to obtain rectification, erasure or blocking of the data processing . . . . . 132
The right to object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
The right not to be subject to fully automated decisions . . . . . . . . . . . . . . . . . . 137
Chapter 10: Confidentiality and Security
Stewart Room
Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
The approach taken by the Data Protection Directive and national legislations . . 142
Appropriate technical and organisational measures . . . . . . . . . . . . . . . . . . . . . . . 146
Dealing with data processors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
The regime in the e-Privacy Directive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
The regime in the Data Retention Directive . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
Breach disclosure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
Chapter 11: Notification Requirements
Brian Davidson
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Notification obligation and exemptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
Content and format of notification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
Prior authorisation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Lack of harmonisation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Timescales . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
The future of notification in the EU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Conclusion and practicalities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
Chapter 12: International Data Transfers
Eduardo Ustaran
Introduction: Limitations affecting international data transfers . . . . . . . . . . . . . . . 173
Scope of data transfers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
Meaning of an ‘adequate level of protection’ . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Procedure to designate countries with adequate protection . . . . . . . . . . . . . . . . 177
The situation in the United States . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
v
European FM
8/15/11
3:56 PM
Page vi
CONTENTS
Legitimising data transfers by adducing adequacy—model contracts . . . . . . . . . . 180
Data transfers within a multinational corporate group—
Binding Corporate Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
Data transfers to service providers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
Relying on derogations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
The future of the prohibition on international data transfers . . . . . . . . . . . . . . . . 189
Chapter 13: Supervision and Enforcement
Stewart Room
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
Administrative supervision . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
Regulation by the citizen and access to justice . . . . . . . . . . . . . . . . . . . . . . . . . . 197
Sanctions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
The Article 29 Working Party . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
The European Data Protection Supervisor . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
Supervision and enforcement within the e-Privacy Directive . . . . . . . . . . . . . . . 205
Strategies for coping with supervision and enforcement . . . . . . . . . . . . . . . . . . . 206
SECTION THREE:
Compliance with European Data Protection Law and Regulation
Chapter 14: Employment Relationships
Victoria Hordern
Employee data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
Legal basis for processing employee personal data . . . . . . . . . . . . . . . . . . . . . . . . 211
Processing sensitive employee data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
Providing notice . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
Storage of personnel records . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
Workplace monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
Works councils . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
Whistle-blowing schemes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
Chapter 15: Surveillance Activities
Antonis Patrikios
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
Communications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
CCTV . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
Biometrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
Location-based services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
Chapter 16: Direct Marketing
Phil Lee
Data protection and direct marketing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
Postal marketing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253
vi
European FM
8/15/11
3:56 PM
Page vii
CONTENTS
Telephone marketing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254
Marketing by electronic mail (including e-mail, SMS and MMS) . . . . . . . . . . . . 255
Fax marketing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258
Location-based marketing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259
Online behavioural advertising . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
Enforcement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
Chapter 17: Internet Technology and Communications
Hannah Jackson
Cloud computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
Cookies and IP addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274
Search engines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
Social Networking Services (SNS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282
Chapter 18: Outsourcing
Eduardo Ustaran
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287
The roles of the parties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288
Data protection obligations in an outsourcing contract . . . . . . . . . . . . . . . . . . . . 290
The German case . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
Offshoring and international data transfers . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294
Appendices
Appendix 1: EU Legislative References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301
Appendix 2: EU Institutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
About the Contributors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311
vii
European12
8/13/11
12:16 PM
Page 173
Chapter Twelve
INTERNATIONAL DATA TRANSFERS
By Eduardo Ustaran, Partner
1. Introduction: Limitations affecting international data transfers
One stated objective of the Data Protection Directive is to allow the free flow of personal
data between member states, based on agreed-upon principles of personal data protection.
But at the same time, the Directive recognizes that transfers of personal data to third countries require special consideration.
1.1 Legislative background
Article 25 of the Directive places a challenging requirement on the governments of EU
member states: to ban the transfer of personal data to any country outside the European
Economic Area (which consists of the EU member states together with Iceland, Liechtenstein and Norway) unless that third country (a country outside the EEA) ensures an adequate level of privacy protection.
The recitals of the Directive don’t clearly explain the reason behind this radical prohibition. They recognise that cross-border flows of personal data are necessary for the expansion of international trade, but also state that the transfer of personal data to a third country
that does not ensure an adequate level of protection must be prohibited.
To understand the basis for this approach, it is necessary to bear in mind the purpose
of the Directive as set out in Article 1: Member states must protect the fundamental rights
and freedoms of natural persons, and in particular their right to privacy with respect to the
processing of personal data. In other words, the main aim of the legal regime established by
the Directive is to create a framework that protects and shields individuals’ personal information from misuse and abuse.
However, such a framework would be very fragile if the protection afforded by it were
to fall apart as soon as the personal information left the boundaries of the countries subject
173
European12
8/13/11
12:16 PM
Page 174
INTERNATIONAL DATA TRANSFERS
to EU data protection law. Therefore, the European institutions responsible for drafting and
adopting the Directive tried to preserve the effect of the new regime by blocking any attempts to weaken the protection afforded to individuals. In practice, this has created a situation that effectively imposes EU data protection standards in jurisdictions outside Europe.
1.2 Practical implications
Bearing in mind the high standards of privacy protection imposed by the Directive, it is
difficult to see how countries without the same strict legislative approach to this issue can
avoid falling foul of this provision. As a result, this element of the Directive has been seen as
a serious barrier to international commerce. Although the Directive seeks to facilitate the
flow of personal data between EU member states, global commerce has been threatened.
For some large multinational organisations, this issue has meant the adoption of EU data
protection practices across their operations irrespective of where the data processing activities actually take place.
2. Scope of data transfers
The concept of transfer is not defined by the Directive. However, transfer is not the same as
mere transit. Therefore, the fact that personal data may be routed through a third country
on the way from a EEA country does not bring such transfer within the authority of Article 25 of the Directive unless some substantive processing operation is conducted on the
personal data in the third country.
In practice, there are two common situations that have been a source of concern in
the past, but that are not subject to the conditions dealing with data exports:
• Technical routing of packet-switch technology (such as Internet e-mail and web
pages), which may involve random transfers of personal data between computer
servers located anywhere in the world
• Electronic access to personal data by travellers who happen to be physically located
for a short period of time in a place that does not afford an adequate level of protection—for example, a person who logs on to a computer system based in the EU to
access data from a foreign airport
In addition, following the European Court of Justice decision in the Swedish case
against Bodil Lindqvist (C-101/01) in November 2003, where an individual in a member
state merely loads personal information onto a website that is hosted in that state or another member state so that the information can be accessed by anyone who connects to
the Internet does not constitute a transfer of data to a third country.
However, where there is an international exchange of information about individuals
with the intention of automatically processing that personal information after it has been
174
European12
8/13/11
12:16 PM
Page 175
INTERNATIONAL DATA TRANSFERS
exchanged, that should be regarded as a transfer for the purposes of the Directive, even if
the original exchange does not qualify as processing of personal data. An example of this
would be where information is provided by someone in the EU over the telephone to
someone in a third country who then enters the information on a computer.
3. Meaning of an ‘adequate level of protection’
Article 25 of the Directive states that:
The Member States shall provide that the transfer to a third country of personal data which
are undergoing processing or are intended for processing after transfer may take place only if,
without prejudice to compliance with the national provisions adopted pursuant to the other
provisions of this Directive, the third country in question ensures an adequate level of
protection.
3.1 EU official interpretation
In general, the adequacy of the protection afforded by the third country in question must
be assessed on a case-by-case basis in the light of all the circumstances surrounding the data
transfer. In addition, as part of that assessment, particular consideration must be given to:
• The nature of the data
• The purpose and duration of the proposed processing operation or operations
• The country of origin and country of final destination
• The rules of law, both general and sectoral, in force in the third country
• The professional rules and security measures that are complied with in that country
To help organisations carry out that assessment in practice, the Article 29 Working
Party issued quite detailed advice even before the deadline for implementation of the Directive. Following this advice, the analysis of the level of protection must comprise two
basic elements: (1) the content of the applicable rules and (2) the means for ensuring their
effective application. Accordingly, the Article 29 Working Party identified a set of content
principles and a basic enforcement mechanism, which can be regarded as a minimum requirement for the protection to be considered adequate.
The content principles include:
• The purpose limitation principle: Data must be processed for a specific purpose and
subsequently used or further communicated only when compatible with the original purpose.
175
European12
8/13/11
12:16 PM
Page 176
INTERNATIONAL DATA TRANSFERS
• The data quality and proportionality principle: Data must be accurate and, where necessary, kept up to date. The data must be adequate, relevant and not excessive in relation to the purposes for which it is transferred or further processed.
• The transparency principle: Individuals must be provided with information as to the
purpose of the processing and the identity of the data controller in the third country, and any other information that is necessary to ensure fairness.
• The security principle: The data controller must take technical and organisational security measures appropriate to the risks presented by the processing. Any person acting
under the authority of the data controller, including a processor, must not process
data except on instructions from the controller.
• The rights of access, rectification and opposition: Individuals must have a right to obtain a
copy of all data relating to them, and a right to rectification of such data where it is
shown to be inaccurate. Where there are compelling legitimate grounds, individuals
must also be able to object to the processing of their personal data.
• Restrictions on onward transfers: Further transfers of the personal data by the recipient
of the original data transfer must be permitted only when the second recipient (i.e.,
the recipient of the onward transfer) is also subject to rules affording an adequate
level of protection.
• Sensitive data: Where ‘sensitive’ categories of data are involved, additional safeguards
should be in place, such as a requirement that individuals give their explicit consent
for the processing.
• Direct marketing: Where data is transferred for the purposes of direct marketing, individuals should be able to opt out from having their data used for such purposes at
any stage.
• Automated individual decision: Where the purpose of the transfer is to make an automated decision in the sense of Article 15 of the Directive, the individual should have
the right to know the logic involved in this decision, and other measures should be
taken to safeguard the individual’s legitimate interest.
The enforcement mechanism required need not be based on a supervisory authority
model, as is typically the case within EU member states. What the Article 29 Working Party
is concerned about is a system that meets the underlying objectives of a data protection
procedural system:
• The delivery of a good level of compliance with the rules: A good system is generally characterised by a high degree of awareness among data controllers of their obligations,
and among individuals of their rights and the means of exercising them. The existence of effective and dissuasive sanctions can play an important role in ensuring
176
European12
8/13/11
12:16 PM
Page 177
INTERNATIONAL DATA TRANSFERS
respect for the rules, as can systems of direct verification by authorities, auditors or
independent data protection officials.
• The provision of support and help to individuals in the exercise of their rights: Individuals
must be able to enforce their rights rapidly and effectively, and without prohibitive
cost, which means that there must be some sort of institutional mechanism allowing
independent investigation of complaints.
• The availability of appropriate redress to the injured party when rules are not complied with:
This is a key element, which must involve a system of independent adjudication
or arbitration that allows compensation to be paid and sanctions imposed where
appropriate.
3.2 The UK approach
In June 2006, the UK Information Commissioner’s Office (ICO) produced an updated
version of its own guidance note in the area of international data transfers.1 The ICO’s
guidance includes a section called the ‘adequacy test’, which is aimed at helping exporters
of personal data determine whether a transfer can be regarded as adequate in terms of data
protection.
According to the ICO’s guidance, the adequacy criteria are divided into two categories: the ‘general adequacy criteria’ and the ‘legal adequacy criteria’. The general adequacy criteria are factors that the exporting data controller can identify easily; for example,
the nature of the personal data being transferred and purpose for which the data will be
processed. General adequacy criteria should be assessed in detail on every occasion. The
legal adequacy criteria may be more difficult for the controller to assess as they are factors
relating to the legal system in force in the third country.
An exhaustive analysis of the legal adequacy criteria may be unnecessary if an assessment of the general adequacy criteria has revealed that, in the particular circumstances, the
transfer is low risk. Conversely, if the general adequacy assessment reveals a high-risk transfer (e.g., if the data is particularly sensitive), then a more comprehensive investigation of the
legal adequacy criteria will be expected.
Therefore, this assessment must be made by focusing on the potential risks involved in
the transfer and whether or not, in all the circumstances of the case, an adequate level of
protection is likely to be ensured in the third country.
4. Procedure to designate countries with adequate protection
The Directive allows the European Commission to determine whether a third country ensures an adequate level of protection by reason of its domestic law or of the international
commitments it has entered into (Article 25(6)). Therefore, the Commission has established
a formal procedure to designate countries that can be assumed to ensure an adequate level
of protection. The steps that are taken as part of this procedure include:
177
European12
8/13/11
12:16 PM
Page 178
INTERNATIONAL DATA TRANSFERS
• Creation of a proposal from the European Commission
• Issuance of an opinion by the Article 29 Working Party
• Issuance of an opinion of the Article 31 Management Committee delivered by a
qualified majority of member states
• Provision of a 30-day right of scrutiny for the European Parliament to check
whether the Commission has used its executing powers correctly
• Adoption of the decision by the European Commission
The effect of such a decision is that personal data can flow from the EU member states
and the other EEA member countries to that third country with no further safeguard necessary. At the time of writing, the Commission has recognised Switzerland, Hungary
(which is now part of EEA), Canada, Argentina, Guernsey, Isle of Man, Jersey, the Faroe Islands, Andorra and Israel as providing adequate protection.
The European Commission has recognised the need for a more extensive use of findings of adequate protection in third countries. Therefore, the Commission expressly included this task in the Work Programme for a better implementation of the Directive and
is likely to step up its activity in this area. Other jurisdictions that may join the list of ‘safe’
countries in the short to medium term include Australia, New Zealand and Japan.
5. The situation in the United States
Countries where a legislation-free approach to personal privacy is preferred, such as the
United States, face a particularly difficult challenge in the context of European data imports. In light of this and considering the large volume of data transfers carried out on a
daily basis between the EU and the U.S., the U.S. Department of Commerce and the European Commission devoted more than two years to developing a self-regulatory framework that would allow U.S organisations to satisfy the requirements of the Directive. On
26 July 2000, the European Commission finally issued a Decision stating that the so-called
Safe Harbor Privacy Principles provide adequate protection for personal data transferred
from the EU.
5.1 Safe Harbor Privacy Principles
The decision by U.S.-based organisations to abide by the Safe Harbor Privacy Principles is
entirely voluntary. Organisations that decide to participate in the scheme must comply
with the relevant requirements and publicly declare that they do so. In practice, an organisation needs to self-certify annually to the U.S. Department of Commerce in writing that
it agrees to adhere to the Safe Harbor requirements. It must also include a statement in its
published privacy policy that it adheres to the principles.
The requirements established by the Safe Harbor Privacy Principles are as follows:
178
European12
8/13/11
12:16 PM
Page 179
INTERNATIONAL DATA TRANSFERS
• Notice:An organisation must inform individuals of the purposes for which it collects
and uses personal information, how it can be contacted, to whom it intends to disclose the information and the choices and means available to individuals for limiting
the use and disclosure of that information.This notice must be made available in clear
and conspicuous language before the organisation uses or discloses the information.
• Choice: An organisation must offer individuals the opportunity to opt out of uses or
disclosures involving their personal information, where such uses or disclosures are
incompatible with the purposes for which the information was originally collected
or subsequently authorised by the individual. With regard to sensitive personal information (data specifying the medical or health condition, the racial or ethnic origin,
the political opinions or trade union membership, the religious or philosophical beliefs or the sex life of an individual), affirmative or explicit consent— opt-in—must
be obtained if the information is to be used for a purpose other than that for which
it was originally collected or subsequently authorised by the individual.
• Onward transfer: An organisation may disclose personal information only to those
third parties that (a) subscribe to the Safe Harbor Privacy Principles, (b) are subject
to the Directive, or (c) enter into a written agreement whereby they undertake to
provide at least the same level of privacy protection provided by the Safe Harbor
Privacy Principles.
• Security: Organisations processing personal information must take reasonable security
measures and precautions to avoid its loss, misuse and unauthorised access, disclosure, alteration or destruction.
• Data integrity: An organisation may only process information relevant to the purposes for which it has been gathered. In addition, steps must be taken to ensure that
the data is (a) relevant for the intended use and (b) accurate, complete and current.
• Access: Individuals must have access to personal information about them held by an
organisation and be able to correct it, except where the burden or expense of providing access is disproportionate to the risks to the individual’s privacy in the case in
question, or where the rights of persons other than the individual would be violated.
• Enforcement: Organisations must abide by certain mechanisms of compliance with the
Safe Harbor Principles, which provide recourse for individuals and consequences for
noncompliance. At the very least, such mechanisms must include (a) a readily available and affordable independent recourse to deal with individuals’ complaints and
disputes by reference to the Safe Harbor Privacy Principles and award damages
where applicable; (b) a follow-up procedure to verify the implementation of privacy
practices; and (c) an obligation to remedy problems arising out of failures to comply
with the Safe Harbor Privacy Principles.
179
European12
8/13/11
12:16 PM
Page 180
INTERNATIONAL DATA TRANSFERS
5.2 Practical operation
To qualify for the scheme, an organisation must either:
• join a self-regulatory privacy programme that adheres to the Safe Harbor’s requirements, or
• develop its own self-regulatory privacy policy that conforms to the Safe Harbor.
Enforcement of the Safe Harbor Privacy Principles takes place in the United States in
accordance with U.S. law and is carried out primarily by the private sector. Private sector
self-regulation and enforcement is backed up as needed by government enforcement of the
federal and state unfair and deceptive statutes.
An EU organisation can ensure that it is sending information to a U.S. organisation
that participates in the Safe Harbor by viewing the public list of Safe Harbor organisations
posted on the U.S. Department of Commerce’s website. This list became operational at the
beginning of November 2000 and contains the names of all U.S. companies that have selfcertified to the Safe Harbor Privacy Principles and any additional documentation. This list
is regularly updated so it is clear who is in the Safe Harbor.
U.S. organisations can also meet the adequacy requirements of the Directive if they include the Safe Harbor requirements as the substantive privacy provisions in written agreements with parties transferring data from the EU.
6. Legitimising data transfers by adducing adequacy—model
contracts
There is an increasing interest in promoting the use of the standard contractual clauses for
international transfers of personal data to third countries not providing an adequate level of
protection.
6.1 Terms approved by the Commission
Article 26(2) of the Directive provides that member states may authorise a transfer, or a set
of transfers, of personal data to third countries that do not ensure an adequate level of protection where the organisation wishing to transfer the data adduces adequate safeguards for
the privacy rights of individuals.
Article 26(4) goes on to say that such safeguards may result from certain standard contractual clauses approved by the European Commission. Following several years of negotiations with national regulatory bodies, influential trade associations and international
organisations, on 15 June 2001, the European Commission adopted a decision2 setting out
standard contractual clauses ensuring adequate safeguards for personal data in this context.
180
European12
8/13/11
12:16 PM
Page 181
INTERNATIONAL DATA TRANSFERS
This decision obliges member states to recognise that companies or organisations using
these standard clauses in contracts concerning personal data transfers to countries outside
the EEA are offering adequate protection to the data. Although, in principle, member states
are bound by the Commission’s decision to allow transfers on the basis of the standard
contractual clauses, the data protection authorities of each country may require that a copy
of the contract be deposited with them. However, this is not a requirement across the EU.
In addition, if there is a substantial likelihood that the standard contractual clauses are
not being, or will not be, complied with and the continuing transfer would create an imminent risk of grave harm to individuals, the national data protection authorities may exercise their powers to prohibit or suspend any relevant transfer.
6.2 Obligations of the exporter
According to the standard contractual clauses, an EU-based exporter of personal data must
warrant and that:
• The processing of personal data up to the moment of the transfer is, and will continue to be, carried out in accordance with the local data protection law.
• If the transfer involves sensitive personal data, the relevant individuals will be informed (e.g., via a privacy policy) that their data may be transmitted to a third country without an adequate level of data protection.
• It will make available, upon request, to any individual to whom the data relate, a
copy of the standard clauses used in the transfer contract.
• It will respond to any enquiries of any such individual in relation to the overseas
transfer and processing.
• It will respond to any enquiries of its national data protection authority in connection with the processing carried out by the importer of the data transferred.
6.3 Obligations of the importer
The standard clauses approved by the European Commission require the overseas recipient
of the data to warrant and undertake that:
• It has no reason to believe that its national legislation will affect its performance of
the contract.
• It will process the data in accordance with the so-called nine Mandatory Data Protection Principles, which represent a minimum requirement for data protection and
181
European12
8/13/11
12:16 PM
Page 182
INTERNATIONAL DATA TRANSFERS
mirror the key requirements of the Directive in terms of purpose limitation, data
quality and proportionality, transparency, security, individuals’ rights, restrictions on
onward transfers, sensitive data, direct marketing and automated individual decisions.
• It will deal promptly and properly with all reasonable enquiries made by its European partner or the individuals to whom the data relate.
• It will cooperate with any relevant national data protection authority investigating
the transfer or the processing carried out by the importer.
• It will submit its data processing facilities for audit upon request of the data
exporter.
• Upon request, it will make available a copy of the standard clauses used in the transfer contract to any individual to whom the data relates.
6.4 Alternative model contracts
The European Commission stated in its first report on the implementation of the Directive
of 15 May 2003 that it intended to adopt further decisions on the basis of Article 26(4) so
that economic operators have a wider choice of standard contractual clauses. Accordingly,
the Commission issued a new decision on 27 December 2004 amending its decision of
June 2001 and adding a second version to the sets of standard contractual clauses that can
be used to legitimise international transfers between data controllers. This second version
was based on an alternative draft pioneered by the International Chamber of Commerce.
Under the original 2001 clauses, the exporter of the data had to warrant very difficult
things, such as the fact that the processing would always be carried out in accordance with
the law of the country where the exporter was based, and that individuals would be informed if the transfer involved sensitive personal data. In the 2004 clauses, these obligations
are replaced by more practical and achievable tasks, such as:
• Ensuring that the collection, processing and transfer is in accordance with the laws
applicable to the exporter
• Using reasonable efforts to determine that the data importer is able to satisfy its legal
obligations under the clauses
• Providing the importer, upon request, with copies of relevant data protection laws
and references to them (not including legal advice)
In addition, some of the obligations under the 2001 clauses have been softened by the
2004 clauses, as the exporter will be required to respond to enquiries from individuals and
data protection authorities only if the importer has not agreed to do so, and confidential
information may be excluded from the copy of the clauses that must be made available to
individuals who request them.
182
European12
8/13/11
12:16 PM
Page 183
INTERNATIONAL DATA TRANSFERS
The 2004 clauses dealing with the importer’s obligations are very detailed and precise;
however, they are also more realistic than the 2001 clauses. For example, unlike under the
2001 clauses, a data importer that enters into an agreement containing the 2004 model
clauses will have to warrant and undertake that:
• It has appropriate technical and organisational security measures in place.
• It has procedures in place to ensure that any third party with access to the data (including data processors) will respect and maintain the confidentiality and security of
the data.
• It will identify to the data exporter a contact point within its organisation authorised to respond to enquiries concerning the processing of the personal data, and
will cooperate in good faith with the data exporter and the relevant individuals and
data protection authorities within a reasonable time.
• It will provide the data exporter with evidence of financial resources sufficient to
fulfil its responsibilities upon request.
• It will submit its data processing facilities, data files and relevant documentation for
reviewing, auditing and/or certifying by the data exporter (or any independent or
impartial inspection agents or auditors selected by the data exporter and not reasonably objected to by the data importer) to ascertain compliance with the warranties
and undertakings under the agreement, with reasonable notice and during regular
business hours, if reasonably requested by the data exporter.
• It will not disclose or transfer the personal data to a third-party data controller located outside the European Economic Area, except in some specific cases.
One clause that was softened deals with the impact of local laws on the ability of the
data importer to comply with its data protection obligations. Under the 2004 clauses, the
data importer must warrant that, at the time of entering into the agreement with the data
exporter, it has no reason to believe in the existence of any local laws that would have a
substantial adverse effect on the guarantees provided, and that it will inform the data exporter (which will pass such notification on to the relevant data protection authority where
required) if it becomes aware of any such laws. However, even in this case, there is no provision that allows the exporter to suspend the transfer of data or terminate the contract, as
in the 2001 clauses.
Similarly, the 2004 clauses place a practical limitation on the right of access by allowing data importers to deny such access in cases where requests are manifestly abusive, or
unreasonably repetitive or frequent. The data processor can also deny access if it need not
be granted under the law of the country of the data exporter. In addition, provided that a
competent data protection authority has given its prior approval, access need not be
granted when doing so would be likely to seriously harm the interests of the data importer
183
European12
8/13/11
12:16 PM
Page 184
INTERNATIONAL DATA TRANSFERS
or other organisations dealing with the data importer and such interests are not overridden
by the interests for fundamental rights and freedoms of the individuals.
7. Data transfers within a multinational corporate group— Binding
Corporate Rules
The Article 29 Working Party developed the concept of ‘Binding Corporate Rules’ to
allow multinational corporations, international organizations and groups of companies to
make intra-organizational transfers of personal data across borders in compliance with EU
Data Protection Law.
7.1 BCR concept
Data exports within a multinational corporate group are subject to the same rules as exports outside the group. However, using ad hoc contractual arrangements is not a costeffective way of legitimising international transfers for data-reliant organisations operating
on a worldwide basis. For many global organisations, using personal data is all about sharing information beyond national borders and jurisdictional differences. Therefore, a flexible,
tailor-made solution that does away with the impracticalities of having to enter into innumerable contracts among subsidiaries is likely to be the only practical option.
In recent years, the EU data protection authorities have acknowledged the role of
Binding Corporate Rules (BCR) as a mechanism to legitimise data exports within a corporate group. In essence, a set of BCR is a global code of practice based on European privacy standards, which multinational organisations draw up and follow voluntarily and
national regulators approve in accordance with their own legislations.
The idea of using BCR to create adequate safeguards for the purposes of the EU Data
Protection Directive was devised by the Article 29 Working Party in its Working Document WP 74 adopted in 2003. To assist BCR candidates, in 2005 the Article 29 Working
Party developed a Model Checklist (WP 108). On the same date, the Working Party issued
a Working Document Setting Forth a Co-Operation Procedure for Issuing Common
Opinions on Adequate Safeguards Resulting from Binding Corporate Rules (WP 107). In
addition to setting out the criteria for choosing a lead data protection authority, this document set out the required process to be followed by the lead authority and the participating data protection authorities before issuing an authorisation.
In June 2008, the Working Party issued three additional documents that must be carefully considered when seeking to rely on BCR to legitimise data exports. These comprise a
table setting out the consolidated approval criteria for BCR (WP 153), a sample framework for the structure of the BCR (WP 154) and a set of frequently asked questions (WP
155). The most important of the three documents is undoubtedly WP 153. Although this
draws on existing Working Party papers (notably WP 74 and WP 108), it clarifies the specific elements that must be contained in the BCR documentation and provides a set of
clear criteria for approval.
184
European12
8/13/11
12:16 PM
Page 185
INTERNATIONAL DATA TRANSFERS
Since then, the EU data protection authorities have increased their level of cooperation to streamline the BCR approval process. This cooperation has led to the adoption of a
‘mutual recognition’ process that, at the time of writing, is supported by 19 EU member
states and shortens considerably the review of BCR applications. More recently, the Article
29 Working Party provided the strongest commitment to BCR via its submission to the
consultation on the EU Data Protection Directive, which suggests that a provision for
BCR should be further reinforced and included in any new legal framework so that BCR
is expressly recognised as an appropriate tool to provide adequate safeguards.
7.2 BCR practical requirements
The BCR must apply generally throughout the corporate group irrespective of the location of the members, the nationality of the individuals whose personal data is being
processed or any other criteria or consideration. The Article 29 Working Party also stresses
that two elements must be present in all cases if the BCR are to be used to adduce safeguards for data exports: binding nature and legal enforceability.
In practice, the binding nature of the BCR implies that the members of the corporate
group, as well as each employee within it, are compelled to comply with the BCR. Legal
enforceability means that the individuals covered by the scope of the BCR must become
third-party beneficiaries either by virtue of the relevant national law or by contractual
arrangements between the members of the corporate group. Those individuals should be
entitled to enforce compliance with the BCR by lodging a complaint before the competent data protection authority and before the courts.
In addition, the Working Party’s documents include the following requirements:
• The BCR must set up a system that guarantees awareness and implementation of
the BCR both inside and outside the EU.
• The BCR must provide for self-audits and/or external supervision by accredited auditors on a regular basis with direct reporting to the parent’s board.
• The BCR must set up a system by which individuals’ complaints are dealt with by a
clearly identified complaint-handling department.
• The BCR must contain clear duties of cooperation with data protection authorities
so individuals can benefit from the institutional support.
• The BCR must also contain provisions on liability and jurisdiction aimed at facilitating their practical exercise.
• The corporate group must accept that individuals will be entitled to take action
against the group as well as to choose the jurisdiction.
• Individuals must be made aware that personal data is being communicated to other
members of the corporate group outside the EU, and the existence and the content
of the BCR must be readily accessible to those individuals.
185
European12
8/13/11
12:16 PM
Page 186
INTERNATIONAL DATA TRANSFERS
In 2008, BCR came of age and established themselves as a viable solution for multinationals that are serious about privacy and data protection compliance. In addition to the
growing number of applications, several factors are evidence of this. One strong indicator is
that BCR was one of the top priorities for the Article 29 Working Party according to its
Work Programme for 2008. Moreover, in the past few years there has been a real change of
approach amongst EU data protection authorities, who are now very receptive to the use
of BCR to legitimise personal data exports.
8. Data transfers to service providers
On 27 December 2001, the European Commission adopted a second decision3 setting out
standard contractual clauses for the transfer of personal data to data processors established in
non-EEA countries that are not recognised as offering an adequate level of data protection.
Again, the inflexible nature of the original 2001 controller-to-processor clauses led to
a further proposal by the International Chamber of Commerce and on 5 February 2010,
the European Commission issued its decision, updating and replacing the original
controller-to-processor standard clauses with a new set of model clauses. As of 15 May
2010, EEA-based data controllers wishing to rely on standard contractual clauses to legitimise international data transfers to processors outside the EEA must use the updated
controller-to-processor clauses for new processing operations. This is not necessary for existing processing operations provided that the data processing operations remain unchanged. This means that material changes such as new countries where the processing
takes place, new types of personal data or different processing purposes are likely to require
a fresh contract.
The updated controller-to-processor clauses deserve some credit for recognising the
reality of modern outsourcing arrangements. They do so by legitimising the power of data
processors to subcontract and attempting to enable the effective use of the chain of service
providers performing different roles. However, the updated clauses retain the onerous obligations imposed on the exporter and the importer by the original controller-to-processor
clauses and set out unnecessarily strict rules concerning the processor’s ability to subcontract its services.
The exporter’s obligations include a warranty regarding ongoing compliance with the
exporter’s law, an implied assessment of the applicable security requirements and the provision of notice to individuals where the transfer involves sensitive personal data. The importer’s obligations retain the full severity of the original controller-to-processor clauses in
respect of adverse local legislation and audit rights.
In addition, the updated controller-to-processor clauses set out very strict rules concerning the processor’s ability to subcontract some of its services. The rules set out 13 conditions that must be met by the parties to make subprocessing lawful every time some
aspect of the outsourced service is handled by a subprocessor. These conditions are:
186
European12
8/13/11
12:16 PM
Page 187
INTERNATIONAL DATA TRANSFERS
• Before subcontracting any of its processing operations, the importer must inform the
data controller and obtain its written consent.
• The processor and subprocessor must enter into an agreement with the same obligations as the updated controller-to-processor clauses. This agreement must be sent to
the exporter and, where requested, made available to individuals.
• The importer must accept liability for the subprocessor’s actions whilst the subprocessor must remain subject to the third-party beneficiary clause and to the law of
the exporter.
• The exporter must keep a list of all the subprocessing agreements. That list must be
available to the data protection authority, who will also be entitled to audit the subprocessor.
• Finally, on termination, the subprocessor must return or destroy the data and allow
the controller to audit compliance with this obligation.
The step-by-step subcontracting process is so cumbersome that it hardly solves the
problem it was meant to address. Therefore, this approach is often not accepted by global
outsourcing vendors. In the context of complex data processing arrangements involving
chains of service providers, the step-by-step process is entirely at odds with the ability to
engage different providers for different aspects of the service without direct involvement of
the customer. Sophisticated organisations are therefore likely to move away from the standard contractual clauses and explore other, more suitable solutions.
9. Relying on derogations
The principle set out in Article 25 of the Directive is not absolute, as Article 26 includes a
number of so-called derogations that are subject to the domestic laws of member states.
9.1 Consent
Data exports can lawfully be made with the consent of the individual. Consent must still
be freely given and while it is possible to make consent a condition for the provision of a
nonessential service, consent is unlikely to be valid if the individual has no real choice. This
is particularly the case in the context of employment where, for instance, an existing employee is required to agree to the international transfer of personal data, and the penalty for
not agreeing is dismissal. Such ‘consent’ is likely invalid.
Consent must also still be specific and informed. This means that the individual must
know and understand what such consent will amount to. Individuals should be informed
of the reasons for the transfer and, if possible, the countries involved. In addition, any identified risks involved in the transfer should be brought to the individual’s attention.
187
European12
8/13/11
12:16 PM
Page 188
INTERNATIONAL DATA TRANSFERS
9.2 Contract performance
The Directive allows data transfers in cases where specific types of contracts are in place or
being contemplated. In the case of a contract between the exporter and the individual to
whom the data relates, a transfer may be carried out if such transfer is necessary for performance of the contract or is a necessary part of precontractual steps taken by the exporter at the request of the individual.
In the case of a contract between the exporter and someone other than the individual,
the transfer will be lawful if the contract is entered into at the individual’s request or in her
interests and the transfer is necessary for the performance or conclusion of the contract.
The contracts covered by these provisions are not restricted to the supply of goods or
services, and may apply in the case of employment contracts. However, whether a transfer
is necessary for the performance of a contract will depend on the nature of the goods or
services provided under the contract rather than the way in which the exporter’s operations are organised. In other words, a transfer is not necessary if the only reason for it is the
fact that the exporter has chosen to structure its operations in a way that involves transferring data overseas.
Therefore, if a customer books a holiday abroad through an EEA-based travel agent,
the travel agent must transfer the booking details to the foreign hotel in order to fulfil the
contract with the customer. However, if for pure efficiency or cost-cutting reasons that
travel agent decides to place its customer database in a computer based outside the EEA, it
cannot be said that the transfer of personal data to the computer located overseas is necessary for the performance of the contract with the customer.
9.3 Substantial public interest
Transfers can be carried out where necessary for reasons of substantial public interest. This
case is most likely to apply in situations where the transfer is necessary for reasons of crime
prevention and detection, national security and tax collection.
In the UK, the Information Commissioner advises data exporters intending to rely on
this exception to adopt a similar case-by-case test to that required by the general crime and
taxation exemption. In other words, a transfer of personal data carried out under this exception must take place only to the extent that there is likely to be substantial harm to the
public interest if the transfer does not take place.
9.4 Legal claims
Transfers can be made where they are necessary:
• in connection with any legal proceedings (including prospective proceedings);
• for obtaining legal advice; or
• for establishing, exercising or defending legal rights.
188
European12
8/13/11
12:16 PM
Page 189
INTERNATIONAL DATA TRANSFERS
It should be noted that the legal proceedings do not necessarily have to involve the
exporter or the individual in question, nor do the legal rights have to be those of the exporter or the individual.
9.5 Vital interests
Exports of personal data can lawfully be carried out where necessary to protect the vital
interests of the particular individual. In practice, this relates to matters of life and death,
such as the transfer of medical records of an individual who has become seriously ill or
been involved in a serious accident abroad.
9.6 Public registers
Exports of personal data can also be made from information available on a public register
provided that the person to whom the information is transferred complies with any restrictions on access to, or use of, the information in the register. This allows transfers of extracts
from a public register of directors, shareholders or professional practitioners, for example,
but would not allow transfers of the complete register. In addition, if there are conditions
of use imposed by the body or organisation responsible for compiling the register, they
must be honoured by the importer and any further recipients.
10. The future of the prohibition on international data transfers
Overcoming the prohibition under Article 25 of the Directive is one of the most difficult
compliance challenges faced by global organisations operating in the EU. As described
above, whilst this prohibition is not absolute, finding and implementing the right mechanism to ensure adequacy is likely to be onerous and time consuming. However, even in the
face of technological developments and greater globalisation, the appetite of the EU institutions for a softer approach in the foreseeable future is likely to be low.
Accordingly, and to ensure compliance, international organisations are strongly advised
to develop a viable global data protection compliance programme in line with the adequacy criteria devised by the European Commission and commit to abiding by it through
either a contractual mechanism or a set of BCR.
1 The
Eighth Data Protection Principle on international data transfers, 30 June 2006.
Commission Decision 2001/497/EC of 15 June 2001 on standard contractual clauses for the transfer of personal data to third countries, Official Journal of the EU/Legislation (OJL) 181/19 of
4 July 2001.
3 Commission Decision 2002/16/EC of 27 December 2001 on standard contractual clauses for the
transfer of personal data to processors established in third countries, OJ 6/52 of 10 January 2002.
2
189
Download