CIPP E Outline
CIPP E Outline
                                                       1
                balance privacy and free flow of information/trade
                domestic laws may have higher standards
        Convention 108 (1981)
                CoE Convention (for the Protection of Individuals with regard to Automatic
                   Processing of Personal Data)
                Open to signature by countries outside Europe!
                Legally binding: first binding international instrument to set standards for
                   personal data and balance with free flow of info for int’l trade
                Those using personal information have social responsibility to safeguard such
                   personal data
                Based on principles of CoE 73/22 and 74/29
                Exceptions allowed for signatories when necessary measure in democratic
                   society (e.g. state security or crim investigation) **proportionality
                ***FREE FLOW OF INFO AMONG SIGNATORIES b/c min level of protection
                Additional Protocol addresses transfers to countries that are not signatories
                        o Legitimate interests of the individual
                        o In the public interest
                        o Transfer based on contractual clauses approved by supervisory
                            authority
                Mutual assistance with supervisory authorities
                Still the only binding legal instrument with a worldwide scope of application in
                   field of data protection open to any country
o   Harmonization in Europe
        Data Protection Directive (95/46/EC)
                European Commission called on European Parliament in 1976, in force 1995
                Directives are legislation, but leave implementation methods to member states
                Based on Convention 108
                Differences in results in member states (incorrect implementation, different
                   standards)
                        o E.g., requirement to notify local DPAs of processing details
                        o Fixed with GDPR
        Charter of Fundamental Rights
                EU, 2000 in Nice, consolidates fundamental HR in Europe
                Specifically refers to protection of personal data (unlike ECHR, which just has
                   the right to privacy)
                ART 7: right to privacy
                ART 8: data protection rights
                        o Fairly for specified purpose, consent or some other legitimate interest
                            laid down by law
                        o Basic values: (1) fair, (2) specified purpose, (3) legit basis for processing,
                            (4) individual right to access and rectify personal data, (5) supervisory
                            authority to oversee compliance
                ART 10: right to transfer of information
                ART 52: necessity and proportionality (balance)
        Treaty of Lisbon
                TEU and TFEU
                TFEU ART 16(1): everyone has right to protection of personal data
                                             2
                           ART 16(2): all EU institutions must protect individuals when processing personal
                            data
                                o National DPAs may also have jurisdiction
                           Treaty of Maastricht didn’t mention fundamental rights at all, sig development
                GDPR
                         Commission launched review of current legal framework in 2009/2010 to
                            strengthen data protection rules
                         Regulations binding in their entirety and apply directly to member states
                            immediately=> maximize consistency of approach
                                o Member states can still enact more specific laws in some cases
                                          Already specific laws in place (e.g. retention of employee data)
                                          Archiving purposes in the public interest, scientific, or historical
                                             research purposes, statistical purposes
                                          Processing of special categories of data
                                          Processing in compliance with legal obligation
                         KEY CHANGES
                                o Stronger rights for individuals (especially online)
                                o Data protection by design and by default (new tech developed)
                                o Accountability: organizations must be able to demonstrate compliance
                                     with GDPR
                                o Increased powers for supervisory authorities
                                o One-stop shop
                                o Broader application to anyone targeting EU consumers
                Law Enforcement Data Protection Directive
                         Protection of natural persons with regard to the processing of personal data by
                            competent authorities for the purposes of prevention, investigation, detection,
                            or prosecution of criminal offenses or the execution of criminal penalties
                         Member states have until May 6, 2018, to put into national law
                ePrivacy Directive
                         Data processing across public communications networks (not company intranet)
                         GDPR does not impose additional obligations on top of those in this directive
                                o ePrivacy Directive must be reviewed and amended to ensure
                                     consistency
   European Union Institutions
        o Treaty of Lisbon (2009): with the enlargement of the EU, must streamline decision-making
           process to improve efficiency and speed of EU
                European Council and ECB=institutional status, can making binding decisions
                Charter of Fundamental Rights= same legal status as treaties, legally binding
                         Poland and UK= Charter only applies when it contains laws and practices already
                            recognized in these countries
                         Czech Republic also with special provision
        o European Parliament
                Members directly elected by citizens of the EU
                4 responsibilities: (1) legislative development, (2) supervisory oversight of other
                   institutions, (3) democratic representation, (4) development of the budget
                         Works with Commission to bring forth new legislation
                                                    3
                        o     Can call upon Commission to submit legislation proposal to Council of
                              EU; invite Commission to consider amending existing policies and
                              developing new ones
         Power to censure Commission: Commission must submit reports to Parliament regularly
         6-96 members per state, sit in Europe-wide political groups (rather than by member
            states)
                  Group must have a minimum of 25 members with at least ¼ member state
                     represented within the group
         Prepare report for plenary session
                  In plenary session, Parliament examines, amends, and votes on proposed
                     legislation
                  Voting= simple majority
         Shares legislative powers with Counsel of Europe
                  Ordinary Procedure: both institutions must assent to legislation
                  Consultation procedure: Council must consult Parliament but is not bound
                  Consent procedure: important decisions, Parliament’s consent is required
         ROLE IN DATA PROTECTION: all data protection legislation adopted under ordinary
            legislative procedure-> Parliament with big and equal role in adopting
                  Vocal advocate of right to privacy
o   European Council
         Gathering of Heads of State, executive institution
         Meets 4 times per year so Heads of State can discuss issues affecting the community
o   Council of the EU
         One minister per state, co-legislates with Parliament
         Main decision-making body, writes legislation proposed by Commission
                  Concludes international agreements negotiated by Commission
         Council has been criticized for being undemocratic and lacking transparency-> now
            meetings held in public
         Rotating presidency
         Qualified majorities
o   European Commission
         Created from merger of Eur Coal and Steal Comm and Eur Atomic Energy Comm
         Executive body, implements EU’s decisions and policies
                  Ensure application of the Treaties and measures adopted by institutions
                  Application of EU law under control of ECJ
                  Execute budget and manage programs
         Initiates legislation
                  EU legislation can only be adopted when proposed by Commission
         Power to take legal and administrative action, including imposing fines against Member
            States that don’t comply with laws; supervisory authority over other institutions
         Independent commissioners without allegiance to Member States who send them
                  Selected on basis of “general competence and European commitment”
         ROLE IN DATA PROTECTION: creates legislation; can adopt “adequacy findings” on
            which non-EU Member States provide adequate levels of data protection; enforces
            Charter of HR, so ensures high level of protection of individual’s rights to privacy and
            data protection
o   European Court of Justice
                                           4
          Based in Luxembourg, set up with Treaty of Paris 1951
          Jurisdiction
                 Cases brought by Commission or by Member State against Member State’s
                    failure to fulfil treaty obligations
                 Actions brought by Member States, an EU institution, or a natural or legal
                    person to review the legality of acts by an EU institution
                 Actions brought by Member States, an EU institution, or natural or legal persons
                    against EU institutions for failure to act
                 Actions begun in national courts from which references are made fro a
                    preliminary ruling to the ECJ on issues of interpretation or validity of EU law
                 Opinions on the compatibility of EU international agreements with treaties
                 Appeals of points of law from the CFI (lower court of ECJ)
         Makes decisions on EU law and enforces European decisions based on:
                 Actions taken by the Commission against a Member State
                 Actions taken by individuals to enforce their rights under EU law
         28 government-appointed judges with 6 year terms; one president among the 28,
           elected by judges every 3 years
                 8 advocates general (give ECJ non-binding opinions to help ECJ decide cases)
         ROLE IN DATA PROTECTION: involved in cases on data protection (ECJ Decisions related
           to Data Protection)
                 Brought in national courts, brought by Commission against Member States
                 UK case for not fully implementing EU rules on confidentiality of electronic
                    communications
                 Google Spain vs. AEDP (2014), right to be forgotten
                 Digital Rights Ireland v. Ireland (2014): Data Retention Directive’s invalidity with
                    regards to Articles 7, 8, and 11 of the Charter
                 Smaranda Bara v. CNAS (ANAF case, 2015): personal data may not be
                    transferred between public administrative bodies of a Member State without
                    the individual being informed of the transfer
                 Weltimmo v. Hungarian DPA (2015): cross-border transfers within EU
                 Schrems v. Data Protection Commissioner (2015): invalidated U.S. Safe Harbor
                    as inadequate
o   European Court of Human Rights* (founded by CoE, not EU)
         Not an EU institution, no powers of enforcement
         Judgments are binding, countries obligated to comply with them
         ECtHR decisions can provide reparations to injured parties
         Number of judges=numbers of members of the CoE that have ratified the Convention,
           but do not represent any states
                 Chambers of 7 judges hear cases, expenses borne by CoE
         Jurisdiction
                 All cases regarding interpretation or application of ECHR
                 Cases may be referred by contracting states or European Commission of HR
                         o States who citizens are alleged to be a victim of a violation of the ECHR,
                             states that referred the case to the Commission, and states against
                             which a complaint has been lodged (if compulsory jurisdiction of ECtHR
                             or consent to case being heard by ECtHR) can bring cases
                         o Violation must have been committed by a state bound to the ECHR
                                            5
                           ECtHR does not have power to overrule national decisions or to annul national
                            laws; no powers of enforcement (CoE handles after a decision has been made)
                  ROLE IN DATA PROTECTION: ensure right to privacy (not data protection!) protected;
                    ECtHR has been active in data protection
                         Three French Cases (2009): Court reaffirmed fundamental role of protection of
                            personal data, but held that automated processing of data for police purposes,
                            and more specifically “the applicants’ inclusion on the national police database
                            of sex offenders was not contrary to Article 8.”
                         MM v. UK (2012): indiscriminate and open-ended collection of criminal record
                            data is unlikely to comply with Article 8
                         Copland v. UK (2007): monitoring applicant’s email at work is contrary to Article
                            8, since no provision made for this in the law
                         Gaskin v. UK (1989): restriction of the applicants access to his file contrary to
                            Article 8
                         Haralambie v. Romania: obstacles placed in applicant’s way when he sought
                            access to the secret service file on him drawn up in days of Communist rule was
                            contrary to Art 8
   Legislative Framework
        o Convention 108 (1981)
                  First legally binding international instrument in field of DP
                  Reasons for C108: (1) MS failure to respond to CoE’s ’73 and ’74 Resolutions concerning
                    protection of privacy, and (2) need for reinforcement of principles found in those
                    resolutions with binding instrument
                  Open for signing on Jan 28, 1981
                  Noteworthy for 3 reasons
                         Based on series of principles that address main concerns relating to DP
                            (accuracy and security of PD, right to access) that found their way into the
                            Directive and GDPR
                         Both ensures appropriate protections for individual privacy and also recognizes
                            importance of free flow of PD for commerce and exercise of public functions
                         Legally binding instrument: requires signatory states to implement principles by
                            enacting national legislation
                  Purpose: to achieve greater unity between signatory states and to extend safeguards for
                    individuals’ rights and fundamental freedoms
        o Data Protection Directive (95/46/EC) (1995)
                  Came about because only a small number of States ratified C108 and MS laws took on a
                    fragmented approach in implementing it: became an impediment to privacy rights
                  Marked the starting point of the EU’s leadership in European DP and the relative
                    downgrading of importance of C108
                  EU unable to make standalone HR laws, unlike CoE: must base on specific provision
                    under Treaty of Rome=> ***BASED ON INTERNAL MARKET HARMONIZATION MEASURE
                         Regulates the free flow of personal data between MS
                  As a Directive, created different interpretations adopted by MS across Europe
                  Necessity and adequacy key concepts in Directive (lawful grounds for processing and no
                    transfer to countries not offering adequate level of protection)
                  Treats manual and automated data the same
                  Key principles:
                                                   6
                   Fair and lawful processing
                   Collected for specific and legitimate purpose, not processed in manner
                    incompatible with that purpose
                Adequate, relevant, not excessive
                Accurate and kept up to date
                Not kept longer than necessary
                Processed in accordance with rights of individual
                Appropriate technical and organizational measures
                Only transferred outside EEA to countries w/ adequate levels of data protection
        Only applied to data controllers established in EU MS, or where C makes use of data
           processing equipment on the territory of an MS (req to appoint representative)
        Special categories of data identified: race, ethnicity, politics, religion, trade union
           membership, health and sex life info
        Establishment of DPAs, with WP29 being an independent body composed of DPA reps
        Scrapped for GDPR in an attempt to have more consistent application and interpretation
                3 factors of overhaul: divergence of national measures and practices in
                    implementation, impact on businesses and individuals, developments in tech
        Primary goals: protecting individual’s data, reducing red tape for businesses,
           guaranteeing free circulation of data within EU
        Key Changes from Directive to GDPR:
                Admin reqs removed (e.g. notification reqs, unduly costly to businesses)
                Increased responsibility and accountability for processing PD
                Lead authority/main DPA
                Individuals greater control over data (more explicit consent required)
                Improved portability to improve competition among servicers
                Right to be forgotten
                Ensure EU rules are applied when EU data handled abroad or services marketed
                    to EU citizens
                Strengthening of DPA powers and penalties
                Principles and rules for police and judicial cooperation in criminal matters
        Trilogue process among Commission, Parliament, and Counsel of Ministers with multiple
           drafts to agree upon final Regulation
o   GDPR (2018)
        Essential step to strengthen citizens’ fundamental rights in the digital age and facilitate
           business by simplifying rules for companies in the digital single market
        Contains both operative law and Recitals which assist in interpreting the law
        Main changes from Directive:
                Application of law: directly applicable across all MS without enacting nat’l leg
                         o Not limited to data controllers
                Long-arm reach of statute (establishment not required)
                         o Determined by location of data subject, if offered goods or services or
                            behavior monitored
                         o Tracking DS on the Internet to analyze or predict their personal
                            preferences will trigger application of Regulation, including tracking
                            cookies or app usage
                Putting individuals in control of their data: strengthening consent and DS rights
                                           7
                        o   Consent cannot be bundled with T&Cs, can be withdrawn at any time in
                            an easy way, explained to individuals before consent obtained
                        o Child restriction
                   Newer and stronger individual rights
                        o Transparency obligations, rights to data portability, restriction of
                            processing, right to be forgotten
                        o Retention of existing rights: subject access, rectification, erasure, right
                            to object, right to charge a fee has been removed
                   New accountability regime: make businesses more accountable for their data
                    practices
                        o Businesses implement data protection policies
                        o Data Protection by Design and Default
                        o Record-keeping obligations
                        o Cooperation with DPAs
                        o DPIAs
                        o Prior consultation with DPAs in high-risk situations
                        o Mandatory DPOs for certain Cs and Ps
                   New Data Processor Obligations
                        o May not subcontract with sub-P without consent of C
                        o Many similar obligations as C, or obligation to help C comply with GDPR
                   International Data Transfers: restrictions continue to exist
                        o Place appropriate safeguards, on condition that enforceable rights and
                            effective legal remedies for individuals exist
                        o BCRs now explicitly mentioned, alongside SCCs, codes of conduct,
                            certification mechanisms, other DPA-approved contracts
                        o Consistency mechanism for DPAs
                   Security: appropriate technical and organization measure to protect personal
                    data
                        o Report data breaches to DPA w/in 72 hr, report high risk breaches to DS
                   Enforcement and risk of noncompliance way up
                        o Individuals have right to compensation, may compel a DPA to act on a
                            complaint
                        o Rights can be exercised by consumer bodies on behalf of individuals
                        o Potential for severe sanctions, especially for violations of basic
                            principles (consent), DS rights, lawful international data transfers,
                            obligations under MS laws, and orders by DPAs
o   LEDP (2008)
         Protection of PD in police and judicial cooperation in criminal matters
         3 main objectives:
                 (1) better cooperation between law enforcement authorities, improving
                     cooperation on the fight against terrorism and other serious crime in Europe,
                 (2) better protection of citizens’ data, using principles of necessity,
                     proportionality, and legality with appropriate safeguards and supervision by
                     independent national DPAs with judicial remedies available, and
                 (3) clear rules for international data flows to ensure protection for EU
                     individuals not undermined
o   ePrivacy Directive (2002)
                                           8
   Replaced the 1997 Directive to reflect process of convergence, emerging Internet
   EU telecommunication laws widened to include all electronic communications
   Need for consistent and equal protection regardless of technologies used
   Reforms intended to encourage greater industry competition, consumer choice and
    protections, stronger consumer right to privacy
   Applies to “the processing of PD in connection with the provision of publicly available
    electronic communication services in public communication networks” in the EU
         Private network like company intranet generally not covered (thought principles
            of Directive still apply if PD is processed)
   Key Provisions:
         Technical and organizational measure to safeguard security of their services;
            service provider under greater obligation to inform subscriber of data breach
         MS required to ensure confidentiality of comms and traffic data generated
                 o Exceptions: user consent to interception and surveillance, or such
                     authorized by law
         Most forms of digital marketing require prior (opt-in) consent
                 o Limited exception for existing customers for similar products and
                     services, opt-out provision instead
         Processing of traffic and billing info restricted
         Location data may only be processed if anonymized or with consent and for
            necessary duration
         Subscribers must be informed before being placed in any directory
   Balance data privacy rights with free movement of data, MS should avoid imposing too
    many technical requirements that would impede free movement
   Amendments
         Mandatory notification for personal data breaches by service providers to DPAs
            and relevant individual where breach is likely to adversely affect the personal
            data or privacy of a subscriber or individual
         Individuals and ISPs can bring actions against unsolicited communications
            (spam)
         Cookies: only allowed on the condition that the user concerned has given their
            consent, having been provided with clear and comprehensive information, in
            accordance with the Directive
                 o Exceptions: technical storage or access is for the sole purpose of
                     carrying out the transmission of a communication over an electronic
                     communications network, or it is strictly necessary for the provision of
                     an information society service explicitly requested by the subscriber or
                     user
   Means by which consent must be obtained not specified: unambiguous consent may be
    inferred from certain actions when the actions lead to an unmistakable conclusion that
    consent is given provided consent meets standard of being freely given, specific, and
    informed (implied consent)
   Reform of ePD
         ePrivacy Regulation being discussed to replace ePD, harmonize framework and
            ensure consistency with GDPR
         Key features:
                 o Wider application (all providers of electronic communication services)
                                   9
                                   o   Single set of Rules
                                   o   Confidentiality of E-Comms (access of content disallowed without
                                       consent of user, exception to safeguard public interest)
                                  o Consent to process comm content and metadata: anonymized or
                                       deleted if users do not give consent, except for billing purposes
                                  o New business opportunities: enable telecoms operators to have more
                                       opportunities to use data and provide additional services
                                  o Cookies: currently an overload of consent requests, streamline process
                                            Allow users to be more in control of settings
                                            No consent needed for non-privacy intrusive cookies improving
                                                Internet experience (e.g. remembering shopping cart history)
                                            Cookies set by website on number of visitors no longer req
                                                consent
                                  o Protection Against Spam: bans unsolicited electronic comms by any
                                       means, register on do-not-call list, marketing calls will have to ID
                                       themselves
                                  o Enforcement: responsibility of national DPAs
                           Breach consequences: mirrors GDPR
                           Proposal to introduce “legitimate interests” as another justification for
                              processing data
           o   Data Retention Directive (2006)
                   Designed to ensure availability of traffic and location data for serious crime and
                      antiterrorism purposes
                   2014: CJEU ruled Directive invalid on grounds that it was disproportionate in scope and
                      incompatible with rights to privacy and DP under EU Charter of Fundamental Rights
           o   Impact on Member States
                   Consistency and timely implementation a problem with Directives
                           Allowed MS freedom to determine precisely the conditions under which
                              processing of PD lawful
                           Used different mechanisms in different MS
                           Controllers in multiple MS had to comply with conflicting obligations such as
                              notifications, international data transfers, and direct marketing reqs
                           MS have time limit as to when they can implement a Directive
                                  o Commission enforces and ensure implemented properly, and can take
                                       action if implementation contravenes EU law
                                  o If MS doesn’t implement in time, action taken against it
                           Direct effect = individuals can immediately rely upon it to bring actions against
                              governments in national courts
                           MS and their courts must interpret their laws in light of ht etext and purpose of
                              the Directive, even if not yet implemented
                   Direct Effect of Regulation
                           National Dp acts will cease to be relevant for all matters falling within scope of
                              GDPR
                           Regulations directly applicable in member states, do not require further
                              implementation, applies immediately throughout EU as of May 25, 2018
                                                     10
   Data Protection Concepts
       o Developments in technology have changed the way businesses operate and require protections
            for personal data now
                 New definition of personal data to include online identifiers
       o Personal Data (broad, applies even when link with person is tenuous)
                 Four building blocks: (1) any information (2) relating to (3) an identified or identifiable
                    (4) natural person
                 Any information
                          Look at nature, content, and form
                          Statements about a person, both objective and subjective
                          Does not need to be true to be personal data
                          Information about individual’s private life and information regarding any activity
                             undertaken by the individual; also online identifiers (create profile)
                          Information available in any form: processed by automated means, but also
                             manual means if part of a filing system (intended to be technology neutral)
                 Relating to
                          About an individual
                          Could relate to objects, processes, or events: driven by purpose of processing
                             (e.g. information about a car in order to process a person’s bill)
                          Content (information about an individual), purpose (processed to evaluate,
                             consider, or analyze a person), result (processing has an impact on individual’s
                             rights and interests)
                 Identified or Identifiable
                          Not that someone is identified but that it is possible to do so by combining data
                             with other pieces of information (even if other information not retained by data
                             controller (jigsaw identification)
                          Hypothetical identification not enough, it should be reasonably likely
                             (considering costs, available tech, and tech developments)
                          E.g. CCTV: purpose is to identify individuals
                          Dynamic IP addresses may be linked with the help of ISPs, so they are PD
                          GDPR does not apply to anonymous information; pseudonymization provides
                             middle ground but does not remove organization from GDPR
                                 o Measure to ensure PD not attributable to individuals is good security
                                 o Safeguards help with data minimization
                          Aggregation for statistical purposes results in nonpersonal data, but context
                             may allow identification of sample size not large enough
                 Natural Person
                          Regardless of country of residence; does not apply to deceased people or
                             organizational data
       o Sensitive Personal Data (special categories)
                 Information where processing could create significant risks to individuals’ fundamental
                    rights and freedoms
                 Categories: race, ethnicity, political opinion, religion, trade union membership, genetic
                    or biometric data (to uniquely ID natural person), health data, sexual orientation, sex life
                          Health= past, present, or future health status, physical or mental health
                                 o Registration for or provision of health services, information derived
                                      from testing or examination of the body or bodily substance
                                                    11
        Processing of photographs (may reveal race, ethnicity, physical disability=health)
o   Controllers and Processors
        Controller: determines purpose and means of processing data, key decision maker
                 Responsibility to ensure processing has legitimate basis, DS rights are honored,
                    and determine whether notifying DPAs or DS is necessary when there’s a breach
                 Likely to be first target of enforcement by DPAs, not Ps
                 ID’ing the C helps determine which DPA has authority over processing activity
                 May be a natural person, but generally the organization or company rather than
                    a particular person appointed by the controller
                         o If processing takes place outside scope and control of C, individual can
                            become controller
                 Jointly: if same set of data/processing means and purposes determined by two
                    separate controllers, may be jointly (same set of information can be processed
                    separately by different controllers and not make it join processing)
                         o Parent companies may become joint controllers with subsidiaries
                         o Determine respective responsibilities for GDPR compliance at the outset
                            so that joint controllership doesn’t evolve over time; clearly allocate
                            responsibilities for possible data breach
                         o Joint controllers must make essence of relationship available to DS; DS
                            rights may be exercised against each of the Cs
                 Cs determine purposes and means of processing: factual elements or
                    circumstances likely to become decisive (Ps can become Cs)
                         o Why and how of processing: why is processing happening and what is
                            the role of parties involved in processing
                                  Ps have some discretion in carrying out the how without
                                      becoming Cs: “means” is not just the technical way of
                                      processing but also which data is processed, which 3rd parties
                                      have access, which data is deleted, how long it is kept, etc
                                  Ps can determine technical and organizational tings like what
                                      type of software to use for processing
                                  Essential elements of processing are with C
                 3 sources of control: explicit legal competence, implicit competence, factual
                    influence
        Processor: may only process data based on documented instructions from the Controller
                 Natural or legal person, public authority, agency, or other body which processes
                    personal data on behalf of the controller
                 GDPR P reqs: security, record-keeping, notifying Cs of data breaches, and
                    ensuring compliance with restrictions on international data transfers
                         o Obligations relating to purpose like lawful ground and respecting DS
                            rights only imposed on Cs
                 Ps must only process data based on C instructions and have a contract or
                    binding legal act regulating the relationship between C and P in writing
                 **New for non-EEA Ps, if processing for EEA-C must still follow GDPR
                 P contract reqs: process data only based on documented instructions from C,
                    including instructions on transfers; ensure authorized access personnel agree to
                    confidentiality; take all means for security of processing; respect conditions for
                                           12
                               sub-processing; assist C with appropriate tech and org security measures; assist
                               C with complying with obligations in Art 32-36
                          Sub-contracting: prior authorization of C (may be general or specific, with
                               opportunity to object to addition or replacement of processors), contract
                               between P and sub-Ps must include mandatory processor provisions, and initial
                               P remains fully liable to C for performance of its sub-Ps
                  Cs and Ps should determine degree of independent judgment P can exercise, monitoring
                     by the C of execution of the service, visibility/image portrayed by C to individual, and
                     expertise of parties
        o Processing
                  Any operation or set of operations performed on personal data or sets of data, whether
                     or not by automated means, such as collection, recording, etc
                  Difficult to ID times when use of PD is not processing, broad definition
                  Conditions: (1) processing must be wholly or partially carried out by automated means,
                     or (2) if not automated means, must concern PD that forms part of filing system
                     (structured set of PD that is accessible according to specific criteria
        o Data Subject: identified or identifiable natural person, related to personal data
                  GDPR does not extend to legal entities or apply to dead people
   Territorial and Material Scope of the GDPR
        o Territorial scope
                  EU-established organizations
                          If EU-established, doesn’t matter where the processing takes place
                          Establishment: effective and real exercise of activity through stable
                               arrangements (Weltimmo)
                                   o Broad concept of establishment: website directed at people in a
                                       country, using their language, representative available, PO Box = this is
                                       enough!
                                   o Nationality of DS irrelevant
                                   o “An organization may be established where it exercises ‘through stable
                                       arrangements in the territory of that member state, a real and effective
                                       activity even a minimal one.’”
                          “In the context of the activities”
                                   o GDPR will apply regardless of whether processing takes place in Union
                                       or not
                                   o Google v. Spain: sufficient connection between activities of Google
                                       Spain and Google, Inc.- inextricably linked because of profits
                                   o Any organization with EU sales offices that promote or sell advertising
                                       or marketing, or target individuals in the EU, will fall within scope (also
                                       overseas companies with EU offices)
                                   o Not explicitly used to determine which member state laws should apply:
                                       if exemptions or derogations differ between member states, law of
                                       member state to which C is subject should apply
                                   o ***Data processors with EU establishment fall under GDPR as well,
                                       even if C, DS and processing takes place outside EU!! Crazy broad
                  Long-arm, orgs that sell goods or services to, or monitor behaviors of, EU individuals
                          DS must be in EU, but EU residency is not necessarily a pre-req
                          Targeting EU DS
                                                     13
                        o    Ascertain whether C or P envisages offering services to DS in EU (if
                             inadvertently sells something to EU individual, not necessarily under
                             GDPR)
                       o Relevant factors: (1) use of EU language, (2) display of prices in EU
                             currency, (3) ability to place orders in EU languages, and (4) reference to
                             EU users or customers
                       o Intention to target EU customers may be shown by “patent” evidence
                             (e.g., money to a search engine to facilitate access within EU member
                             states) and other factors such as international nature of activity (tourist
                             activities), mentions of telephone number with country code, use of
                             country domain name (.de, .fr, .uk, .eu), itineraries originating in a
                             Member State, and mentions of international clientele including
                             customers in Member States
                   Monitoring behavior
                       o Behavior must occur within EU
                       o Tracking of individuals online to create profiles, analyzing or predicting
                             personal preferences (cookies)
                   Public International law
                       o Processing in a place where public law allows Member State jurisdiction
                             (e.g. embassies and consulates of EU Member States, airplanes, ships)
o   Material Scope
        Matters outside GDPR (everything else is in)
                 Public Security, Defense, National security, Common foreign and security policy
                   of the EU
                 Household exemption: purely personal or household activity, not connected to
                   professional or business activities (e.g. social networking and online activities)
                       o Cs and Ps providing means of processing household activities still within
                           scope
                       o Lindqvist: exemption doesn’t apply to processing a publication on the
                           Internet so that the data was made accessible to an indefinite number
                           of people
                                WP29= publication of information to world at large rather than
                                   small group of friends may be a factor in the applicability of the
                                   exemption
                 Prevention, detection, and prosecution of criminal penalties (police powers)
                       o Law Enforcement Data Protection Directive covers PD in these cases
                       o LEDP applies to “competent authorities”: public authority competent for
                           prevention, investigation, detection, or prosecution of criminal offenses,
                           OR any other body or entity entrusted by MS law to exercise public
                           authority for the above purposes
                       o If data processed for different purposes, competent authority may be
                           subject to both GDPR and LEDP
                       o Data transferred to another body that is not a competent authority will
                           be subject to GDPR
                 EU Institutions
        ePrivacy Directive
                                           14
                           GDPR shall not impose additional obligations on persons already subject to
                            ePrivacy Directive if the Directive already addresses an area
                         Consent for direct marketing under ePD may be stricter under GDPR now
                         Commission wants to achieve full coherence between GDPR and ePD
                E-Commerce Directive
                         GDPR is without prejudice to rules in ECD, particularly with regards to
                            intermediary service providers
                         However, ECD states that issues related to the processing of PD are excluded
                            from its scope and solely governed by relevant data protection legislation
   Data Processing Principles
       o Stem from Convention 108 and Data Protection Directive
       o Lawfulness, fairness, and transparency
                Lawfulness: legal grounds for processing the data
                         Consent
                         Contract performance with data subject
                         Legal obligation (in the EU/Member State)
                         Vital interests (life or death)
                         Public interest (exercising official authority)
                         Legitimate interest: necessary for the legitimate interest of the controller or
                            third party, and interests are not overridden by interests or fundamental rights
                            and freedoms of data subject (balance!)
                Fairness
                         DS must be aware data is being processed, how data will be collected and used
                         In certain cases, processing automatically permitted by law and deemed fair
                         Look at how processing affects DS: if negative impact and impact is not justified,
                            processing will be considered unfair
                                 o E.g. when travel sites raise prices of places you’ve looked at several
                                    times based on cookies, processing is unfair
                                 o E.g. when police officer sees someone he pulled over for speeding
                                    already has multiple speeding tickets and increases the fine, that is fair
                Transparency
                         C must be open and clear with DS about processing (how and why, source)
                                 o This is why req to notify DPA eliminated: did not help DS at all
                         Exemption for duty to inform when data collected directly from DS and DS is
                            already aware of relevant information
                         Exemption when C obtains data from another source AND: providing
                            information will be impossible or require disproportionate effort, to protect DS
                            legitimate interest, and to preserve confidentiality of information
                         Requires information to be conveyed in a timely manner (see notification
                            chapter)
                         Info must be clear, concise, and easy to understand, and provided in accessible
                            manner
                                 o Take into account following circumstances: type of data, manner in
                                    which it is collected, and whether info directly or indirectly collected
                                 o Consider whether DS is a child (simple and plain language req), whether
                                    technical jargon will be involved, try to use plain language; use short
                                    and ad-hoc privacy notices with links to longer texts
                                                   15
                   Use of standardized icons contemplated
o   Purpose limitation
         Only process data to accomplish specified, explicit, and legitimate purposes, do not
             process beyond such purposes unless further processing compatible for original purpose
             data was collected. To determine compatibility, consider:
                   Link between purposes of processing
                   Context in which PD collected, reasonable expectations of DS
                   Nature of PD (special categories?)
                   Consequences of further processing to DS
                   Existence of appropriate safeguards
         First identify particular purpose for processing PD
         If further processing compatible with original use, original legal basis may be used; if
             incompatible, a separate legal basis is necessary and C must give notice to DS
o   Data minimization
         Data must be relevant, necessary, and adequate to accomplish the purpose for which it
             is processed
         Necessity: suitable and reasonable for purposes of processing
                   Of a nature necessary to attain the purpose
                   Adequate if the nature or amount of PD is proportionate in relation to purposes
                   Determining whether purpose can be achieved by anonymizing data could help
                     with necessity evaluation (stripped of all unique identifiers)
         Proportionality
                   Consider amount of data collected: large amount of data without any
                     restrictions will be disproportionate
                   Consider potentially adverse impact of the means of processing and verify
                     whether any alternatives exist
                   Applies to big data projects as well
o   Accuracy
         Cs must take reasonable measures to ensure data is accurate and kept up to date
         Implement processes to prevent inaccuracies during data collection process and
             ongoing data processing
         Cs must evaluate how reliable a source is from which they collect information
         When data collected for statistical or historical purposes, C only needs to maintain PD as
             it was originally collected
         Accuracy may require keeping records of errors corrected
         Cs must respond to DS who requests information be corrected
o   Storage limitation (time): data not kept for longer than necessary for purposes PD is being
    processed
         PD may be stored for longer if anonymized or processed solely for archiving purposes in
             the public interest, scientific or historic research purposes, or statistical purposes
                   Cs may only keep PD for unlimited time when data irreversibly anonymized, or
                     other reasons above
         Time limits should be established for erasure or periodic review
         Cs review personal records of employees when relationship comes to an end, determine
             what must be kept for legal purposes
         When law is silent, internal data retention policies must be set to meet this principle
o   Integrity and Confidentiality
                                          16
                   Protection against unauthorized or unlawful processing, and against accidental loss,
                    destruction, or damage using appropriate technical and organizational measures
                 Use pseudonymization and encryption of data
                 Assign sufficient resources to develop and implement an information security policy
                    framework
                 Use legal and technical data security experts and set aside a dedicated budget
       o Also, accountability, added in GDPR!
   Lawful Processing Criteria
       o Processing must be done lawfully, fairly, and in a transparent manner
       o Baseline: processing unlawful! C must demonstrate legal basis for processing or show exception
            (journalism or research where free speech interest may prevail)
       o Processing normal personal data
                 Consent (to specific purposes)
                         Must be freely given, specific, informed, and unambiguous
                                 o Freely-given=genuine choice, with ability to refuse or withdraw
                                           Not freely given if bundled with other issue (e.g. purchasing a
                                               service)
                                           Request for consent must be presented in manner clearly
                                               distinguishable from other matters
                                           If performance of contract conditioned on processing consent,
                                               and processing not necessary for performance of contract,
                                               consent will not be valid
                                           Consent should not be relied on when clear imbalance between
                                               DS and C (employer-employee relationship, valid consent only
                                               possible if employee has real possibility to withhold without
                                               suffering prejudice: employers should not rely on consent)
                                           Freedom to revoke: therefore, Cs should consider whether
                                               consent is the best condition for long-term processing
                                 o Specific=related to particular processing operation
                                           C should clearly explain proposed use of data to DS
                                           If multiple purposes, consent should be given for all of them
                                                     If processing activity changes, new consent may need to
                                                        be obtained
                                           For scientific research, if not possible to fully ID purposes, DS
                                               can give consent to certain areas of scientific research
                                 o Informed=DS given all necessary details of processing activity in
                                      language and form they can understand, know how processing will
                                      affect them
                                           DS should at least be aware of ID of controller and purposes of
                                               processing
                                 o Unambiguous=DS statement or affirmative act must leave no doubt as
                                      to their intention to give consent
                                           Cannot have consent tick box pre-selected, require DS to
                                               actively tick a selection box
                                           Silence or pre-ticked boxes do not constitute consent
                         If consent pre-formulated, must be in an intelligible and easily accessible form
                             using clear and plain language and with no unfair terms, in line with consumer
                             protection requirements
                                                   17
            Sometimes consent is required, so employers could rely on consent plus
             another legitimate processing condition to create buy-in
         If valid consent obtained, ongoing interactions with DS may provide continued
             consent
         Timing: consent must be obtained before C processes PD
         Cs must demonstrate that DS has given consent to processing operation, keep
             record of consents given by particular DS
         Consent not the same as giving opportunity to opt out, requires express
             indication of wishes and some sort of affirmative action
         Consent obtained through duress or coercion is not valid
                 o Certain types of vulnerable people may not be able to give consent
                      (minors-require consent by holder of personal responsibility over the
                      child)
                            Where parental consent required, C must make reasonable
                               efforts to verify consent given by parent or guardian
                            Minimum age of consent rule only in the context of (1)
                               information society services offered directly to a child, and (2)
                               where the C relies solely on consent or cannot rely on another
                               criterion
                            **Cs should consider another criterion to process child’s PD
   Necessity
         Close and substantial connection between processing and purposes (merely
             convenient does not count)
         Not sufficient for C to consider processing necessary for its purposes, must be
             an objective test whether processing strictly necessary for stated purpose
   Performance of Contract where DS is party
         When DS purchases product or service from C
         Processing of PD must be unavoidable to complete contract
   Necessary for Compliance with Legal Obligation to which C is Subject
         Required to comply with law, like tax or social security obligations in the EU
         Subject to additional MS laws
   To Protect Vital Interests of DS or another Natural Person
         Life or death situations, only relevant in rare emergency situations when DS
             cannot give consent (unconscious), provision of urgent medical care
         Only applies with another processing basis does not exist
   Necessary for Performance of Task Carried out in the Public Interest, or Exercise of
    Official Authority Vested in Controller
         MS or EU legislation will determine which tasks are carried out in public interest
         DS have right to object to use of their data
                 o If C receives objections, C must demonstrate it has compelling
                      legitimate grounds to process data, sufficient to override interests,
                      rights, and freedoms of data subject, or for the establishment, exercise,
                      or defense of legal claims
         Subject to additional MS laws
   Necessary for Legitimate Interests Pursued by C or Third Party
         Except where interests overridden by interests or fundamental rights and
             freedoms of DS (in particular where DS is a child)
                                    18
                   **Balancing test
                   Public authorities cannot rely on legitimate interest ground, legislators must
                    provide legal basis for public authorities to process personal data
                 Requirements to rely on this basis: (1) necessary for the purpose, (2) purpose
                    must be a legitimate interest of C or 3rd party, and (2) legitimate interest cannot
                    be overridden by DS interests or fundamental rights and freedoms
                 Consider reasonable expectations of DS
                 Legitimate interests can exist where there is a relevant and appropriate
                    relationship between DS and C, like where DS is client or in service of C
                 Processing PD to prevent fraud constitutes legitimate interest
                 Direct marketing, internal admin purposes, may be legitimate interests
                 Processing strictly proportionate and necessary to ensure network and info sec
                 This basis may be understood differently by DPAs across EU (e.g. ICO= establish
                    legitimacy of interest pursued, then show processing is not unwarranted in any
                    particular case through prejudice to individual concerned)
                         o Even if there is prejudice that relates to one particular individual due to
                             unique circumstances, does not necessarily prejudice entire processing
                 Using this criterion, DS have right to object to use of their data: when there’s a
                    justified objection from DS, C must cease processing data
o   Processing sensitive personal data
         Photographs should not systematically be considered sensitive data, since only count as
            biometric data when processed by specific technical means that allows unique ID or
            authentication of individual
         Use of these data categories can, by their nature, pose a threat to privacy
         Personal data that is particularly sensitive in relation to fundamental rights and
            freedoms merits specific protection since the context could create significant risks
         Influenced by anti-discrimination laws (explains by SSN and credit card numbers not
            included)
         In some jurisdictions, Cs must obtain permission from DPAs before processing at all
         Cs must meet conditions under both articles 6 and 9 to process sensitive data; ensure
            proper and full notification to Ds about how data used in accordance with Art 12-14
         Starting point= processing prohibited unless exception can be found
         EXCEPTIONS
                 Consent (unless EU or MS law says prohibition on processing cannot be lifted by
                    DS: then another criterion must be used)
                         o Unambiguous, freely given, specific, informed, and explicit
                                  May be explicit on paper or in electronic form with digital
                                      signatures, clicking on icons, or confirmation email
                                  Consent must explicitly set forth purpose of processing (actually
                                      refer to categories of data that will be processed)
                                  Consent in writing and/or a permanent record may be required
                         o Statement or clear affirmative action required
                 Necessary for Purposes of Carrying Out Obligations and Exercising Specific
                    Rights of the C or DS in field of Employment and Social Security and Social
                    Protection Law
                         o Necessary for C to comply with legal obligation under employment, soc
                             sec, or soc protection law
                                            19
        o Relevant to DS candidates, employees, and contractors
        o Necessity test, extent of criterion depends on local employment law
   Necessary to protect Vital Interests
        o Where DS physically or legally incapable of giving consent
        o Expected to attempt to seek consent before relying on this
   Carried out in course of legitimate activities with appropriate safeguards by a
    foundation, associate, or other non-profit body with Political, Philosophical,
    Religious, or Trade Union Aim
        o And on condition that the processing relates solely to members or
            former members, or to persons who have regular contact with the org
            in connection with its purposes, and that the PD is not disclosed outside
            the body without consent of DS
        o Churches, political parties, etc
        o Processing must only take place (1) in the course of legitimate activities,
            (2) with appropriate safeguards, and (3) in connection with specific
            purposes
   Personal Data Manifestly Made Public by DS
        o Media interviews, potentially social networking platforms
   Necessary for Establishment, Exercise, or Defense of Legal Claims, or when
    Courts acting in Judicial Capacity
        o Requires C to establish necessity: close and substantial connection
            between processing and purposes
        o All such processing still subject to DP principles set out under Art 5
   Substantial Public Interest
        o On the basis of EU or MS law which shall be proportionate to aim
            pursued, respect the essence of the right to data protection and provide
            for suitable and specific measures to safeguard fundamental rights and
            interests of DS
        o MS can law down laws, but processing must be (1) proportionate to aim
            pursued and (2) show respect for essence of right to data protection
        o Public Interest defined by some MS (not defined by GDPR)
                  Not required to notify derogations to EC as under Directive
        o UK has further criteria for processing in public interest: processing must
            be necessary for purposes of preventing or detecting any unlawful act
            or to discharge any function designed to protect the public against
            dishonest, seriously improper conduct, or mismanagement in the
            administration of any organization or association
   Necessary for purposes of Preventive or Occupational Medicine, for Assessment
    of Working Capacity of Employee, Medical Diagnosis, Provision of Healthcare, or
    Pursuant to contract with Health Professional, and subject to conditions and
    additional safeguards
        o Medical or social care purpose
        o Processing may be carried out on basis of either EU or MS law, or under
            contract with health professional
        o Exception mainly applies to doctors, nurses, or others involved in
            healthcare professions
                           20
                                            Exception does not mean these people are except from rest of
                                             GDPR
                                o Also allows for things like drug testing employees to ensure fit to work
                         Necessary for reasons of Public Interest in areas of Public Health
                                o Such as protection against serious cross-border threats to health, or
                                    ensuring high standards of quality and safety of health care and of
                                    medicinal products or medical devices
                                o Public health: all elements related to health, namely health status,
                                    including morbidity and disability, the determinants having an effect on
                                    that health status, health care needs, resources allocated to health care,
                                    the provision of, and universal access to health care as well as
                                    healthcare expenditure and financing, and the causes of morality
                                o Such processing should not result in PD being processed for other
                                    reasons by third parties (e.g. employers, insurance or banking
                                    companies)
                                o Allows for supervision of drugs and medial devices to ensure quality and
                                    safety
                         Necessary for archiving purposes in public interest, scientific or historical
                            research, or statistical purposes
                                o To rely on this criterion, necessary that processing must have
                                    appropriate safeguards and must be necessary for one of the purposes
                                    base don EU or MS law, which must be proportionate, respect the
                                    essence of the right to DP, and provide for suitable safeguards
                                o **Anonymization reflects best practices
                                o Pharmaceutical companies and academic institutions should explore
                                    parameters of this exception
        o Data on Offenses, Criminal Convictions, and Offenses and Security Measures
                Warrants greater level of protection
                May only be processed under control of an official authority or when the processing is
                   authorized by EU or MS aw providing for appropriate safeguards for rights and freedoms
                   of DS
                Private sector controller will need to examine rules under EU or local law around
                   processing data
                **NOT considered category of sensitive data under Art 9
        o Processing that does not require Identification
                If C doesn’t need to ID DS when processing data, C not obliged to maintain, acquire, or
                   process additional information in order to identify DS for the sole purpose of complying
                   with GDPR
                C doesn’t need to comply with obligations regarding certain rights of DS unless DS
                   provides additional information to allow their identification
   Information Provision Obligations
        o Transparency
                Data must be transferred “lawfully, fairly,” and in a transparent manner
                Make clear to data subjects their personal data being processed, make aware of their
                   rights and the risks, rules and safeguards related to processing
                DS informed of existence of processing and its purpose
                If basis of processing is consent, must be informed (transparency!)
                DS must be aware of ID of controller
                                                   21
            Inaccurate or incomplete information will not meet transparency standard
            Legitimate interest basis for processing: can a DS reasonably expect at the time and in
             the context of the collection of PD that processing for this purpose might take place
         General DPA notification requirement removed!!
o   DS right to receive certain info from Cs regardless of from where info collected
o   Article 13: provision of information to DS when info collected directly
         Following information required to provide:
                  ID and contact details of C
                  Contact details of DPO (if applicable)
                  Purposes and legal basis for processing
                  If using legitimate interest, what is the legitimate interest purusued
                  Recipients or categories of recipients of data
                  Whether C intends to transfer to 3rd country or IO, and whether EC adequacy
                     decision exists, and if not, what suitable safeguards are in place for the transfer
         Art 13(2): to ensue fair and transparent processing, also provide following data (only
             needs to be provided when necessary to ensure PD processed fairly: might be always)
                  Period PD will be stored, or criteria used to determine that period
                  DS rights in relation to data: (1) rt to request access, rectification or erasure, (2)
                     rt to request restriction of processing, (3) object to processing, (4) rt to data
                     portability
                          o NB not unconditional rights, not in all circumstances, exceptions exist
                  If processing based on consent, rt to withdraw consent
                  Rt to lodge a complaint with supervisory authority
                  Whether provision of PD is a statutory or contractual req, or req necessary to
                     enter a contract
                  Whether DS is obliged to provide PD and the consequences if they don’t
                  Existence of automated decision-making aka profiling
o   Art 14: info to provide DS when info received indirectly
         Everything with Article 13, plus categories of personal data concerned and the source of
             the data
                  No req to inform DS whether provision is based on statutory or contractual req,
                     or to explain whether DS obliged to provide info and consequences of not doing
                     so
         Provide info unless an exemption applies
o   Additional Information to Provide
         Art 15: DS right to request info
                  Right to require C to restrict processing
                  Right to object to processing on basis of C legitimate interests, necessity to carry
                     out processing for public interest, or direct marketing
                  Right to object to profiling
         International Data Transfers
                  On basis of legitimate interest: informed of transfer and what the interest is
                  On basis of consent: possible risks of transfer and appropriate safeguards
                  On basis of BCR: info in BCR, DS rights of processing, and liability arrangements
         New Purpose of Processing
                  DS must be informed of reason for processing beyond original reason
         Multiple Controllers
                                            22
                   Essence of arrangement should be “made available” to DS (different from
                    “provide”)
        Personal Data Breaches: sometimes must provide info
o   When to provide information
        Information obtained directly from DS: provide info at time PD obtained
        Obtained indirectly: within a reasonably amount of time after obtaining (within 1
           month), if used for comms then at the time of the first comm with DS, and if disclosed to
           another recipient at latest when PD first disclosed
        If new processing takes place, DS must be informed before new processing
        DS right to object must be provided at least at the time of the first comm with the DS
        Info on right to withdraw consent must be given before consent is given
o   How to provide information
        Concise, transparent, intelligible, and easily accessible form
                Consider audience (different for children)
                Same form as info given (e.g. electronically, on website, by email, etc)
        Clear and plain language
        Fair processing info may be given orally if requested, as long as ID of DS proven by other
           means
        Free of charge
        Visualization/standard icons may be used
        Requests for consent
                Presented in manner clearly distinguishable from other matters
                Intelligible and easily accessible form
                Clear and plain language
        Right to object to processing must be brought to attention of DS clearly and separately
           from other info
o   Exemptions on obligation to provide information
        New purpose of processing: no need to inform if
                DS already has this info
                If obtaining or disclosing PD in Member state law to which C is subject and
                    which provides appropriate measures to protect DS’s legitimate interests
                PD must remain confidential subject to an obligation of professional secrecy
                    regulated by EU or Member state law, OR
                Provision of info would be impossible or involve a disproportionate effect, or for
                    archiving purposes, in the public interest, scientific or historical research, or
                    statistical purposes (if conditions and safeguards for processing such info are
                    met OR provision of fair processing info likely to render impossible or seriously
                    impact achievement of objectives of the processing)
        C should take appropriate measures to protect DS rts, freedoms, and legit interests
        Defining “disproportionate effect”: number of data subjects, age of PD, compensatory
           measures applied (appropriate safeguards adopted)
        Notifying well-known individuals about holding data about them is nonsensical
        DS still entitled to request data processing information, even if an exemption to the
           obligation to provide the information applies
        Art 23: exceptions for things related to law enforcement, public interest, and national
           security
                                           23
                    Right of data subjects to be informed of restrictions unless doing so would
                     prejudice the purpose of the restriction
          Member states can create legislation with exemptions for media and art
o   ePrivacy Directive Reqs
          Relevant to use of cookies, etc
          Only consent available: may place cookies, collect info, only with consent
                 Info about the cookie must be given to the user, and the user must consent
                     before the cookie is placed on their device
o   Fair Processing Notices
          Cs must provide information or specifically bring it to the attention of/inform the DS
          Factors in whether to “provide” or “make available” information
                 Level of information already available to DS
                 Element of collection or processing DS would find unexpected or objectionable
                 Whether consequences of (not) supplying their personal data are clear, and
                     what the consequences are
                 Nature of PD collected (special categories??) and type of individuals (vulnerable)
                 Method by which data is collected
                 Right to object must be brought to attention of DS not just provided
          Information must be provided:
                 Clear, concise, and easy to understand in simple, unambiguous and direct
                     language
                 Genuinely informative
                 Accurate and up to date
                 In an appropriate manner
                 Forward looking but realistic (do not need to list every possible use of data in
                     future, but those reasonably foreseeable)
          Commercial benefits to provision of information
                 DS place trust in organization, creates customer loyalty and retention
                 DS likely to provide more and more valuable personal data
                 Risk of complaints and disputes that may arise from using PD will be reduced
          Ways to provide notices:
                 Layered fair processing notices: short initial notice with click-throughs to more
                     complete form, DS knows info available if want it (appropriate form, like toll-
                     free number to call if not online)
                         o 3 recommended layers
                         o Cs should provide key information and details of processing which may
                             be unexpected or objectionable immediately and prominently
                         o First should be ID of C and high-level purpose of processing
                         o Benefits: help DS who can only take in certain amount of data,
                             space/time limitations, longer notices impair readability
                         o Ensure info that must be brought to DS attention not buried
                 Just-in-time notices: provision of information at specific points of processing
                 Privacy dashboards: can allow DS to control how PD being processed
                 Alternative formats: visualization, standardized icons, animations for children
                 Make an un-layered version available as well if DS needs to refer to it
          Diverse technologies (e.g. CCTV, drones)
                                          24
                           Post signs and information sheets where used in a specific area notifying
                            individuals of the use, list place for contact information and longer notice (QR
                            code)
                           Use social media, etc, if to be used at events
                           Make processing information available on operator’s website
                           Ensure drone/cameras are visible and the operate is also clearly visible with
                            signage ID’ing as drone operator
   Data Subjects’ Rights
       o Bolstering rights one main ambition of EC with GDPR
                C should use reasonable efforts to identify DS
                Time frames to honor DS requests set: at least acknowledge receiving request and
                    confirm or clarify what is requested within one month starting with receipt of request
                    (can be extended to 2 more months for cases of specific situations and/or especially
                    complex requests)
                         If organization decides not to proceed, must notify DS and advise to
                             opportunities to lodge complaints
                         Electronically-received requests should be answered electronically, unless DS
                             wants something else
                Transparency is fundamental: DS rights cannot be assured if they are not properly
                    informed about C’s activities
       o Right to Information (about personal data collection and processing)
                C’s ID, reasons and purposes of processing, legal basis, recipients of data, transfer to 3rd
                    countries, other info to ensure fair and transparent processing of the data
                Source of data if indirect
       o Right of Access
                DS has right to obtain confirmation from C whether PD being processed, and if so, also
                    the following information
                         Purposes of processing
                         Categories of PD
                         Recipients (including transfer)
                         Envisaged period for which PD will be stored
                         Right to erasure or rectification
                         Right to lodge a complaint
                         Source of data if indirect
                         Existence of automated decision-making
       o Right to Rectification: rectify inaccurate data
                C must ensure inaccurate or incomplete data is erased, amended, or rectified
       o Right to Erasure (Right to be Forgotten)
                Right to erasure if data no longer needed for original purpose and no new lawful
                    purpose exists, OR lawful basis is consent and consent is withdrawn without additional
                    lawful grounds for processing, OR DS exercises right to object and C has no grounds for
                    overriding, OR data has been processed unlawfully OR erasure necessary for compliance
                    with EU or national member state law
                If C has made data public and third parties are processing, must inform 3rd parties that
                    DS exercised this right (exempt if impossible to comply with or would require
                    disproportionate effort)
                Exemptions, if processing is necessary
                                                   25
                            For exercising right of freedom of expression and information
                            For compliance with legal obligation of EU or Member State law OR for the
                             performance of a task carried out in public interest (public health, archiving,
                             scientific or historical research, or statistical purposes)
                         Establishment of, exercise of, or defense against legal claims
                  Strengthens right to be forgotten in online environment
       o Right to Restrict Processing
                  Right to restrict if accuracy of data contested (restrict until accuracy verified), processing
                    is unlawful (DS may request restriction instead of erasure), C no longer needs data for
                    original purpose, but still req to establish, exercise, or defend legal rights, OR
                    verification of overriding grounds is pending in context of an erasure request
                  How to accomplish this: move data to another processing system, restrict access, make
                    unavailable to users, temporarily remove from website
       o Right to Data Portability
                  Right to obtain data in structured, commonly used, and machine-readable format to
                    transfer to another controller, or ask for it to be transferred directly where technically
                    feasible
                         Right to transmit data to another C without hindrance from current C
       o Right to Object
                  If C using “legitimate interests” as lawful grounds, DS can object to processing
                         After objection, C must demonstrate compelling legitimate grounds for
                             processing-> sufficiently compelling to override the interests, rights, and
                             freedoms of the data subject (e.g., to establish, exercise, or defend against legal
                             claims)
                  Related to processing for scientific and historical research or statistical purposes, DS
                    may only object if processing is not considered necessary for the performance of a task
                    carried out in the public interest
       o Right to not be subject to Automated Decision-Making
                  Only applies if such a decision is based solely on automated processing and produces
                    legal effects concerning the DS or similarly significantly affects them
                  Even if processing falls under this Article, allowed if authorized by law, necessary for
                    preparation or execution of a contract, or done with the DS’ explicit consent, provided C
                    has put in sufficient safeguards
   Security of Personal Data
       o Why is security important
                  (1) state of security often a pre-req to achieving compliance with other DP principles
                  (2) serious cases of insecurity guarantee negative media coverage
                  (3) poor security controls= different features of scale and harm compared to other DP
                    breaches
                         Harms: fraud and identity theft
                  Cybersecurity and data security have the attention of national leaders because of the
                    harm they could cause
                         Tensions between security and right to privacy (national security and law
                             enforcement)
       o Security Principle
                  Article 5(1)(f): Integrity and confidentiality of the data
                         5(2): controllers must be able to demonstrate compliance
                                                     26
          Article 32: appropriate technical and organizational measures
                Cs and Ps req to implement controls to protect against complex technological
                    threats as well as guard against negligent employees
                Does not require absolute security
                        o Regulators cannot assume legal failure from operational failure
                Risk-based approach: Risk assessments
                        o Nature of data to be processed
                        o Reasonably foreseeable threats
                        o State-of-art test
                        o Consideration of cost
                                  Cannot rule out a measure based on cost alone
                        o Industry best practices (e.g. encryption because industry standard, not
                            legal requirement, but failing to implement became issue against best
                            practices)
        Art 32(4): People under control of/working for Cs and Ps
                Confidentiality issues
                All people who have access to PD through work have a duty of confidence
                Insider threat: Cs and Ps should have robust policies alerting employees to their
                    responsibilities handing PD, provide with regular training, and make clear
                    consequences for violating policy
        Art 28: Processors and the relationship between Cs and Ps
                28(3)(h): processors must be able to demonstrate compliance
                28(1): flow-down the security principles from C to P and further to sub-Ps
                Cs only allowed to use Ps who can provide sufficient guarantees of
                    implementation of appropriate technical and organizational measures
                        o Proof before signing contract, audits for assurance
                        o Ps can only act on instructions of Cs, or else risk becoming a C!
                P duty to provide assistance to C in compliance and reduction of risk
                        o E.g. PD breach notifications, effective incident detection and response
        Art 30: Controllers and processors must maintain records of processing activities under
           their responsibility
o   Breach Notification: Controller requirement to notify DPA
        Transparency mechanism, encourages mitigation of loss and damage, helps society
           understand causes of failure, enables development of responses to minimize risk of
           future events and their impact
        Regulators can apply adverse scrutiny (regulatory enforcement proceedings and
           compensation claims)
                If reporting entity engaged in appropriate security measures, no further action
                    taken
        Art 4(12): must be an actual breach of security leading to a negative outcome-> risks of
           security breaches don’t count, though the security principle itself looks to prevent risks
        Art 33: notifying regulator
                Trigger: detection of PD breach (C becomes aware of breach)
                        o Cannot avoid putting measures in place to detect (Art 5(1)(f) reqs for
                            security)
                Breach that will cause risk to rts and freedoms of individuals must provide
                    notice to DPA
                                           27
                        o NOTIFY WIHTOUT UNDUE DELAY: 72-hour limit
                 Incident response plan for C
                 Concept of risk not subject to severity threshold, because concept of rights and
                    freedoms is broad
                 C must document every time data breach occurs, hold records forever,
                    especially if decide doesn’t meet DPA reporting threshold (also record ones that
                    are reported)
                 **Ps must notify Cs of personal data breaches without undue delay
         Art 34: communicating with data subject
                 Breaches that present high risks to rts and freedoms of data subjects must
                    provide data subjects notifications
                        o Severity threshold not present in Art 33
                        o What is a “high” risk? Impact to large number of data subjects, or a
                            particularly large amount of damage to certain individuals
                 Exceptions
                        o Measures taken to render PD unintelligible (e.g., through encryption
                        o C has taken steps to prevent high risks from materializing
                        o Breach disclosure would involve disproportionate effort (e.g., if C
                            unable to ID all individuals affected by breach)
                                   If this is the case, broad public announcement appropriate
                 Regulators can req Cs to engage in these comms
o   Delivering on Security
         Business members must work together across the board to ensure security: connect all
            facets of business with security experts in organization
         Risk-assessment, accountability, and privacy by design
         Factors to consider when designing incident response (among others):
                 Threat and vulnerability assessments
                 Human factors
                 Incident detection and response
         Create data mapping and inventory exercise to pinpoint areas of data capture and data
            entry=> plot flow of data through org until redundancy, when info is deleted or
            destroyed
         Effective management is key: take seriously departures from policy and other incidents
                 Consider consequences of serious security breach: adverse third-party scrutiny
         Insider risk awareness and mitigation
                 Culture of risk awareness, respect for PD to create good security
                 Key components of a good culture for security include:
                        o Understanding people risks (risk assessment and mitigation, training)
                        o Recruitment process: show value of security and confidentiality even
                            with job candidates
                        o Offer letter and contract of employment: embed company’s culture
                        o Acceptance of job offer: recruit should affirm read privacy framework
                        o Induction: new employee induction program with more training
                        o Continuous training
                        o Adequate processes to deal with failure, disciplinary measures
                        o End of employment: return physical components, ensure access rights
                            and privileges terminated
                                          28
           Security paperwork
                 Written policy, rules for security
                 Adequacy of paperwork is one of first things regulators will consider in
                    investigation
                        o Inadequate paperwork can lead to a bad impression, and in the case of
                             security breaches and data loss can give regulators sufficient grounds to
                             find noncompliance
                 Policy-based regulation much easier to control and police, cheaper, quicker,
                    more efficient
                 Data protection by design, DPIAs, and accountability principle all presuppose
                    creation and distribution of records
                 LAYERED APPROACH: top layer contains high-level policy statements, middle-
                    layer has controls implemented to achieve policies, and bottom layer includes
                    operating processes and procedures (the why, what, and how)
         Ensure technology stacks robust: antivirus, antispam, firewalls, data loss prevention, etc
                 Some jurisdictions (Germany) have legal reqs to work with works councils
                    before deploying technologies
                 Fully tested by penetration testers (ethical hackers)
         Physical environment: CCTV, clean desk policies, etc
         Risk management of Ps, suppliers, and vendors
                 Cs must: (1) choose reliable processors, (2) maintain QC and compliance
                    throughout relationship, and (3) frame relationship in contract that contains
                    necessary provisions requiring P to maintain security, act only on C’s
                    instructions, cooperate with C on compliance, and cascade reqs through supply
                    chain
                 Conduct audits and evaluate 3d parties before engaging with them
                 How Cs can shield themselves from Art 28 compliance issues
                        o Checklist of issues to consider in the pre-K DD stage
                        o Risk assessment to understand threats and challenges posed by
                             outsourcing
                        o Contract should contain framework for ongoing assurances (on-site
                             audits, inspections, testing, period assessments of ongoing compliance)
o   Incident Response
         Create incident response plan
         Approval by senior leadership (get buy-in)
         Address anticipatory aspects of the incident and response aspects of incident response
         Include principles for decision-making, list of who will be involved
         Templates for public messaging and comms
         Benchmarking against peers in marketplace
         Analyze what is realistic for the organization and its incident response team
                 Gap analysis, discovery exercise to find out what is being done already, review
                    previous events for past successes and failures
         Incident detection: determine whether org has already been compromised (many
            hackers invade and don’t act for years)
         Ensure proper classification of incidents (if misclassified, may lead to incorrect
            treatment and breach disclosure decisions)
                 Create playbook for handling incidents most likely to occur
                                           29
                   Create plan to handle the fallout, dealing with media, law enforcement, data subjects,
                    insurers, vendors
                         How to handle breach disclosure
                         Develop litigation posture
   Accountability Requirements
       o In General, what is changing
                Accountability means DPAs can check in whenever they want for compliance with 6 DP
                    principles (new in GDPR)!
                Organizations must embed DP issues within their business and operations, promote a
                    culture of data protection within company
                DPAs may publish Privacy Standards for effective DP programs (internal and external
                    policies, DPOs, audits): if follow CNIL Standards, receive privacy seal
       o Responsibility of the Controller
                Technical and organizational measures: take into account nature, scope, context, and
                    purposes of processing, and the risks to rights and freedoms of the individuals
                         The higher-risk the processing (damage to reputation, discrimination, economic
                             or social disadvantages, deprivation of rights and freedoms) the greater the
                             measure to reduce risk required by the C
                Having and implementing policies is the easiest way to prove compliance to DPA (no
                    policy= unlikely to have compliance), but this is not sufficient alone: 3 key areas
                         Internal policies: key matters that should be addressed
                                 o Scope: to whom and types of activities to which it applies
                                 o Policy Statement: commitment to PD protections, descriptions of
                                     purposes for processing and legitimate business purpose
                                 o Employee Responsibilities: what each role is permitted to do with data,
                                     limitations around use, steps to follow, security and access obligations,
                                     transfer of PD prohibited unless legitimate grounds established (steps
                                     employees should take before transferring data), training programs
                                           Information security policies: best practice to base on industry
                                              standards (ISO 27001/2) but not required
                                 o Management Responsibilities: develop protocols to ID and address risks,
                                     responsibilities should be clearly allocated to individual roles
                                 o Reporting Incidents: employees should be expressly required to
                                     immediately report incidents of data breaches (time is of the essence:
                                     72 hours to report to DPA); establish an incident response plan and
                                     team, and test regularly
                                 o Policy Compliance: employees who fail to comply subject to internal
                                     discipline, company and individuals involved could be subject to criminal
                                     and civil penalties, indemnity and liquidated damages for third party
                                     contracts for services
                         Internal Allocation of Responsibilities
                                 o Cs must be able to demonstrate DP management resources to DPAs
                                 o Facilitate supervision by DPAs, allow DS to exercise rights, enable
                                     policies to be regularly updated
                                 o Create a privacy management team or council, appoint DPO
                         Training
                                 o Internal programs to inform employees of legal DP obligations
                                                   30
                          o Create flexible training programs tailored to particular roles
                          o Document and monitor rolling out of training programs
o   Data Protection by Design and Default (integrate safeguards into all processing)
        Privacy by Design
                  Embed DP into design specifications of new systems and technologies
                  Applies to all stages of a project or product, not just planning and execution
                     stages of new developments
                          o Create products with built-in ability to manage and fulfil all GDPR
                              obligations
        Privacy by Default
                  Implement appropriate technical and organizational measure to ensure only PD
                     necessary for each purpose are processed
                  Limit or minimize data collected, greater controls over extent of processing
                  PD must by default only be kept for time necessary to provide product or
                     service
                  Explicit obligation to implement appropriate technical and organizational
                     measures to deliver this requirement
        How to comply: consider state of the art, cost of implementation, nature, scope,
            context, and purposes of processing, as well as risks of varying likelihood and severity
            for rights and freedoms of natural persons
        Types of techniques to comply: minimizing PD processed, pseudonymization, allowing
            DS greater control over their data
        Ensure PD easy to search and find, correct, collage early; set up systems for automated
            deletion of PD; ensure excessive PD not collected initially; ensure PD structured in
            commonly used, machine-readable, and interoperable format
o   Documentation and Cooperation with Regulators
        GDPR: notification and registration requirements abolished!
                  Instead, Cs must keep detailed records of processing operations in writing to be
                     made available to DPAs upon request
        DP records that must be kept (similar to notification reqs)
                  Cs name and contact details, DPOs, purposes of processing, cats of DS and PD,
                     cats of recipients, anticipated transfers, appropriate safeguards, retention
                     periods, security measures
                  Ds must maintain contact details, DPO, name and contact of each C P processes
                     for, cats of processing details of transfers and safeguards, security measures
        Exemption for companies with fewer than 250 employees
                  Exemption does not apply if processing is likely to result in risk to rights and
                     freedoms of DS, is frequent and not occasional, or involves special cats of data;
                     also does not apply to data related to criminal convictions and offenses
o   Data Protection Impact Assessment (DPIA)
        Companies use DPIA to identify and address DP issues that may arise when developing
            new products or services, or undertaking new processing activities
        Required under GDPR when processing activity might pose high risk to rights and
            freedoms of DS; also before proceeding with risky PD processing activities
        When risks identified, take appropriate actions to prevent or at least minimize risks
        ICO considers DPIA a best practices tool
        How to determine whether DPIA is necessary and how to carry out
                                           31
                    Is processing “high risk”?
                          o Systemic and extensive profiling that produces legal effects or
                               significantly affects individuals; special cats of PD on a large scale;
                               systematic monitoring of a publicly accessible area on a large scale (e.g.
                               CCTV and drones)
                 What if processing is high risk and a DPIA is required?
                          o First, seek advice of DPO
                          o DPIA must include at least following: systematic description of
                               envisaged processing activities, purposes, legit interest; assessment of
                               necessity and proportionality in relation to purposes; assessment of
                               risks to rights and freedoms of individuals; measure to address the risks,
                               including safeguards and security measures and mechanisms
                 What if processing still high risk?
                          o No sufficient measure to mitigate the risk, C required to consult with
                               DPA before processing (allow DPAs up to 8 weeks to consider referral)
o   Data Protection Officer
        Formally recognized but not required
        Required when: processing carried out by public authority, core activities are regular
            and systematic monitoring of individuals on a large scale, OR processing special
            categories of personal data on a large scale
                 Core activities: key operations necessary to achieve C’s or P’s goals, DP is
                     inextricable part of C’s or P’s activities
                 Large-scale factors: number of DS concerned, volume of data, range of data
                     items, duration or permanence, geographical extent
                 Regular and systematic monitoring: all forms of Internet-based tracking and
                     profiling
                          o Regular: ongoing or at particular intervals for a particular period,
                               recurring or repeated, constantly or periodically
                          o Systematic: according to a system, pre-arranged, organized or
                               methodical, part of general plane for data collection, carried out as part
                               of strategy
        DPO must be appointed if required by MS law (Germany= at least 9 employed in
            automated processing of PD, or at least 20 people in non-automated processing)
                 France: no requirement but potential advantages for companies with DPOs
        Group-wide appointments allowed: DPO must be easily accessible to each undertaking
        Role of DPO: involved properly and in a timely manner on all issues which relate to
            protection of PD; operate independently (can have other roles that don’t give rise to
            conflict of interest); no limit of tenure
        Must have a direct reporting line to highest management level of company, and access
            to company’s data processing operations
        Sufficient technical knowledge and expertise required, appointed based on experience
            and abilities in field of privacy
        Must be able to: inform and advise company of obligations with GDPR, monitor
            compliance with GDPR and company policies, provide advice on DPIAs, cooperate with
            DPA, and act as point of contact for DPAs
        May be an employee of the company or third-party service processor
                                            32
        o   Other measures: BCRs-> ensures same high level of protection of PD complied with by all
            members of a group with single set of binding and enforceable rules
                 Gold standard because to achieve them, companies must demonstrate privacy
                    compliance framework upon application to DPA; DPA also monitors ongoing compliance
   International Data Transfers (Countries and international organizations)
        o Transfers do not include transit, must include processing outside EEA
                 Technical routing, such as email and web pages, may involve random data movement
                    around the world in transit
                 Electronic access to personal data by travelers who are physically in another place for a
                    short period of time does not count
        o Transfers only under 1 of 3 conditions
                 (1) Adequate level of protection offered by country (as recognized by EU Commission,
                    with periodic reviews of adequacy every 4 years)
                         Country follows rule of law, protects human rights, has legislation protecting
                            data processing (including legislation about transfers) and has effective
                            administrative and judicial remedies for data subjects whose data is transferred
                         Independent supervisory authorities including adequate enforcement powers,
                            AND
                         International commitments third country or IO has entered into in relation to
                            personal data protection are taken into consideration
                         **11 countries and territories currently recognized
                 (2) C or P provides appropriate safeguards with enforceable data subject rights and
                    effective legal remedies, OR
                 (3) Transfer fits within one of the derogations for specific situations
        o EU law applied extra-territorially
                 Large MNCs must apply EU law in all of their processing globally
        o United States
                 Safe Harbor
                         Provided adequacy ruling for orgs to sign onto and self-certify for EU-US
                            transfers
                                 o Parties weren’t performing required annual compliance checks, and FC
                                      did not enforce
                         Snowden revelations showed Safe Harbor ineffective
                                 o Did not want to suspend because of importance of data transfer
                                      between US and EU for international trade as well as law enforcement
                                      and national security: started looking into other mechanisms
                                      (“Rebuilding Trust in the EU-U.S. Data Flow”)
                                 o Schrems I: ECJ invalidated Safe Harbor
                 Privacy Shield
                         4 broad priorities from Commission: (1) transparency, (2) redress, (3)
                            enforcement, (4) access to data by U.S. authorities
                                 o Sticking point for US: national security exception was only to be applied
                                      when strictly necessary and proportional according to EC
                         7 principles: (1) notice, (2) choice, (3) accountability, (4) security, (5) data
                            integrity and purpose limitation, (6) access, and (7) recourse, enforcement, and
                            liability
                         Documentation more detailed than Safe Harbor, higher standards put in place
                                                  33
                        o  Letters of assurances restricting access by U.S. gov’t agencies, checks
                           and balances
                 WP29 Opinion concerns: did not include key DP principles from EU law, no
                   protection for onward data transfers, redress mechanism for individuals too
                   complex, documentation didn’t exclude massive/indiscriminate data collection
                   by US intelligence agencies, new ombudsperson not sufficiently independent or
                   powerful
                 US businesses subject to FTC or DOT can join by filing online registration with
                   DOC (does not cover banks or telecom companies!!)
                       o PS companies take certain steps to demonstrate compliance, including
                           (1) internal compliance assessments, (2) registration with 3rd party
                           arbitration provider, and (3) adopt Privacy Shield notice and publish
                           online
o   Providing adequate safeguards
         Model Clauses
                 C to C or C to P
                 Pre-approved by Commission, put on file with DPA
                       o DPAs can also adopt their own SCCs or approve ad-hoc contracts
                           presented to them by parties for transfers (provides greater flexibility,
                           allows to adopt more realistic contract obligations that they are less
                           likely to breach)
         Codes of conduct and certification: new idea with GDPR
         Binding Corporate Rules: now expressly in GDPR
                 Higher standards, legitimizes all transfers within corporation as adequate
                       o Must be submitted to and approved by DPAs
                       o Cost effective for large MNCs
                 Multinational organizations draw up and follow voluntarily, and national
                   regulators approve in accordance with their own legislations
                 DPAs must approve following the consistency mechanism
                 Full set of BCRs must include the following
                       o Structure and contact details of corporate group and members
                       o Data transfers (categories, type of processing, purposes, type of data
                           subjects affected, ID third country or countries
                       o Legally binding nature
                       o Application of general DP principles (Art 5)
                       o Rights of data subjects and means to exercise those rights
                       o Acceptance by C or P established in territory of a member state of
                           liability for any breaches of BCR by any member concerned not
                           established in EU
                       o How information on BCR provided to data subjects
                       o Tasks of DPO
                       o Complaint procedures
                       o Mechanism to verify compliance with BCR
                       o Mechanisms for reporting and recording changes to the rules
                       o Cooperation mechanism with DPA
                                           34
                               o   Mechanisms for reporting to DPA any legal reqs which a member of the
                                   corporate group is subject in a 3rd country that may have a substantial
                                   adverse effect on the guarantees provided in the BCR
                                o  Appropriate training to personnel having contact with data
                 Derogations
                        Consent: explicit, specific and informed (including informed of possible risks)
                        Contract performance
                                o Transfer may be carried out if necessary for performance of contract
                                     (e.g. purchasing contract)
                                o Contract entered into at individual’s request or in their interests
                                o May apply for employment contracts, but evaluate whether transfer
                                     necessary based on goods and services provided, not exporter’s choice
                                     of organization
                        Public Interest: crime prevention, national security, tax collection
                        Legal Claims
                        Vital interests: life or death situation (usually medical records)
                        Public registers: if information is available, extracts can be transferred
                        Non-repetitive transfers: limited number of data subjects, necessary for
                            purposes of compelling legitimate interests of the C if not overridden by the
                            interests or rights and freedoms of the data subject
                                o +C must also provide suitable safeguards to protect PD
                                o C must inform supervisory authority and data subject of the transfer
                                     and the compelling legitimate interests
   Supervision and Enforcement
       o Related to accountability
       o Self-Regulation
                 Demonstrated compliance with DP principles, appointment of DPO, and heightened
                   focus on codes of conduct and certification= methods of self-regulation
                 Cs have regulatory functions over their Ps, Ps over sub-Ps, creates supervision and
                   enforcement
                        Pre-contractual DD, contract formation, post-contractual requirements
                 Cs expected to ID risks and then sent to address them
                 Demonstrable proof of compliance through testing and similar activities, include testing
                   as part of business activities
                 Notification of PD breaches to DPAs and sometimes to individuals: deterrence is key to
                   enforcement
                        Effective, proportionate, and dissuasive administrative penalties
                 DPIAs when processing likely to result in high risk to rts and freedoms of individuals
                 DPOs: clear supervisory and enforcement position, immune from dismissal, more like
                   quasi-DPA than employee-> duty of cooperation with DPA and extension of regulator
                 Codes of conduct, certificates, and seals: industry associates can create codes and
                   certifications, Cs and Ps must undertake to apply for them and should be monitored for
                   compliance
                        Representative bodies can submit draft codes to DPA for approval
                        ***Consistency mechanism when draft code will affect at least 2 MS
                                                  35
                   Monitoring bodies must prove independence, expertise, and avoid conflicts;
                    have procedures for issuing, reviewing, and revoking seals and marks if
                    applicable, and procedure for handling compliants
                 Cs and Ps can be fined by DPA for breaching reqs of code in serious cases
                 DPAs can revoke monitoring body’s accreditation
o   Regulation by the Citizen
        Citizens have driven must of the non-legislative change in PD laws (see: Google v. Spain
            and right to be forgotten)
        Civil Society Organizations (CSOs) also have power in litigation
        Primary risk of adverse scrutiny from citizens as litigants rather than DPAs
        Data Subject Rights
                 Right to transparency, access to data, rectification, erasure, restriction of
                    processing, data portability, object, informed of serious data breaches
                 **No requirement that DS pursue rights against C before pursuing complaints
                    and remedies before DPAs or courts! In many cases, rights don’t provide direct
                    and obvious route to controller (see: DP principles, like confidentiality)
        Remedies for breach of obligations
                 Take complaints to DPAs or courts, pursue these remedies and with the C at the
                    same time
                 Turning to DPAs for remedies is the low-risk option
                 Individuals can always pursue remedies with home court or DPA, regardless of C
                    or P place of establishment
        Class/Representative Actions
                 GDPR Class Action Right under Article 80
                 Individuals can elect to be repp’ed by not-for-profit orgs (CSO), privacy
                    advocates, or pressure groups: can act on behalf of one or many
                         o MS can give orgs powers independent from mandates of individuals
        Liability and Compensation Claims
                 DS can pursue compensation claims if suffer damage b/c of noncompliance
                 Cs and Ds can claim not being responsible for event that gave rise to damage as
                    defense
                         o If multiple parties at fault, any individual C or P that is responsible for
                             any damages can be held liable for all the damage-> then compensating
                             party can seek indemnity from other Cs and Ps
                 What does damage mean? Financial loss, maybe distress or non-pecuniary harm
                         o “Non-material damage” clearly means distress
        Regulating the Regulators
                 If individual puts complaint before DPA but not dealt with, or if hear nothing for
                    3 months, can take action against DPA before courts to force the issue
                         o This is how Schrems I happened against Irish DPA
                 Primary purpose is to enable appeals against DPA corrective action
                         o Individuals can also use against DPAs they feel failed to take the right
                             type of corrective action, or have been too lenient in sanctioning
o   Administrative Supervision and Enforcement
        DPAs are the only bodies equipped with administrative supervisory and enforcement
            powers (CNIL, ICO, AEPD): all EU countries already have DPAs
                                           36
         MS required to designate independent public authorities to monitor implementation of
          GDPR, act with complete independence, with sufficient skills and resources
        Consultation requirement, give regulators influence over legislative agendas, task and
          empower DPAs to provide advice and guidance to their parliaments and govs on DP
        DPA tasks
               Promote awareness and understanding of DP
               Handle complaints and carry out investigations
               Support consistent application of GDPR internationally, applying consistency
                  mechanism
               Monitor development of information and comms tech and commercial practices
               Receiving and dealing with complaints: citizens has most day-to-day contact
                  with Cs, so in best position to actually affect compliance; citizens need official
                  champion, that is the DPA
               DPIAs: DPAs publish lists of situations where DPIAs should be carried out and
                  where not required; Cs must also consult with DAPs when DPIA indicates activity
                  would result in high risk to rights and freedoms of individuals
               Codes, certificates, seals, and marks: encourage development, provide opinions
                  on draft codes, amendments or extensions (whether comply with GDPR),
                  approve draft code etc if it provides sufficient safeguards, withdraw certficates
                  where reqs no longer met
               Approve SCCs and BCRs: can also create their own SCCs and approve unique
                  contracts for transfers
               Records of infringements and actions taken: GDPR requires this record keeping,
                  already standard practice in many MS
               DPAs cannot charge DS or DPOs for their services, but can charge back admin
                  costs on manifestly unfounded or excessive requests
               Activity Reports: regulation must be conducted transparently to promote
                  confidence in regulatory system and provide society critical insight into trends
                  and developments within regulation
        Regulator’s Powers
               Investigatory Powers: access all necessary evidence, materials, and facilities to
                  enable to deliver on tasks, along with mechanism to start investigations, notify
                  Cs and Ps of alleged breaches
                      o DPAs will be able to obtain access to any relevant docs held by
                           organization under investigation, including 3rd party papers, reports, and
                           audit reports (unless privileged)
                      o DPAs may carry out operational reviews
               Corrective Powers: Enable DPAs to warn Cs and Ps about dubious processing
                  activities, enforce financial penalties, and order Cs and Ps to stop data
                  processing
               Authorization and Advisory Powers: codes, certifications, seals, and marks
        Litigation by Regulators: DPAs must be able to force compliance through courts
        Protecting Cs and Ps from precipitous regulatory action: natural and legal persons
          affected by DPA decisions can take legal proceedings to protect their positions
        Obligation of prof secrecy on DPAs and their staff with confidential info they access
o   Competence and International Cooperation
        Who has authority to impose regulatory supervision and enforcement?
                                           37
   Competence
        DPAs can act of the territory of their own Member State
        DPAs can regulate Cs and Ps established in their territory
        If C or P established in multiple territories, or there is cross-border processing,
           lead authority has competence
               o “Main establishment” of C or P applies: where the decision-making for
                   processing of personal information is done, usually at the central
                   administration (but if decision-making at a different location, main
                   establishment is there)
               o Lead authority req to regulate situations of cross-border processing
                        Entities established in only one MS can still engage in cross-
                            border processing
                        Lead authority is the sole interlocutor of that cross-border
                            processing
               o Non-lead authorities can take action in cross-border situations where
                   the complaint (1) relates only to their territory or (2) if it substantially
                   affects individuals only in their territory
                        DPA asserting competence needs to notify lead authority (may
                            trigger battle of competence)
                                  If lead authority rejects assertion of competence of
                                     other DPA and takes up matter itself, procedure in Art
                                     60 must be followed
                                  If lead authority accepts other DPA’s assertion of
                                     competence, 2ndary DPA can proceed subject to rules
                                     about mutual assistance and joint operations
               o Disputes and challenges about competences most likely following a
                   complaint by an individual: may make complaint to DPA in MS of their
                   habitual residence, place of work, or where alleged infringement took
                   place
   Cooperation
        Lead authority rule only applies to cross-border processing: if comes into play,
           cooperation procedures of Article 60 apply
               o Usually starts with request for mutual assistance and joint operations,
                   but may also start by non-lead DPA asserting competence
        Lead DPA supplies draft decision to other concerned DPAs
               o Could trigger comments, a reasoned objection, or simple agreement
               o If reasoned objection, lead authority can accept or reject objection
                        If accepted, issues revised draft decision, which other DPAs can
                            accept or make further reasoned objections
                                  If further reasoned objections, cycle continues until
                                     impasse broken (can be done with referral to EDPB)
                        If rejected, lead authority must follow consistency mechanism
               o If no objections, lead authority and other DPA in agreement and draft
                   decision is binding
                        If draft decision accepted, lead authority shall adopt it and
                            notify C or P at main establishment, the other concerned DPAs,
                            and the EDPB
                                    38
                            If trigger of complaint from individual to non-lead DPA, the
                             relevant DPA should notify complainant of outcome
                         Burden shifts to C or P to deliver compliance, including
                             reporting back to lead authority on how that is achieved
                 o **Article 60 has timetable for these key events
        Mutual Assistance: mandates cooperation and exchange of information
                 o DPAs must put in place appropriate measures to provide assistance
                    without undue delay (one-month long stop)
                 o DPA must comply with requests except when they lack competence to
                    provide assistance or need to avoid illegality
                 o If receiving DPA doesn’t provide assistance within one month,
                    requesting DPA can adopt a provisional measure which triggers urgency
                    procedure
        Joint Operations: designed to ensure all concerned DPAs properly represented
            in supervisory and enforcement work
                 o When Cs and Ps established in multiple territories, or processing affects
                    significant number of individuals in multiple territories, all concerned
                    DPAs have the right to participate in joint operation
                 o Obligation rests on competent authority to invite other DPAs to
                    participate
   Consistency Mechanism
        EDPB: successor to WP29
        Opinions of the EDPB
                 o EDPB must issue opinions on the lists of circumstances when DPIAs are
                    required, on the adoption of proposed codes that affect multiple MS,
                    the criteria for accreditation of monitoring and certifying bodies, SCCs
                    approved by DPA, and BCR authorizations
                         Opinions provided after DPAs do their initial work
                         Any DPA, EDPB chairperson, or the EC can request opinions on
                             matters of general application or producing effects on multiple
                             MS
        Dispute Resolution by EDPB
                 o Key part of consistency mechanism, triggered whenever lead authority
                    rejects reasoned objections to draft decision concerning cross-border
                    processing, whenever there is a dispute between DPAs about who is
                    competent for a main establishment, or DPA fails to refer its decisions
                    (above) to EDPB
                 o Outcome= adoption of binding decision
                         When related to draft decision dispute, lead authority or other
                             DPA is required to adopt final decision on basis of binding
                             decision
        Urgency Procedure
                 o Exceptional circumstances where DPA should take urgent action to
                    protect rights and freedoms of individuals
                         If urgency great enough, may not be enough time to pursue
                             cooperation or consistency mechanism
                                   39
                                   DPA may immediately adopt provisional measures, subject to
                                    three-month lifespan, and have to be referred by DPA with
                                    reasons to other DPAs that have a concern in the matter, to the
                                    EDPB, and to the Commission
                                         End of 3 months, provisional measures lapse unless DPA
                                           thinks final measure need to be urgently adopted, in
                                           which case it can request urgent opinion or urgent
                                           binding decision from EDPB
o   Sanctions and Penalties
        Administrative fines based on nature of contravention and status of entity fined (non-
            undertakings: public authorities, organizations not engaged in econ activity; versus
            undertakings: companies)
                 Level 1
                       o Contraventions: children consent, data protection by design and
                            default, engagement of Ps by Cs, records of processing, cooperation
                            with regulators, security, breach notification, DPIAs, DOPs, codes and
                            certifications
                       o Up to 10M € or 2% of total worldwide annual turnover in preceding year
                 Level 2
                       o Contraventions: data protection principles, lawfulness of processing,
                            consent, processing special categories of data, DS rights, international
                            transfers, failure to comply with DPAs’ investigatory and corrective
                            powers
                       o Up to 20M € or 4% of total worldwide annual turnover in preceding year
        Factors to consider before imposing fines
                 Effective, proportionate, and dissuasive
                 Serious breaches of GDPR can be met with multiple responses
                 Total amount of fine cannot exceed amount specified for most serious breach
                 Article 83(2) factors:
                       o Nature, gravity, and duration of infringement, nature, scope, or purpose
                            of processing concerned, number of DS affected, level of damage
                       o Intentional or negligent character of infringement
                       o Actions taken to mitigate DS damage
                       o Degree of responsibility, taking into consideration technical and
                            organizational measures
                       o Previous infringements
                       o Degree of cooperation with DPA
                       o Categories of PD affected
                       o Whether DPA notified of infringement
                       o Compliance with measures previously ordered against Cs and Ps
                       o Adherence to approved codes of conduct
                       o Any other aggravating or mitigating factors
        Undertaking: an entity engaged in commercial activity (companies)
                 Public authorities and unincorporated associates are non-undertakings
                 MS can take public authorities completely out of fining regimes
                 Undertaking is a single entity, does not discuss groups of undertakings
                                          40
                                    o   ***Company part of group of companies can only be fined up to
                                        percentage of individual company turnover, not group’s turnover
            o   Law Enforcement Data Protection Directive: mirror supervision and enforcement regime, except
                with absence of lead authority concept (and related cooperation and consistency mechanisms)
                and financial penalties
Section III: Compliance with European Data Protection Law and Regulation
     Employment Relationships
              o Tricky area because intersection of data privacy and employment law
                      Consult with jurisdictional employment law and works councils
                      Member State rules for employee’s PD include measure to safeguard DS human dignity,
                        legit interests, and fundamental rights with regards to transparency of processing and
                        transfer, as well as monitoring and controlling
                      Employees must have right to access their personal data
              o Legal Bases for Processing Employee Personal Data
                      Consent
                              Must be freely given, hard to say in employment circumstances because uneven
                                 power
                                     o Not a good basis for employers to rely on
                                               Sometimes local law stipulates consent cannot be given in this
                                                 circumstance
                                               Consent should not be relied on unless withdrawal of consent
                                                 would not be problematic for lawfulness of processing or
                                                 detrimental to employee’s employment
                              Freely given, specific, informed, and unambiguous
                              Able to withdraw consent without suffering any detriment
                              Some EU countries require consent, and in writing
                      Fulfilment of employment contract
                              For example, to pay employee (name and bank details)
                      Necessary to comply with (EU) legal obligation (e.g., taxes)
                      Employer’s legitimate interests
                              For example, when employer changes structural systems to migrate employee
                                 data from old payroll system to a new one, this is processing on a legit interest
                              Public authorities cannot rely on this ground at all
              o Sensitive Employee Data
                      If processing this data, employer should be within an Art 9 exception
                              Includes consent, but should be employer’s last resort
                      In some jurisdictions, extent to which sensitive employee data can be processed
                        depends on accompanying employment or labor laws
                              E.g., in Portugal, must get authorization from DPA
                      May be necessary to establish, exercise, or defend legal claims (e.g., claim for unlawful
                        dismissal, discrimination)
              o Providing notice for processing
                      Employers must provide notice on processing of data, purposes, who to contact, and
                        what the DS rights are
                      May be done with employee handbook or specific notification document
                      Employees must be notified whenever a new purpose arises
                                                       41
           Notice must provide, in detail, legal basis, what the legit interests are (if used),
            recipients of data, where data will be transferred, and how long it will be retained
o   Storage of personnel records
         Should not be retained longer than necessary, though throughout employment is
            normal, probably protected under a legit reason
         Post-employment, may need records for compliance with company law, employment
            law, health & safety law, tax law, and social security law, etc
         Should be securely archived
o   Workplace monitoring and of data loss prevention
         Rights of employees balanced against legitimate company rights to operate
         Background checks
                 Must be conducted to avoid hiring unscrupulous persons
                 Employees must be sure not to compile blacklists during background checks
                    (generally illegal) or compile lists of individuals it will not employ
         Data Loss Prevention
                 DLP tools use third parties to operate, involves processing employee data but
                    main purpose is preventing loss of data
         Employee Monitoring
                 Must comply with local employment laws as well as data protection laws
                 Ensure compliance with following principles: necessity, legitimacy (lawful
                    grounds), proportionality, and transparency
                 Ensure data held securely and only accessed by those with legitimate reason to
                    view it
         Necessity
                 Consider other less-intrusive measures for its purpose first
                 Must carry out DPIA when monitoring likely to result in high risk to rights and
                    freedoms of individuals
                         o DPIA required if monitoring is systemic and extensive evaluation of
                             personal aspects of individuals based on automatic processing, and on
                             which decisions are based that produce legal effects or similarly
                             significantly affect the individuals
         Legitimacy
                 Must have a lawful basis for monitoring
                 Legitimate interest balancing test: legitimate interest of employer versus
                    infringement on rights and freedoms of individual
                 Consent for monitoring very limited in its usefulness
                 Monitoring that involves collection of sensitive personal data likely problematic
                 EU has strict laws on what is considered legitimate employee monitoring,
                    consider collective agreements and consult works councils
                         o Agreements between works council and employers may list what
                             monitoring is permitted
                 Screening of emails to prevent viruses and monitoring time online not working
                    are legitimate employer activities
                         o Cannot screen content of what employees are doing
                         o Find less intrusive alternatives: block certain websites, prevention of
                             viruses over detection
         Proportionality
                                          42
                  Determine whether proposed monitoring proportionate to employer’s concern
                  Reasoned and realistic response to a potential or known threat
                       o Data minimization: personal data must be adequate, relevant, and
                           limited to what is necessary regarding the purpose of processing
                       o Actually opening emails is disproportionate
                If collective agreements approve monitoring, proportionality likely struck
        Transparency
                Employers must provide sufficient information about monitoring activity
                Setting expectations helps ensure monitoring is lawful: if employees have not
                   been told about monitoring, may have expectation of greater level of privacy
                Law acknowledges that employees enjoy a certain degree of privacy at work
                Acceptable Use Policy for communications equipment, including how much
                   private use of employer equipment is permissible: employees have right to
                   limited private use of employer equipment
                Private communications should not be opened or monitored
                Sometimes covert monitoring is necessary: sometimes it is not permitted or
                   limited use permitted and police should be involved
        Information to be Provided by Employers
                Company email/Internet policy
                Reasons and purpose for surveillance being carried out
                Details of surveillance measures taken
                Enforcement procedures
                Whether use of webmail accounts permitted at work
                Arrangements in place to access contents of workers’ emails
                Storage period for backup copies of messages
                Info on when emails deleted from servers
                Involvement of workers’ reps in formulating policies
                Conditions on which private use of Internet is permitted
                Systems implemented to prevent misuse of Internet and access to certain sites
                Info about involvement of employer’s representatives in creating and
                   implementing policies
                Notify employees when misuse is detected; may also need to notify works
                   councils
        Rights of Accused Employee: don’t accuse right away, misclicks common
        Unlawful monitoring
                Hard to justify monitoring that collects sensitive PD or is particularly intrusive
                Covert monitoring unlawful w/o prior permission from DPA or an exception
                Emails marked as private generally shouldn’t be read
o   Works Councils
        Obligation to safeguard employees’ rights
        Country-specific: UK only has trade unions which don’t get a say on how employers use
           PD, whereas Germany and France have strong works councils
                E.g. German WCs can object to use of employee monitoring devices
        Employers engage with WCs by (1) notifying WC, (2) Consulting with WC, or (3) seeking
           approval of WC
                If WC rejects a decision, employers’ only option may be to challenge in local
                   courts
                                          43
                  Sometimes DPA may not approve processing unless and until WC has been involved
        o    Whistle-Blowing Schemes
                  SOX: US companies with EU subsidiaries bound by SOX
                          Company required to facilitate ability of employees to make allegations about
                             wrongdoing (can conflict with EU data laws)
                          Point of law is to make companies more responsible and accountable, especially
                             with regards to internal controls
                          Companies encourage those with information of potential or actual fraud to
                             come forward and provide confidential reports
                                  o May use independent 3rd party agencies for whistle-blowers to contact
                          Concern: subject of a complaint cannot confront the person making the
                             allegation, and anonymity could lead to abuse of function
                  Issues for GDPR Compliance
                          DPIA should be conducted for whistle-blowing scheme
                          Liaison with WCs before implementing method
                          3rd party processor contracts outside EU must comply with EU processing laws
                          Mechanisms for data transfer outside EEA must comply with laws
                          Consent from employees may be required
                          Whistle-blowing policy and procedure should be transparent to employees
                  Whistle-blowing policy should cover specific elements:
                          Individuals reporting (limit who can report based on who has direct knowledge)
                          Individuals incriminated (only those known to the person reporting)
                          Confidentiality over anonymity of reporting (knowing reporter’s ID will result in
                             more accurate and thorough investigation)
                          Scope of reports (limit scope of reportable matters to those affecting company’s
                             governance)
                          Data retention: strict policy following completion of investigation, and delete
                             any reports found to be unsubstantiated
                          Information provision: meet GDPR requirements for transparency and notice
                          Rights of incriminated persons: DP rights may be limited if affects investigation
                          Transfers outside EEA: state mechanism used to legitimize transfers
        o Bring Your Own Device Policy
                  Employer remains responsible as a controller for any personal data processed on
                     employee’s device for work-related purposes using work email settings
                  Companies should establish a policy for personal devices used for work
                  Consider how to manage personal data held on the device once the employee leaves
                     the company, or the device is lost or stolen
   Surveillance Activities
        o Need to balance need for surveillance in the national security interest, and individual’s right to
             privacy
                  Internet means more and more info about private citizens available for surveillance
                  Are societies becoming surveillance societies?
        o Technology: new tech to make our lives safer, but also generates more data
                  Now, surveillance activities undertaken on a daily basis, by both public and private
                     sectors, for a host of lawful purposes
                  CCTV and GSP part of surveillance
                                                  44
o   If surveillance results in invasion of privacy, check whether invasion is necessary, lawful, fair, and
    proportionate
o   Regulating Surveillance
          Public and state agencies or private entities may carry out surveillance (national
             security, law enforcement, private purposes like employment law)
          Individual rights may be restricted if the restriction respects the essence of the
             fundamental rights and freedoms, and is a necessary and proportionate measure in a
             democratic society
                   National and public security, prevention and detection of crime, and protection
                      of DS and rights and freedoms are reasons for restriction to be applied
          LEDP Directive applies to law enforcement activities
                   Although processing of personal data must be lawful, fair, and transparent, this
                      should not prevent law enforcement authorities from carrying out activities
                      such as covert investigations or video surveillance
                   Activities can be carried out as long as they are laid down by law and constitute
                      a necessary and proportionate measure in a democratic society with due regard
                      for the legitimate interests of the natural person concerned
                   Private sector entities may be under an obligation to retain and/or share PD
                      with law enforcement agencies
o   Communications Data
          Modern surveillance usually occurs by electronic means, generating comms content and
             metadata
                   Metadata= data about data, information generated and processed as a
                      consequence of a communication’s transmission
                           o Traffic data: type, format, time, duration, origin, destination, routing,
                               protocol used, and originating and terminating networks of a
                               communication
                           o Location data: lat, long, altitude of user’s equipment, network cell
                           o Subscriber data: name, contact details, payment information
                   Metadata can provide complete picture of communication and can be used to
                      ID individual (therefore, falls under GDPR)
          Difficulty balancing competing legal interests: duration limitation of GDPR versus
             telecom law requiring providers to maintain call data longer than necessary for
             processing
                   In this case, CJEU ruled in 2014 Directive was invalid for disproportionately
                      infringing on privacy rights
o   Video Surveillance (CCTV)
          Contains images of individuals that may be used to identify an individual: this is
             considered processing!
          Any time an individual’s image is captured, it is considered biometric data
                   Article 9 Special Categories of Data exemption must apply
                           o C may be able to rely on MS law to conduct surveillance in the public
                               interest for a public area, or in the exercise of public authoirty
          Cs likely have to rely on legitimate interest balancing test for lawful basis, unlikely to get
             consent
                   CCTV’s use must not override rights and freedoms of individuals
                                             45
          DPIA required if: surveillance considered high risk, involves systematic monitoring of
           publicly accessible area on a large scale, or if video surveillance included in list by
           relevant DPA
        DPIA will need to describe: processing to be carried out, purposes of processing,
           legitimate interests pursued, assessment of why surveillance is necessary and
           proportionate, assessment of the risks to the rights and freedoms of impacted DS, and
           measures required to address those risks
                 If DPIA indicates high risks cannot be sufficiently mitigated, C must consult with
                    DPA prior to use of video surveillance
                         o When public interest is the lawful basis, MS may make DPA consultation
                            mandatory
        Proportionate and adequate, relevant, and not excessive solution to problem it
           addresses, using CCTV should only happen if other less-intrusive solutions that do not
           require image acquisition have been considered and found to ne inapplicable or
           inadequate for the purpose
                 Proportionality also extends to choice of system and technology (e.g. facial
                    recognition and zoom technology)
                 Proportionality also means determining whether aspects of CCTV used and
                    processing of footage are proportionate to purpose CCTV system used for
                         o Operational and monitoring arrangements: key operational aspects
                            (types of cameras, positioning of cameras), see if monitoring of specific
                            spaces can be minimized; use of particular features (zoom, freeze)
                         o Retention of CCTV footage: only retain for as long as strictly necessary
                         o Need to disclose to third parties, such as law enforcement
                         o Whether CCTV footage will be combined with other info to ID
                            individuals
                         o Surveillance of areas with high expectation of privacy (changing rooms,
                            bathrooms): only allowed in most exceptional circumstances with need
                            to deal with very serious concerns, make individuals aware they are
                            under surveillance
        Other measures: staff training, disciplinary and legal sanctions for misuse, CCTV policy
           (written document addressing important privacy issues), regular reviews to ensure
           compliance and reconsider whether use of CCTV remains justified
        DS rights and CCTV
                 Transparency requirements still apply, especially when cameras cover large
                    public space
                         o Information should be visible and placed within reasonable distance of
                            monitored area
                         o Identify purpose of surveillance and C with contact details
                 Subject to Art 15 right of access by DS: CCTV retained for short periods of time,
                    so it may be more difficult to use this right
                         o If footage contains images of others, measures should be taken to
                            safeguard their privacy like blurring images
o   Biometric Data
        Personal data resulting from specific technical processing relating to the physical,
           physiological or behavioral characteristics of a natural person, which allow or confirm
           the unique identification of that natural person
                                           46
                         E.g. DNA, fingerprints, palms, vein patterns, odor, voice, face, handwriting, gait
                May be in its raw form or biometric template form: template must include sufficient
                   detail to allow an individual to be ID’ed from population of individuals stored in
                   biometric system
                Main uses of systems: identification and authentication
                To fall under Art 9 special category, purpose for processing biometric data must be to
                   uniquely ID a natural person
        o Location Data
                Location-based services, rely on technical ability to localize a portable device
                Derived from satellite network-generated data (GPS), cell-based mobile data (Cell ID),
                   chip-card generated data (payment cards)
                3 broad categories of location data Google uses to deliver its services: implicit location
                   information (using search query etc); Internet traffic info (IP address, allows for
                   application of correct language); Device-based location services (turn-by-turn
                   navigation)
                Location data is an identifier, as it may identify or lead to the identification of an
                   individual: considered personal data under this definition
                         Even if users switch off location services on their device or for an app,
                            vulnerabilities in a mobile app can be exploited to access location
                         App developers need to decide whether apps using location result in high risks
                            to rights and freedoms of individuals, in which case a DPIA is necessary
                         Location history may be used to make inferences about individual, such as
                            homes of friends, religion, health status, political affiliation, etc
                         Concerns about retention and access by public authorities or employers
                                 o If employer using to track fleet of vehicles not tied to individuals, not
                                     personal data: if data used for any purpose related to employee, then
                                     falls under GDPR
   Direct Marketing
        o In General
                DM: any form of sales promotion, including DMs from charities and pol orgs for
                   fundraising-purposes
                         Does not need to offer something for sale, could be a free promotion or just
                            promoting the organization generally
                         Directed to particular individuals (DP laws apply when individuals’ PD is
                            processed to communicate marketing message to them)
                Most DM subject to DP laws as well as consumer protection laws and advertising laws,
                   which vary between MS
                         Applicable law may be where sender or recipient is located, or both
                Often includes data collected through consumer’s device: cookies, location data
                Push-messages and in-app messages are DM!
                Untargeted marketing (website banners) and purely service-related messages (inform
                   about status of an order) are not DM
                ePrivacy Directive will apply when marketing sent by electronic comm networks: does
                   not apply to postal marketing
                Cs must satisfy all GDPR requirements: lawful basis for processing (usually consent or
                   legitimate interests), provision of fair processing information (transparency),
                                                   47
            appropriate technical and organizational measures to protect data, no transfer outside
            EEA
         DS must have specific right to refuse or opt out of DM sent by C; if based on consent,
            can be withdrawn at any time; if based on legit interests, opt-out required still
                 DS must be informed of right to opt out, presented clearly and separately from
                    other information
                 DS must be able to opt out across all marketing channels
                 Cs must honor opt out requests in a timely fashion, at no cost to DS
                 PD must be deleted unless retention strictly required
                         o Exceptions: necessary for establishment, exercise, or defense of legal
                             claims, compelling legitimate grounds for continued processing
                             outweighing privacy interests of DS
                 Profiling data must be removed without an exemption on which to rely
                 If individuals request to opt out, Cs should suppress rather than delete contact
                    details: prevents re-acquiring details later and resuming DM
                         o C should retain record of DS who should not be sent marketing comms
                 National Opt-Out Lists (“Robinson List”)
                         o MS may require Cs to cleanse DM list against Robinson Lists as well as
                             internal opt-out records before sending marketing materials: failure to
                             do so not a data breach, just violation of national laws
                         o Later opt-in consent overrides Robinson List
         ePrivacy Directive
                 Imposes consent and information reqs on marketing by phone, fax, email, SMS,
                    instant messages, push notifications, and other electronic messages
                 Requires prior opt-in consent of recipient
                         o Exemptions for email marketing on opt-out basis where C obtained DS
                             info through sale of product or service
                 Addresses location-based marketing and OBA cookies
                 Sometimes enforced by telecoms regulator instead of DPA
o   By Post (ePrivacy Directive does not apply)
         Even though not electronic, still ensure following GDPR/DP principles (lawful processing,
            transparency, opt-out requests, other DS rights)
         Consent Requirements
                 No direct req in GDPR, but some national rules require for postal DM: if not req,
                    usually rely on legitimate interests with balancing exercise
                 Balancing factors: existing customer of C, nature of product and services, has DS
                    been previously told it would not receive postal DMs
                 If legitimate interest basis not available, consent required
         In some MS, must cleanse Dm list against national opt-out register, unless valid opt-in
            consent from DS
o   By Phone (ePrivacy Directive applies)
         Consent Requirements
                 No express requirement to obtain consent, except for automated calling
                    systems (always req opt-in consent)
                         o Automated systems may still be used to dial numbers to facilitate
                             person-to-person conversations
                 MS laws can determine whether allowed on opt-in or opt-out basis
                                          48
                         o     DS must be able to opt-out for free
                         o     Most MS have national opt-out registers for telemarketing
                         o     Some MS require telemarketers to mention national opt-out register in
                               each call and offer individual right to register with it immediately at no
                               charge
         DP conditions don’t always apply, laws generally vary from State to State
         Only one-size-fits-all approach is getting consent across the board
         Automated calling systems: some MS req ID and contact details of caller
         Some MS have more relaxed approach to B2B telemarketing
                 GDPR still applies, especially when processing employees’ PD for B2B DM
                 ePrivacy Directive applies equally to B2B and B2C telemarketing
o   By Email/SMS (ePrivacy Directive applies)
         Must satisfy general GDPR reqs, such as transparency and lawful processing
         Electronic mail: any text, voice, sound, or image message sent over a public comms
            network which can be stored in the network or in the recipients’ terminal equipment
            until it is collected by the recipient (technology-neutral definition)
         C must obtain prior opt-in consent and provide a fair processing notice when data will
            be collected
                 Limited opt-out exception when DS contact details obtained in context of sale of
                      a product or service
                           o Some MS require sale to have been made, whereas others allow during
                               contact generally (no sale made)
                 For exemption, C must only send DM to individuals about C’s own similar
                      products or services than the ones purchased, AND
                           o Details cannot be shared with third parties
                           o Cannot market products or services differently from the one connected
                               with DS
                 C must have clearly and distinctly given individuals opportunity to opt out of
                      marketing by email in a simple and free manner at the time data initially
                      collected, and in each marketing comm
                           o Usually done through tick box when collecting data
         Must send DS with valid address to request opt-out, via appropriate medium by which
            marketing communication was sent
                 C must not conceal or disguise ID of sender, ensure message is clearly
                      identifiable as commercial comm, ensure any promo offers are clearly
                      identifiable and conditions for them easily accessible and unambiguous, and
                      that promo games or competitions clearly identifiable and conditions for
                      participation easily accessible and presented clearly/unambiguously
o   By Fax (ePrivacy Directive applies)
         GDPR, including transparency and lawful processing requirements apply
         Consent requirement: must obtain prior opt-in consent before sending fax
         Present with fair processing notice when data is collected
         Where MS currently permit B2B fax marketing on opt-out basis, Cs may be req by
            national law to cleanse intended fax marketing contacts against opt-out register
o   Location-based (ePrivacy Directive applies)
                                            49
           Location data: any data processed in an electronic communications network or by an
            electronic communications service, indicating the geographic position of the terminal
            equipment of a user of a publicly available electronic communications service
                 Includes lat/long, altitude, direction of travel
                 Only applies to data showing position of terminal equipment, not location of
                    person-> posting location on Facebook doesn’t apply (but GDPR will still apply,
                    just no ePD)
         Either based on smartphone location data (passing by a store) or uploading to social
            networks
         Location-based data is personal data, so GDPR applies: transparency and lawful
            processing requirements apply
         Consent: opt-in required for “value-added service”
                 Exemption: anonymized data, but this is unlikely to apply realistically
         DS must first be informed of: types of location data collected and processed, purposes
            and duration of processing, and whether transmitted to third party
                 Often difficult to provide in friendly-to-use manner, best practice is to include
                    info about using location data for marketing in app’s privacy policy
         C must offer DS ability to withdraw consent to use location for DM, and must be
            available throughout period DS location data being processed
                 Must offer both comprehensive right to opt out and right to temporarily opt out
                    on each connection to network or for each communication
o   Online Behavioral Advertising (OBA) – Cookies! (ePrivacy Directive applies)
         Website advertising that is targeted at individuals based on observation of behavior
            over time, delivers advertising more relevant to individuals’ rights and interests,
            improves ad effectiveness and click-through rate
         Cs may make recommendations to DS based on previous interactions with a website
                 Advertising networks can track behavior over multiple, unaffiliated websites to
                    target advertising on all sites
                 Cookie placed on computer to collect information, record preferences and send
                    back to network
                         o Eventually a profile is assigned to that user (new mother, young
                             professional)
         Question is whether online profile without knowing the actual individual should qualify
            as PD and therefore fall under GDPR
                 Considered “profiling”
                 OBA allows tracking of users of a specific computer, even when dynamic IP
                    addresses are used, so users can be singled out even if real names aren’t known
         Which entity is the data controller?
                 Ad networks often qualify because they have complete control over purpose
                    and means for which website visitors’ info is processed: ad networks rent space
                    from website publishers, set and read cookie-related info, and collect IP
                    addresses and other data
                 Website publisher may be a joint-controller with ad network by engaging ad
                    networks to observe OBA through their websites
                         o Network and publishers should agree contractually who will notify
                             visitors that personal data being used for OBA, and how visitors will be
                             offered ability to refuse
                                           50
                          Advertisers may be independent data controllers: advertiser monitors
                           individual’s subsequent browsing activity and combines it with targeting profile
                           relating to the individual
                        **All parties involved may have compliance requirements
                 ePD applies regardless of whether GDPR is considered to apply
                        Explicit mention of cookies in ePD
                               o Use of cookies only allowed on condition that individual has given
                                    consent, having been provided with clear and comprehensive info (prior
                                    informed consent)
                               o Consent must be specific indication of their wishes, freely given and
                                    revocable: active participation of user required, opt-out passive
                                    mechanisms insufficient
                        Use of browser settings usually insufficient to obtain consent
                               o Potentially if browser setting default is no cookies and user actively
                                    changes it to accept cookies, that could potentially apply
                 Most OBA solutions imply use of third-party cookies: link to third party privacy policy
        o Enforcement
                 Fines and administrative sanctions by DPAs
                 Civil and sometimes criminal liability
                 ePrivacy Directive: judicial remedies, liabilities, and sanctions of the GDPR applied to
                   ePD infractions
                        May be enforced by consumer protection and telecom regulators instead of
                           DPAs
                        New right established for individuals and businesses with legitimate interest in
                           cessation or prohibition of spam to bring private right of action against
                           noncompliant marketers (expectation that ISPs will bring these claims)
   Internet Technology and Communications
        o Cloud Computing
                 The provision of IT over the Internet (software, infrastructure, hosting, platforms)
                 Service models: Infrastructure, Platform, or Software as a Service
                 Service’s structure is shared among supplier’s customers in a number of countries
                 ARTICLE 3 PROBABLY APPLIES: activities of EU establishment of the controller OR
                   offering goods or services to individuals in EU, or monitoring their behavior
                        Weltimmo (1st test): establishment depends on degree of stability of
                           arrangements, and whether there is an effective exercise of activities
                               o Website targeting Hungary, using Hungarian language, with a rep in
                                    Hungary for court proceedings/debt collection, a letter box in Hungary,
                                    and a Hungarian bank account is sufficient for establishment in Hungary
                               o Minimal activities can constitute establishment
                        Google v. Spain : economic link between non-EU data C processing PD and EU-
                           based establishment can mean C activities subject to regulation
                        2nd test: no need to determine whether establishment in EU
                               o ***Ps may get pulled into EU law based on processing: even if P is not
                                    directly subject to laws under these two tests, if customer falls under EU
                                    law, P will have to follow it as well!
                 C v. P: C determines how and why PD is processed, P is acting on instructions of C
                                                   51
                   If P determines some substantial and essential elements of processing, like data
                    retention, they could become a C
                 Relevant as cloud computers look to make use of personal data collected by
                    customers for their own purposes
           Service contracts regulated by GDPR with detailed list of obligations on processor:
                 Include info on subject matter, duration, nature and purpose of processing, with
                    type of personal data and categories of DS
                 PD is only processed on documented instructions, including data transfers
                 Individuals processing data subject to confidentiality obligation
                 More prescriptive security measures
                 Cs given notice of sub-Ps and have right of objection
                 All sub-Ps have same contractual obligations as Ps
                 Measures taken to ensure Cs can meet all their obligations with help of Ps (e.g.
                    notify DS of data breach, conduct DPIA, etc)
                 All PD is deleted or returned once provision of services is complete
                 Monitoring of compliance with contract allowed
                 Cs also seek normal contract provisions, such as indemnification for misuse of
                    PD by P
                 ***ALSO P not responsibly for C’s regulatory obligations
           International Data Transfers
                 Cs must be able to show safeguards for protection of transferred PD: options
                         o Geographic limitations (may defeat cloud’s purpose, increase costs)
                         o Choose Privacy-Shield certified suppliers in US
                         o Use Model Clauses
                                  Difficult to constructor for transfers to multiple parties
                                  Must be updated as process evolves
                                  Are inflexible
                         o Tailored data transfer agreements (must be approved by regulators)
                         o BCRs for Ps (allows Cs to use when info transferred by Ps)
                         o Codes of Conduct and Certification (new with GDPR)
                         o Derogation of Art 49: includes consent
o   Cookies
        Cookie: a small text file that is delivered by a website server onto the computer of
            visitors to its website (device fingerprinting)-> limited on mobile devices and w/apps
        Help to tailor website offerings and maintain security of individuals while logged into
            website, also facility targeted advertising
        Linked to info not personally identifiable (IP addresses, time of a website visit, etc) but
            putting this information together can create an identity profile of browsing habits: this is
            personal data under GDPR because cookies collect PD to develop profile!
                  If link profile to name, email, or address, definitely personal data
        Pseudonymous data includes profiles that can be linked to an individual, even if C does
            not intend to make the link
        Vidal-Hall v. Google: profiles of browsing habits used to create profiles for target ads
                  English Ct of Appeal ruled that profiles were PD and Google’s use of profiles was
                     objectionable because even if Google didn’t know who the individual was,
                     others using the device likely knew and would gain information about individual
                     based on targeted ads
                                            52
           IP addresses now explicitly considered PD in GDPR
           EU law applied to non-EU websites because of 2nd prong of Art 3 test
           ePrivacy Directive applicable as well
                  Storing of info or gaining access to info only allowed if consent given based on
                     clear and comprehensive info (exemption for necessary cookies)
                         o Info about sending and purpose of cookies must be given to user
                         o User must consent before cookie is placed
                         o User must have choice to consent and provide active indication that
                             consent is given
                  Debate on whether consent given through browser settings is sufficient
                         o Sufficient IF: (1) browser default rejects cookies, (2) settings provide
                             clear, comprehensive and fully visible info about use and purpose of
                             cookies, and how to refuse them, (3) users must take positive steps to
                             accept setting of cookies and ongoing retrieval of data from cookies,
                             and (4) it is impossible to bypass choices made by users in their settings
         Websites should provide full and transparent disclosure about their use of cookies
         IP addresses are PD, because ISP can link address to a particular customer
                  Organizations can still build profile of IP user and distinguish based on IP
                     address, and can ask ISPs to ID IP users
                  Breyer v. Germany (dynamic IP addresses)
                         o Both static and dynamic IP addresses can constitute PD in the hands of
                             organizations other than ISPs
o   Search Engines
         Process large amounts of volumes, including User IP addresses, cookies (used to
            personalize and improve services), user log files (what they have previously searched
            for), Third party webpages
         When making profiles, like user log files, and managing 3rd party web pages, Search
            Engines are Cs for the PD
                  3rd party web pages because SEOs, etc
         2 prong of Art 3 generally applies, usually outside EEA but monitoring behavior
              nd
                  Also could be subject as processor when 3rd party pages Cs subject to GDPR
         Google v. Spain: Activities of Google Spain and Google, Inc., were “inextricably linked”
            because of Google Spain’s role of selling ad space necessary to make Google, Inc.’s,
            search engine economically viable
         Further issues
                  Data retention: must comply with proportionality requirement, max 6 months,
                     then delete or irreversibly make anonymous
                  Further processing for different purpose: parameters must be clearly defined
                     and users made aware of the purpose (e.g. if user data correlated across
                     platforms and services, user consent must be obtained)
                         o If Search Engines link data across sources, may be unlawful if individuals
                             do not receive necessary fair processing information when data is
                             collected and provided right to opt out of profiling
                  Compliance with DS rights: registered and unregistered users, correction or
                     deletion of cached personal data (right to be forgotten)
o   Social Networking
         SNS providers= Cs, even if outside EEA (same considerations as Search Engines)
                                            53
          SNSs must ensure 3rd party applications also comply with GDPR
          SNS users may be exempt under “household exception” or exception for use of PD for
           journalistic, artistic, or literary purposes
                 Will not apply if SNS used by organization (users are Cs under GPDR)
                 If user knowingly extends access to personal data beyond selected contacts
                    (also operating as C in this case)
       Information that must be provided by SNS providers
                 Notice that PD will be used for marketing and opt out (if applicable)
                 Notice that PD will be shared with specific third parties
                 Explanation of profiling conducted
                 Info about processing sensitive PD
                         o Explicit consent of DS required to make available on internet
                         o SNS should make clear providing data entirely voluntary
                         o Photos may review sensitive data, but unless purpose is to reveal that
                             data, won’t usually be captured under this area
                 Warnings about risks to privacy
                 Warning about consent of 3rd parties needed when uploading others’ data like
                    photos
       If SNS gathers and aggregates PD of non-users (e.g. user uploading contacts list), and
           then creates profile, this processing is unlawful under GDPR because person who profile
           is created about not in a position to learn about the processing
       CHILDREN
                 Under age 13-16 (country-dependent), consent of parent must be given
                 Legitimate interest grounds for processing may not be available
                 Cs must have regards for best interests of the child
                 Awareness-raising activities and fair and lawful processing
                 Sensitive PD should not be requested, default privacy-friendly settings should be
                    adopted, and minors should not be targeted with direct marketing
o   Mobile Apps
       Apps have accessed to stored mobile data, used to offer innovative services to users,
           can be sent back to app developers and associated with a particular device (including
           location, photos, emails, Internet browsing history, altitude, audio, video, speed, user
           interactions)
                 Special PD can be revealed by location as well (e.g. repeated visits to a church)
       Data collected in apps likely to be considered personal data
       ePrivacy Directive also applies, especially if cookies applied and used
                 Cookies generally only available from within the app setting them
                         o Because of this, advertisers have developed new tracking methods
                         o Whenever new methods used, they also require consent by DS
       App developer likely to be C of data, unless app processes data on phone but does not
           send back to the developer
                 Many other parties likely to be involved as processors as well
                 Third parties may also turn into controllers
       App access to things like contacts and photos requires user consent
       Notice: adequate information difficult within a small space
                 Icons or visual symbols may be better tools
                 Layered notices with links to complete information
                                          54
                  Notice and privacy policy may need to be given before app downloaded
         Consent: ePrivacy Directive requires consent before storing information on a device,
            which includes downloading an app
                  May be required as lawful ground, other grounds may not be available (like
                    legitimate interest for intimate information about location)
                  Consent for data processing that is not essential for provision of app functions
                    generally not valid if user has to give it in order to use the app
                  Consent must be specific, no umbrella consent for any processing by app
         Data minimization: personal data shall be adequate, relevant, and limited to what is
            necessary in relation to purpose for which it is processed
o   Internet of Things
         General things in life connected to internet (Home Nest, Alexa, etc)
         Sensors frequently collect info about identifiable individuals
         C v. P: same considerations as mobile devices
         Security challenging because large number of objects connected to the same network
            (large number of points for malicious entry) and software less likely to be kept up to
            date with security patches
                  Networks should be designed in a secure manner, implement data protection by
                    design when designing things
         Notice and choice
                  How to give individuals fair notices required by GDPR (stickers?)
                  Consent usually most appropriate ground for processing: consent mechanisms
                    may need to be built into devices themselves
55