Participant Guide
Participant Guide
Participant Guide
An IAPP Publication
CIPP®, CIPP/A®, CIPP/C®, CIPP/E®, CIPP/G®, CIPP/US®, CIPM® and CIPT® are registered
trademarks of the International Association of Privacy Professionals, Inc.
© 2023, The International Association of Privacy Professionals, Inc. (IAPP). All rights reserved. No part
of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any
means, mechanical, photocopying, recording or otherwise, without the prior, written permission of the
IAPP. For more information contact copyright@iapp.org.
v 5.3
Welcome!
You probably also know that skilled privacy pros are in high demand. After
all, that is one of the reasons you are here, right?
You have come to the right place. The IAPP is the world’s largest
information privacy organization. We are a non-advocacy, not-for-profit
membership association focused on advancing the privacy profession.
Our globally recognized privacy training is designed to give you the expertise
and know-how you need to get ahead. You will hear from world-class privacy
faculty who are experts working in the field of privacy and data protection
today. They will share their knowledge, insights and real-life experiences to
help you sharpen your skills and work smarter—not to mention, take your
career to a whole new level.
If emerging privacy and data protection issues or events become part of the
exam, the training will be updated accordingly at least one month prior to
the release of exam updates.
Whether you are a seasoned professional or new to the field of privacy and
data protection, this class is an opportunity to learn essential skills, and, if
you decide to aim for an IAPP credential, you will have a head start!
1
European Data Protection
Acknowledgements
2
Thank you to the following IAPP instructors, members and subject matter
experts who provided their guidance and expertise to the development of
this training:
Jeroen Terstegge Phil Lee
CIPP/E, CIPP/US CIPP/E, CIPM, FIP
Country Leader, Netherlands, IAPP; Managing Partner
Partner Privacy, Security and Information
Privacy Management Partners Fieldfisher
2
European Data Protection
Acknowledgements
3
Thank you to the following IAPP instructors, members and subject matter
experts who provided their guidance and expertise to the development of
this training:
Sachin Kothari Aurélie Pols
CIPP/US DPO CDP mParticle
Vice President and Chief Privacy Officer Data Governance & Privacy Engineer
Johnson Controls International Aurélie Pols and Associates
Marta Dunphy-Moriel
CIPP/E
Founder
Dunphy-Moriel Legal Services Ltd
3
European Data Protection
4
Trainer
Introduction
Trainer introduction
4
European Data Protection
5
Chat
Share
How would you describe your industry?
Chat: Share
How would you describe your industry?
5
European Data Protection
6
Chat
Share
How many years have you worked in
privacy?
Chat: Share
How many years have you worked in privacy?
6
European Data Protection
7
• Module 2: Personal data
• Module 3: Controllers and processors
• Module 4: Processing personal data
• Module 5: Data subject rights
Course outcomes
Note
While examples from member state data protection laws may be referenced by your trainer, this training will focus
on the broader EU Regulation.
7
European Data Protection
Learning objectives
8
• Differentiate between the Council of Europe
and the European Union, including member
state composition and legislation related to
Module 1: privacy and data protection
• Describe the history of human rights, privacy,
Data and data protection law in Europe leading up
to the current EU legislative framework
protection • Recognise themes in human rights and data
laws protection law, including right to privacy and
freedom of speech, and the balance between
the two
• Describe the functions of the EU’s legislative,
policy-making and judicial institutions,
specifically as they apply to data protection
law
• Describe the EU data protection law’s
transition from a directive that requires
member state transposition to a regulation
• Differentiate between the Council of Europe and the European Union, including member state composition
and legislation related to privacy and data protection.
• Describe the history of human rights, privacy, and data protection law in Europe leading up to the current EU
legislative framework.
• Recognise themes in human rights and data protection law, including right to privacy and freedom of speech,
and the balance between the two.
• Describe the functions of the EU’s legislative, policy-making and judicial institutions, specifically as they
apply to data protection law.
• Describe the EU data protection law’s transition from a directive that requires member state transposition to
a regulation.
8
European Data Protection
9
Chat
Share
Which type of privacy is most important to
your personal life? Information privacy,
territorial privacy, bodily privacy, or
communication privacy?
Chat: Share
Which type of privacy is most important to your personal life? Information privacy, territorial privacy, bodily
privacy, or communication privacy?
• Information privacy
• Territorial privacy
• Bodily privacy
• Communication privacy
9
European Data Protection
10
Chat
Share
Which type of privacy is most important to
your professional life? Information privacy,
territorial privacy, bodily privacy, or
communication privacy?
Chat: Share
Which type of privacy is most important to your professional life? Information privacy, territorial privacy, bodily
privacy, or communication privacy?
• Information privacy
• Territorial privacy
• Bodily privacy
• Communication privacy
10
European Data Protection
11
European Union Council of Europe
• 27 member states • 46 member states
• Economic and political union • International organisation
• CFREU, TFEU, GDPR, ePrivacy • ECHR, Convention 108
Session notes
The European Union and the Council of Europe
• Separate European institutions
• Own laws and judicial systems
• All EU member states belong to Council of Europe, but not vice versa
• Both share fundamental values of human rights, democracy and the rule of law
European Union
• 27 member states
• On 1 January 2020, the U.K. exited the European Union
• Economic and political union
• Privacy and data protection laws
• Charter of Fundamental Rights of the EU (CFREU)
• Treaty on the Functioning of the EU (TFEU)
• Lisbon Treaty
• General Data Protection Regulation (GDPR)
• ePrivacy Directive
• National data protection laws across Europe
Council of Europe
• 46 member states
• International organisation
• Privacy and data protection laws
• European Convention on Human Rights (ECHR) – a treaty designed to protect human rights, democracy and
the rule of law
• CoE Convention (also called Convention 108)
11
European Data Protection
Comparing European
12
institutions European Free
Trade Association
Session notes
EU member states: Austria, Belgium, Bulgaria, Croatia, Republic of Cyprus, Czech Republic, Denmark, Estonia,
Finland, France, Germany, Greece, Hungary, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands,
Poland, Portugal, Romania, Slovakia, Slovenia, Spain and Sweden
The European Economic Area (EEA) is an economic region that includes the European Union (EU) and Iceland,
Norway and Liechtenstein—which are not official members of the EU but are closely linked by economic
relationship. Non-EU countries in the EEA are required to adopt EU legislation regarding the single market.
• Based on the Agreement of the European Economic Area (1994)
• Allows members of the European Free Trade Association (EFTA) to participate fully in the internal market
Switzerland is not part of the EEA Agreement but does have a bilateral agreement with the EU.
European Free Trade Association (EFTA): Iceland, Liechtenstein, Norway and Switzerland
United Kingdom: The U.K. formally left the European Union on 1 January 2020. The Trade and Cooperation
Agreement signed between the EU and U.K. on 24 December 2020 allowed the transfer of personal data from the EU
to the U.K. to continue for up to six-months. The European Commission has now declared the U.K. adequate under
the GDPR and Law Enforcement Directive (LED).
12
European Data Protection
13
Charter of Fundamental European Convention on
Rights of the EU Human Rights
Article 7: Private life, family life, Article 8: Protects private life, family
home, communications life, home, communications
Session notes
Charter of Fundamental Rights of the EU (CFREU), 2000
• Comprehensive collection of individual rights
• Enshrined fundamental rights which became binding through the Treaty of Lisbon (2007)
• Limitations provided for by law
• Respect the essence of the right
• Genuinely meet the objectives of general interest recognised by the EU or the need to protect the rights and
freedom of others
• Necessary and proportionate
Interpretation of the CFREU may not contravene the ECHR, but may provide for higher level of protection.
European Convention on Human Rights (ECHR), 1950 (entered into force 1953)
• Member state ratification
• Based on the Universal Declaration of Human Rights
• Key document for fundamental rights in Europe (not only the EU)
• In accordance with the law
• Necessary in a democratic society
• Public security and safety
• Economic well-being of country
• Prevention of disorder or crime
• Protection of health or morals
• Protection of rights and freedoms of others
• Article 8 is considered to be one of the Convention’s most open-ended provisions
13
European Data Protection
14
Court of Justice European Court of
of the EU Human Rights
Session notes
Based in Luxembourg, the Court of Justice of the EU is the judicial body of the EU. It makes decisions on issues of
EU law and enforces decisions, either in respect of actions taken by the European Commission against a member
state or by an individual or organisation to enforce their rights under EU law. The Court comprises the European
Court of Justice (ECJ) and the General Court. The Court provides clarification of EU law to national courts to assist
the national courts in upholding EU law. Relevant landmark cases include:
• Bodil Lindqvist v Åklagarkammaren i Jönköping, Nowak v Data Protection Commssioner
• Google Spain v AEPD and Mario Costeja González, Schrems v Data Protection Commissioner, Data Protection
Commission v. Facebook Ireland, Schrems
• Weltimmo s. r. o. v Nemzeti Adatvédelmi és Információszabadság Hatóság Judgment
The European Court of Human Rights (ECHR) in Strasbourg upholds privacy and data protection laws through its
enforcement of the European Convention on Human Rights and Convention 108. It is not part of the European Union.
The ECHR has also considered the question of the protection of personal data from the viewpoint of the right of
access to such data. Relevant landmark cases include:
• Niemietz v Federal Republic of Germany, Halford v United Kingdom, Copland v United Kingdom
• Bărbulescu v Romania
• I v Finland
14
European Data Protection
15
Data protection:
Dawn of a new age
• 1960s
• 1970s
• Developing concerns
Session notes
Data protection: Dawn of a new age
• 1960s
• Economic and technological advancements
• Increasing international trade
• Use of computers and telecommunications
• 1970s
• Conflict between national privacy rights and international free trade
• Development of communication technologies
• Extensive banks of personal data
• New opportunities for international data processing
• Developing concerns
• Government collection and use of data
• Collection of consumer data
15
European Data Protection
16
The privacy conflict
Session notes
The privacy tug of war: right to privacy vs. freedom of speech
• Contradiction between two fundamental human rights
• Increasing relevance in the information age
• Right to withdraw consent
• Right to lodge a complaint
16
European Data Protection
17
The privacy tug of war
Case study
Google Spain v. AEPD and Mario Costeja González
Mr. Costeja sued Google Spain, Google Inc. and La Vanguardia newspaper because personal data about him was
available through a Google search in the newspaper’s online archives. The Court of Justice of the EU ruled that
Google Spain must remove the links to the article.
Note: The issue around a platform's responsibility related to content curation—what is accepted and what is not in
light of globalisation—predates the Costeja case (e.g., LICRA v. Yahoo!).
17
European Data Protection
18
An evolving harmonised approach
1980
OECD Guidelines
Session notes
An evolving harmonised approach
• 1980: OECD Guidelines (Organisation for Economic Co-operation and Development Guidelines on the Protection
of Privacy and Transborder Flows of Personal Data)
• Nonbinding
• Protection of personal data in a global economy
• Principles on collection and use
• 2013 revision
18
European Data Protection
19
An evolving harmonised approach
1980 1981
Session notes
An evolving harmonised approach
• 1981*: Convention 108/CoE Convention (The Council of Europe Convention for the Protection of Individuals with
Regard to the Automatic Processing of Personal Data of 1981)
• Legally binding treaty of member states (also open to nonmembers) of the Council of Europe
• Protection of data subject privacy
• Automatically processed personal data
*In October 2018, Convention 108+, a version of Convention 108 overhauled to align with the GDPR, was signed by 20
states of the Council of Europe, including the UK. Since then, more states have followed. According to the European
Commission, it serves as a means for third countries (those outside the EU) to adopt the basic tenets of the GDPR.
19
European Data Protection
20
An evolving harmonised approach
Session notes
An evolving harmonised approach
• 1995: The EU Data Protection Directive (95/46/EC)
• Legally binding transposition of member states of the EU
20
European Data Protection
21
An evolving harmonised approach
The E-Commerce
Directive
Session notes
An evolving harmonised approach
• 2000:
• Charter of Fundamental Rights of the EU
• The E-Commerce Directive of 2000 (Directive 2000/31/EC)
• Issues related to processing personal data excluded from its scope
21
European Data Protection
22
An evolving harmonised approach
2002
The EU Directive
on Privacy and
Electronic
Communications
Session notes
An evolving harmonised approach
• 2002: The EU Directive on Privacy and Electronic Communications (ePrivacy Directive/Cookie Directive)
• Communications passed over electronic channels
• Particular rules around marketing, cookies, and security breach notifications for internet service providers
(ISPs) and telecommunications companies
• 2009 amendment
22
European Data Protection
23
An evolving harmonised approach
2002 2006
Session notes
An evolving harmonised approach
• 2006: The EU Data Retention Directive (2006/24/EC)
• Requirements of ISP and telecommunication companies to keep metadata about the communications they
carried in case it needed to be accessed for law enforcement purposes
• 2014 Digital Rights Ireland case—validity of the Directive challenged and struck down by the Court of
Justice of the EU
• National data retention laws across the EU
23
European Data Protection
24
An evolving harmonised approach
Session notes
An evolving harmonised approach
• 2007: The Treaty of Lisbon (enforceable in 2009)
• The Charter of Fundamental Rights (made binding law)
• Development of EU data protection law
24
European Data Protection
25
An evolving harmonised approach
Session notes
An evolving harmonised approach
• 2016: The General Data Protection Regulation (GDPR) (became enforceable in 2018)
• EU
• Successor to the Data Protection Directive (Recital 171; Articles 94, 99)
25
European Data Protection
26
EU institutions
Session notes
EU institutions
• EU comprises legislative, policy-making and judicial bodies
• European Council
• Heads of state or government of all EU countries, European Council president, European Commission
president, and High Representative for Foreign Affairs and Security Policy
• Defines EU’s priorities and sets political direction
• European Commission
• One commissioner per member state who pledges to respect the EU Treaties
• Implements EU’s decisions and policies
• Other broad functions, including executive competence to propose legislation
• Historically most active EU institution in data protection
• Council of the EU
• One minister from each member state—changes based on the policy issue to be discussed
• Legislative decision-making (along with the Parliament)
• Legislation generally proposed by the Commission before being examined by the Council of the EU and the
Parliament
• European Parliament
• Only EU institution whose members are directly elected
• Primary responsibilities—legislative development, supervisory oversight of the other institutions and
budget development
• Greatest impact on data protection and privacy issues through role in legislative process
• Frequent advocate for right to data protection
• Co-decision Procedure: process by which Council of the EU and European Parliament agree on legislation
26
European Data Protection
EU institutions
27
European
Commission
Supervises Appoints
Proposes
European legislation Council of
Parliament the EU
Co-decision
EU law
Arbitrates
Court of
Justice
Session notes
This graphic illustrates the flow of power across EU institutions. Use the GDPR as a prime example to briefly describe
the EU’s legislative process.
• The European Commission proposed the draft legislation in 2012 and sent a version to the European Parliament
and the Council of the EU.
• The European Parliament reviewed the draft within committee meetings. They collected thousands of
comments/amendments, and that became the European Parliament’s position on the new GDPR.
• Meanwhile, the Council of the EU had their own committees that reviewed the draft legislation. That became the
Council’s official position on the new draft.
• The Parliament and Council got together and tried to jointly agree on the legislation. The European Commission
adjudicated the proceedings. This process was called the Trilogue Procedure.
• Meanwhile, other groups, such as national parliaments, consumer advocates, and industry advocates, were also
expressing their views.
• In December 2016, the EU Parliament and Council finally agreed upon the EU General Data Protection Regulation,
first proposed in 2012; it went into effect on 25 May 2018.
• The European Court of Justice (ECJ) is the judicial body of the EU. It may be involved in cases related to data
protection that begin in national courts and are referred to the ECJ for a preliminary ruling on issues of
interpretation of EU law.
27
European Data Protection
28
Chat
Pop quiz
Which role best describes the European Commission?
• Defines EU priorities and sets political direction
• Implements EU decisions and policies
• Is engaged in legislative decision-making
• Has supervisory oversight of the other institutions
28
European Data Protection
29
Data Protection Directive
• Does not apply directly
• Minimise harmonisation
• 31 national data protection acts
with a lot of variances
Session notes
Every member state inevitably has some local differences in the law. The result is 31 laws that all broadly say the same
thing but have slight differences. The GDPR was intended to eliminate those differences. However, about 50 provisions in
the GDPR allow for local law clarification/exception. Whether or not the GPDR was a radical change depended on how
similar your country’s data protection law was to the GDPR.
GDPR
• Directly applicable and enforceable as law in every EU member state
• Goal is to provide just one set of data protection rules for all EU member states
• However, 50 provisions allow for local law clarification or exception
• National laws either repealed or amended to align with GDPR
• European Data Protection Board (EDPB) replaced the WP29 in 2018—to be discussed later in the training; WP29 GDPR
guidelines endorsed by the EDPB
• GDPR full text: http://eur-lex.europa.eu/eli/reg/2016/679/oj
• European Commission GDPR guidance website: https://ec.europa.eu/commission/priorities/justice-and-fundamental-
rights/data-protection/2018-reform-eu-data-protection-rules_en
• IAPP “EU Member State GDPR Derogation Implementation Tracker”: https://iapp.org/resources/tools/eu-member-state-
gdpr-derogation-implementation
29
European Data Protection
30
ePrivacy GDPR
Storing/accessing Processing of
data on device ‘personal data’
European Data Protection Board, “Opinion 5/2019 on the interplay between the ePrivacy Directive and the GDPR…”
Adopted 12 March 2019,
https://edpb.europa.eu/sites/edpb/files/files/file1/201905_edpb_opinion_eprivacydir_gdpr_interplay_en_0.pdf
Session notes
The ePrivacy Directive is discussed in more depth in Module 8.
• Processing that triggers the material scope of both
• ePrivacy Directive: electronic communications service, electronic communications network, and service
and network publicly available and offered in the EU; website operators (e.g., for cookies) or other
businesses (e.g., for direct marketing)
• GDPR: ‘any form of processing of personal data, regardless of the technology used’
• Interplay
• ‘To particularise’ (lex specialis principle): ‘Special provisions prevail over general rules’
• ‘To complement’: Several ePrivacy Directive provisions complement GDPR provisions
• Article 95 of the GDPR: The aim is ‘to avoid the imposition of unnecessary administrative burdens upon
controllers who would otherwise be subject to similar but not quite identical administrative burdens’
• Co-existence: In cases where lex specialis does not apply, the general rule will apply (lex generalis)
• Competence, tasks and powers of data protection authorities: ‘When the processing of personal data triggers the
material scope of both the GDPR and the ePrivacy Directive, data protection authorities are competent to
scrutinise the data processing operations which are governed by national ePrivacy rules only if national law
confers this competence on them, and such scrutiny must happen within the supervisory powers assigned to the
authority by the national law transposing the ePrivacy Directive’
Examples
• Processing that triggers the material scope of both the GDPR and ePrivacy Directive
• Article 29 Working party’s opinion on online behavioral advertising: ‘If as a result of placing and retrieving
information through the cookie or similar device, the information collected can be considered personal
data’
• Interplay
• ‘To particularise’: ‘The full range of possible lawful grounds provided by Article 6 GDPR cannot be applied
by the provider of an electronic communications service to processing of traffic data, because Article 6
ePrivacy Directive explicitly limits the conditions in which traffic data, including personal data, may be
processed’
• Article 95 of the GDPR: Personal data breach notification obligations
30
European Data Protection
31
1. Which of the following data
protection milestones is a
treaty amongst member states
of the Council of Europe?
Review
question
A. Data Retention Directive
B. Charter of Fundamental Rights
C. Convention 108
D. ePrivacy Directive
E. GDPR
Review question
NOTE: Review questions are intended to help reinforce key topics covered in the module. They are not meant to
represent actual certification exam questions.
1. Which of the following data protection milestones is a treaty amongst member states of the Council of
Europe?
31
European Data Protection
32
2. Which of the following data
protection milestones applies to
public electronic
communications services and
Review networks?
question
A. Data Retention Directive
B. Charter of Fundamental Rights
C. Convention 108
D. ePrivacy Directive
E. GDPR
Review question
2. Which of the following data protection milestones applies to public electronic communications services and
networks?
32
European Data Protection
33
3. The European Convention on
Human Rights is a product of
which institution?
Review
question A. The United Nations
B. The Council of Europe
C. The European Union
D. The European Economic Area
Review question
33
European Data Protection
34
4. Which role best describes the
European Parliament?
Review
question A. Defines EU priorities
B. Sets political direction
C. Implements EU decisions and policies
D. Is engaged in legislative development
Review question
34
European Data Protection
35
Module 2: Learning objectives
Personal data • Differentiate between personal, anonymous
and pseudonymous data
• Recognise special categories of data
35
European Data Protection
Personal data
36
Four-step test
Session notes
Four-step test: ‘Any information relating to an identified or identifiable natural person (“data subject”)’ (Article
4[1])
The criteria do not have to be considered in any particular order, yet all must be met.
36
European Data Protection
Anonymous
37
Module 2: Personal data
Session notes
Anonymous data (Recital 26)
• Not related to an identified or an identifiable natural person
• Has been rendered unidentifiable
• Not considered personal data under the GDPR
37
European Data Protection
Anonymous Pseudonymous
38
Module 2: Personal data
Session notes
Pseudonymous data (Recitals 26, 28-29; Articles 4[5], 6[4][e], 25[1], 32[1][a])
• Not fully anonymous
• A process that detaches the aspects of the data attributed to a specific individual
• A security measure that makes the use of the data less risky
• Subject to data protection law
38
European Data Protection
39
Chat
Knowledge check
Can you rewrite the following statement to anonymise
the personal data?
39
European Data Protection
Personal data
40
Special categories of personal data
Session notes
Click slide to reveal text.
40
European Data Protection
Personal data
41
Special categories of personal data
• Genetic data
• Biometric data for the purpose of uniquely identifying a natural person
Session notes
Special categories of personal data
• Genetic data
• Biometric data for the purpose of uniquely identifying a natural person
41
European Data Protection
Personal data
42
Special categories of personal data
Session notes
Special categories of personal data
• Data concerning …
• Health
• Sex life
• Or sexual orientation
42
European Data Protection
Personal data
43
Other special categories of personal data
Session notes
Other
• Personal data related to criminal convictions and offences
• Article 10: Processing of such personal data ‘shall be carried out only under the control of official
authority or when the processing is authorised by Union or Member State law providing for appropriate
safeguards for the rights and freedoms of data subjects’. And ‘Any comprehensive register of criminal
convictions shall be kept only under the control of official authority’.
43
European Data Protection
44
Chat
Knowledge check
Keeping the subjective nature of this
exercise in mind, provide examples that
would likely belong to special categories
of personal data under the GDPR.
Session notes
• A data element’s designation as belonging to a special category may not be obvious
• Example: An X-ray of a broken arm would obviously qualify as data concerning health; however, a photograph from
a holiday party showing an individual with his arm in a cast may not, as the photograph does not necessarily
concern that person’s health
44
European Data Protection
45
1. What is the function of the
four-step test?
Review question
NOTE: Review questions are intended to help reinforce key topics covered in the module. They are not meant to
represent actual certification exam questions.
45
European Data Protection
46
2. Which criteria are used to
identify personal data? Select
all that apply.
Review
question A. ‘any information’
B. ‘relating to’
C. ‘an identified or identifiable’
D. ‘or anonymous’
E. ‘natural person’
Review question
2. Which criteria are used to identify personal data? Select all that apply.
A. ‘any information’
B. ‘relating to’
C. ‘an identified or identifiable’
D. ‘or anonymous’
E. ‘natural person’
46
European Data Protection
47
data elements that belong to
special categories under the
GDPR.
Review question
3. Select the types of personal data elements that belong to special categories under the GDPR.
47
European Data Protection
48
Review 4. True or false: Anonymising
question personal data is always
possible.
Review question
48
European Data Protection
49
Review
5. True or false: Pseudonymous
question data is protected by the GDPR.
Review question
49
European Data Protection
50
6. Is the collection and use of
Review device dynamic IP addresses to
allow data on a website to be
question transferred to the correct
recipient considered personal
data? Why or why not?
Review question
6. Is the collection and use of device dynamic IP addresses to allow data on a website to be transferred to the
correct recipient considered personal data? Why or why not?
50
European Data Protection
51
Module 3:
Controllers Learning objectives
and • Define data protection roles
processors • Describe basic configurations of control
over personal data
51
European Data Protection
52
Data subject
Data controller
Data processor
Data protection
authority (DPA)/
Supervisory
authority (SA)
Session notes
Data protection roles
• Basic definitions (not GDPR-specific)
• Data subject: An individual about whom personal data is processed
• Data controller: An organisation or individual that decides how and why personal data is processed
• Data processor: An organisation or individual that processes information on behalf of the data controller
• Data protection authority (DPA), referred to as supervisory authority (SA) in GDPR:
• An entity appointed to enforce privacy or data protection laws and regulations in a particular jurisdiction
• GDPR-specific definitions of these roles explored throughout the course
52
European Data Protection
53
Chat
Pop quiz
Jim is employed by a construction company in Belgium. The
Human Resources department at the construction company keeps
Jim’s personal data on file. The construction company contracts
with a payroll administration that directly deposits Jim’s
paycheck into his bank account. The Belgian Privacy Commission
provides regulatory oversight to ensure Jim’s company follows EU
and national data protection laws.
Who is the data processor in this scenario?
53
European Data Protection
Controller
54
Definition
Session notes
Article 4(7)
• Natural or legal person, public authority, agency or other body
• Living human being
• Or legal entity
• Alone or jointly with others (see following slides)
• Different configurations of control
• Determines the purposes and means of processing
• Why? (purposes)
• How? (means)
• What data?
• How long? (retention)
• Where? (storage and data transfers)
• By whom?
• It is not necessary that the controller actually has access to the data that is being processed to be qualified as a
controller.
54
European Data Protection
55
Where two or more
controllers jointly determine
the purposes and means of
processing, they shall be
joint controllers.
(Article 26)
Session notes
Article 26 of the GDPR specifies obligations for controllers that jointly determine the purposes and means of
processing personal data.
• ‘In a transparent manner determine their respective responsibilities for compliance with the obligations under this
Regulation’
• Data subject rights
• Data subject access requests
• Contact point for data subjects
• ‘Essence of the arrangement’ available to data subjects
• Data subjects may exercise their rights against either controller, ‘irrespective of the terms of the arrangement’
55
European Data Protection
Controller
56
Which examples illustrate a controller determining the
means and purposes of processing ‘jointly with others’?
A travel
agency… C. Collaborates with D. Shares personal
a separate data with airlines and
organisation to run a hotels. Each party is
co-branded responsible for its
promotional event own processing.
with a prize draw.
Session notes
Which examples illustrate a controller determining the means and purposes of processing ‘jointly with others’?
• Scenario A
• Group of companies: Two or more group entities determine together the purpose and means for the same
processing (e.g., to provide package travel deals)
• Joint responsibility
• Separate data
• Shared technical database/infrastructure used for individual purposes (e.g., internet-based common
platform)
• Scenario B (Processor obligations are discussed on the following slide)
• Disclosure to an internal or external processor
• Respective rights and obligations of controller and processor
• Scenario C
• The database for the prize draw is shared between both organisations
• Joint responsibility
• Scenario D
• Personal data shared from one controller to another controller (disclosure to a third-party controller)
• Each party responsible for its own processing of the data
The EDPB Guidelines 07/2020 on the concepts of ‘controller’ and ‘processor’ may serve as a helpful resource for
determining if a controller operates ‘jointly with others’. The EDPB Guidelines are available at:
https://edpb.europa.eu/sites/edpb/files/consultation/edpb_guidelines_202007_controllerprocessor_en.pdf
56
European Data Protection
Processor
57
Definition
Session notes
Processor definition
• Processes on written instructions only (Article 28)
• Obtains authorisation
• Provides a service to the controller (Article 28)
• Assists the controller and informs the controller of GDPR infringements
• Protects personal data (Article 28)
• Ensures confidentiality and appropriate technical and organisational measures
• Demonstrates compliance (Article 30)
• Keeps a record of processing activities on all categories of personal data processing carried out on behalf
of the controller
• Enhanced obligations under the GDPR
The GDPR enhances processors’ duties and liabilities. (Yet the burden for data protection still rests heaviest on the
controller.)
The role of processor is specific to the processing operation: you can be a controller for one particular processing ope
ration, a processor for another, and so on.
EDPB Guidelines 07/2020
• Qualifying criteria:
• Separate entity in relation to the controller
• Processes personal data on the controller’s behalf
• Controller’s instructions leave some degree of discretion
57
European Data Protection
58
If a processor infringes this
Regulation by determining
the purposes and means of
processing, the processor
shall be considered to be a
controller in respect of that
processing (Article 28)
Session notes
A processor that ‘determines the purposes and means of the processing’ (Article 4[7]) may be a controller in fact
When determining the controller, the act of making processing decisions (although not necessarily lawful) can trump
law and contract.
Case study
SWIFT (example of factual controller)
Following September 11, 2001, the United States Department of the Treasury served administrative subpoenas on the
Society for Worldwide Interbank Financial Telecommunication (SWIFT), which required SWIFT to transfer personal
data. SWIFT’s decision to transfer the data designated it as the controller, even though its contractual designation
was processor.
58
European Data Protection
Processor
59
Vendor management
Session notes
The GDPR’s requirements for vendor risk management may seem straightforward; however, translating its
requirements into practical action points may pose challenging for the following reasons:
• Determining the extent to which the controller can rely upon the processor to attest and monitor its own
reliability
• Determining the extent to which the controller needs to evaluate third parties before and after contracting,
including conducting audits
• Complex contractual provisions
• Negotiating contracts between two parties of unequal bargaining power or from EU and non-EU jurisdictions
• Situations that involve cloud computing; difficulties knowing the precise nature of data processing operations at
any given moment in time
A checklist may provide issues to consider at the pre-contractual due diligence stage and evidence that the necessary
steps were taken. See the following slide for more details.
59
European Data Protection
Engaging processors
60
Pre-contractual due-
diligence
Session notes
• GDPR obligations on processors
• Accountability (e.g., record-keeping, appointing data protection officer where applicable)
• Data subjects’ rights
60
European Data Protection
Engaging processors
61
Components of a contract
Article 28
• Subject matter, duration and
nature of the data processing
• Types of personal data and
categories of data subjects
• Obligations and rights of the
controller
• The processor’s responsibilities
Session notes
Controller-processor contracts (Article 28)
• If a controller is engaging a data processor, the controller is obligated to have a documented contract in place
that contains:
• Subject matter, duration and nature of the data processing
• Types of personal data and categories of data subjects
• Obligations and rights of the controller
• The processor’s responsibilities
61
European Data Protection
Engaging processors
62
Contractual terms
Session notes
Engaging processors: contractual terms (Article 28)
• Process personal data only on documented instructions from controller
• Including international data transfers
• Ensure persons authorised to process personal data have committed themselves to confidentiality
• Or are under statutory duty of confidence (i.e., processor’s employees sign NDAs)
• Implement appropriate technical and organisational measures
• Seek controller consent to engage processors
• And flow down all terms of contract with controller to sub-contractor
• Assist controller in reporting and notifying supervisory authorities and affected individuals of data breaches
• Assist the controller in responding to requests for exercising data subject rights
• Delete or return all personal data if instructed by controller
• Make available to controller all information necessary to demonstrate GDPR compliance
• Be prepared to submit to audits, including inspections
• By controller or another auditor chosen by controller
62
European Data Protection
63
1. True or false: A data controller
Review may be a natural person or a
question legal entity, while a data
processor must be a legal
entity.
Review question
NOTE: Review questions are intended to help reinforce key topics covered in the module. They are not meant to
represent actual certification exam questions.
1. True or false: A data controller may be a natural person or a legal entity, while a data processor must be a
legal entity.
63
European Data Protection
64
Review 2. True or false: A contract
question protects a processor from being
held to the same legal
obligations as the controller.
Review question
2. True or false: A contract protects a processor from being held to the same legal obligations as the controller.
64
European Data Protection
65
Review 3. True or false: A processor may
question decide where and how to
process personal data.
Review question
3. True or false: A processor may decide where and how to process personal data.
65
European Data Protection
66
Review
question 4. What actions can a controller
take to manage vendor risk?
Review question
66
European Data Protection
67
Learning objectives
• List operations in the data-processing life cycle that constitute data processing.
• Describe the seven data-processing principles, especially as they relate to determining the purposes for
processing.
• Determine the application of the GDPR based on territorial and material scope.
• Determine if a data-processing activity is legal under the GDPR based on legitimate processing criteria.
67
European Data Protection
Controllers and
68
processors
Processing:
‘Any operation’
performed upon
personal data
Session notes
To convey the scope of data processing rules and regulations, first define data processing.
• Much more than just collecting personal data
• Article 4(2): ‘Any operation’ performed upon data
68
European Data Protection
69
GDPR principles
Session notes
GDPR Principles for processing
• Article 5
• Carried over from earlier laws and regulations, including OECD Guidelines
• May be broadly interpreted; however, violators may incur large administrative fines
• Lawfulness, fairness and transparency of processing: Honest practices, such as communicating openly with data
subjects about personal data processing activities
• Purpose limitation: Collecting and processing personal data for the specified purpose only
• To determine if personal data may be processed further, use a compatibility test to look for links between
purposes, nature of the data, method of collection, consequences of secondary uses and safeguards
• Data minimisation: Processing only personal data that is relevant and necessary for the purpose
• Data quality and accuracy: Processing complete and up-to-date personal data
• Storage limitation: Retaining only personal data that is relevant and necessary for the purpose
• Integrity and confidentiality: Ensuring personal data is secure
• Accountability: Processing personal data responsibly and demonstrating compliance with EU and member state
data protection laws
69
European Data Protection
Enforcement action
70
Denmark DPA recommends GDPR fine for
taxi company (2019)
Module 4: Processing personal data
Session notes
Denmark DPA recommends GDPR fine for taxi company (2019)
Denmark’s data protection authority, Datatilsynet, recommended a fine of 1.2 million Danish krones ($180,000) to
taxi company Taxa 4x35 for violations of the GDPR, Bloomberg Law reports. The DPA found the taxi company did not
adhere to the GDPR’s data-minimisation principle. While Taxa deleted the names from all its records after two years,
the rest of the ride records remained intact. The DPA recommended the fine after it was discovered the taxi
company continued to hold onto individuals’ phone numbers after their names were removed from the records.
70
European Data Protection
Enforcement action
71
Dutch DPA hits tennis association with 525K
euro GDPR fine (2020)
IAPP, “Dutch DPA hits tennis association with 525K euro GDPR fine,” Daily Dashboard, 4 March 2020,
https://iapp.org/news/a/dutch-dpa-hits-tennis-association-with-520k-euro-gdpr-fine/.
Session notes
Dutch DPA hits tennis association with 525K euro GDPR fine (2020)
Sponsors of the Royal Dutch Lawn Tennis Association (KNLTB) received personal data in the form of names, genders
and addresses from the association for the purpose of marketing tennis-related and other offers to KNLTB members.
The Dutch Data Protection Authority served the KNLTB with a 525K euro fine declaring that the association did not
have any basis under the GDPR data processing principles for sharing personal information of its members with
sponsors. The KNLTB states that the data sharing was based on legitimate interest under the GDPR and has objected
to the fine.
71
European Data Protection
72
Chat
Knowledge check
An access control system used for building security is later used
to pull login data to track employee punctuality. The employees
are not informed of this new processing action, and the
controller does not keep consistent records of the processing
activities.
Which GDPR principles may have been violated?
72
European Data Protection
73
Territorial scope of the GDPR: Three criteria
Session notes
The GDPR lays out specific criteria for its application, which covers territorial and material scope (material scope
covered later in this module).
Territorial scope relies on three criteria as set out in Article 3 of the GDPR. Just one of these criteria must be met for
the GDPR to be applicable.
1. Where the data is processed in the context of the activities of an establishment of controller or processor in the
EU (regardless of whether or not the actual processing takes place in the EU)
• EDPB guidance: A processor is not necessarily an establishment of a controller based on its status of
processor alone
73
European Data Protection
74
Territorial scope of the GDPR: Three criteria
Session notes
The GDPR lays out specific criteria for its application, which covers territorial and material scope (material scope
covered later in this module).
Territorial scope relies on three criteria as set out in Article 3 of the GDPR. Just one of these criteria must be met for
the GDPR to be applicable.
2. Intentional processing of personal data of data subjects in the EU relating to offering goods or services or
intentional monitoring behaviour in the EU (where the controller or processor is not established in the EU)
• Data subject-centric way of determining applicability of the law
• EDPB guidance: Processing personal data of individuals in the EU alone is not the trigger; the important
element is ‘targeting’
• Offering of goods and services to data subjects residing in the EU (a website directed at the relevant
jurisdiction)
• Monitoring
• Digital tracking of behavior
• EDPB guidance: plus CCTV usage and market surveys
• A ubiquitous practice
• EDPB guidance: not just any online collection or analysis of personal data, but dependent on
purpose
74
European Data Protection
75
Territorial scope of the GDPR: Three criteria
1. Where the data is processed in the context of the activities of an
establishment of a controller or processor in the EU
2. Intentional processing of personal data of data subjects in the
EU relating to offering goods or services or intentional monitoring
behaviour in the EU
3. Processing of personal data by a controller not established in
the EU but in a place where member state law applies by virtue
of public international law
Session notes
The GDPR lays out specific criteria for its application, which covers territorial and material scope (material scope
covered later in this module).
Territorial scope relies on three criteria as set out in Article 3 of the GDPR. Just one of these criteria must be met for
the GDPR to be applicable.
3. Processing of personal data by a controller not established in the EU but in a place where member state law
applies by virtue of public international law
• EDPB guidance: Requires a designated representative in the Union. The representative must be
established in one of the Member States where a service is being offered. The name and contact details
of the data controller and its representative in the Union must be made available to data subjects.
Resources:
“Guidelines 3/2018 on the territorial scope of the GDPR (Article 3)” Adopted 12 November 2019
https://edpb.europa.eu/sites/default/files/files/file1/edpb_guidelines_3_2018_territorial_scope_after_public_cons
ultation_en_1.pdf
“Guidelines 05/2018 on the Interplay between the application of Article 3 and the provisions on international
transfers as per Chapter V of the GDPR,” Adopted 18 November 2021
https://edpb.europa.eu/system/files/2021-11/edpb_guidelinesinterplaychapterv_article3_adopted_en.pdf
75
European Data Protection
76
• 76 Material
Materialscope:
scope:‘processing
‘processing
of
ofpersonal
personaldata
datawholly
whollyoror
partly
partlybybyautomated
automatedmeans’
means’
or
or‘processing
‘processingother
otherthan
thanby by
automated
automatedmeans
meansofofpersonal
personal
data
datawhich
whichform
formpart
partofofaa
filing
filingsystem’
system’(Article
(Article2)
2)
Session notes
Material scope (Article 2)
• ‘Processing of personal data wholly or partly by automated means’
• Any processing operation performed without or partly without human intervention
• No to be confused with automated decision-making, which has strict restrictions under the GDPR
(discussed in Module 5)
• ‘Personal data which forms part of a filing system’
• Or are intended to form part of a filing system
• Even if the processing is not conducted by automated means
• Exclusions
• Activities outside the scope of EU law (e.g., national security activities)
• Law enforcement and public security
• Purely personal or household activities
76
European Data Protection
77
Material scope
Case study
77
European Data Protection
78
Lawful grounds
• 78
Consent
Session notes
78
European Data Protection
79
Lawful grounds
• 79
Consent Contractual
necessity
Session notes
Lawful grounds (Article 6)
• Performance of a contract
• If the processing is necessary to perform the contract (and the data subject is a party to the contract)
• Or if the data subject requests the processing in order to enter into a contract
79
European Data Protection
80
Lawful grounds
• 80
Session notes
Lawful grounds (Article 6)
• Compliance with a legal obligation to which the controller is subject
• Meant to be interpreted narrowly
• Applies to legal obligations required by EU and member state laws only
• Does not include legal obligations of contracts or those of third countries (outside the EU)
80
European Data Protection
81
Lawful grounds
• 81
Session notes
Lawful grounds (Article 6)
• Protection of vital interests of the data subject or another natural person
• If personal data must be processed to ensure an individual’s survival
• Should only be used in an emergency situation and if no other option is available
81
European Data Protection
82
Lawful grounds
• 82
Session notes
Lawful grounds (Article 6)
• Necessary for the public interest or in the exercise of official authority of the controller
• Controller required to process personal data in the public interest
• Member state legislation may determine what tasks fall within the public interest
82
European Data Protection
83
Lawful grounds for controllers
• 83
Session notes
Lawful grounds (Article 6)
• Necessary for the legitimate interests of the controller or a third party (unless overridden by the interests, rights
or freedoms of the data subject, in particular where the data subject is a child)
• Has often been used as a safety net in the absence of another legitimate basis for processing personal data
• While it may still prove a more realistic option than consent, it should be used with caution
83
European Data Protection
84
Consent
Session notes
Consent has always been one of the cornerstones of EU data protection; however, under the GDPR, the conditions for
consent have become elevated.
The elevated requirements for consent have made it difficult to obtain lawfully.
Consent (Recitals 32, 42-43; Articles 4[11], 7)
• Freely given
• Not if service or performance of contract is conditional upon consent (unless consent is necessary for the
performance of the contract)
• Not if there is a clear imbalance of power between the data subject and the controller (e.g., controller
public authority)
• Data subject chooses to have personal data processed
• Can withdraw at any time (as easy to withdraw as it is to give consent)
• Specific
• Informed of all intended purposes at the time of consent (additional consent may be required if another
purpose arises)
• Some flexibility for research and scientific purposes (data subject gives consent with as much specificity
as possible, knowing other uses within the same general area of scientific research may arise)
• Informed
• Data subject informed, at least, of the controller’s identity, purpose for processing, and information
about how processing may affect data subjects
• Controller can demonstrate data subject was informed prior to consent
• Clearly distinguishable from other matters
• Intelligible, clear and in plain language
• Compatible with the original purpose
84
European Data Protection
85
Consent
Session notes
Consent (Recitals 32, 42-43; Articles 4[11], 7) (cont.)
• Unambiguous indication of wishes
• Absolutely clear
• Clearly an affirmative action (e.g., opt-in, technical setting for information society services, browser
setting)
• Not silence, inactivity, a pre-ticked box or opt-out
• Implied through the provision of data
• Conditions for consent
• Demonstrable (if processing based on consent)
• If a written declaration, clearly distinguishable, etc.
• Right to withdraw any time (as easy as it was to give)
• Not conditional for performance of contract if not necessary
85
European Data Protection
86
Consent for children’s data
Article 8
• Information society
services
• Authorisation of parent or
guardian of children below
16 years old
• Reasonable efforts to verify
Session notes
Obtaining consent for processing children’s personal data
• Even more rigorous when information society services are being offered
• Including online technologies (e.g., social media and apps)
• Consent must be given by a parent or guardian when the child is younger than 16 years old
• Member states can lower threshold to as young as 13 years old
• Controller must make reasonable efforts to verify
86
European Data Protection
87
Chat
Brainstorm
Methods a controller may use to verify
parental authorisation
Session notes
• Think about the children you know and all the online technologies they use (and how often)
• Imagine the difficultly for parents to consent to every service a child uses online, including social media and apps
Chat: Brainstorm
Methods a controller may use to verify parental authorisation
87
European Data Protection
88
Legitimate interests
• Processing is necessary
• Interests are balanced against
the data subject’s
• Criteria is more restrictive
Session notes
Legitimate interests of the controller or third party (Recitals 47–49)
• Processing is necessary to meet the controller or third party’s legitimate interests
• Interests are balanced against the data subject’s (balancing test)
• An attractive alternative to consent, yet no longer a fallback option
• Criteria is more restrictive
• Compliance with other legal obligations
• Transparency
• Economic interests not necessarily sufficient
• Importance of upholding fundamental rights and freedoms of the data subjects
• Use limitation: compatibility
• Adequate safeguards for secondary uses, including pseudonymisation and encryption
88
European Data Protection
89
Prohibition to process, except if:
Explicit consent
Session notes
• Explicit consent
• Unambiguous, freely given, specific and informed, and a clear affirmative act by the data subject
• In the context of employment
• When the processing of special categories is necessary for the controller to comply with a legal obligation
under employment, social security and social protection law
• When data subjects are candidates, employees, contractors
• Vital interests of individual
• Controller must be able to demonstrate that it is not possible to obtain consent
• Political, philosophical and religious purposes
• Covers particular foundations, associations, not-for-profit bodies and any foundation, association or not-
for-profit body with trade union aim
• Relates to the processing of special categories of data about members of the organisation, former
members or those who have regular contact with the organisation for the organisation’s purposes
• Appropriate safeguards in place to protect personal data
• The data must not be disclosed outside the organisation without the data subject’s consent
• Sensitive data manifestly made public by the data subject
• When data subjects disclose sensitive data about themselves (e.g., details about political opinions or
health while giving a media interview)
• Data collected from social networking sites
89
European Data Protection
90
Prohibition to process, except if:
Establishment, exercise or defence of legal claims
Public health
Session notes
• Establishment, exercise or defence of legal claims
• Controller must establish necessity
• Close and substantial connection between the processing and the purpose
• Substantial public interest
• Narrower under GDPR
• Reason for processing balanced with data subject’s right to data protection
• Suitable and specific measures to safeguard data subject’s fundamental rights and interests
• Member states can specify reasons of public interest (e.g., preventing and detecting crime)
• Medicine and social healthcare
• Assessing the working capacity of an employee, making a medical diagnosis, providing health or social
care or treatment, managing health or social care systems or services
• Reason for processing based on EU or member state law, or necessary to fulfil a contract
• Public health
• Based on EU or member state law
• GDPR examples: ‘Protecting against serious cross-border threats to health or ensuring high standards of
quality and safety in health care and of medicinal products or medical devices’
• Public archives or scientific or historical research or statistical
• Further interpretation from member state law
• Processing proportionate to the purpose
• Suitable and specific measures to safeguard data subject’s fundamental rights and interests
90
European Data Protection
91
1. What is data processing?
Review question
NOTE: Review questions are intended to help reinforce key topics covered in the module. They are not meant to
represent actual certification exam questions.
91
European Data Protection
92
of the GDPR? Select all that
apply.
Review question
2. What are the criteria used to determine the territorial scope of the GDPR? Select all that apply.
A. Where the data is processed in the context of the activities of an establishment of a controller or
processor in the EU
B. Intentional processing of personal data of data subjects in the EU relating to offering goods or services
or intentional monitoring of behaviour in the EU
C. Processing of personal data by a controller not established in the EU but in a place where member state
law applies
92
European Data Protection
93
Review 3. True or false: Exclusions to the
question material scope of the GDPR
should be interpreted broadly.
Review question
3. True or false: Exclusions to the material scope of the GDPR should be interpreted broadly.
93
European Data Protection
94
4. Which exception to the
prohibition on processing
special categories of data must
be explicit?
Review
question
A. Consent
B. Vital interests
C. Publicly available data
Review question
4. Which exception to the prohibition on processing special categories of data must be explicit?
A. Consent
B. Vital interests
C. Publicly available data
94
European Data Protection
95
Module 5: Learning objectives
Data subject
• Describe data subject rights regarding the
rights processing of their personal data
• Recognise controller and processor
obligations regarding data subject rights
• Describe data subject rights regarding the processing of their personal data.
• Recognise controller and processor obligations regarding data subject rights.
95
European Data Protection
96
Access
Session notes
(Recitals 59, 63; Article 15):
Data subjects shall have the right to:
• Confirmation their personal data is being processed and access to it
• Processing information
• Purpose of the processing
• The categories of personal data
• Recipients/categories of recipients of the personal data, in particular in third countries/international
organisations
• Retention period/criteria used to determine period
• Information about data subject rights to rectification, to erasure, to restriction, to object and to lodge a
complaint with an SA
• Any available information about the source of the personal data (when not collected from the data
subject)
• The existence of automated decision-making and information about:
• The logic involved
• Significance and envisaged consequences
• Information about appropriate safeguards for personal data transferred to a third country/international
organisation
• A copy of the personal data being processed from the controller
• Controller may charge reasonable fee for further copies requested
• Commonly used electronic form when the request is made by electronic means (and unless otherwise
requested)
• Cannot adversely affect the rights and freedoms of others
96
European Data Protection
97
Rectification
• Correction
– Objectively incorrect
– Subjectively incorrect
• Completion
Session notes
Rectification without undue delay (Article 16)
• Data subjects shall be able to correct or complete their personal data
• Correction of inaccurate personal data
• Completion of incomplete data (with consideration for the processing purpose)
• Where the data must be saved, the data subject may submit a supplementary statement
97
European Data Protection
98
Chat
Brainstorm
Under what circumstances might a
data subject want or need personal
data with an error to be saved?
Chat: Brainstorm
Under what circumstances might a data subject want or need personal data with an error to be saved?
98
European Data Protection
99
Limitations
• Identification of the
requester
• Protection of others’ rights
and freedoms
• Purpose of the request
• Manifestly unfounded or
abuse of right
Session notes
Limitations to rights of access and rectification
• Identification of the requester
• With reasonable steps to identify
• Protection of others’ rights and freedoms, including data controller (e.g., trade secrets and intellectual
property)
• Purpose of the request
• To check the lawfulness of processing and accuracy of personal data
• Request is manifestly unfounded or excessive
• Repetitive character
99
European Data Protection
100
Chat
Brainstorm
Scenarios that may limit a data subject’s
rights to access or rectification
Chat: Brainstorm
Scenarios that may limit a data subject’s rights to access or rectification
100
European Data Protection
101
Data portability
Session notes
Data portability (Article 20)
• Applies where consent or performance of a contract is used as lawful grounds for processing
• Extension of access right
• Structured, commonly used and machine-readable format
• Interoperability: accessibility through multiple systems (Recital 68)
• As much metadata as possible
• Does not mean maintaining compatible systems
• Transfer to data subject (e.g., direct download), another controller (e.g., application programming interface) or a
trusted third party
• Data controller transferring the data not responsible for the processing activities of the recipient
• Data portability does not trigger erasure
101
European Data Protection
102
Data portability cumulative conditions
Session notes
The Article 29 Working Party has provided ‘Guidelines on the Right to Data Portability’, which further defines this
data subject right.
102
European Data Protection
103
Erasure Right to be forgotten
Session notes
Right to erasure (‘right to be forgotten’) (Recitals 59, 65-66; Articles 17, 19)
• Right to have personal data erased (and no longer processed)
• Data no longer necessary for the purpose
• Withdrawn consent if processing is based on consent
• Objection to processing (if processing is based on legitimate interests)
• Data collected in relation to information society services from a child on the basis of consent
• Unlawful processing
• Compliance with EU and member state law
• Right to have public data deleted
• Google Spain v. AEPD and Mario Costeja González
• Data made public by the controller (e.g., posting a photo of an individual on a social media profile with a
public setting)
• Reasonable steps by the controller to inform other controllers that the data subject has requested erasure
of links to, copies and replications of the data (Recital 66)
• Burden on the controller to remove the data
• Exceptions ... (see Article 17)
103
European Data Protection
104
Chat
Your outlook
Regarding the right to be forgotten,
what difficulties might controllers
have with third-party follow-up?
104
European Data Protection
105
Restriction of
processing
• Definition
• Circumstances
• Reasons for restriction
• Further processing
• Lifting the restriction
Session notes
Restriction of processing (Article 18)
• Definition: Personal data is stored without being further processed
• Circumstances: When storing data
• Is legally required
• Ensures protections of another’s rights
• Is in the public interest
• Reasons data subjects may request restriction
• Accuracy is contested and controller needs time to verify
• Processing is unlawful, but data subject prefers restriction to erasure
• Controller no longer needs data, but data subject needs it for establishment, exercise or defence of legal
claims
• Data subject objects to processing, pending controller’s verification of legitimate grounds
• Once restricted, data may only be further processed
• With new consent from the data subject
• To exercise or defend legal claims
• To protect the rights of another person
• For important public interest reasons
• Controller must inform data subject before lifting the restriction
105
European Data Protection
106
Right to object to processing
Public interest or
legitimate interests
Session notes
Right to object to processing (Article 21)
• Three sub-categories
• Public interest or legitimate interest
• Not an absolute right
• Data subject’s right to object at any time to processing based on the public interest or the
controller’s legitimate interest
• Controller burden to demonstrate compelling, legitimate interest that overrides individual’s
interests, rights and freedoms
106
European Data Protection
107
Right to object to processing
Session notes
Right to object to processing (Article 21)
• Not an absolute right
• Three sub-categories
• Research or statistical purposes
• Data subject’s right to object at any time to processing for scientific/historical research or
statistical purposes
• On grounds relating to individual’s particular situation
• Overridden if processing is necessary for performance of a task carried out in the public interest
107
European Data Protection
108
Right to object to processing
Session notes
Right to object to processing (Article 21)
• Not an absolute right
• Three sub-categories
• Direct marketing
• Data subject right to object at any time to processing for direct marketing purposes
• Absolute
• Must cease processing
• Includes profiling
108
European Data Protection
109
• 109
‘The
‘Thedata
datasubject
subjectshall
shallhave
havethe
theright
right
not
nottotobe
besubject
subjecttotoaadecision
decisionbased
based
solely
solelyononautomated
automatedprocessing,
processing,
including
includingprofiling,
profiling,which
whichproduces
produces
legal
legaleffects
effectsconcerning
concerninghimhimor
orher
heror
or
similarly
similarlysignificantly
significantlyaffects
affectshim
himor
or
her’
her’(Article
(Article22).
22).
Session notes
(Recital 71; Article 22)
Prohibition on:
• A decision based solely on automated processing
• And produces legal or otherwise similarly significant effects
• “Solely automated process” and which decisions have “significant effects on individuals” needs guidance from
regulator
• Strictest for decisions involving children
Exemptions (all requiring appropriate safeguards):
• Processing necessary to enter into or perform a contract (e.g., evaluating credit risk or insurance risk)
• Authorisation of member state law
• Data subject’s explicit consent
Automated decision-making not permitted on special categories of personal data, unless:
• Explicit consent
• Or substantial public interest based on union or member state law
• Suitable measures must be put in place
Article 29 Working Party good practice recommendations:
• Provide ‘meaningful information about the logic involved’
• If relying on consent, consult the WP29 guidelines on consent
• Consider implementing a mechanism for data subjects to check profiles and allow them to amend inaccuracies
• Explicitly bring to the attention of the data subject the right to object, clearly and separately from other
information
• Use appropriate safeguards (e.g., regular quality assurance checks to systems to make sure individuals are treated
fairly and not discriminated against); additional safeguards in guidance
109
European Data Protection
110
Profiling
• Automated processing
• Of personal data
• To evaluate, analyse and
predict
• Personal aspects
• Relating to a natural person
Session notes
Profiling (Articles 4[4], 22)
• Automated processing
• Of personal data
• For the purpose of evaluating, analysing and predicting
• Personal aspects
• Relating to a natural person
110
European Data Protection
111
Chat
Your outlook
Under what circumstances may
profiling be considered an invasion of
privacy?
111
European Data Protection
112
1. Which of the following data
subjects’ rights provides data
subjects with entitlements to
certain information,
obtainable from the controller
Review upon request?
question
A. Right to restriction of processing
B. Right of access
C. Right to erasure
D. Right to object
Review question
NOTE: Review questions are intended to help reinforce key topics covered in the module. They are not meant to
represent actual certification exam questions.
1. Which of the following data subjects’ rights provides data subjects with entitlements to certain information,
obtainable from the controller upon request?
112
European Data Protection
113
2. The right of access grants data
subjects' access to which of
the following types of
information? Select all that
Review apply.
question
A. The purpose of the processing
B. Retention periods
C. The means of data storage
D. Recipients of the personal data
Review question
2. The right of access grants data subjects’ access to which of the following types of information? Select all that
apply.
113
European Data Protection
114
3. Which is not listed by the
GDPR as a method for
restricting processing of
personal data?
Review
question A. Noting the restriction in the system
B. Moving the data to a separate system
C. Temporarily removing published data
from a website
D. Disabling the data management
system
Review question
3. Which is not listed by the GDPR as a method for restricting processing of personal data?
114
European Data Protection
115
4. Under which categories may a
data subject object to
processing personal data?
Review Select all that apply.
question
A. Establishment, exercise or defence of
legal claims
B. Direct marketing
C. Public interest or legitimate interest
D. Research or statistical purposes
Review question
4. Under which categories may a data subject object to processing personal data? Select all that apply.
115
European Data Protection
116
5. What is profiling?
Review
A. The processing of personal data
question gathered from social media sites
B. A form of automated decision-making
C. The act of enabling cookies
D. All the above
Review question
5. What is profiling?
116
European Data Protection
117
Learning objectives
Module 6:
Information • Define transparency as it relates to the
provision controller’s communications with the data
subject
obligations • List the information that should be
provided by the controller to the data
subject when personal data is collected
both directly and indirectly
• Define transparency as it relates to the controller’s communications with the data subject.
• List the information that should be provided by the controller to the data subject when personal data is
collected both directly and indirectly.
117
European Data Protection
Transparency
118
An intelligible and
easily accessible
form
Session notes
Transparency
• Article 29 Working Party ‘Guidelines on Transparency’: http://ec.europa.eu/newsroom/article29/item-
detail.cfm?item_id=622227
• ‘Transparency is an overarching obligation under the GDPR applying to three central areas: (1) the
provision of information to data subjects related to fair processing; (2) how data controllers communicate
with data subjects in relation to their rights under the GDPR; and (3) how data controllers facilitate the
exercise by data subjects of their rights’
• Data controllers are to communicate with individuals using …
• An intelligible and easily accessible form
• Article 12(1): ‘The information shall be provided in writing, or by other means, including, where
appropriate, by electronic means. When requested by the data subject, the information may be
provided orally’.
• Free of charge unless request is unfounded or excessive
118
European Data Protection
Transparency
119
An intelligible and Clear and plain
easily accessible language
form
Session notes
Transparency
• Data controllers are to provide notice using …
• Clear and plain language
• Adapted to the data subject
• Especially for children
119
European Data Protection
Transparency
120
An intelligible and Clear and plain Concise
easily accessible language
form
Session notes
Transparency
• Data controllers are to provide notice using …
• Concise communication
120
European Data Protection
121
Chat
Your outlook
What are the challenges around
making information accessible, clear
and concise?
121
European Data Protection
Privacy notice
122
A statement made to a data
subject that describes how the
organisation collects, uses, retains
and discloses personal data
Session notes
Privacy notice
• A statement made to a data subject that describes how the organisation collects, uses, retains and discloses
personal data
• Related terms: privacy statement, fair processing statement, privacy policy
• Large volume of required information = creative methods for communication
122
European Data Protection
123
Chat
123
European Data Protection
Transparency strategies
124
Layered privacy notice
‘Just-in-time’ notice
Standardised icons
Session notes
Transparency strategies
• For making privacy notices easier to navigate and more concise
• Layered privacy notice
• Multiple layers of increasingly detailed notices
• The Article 29 Working Party endorsement of up to three layers (so long as the sum total meets legal
requirements)
• Top layer: short notice—just key elements with links
• Second and third layers
• Condensed notice followed by a full notice
• Or full notice followed by FAQs and additional links
• ‘Just-in-time’ notice
• Delivered at or right before a user accepts a service or product
• Or when previously collected data is to be used for a new purpose
• Helps to facilitate meaningful choice
• Standardised icons (Article 12[7])
• Visualisation
• Challenge: to design readable icons
• European Commission
124
European Data Protection
When to notify
125
Controllers are required
• 125
to provide data subjects
with information about
processing prior to
collection
Session notes
When to notify
• Controllers required to provide data subjects with information about processing prior to collection
• Not always possible if obtained from indirect source (e.g., public records)
• Prior to further processing
• Article 13: Notice not required if data subject already has information
125
European Data Protection
126
Chat
Direct collection
• Identity and contact details of the controller and data protection officer
• Purpose and legal basis of processing
• Recipients of the personal data
• Intention to transfer data to a third country or international organisation
• Legal basis for intended international transfers, including the fact that either the receiving country has an
adequacy decision from the Commission or other appropriate safeguards are in place, as set out in Articles 46, 47
and 49; and how to obtain a copy of these safeguards
• Legitimate interests of the controller if the controller uses its legitimate interests as the legal basis for the
collection
• Storage period or the criteria used to determine the length of storage
• Data subjects’ rights to withdraw consent at any time, to request access, to rectification or restriction of
processing, and to lodge a complaint with a supervisory authority; plus, the fact that withdrawing consent does
not affect the lawfulness of processing that has already been completed if the controller uses consent as its legal
basis for collection
• Whether the provision of the personal data is a statutory or contractual requirement, as well as whether the data
subject is obliged to provide the data, and consequences of failing to do so
• Information about the use of automated decision-making
Indirect collection within a reasonable period after obtaining the data (no more than one month) or upon first
communication with the data subject when personal data is used to communicate
• See above requirements
• The categories of personal data concerned
• Plus the source of the data
126
European Data Protection
Exceptions
127
Subject to strict
criteria to ensure the
rights and freedoms
of the data subject
Session notes
Exceptions to information provision requirement for indirect collection
• Data subject already has the information
• Subject to strict criteria to ensure the rights and freedoms of the data subject
• If impossible or requires disproportionate effort
• Example from Article 29 Working Party’s ‘Guidelines on transparency’: ‘A large metropolitan
hospital requires all patients for day procedures, longer-term admissions and appointments to fill
in a Patient Information Form which seeks the details of two next-of-kin (data subjects). Given the
very large volume of patients passing through the hospital on a daily basis, it would involve
disproportionate effort on the part of the hospital to provide all persons who have been listed as
next-of-kin on forms filled in by patients each day with the information required under Article 14.’
• If it would render impossible or seriously impair the purpose of the data processing
• If national or EU laws require obtaining or disclosing data and provide appropriate measures to protect individuals’
interests
• If national or EU laws require that the personal data remain secret
127
European Data Protection
Enforcement action
128
Poland's DPA issues its first GDPR fine
(2019)
IAPP, “Poland's DPA issues its first GDPR fine,” Daily Dashboard, 1 April 2019,
https://iapp.org/news/a/polands-dpa-issues-first-gdpr-fine.
Session notes
Poland's DPA issues its first GDPR fine (2019)
Poland’s data protection authority has issued its first fine under the GDPR, TechCrunch reports. The Personal Data
Protection Office fined digital marketing company Bisnode 220,000 euros for its failure to fulfil its data subject rights
obligations under Article 14 of the GDPR. The DPA gave Bisnode three months to reach out to 6 million people in
order to meet its Article 14 information notification requirements. ‘The decision is seen as radical, as it interprets
Article 14 literally’, Oxford University Center for Technology and Global Affairs Research Associate Lukasz Olejnik
said. ‘UODO has taken a very principled position, arguing that the company business model is fully based on
processing scraped data, and that the company has taken a decision willingly’.
128
European Data Protection
129
1. True or false: A controller may
Review charge an administrative fee
question to data subjects if they
request that the information
provision be in an oral format.
Review question
NOTE: Review questions are intended to help reinforce key topics covered in the module. They are not meant to
represent actual certification exam questions.
1. True or false: A controller may charge an administrative fee to data subjects if they request that the
information provision be in an oral format.
129
European Data Protection
130
2. True or false: The
Review transparency principle states
question that detail is more important
than conciseness in a privacy
notice.
Review question
2. True or false: The transparency principle states that detail is more important than conciseness in a privacy
notice.
130
European Data Protection
131
3. What additional information
must be provided to data
subjects when the controller’s
necessity is being used as the
Review legal basis for processing?
question
A. Source of the data
B. Controller’s legitimate interest
C. Legal basis for transferring data
internationally
D. Recipients of the data
Review question
3. What additional information must be provided to data subjects when the controller’s necessity is being used
as the legal basis for processing?
131
European Data Protection
132
4. What information must be
provided to data subjects
when the personal data that
Review will be processed was
collected indirectly?
question
A. Source of the data
B. Storage period
C. Controller’s legitimate interest
D. Statutory or contractual requirement
Review question
4. What information must be provided to data subjects when the personal data that will be processed was
collected indirectly?
132
European Data Protection
133
5. What information must be
provided to data subjects
when their personal data will
be shared with an outside
Review organisation to provide them
with a promised service?
question
A. Intention to transfer data
internationally
B. Use of automated decision-making
C. Source of the data
D. Recipients of the data
Review question
5. What information must be provided to data subjects when their personal data will be shared with an outside
organisation to provide them with a promised service?
133
European Data Protection
134
6. What information must be
provided to data subjects in
all circumstances? Select all
Review that apply.
question
A. Purpose of processing
B. Data subjects’ rights
C. Identity of the controller
D. Controller’s legitimate interest
Review question
6. What information must be provided to data subjects in all circumstances? Select all that apply.
A. Purpose of processing
B. Data subjects’ rights
C. Identity of the controller
D. Controller’s legitimate interest
134
European Data Protection
135
Review 7. True or false: Information
question provision is required, even if it
necessitates disproportionate
effort.
Review question
135
European Data Protection
136
Learning objectives
136
European Data Protection
137
The landscape
1. Adequacy
decisions
2. Appropriate
safeguards
3. Derogations
Session notes
First, ensure legal basis to process personal data (discussed earlier in Module 4).
The landscape of cross-border data transfer options (discussed in more depth on following slides) should be
considered in order, one through three:
1. Adequacy decisions
2. Appropriate safeguards
3. Derogations
137
European Data Protection
138
Adequacy
• What is it?
• Who
determines it?
• What is the
criteria?
Session notes
Adequacy (Article 45)
• What is it?
• Adequate level of data protection for a country, territory, sector (e.g., health care or financial services)
and international organisation
• Who determines it?
• The European Commission (through implementing act and examination procedure)
• Mechanism for reviewing every four years
• Ability to repeal, amend and suspend
• Already existing decisions (from Directive) in force until amended, replaced and appealed
• What is the criteria?
• Respect of rule of law
• Access to justice
• International human rights standards
• General and sectoral laws and case law
• Effective and enforceable rights for individuals, including effective administrative and judicial redress
• Data protection rules, professional rules and security measures—including specific rules for onward
transfers
• Other international commitments or obligations
• With adequacy decision, no additional authorisation for transferring data required
• Countries the European Commission has deemed adequate for international data transfers
• Andorra, Argentina, Canada (For data protected by PIPEDA, applicable to commercial organisations but
not all forms of personal data), Faroe Islands, Guernsey, Israel, Isle of Man, Japan, Jersey, New Zealand,
Republic of Korea (South Korea), Switzerland, United Kingdom (GDPR and the LED), Uruguay
138
European Data Protection
139
EU-U.S. data transfers
Privacy Shield
Session notes
Case summary
Schrems v. Data Protection Commissioner
Mr. Schrems was a Facebook user in Austria. After revelations of NSA surveillance in the U.S. allegedly involving
Facebook’s cooperation, Schrems complained to the Irish SA that Facebook Ireland, the company’s European
subsidiary, was improperly transferring his data to the U.S. where it could be accessed by the NSA. The data transfers
from Facebook Ireland to the U.S. were allowed under the Safe Harbor adequacy decision. However, because the
European Commission had not assessed U.S. limits on government access to data for national security purposes in its
Safe Harbor adequacy determination, the CJEU struck down the adequacy determination as inconsistent with the
European right to privacy.
A subsequent ruling by the CJEU on July 16, 2020 invalidated the European Commission’s adequacy determination for
the EU-U.S. Privacy Shield, citing that:
• The U.S. surveillance programs are not limited to what is strictly necessary and proportional as required by Article
52 of the EU Charter on Fundamental Rights
• EU data subjects lack actionable judicial redress and don’t have the right to an effective remedy in the U.S., as
required by Article 47 of the EU Charter
• The CJEU decision also included findings regarding the need for case-by-case assessments of the sufficiency of
foreign protections when using standard contractual clauses, discussed in more detail later.
In March of 2022, the EU and U.S. announced they have reached an agreement on a new Trans-Atlantic Data Privacy
Framework. Currently, this agreement is in principle only, but aims to reestablish a legal mechanism for transfers of
EU personal data to the U.S.
139
European Data Protection
140
Chat
Resources:
https://iapp.org/news/a/cjeu-invalidates-eu-us-privacy-shield-sccs-remain-valid/
https://iapp.org/news/a/the-schrems-ii-decision-eu-us-data-transfers-in-question/
https://iapp.org/resources/article/guidance-notes-for-responding-to-schrems-ii/
140
European Data Protection
141
Chat
Discuss
How are personal data transfers from the
EU to the U.K. and the U.K. to the EU
dealt with since Brexit?
Session notes
2016: U.K. voted by narrow margin to leave EU
In January 2020, the European Parliament voted to end the U.K.'s membership in the EU. On 24 December 2020, days
before the Brexit transition period came to an end, the U.K. and EU reached a comprehensive agreement known as
the EU/U.K. Trade and Cooperation Agreement.
While the focus of the agreement is on trade and the movement of goods between the U.K. and European Economic
Area, the agreement has implications for the privacy practices of controllers processing U.K. and/or EEA personal
data.
Most significantly, the agreement foresees that during a period of maximum four months, which can be extended by
another two months, EEA personal data can continue to flow freely to the U.K., notwithstanding the fact that, so far,
the U.K. has not secured adequacy treatment under the EU GDPR. Conferring an adequacy decision on the U.K. will
require a proposal from the European Commission, an opinion from the European Data Protection Board, approval by
EU member state representatives and an adopting decision by the commissioners. The U.K. has already indicated that
it considers the EU data protection regime adequate so that personal data can continue to flow freely from the U.K.
to the EU.
The U.K. Data Protection Act was enacted 23 May 2018. The law replaces the Data Protection Act 1998 and sets new
standards for data protection in accordance with the GDPR. The U.K. has transposed GDPR through the Data
Protection Act 2018, which continues to be in force after Brexit. Consequently, the principles and rules of EU data
protection law continue to apply in the U.K. Organisations subject to both the U.K. Data Protection Act and EU GDPR
may also need to appoint representatives in each jurisdiction if they qualify as controllers located in a third country.
United Kingdom: The U.K. formally left the European Union on 1 January 2020. The Trade and Cooperation
Agreement signed between the EU and U.K. on 24 December 2020 allowed the transfer of personal data from the EU
to the U.K. to continue for up to six-months. The European Commission has now declared the U.K. adequate under
the GDPR and Law Enforcement Directive (LED).
Chat: Discuss
How are personal data transfers from the EU to the U.K. and the U.K. to the EU dealt with since Brexit?
Resources:
https://ec.europa.eu/commission/presscorner/detail/ro/ip_21_3183
https://ico.org.uk/for-organisations/guide-to-data-protection/guide-to-the-general-data-protection-regulation-
gdpr/international-data-transfer-agreement-and-guidance/
141
European Data Protection
142
Appropriate safeguards
• Standard data
protection clauses
• Approved codes
of conduct and
certification
mechanisms
• Ad hoc contractual
clauses
• International
agreements
Session notes
Appropriate safeguards (Article 46)
• Approved codes of conduct and certification mechanisms (discussed on following slides)
• Binding corporate rules (discussed later in module)
• Standard contractual clauses
• Also known as model clauses
• Adopted by the Commission or a national SA (and then approved by the Commission)
• For a company in EEA that wants to send data to company outside EEA
• Different types for data controllers and processors
• Standard form that is non-negotiable
• Most commonly used tool for appropriate safeguards
• In the wake of “Schrems II,” the legality of SCCs was upheld. However, companies must conduct case-by-
case assessments on the laws in each recipient country to ensure essential equivalence to EU law for
personal data being transferred under SCCs or BCRs. If the laws are not essentially equivalent, companies
must provide additional safeguards or suspend transfers. Such additional safeguards can involve additional
technical controls and contractual obligations on how to manage onward transfers and compelled
disclosures to authorities.
The process of assessing data protection equivalence is commonly referred to as conducting a “Transfer
Impact Assessment (TIA).” Note that this is NOT terminology used by the EDPB or European Commission,
but rather an industry-coined term. To facilitate this assessment, many organisations are relying on
questionnaires and adopting a combination of technical, organisational and contractual safeguards.
142
European Data Protection
143
Appropriate safeguards (continued)
• Standard data
protection clauses
• Approved codes
of conduct and
certification
mechanisms
• Ad hoc contractual
clauses
• International
agreements
Session notes
Appropriate safeguards (Article 46) continued
143
European Data Protection
144
Appropriate safeguards: codes of conduct
• Created/revised by associations and other bodies representing
controllers or processors for:
– GDPR application
– Helping controllers and processors demonstrate compliance
– Creating market efficiencies
– Facilitating international data transfers
• Binding and enforceable
Session notes
Codes of conduct: compliance-signalling tools for controllers and processors (Articles 40, 41).
• Created/revised by associations/other bodies representing controllers or processors for:
• GDPR application (see list of topics in Article 40)
• Helping controllers and processors demonstrate compliance
• Risks associated with data processing and security obligations
• Creating market efficiencies (e.g., saving a controller from having to conduct its own review of a
potential data processor’s systems and monitoring its ongoing compliance).
• Helps to streamline contracting and reduces time needed for internal legal review.
• Facilitating international data transfers
• Non-EU controllers and processors must also make ‘binding and enforceable commitments, via
contractual or other legally binding instruments, to apply those appropriate safeguards, including
as regards data subjects’ rights’
• Binding and enforceable
• Approved codes of conduct must enable ‘the mandatory monitoring of compliance with its provisions’ by
accredited monitoring bodies
• When a controller or processor infringes the code, an accredited body can suspend or exclude the
infringing party from the code, notifying the supervisory authority of the proceeding
• Adherence with a code is a factor to be considered in assessing an administrative fine
EDPB Guidelines 04/2021 includes a checklist of elements to be included in a code of conduct intended for transfers
Resource
Guidelines 04/2021 on Codes of Conduct as tools for transfers, Adopted on 22 February 2022
https://edpb.europa.eu/system/files/2022-
03/edpb_guidelines_codes_conduct_transfers_after_public_consultation_en_1.pdf
144
European Data Protection
145
Appropriate safeguards: certification mechanisms
• May be issued by accredited certification bodies, competent
supervisory authorities and the EDPB for:
– Assisting controllers and processors in same situations as through
codes of conduct
– Additionally, demonstrating compliance with Article 25—
data protection by design and by default
• Good for no more than three years (may be renewed)
• Consequences for noncompliance
Session notes
Certifications: recognised by the GDPR (along with seals and marks) as acceptable mechanisms for demonstrating
compliance (Articles 42, 43)
• ‘Shall be voluntary and available via a process that is transparent’
• Does not serve to ‘reduce the responsibility of the controller or the processor for compliance’
• May be issued by accredited certification bodies, competent supervisory authorities and the EDPB for:
• Assisting controllers and processors in same situations as through codes of conduct
• Additionally, demonstrating compliance with Article 25—data protection by design and by default
• Good for no more than three years (may be renewed if conditions and requirements are still met)
• Consequences for non-compliance
• Accredited certification body responsible for withdrawing certification in the event of noncompliance
• Must inform the supervisory authority and provide reasons
• Certification is a factor to be considered in assessing an administrative fine
145
European Data Protection
146
Appropriate safeguards: binding corporate rules
Session notes
Appropriate safeguards: binding corporate rules (BCRs)
• Who
• Companies engaged in joint economic activity
• Corporate groups and groups of enterprises
• Controllers and processors
• What?
• Internal and legally binding rules
• Expressly conferred enforceable rights of data subjects
• How?
• Former Article 29 Working Party: published separate recommendations for BCR applications of controllers
and processors, including standard application forms
• Approval by supervisory authorities
• Article 47: Detailed conditions for transfers
• Why?
• Flexibility
• Low administrative burden post implementation
• Different versions of BCRs for controllers and processors
146
European Data Protection
147
Derogations
• Consent
• Performance
of contract
• Public interest
• Establishment,
exercise or defence
of legal claims
• Vital interests
• Transfer from register
• Legitimate interests
Session notes
Derogations (Article 49)
• An exemption from prohibition on transferring personal data outside EEA
• When a country outside EEA does not have adequacy decision and appropriate safeguards are not in place
• Last resort for limited circumstances/specific conditions; strict criteria to be narrowly interpreted
• Explicit consent from data subject
• Data subject must understand possible risks to transferring their personal data
• Necessary for the performance of a contract and/or conclusion of a contract with the data subject
• Must be no way to fulfil the contract unless data is transferred
• Public interest
• Personal data may be transferred outside EEA for reasons of public interest recognised by EU or
member state law only
• Establishment, exercise or defence of legal claims
• Designed to cover international litigation scenarios
• Protection of vital interests of the data subject or other persons
• Theme that runs through all forms of personal data processing
• Designed for emergency situations (e.g., if individual must be provided with emergency medical
care)
• Transfer from a register of public information
• Must comply with any restriction on access to or use of information
• Must honour conditions imposed by the organisation that compiled the register
• Legitimate interests of controller
• Allows international data transfer in wider set of circumstances
• Transfer must be non-repetitive and concern limited number of individuals
• Narrow provisions: Protection of individuals’ rights, assessment and documentation, suitable
safeguards, notification to data subject and SA of transfer
Resource: Guidelines 2/2018 on derogations of Article 49 under Regulation 2016/679,” Adopted 25 May 2018
147
European Data Protection
148
Restrictions
• Foreign law
enforcement
requests
• Important reasons
of public interest
Session notes
Restrictions
• Foreign law enforcement requests (mutual assistance treaty)
• ‘Any judgment of a court or tribunal and any decision of an administrative authority of a third country
requiring a controller or processor to transfer or disclose personal data may only be recognised or
enforceable in any manner if based on an international agreement, such as a mutual legal assistance
treaty, in force between the requesting third country and the Union or a Member State’ (Article 48)
• Important reasons of public interest
• ‘In the absence of an adequacy decision, Union or Member State law may, for important reasons of public
interest, expressly set limits to the transfer of specific categories of personal data to a third country or an
international organisation. Member States shall notify such provisions to the Commission’ (Article 49[5])
148
European Data Protection
149
Recommended steps
Session notes
In June of 2021, the European Data Protection Board (EDPB) published step-by-step recommendations for data
transfers in the wake of “Schrems II.”
Know, document and map the personal data being transferred. You must ensure that it is given essentially
equivalent level of protection and verify that the data being transferred is adequate, relevant and limited to what is
necessary in relation to purposes for which it is processed.
Identify the transfer tools you are relying on, listed under Chapter V GDPR. If the country, region or sector is deemed
adequate, no further steps need to be taken. Otherwise, rely on a transfer tool listed under Articles 46 GDPR. Re:
Derogations (provided for in Article 49 GDPR) should be the exception not the rule.
149
European Data Protection
150
Recommended steps
Session notes
Step 4: Identify and adopt supplementary measures
• Identify and adopt supplementary measures that are necessary to bring the level of protection of the data
transferred up to EU standard of essential equivalence
• This step is necessary when step 3 reveals that the third-country legislation impinges on the effectiveness of the
Article 46 transfer tool. The EDPB provides a list of measures in Annex 2:
• EDPB outlines additional safeguards and scenarios
• Technical safeguards include guidance on encryption, pseudonymizations
• Contractual safeguards - EDPB covers:
• Transparency
• Enhanced audits
• Notification
• Challenge government access to data in court
• Contractual agreements to enable data subject rights
• Organisational measures: internal policies with groups of enterprises, training staff, transparency policies,
etc.
• If no supplementary measure is suitable, you must avoid, suspend or terminate the transfer
Step 5: Take any formal procedural steps the adoption of the supplementary measure may require
• Document approach and seek authorization where required by the chosen transfer mechanism
Step 6: Re-evaluate the level of protection afforded to the transferred data and monitor any developments that may
affect it at appropriate intervals .
Resource:
“Recommendations 01/2020 on measures that supplement transfer tools to ensure compliance with the EU level
of protection of personal data,” Adopted 18 June 2021
150
European Data Protection
151
1. Arrange the options for
international data transfers in
the order that they should be
Review considered.
question
A. Appropriate safeguards
B. Adequacy decisions
C. Derogations
Review question
NOTE: Review questions are intended to help reinforce key topics covered in the module. They are not meant to
represent actual certification exam questions.
1. Arrange the options for international data transfers in the order that they should be considered.
A. Appropriate safeguards
B. Adequacy decisions
C. Derogations
151
European Data Protection
152
2. Which of the following options
for international data
transfers is a determination by
the European Commission that
Review a third country has achieved
question an EU-level of personal data
protection?
A. Appropriate safeguard
B. Derogation
C. Adequacy decision
Review question
2. Which of the following options for international data transfers is a determination by the European
Commission that a third country has achieved an EU-level of personal data protection?
A. Appropriate safeguard
B. Derogation
C. Adequacy decision
152
European Data Protection
153
3. Which of the following
countries have been deemed
adequate by the European
Commission? Select all that
Review apply.
question
A. Argentina
B. New Zealand
C. Switzerland
D. Uruguay
Review question
3. Which of the following countries have been deemed adequate by the European Commission? Select all that
apply.
A. Argentina
B. New Zealand
C. Switzerland
D. Uruguay
153
European Data Protection
154
4. Which of the following are
appropriate safeguards for
international data transfers?
Select all that apply.
Review
question A. Binding corporate rules
B. Standard contractual clauses
C. Public interest
D. Approved codes of conduct or
certification mechanisms
Review question
4. Which of the following are appropriate safeguards for international data transfers? Select all that apply.
154
European Data Protection
155
5. Which appropriate safeguards
allow large multinational
companies to adopt a policy
suite with rules for handling
Review personal data?
question
A. Ad hoc contractual clauses
B. Reliance on international agreements
C. Standard contractual clauses
D. Binding corporate rules
Review question
5. Which appropriate safeguards allow large multinational companies to adopt a policy suite with rules for
handling personal data?
155
European Data Protection
156
6. True or false: Criteria for
Review derogations are strict and
should be interpreted
question narrowly.
Review question
6. True or false: Criteria for derogations are strict and should be interpreted narrowly.
156
European Data Protection
Learning objectives
157
• Discuss the legal bases and data protection
considerations for employers processing
employees’ personal data
• Determine applicability of EU data protection
Module 8: law and compliance requirements for
Compliance surveillance, particularly communications
data, CCTV, biometric data and location data
considerations • Determine applicability of EU data protection
law and compliance requirements for direct
marketing, particularly online behavioural
advertising
• Determine applicability of EU data protection
law and compliance requirements for internet
technology and communications, particularly
cloud computing, web cookies, search
engines, artificial intelligence and social
networking services
• Discuss the legal bases and data protection considerations for employers processing employees’ personal
data.
• Determine applicability of EU data protection law and compliance requirements for surveillance, particularly
communications data, CCTV, biometric data and location data.
• Determine applicability of EU data protection law and compliance requirements for direct marketing,
particularly online behavioural advertising.
• Determine applicability of EU data protection law and compliance requirements for internet technology and
communications, particularly cloud computing, web cookies, search engines, artificial intelligence and social
networking services.
157
European Data Protection
Employer compliance
158
Processing
employee
personal data
Surveillance
Session notes
The mix of EU data protection law with local employment law can make compliance in the context of employment
complicated.
• Under Article 88 of the GDPR, member states may by law or collective agreements provide for more specific
rules around processing employees’ personal data; these rules must include suitable and specific measures to
safeguard the data subject’s:
• Human dignity
• Legitimate interests
• Fundamental rights
• with particular regard for:
• Transparency of processing
• Transfer of personal data within a group of undertakings or a group of enterprises engaged in a joint
economic activity
• Monitoring systems
• Local employment law varies considerably across the EU
• Additionally, an employer may be obligated to communicate with a trade union or works council
• In certain jurisdictions, works councils have considerable power over the processing of employees'
personal data
• Compliance may require notifying, consulting with and seeking approval from works councils
158
European Data Protection
159
Processing
employee
personal data Employer compliance
Surveillance Legal basis under the GDPR
Session notes
Under the GDPR, first there must be a lawful basis for collecting and processing personal data. As introduced in
Module 4, the legal bases are the grounds employers may rely on to process employee personal data.
• Fulfilment of an employment contract: Collecting and using bank account information to process salaries
• Legal obligation: Sharing salary information with tax authorities
• Must be an obligation under EU or member state law
• Legitimate interests of the employer: Migrating employee information from one data management system to
another
• Cannot be adverse to employees’ rights and freedoms
• Cannot be used as grounds for processing special categories of data
• Cannot be relied on by public authorities
• Consent?
• Difficult to prove because of the unequal distribution of power between the employer and employee
• Additionally, the processing of employee data may be unlawful or unfair under local law, even if the
employee has consented
• Yet, under some local labour laws, employers are obligated to obtain consent from employees to process
their personal data
159
European Data Protection
Processing sensitive
160
employee data
Processing
employee
personal data • Establish, exercise or
defend legal claims
Surveillance • Carry out obligations and
exercise specific rights
Direct under employment, social
marketing security and social
protection law
Internet
technology and
communications
Session notes
Where sensitive personal data on employees is collected and processed, employers must comply with one of the
exceptions specified in Article 9 of the GDPR.
• Consent
• Not likely legal grounds for processing sensitive employee data
• Establish, exercise or defend legal claims
• May be necessary, such as an employee’s claim of unfair dismissal
• Carry out obligations and exercise specific rights under employment, social security and social protection law
• Where authorised by EU or member state law or collective agreement
• In a number of jurisdictions, employment and labour laws restrict the extent to which sensitive employee
data can be processed
• Local data protection authorities may issue authorisations for specific processing activities
160
European Data Protection
Storage of
161
Processing
personnel records
employee
personal data
Archive
Surveillance
Internet Application
Geolocation Health and
data safety check
technology and
communications
Employment lifecycle
Session notes
Employers process personal data throughout the employment lifecycle for broad reasons; however, records that
contain personal data should not be kept longer than necessary.
From the moment an individual applies for a position, the prospective employer begins collecting personal data.
After employment has been terminated, an organisation’s legitimate reason to retain an individual’s data diminishes.
Local laws may affect obligations, potentially requiring the employer to retain employee data.
• For example, some health and safety laws require records relating to health and safety checks on individuals who
operate machinery to be retained
• If an organisation is obligated to retain personal data on former employees, generally these records should be
archived, and internal access should be limited
161
European Data Protection
BYOD
162
Processing
employee Provide notice to employees
and implement a BYOD policy
personal data
Session notes
BYOD
• Bring your own device (BYOD) is an issue relevant to every stage in the employment lifecycle
• BYOD poses certain data protection compliance issues since the employer remains responsible as a controller for
any personal data processed on the employee’s device for work-related purposes
• BYOD programmes open the door to greater risks to data protection, including data breaches, which could result
in substantial penalties and fines under the GDPR
Employers must not use background checks to create blacklists, which are generally illegal.
162
European Data Protection
Employee monitoring
163
Processing
employee
personal data
Surveillance
Direct
marketing
Internet
• Legal requirements
technology and
communications • Types of monitoring
• Necessity, legitimacy, proportionality
and transparency
Session notes
Legal requirements
• Member state data protection law and local employment law
• GDPR: Employees’ rights and freedoms balanced against rights of employer; alternatives to monitoring always
considered
• Prevention rather than detection; e.g., blocking websites employer does not want employee to visit
Types of monitoring
• Background checks (e.g., verifying education background)
• Data loss prevention (DLP) technology
• Tools used to protect IT infrastructure and confidential business information from external and internal
threats
• Inevitably involves processing personal data
• Whistleblowing schemes
• U.S. Sarbanes-Oxley Act (2002): U.S. companies must have system in place to receive anonymous
complaints about potential wrongdoing
• Conflicting obligations for U.S. companies with EU subsidiaries/affiliates: protect identity of whistle-
blower (SOX) versus protect personal data of accused (EU)
Personal data about employees collected through monitoring must be held security, accessed only by those within
the organisation with legitimate reason to view it and deleted when there’s no longer a need to hold onto it (may be
business need to retain it).
163
European Data Protection
Employee monitoring
164
Processing Compliance at a glance
employee
personal data
Surveillance
Necessity Legitimacy
Direct Would another, Does the employer
less intrusive method have lawful grounds for
marketing fulfil the need? processing the data?
Internet
technologies and Proportionality Transparency
Is the monitoring Have employees been
communications informed of the
proportionate to
the issue? monitoring?
Session notes
For review purposes
164
European Data Protection
Legal surveillance
165
Processing
employee
Respect ‘the essence of Be a ‘necessary and
personal data the fundamental rights proportionate measure
and freedoms’ in a democratic society’
Surveillance
Direct Article 23
marketing (GDPR)
Internet
technology and
Data
communications subject
rights
Session notes
Surveillance:
• The observation of an individual or group of individuals
• May be covert or carried out openly, conducted in real time or by access to stored material
Technology-based surveillance examples: Social networks analysis and mapping, data mining and profiling, aerial
surveillance, satellite imaging, telecommunications surveillance, CCTV cameras, biometric surveillance, geolocation
technologies
EDPB ‘Guidelines 10/2020 Restrictions under Article 23 GDPR,’ Adopted 13 October 2021
• Restriction of data subject rights can only occur when the following interests are at stake and the restrictions
safeguard such interests:
• National security, defence and public security
• Prevention, investigation, detection and prosecution of criminal offences or the execution of criminal
penalties
• Other important objectives of general public interest
• Protection of judicial independence and judicial proceedings
• Prevention, investigation, detection and prosecution of breaches of ethics for regulated professions
• Monitoring
• Protection of data subject rights
• Enforcement of civil law claims
165
European Data Protection
Public versus
166
Processing private surveillance
employee
personal data • Public and state agencies
– Charter of Fundamental Rights
Surveillance
– LEDP Directive
Direct • Private entities
marketing
– Legitimate purposes
Internet – National laws
technology and
communications
Session notes
Developing technologies continue to break down barriers to surveillance. While public authorities and private-sector
entities may have lawful purposes for surveillance, the broadening landscape of available data means broadening
scope for invasion of privacy as well.
Public and state agencies for national security or law enforcement purposes
• Must be conducted in a manner to respect individual rights enshrined in the Charter of Fundamental Rights,
specifically the right to a private and family life (Article 7) and protection of personal data (Article 8)
• The Law Enforcement Data Protection Directive (LEDP Directive)
• Recital 66: Although the processing of personal data must be lawful, fair and transparent, this should not
prevent law enforcement authorities from carrying out activities (e.g., covert investigations and video
surveillance) to:
• Prevent, investigate, detect and prosecute criminal offences
• Safeguard against and prevent threats to public security
• Key requirements: lawfulness, necessity, proportionality and regard for legitimate
interests of the natural person
• Laws that fail to appropriately take into account the rights and freedoms of data subjects may be struck down by
the CJEU
Private entities
• Surveillance by private entities must be based on legitimate purposes
• In addition to the GDPR, national laws may concern confidentiality, privacy, data protection and other civil
rights; e.g., employment law
166
European Data Protection
Communications data
167
Processing
employee
personal data CC & BCC Message
delivery
Surveillance time
Message
creation
Direct time Priority
marketing
Content data
Internet To/from Reply time
technology and Metadata
communications Data about data
Session notes
Historically, communication surveillance has involved traditional surveillance activities, such as interception of
postal services and human spies; however, surveillance of electronic communications is more prevalent today.
Personal data generated from electronic communications is categorised as either the content of a communication or
the metadata.
Content data
• Content of a communication
• Protected by the right to freedom of expression, recognised by laws around the world, including the EU
• Examples: a conversation between parties to a call, words comprising an SMS message, an email subject line,
words in the main body of an email, attachments to an email
Metadata
• ‘Data about data’: Information generated or processed as a consequence of a communication’s transmission
• Provides context to content
• Falls within the GDPR’s definition of personal data because it can be used to identify an individual
• Examples
• Traffic data: Calling and called numbers in relation to a telephone call
• Location data: Latitude, longitude and altitude of a user’s equipment, direction of travel, level of
accuracy of location information, identification of the network cell (Cell ID) in which a user device is
located at a certain time, time and location information was recorded
• Subscriber data: Name of a subscriber, contact details, payment information
167
European Data Protection
168
Processing
User location:
employee Thisbe’s Café
personal data
What did your
Surveillance doctor say?
Direct
Received:
marketing Monday, 11am
Internet
technology and
communications
Session notes
The ePrivacy Directive’s official title is Directive 2002/58, but it is known by different names, including the Cookie
Directive and the Privacy and Electronic Communications Directive.
It sets out rules governing the processing of location, content and traffic data over a public electronic
communications network or publicly available communications system—in other words, data passing over public
telephone or internet carriers, or services that use a public communications network.
• Location data
• For collection of individuals’ precise location-based data, opt-in consent is generally required (with the
exception of carriers who need the data to provide the service)
• Content data
• Article 5(1): The confidentiality of the content of communications must be ensured and cannot be
intercepted or disclosed to third parties unless there is consent from all users
• Article 15(1): Member states can introduce some exemptions if necessary for very limited purposes
• Traffic data
• Access to traffic data is limited
• Telecommunications carriers can process traffic data for the purpose of conveying communications and
possibly for some limited marketing activities with the user’s consent
• Private networks (e.g., a corporate intranet)
• ePrivacy rules do not apply
• Monitoring considerations, as discussed earlier in this module, are still relevant
• Provision allowing for the interception of a communication when an organisation has a lawful business purpose for
accessing data going through their public networks
• Member states, under their individual laws, may pass legislation defining lawful business purposes
168
European Data Protection
CCTV
169
Processing • Lawfulness of
employee processing
personal data
• DPIA
Surveillance • Prior checking
• Proportionality
Direct
marketing • Information
provision
Internet
• Individual rights
technology and
communications • Measures to
protect personal
data and rights of
individuals
Session notes
Closed circuit television—and other modes of video surveillance (CCTV)
• Lawfulness of processing: Prior to carrying out surveillance, the controller should determine the lawfulness of
processing (consent likely not possible), including for biometric data (Article 9)
• A controller may need to rely on a provision in member state law to conduct video surveillance in a
particular context
• A decision to use CCTV should be made only if other, less-intrusive solutions that do not require image
acquisition have been considered and found to be clearly inapplicable or inadequate for the intended
lawful purpose (A DPIA should document these investigations and inadequacies)
• Data protection impact assessment: A DPIA is required in some circumstances—if the video surveillance is
considered to be high risk, if it involves the systematic monitoring of a publicly accessibly area on a large scale, or
if video surveillance has been included by the relevant supervisory authority on a list of data processing
operations that require a DPIA
• Prior checking: In many countries, using CCTV triggers the requirement to notify the local regulator and, in some
circumstances, seek authorisation
• Proportionality: The particular system and technology used for surveillance should be proportional to the purpose
(e.g., Remote control, zooming functionality, facial-recognition, and sound-recording may not be necessary)
• Key aspects of the CCTV and processing of its footage must be proportionate to the purpose, such as the
visual angle so that monitoring of irrelevant spaces is minimised
• Information provision: For overt video surveillance, controllers must comply with the transparency requirement
of the GDPR where the controller may not have a direct relationship with the affected data subjects (e.g., camera
covering large, public space)
• As the information that may be made available via a sign is unlikely to contain all the details prescribed by
Articles 13 and 14 of the GDPR, the controller should be prepared to provide the full information
necessary when a data subject makes contact
• Individual rights: Under the GDPR, data subjects have rights related to the processing of their personal data (e.g.,
right to access, yet may pose the challenge of protecting others’ privacy)
• Measures to protect the personal data and rights of individuals: These may include staff training, a CCTV policy,
and regular reviews to ensure compliance
169
European Data Protection
Location data
170
Processing
employee Advertising/
Social networking
personal data marketing
Navigation
Entertainment
Surveillance
Information
Security
Direct Gaming
marketing Emergency
Tracking response
Internet goods/ people services
technology and
Payment Commerce
communications
Session notes
Location-based services (LBS) utilise information about location to deliver a wide array of applications and services.
LBS may be derived from satellite network-generated data, such as GPS; cell-based, mobile network-generated data;
and chip-card generated data.
Location data is referred to as an identifier in the GDPR’s definition of personal data. If location data can be used
alone or in combination with other information to identify someone, then it should be considered personal data.
Google has identified three main areas of location data that it uses to deliver its services:
• Implicit location information, such as search terms
• Internet traffic information, such as IP addresses
• Device-based location services, such as Google Maps
170
European Data Protection
Biometric data
171
Processing
employee Examples:
personal data • DNA
• Fingerprints
Surveillance • Retina and
eye patterns
Direct • Voice
marketing • Gait
Internet
technology and
communications
Session notes
Biometrics data defined in Article 4(14) of the GDPR as ‘personal data resulting from specific technical processing
relating to the physical, physiological or behavioral characteristics of a natural person, which allow or confirm the
unique identification of that natural person, such as facial images or dactyloscopic data’.
Identification: Who are you? (i.e., photographs loaded up to social media; identification of individuals through facial
recognition)
Authentication: Are you who you claim to be? (i.e., fingerprint to authenticate identity when accessing a mobile
device, computer; palm print to access a secure building)
Article 9: For biometric data to be included as a special category, the purpose for processing must be for uniquely
identifying a natural person
171
European Data Protection
Direct marketing
172
Processing Definition
employee
personal data
Surveillance
Direct
marketing
Internet
technology and
communications
Session notes
What is direct marketing?
• Former Article 29 Working Party: To fall under the scope of direct marketing, a communication, by whatever
means of any advertising or marketing material, should be directed to particular individuals
• Messages that do not process personal data to communicate the marketing message or those that are purely
service-related in nature are not direct marketing
172
European Data Protection
173
Chat
173
European Data Protection
GDPR
174
Processing Direct marketing rules
employee
personal data
Surveillance
• All direct marketing
Direct
communications
marketing
• Targeted online advertising
Internet
• Absolute right to object to
technology and any form of direct
communications marketing
• Controller requirements
Session notes
Direct marketing is regulated both by the GDPR and the ePrivacy Directive (discussed on the following slide). The
GDPR:
• Applies to all direct marketing communications, regardless of channel
• Applies to online advertising targeted at individuals based on their internet browsing history
• Provides individuals an absolute right to object to any form of direct marketing at any time
• Extends to processing based on legitimate interest
• Requires controllers to:
• Explicitly and clearly inform individuals of their right to opt out at the time of the first communication
with them
• Allow individuals to opt out across all marketing channels
• Honour opt-out requests in a timely fashion and at no cost to the individual
• Remove personal data and profiling after an individual has opted out (unless retention of personal data is
strictly required)
• Controllers should suppress rather than delete contact details because they do not want to risk
reacquiring that individual’s details later and beginning marketing to them again
• Ensure all compliance requirements under the GDPR are met
Some member states require controllers to cleanse their contact lists against applicable national opt-out registers
before sending direct marketing.
174
European Data Protection
ePrivacy Directive
175
Processing direct marketing rules
employee
personal data
Surveillance
Postal Telephone Electronic mail
marketing marketing marketing
Direct
marketing
Internet
technology and
communications
Session notes
In addition to the GDPR, direct marketing is regulated by the ePrivacy Directive, which applies to ‘digital’ marketing
communications—direct marketing communicated over electronic communications networks, such as by phone, fax,
email and SMS or MMS. The ePrivacy Directive:
• Specifies rules that impact the use of online behavioural advertising
• Differs in interpretation and enforcement across member states (e.g., B2B marketing)
• Requires that specific information is provided to recipients (e.g., a valid address to which they can send an opt-
out request that is appropriate to the medium of the marketing communication)
ePrivacy Directive
176
Direct marketing rules at a glance
Processing
employee
personal data
Marketing Business-to- Business-to-
channel consumer business
Surveillance
requirements requirements
Direct Post Opt-out Opt-out
marketing
Phone Opt-out Opt-out
Internet (check register)
technology and Email and SMS Opt-in (unless Opt-out
communications opt-out rule
applies)
Session notes
For review purposes
176
European Data Protection
Web cookies
177
Processing
employee
• GDPR
personal data
– Recital 30
Surveillance
– Determining the
Direct controller
marketing – Consent
Session notes
• GDPR
• Recital 30: Where the information collected from cookies is personal data, its collection and analysis
amount to processing subject to the GDPR
• Who is a controller?
• The website operator is a controller of the personal data gathered by its own first party cookies
• Where the third party determines the means and purposes of processing of the personal data
gathered from its third-party cookies, it is a controller
• Many organisations now rely on consent to process personal data in the form of online identifiers
• Article 4: Consent is any ‘freely given, specific, informed and unambiguous indication of a data
subject’s wishes’
• Article 7: Consent must be presented separate from other matters in ‘an intelligible and easily
accessible form, using clear and plain language’
• ePrivacy Directive
• Article 5(3): Under member state law, organisations must obtain prior informed consent for storage or
access to information stored on a user’s terminal equipment
• ‘Strictly necessary’ cookies and those used solely for carrying out communication transmission are exempt
from the consent requirement
• Prior to the GDPR, valid consent under the ePrivacy Directive—as implemented in member state laws—was widely
interpreted to be met with a visible pop-up notice announcing the use of cookies, followed by the user’s
continued use of the site. Given the GDPR’s requirement of ‘specific, informed, and unambiguous indication’ of
consent, many organisations now are requiring users to affirmatively interact with the cookie banner, if not also
use a consent tool. The CJEU recently clarified cookie consent requirements in that consent: must be obtained
through active behavior; applies to processing and storing non-personal data information; include information
regarding cookie duration and access by third parties
In addition to provisions under EU law, best practices around the use of cookies include storing only encrypted
personal data, providing notice, using persistent cookies only if justified by the need, and setting reasonable
expiration dates for cookies.
177
European Data Protection
Online behavioural
178
Processing advertising (OBA)
employee
personal data
football gear
Surveillance
Direct
marketing Popular products
½ OFF!
Internet
technology and
communications • GDPR
SALE!
• ePrivacy
Directive
Session notes
OBA is website advertising targeted at individuals based on the observation of their behaviour over time.
GDPR
• Clearly identifies information collected for OBA purposes as personal data; its definition of personal data
specifically provides ‘online identifier’ as an example
• According to the former Article 29 Working Party, all parties to a third-party ad network relationship potentially
may attract compliance responsibilities under the GDPR (the ad network itself, which will often qualify as a
controller; a website publisher, which may qualify as a joint controller; and advertisers, which may qualify as
independent controllers)
ePrivacy Directive
• Will generally apply to OBA regardless of whether or not OBA information collected from individuals constitutes
personal data
• Article 5(3) (amended, 2009): The use of cookies to store or access information in an individual’s computer is
allowed only on the condition that the individual concerned has given their consent, having been provided with
clear and comprehensive information
178
European Data Protection
Cloud computing
179
Processing When may a cloud services supplier
employee be considered a controller?
personal data
• When it determines substantial and
Surveillance
essential elements of the means of
Direct processing (some circumstances)
marketing
• When it processes data for its own
Internet purposes
technology and
communications • When it determines aspects of the
processing outside the controller’s
instructions
Session notes
Because a controller has significantly more obligations under the GDPR, distinguishing between the controller and
processor in a customer-cloud services supplier relationship is essential. This distinction may not always be clear.
A cloud services supplier may determine technical and organisational means of processing (for example, hardware)
and remain a processor.
Even if the cloud provider is not directly subject to the GDPR, the cloud provider’s customer may be subject to it, in
which case the data processing contract should contain required controls and obligations as set out in the GDPR.
The EU does not have specific legislation regarding cloud computing; however, the technology-neutral GDPR, where
applicable, sets out controller and processor obligations. Determining whether the GDPR applies to cloud computing
services, as according to Article 3 of the GDPR, may pose challenging for cloud service providers. As covered in
Module 4, Article 3 applies where either:
• The processing relates to the activities of an EU establishment of the controller
• Or the processing relates to offering goods or services to individuals in the EU, or to monitoring their behaviour,
even when the controller or processor is not established in the EU
179
European Data Protection
Search engines
180
Processing Who are controllers of personal data?
employee
personal data Search engines Search engine
marketers
Surveillance
Direct
marketing
Internet
technology and
communications
Session notes
Search engines are services that find information on the internet. They process large volumes of data, routinely
including user IP addresses, cookies, user log files and third-party web pages.
180
European Data Protection
181
Processing
employee
personal data
Surveillance
Direct
marketing
Internet
technology and
communications • Who is a controller?
Session notes
Social networking services (SNS) create opportunities for various parties and individuals to collect and use personal
data. As a result, there may be multiple controllers.
Who is a controller?
• Social networking services because they provide platforms for publishing and exchanging personal information, as
well as determine the use of personal information for advertising purposes
• Authors of applications designed for SNS platforms that provide services in addition to the SNS
• Users who act on behalf of an organisation
• User knowingly extend access to personal data beyond selected contacts
181
European Data Protection
182
Chat
EDPB “Guidelines 8/2020 on the targeting of social media users,” Adopted 13 April 2021
• Identifies the actors and roles of social media: Users, social media providers, targeters and other relevant actors
(Marketing service providers, ad networks, data brokers and data analytics companies)
• Users may be targeted on the basis of:
• Provided data
• Must be able to demonstrate a legal basis for processing via consent or legitimate interest
• Observed data
• Users must be provided with clear and comprehensive information about the purposes of
processing prior to giving consent
• Inferred data
• Typically involves profiling. In order for processing to be lawful, the controller must conduct case-
by-case assessment (will targeting have a “similarly significant effect” on a data subject), obtain
consent and ensure requirements of Article 5 are observed.
182
European Data Protection
Artificial intelligence
183
Simulation of human intelligence created by
Processing machines and computers
employee • Ability to learn, reason and evaluate to
personal data make automated decisions
Surveillance
Direct
marketing
Internet
technology and
communications
Session notes
Artificial intelligence is the simulation of human intelligence created by machines and computers. With the ability to
learn, reason and evaluate, AI can replace humans and act on their own to make automated decisions. Machine
learning, which is a type of AI, is driven by available data. The machine learns to identify patterns in the data and
applies that to new data. This enables better understanding of human behaviors and activities.
Provisions within the GDPR affect the AI functions of automated decision-making. Article 22, discussed in Module 5,
highlights data subject rights in connection with profiling and automated decision-making.
Organisations implementing AI technology will want to ensure privacy regulations are being met in conjunction with
the technology.
The EU initiative on AI includes:
• Boosting the technological and industrial capacity and AI uptake across the public and private sectors
• Preparing for socio-economic changes as AI modernises education, training, labour markets and social protection
systems
• Focusing on high-risk uses of AI
• Restricting certain practices, such as use of facial recognition in publicly accessible places for law enforcement
• Guaranteeing human oversight of AI systems
• Ensuring ethical principles
• Respect for human autonomy, prevention of harm, fairness and explicability
Resources:
European Commission: Strategy for Artificial Intelligence
https://digital-strategy.ec.europa.eu/en/policies/strategy-artificial-intelligence
183
European Data Protection
184
1. Which types of laws should be
considered when processing
employees’ personal data?
Review Select all that apply.
question
A. Local employment law
B. EU data protection law
C. Member state data protection law
Review question
NOTE: Review questions are intended to help reinforce key topics covered in the module. They are not meant to
represent actual certification exam questions.
1. Which types of laws should be considered when processing employees’ personal data? Select all that apply.
184
European Data Protection
185
2. Under the GDPR, which legal
basis for processing personal
data would be difficult to use
Review for processing employee data?
question
A. Fulfilment of an employee contract
B. Legal obligation
C. Legitimate interests of the employer
D. Consent
Review question
2. Under the GDPR, which legal basis for processing personal data would be difficult to use for processing
employee data?
185
European Data Protection
186
3. True or false: Some employers
may be required to consult
with works councils and/or
Review trade unions to process
question employees’ personal data.
Review question
3. True or false: Some employers may be required to consult with works councils and/or trade unions to process
employees’ personal data.
186
European Data Protection
187
4. True or false: BYOD policies
are designed to protect
employees’ personal data only.
Review
question
Review question
4. True or false: BYOD policies are designed to protect employees’ personal data only.
187
European Data Protection
188
5. True or false: Alternatives to
employee monitoring should
always be considered first.
Review
question
Review question
188
European Data Protection
189
6. The ePrivacy Directive governs
the processing of which types
of data? Select all that apply.
Review
question A. Location data
B. Content data
C. Traffic data
Review question
6. The ePrivacy Directive governs the processing of which types of data? Select all that apply.
A. Location data
B. Content data
C. Traffic data
189
European Data Protection
190
7. True or false: The ePrivacy
Directive governs the
processing of data through
Review both private and public
question carriers and communications
networks.
Review question
7. True or false: The ePrivacy Directive governs the processing of data through both private and public carriers
and communications networks.
190
European Data Protection
191
8. True or false: Under the GDPR,
individuals have the absolute
right to object to any form of
Review direct marketing at any time.
question
Review question
8. True or false: Under the GDPR, individuals have the absolute right to object to any form of direct marketing
at any time.
191
European Data Protection
192
9. Which forms of marketing are
subject to the ePrivacy
Directive? Select all that
Review apply.
question
A. Postal marketing
B. Telephone marketing
C. Electronic mail marketing
Review question
9. Which forms of marketing are subject to the ePrivacy Directive? Select all that apply.
A. Postal marketing
B. Telephone marketing
C. Electronic mail marketing
192
European Data Protection
193
10.Which of the following parties
involved in online behavioural
advertising may qualify as a
Review data controller? Select all that
question apply.
A. An ad network
B. A website publisher
C. An advertiser
Review question
10. Which of the following parties involved in online behavioural advertising may qualify as a data controller?
Select all that apply.
A. An ad network
B. A website publisher
C. An advertiser
193
European Data Protection
194
Learning objectives
• Summarise the considerations and duties of controllers and processors for ensuring the security of personal
data.
• Describe four major attributes of secure processing systems and services.
• Describe requirements and best practices for ensuring security of personal data.
• Outline the requirements related to informing the supervisory authority (SA) and data subjects of a data
breach.
194
European Data Protection
195
You can have security without
data protection, but you
cannot have data protection
without security.
Session notes
You can have security without data protection, but you cannot have data protection without security.
• The majority of data protection enforcement in Europe is related to security incidents
• Data protection and security are related but not the same
• Security supports compliance with GDPR in many ways
195
European Data Protection
Security of processing
196
Attributes of security controls
Confidentiality Integrity
Availability Resilience
Session notes
196
European Data Protection
197
Chat
Knowledge check
Gina is working from home today. She is trying to access client data
she needs from her organisation’s remote connection; however, she
cannot remember her access password. She emails her coworker in
the IT department for help. They provide her with a link that will
allow her to reset her password. After answering a security question
correctly, Gina resets her password and accesses the secure client
data she needs.
Which of the four security attributes does this scenario exemplify?
197
European Data Protection
Security of processing
198
What does the GDPR say about security?
Article 32
To ensure ...
A level of security appropriate to the
risk
Session notes
What does the GDPR say about security? (Article 32)
• The controller and the processor shall provide …
• Appropriate technical and organisational measures
• What is appropriate security?
• The law does not specify
• The law does not require absolute security (a breach may still be possible)
• To ensure …
• A level of security appropriate to the risk
• Risks may include accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to
personal data
• Risk-based approach requires a risk assessment
• Risk assessment determines controls
• Taking into account …
• State of the art: Security controls should be chosen based on a consensus of professional opinions
• Costs of implementation: Controls should reflect good management decisions
• Nature (e.g., special categories)
• Context in which processing is taking place (e.g., investigating an employee suspected of wrongdoing)
• Scope (i.e., how much data)
• Purpose of processing
• In addition, the entire information life cycle should be considered, including potential security threats
and harm that may come to personal data
• Certification mechanisms and codes of conduct may be used to demonstrate compliance
• These must be approved by supervisory authorities
198
European Data Protection
Protection mechanisms
199
The technology stack The physical environment
Encryption, antivirus and Sophisticated entry control
antispam technology, firewalls, systems, closed-circuit
identity and access television (CCTV), lock-and-key
management, incident and clean-desk policies
detection, data loss prevention,
two-factor authentication, IP log
management, regular security
code peer review
Session notes
• The technology stack
• Electronic information main focus of data protection law
• Security-enhancing technologies: encryption, antivirus and antispam technologies, firewalls, identity
and access management, incident detection, data loss prevention, two-factor authentication, IP log
management, regular security code peer review
• A key focus of security technologies: filtering electronic communications and monitoring use of IT and
communication systems
• Often involves complex privacy and employment law issues (see Module 8)
• Testing the ability of the technology stack to withstand cyberattacks and misuse
• Penetration (pen) testing by ‘ethical hackers’ and testing coding security
• The physical environment
• Sophisticated entry control systems, closed-circuit television (CCTV), lock-and-key and clean-desk
policies
• Subject to same restrictions as other monitoring controls
EDPB “Guidelines 3/2019 on processing of personal data through video devices,” Adopted 29 January 2020
• Lawfulness of processing: legitimate interest
• Necessity to perform a task carried out in public interest
• Disclosure of video footage to third parties: general purposes and law enforcement agencies
• Processing of special categories of data (Article 9 may apply; general considerations for biometric data)
• Rights of the data subject (access, erasure, object, forgotten)
• Transparency and information obligations (warning signs)
• Storage periods and obligation to erasure
• Implement technical and organisational measures proportional to the risks to right and freedoms of natural
persons
199
European Data Protection
Security of processing
200
Article 28: The controller-processor relationship
Controller Processor
‘Sufficient
guarantees’
Security
Contracts and
assurance
mechanisms
Session notes
See also Module 3.
200
European Data Protection
Security of processing
201
Data breach notifications
Processor Controller
Supervisory
Controller
authority
Session notes
Data breach notifications
• Article 4(12): Personal data breach definition
• Accidental or unlawful
• Breach of security leading to: accidental or unlawful destruction, loss, alteration, unauthorised disclosure
and access
• Personal data transmitted, stored and otherwise processed
• Processor notification duty
• Article 33(2): Notification to controller
• Without ‘undue delay’
• Timed from becoming ‘aware’ of breach
• Controller notification duties
• Article 33(1): Notification to SA
• Without ‘undue delay’ and within 72 hours after becoming aware of the breach
• When does a controller become aware of a breach? ‘When that controller has a reasonable
degree of certainty that a security incident has occurred that has led to personal data
being compromised’ (Former Article 29 Working Party)
• Delay permitted if ‘reasoned justification’
• Exempt if unlikely to result in a risk to the rights and freedoms of natural persons
• Article 34: Notification to data subject
• Applies if ‘high risk’
• Without ‘undue delay’
• Exemptions for: ‘Unintelligible data’, high risk negated by measures taken and disproportionate
effort = public communication
• Regardless of controller’s decision, SA may decide data subject shall be notified
201
European Data Protection
Security of processing
202
Data breach notifications
Supervisory
Controller
authority
Who Contact
How many Consequences
What types Follow-up
Session notes
Data breach notifications
• Controller to SA
• Who?
• Categories of data subjects
• How many?
• Approximate number of data subjects and data records
• What types?
• Categories of data records
• Contact
• Name and contact details of data protection officer (or other contact point if additional
information can be obtained)
• Description of likely consequences
• Follow-up
• Measures taken or to be taken
• Controller to data subject
• Clear and plain language
202
European Data Protection
Security of processing
203
Notification rules in summary
Personal data breach: ‘A breach of security leading to the accidental or unlawful
destruction, loss, alteration, unauthorised disclosure of, or access to, personal data
transmitted, stored or otherwise processed’ (Article 4[12])
Notification to controllers Notification to supervisory Notification to data
(Article 33[2]) authority (Article 33 [1]) subjects (Article 34)
Session notes
For review purposes
203
European Data Protection
204
Chat
Your outlook
Under what circumstances would a
data breach result in a high risk to the
rights and freedoms of individuals?
Follow-up chat
When would a breach not pose a high risk?
204
European Data Protection
NIS Directive
205
Directive on security of network and information systems
• 9 May 2018
• First EU-wide cybersecurity law
• Three focuses
1) National capabilities
2) Cross-border collaboration
3) National supervision of
critical sectors
Session notes
NIS Directive
• Effective 9 May 2018
• First cybersecurity law to cover entire EU
• While not specifically concerned with personal data, will indirectly bolster its security within organisations
regulated by the Directive
• Three focuses
• National capabilities: Compel development of national cybersecurity strategies and structures by EU
member states
• National Computer Security Incident Response Teams (CSIRTs)
• Cybersecurity regulators
• Operators of ‘essential services’
• Cross-border collaboration: Enhance cooperation between the member states
• Cooperation Group to coordinate CSIRTs and develop best practices
• National supervision of critical sectors: Improve security levels of operators of essential services (energy,
water, transport, health and banking sectors) and digital service providers (online marketplaces, online
search engines and cloud computing services)
• Member state laws that set out security requirements and incident notification requirements for
these entities
205
European Data Protection
Enforcement action
206
German state DPA issues country's first
GDPR fine (2018)
IAPP, “German state DPA issues country's first GDPR fine,” Daily Dashboard, 26 November 2018,
https://iapp.org/news/a/german-state-dpa-issues-countrys-first-gdpr-fine.
Session notes
German state DPA issues country's first GDPR fine (2018)
The data protection authority of Baden-Württemberg administered the first fine in Germany for violations of GDPR,
according to a blog post from Hogan Lovells' Chronicle of Data Protection. The DPA fined an unnamed social media
provider 20,000 euros after it suffered a data breach. The social media company informed affected users of the
breach and the agency of its security failings. The DPA decided to penalise the company after the agency discovered
it stored passwords in plain text, a violation of Article 32 of the GDPR.
206
European Data Protection
Enforcement action
207
CNIL issues 400K euro fine for GDPR
violations (2019)
IAPP, “CNIL issues 400K euro fine for GDPR violations,” Daily Dashboard, 6 June 2019,
https://iapp.org/news/a/cnil-issues-400k-euro-fine-for-gdpr-violations.
Session notes
CNIL issues 400K euro fine for GDPR violations (2019)
France's data protection authority, the CNIL, fined the real estate company Sergic 400,000 euros for violations of the
GDPR. A complaint received by the CNIL alleged users could access documents from other individuals on the site by
modifying a URL. The documents contained individuals' identity cards, tax notices, account statements and other
information. An investigation conducted by the DPA found Sergic was aware of the vulnerability since March 2018.
The DPA discovered Sergic did not implement any form of user authentication for those who could access the
documents, which factored into the decision to penalise the company.
207
European Data Protection
208
1. CIAR stands for _____.
Review question
NOTE: Review questions are intended to help reinforce key topics covered in the module. They are not meant to
represent actual certification exam questions.
208
European Data Protection
209
2. True or false: A processor is
Review responsible for implementing
question appropriate technical and
organisational measures to
keep personal data secure.
Review question
2. True or false: A processor is responsible for implementing appropriate technical and organisational measures
to keep personal data secure.
209
European Data Protection
210
3. A controller must notify the SA
of a personal data breach if
_____.
Review
question A. The breach is likely to result in a risk
for the rights and freedoms of natural
persons.
B. The breach is likely to result in a high
risk for the rights and freedoms of
natural persons.
Review question
A. The breach is likely to result in a risk for the rights and freedoms of natural persons.
B. The breach is likely to result in a high risk for the rights and freedoms of natural persons.
210
European Data Protection
211
Learning objectives
• Recognise accountability implications of the GDPR’s Article 24 for controllers and processors.
• Outline steps for designing a data protection programme, including a data protection impact assessment and
data protection policy.
• Summarise record-keeping requirements of controllers and processors.
• Describe the protections, tasks and responsibilities of data protection officers.
211
European Data Protection
212
Taking into account the nature, scope,
context and purposes of processing as well
as the risks of varying likelihood and
severity for the rights and freedoms of
natural persons, the controller shall
implement appropriate technical and
organisational measures to ensure and to be
able to demonstrate that processing is
performed in accordance with this
Regulation. Those measures shall be
reviewed and updated where necessary.
(Article 24[1])
Session notes
Accountability: The ability to demonstrate that a data protection programme has been implemented and run in
compliance with the law.
Article 24(1)
• Nature, scope, context and purposes … as well as risks
• Risk-based approach
• Appropriate technical and organisational measures
• All technical and nontechnical measures
• Demonstrate
• Records of controllers and processors available to SA
• Reviewed and updated
• Continuous improvement and communication
• Testing and auditing
• In practice: data protection programme
• Data protection by design/by default
• Data protection impact assessments (DPIAs)
• Maintaining data processing records
• Appointing data protection officer (DPO)
Auditing privacy programs
• DPAs have the ability to carry out audits and inspections of premises and processing equipment
• Data protection written systems
• Data protection business operations
• DPAs can issue warnings to stop business activities if data processing practices are suspicious
• Regulators have the right to conduct audits
212
European Data Protection
213
Chat
213
European Data Protection
Accountability
214
Design and 214
default Data protection
by design
Records
The DPO • Build data protection
into products
throughout their life
cycles
• Safeguards
– Data minimisation
– Pseudonymisation
• Assess/mitigate risks
Session notes
Implementation of technical and organisational measures should take place ‘both at the time of the determination of
the means for processing and at the time of the processing itself’ (Article 25).
214
European Data Protection
Accountability
215
Design and 215
default Data protection Data protection
by design by default
Records
The DPO • Data protection built • Data protective
into product life
lifecycles
cycles settings are default
• Safeguards • Processing only
necessary personal
– Data minimisation
data
– Pseudonymisation
• Limited accessibility
• Assess/mitigate risks
Session notes
Data protection by default
• Where a product/service provides users with multiple setting options, the most data protective settings are
default
• Users have to opt-in to any setting that presents greater risks
• By default, the product/service processes only necessary personal data
• Considerations: purpose, amount of personal data collected, extent of processing and storage period
• Limited accessibility to personal data
For practical examples of privacy by default, refer to Piotr Foitzik’s IAPP The Privacy Advisor article, ‘Privacy by
default in online services’: https://iapp.org/news/a/privacy-by-default-in-online-services
215
European Data Protection
Accountability
216
Design and Data protection impact assessment
default
• Considerations
Records • Conditions
The DPO • Contents
• Prior consultation with SA
Risks Measures
Session notes
Data protection impact assessment (DPIA)
• To help incorporate data protection considerations into organisational planning
• To help demonstrate compliance to supervisory authorities
• Article 35: Considerations
• Nature, scope, context, purpose, type of processing
• Use of new technologies
• Article 35: Conditions
• High risk to rights and freedoms of data subject
• Examples: systematic, extensive evaluation of personal aspects based on profiling or processing
of special categories
• Large-scale processing of special categories
• Monitoring public areas systematically and on large scale
• GDPR, Article 29 Working Party Guidelines on DPIAs and member state lists
• SA may set out other specific processing operations that qualify as high risk
• Article 35: Contents of DPIA
• Description of processing
• Assessment of necessity, proportionality and risks to rights and freedoms of data subject
• Measures (controls) to address risks
• Article 36: Prior consultation with SA
• Prior to processing when DPIA indicates high risk to data subject
• Contents: DPIA, responsibilities of controllers and processors, purposes and means of processing, measures
and safeguards, and contact details of DPO
• If SA thinks processing will not be compliant or controller has not sufficiently mitigated risks
• Will provide advice to controller
• Can block processing activities within eight weeks (six additional in complex situations)
216
European Data Protection
Accountability
217
Design and Data protection
default policy
Records • Language
• Contents
The DPO
• Goals
Session notes
Data protection policy used ‘where proportionate in relation to processing activities’ (Article 24[2]).
• Amongst other measures
• As part of larger data protection programme
• GDPR does not specify required contents
217
European Data Protection
218
Chat
Brainstorm
Topics that may be covered in a data
protection policy.
Chat: Brainstorm
Topics that may be covered in a data protection policy
Follow-up chat
What types of metrics may be used to demonstrate results?
218
European Data Protection
Accountability
219
Controller
Design and records
default
Records
The DPO
Session notes
• SA may request copy of processing records from controller, processor and representatives
• Recording obligation triggers for controllers and processors: Processing that …
• Organisations of 250 or more employees
• Is likely to result in risk to rights and freedoms of data subject
• Is not occasional
• Includes special categories of data or data relating to criminal convictions/offences
219
European Data Protection
Accountability
220
Controller Processor
Design and records records
default
Records
The DPO
Session notes
Processor records (Article 30)
• Name and contact information of processor, controller, representatives and DPO
• Categories of processing
• International data transfers and appropriate safeguards
• Technical and organisational security measures
Good practice: Keep a log of all processing activities to show competence/compliance of controllers, processors and
representatives in the event of an incident.
220
European Data Protection
Accountability
221
Design and Role of the DPO
default
• Staff member or
Records contractor
• Expert
The DPO
• Legally required
position (under
some
circumstances)
Session notes
Role of the data protection officer (DPO) (Article 37)
• Formerly Personal Data Protection Official under the Directive
• Staff member or contractor
• Appointed by controller or processor
• Tasked with ensuring and demonstrating compliance with data protection law
• Expert in data protection law and practices
• Legally required position (under some circumstances)
• Core activities of controller or processor include:
• Processing activities that require ‘regular and systematic monitoring’ of data subjects on ‘large
scale’
• Processing sensitive data (or personal data relating to criminal convictions/offences) on a ‘large
scale’
• Processing by public bodies, other than courts acting in judicial capacity
• Union or member state law
• DPO appointed voluntarily
• Still subject to GDPR requirements
221
European Data Protection
222
Chat
222
European Data Protection
Accountability
223
Design and DPO tasks and responsibilities
default
• Monitor compliance
Records • Inform and advise controller and processors
The DPO • Contributes to the DPIA process
• Cooperate with SA
• Communicate with data subjects and SA
• Exercise professional secrecy
Session notes
DPO tasks and responsibilities (Articles 38–39)
• Monitor compliance with GDPR and Union or Member State data protection provisions
• ‘Collect information to identify processing activities’
• ‘Analyse and check the compliance of processing activities’
• Manage internal data protection activities, train staff and conduct internal audits
• Inform and advise controllers, processors and employees who carry out processing
• Provide advice in regard to DPIAs (whether or not to conduct one, methodology, in-house versus
outsourced, safeguards, correct implementation and analysis of results in regard to compliance)
• ‘Issue recommendations to the controller or the processor’
• Manage risk
• Cooperate with SA
• Communicate with data subjects and SA
• Exercise professional secrecy
223
European Data Protection
Accountability
224
Design and Controllers and processors ensure…
default
• Communication and involvement
Records • Access to personal data and processing
operations
The DPO
• Resources
• Safeguards
• DPO reports to highest level
of management
Session notes
Controller and processors ensure…
• Communication with/involvement of DPO in all issues related to personal data protection
• Access to personal data and processing operations
• Resources to help DPO carry out tasks
• ‘Active support’ from senior management
• ‘Sufficient time for DPOs to fulfil their duties’
• ‘Financial resources, infrastructure ... and staff’
• Communicating the DPO designation ‘to all staff’
• ‘Access to other services within the organisation’
• ‘Continuous training’
• Safeguards to enable DPO to perform tasks independently
• ‘No instructions by the controllers or the processors regarding ... the DPO’s tasks’
• ‘No dismissal or penalty ... for the performance of the DPO’s tasks’
• ‘No conflict of interest with possible other tasks and duties’
• ‘The DPO cannot hold a position within the organisation that leads them to determine the
purposes and the means of the processing of personal data’
• DPO reports to highest levels of management
224
European Data Protection
Accountability
225
Summary of responsibilities
Accountability
• 225 Controllers Processors
requirement
Data protection by design Yes No
Data breach reporting Yes (to SAs and data Yes (to controller)
subjects)
Session notes
None
225
European Data Protection
Accountability
226
Obligation to designate a representative in the EU
Article 27
• Article 3(2)
processing
• Exceptions
• Conditions for
representation
Session notes
Article 27
• Article 3(2) processing of personal data of data subjects in the EU by a controller or processor not established in
the EU. Process activities are related to:
• Offering goods or services or monitoring behaviour as far as their behavior takes place in the EU
• Exceptions for processing:
• Occasional, does not include, on a large scale, processing of special categories of data or processing of
personal data relating to criminal convictions
• And unlikely to result in a risk to the rights and freedoms of natural persons, taking into account the
nature, context, scope and purposes of the processing
• A representative should be established in member states of those data subjects
• The representative must be mandated by the controller or processor to be addressed in addition to or instead of
the controller or processor
• In particular by supervisory authorities and data subjects
• The designation of a representative must be made without prejudice to legal actions
• Could be initiated against the controller or processor
226
European Data Protection
227
1. True or false: Both controllers
Review and processors have
accountability obligations
question under the GDPR.
Review question
NOTE: Review questions are intended to help reinforce key topics covered in the module. They are not meant to
represent actual certification exam questions.
1. True or false: Both controllers and processors have accountability obligations under the GDPR.
227
European Data Protection
228
2. True or false: Data protection
Review by design begins before
processing and incorporates
question data protection considerations
into the planning phase.
Review question
2. True or false: Data protection by design begins before processing and incorporates data protection
considerations into the planning phase.
228
European Data Protection
229
3. What are the main values of a
data protection impact
assessment (DPIA)? Select all
that apply.
Review
question A. Incorporating data protection
considerations into organisational
planning
B. Determining the purpose of
processing personal data
C. Demonstrating compliance to
supervisory authorities
Review question
3. What are the main values of a data protection impact assessment (DPIA)? Select all that apply.
229
European Data Protection
230
4. True or false: The GDPR
requires controllers to always
Review contact the SA following a
question DPIA and before processing
personal data.
Review question
4. True or false: The GDPR requires controllers to always contact the SA following a DPIA and before processing
personal data.
230
European Data Protection
231
5. True or false: The GDPR
requires a data protection
Review policy to be used ‘where
question proportionate in relation to
processing activities’.
Review question
5. True or false: The GDPR requires a data protection policy to be used ‘where proportionate in relation to
processing activities’.
231
European Data Protection
232
6. Which of the following must
be included in controllers’
personal data processing
records but not in processors’
records?
Review
question A. Purposes of processing
B. International data transfers being
made and the measures put in place
to ensure they are lawful
C. A general description of technical and
organisational security measures that
have been implemented
Review question
6. Which of the following must be included in controllers’ personal data processing records but not in
processors’ records?
A. Purposes of processing
B. International data transfers being made and the measures put in place to ensure they are lawful
C. A general description of technical and organisational security measures that have been implemented
232
European Data Protection
233
7. True or false: The data
Review protection officer must be an
question expert in data protection law
and practices.
Review question
7. True or false: The data protection officer must be an expert in data protection law and practices.
233
European Data Protection
234
circumstances that require an
organisation to appoint a DPO?
Select all that apply.
Review question
8. Which of the following are circumstances that require an organisation to appoint a DPO? Select all that
apply.
234
European Data Protection
235
Learning objectives
235
European Data Protection
236
The SA role
• Promote,
monitor and
enforce GDPR
application
• Promote
awareness
• Conduct
investigations
• Protect
fundamental
human rights
Session notes
The SA role (Articles 51–57)
• Also known as data protection authority (DPA)
• Promote, monitor and enforce GDPR
• Promote awareness
• Help organisations understand their obligations under GDPR
• Serve in advisory capacity so organisations may approach them for advice on data protection issues
• Conduct investigations on GDPR compliance
• Protect fundamental human rights, including …
• Raise public awareness
• Provide information to individuals upon request
• Manage data subject complaints
• Draw up annual reports that explain …
• Data protection in their country
• Current issues
• Agenda for following year
• Facilitate free flow of personal data within EU
• Support fundamental role of EU to promote free trade and free movement of data
236
European Data Protection
237
Chat
Knowledge quest
What powers do supervisory authorities
have over controllers and processors?
237
European Data Protection
238
SA powers continued
• Subject to
appropriate
safeguards
• Member state
law
Session notes
SA powers continued (Article 58)
• Subject to appropriate safeguards, including effective judicial remedy and due process
• Member state law
• Provides SA with power to bring GDPR infringements to judicial authorities
• May also provide for additional SA powers
238
European Data Protection
239
Identifying the lead supervisory authority
for cross-border processing
Controller or processor
Single establishment Multiple establishments
Session notes
Before identifying the lead supervisory authority for cross-border processing, the controller/processor must
determine if cross-border processing is taking place.
The criteria for identifying the lead SA for an organisation with more than one establishment in the EU makes it
possible for a company to have several lead SAs—if it conducts several cross-border activities whose related decisions
take place in more than one location.
• Lead supervisory authority: primary regulator responsible for cross-border processing activities of a
controller/processor and coordinating operations of all SAs concerned
• Cross-border processing
• ‘Processing of personal data which takes place in the context of the activities of establishments in more
than one Member State of a controller or processor in the Union where the controller or processor is
established in more than one Member State.’
• Or, ‘processing of personal data which takes place in the context of the activities of a single
establishment of a controller or processor in the Union but which substantially affects or is likely to
substantially affect data subjects in more than one Member State’ Article 4(23). Article 29 Working Party:
‘Supervisory Authorities will interpret “substantially affects” on a case by case basis.’
• If cross-border processing, identify the lead SA
• Single establishment in the EU = SA of the place of establishment.
• More than one establishment in the EU = SA of the place of central administration—unless decisions about
purposes, means and implementation of processing take place at a different location. If so, the lead is the
SA of that location.
• Controller and processor both involved in the processing = default to controller’s lead SA.
239
European Data Protection
240
SA procedures
• Cooperation
• Mutual
assistance
• Joint operations
• Consistency
mechanism
• Dispute
resolution
• Urgency
procedure
Session notes
SA procedures (Chapter VII, GDPR)
• Procedures intended to support cooperation between SAs and consistent GDPR application across member states
• Procedures heavily summarised here
• Cooperation
• Between lead SA and other concerned SAs to reach consensus
• Mutual assistance
• Provision of relevant information between supervisory authorities
• Joint operations
• Joint SA investigations and enforcement measures of controllers or processors in several member states or
when data subjects are in more than one member state
• Consistency mechanism
• Specific collaborative process between SAs, Commission and European Data Protection Board for adopting
certain measures and ensuring consistent GDPR application
• Dispute resolution
• Mechanism to dispute a decision (if not jointly agreed upon by SA)
• Issuance of binding decisions
• Urgency procedure
• For the immediate adoption of provisional measures within a member state
240
European Data Protection
241
The European Data Protection Board (EDPB)
• Composition
• Independence
• Tasks
Session notes
European Data Protection Board (EDPB) (Section 3, GDPR)
• Replaces Article 29 Working Party
• Composition
• Representatives of every member state’s SA
• Each of the 30 member states of the EEA will appoint representative to sit on the EDPB
• Only representatives from the 27 EU member states may actively participate
• Presided over by chair elected by EDPB representatives
• Participation from European Data Protection Supervisor (EDPS) and representatives of Commission
• EDPS limited voting rights (more on EDPS on following slide)
• Commission no voting rights
• Independence
• EDPB must act independently
241
European Data Protection
242
Chat
242
European Data Protection
243
The European Data Protection Supervisor (EDPS)
• Supervision and
enforcement
• Consultation
• Cooperation
• Secretariat of
the EDPB
Session notes
The European Data Protection Supervisor (EDPS)
• The data protection regulator for EU as an entity
• Supervision and enforcement
• Monitoring personal data processing of EU bodies (Commission, Council, Parliament, etc.)
• Checking processing operations that pose high risk to data subjects (before processing)
• Dealing with complaints
• Making inquiries
• Consulting
• Consultation
• Advising community
• Intervening in cases before CJEU
• Cooperation
• Cooperating with supervisory authorities and supervisory data protection bodies (e.g., Europol)
• Secretariat of the EDPB
• Oversight of Eurodac
243
European Data Protection
244
Remedies, liabilities, penalties
Session notes
Remedies, liabilities, penalties (Articles 77–84)
• Data subjects’ rights
• To lodge complaint with SA
• To judicial remedy against a controller/processor or SA
• Liability of controllers and processors for damages caused by GDPR infringements
• Compensation to individuals who suffer damages
• Administrative fines (see following slide)
• Additional penalties
• Determination of penalties in addition to administrative fees made by member states
244
European Data Protection
245
Chat
245
European Data Protection
246
Administrative fines
Session notes
Administrative fines
• Depending on several factors
• Nature, gravity and duration of infringement
• Nature, scope and purpose(s) of processing
• Number of data subjects concerned
• Level of damage and damage mitigation
• Intent or negligence
• Degree of responsibility (technical and organisational measures)
• Previous infringements
• Degree of cooperation with SA
• Categories of personal data
• Manner of notification
• Compliance with measures ordered by SA
• Adherence to approved codes of conduct/certification mechanisms
• Up to €20,000,000 or 4% of total turnover (whichever is higher) for infringements of principles, data subjects’
rights, international data transfers, obligations of member state law and noncompliance with SA’s order
• Infringements tend to be more substantive
• Up to €10,000,000 or 2% of total turnover (whichever is higher) for infringements of most other obligations
• Infringements tend to be more administrative
246
European Data Protection
Enforcement action
247
CNIL levies $57M fine on Google for GDPR
violations (2019)
IAPP, “CNIL levies $57M fine on Google for GDPR violations,” Daily Dashboard, 22 January 2019,
https://iapp.org/news/a/cnil-levies-57m-fine-on-google-for-gdpr-violations.
Session notes
Enforcement action: CNIL levies $57M fine on Google for GDPR violations (2019)
The French data protection authority, the CNIL, announced it fined Google $57 million ‘in accordance with the
General Data Protection Regulation ... for lack of transparency, inadequate information and lack of valid consent
regarding the ads personalisation’. The CNIL said the ‘“one-stop-shop mechanism” was not applicable’, allowing it,
along with other DPAs, to be a competent authority. According to the Wall Street Journal, Ireland's Data Protection
Commission said, ‘Google until now hasn't met its criteria for having an establishment in Ireland, because its U.S.
entity was responsible for processing EU users' data, rather than its Irish unit’. The DPC will ‘become Google's lead
[DPA] in the EU for most matters’. Brave's Johnny Ryan said the ‘CNIL's decision is very significant because it means
that Google must stop building advertising profiles about people until it has properly told them what it is doing and
received their consent’.
247
European Data Protection
248
Administrative fines:
Article 29 Working Party guidelines
Session notes
Former Article 29 Working Party’s ‘Guidelines on the Application and Setting of Administrative Fines’
• SAs will consider the ‘nature, gravity and duration of the infringement’
• Some cases may only trigger a reprimand
• Where the infringement ‘does not pose a significant risk to the rights of the data subjects concerned and
does not affect the essence of the obligation in question’ or if a fine would impose a ‘disproportionate
burden’ on a ‘natural person’
• Factors to consider when determining the potential size of a fine:
• Number of data subjects involved: The more people affected, the bigger the fine
• Purpose of the processing: SAs will examine how the organisation has addressed the purpose limitation
principle—purpose specification and compatible use
• Damage suffered by data subjects: While SAs are not competent to award compensation to the data
subjects themselves, they are encouraged to consider the damage suffered, or likely to be suffered, as
suggested by examples of the ‘risks to rights and freedoms’ in Recital 75
• Duration of the infringement: Fines are more likely if the violation is a result of negligent or intentional
behaviour; actions taken ‘in spite of advice from the [DPO]’ may be considered ‘intentional’
248
European Data Protection
249
1. Who does the GDPR task with
promoting, monitoring and
enforcing the GDPR?
Review
question A. Controllers
B. Processors
C. Supervisory authorities
D. The European Data Protection
Supervisor
Review question
NOTE: Review questions are intended to help reinforce key topics covered in the module. They are not meant to
represent actual certification exam questions.
1. Who does the GDPR task with promoting, monitoring and enforcing the GDPR?
A. Controllers
B. Processors
C. Supervisory authorities
D. The European Data Protection Supervisor
249
European Data Protection
250
2. How many active participants
will the European Data
Protection Board have?
Review
question A. 30
B. 27
C. 21
D. 38
Review question
2. How many active participants will the European Data Protection Board have?
A. 30
B. 27
C. 21
D. 38
250
European Data Protection
251
3. Which mechanism facilitates
the provision of relevant
information between
Review supervisory authorities?
question
A. Cooperation
B. Mutual assistance
C. Consistency mechanism
D. Urgency procedure
Review question
3. Which mechanism facilitates the provision of relevant information between supervisory authorities?
A. Cooperation
B. Mutual assistance
C. Consistency mechanism
D. Urgency procedure
251
European Data Protection
252
specific collaborative process
between supervisory
authorities, the Commission
and the European Data
Protection Board for adopting
Review certain measures and ensuring
question consistent GDPR application?
A. Cooperation
B. Joint operations
C. Consistency mechanism
D. Dispute resolution
Review question
4. Which mechanism facilitates a specific collaborative process between supervisory authorities, the
Commission and the European Data Protection Board for adopting certain measures and ensuring consistent
GDPR application?
A. Cooperation
B. Joint operations
C. Consistency mechanism
D. Dispute resolution
252
European Data Protection
253
Questions?
253
European Data Protection
Thank you!
254
254
Appendix
EUROPEAN DATA PROTECTION:
REVIEW QUESTIONS ANSWER KEY
MODULE 1
1. Which of the following data protection milestones is a treaty amongst member states of the Council
of Europe?
• Convention 108+
2. Which of the following data protection milestones applies to public electronic communications
services and networks?
• ePrivacy Directive
3. The European Convention on Human Rights is a product of which institution?
• The Council of Europe
4. Which role best describes the European Parliament?
• Is engaged in legislative development
MODULE 2
1. What is the function of the four-step test?
• Determine if data qualifies as personal data
2. Which criteria are used to identify personal data? Select all that apply.
• ‘any information’
• ‘relating to’
• ‘an identified or identifiable’
• ‘natural person
3. Select the types of personal data elements that belong to special categories under the GDPR.
• Personal data revealing political opinions
• Personal data revealing religious or philosophical beliefs
• Genetic data used to uniquely identify a natural person
4. True or false: Anonymising personal data is always possible.
• False
5. True or false: Pseudonymous data is protected by the GDPR.
• True
6. Is the collection and use of device dynamic IP addresses to allow data on a website to be
transferred to the correct recipient considered personal data? Why or why not?
• In Patrick Breyer v Bundesrepublik Deutschland, the CJEU ruled that dynamic IP addresses
were capable of constituting personal data. A person could be indirectly identified if the
IP addresses were combined with data help by ISPs.
MODULE 3
1. True or false: A data controller may be a natural person or a legal entity, while a data processor
must be a legal entity.
• False
2. True or false: A contract protects a processor from being held to the same legal obligations as the
controller.
• False
3. True or false: A processor may decide where and how to process personal data.
• False
4. What actions can a controller take to manage vendor risk?
• Choose reliable processors
• Maintain quality control and compliance throughout the duration of the arrangements
• Frame the relationship in a contract (or other legally binding act)
MODULE 4
1. What is data processing?
• Any action performed upon data
2. What are the criteria used to determine the territorial scope of the GDPR? Select all that apply.
• Where the data is processed in the context of the activities of a establishment of a
controller or processor in the EU
• Intentional processing of personal data of data subjects in the EU relating to offering
goods or services or intentional monitoring of behaviour in the EU
• Processing of personal data by a controller not established in the EU but in a place where
member state law applies
3. True or false: Exclusions to the material scope of the GDPR should be interpreted broadly.
• False
4. Which exception to the prohibition on processing special categories of data must be explicit?
• Consent
MODULE 5
1. Which of the following data subjects’ rights provides data subjects with entitlements to certain
information, obtainable from the controller upon request?
• Right of access
2. The right of access grants data subjects access to which of the following types of information?
Select all that apply.
• The purpose of the processing
• Retention periods
• Recipients of the personal data
3. Which is not listed by the GDPR as a method for restricting processing of personal data?
• Disabling the data management system
4. Under which categories may a data subject object to processing personal data? Select all that
apply.
• Direct marketing
• Public interest or legitimate interest
• Research or statistical purposes
5. What is profiling?
• A form of automated decision-making
MODULE 6
1. True or false: A controller may charge an administrative fee to data subjects if they request that
the information provision be in an oral format.
• False
2. True or false: The transparency principle states that detail is more important than conciseness in a
privacy notice.
• False
3. What additional information must be provided to data subjects when the controller’s necessity is
being used as the legal basis for processing?
• Controller’s legitimate interest
4. What information must be provided to data subjects when the personal data that will be processed
was collected indirectly?
• Source of the data
5. What information must be provided to data subjects when their personal data will be shared with
an outside organisation to provide them with a promised service?
• Recipients of the data
6. What information must be provided to data subjects in all circumstances? Select all that apply.
• Purpose of processing
• Data subjects’ rights
• Identity of the controller
7. True or false: Information provision is required, even if it necessitates disproportionate effort.
• False
MODULE 7
1. Arrange the options for international data transfers in the order that they should be considered.
• Adequacy decisions
• Appropriate safeguards
• Derogations
2. Which of the following options for international data transfers is a determination by the European
Commission that a third country has achieved an EU-level of personal data protection?
• Adequacy decision
3. Which of the following countries have been deemed adequate by the European Commission? Select
all that apply.
• Argentina
• New Zealand
• Switzerland
• Uruguay
4. Which of the following are appropriate safeguards for international data transfers? Select all that
apply.
• Binding corporate rules
• Standard contractual clauses
• Approved codes of conduct or certification mechanisms
5. Which appropriate safeguards allow large multinational companies to adopt a policy suite with
rules for handling personal data?
• Binding corporate rules
6. True or false: Criteria for derogations are strict and should be interpreted narrowly.
• True
MODULE 8
1. Which types of laws should be considered when processing employees’ personal data? Select all
that apply.
• Local employment law
• EU data protection law
• Member state data protection law
2. Under the GDPR, which legal basis for processing personal data would be difficult to use for
processing employee data?
• Consent
3. True or false: Some employers may be required to consult with works councils and/or trade unions
to process employees’ personal data.
• True
4. True or false: Some employers may be required to consult with works councils and/or trade unions
to process employees’ personal data.
• True
5. True or false: BYOD policies are designed to protect employees’ personal data only.
• False
6. The ePrivacy Directive governs the processing of which types of data? Select all that apply.
• Location data
• Content data
• Traffic data
7. True or false: The ePrivacy Directive governs the processing of data through both private and
public carriers and communications networks.
• False
8. True or false: Under the GDPR, individuals have the absolute right to object to any form of direct
marketing at any time.
• True
9. Which forms of marketing are subject to the ePrivacy Directive? Select all that apply.
• Telephone marketing
• Electronic mail marketing
10. Which of the following parties involved in online behavioural advertising may qualify as a data
controller? Select all that apply.
• An ad network
• A website publisher
• An advertiser
MODULE 9
1. CIAR stands for _____.
• Confidentiality, integrity, availability, resilience
2. True or false: A processor is responsible for implementing appropriate technical and organisational
measures to keep personal data secure.
• True
3. A controller must notify the SA of a personal data breach if _____.
• The breach is likely to result in a risk for the rights and freedoms of natural persons.
MODULE 10
1. True or false: Both controllers and processors have accountability obligations under the GDPR.
• True
2. True or false: Data protection by design begins before processing and incorporates data protection
considerations into the planning phase.
• True
3. What are the main values of a data protection impact assessment (DPIA)? Select all that apply.
• Incorporating data protection considerations into organisational planning
• Demonstrating compliance to supervisory authorities
4. True or false: The GDPR requires controllers to always contact the SA following a DPIA and before
processing personal data.
• False
5. True or false: The GDPR requires a data protection policy to be used ‘where proportionate in
relation to processing activities’.
• True
6. Which of the following must be included in controllers’ personal data processing records but not in
processors’ records?
• Purposes of processing
7. True or false: The data protection officer must be an expert in data protection law and practices.
• True
8. Which of the following are circumstances that require an organisation to appoint a DPO? Select all
that apply.
• The controller is a public authority.
• The core activities of the controller or processor include regular and systematic
monitoring of data subjects on a large scale.
• The core activities of the controller or processor consist of large-scale processing of
special categories of data.
MODULE 11
1. Who does the GDPR task with promoting, monitoring and enforcing the GDPR?
• Supervisory authorities
2. How many active participants will the European Data Protection Board have?
• 27
3. Which mechanism facilitates the provision of relevant information between supervisory authorities?
• Mutual assistance
4. Which mechanism facilitates a specific collaborative process between supervisory authorities, the
Commission and the European Data Protection Board for adopting certain measures and ensuring
consistent GDPR application?
• Consistency mechanism
EUROPEAN DATA PROTECTION
ADDITIONAL REVIEW QUESTIONS
1. According to the General Data Protection Regulation (GDPR), when does an organisation
need to take action to legitimise cross-border data transfers of personal data?
A. When the data is routed through another jurisdiction, whether the other jurisdiction is
in or outside the European Union.
B. When the data is transferred from one jurisdiction within the European Union to
another jurisdiction within the European Union.
C. When the data is transferred from a jurisdiction outside the European Union to a
member state of the European Union.
D. When the data is transferred from a jurisdiction in the European Union to a third
country which is not deemed adequate.
A. An email sent to an individual about an order she has placed for a book.
B. An email sent to an individual promoting a new book which is on sale.
C. A letter addressed to ‘the household’ about a charity bookstore.
D. An advertisement on a website promoting a new book which is on sale.
3. When should a controller notify the supervisory authority of a loss of personal information
which is likely to result in harm to an individual?
5. A large law firm in France wants to transfer employee names to a telecom provider to
offer employees mobile phone services. The telecom provider’s headquarters are located
in Spain. Why would binding corporate rules be ineffective in protecting the transferred
data:
A. Because BCRs only provide adequate safeguards for organisations who move data
outside their corporation.
B. Because BCRs secure transfers to third parties without needing to fulfil additional
requirements.
C. Because BCRs only deal with intra-organisational transfers and not with transfers to
third parties.
D. Because BCRs require contractual arrangements to legitimize international transfers of
data.
6. Under the GDPR, would a European company be allowed to use video surveillance to
monitor employee access to inventory?
7. Which institution is responsible for ensuring that directives are implemented properly by
the member states?
8. What is true for a contract based on European Commission standard contractual clauses
with a processor outside the European Economic Area?
A. For subcontracting, the processor must inform the controller and obtain written
approval.
B. Before the processing starts, the processor must obtain permission from the European
Commission.
C. The data subject must consent to processing by a processor located outside of the
European Economic Area.
D. The processor must provide a compliance statement from its data protection
authority.
SCENARIO
Use the following to answer questions 9-11:
Rob, a former employee of the Tea & Biscuits Corporation (a U.S.-based multi-national), has
hand-delivered a letter to the Reception of the Irish Subsidiary on May 1. Rob asked for a copy
of all data that Tea & Biscuits Corporation holds about him from the start of his employment
with them over 18 years ago, including all email correspondence about him from his past
three managers, and anyone from the HR Department. Rob has included a copy of his
passport, his old employee identification number, and his current address.
One of Rob's previous managers was made redundant at the same time as Rob; another has
relocated to Tea & Biscuits’ Singapore office. The receptionist was not sure what to do with
the letter, so she sent it via internal mail to the facilities manager who was out of the office
on holiday until May 5. The facilities manager sent it to the HR manager who is very busy on a
new redundancy program. The HR manager emailed the legal team to ask what he should do
with the letter on May 21. The local Irish lawyers got back to the HR manager on May 25 and
suggested that the HR manager get in touch with Rob immediately and tell him that his issue
has been looked into.
9. What should Tea & Biscuits do before responding to Rob with the information he has
requested?
A. Meet with the legal department to ensure that no U.S. data protection laws will be
violated before sending any information.
B. After accounting for GDPR compliance, contact Rob ‘without undue delay’ to clarify
any questions about his request.
C. Consult with a security lawyer before sending any information to determine the most
secure way to fulfil the request.
D. Wait for advice from the Irish Data Protection Authority before sending any
information.
10. What is the time period within which Tea & Biscuits Corporation needs to respond to the
data subject?
11. What should Tea & Biscuits do next to respond to Rob's request for email?
A. Nothing. Email does not need to be provided in response to a subject access request
under the local Irish Data Protection law.
B. The HR manager should ask employees who still work at Tea & Biscuits if they have
any email correspondence with Rob in their possession.
C. Conduct an email search in accordance with its monitoring policy and inform affected
employees before any disclosures to Rob.
D. HR should provide Rob the information he requested. There is no need to get other
employees’ consent because the emails are all work related.
A. Performance of a contract.
B. Transferring data to an archive.
C. Statistical purposes.
D. Historical or scientific research.
13. Along with legitimacy, what is another condition that must be met when carrying out
employee monitoring?
16. A collection is part of a historical research initiative. Which is the most accurate
statement concerning the obligations imposed by the GDPR?
A. As a regulation rather than a directive, the GDPR sets forth binding provisions for EU
member states to follow without discretion.
B. The GDPR provides a framework which member states can choose to use as a basis for
national legislation.
C. As a regulation rather than a directive, the GDPR sets forth binding provisions for EU
member states to follow but it leaves them discretion in some areas.
D. The GDPR imposes binding obligations on all EU member states as well as on all
countries deemed ‘adequate’ by the European Commission.
17. Which is the most accurate statement concerning the obligations imposed by the GDPR
regarding notification of data processing activities?
A. Notification is now optional but is recommended to foster the transparency of data
processing activities.
B. Notification remains mandatory to finance the national data protection authority’s
operations.
C. Notification is no longer required as the GDPR has switched to an accountability
framework.
D. Notification is required of all processors but is not required of controllers.
18. Which, according to the GDPR, is NOT one of the considerations that should be taken into
account to determine the appropriate technical and organisational measures to ensure a
level of data security appropriate to the risk?
A. Costs of implementation.
B. The state of the art.
C. Scope of processing.
D. The size of the organisation.
A. Political affiliation.
B. Health information.
C. Ethnic origin.
D. Social Security number.
20. Which institution has the power to adopt adequacy findings for the European Union?
21. Which exemption to the e-Privacy Directive 2002/58/EC allows the data controller to send
electronic marketing information?
22. Under the GDPR, organizations that are not established in the EU that monitor behaviour
will be subject to the Regulation when:
A. Big data projects are exempt from the proportionality principle of the GDPR.
B. Big data projects are subject to case-by-case review under the GDPR.
C. Big data projects are subject to the proportionality principle of the GDPR.
D. Big data projects are permitted to retain all data collected prior to the GDPR taking
effect.
24. Under the GDPR, privacy notices relating to services intended for children, must be:
25. If a third-country data controller or processor does not wish to comply with the
supervisory authority decision, then under the GDPR, the supervisory authority has the
power:
A. To waive its decision as its powers are limited to the EU and its member states.
B. To carry out its actions outside the EU without the target country’s consent.
C. To force the data controller or processor to relocate to an EU member state.
D. To order the suspension of data flows to a recipient in the third country.
Answers and Rationale
Many resources linked from this training are available to IAPP members only. Reviewing the supplemental, linked
content provides the user with additional depth and detail but is not required for completing the course. To learn
more about IAPP membership, click here.
PRIMARY RESOURCES
“2018 Reform of Data Protection Rules.” European Commission Website.
European Data Protection Board. “GDPR: Guidelines, Recommendations, Best Practices.”
https://edpb.europa.eu/our-work-tools/general-guidance/gdpr-guidelines-recommendations-best-
practices_en
European Data Protection: Law and Practice, edited by Eduardo Ustaran. Portsmouth, NH: IAPP, 2019.
General Data Protection Regulation (full text)
Glossary of Privacy Terms: https://iapp.org/resources/glossary/
ADDITIONAL RESOURCES
Module 1
“Opinion 5/2019 on the Interplay Between the ePrivacy Directive and the GDPR …” European Data
Protection Board. Adopted March 12, 2019.
https://edpb.europa.eu/sites/edpb/files/files/file1/201905_edpb_opinion_eprivacydir_gdpr_inter
play_en_0.pdf.
Module 3
“Guidelines 07/2020 on the concepts of controller and processor in the GDPR” European Data
Protection Board. Adopted July 07, 2021. https://edpb.europa.eu/system/files/2021-
07/eppb_guidelines_202007_controllerprocessor_final_en.pdf
IAPP. “Top 10 Operational Responses to the GDPR — Part 9: Vetting and Contracting with Processors.”
March 14, 2018. https://iapp.org/news/a/top-10-operational-responses-to-the-gdpr-part-9-vetting-
and-contracting-with-processors.
Module 4
“Guidelines 3/2018 on the Territorial Scope of the GDPR (Article 3) - Version for Public Consultation.”
European Data Protection Board. Adopted November 16, 2018. https://edpb.europa.eu/our-work-
tools/our-documents/guidelines/guidelines-32018-territorial-scope-gdpr-article-3-version_en.
“Guidelines 5/2015 on the Interplay between the application of Article 3 and the provisions on
international transfers as per Chapter V of the GDPR,” Adopted November 18, 2021
https://edpb.europa.eu/system/files/2021-
11/edpb_guidelinesinterplaychapterv_article3_adopted_en.pdf
“Guidelines 05/2020 on consent under Regulation 2016/679”. Adopted 4 May 2020
https://edpb.europa.eu/sites/default/files/files/file1/edpb_guidelines_202005_consent_en.pdf
IAPP. “Dutch DPA hits tennis association with 525K euro GDPR fine.” Daily Dashboard. March 4, 2020.
https://iapp.org/news/a/dutch-dpa-hits-tennis-association-with-520k-euro-gdpr-fine/.
IAPP. “Top 10 Operational Responses to the GDPR — Part 2: Lawful Bases for Processing.” February 7,
2018. https://iapp.org/news/a/top-10-operational-responses-to-the-gdpr-part-2-lawful-bases-for-
processing.
Module 5
IAPP. “Top 10 Operational Responses to the GDPR — Part 7: Accommodating Data Subjects’ Rights.”
March 8, 2018. https://iapp.org/news/a/top-10-operational-responses-to-the-gdpr-part-7-
accommodating-data-subjects-rights.
Module 6
“Guidelines on Transparency.” Article 29 Data Protection Working Party. Adopted April 11, 2018.
http://ec.europa.eu/newsroom/article29/item-detail.cfm?item_id=622227.
IAPP. “Poland's DPA Issues its First GDPR fine.” Daily Dashboard. April 1, 2019.
https://iapp.org/news/a/polands-dpa-issues-first-gdpr-fine.
IAPP. “Top 10 Operational Responses to the GDPR — Part 6: Transparency and Privacy Notices.”
February 28, 2018. https://iapp.org/news/a/top-10-operational-responses-to-the-gdpr-part-6-
transparency-and-privacy-notices.
Module 7
“Guidelines 1/2018 on Certification and Identifying Certification Criteria …” European Data Protection
Board. Adopted June 4, 2019. https://edpb.europa.eu/our-work-tools/our-
documents/guidelines/guidelines-12018-certification-and-identifying-certification_en..
“Guidelines 2/2018 on Derogations of Article 49 under Regulation 2016/679.” European Data Protection
Board. Adopted May 25, 2018.
https://edpb.europa.eu/sites/edpb/files/files/file1/edpb_guidelines_2_2018_derogations_en.pdf.
“Guidelines 04/2021 on Codes of Conduct as tools for transfers,” European Data Protection Board.
Adopted February 22, 2022
https://edpb.europa.eu/system/files/2022-
03/edpb_guidelines_codes_conduct_transfers_after_public_consultation_en_1.pdf
European Commission. “Standard contractual clauses for international transfers.”
https://ec.europa.eu/info/law/law-topic/data-protection/international-dimension-data-
protection/standard-contractual-clauses-scc/standard-contractual-clauses-international-
transfers_en.
European Data Protection Board. “Recommendations 01/2020 on measures that supplement transfer
tools to ensure compliance with the EU level of protection of personal data.”
https://edpb.europa.eu/our-work-tools/our-documents/recommendations/recommendations-
012020-measures-supplement-transfer_en
European Data Protection Board. “The CNDP adopts the certification mechanism GDPR-CARPA.” June
27, 2022 https://edpb.europa.eu/news/national-news/2022/cnpd-adopts-certification-mechanism-
gdpr-carpa_en
IAPP. “UK, EU Reach Interim Data Flow Agreement.” January 4, 2021. https://iapp.org/news/a/uk-eu-
reach-interim-data-flow-agreement/
Jen Kirby, “The new Brexit deadline will be January 31,” Vox, updated October 28,
2019. https://www.vox.com/world/2019/10/28/20936119/brexit-news-january-31-extension-
european-union-uk.
Tielemans, Jetty. “Updated Brexit Privacy Checklist.” IAPP Resource Center. January 2021.
https://iapp.org/media/pdf/resource_center/brexit_privacy_checklist.pdf.
IAPP. “A breakdown of EDPB’s recommendations for data transfers post-‘Schrems II’.” November 11,
2020. https://iapp.org/news/a/a-break-down-of-edpbs-recommendations-for-data-transfers-post-
schrems-ii/
Module 8
“Guidelines 8/2020 on the targeting of social media users,” European Data Protection Board. Adopted
April 13, 2021 https://edpb.europa.eu/system/files/2021-
04/edpb_guidelines_082020_on_the_targeting_of_social_media_users_en.pdf
“Guidelines 10/2020 Restrictions under Article 23 GDPR,” European Data Protection Board. Adopted
October 13, 2021 https://edpb.europa.eu/system/files/2021-
10/edpb_guidelines202010_on_art23_adopted_after_consultation_en.pdf
“Guidelines 5/2019 on the criteria of the Right to be Forgotten in the search engines cases under the
GDPR,” European Data Protection Board. Adopted 7 July 2020
https://edpb.europa.eu/sites/default/files/files/file1/edpb_guidelines_201905_rtbfsearchengines
_afterpublicconsultation_en.pdf
Module 9
“Guidelines on Personal Data Breach Notification.” Article 29 Data Protection Working Party. Adopted
February 6, 2018. http://ec.europa.eu/newsroom/article29/item-detail.cfm?item_id=612052.
IAPP. “German state DPA issues country's first GDPR fine.” Daily Dashboard. November 26, 2018.
https://iapp.org/news/a/german-state-dpa-issues-countrys-first-gdpr-fine.
IAPP. “CNIL Issues 400K Euro Fine for GDPR Violations.” Daily Dashboard. June 6, 2019.
https://iapp.org/news/a/cnil-issues-400k-euro-fine-for-gdpr-violations.
“Guidelines 3/2019 on processing of personal data through video devices,” European Data Protection
Board. Adopted 29 January 2020
https://edpb.europa.eu/sites/default/files/files/file1/edpb_guidelines_201903_video_devices_en_
0.pdf
Module 10
“Guidelines on Data Protection Impact Assessment (DPIA) ...” Article 29 Data Protection Working Party.
Adopted April 4, 2017. http://ec.europa.eu/newsroom/article29/item-detail.cfm?item_id=611236.
“Guidelines on Data Protection Officers (‘DPOs’).” Article 29 Data Protection Working Party. Adopted
April 5, 2017. http://ec.europa.eu/newsroom/article29/item-detail.cfm?item_id=612048.
IAPP. “Top 10 Operational Responses to the GDPR — Part 3: Build and Maintain a Data Governance
System.” February 14, 2017. https://iapp.org/news/a/top-10-operational-responses-to-the-gdpr-
part-3-build-and-maintain-a-data-governance-system.
IAPP. “Top 10 Operational Responses to the GDPR — Part 4: Data Protection Impact Assessments and
Data Protection by Default and by Design.” February 20, 2018. https://iapp.org/news/a/top-10-
operational-responses-to-the-gdpr-part-4-data-protection-impact-assessments-and-data-protection-
by-default-and-by-design.
IAPP. “Top 10 Operational Responses to the GDPR — Part 5: Preparing and Implementing Data-
retention and Record-keeping Policies and Systems.” February 26, 2018.
https://iapp.org/news/a/top-10-operational-responses-to-the-gdpr-part-5-preparing-and-
implementing-data-retention-and-record-keeping-policies-and-systems/.
Piotr Foitzik, “Privacy by Default in Online Services.” The Privacy Advisor. IAPP. May 23, 2017.
https://iapp.org/news/a/privacy-by-default-in-online-services.
Module 11
“Guidelines for Identifying a Controller or Processor’s Lead Supervisory Authority.” Article 29 Data
Protection Working Party. Adopted April 5, 2017. http://ec.europa.eu/newsroom/article29/item-
detail.cfm?item_id=611235.
“Guidelines, Recommendations, Best Practices”. https://edpb.europa.eu/our-work-tools/general-
guidance/gdpr-guidelines-recommendations-best-practices_en.
“Guidelines on the Application and Setting of Administrative Fines.” Article 29 Data Protection Working
Party. Adopted October 3, 2017. https://ec.europa.eu/newsroom/article29/item-
detail.cfm?item_id=611237.
IAPP. “CNIL Levies $57M Fine on Google for GDPR Violations.” Daily Dashboard. January 22, 2019.
https://iapp.org/news/a/cnil-levies-57m-fine-on-google-for-gdpr-violations.
IAPP. “Top 10 Operational Responses to the GDPR — Part 10: Communicating with Supervisory
Authorities.” March 15, 2018. https://iapp.org/news/a/top-10-operational-responses-to-the-gdpr-
part-10-communicating-with-supervisory-authorities.
C. Legislative Framework
1. The Council of Europe Convention for the Protection of Individuals with Regard to the Module 1
Automatic Processing of Personal Data of 1981 (The CoE Convention)
6. The General Data Protection Regulation (GDPR) (EU) 2016/679 and related legislation All modules
4. Processing Module 4
5. Controller Module 3
6. Processor Module 3
a. Guidelines 07/2020 on the concepts of controller and processor in the GDPR Module 3
3. Proportionality Module 4
4. Accuracy Module 4
1. Consent Module 4
1. Access Module 5
2. Rectification Module 5
a. Guidelines 5/2019 on the criteria of the Right to be Forgotten in the search engines Module 8
cases under the GDPR
8. Restrictions Module 5
H. Accountability Requirements
a. Guidelines 05/2021 on the Interplay between the application of Article 3 and the Module 4
provisions on international transfers as per Chapter V of the GDPR
7. Derogations Module 7
A. Employment Relationship
B. Surveillance Activities
4. Geolocation Module 8
C. Direct Marketing
1. Telemarketing Module 8
We want you to succeed. Please take advantage of this advice and IAPP
resources to get through exams with as little anxiety as possible.
Cost
Preparation The IAPP offers many additional tools to help you prepare for certification at
iapp.org/certify/get-certified/cippe.
Structure
All examinations consist of multiple choice questions. Some items require reading a short
scenario, then answering questions relating to that scenario.
• 90 questions
• Two hours 30 minutes allotted time
Scoring
All IAPP Certification Exams are pass-fail. If you do not pass, you will receive a scoring
breakdown by topic to help identify areas requiring increased study should you choose to
retake the exam. A 30-day wait is required from the date of your previous exam before
testing again.
If you have additional questions or concerns, please contact certification@iapp.org.
IAPP Member Benefits At-a-Glance
• Daily and weekly e-publications summarizing News
top privacy news You are busy. We make it
easy to stay on top of the
• Discounted rates on education products and headlines.
programs, including study materials for our
globally recognized certification programs, Certify
and annual conferences and events IAPP certification is what
employers want. We can
• The Privacy Advisor, the IAPP’s monthly help you advance your
members-only newsletter career and increase your
earning potential.
• Professional networking opportunities,
including free KnowledgeNet chapter
Learn
meetings to keep you connected in your
10+ free web conferences
local community give you instant access to
the latest and greatest in
• Privacy salary surveys that benchmark
privacy.
compensation trends, roles and functions
among privacy departments
Connect
• Privacy job postings It is all about who you
know. Targeted online and
• Access to members-only tools, research, face-to-face networking
articles and more in the IAPP’s online opportunities give you access
Resource Center to the people you want to
meet.
• The IAPP Membership Directory, an online
tool that allows you to search for and Resources
network with other IAPP members The newly revamped
Resource Center is a one-
• Free web conferences
stop-shop for practical tools
• Access to the Privacy Tracker blog and research to help you
tackle your biggest
• Cooperative programs with other national challenges.
and international organizations
Presented to:
Date Attended:
J. Trevor Hughes
IAPP President & CEO