Showing posts with label Data Protection. Show all posts
Showing posts with label Data Protection. Show all posts

Thursday 26 April 2018

What is GDPR and why it is so important

The General Data Protection Regulation (GDPR)

The General Data Protection Regulation (GDPR) (EU) 2016/679 is a regulation in EU law on data protection and privacy for all individuals within the European Union. It addresses the export of personal data outside the EU. The GDPR aims primarily to give control to citizens and residents over their personal data and to simplify the regulatory environment for international business by unifying the regulation within the EU. When the GDPR takes effect, it will replace the 1995 Data Protection Directive (Directive 95/46/EC).



It was adopted on 27 April 2016. It becomes enforceable from 25 May 2018, after a two-year transition period.

Unlike a directive, it does not require national governments to pass any enabling legislation and so it is directly binding and applicable.

View it on Wikipedia


Scope

The regulation applies if the data controller (an organisation that collects data from EU residents), or processor (an organisation that processes data on behalf of a data controller like cloud service providers), or the data subject (person) is based in the EU. The regulation also applies to organisations based outside the EU if they collect or process personal data of individuals located inside the EU.
According to the European Commission, "personal data is any information relating to an individual, whether it relates to his or her private, professional or public life. It can be anything from a name, a home address, a photo, an email address, bank details, posts on social networking websites, medical information, or a computer’s IP address."[8]
The regulation does not purport to apply to the processing of personal data for national security activities or law enforcement of the EU; however, industry groups concerned about facing a potential conflict of laws have questioned whether Article 48[9] of the GDPR could be invoked to seek to prevent a data controller subject to a third country's laws from complying with a legal order from that country's law enforcement, judicial, or national security authorities to disclose to such authorities the personal data of an EU person, regardless of whether the data resides in or out of the EU. Article 48 states that any judgement of a court or tribunal and any decision of an administrative authority of a third country requiring a controller or processor to transfer or disclose personal data may not be recognised or enforceable in any manner unless based on an international agreement, like a mutual legal assistance treaty in force between the requesting third (non-EU) country and the EU or a member state. The data protection reform package also includes a separate Data Protection Directive for the police and criminal justice sector[10] that provides rules on personal data exchanges at national, European, and international levels.

Single set of rules and one-stop shop

A single set of rules will apply to all EU member states. Each member state will establish an independent supervisory authority (SA) to hear and investigate complaints, sanction administrative offences, etc. SAs in each member state will co-operate with other SAs, providing mutual assistance and organising joint operations. If a business has multiple establishments in the EU, it will have a single SA as its "lead authority", based on the location of its "main establishment" where the main processing activities take place. The lead authority will act as a "one-stop shop" to supervise all the processing activities of that business throughout the EU[11][12] (Articles 46–55 of the GDPR). A European Data Protection Board (EDPB) will coordinate the SAs. EDPB will replace the Article 29 Data Protection Working Party.
There are exceptions for data processed in an employment context or in national security that still might be subject to individual country regulations (Articles 2(2)(a) and 82 of the GDPR).

Responsibility and accountability

The notice requirements remain and are expanded. They must include the retention time for personal data, and contact information for data controller and data protection officer has to be provided.
Automated individual decision-making, including profiling (Article 22) is contestable, similarly to the Data Protection Directive (Article 15). Citizens have rights to question and fight significant decisions that affect them that have been made on a solely-algorithmic basis. Many media outlets have commented on the introduction of a "right to explanation" of algorithmic decisions,[13][14] but legal scholars have since argued that the existence of such a right is highly unclear without judicial tests and is limited at best.[15][16]
To be able to demonstrate compliance with the GDPR, the data controller should implement measures, which meet the principles of data protection by design and data protection by default. Privacy by design and by default (Article 25) require data protection measures to be designed into the development of business processes for products and services. Such measures include pseudonymising personal data, by the controller, as soon as possible (Recital 78).
It is the responsibility and the liability of the data controller to implement effective measures and be able to demonstrate the compliance of processing activities even if the processing is carried out by a data processor on behalf of the controller (Recital 74).
Data Protection Impact Assessments (Article 35) have to be conducted when specific risks occur to the rights and freedoms of data subjects. Risk assessment and mitigation is required and prior approval of the national data protection authorities (DPAs) is required for high risks. Data protection officers (Articles 37–39) are required to ensure compliance within organisations.
They have to be appointed:
  • for all public authorities, except for courts acting in their judicial capacity
  • if the core activities of the controller or the processor are:
    • processing operations, which, by virtue of their nature, their scope and/or their purposes, require regular and systematic monitoring of data subjects on a large scale
    • processing on a large scale of special categories of data pursuant to Article 9 and personal data relating to criminal convictions and offences referred to in Article 10[17]

Lawful basis for processing

Data may not be processed unless there is at least one lawful basis to do so:[18]
  • The data subject has given consent to the processing of personal data for one or more specific purposes.
  • Processing is necessary for the performance of a contract to which the data subject is party or to take steps at the request of the data subject prior to entering into a contract.
  • Processing is necessary for compliance with a legal obligation to which the controller is subject.
  • Processing is necessary to protect the vital interests of the data subject or of another natural person.
  • Processing is necessary for the performance of a task carried out in the public interest or in the exercise of official authority vested in the controller.
  • Processing is necessary for the purposes of the legitimate interests pursued by the controller or by a third party unless such interests are overridden by the interests or fundamental rights and freedoms of the data subject, which require protection of personal data, in particular if the data subject is a child.

Consent

If consent is used as the lawful basis for processing, consent must be explicit for data collected and the purposes data is used for (Article 7; defined in Article 4). Consent for children[19] must be given by the child’s parent or custodian, and verifiable (Article 8). Data controllers must be able to prove "consent" (opt-in) and consent may be withdrawn.[20]
The area of GDPR consent has a number of implications for businesses who record calls as a matter of practice. The typical “calls are recorded for training and security purposes” warnings will no longer be sufficient to gain assumed consent to record calls. Additionally, when recording has commenced, should the caller withdraw their consent then the agent receiving the call must somehow be able to stop a previously started recording and ensure the recording does not get stored.[21]

Data protection officer

If the processing is carried out by a public authority, except for courts or independent judicial authorities when acting in their judicial capacity or if, in the private sector, processing is carried out by a controller whose core activities consist of processing operations that require regular and systematic monitoring of the data subjects, a person with expert knowledge of data protection law and practices should assist the controller or processor to monitor internal compliance with this regulation.
The DPO is similar to a compliance officer and is also expected to be proficient at managing IT processes, data security (including dealing with cyberattacks) and other critical business continuity issues around the holding and processing of personal and sensitive data. The skill set required stretches beyond understanding legal compliance with data protection laws and regulations.
The appointment of a DPO in a large organization will be a challenge for the board as well as for the individual concerned.[citation needed] There are myriad governance and human factor issues that organisations and companies will need to address given the scope and nature of the appointment. In addition, the DPO must have a support team and will also be responsible for continuing professional development to be independent of the organization that employs them, effectively as a "mini-regulator."
More details on the function and the role of data protection officer were given on 13 December 2016 (revised 5 April 2017) in a guideline document.[22]

Pseudonymisation

The GDPR refers to pseudonymisation as a process that is required (as an alternative to the other option of complete data anonymization)[23] to transform personal data in such a way that the resulting data cannot be attributed to a specific data subject without the use of additional information. An example is encryption, which renders the original data unintelligible and the process cannot be reversed without access to the correct decryption key. The GDPR requires for the additional information (such as the decryption key) to be kept separately from the pseudonymised data.
Another example of pseudonymisation is tokenization, which is a non-mathematical approach to protecting data at rest that replaces sensitive data with non-sensitive substitutes, referred to as tokens. The tokens have no extrinsic or exploitable meaning or value. Tokenization does not alter the type or length of data, which means it can be processed by legacy systems such as databases that may be sensitive to data length and type.
That requires much fewer computational resources to process and less storage space in databases than traditionally-encrypted data. That is achieved by keeping specific data fully or partially visible for processing and analytics while sensitive information is kept hidden.
Pseudonymisation is recommended to reduce the risks to the concerned data subjects and also to help controllers and processors to meet their data protection obligations (Recital 28).
Although the GDPR encourages the use of pseudonymisation to "reduce risks to the data subjects" (Recital 28), pseudonymised data is still considered personal data (Recital 26) and so remains covered by the GDPR.

Data breaches

Under the GDPR, the data controller is under a legal obligation to notify the supervisory authority without undue delay unless the breach is unlikely to result in a risk to the rights and freedoms of the individuals. There is a maximum of 72 hours after becoming aware of the data breach to make the report (Article 33). Individuals have to be notified if adverse impact is determined (Article 34). In addition, the data processor will have to notify the controller without undue delay after becoming aware of a personal data breach (Article 33).
However, the notice to data subjects is not required if the data controller has implemented appropriate technical and organisational protection measures that render the personal data unintelligible to any person who is not authorised to access it, such as encryption (Article 34).

Sanctions

The following sanctions can be imposed:
  • a warning in writing in cases of first and non-intentional noncompliance
  • regular periodic data protection audits
  • a fine up to €20 million or up to 4% of the annual worldwide turnover of the preceding financial year in case of an enterprise, whichever is greater, if there has been an infringement of the following provisions (Article 83, Paragraph 5 & 6[24])
    • the obligations of the controller and the processor pursuant to Articles 8, 11, 25 to 39, and 42 and 43
    • the obligations of the certification body pursuant to Articles 42 and 43
    • the obligations of the monitoring body pursuant to Article 41(4)
  • a fine up to €20 million or up to 4% of the annual worldwide turnover of the preceding financial year in case of an enterprise, whichever is greater, if there has been an infringement of the following provisions: (Article 83, Paragraph 4[24])
    • the basic principles for processing, including conditions for consent, pursuant to Articles 5, 6, 7, and 9
    • the data subjects' rights pursuant to Articles 12 to 22
    • the transfers of personal data to a recipient in a third country or an international organisation pursuant to Articles 44 to 49
    • any obligations pursuant to member state law adopted under Chapter IX
    • noncompliance with an order or a temporary or definitive limitation on processing or the suspension of data flows by the supervisory authority pursuant to Article 58(2) or failure to provide access in violation of Article 58(1)

Right of access

The right of access (Article 15) is a data subject right.[25] It gives citizens the right to access their personal data and information about how this personal data is being processed. A data controller must provide, upon request, an overview of the categories of data that are being processed (Article 15(1)(b)) as well as a copy of the actual data (Article 15(3)). Furthermore, the data controller has to inform the data subject on details about the processing, such as the purposes of the processing (Article 15(1)(a)), with whom the data is shared (Article 15(1)(c)), and how it acquired the data (Article 15(1)(g)).

Right to erasure

right to be forgotten was replaced by a more limited right of erasure in the version of the GDPR that was adopted by the European Parliament in March 2014.[26][27] Article 17 provides that the data subject has the right to request erasure of personal data related to them on any one of a number of grounds, including noncompliance with Article 6.1 (lawfulness) that includes a case (f) if the legitimate interests of the controller is overridden by the interests or fundamental rights and freedoms of the data subject, which require protection of personal data (see also Google Spain SL, Google Inc. v Agencia Española de Protección de Datos, Mario Costeja González).

Data portability

Further information: Data portability
A person is to be able to transfer personal data from one electronic processing system to and into another, without being prevented from doing so by the data controller. Data that has been sufficiently anonymised is excluded, but data that has been only de-identified but remains possible to link to the individual in question, such as by providing the relevant identifier, is not.[28] Both data being 'provided' by the data subject and data being 'observed', such as about behaviour, are included. In addition, the data must be provided by the controller in a structured and commonly used standard electronic format. The right to data portability is provided by Article 20 of the GDPR.[7] Legal experts see in the final version of this measure a "new right" created that "reaches beyond the scope of data portability between two controllers as stipulated in [Article 20]".[29]

Data protection by design and by default

Data protection by design and by default (Article 25) requires data protection to be designed into the development of business processes for products and services. Privacy settings must therefore be set at a high level by default, and technical and procedural measures should be taken by the controller to make sure that the processing, throughout the whole processing lifecycle, complies with the regulation. Controllers should also implement mechanisms to ensure that personal data is not processed unless necessary for each specific purpose.
A report[30] by the European Union Agency for Network and Information Security elaborates on what needs to be done to achieve privacy and data protection by default. It specifies that encryption and decryption operations must be carried out locally, not by remote service, because both keys and data must remain in the power of the data owner if any privacy is to be achieved. The report specifies that outsourced data storage on remote clouds is practical and relatively safe if only the data owner, not the cloud service, holds the decryption keys.

Records of processing activities

Records of processing activities must be maintained that include purposes of the processing, categories involved and envisaged time limits. The records must be made available to the supervisory authority on request (Article 30).[31]

Restrictions

The following cases are not covered by the regulation:[18]
  • Lawful interception, national security, the army, the police, justice
  • Statistical and scientific analysis
  • Deceased persons are subject to national legislation
  • There is a dedicated law on employer-employee relationships
  • Processing of personal data by a natural person in the course of a purely personal or household activity

Discussion and challenges

The proposal for the new regulation gave rise to much discussion and controversy.[32][33] Thousands of amendments were proposed.[34] The single set of rules and the removal of administrative requirements were both supposed to save money; however, as a May 2017 study conducted by Dimensional Research and TrustArc shows,[35] IT professionals expect that compliance with GDPR will require additional investment overall: over 80 percent of those surveyed expected GDPR-related spending to be at least $100,000.[36] The concerns were echoed in a report commissioned by the law firm Baker & McKenzie that found that "around 70 percent of respondents believe that organizations will need to invest additional budget/effort to comply with the consent, data mapping and cross-border data transfer requirements under the GDPR."[37] Critics[who?] pointed to other issues as well.
  • The requirement to have a data protection officer (DPO) is new for many EU countries and is criticised[by whom?] for its administrative burden.
  • The GDPR was developed with a focus on social networks and cloud providers but did not consider enough requirements for handling employee data.[38][not in citation given]
  • Data portability is not seen as a key aspect for data protection but more a functional requirement for social networks and cloud providers although data portability creates transparency to evaluate privacy concerns of controllers.[citation needed]
  • Although data minimisation is a requirement, with pseudonymisation being one of the possible means, the regulation provide no guidance on how or what constitutes an effective data de-identification scheme, with a grey area on what would be considered as inadequate pseudonymisation subject to Section 5 enforcement actions.[39][40][41]
  • The protection against automated decisions in Article 22, brought forward from the Data Protection Directive's Article 15, has been claimed to provide protection against growing numbers of algorithmic decisions online and offline, including potentially a right to explanation. Whether the old provisions do provide any meaningful protection is a subject of ongoing debate.[16]
  • Language and staffing challenges for the national data protection authorities (DPAs), as EU citizens no longer have a single DPA to contact for their concerns but have to deal with the DPA chosen by the company involved.
  • Personal data cannot be transferred to countries outside the European Union unless they guarantee the same level of data protection.[42]
  • There is concern regarding the implementation of GDPR in blockchain systems, as the transparent and fixed record of blockchain transactions contradicts the very nature of GDPR.[43]
  • The biggest challenges might be in the implementation of the GDPR:
    • The implementation of the GDPR will require comprehensive changes to business practices for companies that had not implemented a comparable level of privacy before the regulation entered into force, especially non-European companies handling EU personal data.[citation needed]
    • There is already a lack of privacy experts and knowledge and so new requirements might worsen the situation. Therefore, education in data protection and privacy legislation, particularly to keep in compliance with new rules as they arise, will be a critical factor for the success of the GDPR.[44] "Privacy by Design" and related topics were known to specialists only before GDPR, and were manly discussed in communities at law schools and in cryptography research. Recent university offerings just began to spread knowledge about designing for privacy from the legal, technological and managerial perspective, for example Karlstad university's free and open on-line course at master level.[45]
    • The European Commission and DPAs must provide sufficient resources and power to enforce the implementation.
    • A unique level of data protection has to be agreed upon by all European DPAs, as a different interpretation of the regulation might still lead to different levels of privacy.[citation needed]
    • Europe's international trade policy is not yet in line with the GDPR.[46]

Timeline

Featured Post

The Google crawler is now Site Verifier User Agent

A new Google crawler, a new user agent, has been added to the Google spider list. Google Site Verifier User Agent is its name. By the way, t...

Popular Posts