37 Offices in 18 Countries
Current Trends in Data Protection Law
Berlin, 05th December 2013
- Dr. Annette Demmel
Matei Ujica, LL.M.
39 Offices in 19 Countries
Current Trends in Data Protection Law Berlin, 05 th December 2013 - - PowerPoint PPT Presentation
Current Trends in Data Protection Law Berlin, 05 th December 2013 Dr. Annette Demmel Matei Ujica, LL.M. 37 Offices in 18 Countries 39 Offices in 19 Countries Who we are Dr. Annette Demmel Matei Ujica, LL.M. 2 and where we are We are
37 Offices in 18 Countries
Matei Ujica, LL.M.
39 Offices in 19 Countries
2
3
dated 25 January 2012, amended by Parliament
directly applicable in all Member States
unknown, prospectively in 2014
Adjustment of EU data protection law to the Internet age
All citizens and companies as well as public authorities
4 Source: European Commission, Eurobarometer 74.3, Results for Germany, Attitude towards data privacy and electronic identity in the European Union
How important is it for you that your personal information is protected in the same way regardless in which EU country these information is collected and processed?
5
Responsible bodies within the EU, independent of whether the data is processed Responsible bodies outside of the EU provided that the concerned individual is based in the EU and the processing serves the purpose of
and services in the EU or
behavior.
6
7
8 Source: European Commission, Eurobarometer 74.3, Results for Germany, Attitude towards data privacy and electronic identity in the European Union
Would you prefer that your explicit consent is obtained before personal information is collected and processed?
voluntary
remaining text
Text: blabla blabla blabla blabla blabla blabla blabla blabla blabla blabla blabla blabla blabla blabla blabla Consent:
9
I consent to my personal data …..
Privacy by design: Technical procedures are to be used, which
authorities;
concerned individuals per year Documentation ! Children Observance of data protection standards Notification of public authorities and concerned individual of data protection violations Data protection – Risk analysis of certain activities
Appointment of a company data protection officer
10
11 Source: European Commission, Eurobarometer 74.3, Results for Germany, Attitude towards data privacy and electronic identity in the European Union
If you decide to change the internet service provider or terminate the relationship how important is it for you that your personal information from this service may be transferred to another service?
demand the deletion of his data and omission of any further processing
Right to data portability
a common format
12
13
According to an article in The Washington Post, the US National Security Agency has supposedly broken data protection rules thousands of times each year since 2008 or overstepped its authority. This was reported by the newspaper with reference to an internal investigation of the NSA and other strictly confidential
former NSA employee Edward Snowden.
Quelle: Spiegel Online
14
15
Step 1: Data transfer from one company to another
Step 2: Reasonable level of protection in the recipient country a) Exists in the EU, the EEA (Norway, Liechtenstein, Iceland) b) Exists in Canada, Switzerland, Argentina, Israel, Guernsey, Andorra, Faroe Islands, Australia, Isle of Man, Jersey, Uruguay, New Zealand c) Exists for Safe Harbor certification in the USA plus diverse and regular confirmations d) Exists for the stipulation of EU standard contractual clauses e) Exists in the case of agreement of binding corporate rules (for intra-group transfers) Transfers according to a) - d) are principally not subject to authorization
– If a company data protection officer has been appointed and – Has assessed the data processing in advance and endorsed it
16
17
reviewed
18
– Technical and organizational measures including security concepts
– Legal framework conditions.
– Location of the data processing, – Notification of any change of location, – Portability, – Interoperability, – Implementation of the agreed IT security and data protection
=> Current and persuasive proof (e.g. certificates of recognized and independent audit organizations)
19
20
– Can fulfill their obligations as the responsible body at all times, – In particular, can fulfill their obligations to delete, block and make
– Can fulfill the claims for information of the concerned individuals
21
Source: http://www.microsoft.com/online/legal/v2/?docid=43&langid=de-de (Effective date: 12 November 2013)
22
Source: SaaS Online Cloud Services Agreement, http://www.oracle.com/us/corporate/contracts/saas-online- csa-de-1978862.pdf (Effective date: 12 November 2013)
23
24
Unter den Linden, Construction Site U55