Sie sind auf Seite 1von 47

7 EDPD 2017

th
EUROPEAN DATA PROTECTION DAYS
15 + 16 MAY 2017 | BERLIN, GERMANY | CONFERENCE REPORT

The leading European data privacy platform in Germany

www.edpd-conference.com
TABLE OF CONTENTS

1ST DAY | 15 MAY 2017

Opening remarks from EUROFORUM DISCUSSION International Data Transfers: DISCUSSION Are businesses “GDPR-ready”?
and the conference chair Will Privacy Shield enable global data flows and Dr Axel Kessler LL.M., Dr Barbara Kirchberg-Lennartz,
Bojana Bellamy 4 create legal certainty? Dana Louise Simberkoff, JoAnn Stonier 19
Caitlin Fennessy, Peter Fleischer, Bruno Gencarelli,
Hitting the ground running: Dr Claus-Dieter Ulmer, Alan Winters, 12 PARALLEL SESSIONS Implementation of the GDPR
How regulators and businesses can really put data at eBay – Experiences and learnings
protection accountability into practice DPA Developments in the Philippines Dr Anna Zeiter LL.M. (Stanford) 20
Giovanni Buttarelli 5 Raymund Enriquez Liboro 13
PARALLEL SESSIONS The new ePrivacy regulation
Observations on the GDPR 2018 from Hong Kong’s The scope of EU data protection legislation vs. the scope Ruth Boardman 21
perspective of the EU fundamental right to data protection –
Prof. Stephen Kai-yi Wong 6 which cases may be dealt with by the Court of Justice? PARALLEL SESSIONS The Universality of consent
Dr Christoph Sobotta 14 in global data protection
Atlantic crossings: US/EU data flows Patricia Kosseim 22
Hugh Stevenson 7 One Year to GDPR: How is Google preparing?
Peter Fleischer 15 PARALLEL SESSIONS Implementation of the data
DISCUSSION The latest developments in international protection reform and international transfers:
data protection – one year before the GDPR will apply Challenges in implementing the GDPR the view from the European Commission
Giovanni Buttarelli, Isabelle Falque-Pierrotin, Hugh Stevenson, in an international company Bruno Gencarelli 23
Prof. Stephen Kai-yi Wong 8 Dr Axel Kessler LL.M. 16
PARALLEL SESSIONS Grappling with the internet
KEYNOTE Implementation of GDPR in an Airline: of things, disruptive technology and cloud of things
Isabelle Falque-Pierrotin 9 Ideas and first experiences in practice in the context of a smart nation initiative
Dr Barbara Kirchberg-Lennartz 17 Steve Tan 24
Transitioning towards the GDPR –
Challenges and opportunities Implementation of GDPR in a large multinational PARALLEL SESSIONS Data protection in Tunisia
Helen Dixon 10 organization as a tool for development
Mikko Niva 18 Héla Ben Miled 25
Privacy Shield
Caitlin Fennessy 11

2
TABLE OF CONTENTS

2ND DAY | 16 MAY 2017

Digital Disinformation – Biometrics as personal data: detection, characterization PARALLEL SESSIONS Turning the upcoming GDPR
Fake news and hacking in election campaigns and recognition into a business enabler – the startup perspective
Dr Ben Scott 26 Jonathan Avila 34 Caroline Olstedt Carlström 41
Designing for the GDPR: making it work for data subjects Consent and transparency under the GDPR – PARALLEL SESSIONS Getting ready for GDPR:
Stephen Deadman 27 will it help to build consumer trust? a look at new tech to automate privacy
Roslyn Vadala 35 Nimrod Vax, Dimitri Sirota 42
Worldwide standards in data privacy – digital sovereignty
as foundation for a common understanding? A global perspective on multi-jurisdictional PARALLEL SESSIONS Broadcast meets broadband:
Dr Claus-Dieter Ulmer 28 investigations Privacy compliance in the media sector
Cédric Burton 36 Dr Stefan Hanloser 43
EU Fundamental rights in the cloud
Marie-Charlotte Roques-Bonnet 29 PARALLEL SESSIONS Pseudonymization PARALLEL SESSIONS Negotiate cloud contracts
as a best practice for data protection under the GDPR
DPIAs and data mapping: operationalising GDPR and Nicola Orlandi 37 Paul Van den Bulck 44
privacy by design
Kabir Barday 30 PARALLEL SESSIONS Employees sensitive data PARALLEL SESSIONS The theories of harm in privacy,
collection in Eastern Europe data protection and antitrust law
Big Data and the GDPR: innovative or conservative? Dr Marlena Wach 38 Dr Sára Hoffman 45
Yann Padova 31
PARALLEL SESSIONS The role of the DPO in the GDP PARALLEL SESSIONS Meeting the challenge
Big Data – the silver bullet or a threat to a free society? Nathalie Laneret 39 of a global GDPR and BCR program
Amancio Kolompar 32 Myriam Gufflet, John Bowman 46
PARALLEL SESSIONS Coordinated data protection
DISCUSSION How to strike a balance between Big Data enforcement – The new rules of the game Conference trailer and
and data protection? Dr Friedrich Popp 40 Save The Date 47
Amancio Kolompar, Yann Padova, Jules Polonetsky 33

3
EDPD 2017 1st Day (15 May 2017)

Opening remarks from EUROFORUM and the conference chair

Bojana Bellamy,
President, Centre for Information Policy Leadership, Hunton & Williams,
UK

In her opening remarks, Ms. Bellamy first reflected on what has hap- so-called “third countries” (in the terminology of European data pro- something that needs to be used sustainable, responsibly and with
pened during the last year, the predominant topic being the overall tection law) such as Canada, China, and the Philippines, who are also accountability. Third, the increasing importance of data in interna-
effort to get ready for the entering into force of the General Data shaping the landscape in the data protection world. tional trade. According to a 2016 McKinsey survey, global flows in
Protection Regulation (GDPR). It is not only a challenge for enter- services have diminished by data transfers have increased.
prises but also for the lawmakers, who work towards implement- Ms. Bellamy then outlined some general thoughts in connection
ing national legislation, as well as authorities, which go through with data protection. First, the importance of finding the right bal- Ms. Bellamy closed her opening remarks on an optimistic note. When
an equally transformative process. In this context, Ms. Bellamy wel- ance between data enablement and data protection. Second, the thinking about the GDPR, we often think about costs, risks and fines.
comed the EDPD 2017 as opportunity not only to exchange views right way of thinking about personal data. Data is often called the We should, however, see it as a chance to introduce the data driven
with European colleagues but also to speak with leaders from new oil but Ms. Bellamy rather thinks of it like the environment, i.e., economy in our enterprises, enabling new business models.

4
EDPD 2017 1st Day (15 May 2017)

Hitting the ground running: How regulators and businesses can really put
data protection accountability into practice
Giovanni Buttarelli,
European Data Protection Supervisor

Mr. Buttarelli, the European Data Protection Supervisor (EDPS), deli­ the implementation of accountability tools (such as data protection will require significant resources in time, money and people in order
vered a keynote speech on accountability. Accountability constitutes impact assessments and audits), and because they act as intermediar- to ensure compliance. Third, companies may also run into poten-
a key principle of the General Data Protection Regulation (GDPR). Mr. ies between relevant stakeholders (e.g. supervisory authorities, data tial scalability issues (how to implement accountability measures
Buttarelli opened by stating that one of the key sentences in the Arti- subjects, and business units within an organization). Therefore, DPOs depending on the size of their business or the risk associated with
cle 29 Working Party Opinion no. 3/2010 of 2010 was that EU data must be granted enough resources and support from their organiza- the data processing?).
protection principles are often insufficiently reflected in concrete tion in order to be able to perform their duties. Third, accountability
measures, and that there is a strong need to move from theory to is a very practical principle and the question is really how things are Mr. Buttarelli then also addressed the role and challenges of the data
practice. Now, however, the GDPR includes a direct reference to the actually done within an organization. Up-to-date documentation, protection authorities when it comes to accountability. Privacy and
“accountability principle” in Article 5.2 and Article 24. registers for data transfers and records of where there any exceptions data protection commissioners around the world should definitely
have been used are very important in this regard. take a sound, pragmatic approach. „Pragmatic“ means, for example,
Mr. Buttarelli then gave his thoughts on how to properly implement as regards documentation obligations, that it is not in the spirit of
accountability in an organization. First, accountability goes beyond Mr. Buttarelli then outlined some challenges organizations may the GDPR to ask controllers and processors to each and every detail
mere compliance with the rules but implies a cultural change from face when implementing accountability. First, considerable leeway of their processing; rather the controller should focus on what is
inside organizations. In particular, accountability relies greatly on is given to organizations with regard to how to implement internal essential. Also, it may prove difficult for data protection authorities
the level of commitment from the organization’s management, as measures to ensure compliance with data protection rules, which to understand how the respective company works from the inside in
evidenced by internal processes and responsibilities. Second, the may also lead to uncertainty on the part of organizations (but Mr. order to be able to appreciate if the individual accountability meas-
Data Protection Officers (DPO) will play a key role with regard to Buttarelli also stressed that there is a lot of guidance how to imple- ures put in place are meaningful.
accountability because they facilitate compliance – e.g., through ment accountability); Second, implementing meaningful measures

5
EDPD 2017 1st Day (15 May 2017)

Observations on the GDPR 2018 from Hong Kong’s perspective

Prof. Stephen Kai-yi Wong,


Privacy Commissioner for Personal Data,
Hong Kong

Professor Stephen Wong, the Privacy Commissioner for Personal businesses are among the least prepared for GDPR. 32% of busi- cessing a child’s personal data. Mr. Wong made some observations
Data, Hong Kong, talked about the impact of the imminent imple- nesses worldwide worry that their existing systems cannot manage with regard to the consent issue, namely that an overreliance on
mentation of the European General Data Protection Regulation data effectively. consent may impede business activities and may lead to a “consent
(GDPR). First, Prof. Wong gave a bit of a background regarding the fatigue”. Also, it may be challenging for businesses to obtain consent
data protection law in Hong Kong, the Personal Data (Privacy) Ordi- Mr. Wong then went on to outline some of the diverging aspects efficiently and validly. The second diverging aspect was the right to
nance (PDPO). The PDPO was enacted in 1995 as first comprehensive between the Hong Kong PDPO and the GDPR. The Privacy Commis- be forgotten. This concept is not spelled-out in the PDPO and is more
data protection law in Asia. It is to some extent based on the 1980 sioner for Personal Data in Hong Kong has identified approximately a question about the misuse of personal data. Third, the PDPO does
OECD Privacy Guidelines and the 1995 EU Data Protection Directive. 13 main diverging aspects, however, due to the time restraints Mr. not provide a general right to object to processing. A data subject
Wong focused on only three of those: Consent, the right to be for- may, however, withdraw its consent for new data processing pur-
Mr. Wong then presented some interesting figures. According to a gotten and the right to object to processing. With regard to consent, poses and may opt out of direct marketing.
recent survey, which was designed to assess the GDPR’s impact on Mr. Wong explained that under the PDPO, no consent is required for
businesses (in particular on multi-national organizations), 86% of the initial data collection; the focus is on providing notice. Consent
businesses worldwide worry that failure in GDPR compliance has may, however, be required if collected data is later used for new pur-
significant negative impact on businesses. More than 50% of APAC poses. Also, no parental consent is required under the PDPO for pro-

6
EDPD 2017 1st Day (15 May 2017)

Atlantic crossings: US/EU data flows

Hugh Stevenson,
Deputy Director, Federal Trade Commission,
USA

Hugh Stevenson, Deputy Director of the US Federal Trade Commis- ment aspect of the framework. Mr. Stevenson summarized some of cials across the country has been bundled by use of an online alert
sion, gave a presentation about the challengers of the US/EU data the recent improvements that have been made to the work of the system. Second, the sharing of information needs to be optimized in
flows, and how those challenges should be addressed in the view FTC within the framework, such as the prioritization of requests order to enable investigations to move forward more quickly. Third,
of the FTC. For the FTC, privacy is part of its consumer protection from European data protection authorities and arbitration providers it becomes increasingly challenging to keep up with technological
mission. as well as the creation of a more standardized referral process for developments and understand the emerging technologies (e.g., the
requests from European data protection authorities. use of artificial intelligence in connection with investment advice); in
Mr. Steven started off by emphasizing the benefits and importance this area, too, there should be more cooperation between the differ-
of free data flows as they unlock the benefits of the digital economy. Mr. Stevenson then went on to outline a few of the current challenges ent privacy and data protection bodies.
Given that there are different data protection regimes around the the FTC is facing with regard to its activities. First, due to the global
world, interoperability of these regimes is of utmost importance. nature of today’s digital economy, there is the challenge to collect In a short Q&A session at the end, Mr. Stevenson stressed among
One of the examples in this regard is the new US/EU Privacy Shield. all required information in order to effectively cooperate with data other things that all current FTC commissioners are supportive of the
The FTC’s main role in this context is to ensure that US companies protection authorities. In this area, there have been some improve- Privacy Shield.
keep the promises they made under the framework, i.e., the enforce- ments as the communication of different privacy enforcement offi-

7
EDPD 2017 1st Day (15 May 2017)

DISCUSSION The latest developments in international data protection –


one year before the GDPR will apply
Giovanni Buttarelli, Isabelle Falque-Pierrotin, Hugh Stevenson, Prof. Stephen Kai-yi Wong,
European Data Protection Chairwoman of CNIL, Chairwoman Deputy Director, Privacy Commissioner for
Supervisor of Article 29 Working Party, France Federal Trade Commission, USA Personal Data, Hong Kong

After the first round of presentations for the day, an interesting certain privacy rights, although being expressed in a different way In the end, there was a common understanding that there is no need
panel discussion developed between Ms. Bellamy, Mr. Buttarelli, Ms. (e.g., regarding the approaches for balancing interests). for streamlined international rules in order to make international
Falque-Pierrotin, Mr. Stevenson and Prof. Wong with regard to the data protection work but rather, there needs to be an interoperabil-
topic of whether there is more convergence or more divergence in Despite this tendency towards convergence, the panel did, however, ity of systems. There are many mechanisms in the General Data Pro-
data protection regimes on an international level. also note that there are great differences in substance and methods. tection Regulation to ensure such an interoperability (e.g., Binding
The right to be forgotten, e.g., is probably one of the more disputed Corporate Rules) as well as in other areas such as the CBPRs in Asia.
Ms. Falque-Pierrotin put forth that in her view, there is more con- concepts internationally. In this regard, an interesting point was Ms. Falque-Pierrotin also mentioned digital education as a first level
vergence as privacy protection (as well as cyber security) is becom- raised by Prof. Wong. According to him, there is not only a difference of bridging gaps.
ing a high priority around the world and also, there is an increasing in the legal frameworks but also a diverging cultural framework. In
amount of cooperation between regulators on an international level. Asia, data privacy rights are more community rights than individual
It is „everyday life“ to exchange views. Mr. Stevenson expressed his rights. Also, the notion of privacy being a fundamental human right
view that there is a core notion amongst most nations that there are is not as prevalent in Asia as it is in other parts of the world.

8
EDPD 2017 1st Day (15 May 2017)

Atlantic crossings: US/EU data flows

Isabelle Falque-Pierrotin,
Chairwoman of CNIL, Chairwoman of Article 29 Working Party,
France

Ms. Falque-Pierrotin, Chairwoman of the French data protection very close to the operational units so that he or she can have enough the road; however, companies should nevertheless expect this guid-
authority CNIL and Chairwoman of the Article 29 Working Party, insight into the actual business operation. Appointing a DPO is only ance to be valid for quite some time now, as legal certainty requires
opened her keynote address by emphasizing that, in her experience, mandatory for some enterprises; however, the Article 29 Group recom- any revision of these guidelines not to take place too soon.
privacy compliance is no longer seen as a restraint but as an oppor- mends to voluntarily appoint a DPO in most instances. Another GDPR
tunity for a competitive business advantage by organizations. She feature to keep in mind is data portability. In particular, the exercise of Ms. Falque-Pierrotin also addressed the increasing cooperation of
then went on to address two important privacy topics: the General this right does not prejudice any other right of a data subject. DPAs both on a European and on an international level. In the whole
Data Protection Regulation (GDPR) and the US/EU Privacy Shield. process of moving towards GDPR compliance, DPAs are facing sim-
With regard to the GDPR, Ms. Falque-Pierrotin stressed that imple- Ms. Falque-Pierrotin also made a few remarks regarding the role of ilar challenges as data controllers, e.g., regarding the increasing
menting the required changes is very important for organizations the data protection authorities (DPAs) in light of the implementa- demand of not only legal expertise but also economic, strategic,
and that they must invest time and money in this task. tion of the GDPR. Their core responsibilities are simplification, clar- and technical expertise. With regard to the US/EU Privacy Shield,
ification, and harmonization. Diverging interpretations of the text Ms. Falque-Pierrotin reiterated some of the concerns the Article 29
She then highlighted some features of the GDPR. The Data Protec- should be avoided. The Article 29 Working Party has started publish- Working Party has already made publicly. She stressed that the revi-
tion Officer (DPO), for example, is a very important function under ing guidance on priority subjects (e.g., portability and the DPO) and sion of the Privacy Shield in September of this year will be crucial for
the GDPR. When implementing the DPO, companies should make is working on more, namely breach notices, consent and profiling. the Working Party’s future position.
sure that he or she is not merely a legal person but someone who is These guidelines are evolving, so there may be adjustments down

9
EDPD 2017 1st Day (15 May 2017)

Transitioning towards the GDPR – Challenges and opportunities

Helen Dixon,
Data Protection Commissioner,
Ireland

Helen Dixon, from the Data Protection Commissioner in Ireland, shared motivation. Ms. Dixon then went on to elaborate on the principle of Another GDPR principle Ms. Dixon elaborated on is the so-called “one-
some perspective on the General Data Protection Regulation (GDPR) accountability under the GDPR. In her view, coming changes will to a stop shop”. In her view, some may have potentially underestimated
from her point of view. She started off on a positive note right away, large extent be driven by the accountability issue. It requires organi- the complexity of this mechanism. Also, the competent lead super-
emphasizing that she feels overall very positive about the outcome of zations to record information on the collection, processing and use of visory authority will need to supervise a law other than the law of its
the legislative process with regard to the GDPR, and also with regard personal data more vigorously. The simple act of becoming aware of own jurisdiction, which is another challenge. In closing, Ms. Dixon
to the current phase of preparing for the GDPR becoming effective. In this information is already hugely powerful. In particular with regard emphasized that organizations need to open up to authorities more
her experience, the view of the majority of companies is that this law to the use of cloud computing services, data controllers often do not when it comes to accountability. Regulatory conversations are good
was needed, and that it is good both for individuals and businesses. seem to have a clear understanding of, e.g., where the data is located, as they reduce hostility, uncertainty, and paralysis. Organizations
or which technical and organizational measures are applied. A proper must engage in such conversations, as this will cause them to be much
She then went on to point out a very interesting fact, which is that it data governance and privacy by design will all flow from a better closer to compliance than without.
is the impression of her and her colleagues that while for many pri- understanding of the way in which an organization is collecting and
vate organizations, there is an intrinsic urge to comply with the new processing personal data, as encouraged by the accountability prin-
requirements, the public sector seems to have less of such an intrinsic ciple, which will then prevent unnecessary data protection violations.

10
EDPD 2017 1st Day (15 May 2017)

Privacy Shield

Caitlin Fennessy,
Senior Policy Advisor, Data Flows and Privacy Team, U.S. International Trade Administration,
USA

Caitlin Fennessy of the U.S. International Trade Administration gave an the transatlantic digital economy work. Ms. Fennessy also introduced Also, a lot of thought went into the online information about the Pri-
interesting talk about the US/EU Privacy Shield. Ms. Fennessy started off some recent developments and improvements that were made to vacy Shield and its participants as there was an understanding that a
by emphasizing the benefit of the framework for the transatlantic econ- the implementation of the agreed framework. For example, the US better job needs to be done with regard to informing individuals as
omy. The economic figures when it comes to cross border data flows are Department of Commerce now has a more handon approach to the to how the framework works (as compared to the original Safe Har-
staggering. The two-way trade in digital services and products between certification process and is committed to a high level of monitoring bor framework). It is important to note that an ongoing cooperation
the US and the EU now surpassed 290 billion dollars annually. Data flows compliance and the verification of self-certification requirements. between the EU and the US is already built into the Privacy Shield
account for a large increase in GDP. The Privacy Shield definitely raises Other tasks the US International Trade Administration is performing framework. In this regard, the first review will take place in the week
the bars for data protection and over 2,100 organizations certified in the with regard to the Privacy Shield program is: providing guidance for of September 18th, 2017.
first nine months – which is a big achievement. companies, facilitating resolution of complaints, outreach and educa-
tion designed for all stakeholders and enhanced cooperation with EU
Ms. Fennessy stressed that both the EU and the US are “in this data protection authorities.
together”, which is good as both parties can jointly work on making

11
EDPD 2017 1st Day (15 May 2017)

DISCUSSION International Data Transfers:


Will Privacy Shield enable global data flows and create legal certainty?
Caitlin Fennessy, Peter Fleischer, Bruno Gencarelli, Dr Claus-Dieter Ulmer, Alan Winters,
Senior Policy Advisor, Data Global Privacy Counsel, Head of Unit International Global Data Privacy Officer, Chief Privacy Officer
Flows and Privacy Team, Google Inc., France Data Flows and Protection, Deutsche Telekom AG, Deputy Chief Global,

U.S. International Trade European Commission Germany Compliance, Tele­
Administration, USA performance Group, USA

The panel participants discussed the US/EU Privacy Shield (in particu- requests will be made. Google will need to scale to any number, which first-hand experience in this regard from the perspective of a service
lar, whether this mechanism will likely create legal certainty), interna- will be challenging. With regard to the US/EU Privacy Shield, Bruno provider. His company is actually spending a lot of time educating
tional data flows in the context of business process outsourcing and Gencarelli, the European Commission’s Head of Unit International their clients about the implications of privacy for their services. Many
customer services as well as GDPR compliance in general. Mr. Fleischer, Data Flows and Protection, stressed that the upcoming review of the companies are still way behind when it comes to getting GDPR ready.
Global Privacy Counsel at Google, stressed that these issues require framework (scheduled for September 2017) is meant to confirm the
considerable resources. Google for example has about 300 people mechanism’s durability. Mr. Ulmer, Global Data Privacy Officer at Deutsche Telekom AG,
working on the Privacy Shield implementation – a number that for an explained that within his organization, they do not rely on the Privacy
SME would simply be impossible. With regard to GDPR compliance Mr. The second part of the panel discussion then focused on international Shield but rather on Binding Corporate Rules and Standard Contrac-
Fleischer explained that Google has seven different services with over data flows in the context of business process outsourcing and cus- tual Clauses. In his view, bilateral solutions such as the Privacy Shield
a billion active users, and for example when it comes to dealing with tomer services. Mr. Winters, Chief Privacy Officer and Deputy Chief may not last very long.
the onward transfer obligation, they do not yet know how many such Global Compliance Officer at Teleperformance Group, outlined his

12
EDPD 2017 1st Day (15 May 2017)

DPA Developments in the Philippines

Raymund Enriquez Liboro,


Privacy Commissioner and Chairman, National Privacy Commission,
Republic of the Philippines

Mr. Liboro kicked off his talk introducing the Philippines and the the privacy authority was described by Mr. Liboro with the catchy the Act: (1) Commit to comply – appoint a Data Protection Officer; (2)
growing relevance of data protection issues due to reasons such as phrase “catching up and moving fast”. He then went on to elaborate Know your risks - conduct a privacy impact assessment; (3) Be account-
the extensive use of internet and social media in the Philippines. As a further on this work. The alignment with global privacy standards is a able – create your privacy management program and privacy manual;
measure to be on top of this development, the Data Privacy Act of 2012 top priority for the Philippine regulator. In this context, four circulars (4) Demonstrate your compliance – implement your privacy and data
was enacted, which governs the rights of a data subject and the obli- have been issued in 2016 (on government agencies, data sharing, data protection measures; and (5) Be prepared for breach – regularly exer-
gations of data controllers and processors. The penalties enshrined in breach management and filing complaints) with more to come in 2017. cise your breach reporting procedures. All available venues are used
the Act are quite punitive. His other primary job is to educate organizations how to establish pri- to bring about awareness for these issues, including on social media.
vacy compliance, and in this regard, it is imperative to “keep it simple”, Going forward, Mr. Liboro intends to, among other things, intensify
The privacy authority of the Philippines then was established only as a lot of privacy concepts are new for the Filipinos. policy development in high-risk industries and intensify the exchange
quite recently in 2016. Its main functions are: rule-making, advisory, with privacy regulators and professionals internationally.
advocacy, investigation, compliance & monitoring, public education, The privacy authority has therefore broken data protection compli-
handling complaints, and enforcement. The work currently done by ance down into five main pillars for data controllers that are subject to

13
EDPD 2017 1st Day (15 May 2017)

The scope of EU data protection legislation vs. the scope of the EU fundamental
right to data protection – which cases may be dealt with by the Court of Justice?
Dr Christoph Sobotta,
Legal Secretary (Référendaire), Chambers of Advocate General Kokott,
Court of Justice of the European Union

In his presentation, Dr Sobotta compared the scope of the Data Sobotta reminded the audience that while the Data Protection Direc- tection Directive exclude areas where Art. 8 of the Charter applies, in
Protection Directive and the General Data Protection Regulation to tive and the GDPR are addressed to the data controller as obligated particular issues of public security, the GDPR provides for a broader
the scope of Article 8 of the Charter of Fundamental Rights of the party, the provisions of the Charter are addressed to the institutions, material scope that overlaps more with the Charter. As regards obli-
European Union. Dr Sobotta first introduced the different concepts bodies, offices and agencies of the European Union and to the mem- gations of private data controllers, Art. 8 of the Charter will primarily
of scope, namely temporal scope (e.g., the transition from the Data ber states when they are implementing European Union law. apply by guiding the interpretation of the GDPR.
Protection Directive to the GDPR on May 25th, 2018), territorial scope
(including the Google Spain and Schrems decisions of the European The main focus of the presentation then was the comparison of the
Court of Justice as well as the concept under Art. 3 of the GDPR), per- material scope of the Data Protection Directive, the GDPR and Article
sonal scope and material scope. With regard to personal scope, Dr 8 of the Charter. While the exclusions of scope under the Data Pro-

14
EDPD 2017 1st Day (15 May 2017)

One Year to GDPR: How is Google preparing?

Peter Fleischer,
Global Privacy Counsel, Google Inc.,
France

Peter Fleischer, Global Privacy Counsel at Google, outlined in his pres- also said a few words regarding Google’s Privacy Shield program. For tant. Privacy considerations are important with regard to the input
entation how Google is preparing for the coming into force of the example, the annual review process lasts four months. Every product (what can go into the system), the output, and also the training and
General Data Protection Regulation (GDPR) in 2018. First, Mr. Fleischer is subject to privacy design documents and an in-depth review. Hun- processing that takes place in between. In the following Q&A session,
presented the interface and categories of functions Google offers its dreds of products were reviewed and certified in 2016, with hundreds Mr. Fleischer touched upon a variety of issues: the new ePrivacy revi-
users, the categories being “Choice” (e.g., during account creation of lawyers, engineers and product managers involved. With regard to sion is disregarding some of the discussions the privacy community
or during operation), “Transparency” (i.e., making it easier to see law enforcement requests, Mr. Fleischer pointed out that the number had with regard to not relying too much on consent. For startups that
what data Google collects), “Control” (through privacy settings) and of requests is going up. The number of requests where data was pro- want to comply with the GDPR requirements although they have very
“Security”. duced, however, is very stable. little resources, Mr. Fleischer had the advice to keep it very simple and
boil the requirements down to two or three core points for internal
Google created a single space for Google users to manage all their pri- The next topic that was discussed was machine learning. Machine discussions.
vacy and security settings. In 2016, 1.6 billion unique users used this learning is now a crucial component in Google’s most popular ser-
tool – evidence that it is easy enough to use intuitively. Mr. Fleischer vices, with so called deep learning becoming more and more impor-

15
EDPD 2017 1st Day (15 May 2017)

Challenges in implementing the GDPR in an international company

Dr Axel Kessler LL.M.,


Head of Legal Data Privacy, Siemens AG,
Germany

In his presentation, Dr Kessler, Head of Legal Data Privacy at Siemens para. 1 GDPR, a controller shall maintain a “record of processing activ- processing shall be provided to the data subject. Dr Kessler illustrated
AG, gave hands-on advice with regard to ways in which international ities” under its responsibility. According to Article 35 para. 7 GDPR, by way of a SIEMENS-internal documentation system, how recording
companies can face the challenges of implementing the General Data any data protection impact assessment shall contain certain mini- of all this different information can be achieved in a streamlined and
Protection Regulation (GDPR). In particular, Dr Kessler addressed the mum information. According to Article 28 para. 3 GDPR, the contract combined fashion.
issue of combining compliance with different legal requirements in with a data processor shall set out certain documented information.
the same technical and organizational tools. According to Article 30 According to Article 13 para. 1 GDPR, certain information about the

16
EDPD 2017 1st Day (15 May 2017)

Implementation of GDPR in an Airline: Ideas and first experiences in practice

Dr Barbara Kirchberg-Lennartz,
Global Data Privacy Officer, Deutsche Lufthansa AG,
Germany

In her presentation, Dr Barbara Kirchberg-Lennartz, Data Protection More members). Third, there is the data of the employees. Ms. Kirch- It is therefore not clear to companies which risks are the most signif-
Officer of the Lufthansa Group, gave her ideas and first experiences berg-Lennartz then put forth that only a small part of the challenges icant, and where they have to be active. The impact of the GDPR on
with regard to implementing the General Data Protection Regulation of the GDPR are actually clearly visible. The “devil is in the detail”, so to organizations is very high. They have to establish a data protection
(GDPR) at her organization. First, Ms. Kirchberg-Lennartz gave an speak, and this only becomes apparent once one spends a considera- and IT security management, implement specific data protection pro-
overview over the amount of personal data that is processed in con- ble time already on implementing the GDPR. For example, there is an cesses to avoid risks, consult and train within their organization and
nection with the airline operation: First, there is passenger data for extreme fast development in data processing and transparency is not monitor compliance. In the end, it is all about risk mitigation that con-
reservation, ticketing, arrival and after flight services. Second, data is easily achieved. Also, there is a lack of legal certainty of the new data cerns the top management as well as everybody else.
collected in connection with the customer loyalty program (Miles & protection rules.

17
EDPD 2017 1st Day (15 May 2017)

Implementation of GDPR in a large multinational organization

Mikko Niva,
Group Privacy Officer and Head of Legal, Vodafone Group Services Limited,
UK

Mikko Niva, Group Privacy Officer and Head of Legal at Vodafone translated into specific policies, baseline requirements and compli- At Vodafone, for example, there are more than 200 individuals with
Group, gave a presentation on first-hand practical experiences with ance processes. The work products developed at this level deter- direct responsibilities pertaining to privacy requirements, with
regard to implementing the GDPR requirements in a large multina- mine the actions taken within the Business line. The third line then detailed (e.g., monthly) reporting obligations. Mr. Niva then spent
tional organization such as Vodafone. Needless to say that the imple- is the “Audit” line. At this level, detailed audits ensure policy compli- some time on the concept of privacy by design, which is also an
mentation is a real challenge for organizations. ance with a view to the other two lines. For the implementation of important tool to ensure privacy compliance on the Business level.
the GDPR requirements to work, it is imperative that legal require- Here, the practical recommendation was to tie security and privacy by
In his view, the complex task of establishing GDPR compliance can ments are pushed down to a lower level of privacy expertise through design to the business processes and phases that are the reality with
be made more manageable by grouping the requirements into three detailed design patterns and guidelines (every company only has a regard to the organization’s operation (e.g.: concept phase; design
“lines”. The first line is the “Business” line. It is the “first” line because limited number of recurring problems, and these need repeatable and build phase; test, go-live, operation and decommissioning).
at this level, the ultimate responsibility for implementing and observ- solutions) and standardized compliance processes. Also, establishing
ing the privacy requirements on a day-to-day basis is located. The accountability within the organization is a key to achieve compliance
second line is the “Privacy” line. Here, the legal requirements are in the “Business” line.

18
EDPD 2017 1st Day (15 May 2017)

DISCUSSION
Are businesses “GDPR-ready”?
Dr Axel Kessler LL.M., Dr Barbara Kirchberg-Lennartz, Dana Louise Simberkoff, JoAnn Stonier,
Head of Legal Data Privacy, Global Data Privacy Officer, Chief Compliance and Risk Officer, Chief Information Governance &
Siemens AG, Germany Deutsche Lufthansa AG, Germany AvePoint, USA Privacy Officer, Mastercard, USA

In the last panel discussion for the day, the participants discussed the to implement data privacy compliance tasks, and protect personal of the future. Given the legal uncertainty when it comes to the GDPR
issue of whether businesses are “GDPR-ready”. The Centre for Informa- data. Technology could, however, do more and also help with regard implementation, it is even harder to look beyond and what problems
tion Policy Leadership (CIPL), a global privacy and security think tank, to the right of access, consent management, privacy transparency may arise in the future.
and AvePoint launched a global GDPR readiness survey, in particular dashboards, privacy program demonstration etc. The senior man-
to assess the current state of readiness for the GDPR, benchmark and agement key concerns were the enhanced sanctions and data breach The panel then gave some advice as to what to do if an organization
evaluate readiness in relation to industry peers on an ongoing basis, reporting obligations, stricter rules on consent and data reuse, the has not yet started implementing the GDPR. First, one should get a
and understand key changes and compliance obligations under the expanding individual rights and the changes to international privacy grip of the text of the GDPR and the guidance of the Article 29 Work-
GDPR. The survey focused on the key change areas in GDPR, including programs. Ms. Simberkoff stressed that GDPR implementation is good ing Party in that regard. Then, it is important to create an inventory
consent, legitimate interest, profiling, data portability, privacy impact data lifecycle management. and to know what personal data the organization collects and pro-
assessments, data protection by design, DPOs and resources, data cesses. Finally, privacy professionals within organizations should use
breach reporting, transfers to third countries, accountability and pri- Ms. Stonier then raised interesting point, namely that the GDPR imple- the GDPR as an opportunity to “become (even more) relevant” in the
vacy management programs. mentation is an even bigger task as one thinks at first sight. Compa- organization.
nies are now required to create systems and processes in order to
Ms. Simberkoff summarized the outcome of the survey; in particular, enable GDPR compliance, however, such solutions not only have to
there seems to be a lack of technology tools in organizations in order be appropriate for the problems of today but also for the problems

19
EDPD 2017 1st Day (15 May 2017)

PARALLEL SESSIONS
Implementation of the GDPR at eBay – Experiences and learnings
Dr Anna Zeiter LL.M. (Stanford),
Head of Data Protection, EMEA, eBay International AG,
Switzerland

In her presentation, Dr Anna Zeiter gave an overview over the phases new data subject access rights, privacy impact assessment, privacy by Dr Zeiter then gave a recount of some experiences she made along
that eBay has been and is still going through with regard to the design and by default, a review of consent based processing, a review the way, and gave some recommendations. Communication is proba-
implementation of the General Data Protection Regulation (GDPR), of the position of the data protection officer (DPO), the introduction of bly the key to having a successful implementation. Management and
which may serve as guideline to other entities as well. a privacy champion program, data deletion and retention, data breach stakeholders should be informed as early as possible. It should be clear
responses and privacy trainings. Phase 3 basically comprised of asking to everybody what they need to do. Also, monitor the implementation
The first phase already started beginning of 2016 (January 2016 through for the required budget to implement the identified action items. The progress and change the approach if required. Dr Zeiter then concluded
March 2016) and was about raising awareness for the issue within the fourth and currently still ongoing phase is the actual implementation her presentation with some remarks regarding the positive aspects of
organization and starting internal communication. The second phase, phase (October 2016 through December 2017). Here, it is about creat- the GDPR implementation: privacy is in the spotlight in every organiza-
a gap analysis, occurred from April 2016 through August 2016. It com- ing projects and subprojects, assigning responsibilities and involving tion and it is an opportunity to ask questions the privacy professional in
prised of carrying out interviews with legal teams and business units, stakeholders. A practical tip of Ms. Zeiter was to use professional project charge has not been asking before, and to challenge current processes
the usage of assessment tools and the drafting of a gap analysis report. managers for this phase. The fifth and final phase, which also overlaps within the company in order to enhance privacy.
At the end of the second phase, a list with action items was compiled, a bit with Phase 4, is the monitoring phase (October 2017 through June
including, for example, the following items to be looked at more 2018). Here, the success regarding implementing the requirements will
closely in the subsequent process: data mapping, processes for the be assessed and correcting measures taken, if required.

20
EDPD 2017 1st Day (15 May 2017)

PARALLEL SESSIONS
The new ePrivacy regulation
Ruth Boardman,
Partner, Bird & Bird LLP,
UK

Ruth Boardman introduces the draft of the new e-Privacy regulation by authorisation from DPAs. For the latter, the regulation will be flexible marketing. By that the opt-in rule that applies to e-mail marketing may
showing the particularisation of data protection for the communication to fit with national legislation e.g. regarding laws on national security apply to all kinds of adds displayed online, whether they are targeted or
sector into 3 overlapping areas of law. The e-Privacy regulation itself, purposes. even not could be subject to these rules. As the Article 29 Working Party
the GDPR and as a third area the Art 8 of the ECHR and national regula- picked up in its recent opinion, some of the technological updating,
tions concerning the secrecy of correspondence. Although the new e-Privacy regulation was created by a different set of which the proposed regulation is supposed to do, has not quite been
regulators than the GDPR there are certain links to the GDPR, such as the worded effectively.
Just like other European regulations this new directive aims to iron out ambitious aim to apply from May 2018. Furthermore, the e-Privacy reg-
the differences in national law on e-Privacy and to broaden the scope of ulation shares the definition of consent given by the GDPR and foresees Ad regards to cookies regulation draft broadly maintains the existing
electronic communications services. the DPAs to supervise the communication sector as well. cookie consent rules but, as Ruth Boardman points out, Article 8 (d) of
the regulation raises some new questions, e.g. to what extent web audi-
The proposed regulation is going to regulate websites, browsers and Regarding the fines there will be parallels with the GDRP too, picking ence measuring will be covered.
apps around the world by applying to over-the-top service providers up its higher fines, also suggesting a similar split to 4% and 2% of the
such as unmanaged VoIP, instant messaging, webmail and social media annual worldwide turnover of an undertaking. The provisions for cook- Until now the e-Privacy regulation is a draft only, so we have to follow
messaging. Next to these it will apply to IoT technology and M2M ies and marketing will be put in the less serious category of the 2% rate. the process and see how the final version will turn out, to make definite
communication. statements about its concrete implications.
Looking at the e-Privacy regulations´ impact on electronic market-
One big change to current regulation is the new one differentiating ing, one big change is going to be the definition of direct marketing it
between use of metadata and use of content. While the use of metadata covers. The proposal does not simply talk about e-mail marketing but
will be more easily achievable, for the use of content the draft stipulates more broadly about electronic communication services used for direct

21
EDPD 2017 1st Day (15 May 2017)

PARALLEL SESSIONS
The Universality of consent in global data protection
Patricia Kosseim,
Senior General Counsel and Director General Legal Services, Policy, Research and Technology Analysis Branch,
Office of the Privacy Commissioner of Canada

Patricia Kosseim from the Office of the Privacy Commissioner of Ms. Kosseim then went on to compare the concept of consent spe- voluntarily handed over is usually very low. This so called “third-
Canada, elaborated in her talk about the nature of consent; under cifically in the three jurisdictions Europe, US and Canada. In Europe, party doctrine” (i.e., people who voluntarily give information to third
Canadian law, consent is an outflow of a constitutional right. Ms. informed consent emergent as the gold standard and expresses parties such as banks, phone companies, internet service providers
Kosseim started by giving a brief historic overview as to the different respect of persons as persons. However, in cases were data process- etc. have “no reasonable expectation of privacy.”) has been a minor
views people have taken on the concept of consent over time. Plato, ing benefitted society as a whole (e.g., in clinical research), consent “mistake” in the past but now the adverse effects are multiplied. In
for example, was not a proponent of consent - according to him, a became unsustainable. In these cases (amongst others), Europe has Canada however, the concept of consent is followed very strictly.
few “wise men” were tasked with determining how processes should moved away from the consent requirement. However, moving away Search engines, for example, do not really fit under Canadian privacy
run within a state. According to Aristotle, consent was the bond that from consent made other improvements necessary, such as stronger laws. According to Ms. Kosseim, it is crucial that Canada revisit the
holds people together. Finally, consent has become a form of indi- safeguard and a more robust framework. The concept in the USA is laws pertaining to consent. The Office of the Privacy Commissioner
vidual empowerment, which can turn slavery into employment and very different from that. Here, privacy is grounded in the liberty and of Canada is currently in the process of drafting policy position.
privacy violations into just and fair processing. freedom from state intrusion. The level of protection of information

22
EDPD 2017 1st Day (15 May 2017)

PARALLEL SESSIONS Implementation of the data protection reform and


international transfers: the view from the European Commission
Bruno Gencarelli,
Head of Unit International DataFlows and Protection,
European Commission

The GDPR didn’t fall from the sky. Lots of the rules and principles of the monthly with the member states firstly to understand where they are in How can we work with synergies of those different certification systems,
GDPR are not new but grown and developed over the years on ground terms of national implementation and see what are the approaches they and what kind of certification do we have in mind? Is certification a com-
of former regulations, so it is a mix of continuity and innovation in are taking, in order to find a convergent approach. prehensive instrument for demonstrating compliance with the regula-
terms of data protection. You could say that evolution brought down tion? Is it a tool for international transfers? Is certification of technologi-
a revolution. Secondly to specify on topics and areas of the regulation on which they cal solutions important for compliance with specific provisions?
need clarification, as the member states each are in different phases of
The beauty of the GDPR is that it moves from the ex ante approach of the implementation process. For this we need continuing dialogues as We want to set up a multi-stakeholder expert group, composed of rep-
preauthorisation and prenotification to an ex post system that is to a an important part of our work to guarantee that one of the main objec- resentatives of legal practitioners, academics, and businesses including
much larger extent based on accountability and credible enforcement. tives of the regulation is pursued: uniformity and harmonisation. SMEs. Its task will be to identify potential challenges in the application
We cannot get everything at the same time. The benefits and flexibil- of the GDPR and advising the Commission in how to address those
ity of accountability on the one hand and more guidelines for each and Another general objective of the regulation is to have a high level of challenges.
every means of the regulation on the other hand. protection as well as a free flow of data within the EU. Any national leg-
islation will have to be tested against this goal. Our work will not end in May 2018, it is about how we want to progress
Now it is not about renegotiating the GDPR, but about getting a in the application of the GDPR and other issues will be raised. We as DPA
feedback from the different stakeholders. This regulation will apply The regulation has left the Commission with a number of implementing want this process to be as open as possible.
next year, independently of whether the member states have or have and delegate powers, regarding the area of certification, which is parti­
not exercised what in most cases is a possibility, not an obligation for cularly adapted to show compliance in a transitioning system. For this
national legislation. When it comes to the areas where member states reason, we have launched studies to understand different certification
are allowed a certain degree of flexibility, that latitude must be exercised solutions that exist, to find best practice examples and go on from there.
within the parameters of the regulation. We have an exercise to meet

23
EDPD 2017 1st Day (15 May 2017)

PARALLEL SESSIONS Grappling with the internet of things, disruptive


technology and cloud of things in the context of a smart nation initiative
Steve Tan,
Partner, Deputy Head, Technology, Media & Telecommunications, Rajah & Tann Singapore LLP,
Singapore

Steve Tan, partner at Rajah & Tann Singapore LLP, kicked-off his pres- preferences; marketing activities based on analysis); (2) Health- the data; data ownership). Mr. Tan illustrated these issues by listing
entation about becoming a “Smart Nation” by introducing the key care (e.g., remote monitoring of health information, dietary intake; all the different players that can be involved in such services: ISPs,
drivers for such a development: disruptive technologies, Internet healthcare wearables and mobile applications); (3) Insurance (e.g., device manufacturers, software owners, retailers, app vendors, data
and cloud of things as well as big data and data analytics. Mr. Tan auto-insurance premiums based on driving behavior, incentives for center owners etc. Mr. Tan then also briefly outlined Singapore’s
then mainly focused on the topic of Internet and cloud of things. health insurance based on fitness activities); and (4) Government cybersecurity strategy on its way to becoming a Smart Nation.
Cloud computing has become a key enabler for Internet of Things (e.g., Smart Nation programs; better inter-agency cooperation;
(IoT) and disruptive technology. Cloud computing and IoT also go predictive technology for crime prevention). There are several chal-
hand in hand because otherwise, no real scalability is achieved. lenges associated with these kind of services, namely data protec-
tion issues (transparency, information imbalance, consent and fair
Mr. Tan then presented four typical use cases of the cloud of things: usage); the allocation of risks, liabilities and rights; the issue of cross
(1) Retail (e.g., tracking and monitoring of consumer behavior and border regulation and jurisdiction and security aspects (securing

24
EDPD 2017 1st Day (15 May 2017)

PARALLEL SESSIONS
Data protection in Tunisia as a tool for development
Héla Bey Ben Miled,
Judge, Tunisian Administrative Court of Justice, UN Data Privacy Advisory Group,
Tunisia

Tunisia is going through a crucial period of change, trying to pre- on the other hand have become two separate fundamental rights in When it comes to the issue of economic development, Tunisia has
serve and strengthen democracy and struggling for development. the constitution of post-revolution Tunisia and a guarantee of good to prepare for the extra-territorial reach of the GDPR. Updating the
governance and democracy. Tunisian data protection law in accordance with the GDPR can help
The speaker began by giving a brief overview of the legal framework the new investment law to have its desired effects, such as attracting
protecting personal data in Tunisia, stating that it is fairly close to In 2016 a new law on the right to access to information was intro- foreign investment.
European standards as regards e.g. the definition of personal data, duced, that provides for a wide application of access to information,
principles relating to data processing, consent conditions and the request and appeal procedures and the establishment of an inde- Fostering social development could be reached through the creation
rights of data subjects. pendent Access to Information Authority (ATIA), that is separate of a private credit scoring that enhances access to credit for low-in-
from the DPA. The ATIA decides what can be considered as personal come workers and small institutions. As the risk of errors, profiling
Héla Bey Ben Miled outlined examples of specific cases where the or public information. But access to information can serve democ- and blacklisting which could lead to discrimination remains high, the
promotion of personal data can contribute to strengthen democracy racy only if it follows data protection principles and emphasis should DPA required strong data protection safeguards.
and encourage political development and foster social develop- be placed on the anonymization techniques, given the underlying
ment. The protection of privacy on the one hand and personal data risk of reidentification.

25
EDPD 2017 2nd Day (16 May 2017)

Digital Disinformation – Fake news and hacking in election campaigns

Dr Ben Scott,
Member of the Management Board,
Stiftung Neue Verantwortung and former advisor to Secretary of State Hillary Clinton,
USA

The desinformation by fake news prior to the voting in the US elec- But how does this work? Typically, we had so far a two steps infor- We can also discuss more regulation of social media like effective
tions and the cyberattacks on the US Democratic National Commit- mation flow from media to our trusted network of five to ten people fact checking tools. But putting responsibility to social media plat-
tee are really alarming. Statistical analyses of Facebook Engage- (like family or friends). Today, the trusted network is online (Face- forms to delete content is a misguided approach. At the end it is
ments for Election stories showed that fake news are more popular book, etc.) and comprises hundreds of people. a human problem, not a technical problem. The problem can be
than real news. We don’t know what exactly is going on and it is so solved by humans only in creating a social value of contesting fake
far not clear how extensively false news impact elections. What can we do about it? Political parties and campaigns should news. The human problem can be addressed by technical solutions
have a base line of cyber security. We should also support better jour- (machine learning tools, algorithm changes, cut-off tools, reputation
The development of a fake news typology shows the complexity nalism as an important public value. As a long term goal we should checks, credibility scores, etc.).
and the variety of sources: (i) Link to false news by „Klick this right teach our children the basic tools and reestablish social norms. In a
now“ mechanism, (ii) foreign state media or intellegence agencies, short term, we could fight fake news by taking simple steps like fact
(iii) hyper parties media / tribal political voices (like Breitbart), (iv) checking, by clicking „Fake“ buttons or by direct confrontation.
Facebook Dark Posts or Twitter Bots; (v) press / media (further distri-
bution of fake news) and (vi) Twitter.

26
EDPD 2017 2nd Day (16 May 2017)

Designing for the GDPR: making it work for data subjects

Stephen Deadman,
Global Deputy Chief Privacy Officer, Facebook,
UK

How can we ensure that the GDPR gets it right for the people? Imple- In March 2017 we carried out the Design Jam event (Creating trust, To get it right we need
menting the GDPR is a difficult mission. But success comes out of transparency and control to empower people in the digital world). ■ Humility – we don’t have all the answers
collaboration with the industry. Building transparency and control is Designers, privacy experts, engineers, advocates, companies and
at the heart of „getting it right“. How we give transparency control is other experts joined the event. The goal of the event was to define ■ C ollaboration – between industry and DPAs,
a challenge of designing. concepts of control. The participants created a selection of ideas and but also with other ­disciplines like design and UX
we discussed the set of ideas with people in Skype interviews and in
If we focus on Start Up partnerships we see a dilemma: One the one street interviews to receive constructive feedback. ■ A gilty and scale – we must be agile, and solutions must be
hand Start Ups give personal data value and on the other hand they able to scale
have to handle complicated data protection rules. Start Ups typically Design is an iterative, never ending circle. In contrast, legal compli-
have a short time thinking process and the handling of personal data ance is definitive, and therefor linear. „Getting it right“ isn’t a sta-
could be a question of live or death for Start Ups. However, Designers tionary target. Since compliance was the main driver within the last
tackle dilemmas like this all the time. 30 years, we have not made much progress in these years.

27
EDPD 2017 2nd Day (16 May 2017)

Worldwide standards in data privacy –


digital sovereignty as foundation for a common understanding?
Dr Claus-Dieter Ulmer,
Global Data Privacy Officer, Deutsche Telekom AG,
Germany

I want to focus on the question whether digital sovereignty is a Public skepticism and lack of trust endanger digital business models. ■ F reedom of Choice: Processing for fulfilment of contractual obli-
foundation for a common understanding. The digital era is changing In this respect I refer to the (i) the CERES study „Digital Self-Determi- gations with no additional consent (level 1); further processing
industry’s paradigms regarding business models, technology and nation“, (ii) the Dimap study „EU and Digitization“ and (iii) the NTIA that might be expectable from users view can be subject to opt
customers – but what about the privacy paradigms? survey – US. According to the studies, Customers expectations and out (level 2); not expected further processing is subject to opt in
demands are transparency and „digital sovereignty“. But, is there a (level 3).
One can separate between a (i) more absolute approach or (ii) a level playing field between companies and consumers? The answer
more open approach. The more absolute approach is characterized is: Despite any regulation – if we as a company do not take our digital ■ R isk Minimization: Privacy by Design as a fundamental process
by data privacy in the sense of fully protecting the individual (noth- responsibility, we will have a problem. requirement (pseudonymization and anonymization)
ing is allowed without prior consent). But is consent good enough
and will companies ever be able to comply? A more open approach There are ways for co-operation adhering to the principle of digi- So let’s go forward and restart existing initiatives again and start new
can be characterized as follows: Data generally belongs to the one tal sovereignty. Specifically – examples for possible standardization ones. Please invite participants from all over the world if you start or
who is processing it and as long as there is no regulation, everything areas are: continue working on standards. Adhere to „Design Thinking“!
goes. It is the individuals responsibility to act against unwanted data ■ Transparency: Simple and easy to understand consumer informa-
protection and the government acts more as an observer. This open tion like Data privacy „One Pager“, Data Cockpit or Data privacy
approach does not match the situation today. Bot’s.

28
EDPD 2017 2nd Day (16 May 2017)

EU Fundamental rights in the cloud

Marie-Charlotte Roques-Bonnet,
Director of EMEA Privacy Policy, Microsoft EMEA,
France

What is new for Microsoft and others regarding GDPR and operating a ■ CHALLENGE 2: Demonstrating 100% transparency on Microsoft access to customer data is controlled by the data trustees. State-of-
cloud. The GDPR stipulates, in particular, new requirements regarding users‘ rights the-art security measures are implemented including 24-hour mon-
(i) transparency of information, (ii) accountability, (iii) Data Protection First of all, Microsoft has a broad privacy statement which was has itoring and security staff. In addition, there are physical barriers,
Impact Assessment, (iv) processors and (v) compensation and liability been materially updated in March 2017. In addition, new Windows fencing and extensive environmental protection.
rights. The core new obligations are to be framed by the WP 29. features enable privacy settings for the devices (e.g., regarding diag-
nostics data, speech recognition). This is mandatory to customers ■ CHALLENGE 5: Being worldwide, an accountable processor as per
But looking deeper to the cloud and the EU fundamental rights: (and not privacy by default). GDPR standards.
Where do challenges really come from? First of all, recent key EUCJ The core GDPR challenges for Microsoft are (i) processors liability
cases in 2014 and 2015 as well as the upcoming case Data Protection ■ CHALLENGE 3: Demonstrating 100% transparency on law enforce- (CSP/data breaches – to be covered by controller/processor agree-
Commissioner vs. Maximillian Schrems on legality of Standard Con- ment requests ments), (ii) risk based approach (TOMs – assisting controllers by
tractual Clauses (Model Clauses) have or will have an impact. The number of government or law enforcement requests for cus- risks‘ assessments), (iii) accountability is to be demonstrated (new
tomer data increased in the last years. Microsoft reached a per- processes – documentation to be provided) and (iv) EU OSS and data
Regarding the operation of a cloud I want to focus on five challenges: centage of 75% accepted requests. Microsoft provides a number of transfers framing (main establishment determining the lead DPA)
disclosures to help stakeholders evaluate how we are meeting our
■ CHALLENGE 1: Demonstrating trustworthy data transfers using commitments (Microsoft Transparency Hub), e.g. regarding National
EU valid tool. Security Orders or Content Removal requests.
In this respect Microsoft was proud to become the first global cloud
service provider listed and certified under the Privacy Shield. How- ■ CHALLENGE 4: Addressing EU data subjects‘ real concerns and get
ever, brand new tools are expected to frame the transfers under the back trust.
GDPR (besides the EU model clauses and the BCRs): national Stand- A trustee model in Germany addresses the concerns. Datacenters
ard Contractual Clauses, Code of Conducts and Certfications. are in Germany, with access controlled by German data trustee. Also

29
EDPD 2017 2nd Day (16 May 2017)

DPIAs and data mapping: operationalising GDPR and privacy by design

Kabir Barday,
CEO, OneTrust,
UK

Regarding the operationalization of the GDPR, I want to focus on ■ S TEP 6: Who is doing the work (early involvement of privacy In practice take the W29 Guidance on DPIAs into account and reas-
two areas: Data mapping and Data Protection Impact Assessment and matter experts) sess your DPIA at least every three years. A proposal for operation-
(DPIA). To understand data mapping we have to understand what ■ S TEP 7: Keep it updated (e.g., re-audit on risk based schedule alising the DPIA: (1) Threshold (is there an impact?) (2) Risk Assess-
data inventory is. Data Inventory is a record of all of the personal „what changed“). ment (DPIA trigger?) (3) DPIA (can I mitigate the risk?) (4) DPA
data and associated information an organization has. A data map is a consultation.
visualization based on the underlying data in the inventory (it is not DPIA has to be separated from PIA; PIA is a different assessment with
data discovery). different requirements. The Top 6 GDPR requirements for DPIA are
■ Risk must be analyzed from the view of the data subject, not the
Article 30 GDPR stipulates requirements for controllers and proces- business, and include likelihood and severity
sors regarding „Records of Processing Activities“. Additional require-
ments for data mapping that go beyond Article 30 are specified in ■ Include the additional reference lists being produced by the EU
Article 6, Article 15 and Article 32. Additional Guidance is provided regulators on types of process that trigger DPIA
by the Regulators (e.g. CNIL Article 30 Template).
■ Data subject views should be reviewed during the DPIA
Implementing data mapping is a 7-Step-Process:
■ S TEP 1: Determine what you already have (List of assets, ■ Additional questions should be in a DPIA in order to demonstrate
business processes, etc.) overall accountability with GDPR and privacy by design
■ S TEP 2: Gap analyses – Decide what you need (Art. 30 +)
■ STEP 3: Mapping by process vs. application (or hybrid approach) ■ Prior Consultation with DPA required when risk cannot be mitigated
■ STEP 4: Decide how to populate your map (questionnaire, etc.)
■ S TEP 5: Which business team to start with (e.g. complex team vs. ­ ■ The DPO doesn’t need to lead the DPIA, but should provide advice
high risk team) during DPIA

30
EDPD 2017 2nd Day (16 May 2017)

Big Data and the GDPR: innovative or conservative?

Yann Padova,
Commissaire, Commission de Régulation de l’Energie,
France

Big Data and the GDPR is a difficult mission. The defining qualities With regard to data collection the GDPR has an conservative approach. With regard to data retention the GDPR has also a more flexible
of Big Data are (i) capture lots of data whenever you can, (ii) reuse The GDPR is restrictive because of a reinforced consent, which can be approach. Data should be kept for no longer than is necessary for the
data frequently, (iii), keep data as long as possible and (iv) „Let the withdrawn „at any time“. As a result, there is need for a broad consent purposes for which it was collected. But, it may be stored for longer
data speak“: data will foster hypotheses rather than prove existing for repurposing and data is no longer likely to be compliant. periods for statistical purposes provided that „appropriate safe-
hypotheses. guards“ are implemented. Again, the GDPR delegates to Member
With regard to purpose specification principle the GDPR has a more States important competences to define the extent of the pathways
As a consequence Big Data (i) seems to be „unpredictable by design“, „flexible“ approach. The „statistical purpose“ is (i) not limited to it opens. Pseudonymization can be seen as a response to technical
(ii) produces correlations, inferences and predictions that defy public entities, (ii) is explicitly deemed not to violate the need to advances that challenge the very possibility of anonymization.
human understanding and (iii) triggers major regulatory challenges: stay with a specific purpose, (iii) is not narrowly defined and can be
how can we regulate something we do not understand? So, is Big construed broadly; (iv) further statistical processing do not require a The question is: What to do and what comes next? Potential devel-
Data and privacy principles a love and hate story? Where does the specific legal ground as long as „appropriate safeguards“ are imple- opments/approaches are national fragmentation, contract solutions
GDPR stand? I want to focus on three topics: data collection, purpose mented. The GDPR delegates to Member States important compe- or regulatory guidance. Are we going towards an ethical regulation
specification and data retention: tences to define the extent of the pathways it opens. Another option of algorithm?
is the compatibility check mechanism. However, the data subject
must be informed of any further processing.

31
EDPD 2017 2nd Day (16 May 2017)

Big Data – the silver bullet or a threat to a free society?

Amancio Kolompar,
Director Privacy Compliance, Liberty Global B.V.,
The Netherlands

After shortly introducing Liberty Global, Amancio Kolompar pre- Amancio Kolompar is asking, what that data world does to an individ- be viewing different sectors having similar problems such as the
sents some of his own thoughts about the use of Big Data, by intro- ual? What does this do to us as humans? Giving examples like Real-Time biology sector as a good example. The biology sector with genetic
ducing the proposition „I have nothing to hide“ , that often comes Pricing and Predictive Policing he points out, that the use of Big Data research and genetic engineering has very early on recognized that
to mind, when speaking about privacy. Stating, that the problem gets critical, when correlations lead to decisions about individuals. the technology we have in our hands has some dangers and we have
behind this proposition is, that I do not decide what I have to hide, to look at these dangers before we put them out into the wild. They
so in consequence I may have many things to fear. Leading to a dys- Following the example of Predictive Policing, discussing some of the have included ethics for many years and they have considered ethi-
topian perspective that Big Data may very well mean the end of the ethical problems behind it and how it could turn our legal system cal aspects to be onward.
free democratic society as we know it. upside down, Kolompar talks about the Communist Party in China
that is busy introducing a credit system, that takes all kinds of data We need to better understand what the possible and potential com-
How did we end up at the point, where government agencies, as we elements including social media data into account for scoring peo- plications for society can be, before we start using big data in the
know since the Snowden revelations, via metadata have all kinds of ple, resulting in the fact that anything a person does, says, likes, who shown ways.
deep inside knowledge of individuals? We have a host of principles, they are friends with and so on will have an immediate effect on its
guidelines and laws, that should protect privacy. What we see today, future life and chances. These developments could lead people to When we talk about Artificial Intelligence (AI) it is happening already
happened under the Data Protection Directive 95/46/EC. Now we regulate themselves and their behavior on a large scale. In conse- that we talk about ethics and we should take the same route when
have to see, what impacts the GDPR will have. quence, we have no privacy and a huge loss of liberty. using big data, because it is not me who decides how data can be
used against me in future. In a free democratic society, most phi-
Big Data is about this three dimensions: Volume, velocity and vari- Technology gets closer and closer to our bodies, it gets part of our- losophers believe that the base for a free democratic society is our
ety, but what makes it controversial is not the size, but the point that selves and modifies and changes who we are as human beings, how ability to make free decisions and have free open discussions. Let’s
through Big Data analysis, things that at first sight are not correlated, we act and interact. We start changing and rewireing ourselves until keep that in mind.
get correlated by statistical algorithms. Today data is used in lots of we will not be ourselves anymore.
ways they are not anticipated to be, leading to questionable develop-
ments. Giving an example, today it is possible by analyzing only 300 So, what can we do? We got the GDPR a legal tool, we could come
Facebook likes, to know more about a person, than the partner does. to more and more regulations trying to find solutions. Or we should

32
EDPD 2017 2nd Day (16 May 2017)

DISCUSSION
How to strike a balance between Big Data and data protection?
Amancio Kolompar, Yann Padova, Jules Polonetsky,
Director Privacy Compliance, Global Data Privacy Officer, Commissaire, CEO, Future of Privacy Forum,
Liberty Global B.V., Commission de Régulation de l‘Energie, USA
The Netherlands France

At the beginning the Panel discussion focussed on AI and what we can a theory and I go ahead to teach the theory. So we say to the machine: focussed more on the idea to install external or internal Ethics Advisory
learn from discussions with scientists and people working in the AI take this data. Then I have a outcome at the end and I say: I don’t Boards. Such Ethics Boards should a have a wide range of experts or
business. AI is about statistics and it is the first time when it is not about know why but you have very high risk of 99.9 %, etc.. So as a result, we expert groups. But such a Board has to act in a transparency way: What
understanding the data. AI companies are making very good predic- learn from data and one can make better decisions on the basis of the is the mission and what is the plan of the board?
tions on the basis of data. But AI is not designed to have morality and outcome.
no one buys the outcome of AI to work in a more moralistic way. You are The panel speakers also discussed the idea of the Regulatory Sandbox
not going to like it but that is what is going to happen tomorrow. The In the second part, the Panel discussion focused on privacy measures approach in the financial sector (FinTech) regarding the correspond-
idea to build gate keeping in the surroundings of AI was mentioned, and the speakers agreed that this is a real challenge. We are talking ence with regulatory authorities. They agreed that this opens the space
but not to „fix“ the AI. So, from a data protection perspective, we need about something that has grown and that has not been designed. for experimentation.
to understand the difference between AI and Big Data. The panel speakers liked the idea of gate keepers in the sense of „soft
guards“. It is not always a question of legal compliance, it is a question Overall, the panel speakers came to the conclusion that, in principle,
So what is Big Data and when do we call it Big Data? A scientist men- of checks and balances, internal and external review as well as ethics the regulation has to „play the game“ to come up with a user friendly
tioned that he always has had data and he always has had a lot of it, an and moral. and innovative legal framework. Sometimes we might say that the risk
now it is called Big Data? Technology people say, that they are getting is too high. But should we then conclude that the big data process is
incredible advances in everything they are doing with the data: more The panel speakers discussed new ideas in this respect, like the imple- forbidden or should we better mitigate the risk? Sometimes the law
accurate and faster. Therefore, we need to go back to school a little bit mentation of external advisory boards. But how will such a board work is not the first step and we first need good judgement and decision
to understand what valuable network means. and what about a valid scalability of such gate keepers? A speaker making regarding ethical rules and then we can implement the law as
referred to the corporate responsibility approach of some companies a second step.
Jules Polonetsky pointed out that is important to understand that AI which is a good way to go. The companies define fundamental prin-
and Big Data is a completely different concept. Big Data means I have ciples and take responsibility in what they do. Then the discussion

33
EDPD 2017 2nd Day (16 May 2017)

Biometrics as personal data: detection, characterization and recognition

Jonathan Avila,
Vice President and Chief Privacy Officer, Wal-Mart Stores, Inc.,
USA

The biometric process comprises the measurement of key elements ■ Characterization may increase the risk (more data elements tied to What is the EU regulatory response to risks resulting from use of biom-
of „unique“ biological characteristics (iris, fingerprints / palm line, pseudonymous identity; but still single point-in-time analyses with etric data? The GDPR defines biometric data in Article 4. The process-
facial characteristics, gait). The measurements are processed through generally no need to retain data for extended periods) ing of certain biometric data constitutes „processing of a special cat-
algorithm. The product of ALGORITHM is numerical value. There is egory of personal data“ (Article 9 GDPR). But the central question is
increasing accuracy of biometric results. ■ Recognition presents highest potential risk for „continous surveil- which types of processing of biometric data are „specific to the physi-
lance“ (data is personally identifiable; individual may be tracked cal [or] physiological identity of [a] natural person“ and/or are capable
Biometric data are used in different ways. We can use biometric data across time and location; many uses may involve extended retention). of „unique identifying a natural person“. What about facial detection,
for (i) detection purposes (e.g., an automated counter/detector of facial characterization or facial recognition and what about processing
human presence), (ii) characterization purposes (gender, age, etc. for With regard to the risks to civil liberties of governmental use of biom- of fingerprints/palm lines data to control misuse of multi-day music
analytic purposes) and recognition purposes (e.g., pseudonymous etrics, civil rights advocates‘ are concernd about law enforcement festival tickets? We need a new approach for biometric data and not
use, personally identifiable use). use of biometrics. The concerns center on facial recognition (i.e., not complicated rules. We can think about a risk based approach taking
detection or characterization). The concerns encompasses (i) potential into account, for example, that customers don’t want profiling or tak-
The risk to personal privacy regarding such data is not uniform across ethnic/racial bias, (ii) indiscriminate use of broad databases for poten- ing into account certain thresholds or level of suspicion.
uses of biometric technology. A dystopian vision is of society in which tial matches, (iii) use without prior individualized suspicion of criminal
all individual members are under constand surveillance through auto- activity, (iv) real-time scanning of public places, (v) lack of systemized
mated means, including use of biometrics. However, the following rel- testing to ensure accuracy and (vi) inadequate human verfification of
ative risks of various types or uses of biometrics can be distinguished: individual automated results.

■ Detection is of relatively low risk (captures individual’s presence at In addition, the balancing of societal and individual interests should
single point in time; registers mere presence of anonymous individ- be taken into account (e.g. when considering secondary use of data
ual, no need to retain data for extended persiods) without notice or consent; use of broad databases without clear con-
nection to type of criminal act).

34
EDPD 2017 2nd Day (16 May 2017)

Consent and transparency under the GDPR – will it help to build consumer trust?

Roslyn Vadala,
Senior Legal Counsel Data Privacy, Nestlé Group,
Switzerland

Roslyn Vadala began by presenting a case study regarding consent Regarding transparency, considerations for actions are: Regarding consent, considerations for actions are:
and transparency under the GDPR. The principles of fair and trans- ■ Look at your business model and decide what is the best way to ■ Is consent the best ground for your processing?
parent processing under the GDPR requires that a data subject is suf- create and maintain trust with your customers/consumers Review your list of processing to see if any other grounds apply.
ficiently informed. There is a „shopping list“ of requirements listed
in the GDPR. Communication shal be concise, transparent, intelligi- ■ Audit your current notices – what do we already have? ■ Review your current consents – can you still rely on them
ble, with clear and plain language, easy to understand. In addition, post May 25, 2018?
the GDPR stipulates consent principles (e.g., unbundled, affirmative ■ How much detail to provide customers/ consumers and when?
action, granular, transparent and easy to withdraw). ■ Update your consent language to meet the requirements –
■ Do customers / consumers want to be informed each time about the how to make it easy and digestible?
A survey as of 2016 (US online adults) shows that consumers are con- use of their personal data?
cerned about privacy. But what do consumers want? Another survey ■ Can you obtain consent at different times depending
showing that consumers want trust, transparency and easier privacy ■ Should we concentrate only uses that are not in their reasonable on the processing?
tools. As a principle, consumers don’t excuse privacy hickups. But do expectations?
consumers really wan’t transparency and how transparent do we have
to be? The key challenge here is the balancing of requirements. The ■ Are we creating notice fatigue, which will „damage“ trust?
concern is that too many requirements build up confusion and – as a
result – less trust for consumers. ■ How to be creative in presenting the information?

■ What about scaleability?

35
A global perspective on multi-jurisdictional investigations

Cédric Burton,
Partner, Privacy & Data Protection, Wilson Sonsini Goodrich & Rosati,
Belgium

The new system under the GDPR is aimed at increasing both investi- Regarding the regulatory harmonization two topics have to be What are the conclusions regarding investigations? The first conclusion
gations into and sanctions for non-compliance. In particular, the GDPR mentioned is that GDPR will have a significant impact on global investigations:
gives the EU Data protection Authorities (DPAs) teeth. Under the the ■ The GDPR aims to remedy regulatory fragmentation: (i) One-stop ■ GDPR will change the global regulatory landscape; it is a game
GDPR we will have (i) massive fines (instead of low fines under current shop mechanism for cross-border data processing activities (compa- changer (until now, risk was much higher in other parts of the world,
EU law), (ii) stronger powers for DPAs, (iii) regulatory harmonization, nies will deal with one DPA) and (ii) consistency mechanism ensures e.g., U.S.).
(iv) new remedies for data subjects; and (v) the risk is now also financial harmonized application of GDPR
(instead of mainly reputational). ■ Handling global investigations requires a risk balancing exercise
■ The European Data Protection Board (EDPB) as a central regulatory (understand enforcement culture; assess risks and set your strategy
The GDPR introduces a two tiered system of massive administrative body will be installed which will replace WP29 and which will have at the outset of global investigation)
fines (fine up to EUR 10,000,000 or 2% of global turnover resp. fine up to power to issue binding decisions.
EUR 20,000,000 or 4% of global turnover). However, a number of ques- ■ Biggest investigations often start with a local issue (do not under-
tion remain open, e.g.. what is „total worldwide annual turnover of the The increased legal remedies for individual comprises, inter alia, estimate local data subject access requests and regulatory inquiries).
preceding financial year“ and is the relevant turnover only the turnover ■ the right to complain to a DPA
of an EU entity (or entire group incl. non-EU entities?)? ■ the right to challenge DPA’s decisions before courts The second conclusion is that EU data protection law will be contentious:
■ the right to obtain an effective judicial remedy against a controller ■ High fines and strong enforcement powers coupled with many areas
The increased powers for DPAs under the GDPR includes investigative or a processor of uncertainties.
powers (e.g., information orders, power to conduct investigations, dawn ■ the right to seek compensation for damages against a controller or
raids), corrective powers (e.g., issue warnings or reprimands, impose a processor. ■ Expect legal challenges of DPA’s decisions.
limitation on processing, power to impose massive fines) as well as
authorization and advisory powers (e.g., proir consultation; approval of How can you challenge EDPB and DPA decisions? EDPB decisions can be ■ National courts (CJEU to a lesser extent) will be a new interpreter of
standard data processing agreements, approval of BCRs). challenged bevor the CJEU and DPA decisions can be challenged before EU data protection law.
national courts.
■ Ultimately, case law will bring maturity to EU data protection law.

36
EDPD 2017 2nd Day (16 May 2017)

PARALLEL SESSIONS
Pseudonymization as a best practice for data protection

Nicola Orlandi,
Head Data Privacy Pharma, Global Privacy Office, Novartis International AG,
Switzerland

We are entering a new era for the use of health data, as Pharma is The social embedment of privacy is changing and we have lots of Pseydonymization and key-coding is a common practice in the
accessing an unprecedented depth and breadth of health data. Dig- new concepts in the GDPR, such as data protection by design and pharma industry, based on multiple safeguards in clinical practice.
ital Medicine will change the healthcare environment, and the sec- default (Art. 25(1)) and pseudonymization, as defined in Art. 4(5) and Adopting and improving this practice would support the data mini-
ondary use of individual patient data for research plays an increasing security of processing (Art. 32(1)(a)). In order to benefit from avail- mization principle, combine security and validation of research and
role in modernizing our healthcare systems, driving medicines inno- able data, we have to minimize the use of identifiable information. support the further use of personal data for research.
vation, improving therapies and fostering better patient outcomes. Especially in the pharma sector pseudonymization must be part of
the general governance of data to limit the risks to individuals and Defining harmonized standards or best practice within the pharma
The potential of big data analysis is given by digital solutions to meet the data protection obligations, help controllers and proces- sector will help to clarify boundaries between pseudonymized,
improve trial administration, digital innovation to aid in patient care sors to support the creation of a reliable governance for processing anonymous and identifiable personal data and enable companies to
and to better emphasize therapy outcomes. We are moving towards health data and move to new results in scientific research. take grounded and consistent decisions when assessing risks. It will
a system beyond pills, meaning that we cannot simply provide pills also implement a general privacy-by-design approach on the one
to the patient anymore, but we are collecting additional information The GDPR explicitly in Art. 89(1) refers to pseudonymization as one hand and help explore new scientific research on the other.
with apps and sensors to better the help for the patient. In future, we of the measures supporting data minimization in processing data
will also talk about Artificial Intelligence in this context. for scientific research. Art. 9 and Art. 5.1(b) allow further processing
for research, when the rights and freedom of individuals are guaran-
To meet individual and social expectations, the use of personal teed. Crucial for the GDPR will be its framework to define research
data needs a responsible and systematic approach to privacy in future.
management.

37
EDPD 2017 2nd Day (16 May 2017)

PARALLEL SESSIONS
Employees sensitive data collection in Eastern Europe

Dr Marlena Wach,
Legal Counsel, Data Privacy, Accenture,
Poland

Sensitive data typically processed by an employer are data regarding SERBIA: Data on the health status of individuals are categorised as ship employee is dependent on the employer. Processing of employ-
physical or mental health, criminal convictions, disablities or recial particularly sensitive data, and are prohibited from disclosure to ees’ biometric data is allowed in case it is necessary for the purpose
origin. Such type of data are typical used in processes like recruit- other parties (unless with express written consent of the patient of legitimate interests of a controller (employer) like securing access
ment and selection, employment records, monitoring at work and or a court decision); failure to maintain confidentiality can be pun- to dangerous materials, state or trade secrecy.
worker’s health processes. Regarding the different jurisdiction in ished with a fine, or a maximum 3 year prison sentence for criminal
Eastern Europe I want to present the respective legal framework for offences. Sensitive data processing is allowed (i) upon prior informed CZECH REPUBLIC: Sensitive data processing is allowed (i) with
such data processing. consent or (ii) on the basis of statutory authorization. explicit written consent, (ii) in case necessary for providing health
care, public health protection or health insurance, (iii) on the basis
RUSSIA: Employers must submit a notification on processing of per- CROATIA: DPA requires employee consent for processing special cat- of special laws or (iv) in the course of legitimate activities. Dynamic
sonal data and server location to the DPA – Roskomnador. Written egories of personal data. Processing is also allowed on the basis of biometric signature as a form of authentication requires informed
consent is required for (i) processing of biometric and sensitive data, special regulations as well as for medical diagnosis, health care or and explicit consent, notification to the data protection authority,
(ii) transfers of countries that do not provide an adequate level of management of health institutions. A public body can request City and the use of a high quality and proven security technology (i.e.
protection; and (iii) personal data of Russian citizen must be stored Councillors to provide the number of employees in the city admin- encryption).
on databases located on Russian-based servers. istration and urban societies, dates of employment, and job titles;
any information on political affiliation requires the consent of the In summary, there is a great diversity in the various Eastern Europe
HUNGARY: Sensitive data processing is allowed (i) with written employee. jurisdictions regarding processing requirements for sensitive data;
consent of the data subject, (ii) in case processing serves fundamen- in particular with respect to the definition of such data, explicit
tal constitutional rights or public interests, or (iii) the processing POLAND: It is important that, according to the Polish Supreme consent, surveillance monitoring of work, background checks and
is neccessary for national security purposes, crime prevention and Administrative Court, employee’s consent does not legitimate pro- restriction to transfer to third countries.
investigation. cessing of employee’s biometric data. The consent sought by the
employer is never freely given and invalid. In employment relation

38
EDPD 2017 2nd Day (16 May 2017)

PARALLEL SESSIONS
The role of the DPO in the GDPR

Nathalie Laneret,
Group Data Protection Officer, Capgemini,
France

Nathalie Laneret is introducing the role of a DPO by focusing on 3 rel- If you decide to not appoint a DPO, you have to document it and you easy to understand in order to be efficient and they need to have
evant questions appearing in this field. Firstly, do I need to appoint a better have good arguments because the DPAs are going to chal- good interpersonal skills, be creative and develop strategies, think-
DPO if I don’t have the obligation to appoint one? lenge you on accountability and want to have a look on what kind ing out of the box and knowing the business, networking within it.
of resilience you have taken and what type of arguments you have Last but not least you need passion and enthusiasm.
If you are not falling within the criteria mentioned in the GDPR, how for not having a DPO. If you appoint a DPO, you have to know, that
do you decide whether to have or have not a DPO? Appointing a DPO all the requirements of GDPR will apply. Another way is to appoint a Thirdly, she issues the proper governance that you should have in
is necessary to implement GDPR. The DPO is the agent of accounta- person, being in charge of the topic, but instead of naming the posi- place in your privacy office. Your DPO should report to the highest
bility and we could even say that on a high level the DPO is an ele- tion DPO, you could call it for instance Privacy Director. management but that must not mean a direct report. You could have
ment of privacy by design, because if a DPO is involved in any kind of a report chain instead.
processing, it somehow is privacy by design. She continues by talking secondly about the profile and the skills,
the DPO should have. Naming them as legal skills, compliance, IT If you cannot afford to appoint a DPO on a full-time base who takes
Next argument in favour for appointing a DPO is to have somebody, knowledge, risk management expertise, quality, audit, program this role upon other missions, the GDPR requires that you have to
who is responsible for this issue. Another way in trying to decide management, communication, training, crisis management, media- make sure, that this person does not face a conflict of interests. DPO
whether to have an DPO or not, is to look at what is your privacy risk tor, facilitator, business partner and strategic leader. To find some- cannot decide about processing procedures and mainly be a proces-
profile. What is your business? What are you doing? Are you process- one with all the named qualities is nearly impossible. What you could sor himself for instance. Otherwise you must fear sanctions from the
ing a lot of personal data? Are you processing a lot of sensitive per- do is to have one central DPO, who is in touch with all departments DPAs.
sonal data? Do you transfer personal data a lot? Depending on your and persons knowing their fields or you have several DPOs with dif-
answers, you may have to decide to appoint a DPO. Another criterion ferent backgrounds to meet all the asked skills. In the end, we have In the end, you must be able to show to the authorities that you have
would be to look at your privacy business profile. Are you a digital to be pragmatic due to limited resources. We won’t be perfect in system of checks and balances in place next to the accountability
company? Is it something my clients are going to be looking at? What everything. principles, that you have.
are my competitors doing? Do they have a DPO? If yes, then maybe I
should do appoint one, too? Also, it is something you could leverage. Coming to the soft skills, DPOs need to be able to communicate, As there are many models, there is not one solution for all and even
You could make it an advantage in your daily business. And finally, if explain, educate, convince, talk whether it is to the top manage- GDPR does not dictate the exact way, you should organize, as long as
you have Binding Corporate Rules, you have to have a DPO as well. ment, the DPA or an employee. They have to make difficult topics it is the right governance in line with your company culture.

39
EDPD 2017 2nd Day (16 May 2017)

PARALLEL SESSIONS
Coordinated data protection enforcement – The new rules of the game

Dr Friedrich Popp,
Senior Associate, Debevoise & Plimpton LLP,
Germany

There is a current deficit regarding the enforcement of data protec- ures, and (iv) consistency mechanisms, including the European Data Finally, it is important that the GDPR objectives are supported by
tion regulation in the different EU member states. As a result, law Protection Board. In addition, regarding third countries, interna- consumer and competition laws. From a consumer perspective there
firms need local counsel to provide cross-border advice. But techni- tional cooperation mechanism will be improved by treaty- or frame- are further legal aspects of processing of personal information, like
cal progress facilitates large-scale and cross-border data processing work-based SA cooperation (e.g., Privacy Shield) as well as the Inter- consumer laws (e.g., unfair terms in consumer contracts, unfair com-
operations by powerful data controllers. national Conference of Data Protection and Privacy Commissioners, petition laws and competition laws (e.g. abuse of dominant position).
the Global Privacy Enforcement Network, etc. The question is: Can we expect a coordination of data protection,
The GDPR responses to the current enforcement deficit in various ways: consumer protection and competition authorities? In this respect
■ Uniform law across EU with effective sanctions; Furthermore, under the GDPR organizations will be able to act as the European Data Protection Supervisor proposal (9/2016) has to
■ cooperation of supervisory authorities (SA) to join forces; representatives for data subjects’s interests which will also improve be mentioned: The proposal refers to implement a Digital Clearing
■ consistency mechanism seeks EU-wide homogeneous application; the enforcement. Data subject’s right to mandate organizations act- House to pool knowledge of regulators in the digital sector to mutu-
■ organizations can coordinate and represent individual data ing on its behalf comprises (i) complaints with SA, (ii) effective judi- ally enhance respective enforcement activities.
subjects’ interests. cial remedy against SA decision, (iii) effective judicial remedy against
a controller or processor and (iv) the right to compensation (if the
The intra-EU cross-border cooperation of SA will be improved under law of the Member State so permits). Member State laws can also
the GDPR by implementing (i) a one-stop shop and cooperation of permit organizations to pursue data protection infringements (not
lead SA with concerned SA, (ii) mutual assistance of SA, (iii) joint compensation).
operations, including joint investigations and enforcement meas

40
EDPD 2017 2nd Day (16 May 2017)

PARALLEL SESSIONS
Turning the upcoming GDPR into a business enabler – the startup perspective

Caroline Olstedt Carlström,


Vice President Privacy, Klarna AB,
Sweden

Caroline Olstedt Carlström points out that the customer relationship minded and trusting public in this concern and 4200 registered DPOs For that matter you need to be a change agent, you need to do lead-
to companies regarding data privacy is a counterpoise to the mere increasing rapidly. Still, the speaker states we need so many more. and-protect management, etc. And you also need to be thoughtful
legal compliance part and important to Klarna AB, herself, the com- and contribute honest and strategic perspectives. Given this needed
pany´s partners, users and also the general public, as the existence of But the cultural change needed for DPOs is being underestimated, widespread notion of company requirements in handling user data
a Ministry for Financial Markets and Consumer Affairs shows. as many of them right now do not do qualified or challenging work. right now it´s truly a challenge.
The 2016 report of the Stockholm School of Economics and KPMG on
She has 5 privacy specialists in her team, a lot for a company the size risk management states a misalignment between what is perceived And as thinking outside the box is important for balancing between
of Klarna AB. as risks and high risks by companies compared to the users´ percep- different interests, as is the advantage of a little company to more
tion, entailing a questionnaire on 13 topics. Opposite to the users´ easily change processes at an afterwards review.
In Sweden, from a user or citizen perspective has had a very moder- opinion directors e.g. did not think that wrongful disclosure of user
ate relationship to privacy, which is likely changing, as the number of data (e.g.) to direct marketing companies would lead to problems. Klarna AB tries to focus on the consumers/users. Improvement of
requests, complaints and inquiries are increasing. Only Third World child labour was widely perceived as problematic, customer service performance works in close collaboration with
as regards to risk mitigation. privacy specialists, transparency towards the customer being very
As regards to the accountability this is becoming very important to important. As there are digital introverts and digital extroverts there
the company´s partners, the merchants they work with in the net- Data privacy considerations now are part of meeting customer must be very different ways to meet these customers, for which the
work, so the company seeks to turn this into a competitive advan- expectations, as it is their trust that has to be earned, not compliance. company has developed a complex “Privacy Dashboard” with a lot
tage instead since 2012. In this sense, from a startup perspective, the data has a great poten- of ways of interaction with the consumers about their preferences,
tial nevertheless, and privacy specialists have to be brought in, as communicating about different products. We put a lot of focus on
Denmark, Finland and Sweden right now are the leading nations as not only the legal requirements are to be taken care of but also eth- promoting a corporate privacy culture, awareness and training, from
regards to jurisdiction about digitalization, connectivity, etc. Den- ical and other issues that might arise in the company. These can be e-learning to face-to-face training, competitions, etc.
mark and Sweden have a focus on startup economy and a very open- great challenges for DPOs in organisations.

41
EDPD 2017 2nd Day (16 May 2017)

PARALLEL SESSIONS
Getting ready for GDPR: a look at new tech to automate privacy

Nimrod Vax, Dimitri Sirota,


co-founder BigID, co-founder BigID,
USA USA

The presentation is about new categories of technical tools and solu- As a result, we need an inventory by data subject as technical solution Further new technical solutions relate to:
tions. The current tools solves yesterday’s problems. This applies for (identity data index). The data subjects request automation. The iden- DATA MAPPING TRUE AUTOMATION: Once you know where the
privacy GRC / PIA tools, data management, data protection (e.g., data tity data index provides all data subject information at your fingertips. data is, you have to understand who is accessing it. The data map-
leak prevention) and privacy consulting (e.g. mapping of business It enables to ping tool enables you to (i) auto discover data flows, (ii) enrich them
processes to document data flows). The GDPR brings new require- ■ quickly find personal data; with business information, (iii) to operate continuous compliance
ments and the current tools will not satifying these GDPR require- ■ export personal data; and (iv) to have an automated maintenance.
ments (like data subject rights, data flow mapping automation, data ■ correlate consent approvals;
risk assessment, breach notification and data consent tracking). ■ trigger data deletion; and DATA RISK ASSESSMENT AND OPERATIONALIZATION: You have to
■ provide as self service. assess the risk based on the data, not based on a hunch. As a result,
So why can traditional tools cannot address subject access requests you need a data driven assessment, risk preference customization,
(SAR)? There is a lack of identity context which restricts current tools In addition, the identity index helps you to minimize your exposure multiple scores and perspectives and, finally, actionable security.
ability. Traditional tools (i) doesn’t know who’s data it is, (ii) cannot with respect to responsible breach responses. You can quickly find
detect Contectual PII, (iii) have too many false positives and (iv) don’t who is impacted, pinpoint the breach source, notify only the impacted Overall, you should keep a flexible approach, i.e. allow both a bot-
know where is the data going. person, scan dark web breach files and pinpoint breach time. tom up approach or a top down business driven approach. Enable
your business users to interact and enrich the data automation. It’s
always going to be a combined effort.

42
EDPD 2017 2nd Day (16 May 2017)

PARALLEL SESSIONS
Broadcast meets broadband: Privacy compliance in the media sector

Dr Stefan Hanloser,
VP Data Protection Law, ProSiebenSat.1 Media SE,
Germany

In his presentation, Dr. Hanloser introduced the portfolio of the Pro7­ standard issues such as traditional targeted advertising. Users visit
Sat1-Group, the multitude of different privacy aspects that poten- group websites, which leads to the generation of usage profiles that
tially arise, and why data protection is an important question for are then used for targeted ads. On the other end of the spectrum are
Pro7Sat1. There are four different sectors into which the affiliates issues that are more specific to the business, for example the merg-
of the Pro7Sat1-Group fall: broadcasting (accounting for 58% of the ing of broadcasting with the Internet. The legal regimes for these
group’s revenue), digital entertainment (12% of the group’s reve- two areas are quite different, as well as the competent authorities.
nue), commerce (20% of the group’s revenue) and production (10% They need to be aligned for new products such as HbbTV. This is
of the group’s revenue). On the one end of the spectrum of privacy dealt with for example with the help of a working group comprising
issues that arise in the context of such a diverse portfolio there are of media groups and data protection authorities.

43
EDPD 2017 2nd Day (16 May 2017)

PARALLEL SESSIONS
Negotiate cloud contracts under the GDPR

Paul Van den Bulck,


Partner, McGuireWoods LLP,
Belgium

When we look on cloud computing and cloud contracts we have to If we look into solutions for the mentioned challenges and risks, it clauses, authentication responsibility, notification in case of data
deal with tensions: Connectivity on the one hand, which is essential is important that general compliance incorporates, and is prereq- breaches and use of safeguards for international data transfers). Fur-
to cloud computing, and security on the other hand. In addition, we uisite for, technical security. In additions, the GDPR stipulates rules thermore, codes of conduct (like BSI-ANSSI) and certifications (and
have to manage multitude of different types of clouds and a mul- for sub-processing chains: (i) the controller must choose processors standardization, like ITU-T) should be imposed by the cloud contract.
titude of actors in a cloud environment (user, integrator, provider capable of meeting the requirements of the GDPR, (ii) the processor Finally, it is important to understand the sanctions system under
subprovider, etc.). A good example to demonstrate the challenges cannot subcontract without authorization of the controller and (iii) the GDPR and to take this into account when negotiating cloud con-
is the Internet of things, which is a cloud based system with massive processing must be governed by a contract stipulating, inter alia, tracts. Controller and process are joint liable towards data subjects
automatic generation and data transfer. instructions of the controller, confidentiality agreement, technical for the entire damage. Security negligence or failure to notify data
security, mirroring mechanism with sub-processors, assists the con- breache are sanctioned with material fines (up to 10 million EUR or
The risks for actors in a cloud are, inter alia, (i) data leaks (accidental troller (data breaches/accountability) and audits. 2% of worldwide annual turnover).
or intentional), (ii) confusion of roles, which is an new type of risk,
(iii) access risks, (iv) crosschecking capabilities and (v) new purposes With respect to solutions it is also important to take into account (i)
(e.g., targeted advertising). What are the responsibilities under the data minimization and anonymization, (ii) privacy by design and by
GDPR? The main responsible party is the data controller, However, default, and (iii) storage in the EEA and transfer of data only under
under the GDPR, the processor has a selfstanding security obligation adequacy decisions or mechanisms. The parties should also prevent
(not only contractual) and is jointly liable with the controller with or allocate responsibilities by specifying processor’s and control-
regard to data subjects. ler’s obligations (e.g., modalities and frequency of audits, catch all

44
EDPD 2017 2nd Day (16 May 2017)

PARALLEL SESSIONS
The theories of harm in privacy, data protection and antitrust law

Dr Sára Hoffman,
Associate, Privacy and Data Protection Practice, Wilson Sonsini Goodrich & Rosati LLP,
Belgium

In her presentation, Dr. Sára Hoffman of Wilson Sonsini Goodrich & Similar differences apply when comparing personal data as input ity, or if “preemptive mergers” restrict access to data by integrating
Rosati discussed the role of privacy and data protection law in an resource with traditional forms of input resource, such as oil. Oil is the supply of data into one company. So far, however, the European
antitrust context. There are two major roles of personal data in an exclusive (it cannot be at the disposal of more than one entity at the Commission has not yet identified data protection issues as a sub-
antitrust assessment. The first is personal data as payment (“data same time), perishable and difficult to get. Personal data is non-ex- stantive concern in any merger.
is the new currency”), the second personal data as input resource clusive (different entities can collect the same data), non-perishable
(“data is the new oil”). Personal data does, however, have some char- and it is “within reach” (i.e., not a scarce resource). With regard to Dr. Hoffman concluded her presentation with the practical recom-
acteristics which differentiates it from traditional payment methods the assessment of the value of data, it should also be noted that the mendation for privacy practitioners to “translate” their privacy con-
and input resources, and these differences will need to be taken into purpose for its use may change, which makes the assessment even cerns into the concepts introduced during the presentation – this
account for the antitrust assessment. A comparison between money harder. Taking all of this into account, consumers are harmed if the way, you speak the same language with antitrust lawyers.
as payment method and personal data as payment method shows, quality of products and services decrease due to lower privacy and
for example, that while money is interchangeable and its value can data protection standards. Such lower standards could be caused by
easily be determined, personal data is non-interchangeable and its an elimination of competitive forces on the market places if barriers
value cannot easily be determined. to market entry or expansion are set due to restricted data availabil-

45
EDPD 2017 2nd Day (16 May 2017)

PARALLEL SESSIONS
Meeting the challenge of a global GDPR and BCR program

Myriam Gufflet, John Bowman,


Principal, Promontory GDPR Programme Lead, Senior Principal, Promontory GDPR Programme Lead,
UK UK

The new privacy requirements under the GDPR have an impact to The key elements (phases) of a GDPR implementation approach are The current BCR requirements are already close to the GDPR. The
major organizations. Compliance with the GDPR imposes both sig- (i) initial project set up (incl. budget decisions), (ii) scoping and plan- majority of WP29 requirements are covered and there only a few
nificant operational and administrative implications; examples are: ning (key stakeholders, toolkit, methodology, etc.), (iii) information additional requirements (e.g., privacy by design and by default,
gathering (document review, interviews, etc.), (iv) readiness assess- rights to restriction and to portability). In addition, the EDPB is enti-
■ Operational impacts: International data transfers, right to be ment (key compliance gap, etc.), (v) remediation planning (plan, tled to issue guidelines, recommendations and best practices to fur-
forgoten an to erasure, right to data portability, subject access roadmap, budget, etc.), and (vi) implementation (remediation, oper- ther specify BCR and requirements.
requests (SARS), sanctions. ational changes). The elements should be coordinated by a Project
Management office. As a result, there is no material change in the BCR produre since we
■ Administrative impacts: Harmonisation across the EU, dealing have a consistency approach (lead DPA draft decision EDPB opin-
with the authorities, territorial scope, data protection officers. The main scope and application of BCRs is a transfer mechanism to ion Lead DPA decision EDPB binding decision). However, the
ensure intra-group adequate privacy protection. BCRs are officially European Commission may specify the format and procedures for
How do privacy programmes addresses EU privacy requirements? recognized as a valid legal transfer mechanism under the GDPR. information exchange between applicants and DPAs via implement-
A privacy programmes provides the legal framework to facilitate However, BCR require implementation of accountability measures ing acts (Article 47). In any case, it is important to adapt the existing
group-wide data transfers and supports transition to the GDPR for effective compliance and BCRs may cover both controller activi- BCR and take into account the time frame.
requirements. The programme has to focus on data origin (EU and ties (BCR-C) and processor activities (BCR-P). Nearly 90 organisations
non-EU) and whether EU data are hosted / processed / accessed by had their BCR approved and approx. 50 BCRs are in the approval
EU or non-EU entities. Binding Corporate Rules (BCRs) provide the process.
legal basis for the transfer of data between EU and non-EU entities.

46
nce
See the confere
trailer here:

http://www.euroforum.de/edpd/edpd-trailer/

E!
SAVE THE DAT
018
14 + 15 MAY 2

8 EDPD 2018
th
EUROPEAN DATA PROTECTION DAYS

IMPRESSUM EUROFORUM  ∙  Prinzenallee 3  ∙  40549 Düsseldorf V.i.S.d.P. Elke Schneider Text von Lena Alex, Stephan Kress, Joachim Grittmann

#EDPD18 | www.edpd-conference.com 47

Das könnte Ihnen auch gefallen