SlideShare uma empresa Scribd logo
1 de 28
DATA PROTECTION &
DATA INTEGRITY
20 April 2016, Paperless Lab
Academy
Sofie van der Meulen
www.axonlawyers.com
#PaperlessLabAcademy@sofievdmeulen
Overview
• From DPD to GDPR: personal data
• Anonymisation & pseudonomysation
• Consent
• Research data
• Data transfers
• Security
• New rules on data breaches
3
Time to say goodbye…
4
to the Data Protection Directive!
Well… almost.
• 2012: EC proposed GDPR
• Council position 6 April = latest available text GDPR
http://eur-lex.europa.eu/legal-
content/EN/TXT/?uri=consil:ST_5419_2016_INIT
• Adopted in plenary on 14 April 2016
• Currently: waiting for publication in the Official Journal of the
European Union (OJEU)
• Entry into force: 20 days after the date of publication in the OJEU,
the Regulation
• Apply from: 2 years after the date of its entry into force (2018)
5
Personal data?
Personal data under DPD:
any information relating to an identified or identifiable natural
person ('data subject'); whether directly or indirectly identifiable.
“data relates to an individual if it refers to the identity, characteristics
or behaviour of an individual or if such information is used to
determine or influence the way in which that person is treated or
evaluated” (WP136)
Future scope of ‘personal data’ under GDPR?
Personal data under GDPR
Definitions for:
• Data concerning health – (sensitive data)
• Genetic data – (sensitive data)
• Biometric data
• Personal data:
7
Anonymous information
Recital 26 GDPR:
‘The principles of data protection should not apply to anonymous
information, namely information which does not relate to an
identified or identifiable natural person or to personal data rendered
anonymous in such a manner that the data subject is not or no
longer identifiable.
This Regulation does not therefore concern the processing of such
anonymous information, including for statistical or research
purposes.’
8
Anonymous?
9
Zip code, Date of Birth &
Gender are sufficient to
identify a large part of the
population..
Anonymisation
Anonymisation criteria WP29 Opinion 05/2014:
• Is it still possible to single out an individual?
• Is it still possible to link records relating to an individual?
• Can information about an individual be inferred?
Outcome after technique is applied: be as permanent as erasure of
the personal data – it should make processing of personal data
impossible. <- Realistic?
Absolute anonymisation is impossible -> focus on mitigating risks of
re-identification.
It’s not a one off exercise!
10
Pseudonomysation
GDPR: processing of personal data in such a manner that the
personal data can
• no longer be attributed to a specific data subject
• without the use of additional information,
• provided that such additional information is kept separately and
• is subject to technical and organizational measures to ensure
that the personal data are not attributed to an identified or
identifiable natural person
= security measure to reduce the linkability of a dataset to the
original identity of a data subject
11
Consent 
‘GDPR: ‘means any freely given, specific,
informed and unambiguous indication of the
data subject's wishes by which he or she, by a statement or by a
clear affirmative action, signifies agreement to the processing of
personal data relating to him or her’
Recitals 32 and 42 GDPR:
• silence, pre-ticked boxes or inactivity -> do not constitute
consent.
• Processing more purposes? Consent should be given for all of
them!
• Controller should be able to demonstrate consent.
12
DPD: health data
Health data is special category of data - processing prohibited
UNLESS
Explicit consent
OR
Medical treatment exemption:
Processing of the data is required for the purposes of preventive
medicine, medical diagnosis, the provision of care or treatment or
the management of health-care services, and those data are
processed by a health professional subject under national law or
rules established by national competent bodies to the obligation of
professional secrecy or by another person also subject to an
equivalent obligation of secrecy.
DPD: Scope of ‘health data’?
European Court of Justice in Case C-101/01 (Lindqvist):
‘In the light of the purpose of the directive, the expression “data
concerning health” used in Article 8(1) thereof must be given a wide
interpretation so as to include information concerning all aspects,
both physical and mental, of the health of an individual.’
Letter of WP29 of 5 February 2015 on data collected by mHealth
apps. Health data includes:
• Medical data: ‘data about the physical or mental health status of
a data subject (…) generated in a professional, medical context
• Health related data used in an administrative context
(information to public entities)
• Data about the purchase of medical products and services
provided that the health status can be determined
Health data case
study
Performance data becomes health data
Future scope of ‘health data’
GDPR: Research
Consent & research purposes:
17
GDPR: Research
Purpose limitation:
18
GDPR: Research
Data minimisation should be ensured
19
Research – ‘Right to be forgotten’
Article 17 (1) GDPR: The data subject has the right to obtain the
erasure of personal without undue delay from the controller.
Last year: risk that statistical analyses will be “depowered” as a
result of exercise of right to withdraw consent and erasure of data.
Result, clinical trials and clinical investigations will be
conducted outside Europe to avoid any such risk.
Now: the ‘right to be forgotten’ does not apply if the processing takes
place:
‘for archiving purposes in the public interest, scientific or historical
research purposes or statistical purposes in accordance with
Article 89(1) in so far as the right referred to in paragraph 1 is likely
to render impossible or seriously impair the achievement of the
objectives of that processing.’
Data transfer outside EU & security
• Surveillance practices (PRISM)
Safe harbor for transfer to US?
Safe Harbor Certification merely means that the transfer of personal
data to the US is allowed in principle because it demonstrates the
adequacy of the US as jurisdiction
• Facebook case (Schrems, C-362/14) invalidates Safe Harbor
transfer mechanism
Alternatives:
• Data transfer agreement based on European
Commission’s standard contractual clauses
• Binding corporate rules blessed by a DPA
• “Privacy Shield” still not up and running
Security
Data controllers and processors should implement appropriate
technical & organizational measures to protect data from loss or
any form of unlawful processing.
Security measures should take into account:
• Nature of the data to be protected
• State of the art
• Aim to prevent unnecessary collection and further processing of
personal data
• Overriding principle: Plan-Do-Check-Act
The Guardian 18 February 2016
26 February 2016
Data breaches
NL: Legislative proposal adopted amending the Data Protection
Act and Telecommunications Act by incorporating a notification
obligation for data controllers in case of data breaches.
Until now: hundreds of notifications!
The Data Protection Authority can impose administrative fines up to
EUR 820.000 in case of violation of the notification obligation.
Notification obligation applies if:
• Security breach
• Entity in public or private sector (companies, governmental
organizations)
• The infringement leads to a significant risk of adverse impact on
the protection of personal data processed by the organization
(theft, loss or abuse of personal data).
GDPR – Data breaches
Recital 85 & 86 GDPR:
• If not addressed a data breach may lead to damage to natural
persons such as loss over control over their personal data,
financial loss, unauthorized reversal of pseudonymisation,
damage to reputation and loss of confidentiality.
• Communicating a data breach to the person concerned in case
of high risk of damage. -> person can take precautions.
• Otherwise: notify supervisory authority.
26
Sofie van der Meulen
Axon Advocaten
Piet Heinkade 183
1019 HC Amsterdam
+31 88 650 6500
+31 6 53 44 05 67
sofie.vandermeulen@axonlawyers.com
THANK YOU FOR YOUR ATTENTION!
Legal stuff
• The information in this presentation is provided for information
purposes only.
• The information is not exhaustive. While every endeavour is made
to ensure that the information is correct at the time of publication,
the legal position may change as a result of matters including new
legislative developments, new case law, local implementation
variations or other developments.
• The information does not take into account the specifics of any
person's position and may be wholly inappropriate for your
particular circumstances.
• The information is not intended to be legal advice, cannot be
relied on as legal advice and should not be a substitute for legal
advice.

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Iso iec 27032 foundation - cybersecurity training course
Iso iec 27032 foundation - cybersecurity training courseIso iec 27032 foundation - cybersecurity training course
Iso iec 27032 foundation - cybersecurity training course
 
ISO/IEC 27701 vs GDPR: What you need to know
ISO/IEC 27701 vs GDPR: What you need to knowISO/IEC 27701 vs GDPR: What you need to know
ISO/IEC 27701 vs GDPR: What you need to know
 
Iso 28000 supply chain white paper lakshy rev02_17022015 low.pdf
Iso 28000 supply chain white paper lakshy rev02_17022015 low.pdfIso 28000 supply chain white paper lakshy rev02_17022015 low.pdf
Iso 28000 supply chain white paper lakshy rev02_17022015 low.pdf
 
Iso 29001 white paper lakshy rev02_17022015 low
Iso 29001 white paper lakshy rev02_17022015 lowIso 29001 white paper lakshy rev02_17022015 low
Iso 29001 white paper lakshy rev02_17022015 low
 
Demystifying the Cyber NISTs
Demystifying the Cyber NISTsDemystifying the Cyber NISTs
Demystifying the Cyber NISTs
 
ISO/IEC 27032 – Guidelines For Cyber Security
ISO/IEC 27032 – Guidelines For Cyber SecurityISO/IEC 27032 – Guidelines For Cyber Security
ISO/IEC 27032 – Guidelines For Cyber Security
 
we45 ISO-27001 Case Study
we45 ISO-27001 Case Studywe45 ISO-27001 Case Study
we45 ISO-27001 Case Study
 
Compliance mapping GDPR vs ISO_en
Compliance mapping GDPR vs ISO_enCompliance mapping GDPR vs ISO_en
Compliance mapping GDPR vs ISO_en
 
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to KnowCMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know
 
The Definitive GDPR Guide for Event Professionals
The Definitive GDPR Guide for Event ProfessionalsThe Definitive GDPR Guide for Event Professionals
The Definitive GDPR Guide for Event Professionals
 
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
 
General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001
 
27001 2015(+a1)
27001 2015(+a1)27001 2015(+a1)
27001 2015(+a1)
 
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...
 
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
 
GDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksGDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risks
 
GDPR vs US Regulations: Their differences and Commonalities with ISO/IEC 27701
GDPR vs US Regulations: Their differences and Commonalities with ISO/IEC 27701GDPR vs US Regulations: Their differences and Commonalities with ISO/IEC 27701
GDPR vs US Regulations: Their differences and Commonalities with ISO/IEC 27701
 
ISO 27001 Training | ISO 27001 Implementation
ISO 27001 Training | ISO 27001 ImplementationISO 27001 Training | ISO 27001 Implementation
ISO 27001 Training | ISO 27001 Implementation
 
The Virtual Security Officer Platform
The Virtual Security Officer PlatformThe Virtual Security Officer Platform
The Virtual Security Officer Platform
 
It security iso 27001
It security iso 27001It security iso 27001
It security iso 27001
 

Semelhante a Data protection and data integrity

PLA Legal aspects of Big Data analytics final
PLA Legal aspects of Big Data analytics finalPLA Legal aspects of Big Data analytics final
PLA Legal aspects of Big Data analytics final
Sofie van der Meulen
 
Data Privacy and consent management .. .
Data Privacy and consent management  ..  .Data Privacy and consent management  ..  .
Data Privacy and consent management .. .
ClinosolIndia
 

Semelhante a Data protection and data integrity (20)

Medical device data protection and security
Medical device data protection and security Medical device data protection and security
Medical device data protection and security
 
Hacking Health Camp Strasbourg health data & data protection in the Netherlands
Hacking Health Camp Strasbourg health data & data protection in the Netherlands Hacking Health Camp Strasbourg health data & data protection in the Netherlands
Hacking Health Camp Strasbourg health data & data protection in the Netherlands
 
Information governance
Information governanceInformation governance
Information governance
 
PLA Legal aspects of Big Data analytics final
PLA Legal aspects of Big Data analytics finalPLA Legal aspects of Big Data analytics final
PLA Legal aspects of Big Data analytics final
 
Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics' Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics'
 
GDPR presentation BE-Com - IFORI
GDPR presentation BE-Com - IFORIGDPR presentation BE-Com - IFORI
GDPR presentation BE-Com - IFORI
 
Data Privacy and consent management .. .
Data Privacy and consent management  ..  .Data Privacy and consent management  ..  .
Data Privacy and consent management .. .
 
Data privacy and consent management (K.sailaja).pptx
Data privacy and consent management (K.sailaja).pptxData privacy and consent management (K.sailaja).pptx
Data privacy and consent management (K.sailaja).pptx
 
The Privacy Law Landscape: Issues for the research community
The Privacy Law Landscape: Issues for the research communityThe Privacy Law Landscape: Issues for the research community
The Privacy Law Landscape: Issues for the research community
 
2017 09 13_VOKA The Big Refresh - GDPR - IFORI
2017 09 13_VOKA The Big Refresh - GDPR - IFORI2017 09 13_VOKA The Big Refresh - GDPR - IFORI
2017 09 13_VOKA The Big Refresh - GDPR - IFORI
 
Protection of patient data in EU vs. US
Protection of patient data in EU vs. USProtection of patient data in EU vs. US
Protection of patient data in EU vs. US
 
Presentation gdpr ahti
Presentation gdpr ahtiPresentation gdpr ahti
Presentation gdpr ahti
 
Seminar General Data Protection Regulation
Seminar General Data Protection RegulationSeminar General Data Protection Regulation
Seminar General Data Protection Regulation
 
The U.S. Healthcare Implications of Europe’s Stricter Data Privacy Regulation
The U.S. Healthcare Implications of Europe’s Stricter Data Privacy RegulationThe U.S. Healthcare Implications of Europe’s Stricter Data Privacy Regulation
The U.S. Healthcare Implications of Europe’s Stricter Data Privacy Regulation
 
Esc Rennes gdpr oct 2018
Esc Rennes gdpr oct 2018Esc Rennes gdpr oct 2018
Esc Rennes gdpr oct 2018
 
Things to know about GDPR in 2018
Things to know about GDPR in 2018Things to know about GDPR in 2018
Things to know about GDPR in 2018
 
Legal and ethical considerations for sharing research data
Legal and ethical considerations for sharing research dataLegal and ethical considerations for sharing research data
Legal and ethical considerations for sharing research data
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...
 
Overview on data privacy
Overview on data privacy Overview on data privacy
Overview on data privacy
 
GDPR for Dummies
GDPR for DummiesGDPR for Dummies
GDPR for Dummies
 

Mais de Axon Lawyers

Mais de Axon Lawyers (20)

Mini symposium egpo maart 2017
Mini symposium egpo maart 2017Mini symposium egpo maart 2017
Mini symposium egpo maart 2017
 
Vitafoods B2C communication in the funtional food
 Vitafoods B2C communication in the funtional food  Vitafoods B2C communication in the funtional food
Vitafoods B2C communication in the funtional food
 
Vitafoods marketing functional food to children
Vitafoods marketing functional food to childrenVitafoods marketing functional food to children
Vitafoods marketing functional food to children
 
Vitafoods - Alternative Sources of Protein
Vitafoods - Alternative Sources of Protein Vitafoods - Alternative Sources of Protein
Vitafoods - Alternative Sources of Protein
 
eHealth Best Practice Day
eHealth Best  Practice DayeHealth Best  Practice Day
eHealth Best Practice Day
 
Zorg2025 Big Data for Personal Health
Zorg2025 Big Data for Personal Health Zorg2025 Big Data for Personal Health
Zorg2025 Big Data for Personal Health
 
Vitafoods eu clinical trials regulation
Vitafoods   eu clinical trials regulationVitafoods   eu clinical trials regulation
Vitafoods eu clinical trials regulation
 
Mini-symposium dementie privacy veiligheid eGPO
Mini-symposium dementie privacy veiligheid eGPOMini-symposium dementie privacy veiligheid eGPO
Mini-symposium dementie privacy veiligheid eGPO
 
Axon seminar alternative proteins
Axon seminar alternative proteins Axon seminar alternative proteins
Axon seminar alternative proteins
 
Summer school Utrecht 3D printing and biofabrication
Summer school Utrecht 3D printing and biofabricationSummer school Utrecht 3D printing and biofabrication
Summer school Utrecht 3D printing and biofabrication
 
Mededinging en toezicht in de zuivel
Mededinging en toezicht in de zuivelMededinging en toezicht in de zuivel
Mededinging en toezicht in de zuivel
 
Presentatie food seminar 24 juni 2015 (claudia bruins)
Presentatie food seminar 24 juni 2015 (claudia bruins)Presentatie food seminar 24 juni 2015 (claudia bruins)
Presentatie food seminar 24 juni 2015 (claudia bruins)
 
Newtricious - B2C communicatie in de food sector
Newtricious - B2C communicatie in de food sectorNewtricious - B2C communicatie in de food sector
Newtricious - B2C communicatie in de food sector
 
B2B en B2C communicatie in de food sector
B2B en B2C communicatie in de food sectorB2B en B2C communicatie in de food sector
B2B en B2C communicatie in de food sector
 
Novel foods for Vitafoods
Novel foods for VitafoodsNovel foods for Vitafoods
Novel foods for Vitafoods
 
Vitafoods Europe 2015: Clearer labels for consumers
Vitafoods Europe 2015: Clearer labels for consumersVitafoods Europe 2015: Clearer labels for consumers
Vitafoods Europe 2015: Clearer labels for consumers
 
Beveiliging van medische software in een netwerk
Beveiliging van medische software in een netwerkBeveiliging van medische software in een netwerk
Beveiliging van medische software in een netwerk
 
141023 novel foods for food expo
141023 novel foods for food expo141023 novel foods for food expo
141023 novel foods for food expo
 
Conveying food innovations by health claims
Conveying food innovations by health claimsConveying food innovations by health claims
Conveying food innovations by health claims
 
Pharma data analytics
Pharma data analyticsPharma data analytics
Pharma data analytics
 

Último

一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
A AA
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
e9733fc35af6
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
bd2c5966a56d
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
Airst S
 
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
A AA
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
Airst S
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
ss
 

Último (20)

Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
 
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
 
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
 
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptx
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
 
Clarifying Land Donation Issues Memo for
Clarifying Land Donation Issues Memo forClarifying Land Donation Issues Memo for
Clarifying Land Donation Issues Memo for
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdf
 
Navigating the Legal and Ethical Landscape of Blockchain Investigation.pdf
Navigating the Legal and Ethical Landscape of Blockchain Investigation.pdfNavigating the Legal and Ethical Landscape of Blockchain Investigation.pdf
Navigating the Legal and Ethical Landscape of Blockchain Investigation.pdf
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statute
 

Data protection and data integrity

  • 1. DATA PROTECTION & DATA INTEGRITY 20 April 2016, Paperless Lab Academy Sofie van der Meulen www.axonlawyers.com #PaperlessLabAcademy@sofievdmeulen
  • 2. Overview • From DPD to GDPR: personal data • Anonymisation & pseudonomysation • Consent • Research data • Data transfers • Security • New rules on data breaches
  • 3. 3
  • 4. Time to say goodbye… 4 to the Data Protection Directive!
  • 5. Well… almost. • 2012: EC proposed GDPR • Council position 6 April = latest available text GDPR http://eur-lex.europa.eu/legal- content/EN/TXT/?uri=consil:ST_5419_2016_INIT • Adopted in plenary on 14 April 2016 • Currently: waiting for publication in the Official Journal of the European Union (OJEU) • Entry into force: 20 days after the date of publication in the OJEU, the Regulation • Apply from: 2 years after the date of its entry into force (2018) 5
  • 6. Personal data? Personal data under DPD: any information relating to an identified or identifiable natural person ('data subject'); whether directly or indirectly identifiable. “data relates to an individual if it refers to the identity, characteristics or behaviour of an individual or if such information is used to determine or influence the way in which that person is treated or evaluated” (WP136) Future scope of ‘personal data’ under GDPR?
  • 7. Personal data under GDPR Definitions for: • Data concerning health – (sensitive data) • Genetic data – (sensitive data) • Biometric data • Personal data: 7
  • 8. Anonymous information Recital 26 GDPR: ‘The principles of data protection should not apply to anonymous information, namely information which does not relate to an identified or identifiable natural person or to personal data rendered anonymous in such a manner that the data subject is not or no longer identifiable. This Regulation does not therefore concern the processing of such anonymous information, including for statistical or research purposes.’ 8
  • 9. Anonymous? 9 Zip code, Date of Birth & Gender are sufficient to identify a large part of the population..
  • 10. Anonymisation Anonymisation criteria WP29 Opinion 05/2014: • Is it still possible to single out an individual? • Is it still possible to link records relating to an individual? • Can information about an individual be inferred? Outcome after technique is applied: be as permanent as erasure of the personal data – it should make processing of personal data impossible. <- Realistic? Absolute anonymisation is impossible -> focus on mitigating risks of re-identification. It’s not a one off exercise! 10
  • 11. Pseudonomysation GDPR: processing of personal data in such a manner that the personal data can • no longer be attributed to a specific data subject • without the use of additional information, • provided that such additional information is kept separately and • is subject to technical and organizational measures to ensure that the personal data are not attributed to an identified or identifiable natural person = security measure to reduce the linkability of a dataset to the original identity of a data subject 11
  • 12. Consent  ‘GDPR: ‘means any freely given, specific, informed and unambiguous indication of the data subject's wishes by which he or she, by a statement or by a clear affirmative action, signifies agreement to the processing of personal data relating to him or her’ Recitals 32 and 42 GDPR: • silence, pre-ticked boxes or inactivity -> do not constitute consent. • Processing more purposes? Consent should be given for all of them! • Controller should be able to demonstrate consent. 12
  • 13. DPD: health data Health data is special category of data - processing prohibited UNLESS Explicit consent OR Medical treatment exemption: Processing of the data is required for the purposes of preventive medicine, medical diagnosis, the provision of care or treatment or the management of health-care services, and those data are processed by a health professional subject under national law or rules established by national competent bodies to the obligation of professional secrecy or by another person also subject to an equivalent obligation of secrecy.
  • 14. DPD: Scope of ‘health data’? European Court of Justice in Case C-101/01 (Lindqvist): ‘In the light of the purpose of the directive, the expression “data concerning health” used in Article 8(1) thereof must be given a wide interpretation so as to include information concerning all aspects, both physical and mental, of the health of an individual.’ Letter of WP29 of 5 February 2015 on data collected by mHealth apps. Health data includes: • Medical data: ‘data about the physical or mental health status of a data subject (…) generated in a professional, medical context • Health related data used in an administrative context (information to public entities) • Data about the purchase of medical products and services provided that the health status can be determined
  • 15. Health data case study Performance data becomes health data
  • 16. Future scope of ‘health data’
  • 17. GDPR: Research Consent & research purposes: 17
  • 19. GDPR: Research Data minimisation should be ensured 19
  • 20. Research – ‘Right to be forgotten’ Article 17 (1) GDPR: The data subject has the right to obtain the erasure of personal without undue delay from the controller. Last year: risk that statistical analyses will be “depowered” as a result of exercise of right to withdraw consent and erasure of data. Result, clinical trials and clinical investigations will be conducted outside Europe to avoid any such risk. Now: the ‘right to be forgotten’ does not apply if the processing takes place: ‘for archiving purposes in the public interest, scientific or historical research purposes or statistical purposes in accordance with Article 89(1) in so far as the right referred to in paragraph 1 is likely to render impossible or seriously impair the achievement of the objectives of that processing.’
  • 21. Data transfer outside EU & security • Surveillance practices (PRISM) Safe harbor for transfer to US? Safe Harbor Certification merely means that the transfer of personal data to the US is allowed in principle because it demonstrates the adequacy of the US as jurisdiction • Facebook case (Schrems, C-362/14) invalidates Safe Harbor transfer mechanism Alternatives: • Data transfer agreement based on European Commission’s standard contractual clauses • Binding corporate rules blessed by a DPA • “Privacy Shield” still not up and running
  • 22. Security Data controllers and processors should implement appropriate technical & organizational measures to protect data from loss or any form of unlawful processing. Security measures should take into account: • Nature of the data to be protected • State of the art • Aim to prevent unnecessary collection and further processing of personal data • Overriding principle: Plan-Do-Check-Act
  • 23. The Guardian 18 February 2016
  • 25. Data breaches NL: Legislative proposal adopted amending the Data Protection Act and Telecommunications Act by incorporating a notification obligation for data controllers in case of data breaches. Until now: hundreds of notifications! The Data Protection Authority can impose administrative fines up to EUR 820.000 in case of violation of the notification obligation. Notification obligation applies if: • Security breach • Entity in public or private sector (companies, governmental organizations) • The infringement leads to a significant risk of adverse impact on the protection of personal data processed by the organization (theft, loss or abuse of personal data).
  • 26. GDPR – Data breaches Recital 85 & 86 GDPR: • If not addressed a data breach may lead to damage to natural persons such as loss over control over their personal data, financial loss, unauthorized reversal of pseudonymisation, damage to reputation and loss of confidentiality. • Communicating a data breach to the person concerned in case of high risk of damage. -> person can take precautions. • Otherwise: notify supervisory authority. 26
  • 27. Sofie van der Meulen Axon Advocaten Piet Heinkade 183 1019 HC Amsterdam +31 88 650 6500 +31 6 53 44 05 67 sofie.vandermeulen@axonlawyers.com THANK YOU FOR YOUR ATTENTION!
  • 28. Legal stuff • The information in this presentation is provided for information purposes only. • The information is not exhaustive. While every endeavour is made to ensure that the information is correct at the time of publication, the legal position may change as a result of matters including new legislative developments, new case law, local implementation variations or other developments. • The information does not take into account the specifics of any person's position and may be wholly inappropriate for your particular circumstances. • The information is not intended to be legal advice, cannot be relied on as legal advice and should not be a substitute for legal advice.

Notas do Editor

  1. Last year: Legal landscape for Big Data
  2. To the DPD
  3. REGULATION – not a directive. Directly applicable in all EU Member States.
  4. Still not clear what the scope is of anonymous information including for statistical or research purposes. Identifiable? Taking into account costs and amout of time required for identification, the available technology and the technology at the time of the processing.
  5. http://www.privacy-analytics.com/de-id-university/webinars/anonymization-ema-policy-0070/ Anonymous datasets can be enriched or combined
  6. Potential future health status: any information where there is a scientifically proven or commonly perceived risk of disease in the future, such as obesity, blood pressure, personal habits involving tobacco, alcohol or drugs Past, current and future health status
  7. Still not entirely clear!
  8. Not sure how this will work out in practice!
  9. Article 4, 31 and 32 GDPR are alike!