| Notes |
|
xix | |
| Abbreviations |
|
xxi | |
| Chapter 1 Necessary To Consider Eu Rules |
|
1 | (8) |
|
|
|
1 | (1) |
|
EU Data Protection Rules Are Important for US Businesses |
|
|
2 | (2) |
|
Comparable Analysis Beneficial |
|
|
4 | (1) |
|
Pre-Problem-Solving Works in EU and US |
|
|
5 | (4) |
| Chapter 2 US-EU Similarities, Differences, And Bridges |
|
9 | (14) |
|
|
|
9 | (1) |
|
|
|
9 | (3) |
|
Similarities and Differences |
|
|
12 | (3) |
|
|
|
15 | (8) |
| Chapter 3 The Need For Data Protection |
|
23 | (12) |
|
|
|
23 | (1) |
|
Growing Importance of Data Protection |
|
|
24 | (1) |
|
|
|
24 | (1) |
|
|
|
25 | (1) |
|
|
|
25 | (1) |
|
|
|
26 | (1) |
|
Applies to All Organizations |
|
|
27 | (1) |
|
|
|
28 | (1) |
|
Data Breach and Data Loss |
|
|
28 | (1) |
|
Requirements to Report Data Breaches |
|
|
29 | (2) |
|
|
|
31 | (1) |
|
Proactive Official Audits |
|
|
31 | (4) |
| Chapter 4 Need For Updating Data Protection |
|
35 | (26) |
|
|
|
35 | (2) |
|
|
|
37 | (5) |
|
Update and New and Enhanced Provisions |
|
|
42 | (15) |
|
|
|
57 | (1) |
|
|
|
57 | (4) |
| Chapter 5 EU Data Protection Concepts |
|
61 | (22) |
|
|
|
61 | (1) |
|
|
|
61 | (1) |
|
|
|
62 | (1) |
|
Personal Data Use and Compliance |
|
|
63 | (1) |
|
Describing Data Protection |
|
|
64 | (2) |
|
The Data Protection Regime |
|
|
66 | (1) |
|
Outward-Facing Data Protection Compliance |
|
|
67 | (2) |
|
Inward-Facing Data Protection Compliance |
|
|
69 | (4) |
|
|
|
73 | (1) |
|
National Data Protection Supervisory Authorities |
|
|
74 | (1) |
|
Data Protection Rules Introduced |
|
|
74 | (2) |
|
|
|
76 | (2) |
|
General Criteria for Data Processing |
|
|
78 | (1) |
|
|
|
79 | (1) |
|
|
|
79 | (4) |
| Chapter 6 The Instruments |
|
83 | (16) |
|
|
|
83 | (1) |
|
|
|
83 | (1) |
|
|
|
83 | (1) |
|
General Provisions in the DPD95 |
|
|
84 | (1) |
|
General Provisions in the GDPR |
|
|
85 | (1) |
|
Data Protection Principles |
|
|
86 | (2) |
|
Legitimate Data Processing Conditions for Lawfulness of Processing |
|
|
88 | (1) |
|
|
|
89 | (5) |
|
|
|
94 | (1) |
|
|
|
94 | (1) |
|
Consent for Processing: Conditions for Consent |
|
|
95 | (1) |
|
|
|
96 | (1) |
|
|
|
96 | (3) |
| Chapter 7 The New Rules |
|
99 | (12) |
|
|
|
99 | (1) |
|
|
|
100 | (1) |
|
|
|
100 | (1) |
|
|
|
101 | (1) |
|
Formal Nature of Regulations and Directives |
|
|
101 | (1) |
|
Introducing the New GDPR Changes |
|
|
102 | (2) |
|
Processing of Criminal Convictions and Offenses Data |
|
|
104 | (1) |
|
Processing Not Requiring Identification |
|
|
104 | (1) |
|
Controllers and Processors |
|
|
104 | (1) |
|
Responsibility of the Controller |
|
|
105 | (1) |
|
|
|
105 | (1) |
|
|
|
106 | (1) |
|
Processing under Authority of Controller and Processor |
|
|
106 | (1) |
|
Processing Not Allowing Identification |
|
|
106 | (1) |
|
|
|
106 | (2) |
|
|
|
108 | (3) |
| Chapter 8 Definitions |
|
111 | (20) |
|
|
|
111 | (1) |
|
Categories of Personal Data |
|
|
111 | (1) |
|
|
|
112 | (1) |
|
|
|
112 | (3) |
|
Data Protection Definitions |
|
|
115 | (1) |
|
|
|
115 | (5) |
|
Restriction of Processing |
|
|
115 | (1) |
|
|
|
116 | (1) |
|
|
|
116 | (1) |
|
|
|
116 | (1) |
|
|
|
116 | (1) |
|
|
|
116 | (1) |
|
|
|
117 | (1) |
|
|
|
117 | (1) |
|
|
|
117 | (1) |
|
|
|
117 | (1) |
|
|
|
118 | (1) |
|
Data Protection Supervisory Authority |
|
|
118 | (1) |
|
Supervisory Authority Concerned |
|
|
118 | (1) |
|
Data Protection Supervisory Authority |
|
|
118 | (1) |
|
Cross-Border Processing of Personal Data |
|
|
119 | (1) |
|
Relevant and Reasoned Objection |
|
|
119 | (1) |
|
Information Society Service |
|
|
119 | (1) |
|
International Organization |
|
|
119 | (1) |
|
|
|
120 | (1) |
|
Updated Definitions in the GDPR |
|
|
120 | (7) |
|
|
|
120 | (1) |
|
|
|
120 | (1) |
|
|
|
121 | (1) |
|
|
|
122 | (2) |
|
|
|
124 | (1) |
|
|
|
125 | (1) |
|
|
|
125 | (1) |
|
|
|
125 | (1) |
|
|
|
126 | (1) |
|
|
|
126 | (1) |
|
|
|
126 | (1) |
|
|
|
126 | (1) |
|
|
|
127 | (1) |
|
|
|
127 | (1) |
|
|
|
127 | (4) |
| Chapter 9 Principles |
|
131 | (12) |
|
|
|
131 | (1) |
|
Background Guidance on Lawful, Fair, Transparent |
|
|
132 | (4) |
|
Data Protection Principles |
|
|
136 | (4) |
|
|
|
140 | (1) |
|
How to Collect and Process Personal Data |
|
|
140 | (1) |
|
|
|
140 | (3) |
| Chapter 10 Prior Information Conditions |
|
143 | (8) |
|
|
|
143 | (1) |
|
The General Data Protection Regulation (GDPR) Changes |
|
|
143 | (2) |
|
Prior Information Requirements: Directly Obtained Data |
|
|
145 | (1) |
|
Prior Information Requirements: Indirectly Obtained Data |
|
|
146 | (2) |
|
|
|
148 | (1) |
|
|
|
149 | (2) |
| Chapter 11 Legitimate Processing Conditions |
|
151 | (8) |
|
|
|
151 | (1) |
|
Lawfulness of Processing: General Legitimate Processing Conditions |
|
|
152 | (2) |
|
Lawfulness of Processing: Sensitive Personal Data Legitimate Processing Conditions |
|
|
154 | (2) |
|
|
|
156 | (3) |
| Chapter 12 Keeping Records |
|
159 | (6) |
|
|
|
159 | (1) |
|
Liability and Measures to Demonstrate Compliance |
|
|
159 | (1) |
|
|
|
159 | (2) |
|
|
|
161 | (1) |
|
The Principles' Record Requirements |
|
|
162 | (1) |
|
Cooperation with the Data Protection Supervisory Authority |
|
|
163 | (1) |
|
|
|
163 | (2) |
| Chapter 13 Representatives Of Controllers Not Established In EU |
|
165 | (4) |
|
|
|
165 | (1) |
|
Representatives/Non-EU Controllers |
|
|
165 | (2) |
|
|
|
165 | (1) |
|
|
|
166 | (1) |
|
|
|
167 | (2) |
| Chapter 14 Rights Of Individual Data Subjects |
|
169 | (10) |
|
|
|
169 | (1) |
|
|
|
170 | (1) |
|
|
|
170 | (2) |
|
|
|
172 | (1) |
|
|
|
173 | (4) |
|
|
|
177 | (2) |
| Chapter 15 Rights Of Confirmation And Right Of Access |
|
179 | (12) |
|
|
|
179 | (1) |
|
|
|
179 | (3) |
|
|
|
180 | (1) |
|
|
|
181 | (1) |
|
|
|
182 | (7) |
|
|
|
183 | (1) |
|
|
|
184 | (1) |
|
Access: What Must Be Supplied |
|
|
185 | (1) |
|
|
|
185 | (1) |
|
Making Request for Access |
|
|
185 | (1) |
|
Dealing with Access Requests |
|
|
186 | (1) |
|
Response to Access Requests |
|
|
187 | (1) |
|
Possible Access Exceptions and Issues |
|
|
188 | (1) |
|
|
|
189 | (2) |
| Chapter 16 Right To Rectification |
|
191 | (6) |
|
|
|
191 | (1) |
|
|
|
191 | (2) |
|
|
|
193 | (1) |
|
|
|
194 | (3) |
| Chapter 17 Right To Erasure And Right To Be Forgotten |
|
197 | (12) |
|
|
|
197 | (1) |
|
|
|
197 | (3) |
|
|
|
200 | (5) |
|
|
|
205 | (4) |
| Chapter 18 Right To Restriction Of Processing |
|
209 | (4) |
|
|
|
209 | (1) |
|
|
|
209 | (1) |
|
Background Guidance on Methods to Restrict Processing |
|
|
210 | (1) |
|
|
|
211 | (1) |
|
|
|
211 | (2) |
| Chapter 19 Right To Object To Processing |
|
213 | (6) |
|
|
|
213 | (1) |
|
|
|
213 | (2) |
|
|
|
215 | (2) |
|
|
|
217 | (2) |
| Chapter 20 Notification Obligation Regarding Rectification, Erasure, Or Restriction |
|
219 | (2) |
|
|
|
219 | (1) |
|
|
|
219 | (1) |
|
|
|
219 | (2) |
| Chapter 21 Right Against Automated Individual Decisions And Profiling |
|
221 | (4) |
|
|
|
221 | (1) |
|
Background Guidance on Profiling |
|
|
222 | (1) |
|
|
|
222 | (1) |
|
|
|
223 | (2) |
| Chapter 22 Right To Prevent Direct Marketing Processing |
|
225 | (4) |
|
|
|
225 | (1) |
|
|
|
225 | (1) |
|
|
|
226 | (1) |
|
|
|
226 | (3) |
| Chapter 23 Portability |
|
229 | (4) |
|
|
|
229 | (1) |
|
Background Guidance on Automated Processing and Portability |
|
|
229 | (1) |
|
|
|
230 | (1) |
|
|
|
231 | (2) |
| Chapter 24 Outsourcing To Third-Party Data Processors |
|
233 | (10) |
|
|
|
233 | (1) |
|
|
|
234 | (2) |
|
|
|
236 | (1) |
|
Processing under Authority |
|
|
237 | (1) |
|
|
|
238 | (1) |
|
New Processor Requirements |
|
|
238 | (1) |
|
|
|
239 | (1) |
|
|
|
240 | (1) |
|
|
|
241 | (2) |
| Chapter 25 Children |
|
243 | (8) |
|
|
|
243 | (1) |
|
|
|
244 | (1) |
|
Children Merit Specific Protection |
|
|
244 | (1) |
|
Transparency and Children |
|
|
245 | (1) |
|
|
|
245 | (4) |
|
|
|
245 | (2) |
|
No Legitimate Interest Processing of Personal Data of Child |
|
|
247 | (1) |
|
Child's Consent and Conditions for Information Society Services |
|
|
247 | (1) |
|
Transparency and Children |
|
|
248 | (1) |
|
Codes of Conduct and Certification |
|
|
248 | (1) |
|
Data Protection Supervisory Authority |
|
|
249 | (1) |
|
|
|
249 | (2) |
| Chapter 26 Increased Penalties And Fines |
|
251 | (12) |
|
|
|
251 | (1) |
|
|
|
251 | (2) |
|
|
|
253 | (1) |
|
|
|
254 | (1) |
|
Fines for Non-Compliance with Data Protection Supervisory Authority Order |
|
|
254 | (2) |
|
|
|
256 | (1) |
|
General Conditions for Imposing Administrative Fines |
|
|
257 | (2) |
|
|
|
259 | (1) |
|
|
|
260 | (1) |
|
|
|
260 | (3) |
| Chapter 27 Codes Of Conduct And Certification |
|
263 | (8) |
|
|
|
263 | (1) |
|
Background Guidance: Codes of Conduct |
|
|
263 | (1) |
|
|
|
263 | (2) |
|
Monitoring Approved Codes of Conduct |
|
|
265 | (1) |
|
Details of Codes of Conduct |
|
|
266 | (2) |
|
Certification Seals and Marks |
|
|
268 | (1) |
|
|
|
268 | (1) |
|
|
|
268 | (2) |
|
|
|
270 | (1) |
| Chapter 28 Security Of Personal Data |
|
271 | (34) |
|
|
|
271 | (1) |
|
|
|
272 | (5) |
|
|
|
272 | (2) |
|
|
|
274 | (1) |
|
|
|
275 | (1) |
|
|
|
275 | (1) |
|
|
|
276 | (1) |
|
Legal Rule: Appropriate Security Measures |
|
|
277 | (5) |
|
Notification of Data Breach to Data Protection Supervisory Authority |
|
|
282 | (1) |
|
Communication of Personal Data Breach to Data Subject |
|
|
283 | (1) |
|
Data Protection Impact Assessment |
|
|
284 | (2) |
|
|
|
286 | (1) |
|
Ensuring Appropriate Security Measures |
|
|
287 | (1) |
|
|
|
288 | (1) |
|
Engaging Processors and Security Issues |
|
|
289 | (2) |
|
Legislative Data Protection Reviews |
|
|
291 | (1) |
|
Specific Public Interest Prior Consultations |
|
|
291 | (1) |
|
|
|
291 | (1) |
|
|
|
292 | (1) |
|
Data Protection Supervisory Authorities Guides |
|
|
292 | (2) |
|
Security and Article 29 Data Protection Working Party (WP29)/EDPB |
|
|
294 | (1) |
|
Organizational Security Awareness |
|
|
295 | (4) |
|
Identifying and Controlling Organizational IT Security |
|
|
295 | (1) |
|
|
|
296 | (1) |
|
|
|
297 | (1) |
|
|
|
297 | (1) |
|
|
|
297 | (1) |
|
Mobile Telephones and Devices |
|
|
297 | (1) |
|
|
|
297 | (1) |
|
|
|
298 | (1) |
|
Software Installation and Management |
|
|
298 | (1) |
|
|
|
298 | (1) |
|
|
|
298 | (1) |
|
|
|
298 | (1) |
|
Bring Your Own Device (BYOD) |
|
|
299 | (1) |
|
Organizational Security Measures |
|
|
299 | (1) |
|
|
|
300 | (1) |
|
Third-Party Security Providers |
|
|
301 | (1) |
|
Disposal of Computer Hardware |
|
|
302 | (1) |
|
|
|
303 | (2) |
| Chapter 29 Data Breaches |
|
305 | (10) |
|
|
|
305 | (1) |
|
Data Breach Incidents in Context |
|
|
305 | (1) |
|
|
|
306 | (1) |
|
|
|
306 | (1) |
|
Notifying Data Breach to Individual Data Subjects |
|
|
306 | (1) |
|
Notifications and Measures re Data Breaches |
|
|
307 | (1) |
|
|
|
307 | (3) |
|
Notification of a Data Breach to Data Protection Supervisory Authority |
|
|
307 | (2) |
|
Communication of a Data Breach to the Data Subject |
|
|
309 | (1) |
|
|
|
310 | (1) |
|
|
|
310 | (1) |
|
|
|
310 | (1) |
|
|
|
310 | (2) |
|
|
|
312 | (1) |
|
|
|
312 | (3) |
| Chapter 30 Data Protection Impact Assessment And Prior Consultation |
|
315 | (14) |
|
|
|
315 | (1) |
|
|
|
315 | (3) |
|
|
|
315 | (1) |
|
Data Protection Impact Assessment |
|
|
316 | (2) |
|
|
|
318 | (3) |
|
|
|
321 | (2) |
|
|
|
323 | (1) |
|
Assessment Characteristics |
|
|
323 | (2) |
|
|
|
325 | (1) |
|
Prior Consultation and Risk |
|
|
326 | (1) |
|
|
|
327 | (2) |
| Chapter 31 Data Protection By Design |
|
329 | (8) |
|
|
|
329 | (1) |
|
|
|
329 | (1) |
|
Principles of Data Protection by Design |
|
|
330 | (1) |
|
Legal Rule: Data Protection by Design |
|
|
331 | (2) |
|
|
|
333 | (4) |
| Chapter 32 Data Protection As Default |
|
337 | (4) |
|
|
|
337 | (1) |
|
|
|
337 | (1) |
|
|
|
337 | (2) |
|
|
|
339 | (1) |
|
|
|
339 | (2) |
| Chapter 33 Cross-Border Transfers Of Data |
|
341 | (30) |
|
|
|
341 | (1) |
|
|
|
342 | (7) |
|
|
|
342 | (1) |
|
Transfer Agreements and Mechanisms |
|
|
343 | (6) |
|
|
|
349 | (1) |
|
Permitting Transfers via Adequacy Decision |
|
|
350 | (2) |
|
Adequate Protection Exception |
|
|
352 | (1) |
|
Transfers via Appropriate Safeguards |
|
|
353 | (1) |
|
Creating Adequacy through Consent, Contract |
|
|
354 | (1) |
|
Transfers via Binding Corporate Rules (BCRs) |
|
|
355 | (4) |
|
Transfers or Disclosures Not Authorized by EU Law |
|
|
359 | (1) |
|
Transfers via Derogations for Specific Situations |
|
|
359 | (2) |
|
|
|
361 | (1) |
|
|
|
362 | (1) |
|
Establishing Whether the Ban Applies |
|
|
363 | (2) |
|
Schrems, EU-US Safe Harbor, and EU-US Privacy Shield |
|
|
365 | (3) |
|
|
|
368 | (3) |
| Chapter 34 Right To Be Informed Of Third-Country Safeguards |
|
371 | (4) |
|
|
|
371 | (1) |
|
|
|
371 | (2) |
|
|
|
373 | (1) |
|
|
|
374 | (1) |
| Chapter 35 Transparency |
|
375 | (10) |
|
|
|
375 | (1) |
|
|
|
375 | (5) |
|
|
|
380 | (3) |
|
|
|
383 | (2) |
| Chapter 36 Health Data |
|
385 | (8) |
|
|
|
385 | (1) |
|
Health-Related Definitions |
|
|
385 | (2) |
|
|
|
385 | (1) |
|
|
|
386 | (1) |
|
|
|
386 | (1) |
|
|
|
386 | (1) |
|
|
|
387 | (1) |
|
|
|
387 | (1) |
|
|
|
388 | (1) |
|
Right to Be Forgotten Exception |
|
|
389 | (1) |
|
|
|
390 | (3) |
| Chapter 37 EPrivacy |
|
393 | (20) |
|
|
|
393 | (1) |
|
|
|
394 | (2) |
|
|
|
396 | (1) |
|
|
|
396 | (4) |
|
|
|
397 | (1) |
|
|
|
398 | (1) |
|
|
|
399 | (1) |
|
|
|
399 | (1) |
|
|
|
399 | (1) |
|
|
|
400 | (1) |
|
|
|
400 | (1) |
|
Unsolicited Communications, Direct Marketing, and Spam |
|
|
400 | (6) |
|
|
|
402 | (1) |
|
|
|
402 | (1) |
|
Unsolicited Communications |
|
|
402 | (1) |
|
Marketing Default Position |
|
|
403 | (1) |
|
Limited Direct Marketing Permitted |
|
|
404 | (1) |
|
Direct Marketing to Existing Customers' Email |
|
|
404 | (1) |
|
National Marketing Opt-Out Registers |
|
|
405 | (1) |
|
Deceptive Emails: Marketing Emails Must Not Conceal Identity |
|
|
405 | (1) |
|
Marketing Emails Must Provide Opt-Out |
|
|
405 | (1) |
|
Marketing Protection for Organizations |
|
|
406 | (1) |
|
ePrivacy Regulation Proposal |
|
|
406 | (1) |
|
|
|
407 | (6) |
| Chapter 38 Courts |
|
413 | (16) |
|
|
|
413 | (1) |
|
|
|
414 | (2) |
|
|
|
416 | (3) |
|
New GDPR Remedies, Legal Rules, Damage, and Compensation |
|
|
419 | (1) |
|
Right to Effective Judicial Remedy against Controller or Processor |
|
|
420 | (1) |
|
Right to Compensation and Liability |
|
|
420 | (2) |
|
Right to Lodge Complaint with Data Protection Supervisory Authority |
|
|
422 | (1) |
|
Right to an Effective Judicial Remedy against a Data Protection Supervisory Authority |
|
|
422 | (1) |
|
Representation of Data Subjects |
|
|
423 | (1) |
|
Organizational Privacy Groups |
|
|
424 | (1) |
|
Background Guidance on Representative Data Subject Organizations |
|
|
424 | (1) |
|
|
|
425 | (3) |
|
Controller or Processor in EU |
|
|
425 | (1) |
|
Controller or Processor Not in EU |
|
|
425 | (1) |
|
|
|
426 | (1) |
|
Jurisdiction, Main Establishment, Groups |
|
|
426 | (2) |
|
Investigation and Evidence |
|
|
428 | (1) |
|
|
|
428 | (1) |
| Chapter 39 Some Specific Issues In GDPR |
|
429 | (12) |
|
|
|
429 | (1) |
|
Specific Data Processing Situations |
|
|
429 | (1) |
|
|
|
430 | (1) |
|
Processing National Identification Numbers |
|
|
431 | (1) |
|
|
|
431 | (1) |
|
Processing and Freedom of Expression and Information |
|
|
431 | (1) |
|
Safeguards and Derogations: Public Interest Archiving/Scientific or Historical Research/Statistical Processing |
|
|
432 | (4) |
|
|
|
432 | (3) |
|
|
|
435 | (1) |
|
|
|
436 | (1) |
|
Churches and Religious Associations |
|
|
437 | (1) |
|
|
|
437 | (1) |
|
General Registration/Notification Requirement Removed |
|
|
437 | (1) |
|
|
|
438 | (3) |
| Chapter 40 Data Protection Supervisory Authorities |
|
441 | (16) |
|
|
|
441 | (1) |
|
Data Protection Supervisory Authorities |
|
|
441 | (1) |
|
|
|
442 | (2) |
|
|
|
444 | (1) |
|
|
|
445 | (1) |
|
Authorization and Advisory Powers |
|
|
446 | (1) |
|
|
|
447 | (2) |
|
Cooperation with National Data Protection Supervisory Authorities |
|
|
449 | (1) |
|
Enforcement Powers of Data Protection Supervisory Authority |
|
|
449 | (1) |
|
Investigations by National Data Protection Supervisory Authorities |
|
|
449 | (1) |
|
Power to Obtain Information |
|
|
450 | (1) |
|
Power to Enforce Compliance with the Data Protection Laws |
|
|
450 | (1) |
|
Power to Prohibit Overseas Transfer of Personal Data |
|
|
450 | (1) |
|
Powers of Authorized Officers to Enter and Examine |
|
|
451 | (1) |
|
|
|
451 | (1) |
|
Notifying Data Breach to Data Protection Supervisory Authority |
|
|
452 | (1) |
|
European Data Protection Board |
|
|
452 | (1) |
|
|
|
452 | (1) |
|
|
|
453 | (1) |
|
|
|
453 | (4) |
| Chapter 41 The Data Protection Officer |
|
457 | (10) |
|
|
|
457 | (1) |
|
New Data Protection Officers |
|
|
457 | (2) |
|
|
|
459 | (1) |
|
|
|
459 | (2) |
|
Group Data Protection Officer |
|
|
461 | (1) |
|
Qualifications and Expertise |
|
|
461 | (1) |
|
|
|
461 | (1) |
|
|
|
462 | (1) |
|
|
|
462 | (1) |
|
Independent in Role and Tasks |
|
|
462 | (1) |
|
|
|
462 | (1) |
|
Data Protection by Design and Data Protection by Default |
|
|
463 | (1) |
|
|
|
464 | (3) |
| Appendix I: The Sources Of Data Protection Law |
|
467 | (20) |
| Appendix II: How To Comply With The Data Protection Regime |
|
487 | (4) |
| Appendix III: General Data Protection Regulation Sections |
|
491 | (8) |
| Index |
|
499 | |