-
1
-
-
0003187764
-
-
Directive 95/46/EC on the protection of individuals with regards to the processing of personal data and on the free movement of such data 23 November
-
Directive 95/46/EC on the protection of individuals with regards to the processing of personal data and on the free movement of such data, Official Journal of the European Union, no L 281, 23 November 1995, 31-50. Hereafter also referred to as Directive 95/46/EC or simply the Directive.
-
(1995)
Official Journal of the European Union, No L 281
, pp. 31-50
-
-
-
2
-
-
77952689368
-
Social networks and web 2.0: Are users also bound by data protection regulations?
-
last accessed 24 November 2010
-
B. Van Alsenoy, J. Ballet, A. Kuczerawy and J. Dumortier, Social networks and web 2.0: are users also bound by data protection regulations?, Identity in the information society 2009, Vol. 2, no1, 68 (available at http://www. springerlink.com/content/u11161037506t68n/fulltext.pdf, last accessed 24 November 2010).
-
Identity in the Information Society 2009
, vol.2
, Issue.1
, pp. 68
-
-
Van Alsenoy, B.1
Ballet, J.2
Kuczerawy, A.3
Dumortier, J.4
-
3
-
-
84856479374
-
-
Trusted Architecture for Securely Shared Services (TAS3), second iteration, December last accessed 1 August 2011
-
See also J. Alhadeff and B. Van Alsenoy (eds.), D6.2 Contractual framework, Trusted Architecture for Securely Shared Services (TAS3), second iteration, December 2009, 31, available at http://vds1628.sivit.org/tas3/ content/deliverables/TAS3-D6p2-v2-TContractual-Framework.pdf (last accessed 1 August 2011).
-
(2009)
D6.2 Contractual Framework
, pp. 31
-
-
Alhadeff, J.1
Van Alsenoy, B.2
-
4
-
-
40049090115
-
-
second edition, Oxford University Press, New York
-
C. Kuner, European Data Protection Law e Corporate Compliance and Regulation, second edition, Oxford University Press, NewYork, 2007, 71-72.
-
(2007)
European Data Protection Law e Corporate Compliance and Regulation
, pp. 71-72
-
-
Kuner, C.1
-
5
-
-
84856455242
-
Data processor and Data controllers Are these concepts still adequate?
-
Brussels, 12-13 October (last accessed 20 Augustus 2010)
-
See also Th. Leonard, Data processor and Data controllers Are these concepts still adequate?, presentation held at the conference: Reinventing data protection, Brussels, 12-13 October 2007, available at http://www. cpdpconferences.org/Resources/Leonard.pdf (last accessed 20 Augustus 2010)
-
(2007)
Conference: Reinventing Data Protection
-
-
Leonard, Th.1
-
7
-
-
84856444898
-
-
C. Kuner, o.c., 72
-
C. Kuner, o.c., 72.
-
-
-
-
9
-
-
84886630192
-
-
Article 29 Data Protection Working Party WP169, 16 February
-
Article 29 Data Protection Working Party, Opinion 1/2010 on the concepts of "controller" and "processor", WP169, 16 February 2010, available at http://ec.europa.eu/justice/policies/privacy/docs/wpdocs/2010/ wp169-en.pdf. Hereafter referred to as "Opinion 1/2010". The Working Party had been called upon to deal with the question of legal control several times in the past, but the guidance provided in these opinions was often closely tied to the specific issues at hand.
-
(2010)
Opinion 1/2010 on the Concepts of "controller" and "processor"
-
-
-
10
-
-
79957532246
-
-
WP68, 29 January
-
See e.g. Working Document on online authentication services, WP68, 29 January 2003 (available at http://ec.europa.eu/justice/policies/privacy/docs/ wpdocs/2003/wp68-en.pdf);
-
(2003)
Working Document on Online Authentication Services
-
-
-
13
-
-
77952679163
-
-
WP163, 12 June The cited urls were last accessed on 20 November 2010
-
Opinion 5/2009 on online social networking, WP163, 12 June 2009 (available at http://ec.europa.eu/justice/policies/privacy/docs/wpdocs/2009/ wp163-en.pdf). The cited urls were last accessed on 20 November 2010.
-
(2009)
Opinion 5/2009 on Online Social Networking
-
-
-
15
-
-
84856463650
-
Privacy Invasive Geo-Mashups: Privacy 2.0 and the Limits of First Generation Information Privacy Laws
-
M. Burdon, Privacy Invasive Geo-Mashups: Privacy 2.0 and the Limits of First Generation Information Privacy Laws University of Illinois Journal of Law, Technology and Policy 2010, vol. 1, 1-50 In other words, this paper only focuses on the controller-processor dichotomy, not on the controller-data subject dichotomy, which has been subject to its own set of criticisms.
-
(2010)
University of Illinois Journal of Law, Technology and Policy
, vol.1
, pp. 1-50
-
-
Burdon, M.1
-
16
-
-
79551523323
-
Data protection: The future of privacy
-
See e.g. R. Wong, Data protection: The future of privacy, Computer Law & Security Review 2011, Volume 27, Issue 1, 57;
-
(2011)
Computer Law & Security Review
, vol.27
, Issue.1
, pp. 57
-
-
Wong, R.1
-
17
-
-
77957955266
-
Privacy and social networks
-
P. Van Eecke and M. Truyens, Privacy and social networks, Computer, Law & Security Review 2010, Vol. 26, no 5, 538-539.
-
(2010)
Computer, Law & Security Review
, vol.26
, Issue.5
, pp. 538-539
-
-
Van Eecke, P.1
Truyens, M.2
-
19
-
-
34147170728
-
Privacy, data protection and law enforcement. Opacity of the individual and transparency of power
-
E. Claes, A. Duff and S. Gutwirth (eds.) Antwerpen/Oxford, Intersentia
-
P. De Hert and S. Gutwirth, Privacy, data protection and law enforcement. Opacity of the individual and transparency of power, in E. Claes, A. Duff and S. Gutwirth (eds.), Privacy and the Criminal Law, Antwerpen/Oxford, Intersentia, 2006, 76.
-
(2006)
Privacy and the Criminal Law
, pp. 76
-
-
De Hert, P.1
Gutwirth, S.2
-
20
-
-
84555200048
-
Data Protection and the Case Law of Strasbourg and Luxemburg: Constitutionalism in Action
-
S. Gutwirth, Y. Poullet, P. De Hert, J. Nouwt and C. De Terwangne (eds.) Springer Science, Dordrecht (highlighting that data protection and privacy are by no means interchangeable)
-
P. De Hert and S. Gutwirth, Data Protection and the Case Law of Strasbourg and Luxemburg: Constitutionalism in Action, in S. Gutwirth, Y. Poullet, P. De Hert, J. Nouwt and C. De Terwangne (eds.), Reinventing data protection?, Springer Science, Dordrecht, 2009, 9 (highlighting that data protection and privacy are by no means interchangeable).
-
(2009)
Reinventing Data Protection?
, pp. 9
-
-
De Hert, P.1
Gutwirth, S.2
-
24
-
-
0003187764
-
-
Directive 95/46/EC on the protection of individuals with regards to the processing of personal data and on the free movement of such data 23 November Hereafter also referred to as Directive 95/46/EC or simply the Directive
-
Directive 95/46/EC on the protection of individuals with regards to the processing of personal data and on the free movement of such data, Official Journal of the European Union, no L 281, 23 November 1995, 31-50. Hereafter also referred to as Directive 95/46/EC or simply the Directive.
-
(1995)
Official Journal of the European Union
, vol.L281
, pp. 31-50
-
-
-
26
-
-
77955488580
-
The Law of Unintended Consequences - Embedded Business Models in IT Regulation
-
paragraph 33 (last accessed 4 December 2010)
-
C. Reed, The Law of Unintended Consequences - Embedded Business Models in IT Regulation, Journal of Information Law and Technology, 2007, vol. 2, paragraph 33, available at http://www2.warwick.ac.uk/fac/soc/law/elj/jilt/2007- 2/reed/reed.pdf (last accessed 4 December 2010).
-
(2007)
Journal of Information Law and Technology
, vol.2
-
-
Reed, C.1
-
27
-
-
84856463650
-
Privacy Invasive Geo-Mashups: Privacy 2.0 and the Limits of First Generation Information Privacy Laws
-
M. Burdon, Privacy Invasive Geo-Mashups: Privacy 2.0 and the Limits of First Generation Information Privacy Laws, University of Illinois Journal of Law, Technology and Policy 2010, 31.
-
(2010)
University of Illinois Journal of Law, Technology and Policy
, pp. 31
-
-
Burdon, M.1
-
29
-
-
4243620095
-
Generational Development of Data Protection in Europe
-
P.E. Agre and M. Rotenberg (eds.) The MIT Press, Cambridge, Massachusetts
-
See also V. Mayer-Schönberger, Generational Development of Data Protection in Europe, in P.E. Agre and M. Rotenberg (eds.), Technology and Privacy: The New Landscape, 1998, The MIT Press, Cambridge, Massachusetts, 221-224.
-
(1998)
Technology and Privacy: The New Landscape
, pp. 221-224
-
-
Mayer-Schönberger, V.1
-
30
-
-
84856414178
-
-
l.c. in particular
-
This situation is seemingly reflected in the Explanatory for compliance with the Directives substantive provisions is Memorandum to Convention 108. See in particular paragraph 30, concerning the definition of an automated data file: The definition covers not only data files consisting of compact sets of data, but also sets of data which are geographically distributed and are brought together via computer links for purposes of processing.) In a sense, we still live in an era of (virtualized) mainframe computing; as evidenced by processing models such as grid and cloud computing. However, it is also clear that, congruent with Moores law, the processing capabilities of individual electronic devices are much more powerful than they were at the time these instruments were adopted. See also J. Zittrain, Privacy 2.0, l.c. in particular 72-91.
-
Privacy 2.0
, pp. 72-91
-
-
Zittrain, J.1
-
32
-
-
84856435288
-
The future of online privacy and data protection
-
DLA Piper, November (last accessed 3 June 2011)
-
P. Van Eecke, M. Truyens et al. (eds.), The future of online privacy and data protection, EU study on the Legal analysis of a Single Market for the Information Society - New rules for a new age?, DLA Piper, November 2009, 8 available at http://ec.europa.eu/information-society/newsroom/cf/itemlongdetail. cfm?item-id=7022(last accessed 3 June 2011).
-
(2009)
EU Study on the Legal Analysis of A Single Market for the Information Society - New Rules for A New Age?
, pp. 8
-
-
Van Eecke, P.1
Truyens, M.2
-
33
-
-
84856414177
-
-
Opinion 1/2010, l.c., 4
-
Opinion 1/2010, l.c., 4.
-
-
-
-
34
-
-
84856455244
-
Proposal for a Council Directive concerning the protection of individuals in relation to the processing of personal data
-
Commission of the European Communities Explanatory Memorandum
-
(referring to Commission of the European Communities, Proposal for a Council Directive concerning the protection of individuals in relation to the processing of personal data, SYN 287, Explanatory Memorandum, 40). The decision to incorporate a separate definition of processors was not included in the Commissions initial proposal, but was later introduced pursuant to an amendment proposed by the Committee on Legal Affairs and Citizens Rights (see Committee on Legal Affairs and Citizens Rights, Report concerning the proposal by the Commission to the Council for a Directive concerning the protection of individuals in relation to the processing of personal data, European Parliament Session Documents, A3-0010-92, 15 January 1992, 11, amendment nr. 18).
-
SYN
, vol.287
, pp. 40
-
-
-
35
-
-
84856444902
-
-
at paragraph 62 (last accessed 30 November 2010)
-
Although neither Convention 108 nor the OECD Guidelines formally defined the concept of a processor, it is worth observing that the Explanatory Memorandum to the OECD Guidelines did already stipulate that a data controller should not be relieved of its obligations merely because the processing of data is carried out on his behalf by another party, such as a service bureau (see the ExplanatoryMemorandumto theOECDGuidelines, at paragraph 62, available at http://www.oecd.org/document/18/0,3343,en-2649-34255-1815186-1-1-1-1,00. html#memorandum, (last accessed 30 November 2010).
-
ExplanatoryMemorandumto TheOECDGuidelines
-
-
-
36
-
-
85071033167
-
Privacy: The new generations
-
For an overview of the most significant changes since the enactment of the Directive see O. Tene, Privacy: The new generations, International Data Privacy Law 2011, Vol. 1, No. 1, 15-27.
-
(2011)
International Data Privacy Law
, vol.1
, Issue.1
, pp. 15-27
-
-
Tene, O.1
-
38
-
-
84856495972
-
-
Opinion 1/2010, l.c., 4
-
Opinion 1/2010, l.c., 4.
-
-
-
-
39
-
-
84856444903
-
-
Opinion 1/2010, l.c., 5
-
Opinion 1/2010, l.c., 5.
-
-
-
-
40
-
-
84856414179
-
-
Opinion 1/2010, l.c., 4
-
See also Opinion 1/2010, l.c., 4.
-
-
-
-
42
-
-
84979797994
-
Identity management and data protection law: Risk, responsibility and compliance in Circles of Trust - Part II
-
T. Olsen and T. Mahler, Identity management and data protection law: Risk, responsibility and compliance in Circles of Trust - Part II, Computer, Law & Security Review 2007, Vol. 23, no 5, 418.
-
(2007)
Computer, Law & Security Review
, vol.23
, Issue.5
, pp. 418
-
-
Olsen, T.1
Mahler, T.2
-
43
-
-
84856444904
-
-
Opinion 1/2010, l.c., 26
-
See also Opinion 1/2010, l.c., 26.
-
-
-
-
44
-
-
84856495973
-
-
Opinion 1/2010, l.c., 5
-
See Opinion 1/2010, l.c., 5.
-
-
-
-
45
-
-
84856455245
-
-
Article 29 Data Protection Working Party WP179, 16 December
-
For more information see Article 29 Data Protection Working Party, Opinion 8/2010 on applicable law, WP179, 16 December 2010.
-
(2010)
Opinion 8/2010 on Applicable Law
-
-
-
46
-
-
84856503552
-
-
l.c., 32 at note 162
-
See also infra; Section 3.3.2. The qualification of an actor as either a controller or processor may also have practical implications in the context of an international data transfer, when determining what type of EU model contract should be used. (P. Van Eecke, M. Truyens et al. (eds.), The future of online privacy and data protection, l.c., 32 at note 162).
-
The Future of Online Privacy and Data Protection
-
-
Van Eecke, P.1
Truyens, M.2
-
47
-
-
84856495975
-
-
Opinion 1/2010, l.c., 9
-
Opinion 1/2010, l.c., 9.
-
-
-
-
48
-
-
84856414180
-
-
D. Bainbridge, o.c., 45
-
See also D. Bainbridge, o.c., 45.
-
-
-
-
49
-
-
84856414182
-
-
Opinion 1/2010, l.c., 13
-
Opinion 1/2010, l.c., 13.
-
-
-
-
50
-
-
84856414181
-
-
l.c., 539. The tendency to emphasize the purpose over the means of the processing can also be found in earlier doctrine (see e.g. D. De Bot, Verwerking van persoonsgegevens, 2001, Antwerpen, Kluwer, 46)
-
See also P. Van Eecke and M. Truyens, Privacy and social networks, l.c., 539. The tendency to emphasize the purpose over the means of the processing can also be found in earlier doctrine (see e.g. D. De Bot, Verwerking van persoonsgegevens, 2001, Antwerpen, Kluwer, 46)
-
Privacy and Social Networks
-
-
Van Eecke, P.1
Truyens, M.2
-
51
-
-
84856415491
-
-
Office of the Information Commissioner Version 1, not dated, 16 (last accessed 26 November 2010)
-
and in guidance issued by regulatory authorities (see e.g. Office of the Information Commissioner, Data Protection Act, 1998 e Legal Guidance, Version 1, not dated, 16, available at http://www.ico.gov.uk/upload/documents/library/ data-protection/detailed-specialist-guides/data-protection-act-legal-guidance. pdf) (last accessed 26 November 2010).
-
Data Protection Act, 1998 e Legal Guidance
-
-
-
52
-
-
84917067993
-
The application of the purpose specification principle in the Belgian data protection act of 8 December 1992
-
Bainbridge has even raised the question as to whether it might have been better to identify the controller based on who determines the purposes alone (See Bainbridge, o.c., 128.). This tendency can in part be attributed to considerations of pragmatism (to accommodate the fact that entities that process personal data on behalf of other entities often substantially influence the means of the processing). A more compelling justification for this approach is the fact that the finality pursued by (a set of) processing operations fulfills a fundamental role in determining the scope of the controllers obligations, as well as when assessing the overall legitimacy and/or proportionality of the processing (see in particular article 6, 1 (b) through (e) and article 7 (b) through (f) of the Directive). For a comprehensive analysis of the fundamental role that the finality principle plays within data protection regulation see S. Gutwirth, De toepassing van het finaliteitsbeginsel van de Privacywet van 8 december 1992 tot bescherming van de persoonlijke levenssfeer ten opzichte van de verwerking van persoonsgegevens [The application of the purpose specification principle in the Belgian data protection act of 8 December 1992], Tijdschrift voor Privaatrecht 1993, vol. 4, p. 1409-1477.
-
(1993)
Tijdschrift voor Privaatrecht
, vol.4
, pp. 1409-1477
-
-
-
53
-
-
84856444905
-
-
Opinion 1/2010, l.c., 15
-
Opinion 1/2010, l.c., 15.
-
-
-
-
55
-
-
77957939701
-
-
l.c., 70
-
B. Van Alsenoy, J. Ballet, A. Kuczerawy and J. Dumortier, Social networks and web 2.0: are users also bound by data protection regulations?, l.c., 70.
-
Social Networks and Web 2.0: Are Users Also Bound by Data Protection Regulations?
-
-
Van Alsenoy, B.1
Ballet, J.2
Kuczerawy, A.3
Dumortier, J.4
-
56
-
-
84856444907
-
-
Opinion 1/2010, l.c., 26
-
See e.g. Opinion 1/2010, l.c., 26.
-
-
-
-
58
-
-
84856455249
-
-
Opinion 1/2010, l.c., 18
-
Opinion 1/2010, l.c., 18.
-
-
-
-
59
-
-
84856455246
-
-
Opinion 1/2010, l.c., 18
-
Opinion 1/2010, l.c., 18.
-
-
-
-
62
-
-
84856491016
-
Knowing the past to understand the present - Issues in the contracting for cloud based services
-
See also A. Joint and E. Baker, Knowing the past to understand the present - issues in the contracting for cloud based services, Computer Law & Security Review 2011, Vol. 24, Issue 4, 408.
-
(2011)
Computer Law & Security Review
, vol.24
, Issue.4
, pp. 408
-
-
Joint, A.1
Baker, E.2
-
63
-
-
84856444906
-
Principles of European Contract Law e Parts i and II
-
The Hague (Netherlands), 2000, 197 et seq. The full text of the Principles of European Contract Law (last accessed 28 November 2008)
-
See O. Lando and H. Beale (eds.), Principles of European Contract Law e Parts I and II, prepared by the Commission on European Contract Law, Kluwer Law International, The Hague (Netherlands), 2000, 197 et seq. The full text of the Principles of European Contract Law is also available at http://frontpage.cbs. dk/law/commission-on-european-contract-law/PECL%20engelsk/engelsk-partI-og-II. htm (last accessed 28 November 2008).
-
Commission on European Contract Law, Kluwer Law International
-
-
Lando, O.1
Beale, H.2
-
64
-
-
70249131163
-
Delegation and digital mandates: Legal requirements and security objectives
-
Even where the agent exceeds his authority, his actions might still be attributed to the principal under the theory of apparent authority. For more information see also B. Van Alsenoy, D. De Cock, K. Simoens, J. Dumortier and B. Preneel, Delegation and digital mandates: Legal requirements and security objectives, Computer, Law and Security Review 2009, Vol. 25, no 5, 415-420.
-
(2009)
Computer, Law and Security Review
, vol.25
, Issue.5
, pp. 415-420
-
-
Van Alsenoy, B.1
De Cock, D.2
Simoens, K.3
Dumortier, J.4
Preneel, B.5
-
65
-
-
84856455248
-
-
Opinion 1/2010, l.c., 25
-
Opinion 1/2010, l.c., 25.
-
-
-
-
66
-
-
84856414183
-
-
Opinion 1/2010, l.c., 25. See also supra; Section 3.2.1.2)
-
See Opinion 1/2010, l.c., 25. See also supra; Section 3.2.1.2).
-
-
-
-
67
-
-
84856455247
-
-
D. Bainbridge, o.c., 45-46
-
D. Bainbridge, o.c., 45-46
-
-
-
-
69
-
-
84856495976
-
-
Opinion 1/2010, l.c., 26. See also supra; Section 2
-
Opinion 1/2010, l.c., 26. See also supra; Section 2.
-
-
-
-
70
-
-
84856444908
-
-
C. Kuner, o.c., 70
-
See also C. Kuner, o.c., 70;
-
-
-
-
72
-
-
77957939701
-
-
l.c., 72
-
B. Van Alsenoy, J. Ballet, A. Kuczerawy and J. Dumortier, Social networks and web 2.0: are users also bound by data protection regulations?, l.c., 72.
-
Social Networks and Web 2.0: Are Users Also Bound by Data Protection Regulations?
-
-
Van Alsenoy, B.1
Ballet, J.2
Kuczerawy, A.3
Dumortier, J.4
-
73
-
-
84856414185
-
-
Opinion 1/2010, l.c., 25
-
Opinion 1/2010, l.c., 25.
-
-
-
-
74
-
-
84856455252
-
-
See articles 25-26 of the Directive. Article 26 (2) has provided the basis for the use of contractual clauses as a means to enable transfers to jurisdictions not providing an adequate level of protection. Pursuant to the powers conferred by article 26 (4), the Commission has developed standard contractual clauses for transfers to both data controllers and data processors established outside the EU/EEA. See http://ec.europa.eu/justice/policies/ privacy/modelcontracts/index-en.htm.
-
-
-
-
75
-
-
84856495978
-
Regulation of Transborder Data Flows under Data Protection and Privacy Law: Past, Present, and Future
-
(last accessed 1 August 2011)
-
For more information on the regulation of transborder data flows see C. Kuner, Regulation of Transborder Data Flows under Data Protection and Privacy Law: Past, Present, and Future, TILT (Tilburg Institute for Law, Technology and Society) Law & Technology Working Paper Series, 90p., available at http://www.tilburguniversity.edu/research/institutes-and-research-groups/tilt/ publications/workingpapers/ckuner16.pdf (last accessed 1 August 2011).
-
TILT (Tilburg Institute for Law, Technology and Society) Law & Technology Working Paper Series
, pp. 90
-
-
Kuner, C.1
-
76
-
-
84856414186
-
-
l.c., 419
-
Opinion 1/2010, l.c., 19. Olsen and Mahler have qualified such modes of collaboration as being one among collaborating single controllers. See T. Olsen and T. Mahler, Identity management and data protection law: Risk, responsibility and compliance in Circles of Trust - Part II, l.c., 419.
-
Identity Management and Data Protection Law: Risk, Responsibility and Compliance in Circles of Trust - Part II
-
-
Olsen, T.1
Mahler, T.2
-
77
-
-
84856495980
-
-
Opinion 1/2010, p. 18-19. See also supra; Section 3.2.1
-
See Opinion 1/2010, p. 18-19. See also supra; Section 3.2.1.
-
-
-
-
78
-
-
84856455251
-
-
Opinion 1/2010, l.c., 24
-
Opinion 1/2010, l.c., 24.
-
-
-
-
79
-
-
84856495979
-
-
Opinion 1/2010, l.c., 24
-
Opinion 1/2010, l.c., 24.
-
-
-
-
80
-
-
84856455250
-
-
C. Kuner, o.c., 72
-
See e.g. C. Kuner, o.c., 72;
-
-
-
-
82
-
-
78650345071
-
Review of the European Data Protection Directive
-
(last accessed 10 January 2011)
-
N. Robinson, H. Graux, M. Botterman, L. Valeri, Review of the European Data Protection Directive, RAND Europe, 2009, 36, available at http://www.ico.gov.uk/upload/documents/library/data-protection/ detailed-specialist-guides/review-of-eu-dp-directive.pdf (last accessed 10 January 2011);
-
(2009)
RAND Europe
, pp. 36
-
-
Robinson, N.1
Graux, H.2
Botterman, M.3
Valeri, L.4
-
83
-
-
84856495981
-
-
The European Privacy Officers Forum (EPOF) December (last accessed 1 August 2011)
-
The European Privacy Officers Forum (EPOF), Comments on the Review of European Data Protection Framework, December 2009, 1, available at http://ec.europa.eu/justice/news/consulting-public/0003/contributions/ organisations-not-registered/epof-en.pdf (last accessed 1 August 2011);
-
(2009)
Comments on the Review of European Data Protection Framework
, pp. 1
-
-
-
86
-
-
84856495977
-
-
Queen Mary University of London, School of Law, Legal Studies Research Paper No. 77/2011, in particular and 24
-
W. Kuan Hon, C. Millard and I. Walden, Who is Responsible for Personal Data in Cloud Computing? The Cloud of Unknowing, Part 2, Queen Mary University of London, School of Law, Legal Studies Research Paper No. 77/2011, in particular p. 10-11 and 24;
-
Who Is Responsible for Personal Data in Cloud Computing? the Cloud of Unknowing, Part 2
, pp. 10-11
-
-
Kuan Hon, W.1
Millard, C.2
Walden, I.3
-
88
-
-
84856464325
-
Cloud computing et protection des données àcaractère personnel: mise en ménage possible?
-
in particular p. 40 et seq
-
J.M. Van Gyseghem, Cloud computing et protection des données àcaractère personnel: mise en ménage possible?, Revue du Droit des Technologies de lInformation 2011, vol. 42, in particular p. 40 et seq.;
-
(2011)
Revue du Droit des Technologies de LInformation
, vol.42
-
-
Van Gyseghem, J.M.1
-
89
-
-
84856414184
-
-
Information Commissioners Office (ICO) A Communication from the European Commission to the European Parliament, the Council, the Economic and Social Committee and the Committee of the Regions on 4 November 2010, 14 January (last accessed 1 August 2011)
-
Information Commissioners Office (ICO), The Information Commissioners (United Kingdom) response to the European Commissions consultation on the legal framework for the fundamental right to protection of personal data in the European Union. A Communication from the European Commission to the European Parliament, the Council, the Economic and Social Committee and the Committee of the Regions on 4 November 2010, 14 January 2011, 9, available at http://www.ico.gov.uk/w/media/documents/library/Data-Protection/ Detailed-specialist-guides/european-commission-dp
-
(2011)
The Information Commissioners (United Kingdom) Response to the European Commissions Consultation on the Legal Framework for the Fundamental Right to Protection of Personal Data in the European Union
, pp. 9
-
-
-
91
-
-
84856495977
-
-
l.c., 24
-
W. Kuan Hon, C. Millard and I. Walden, Who is Responsible for Personal Data in Cloud Computing? The Cloud of Unknowing, Part 2, l.c., 24.
-
Who Is Responsible for Personal Data in Cloud Computing? the Cloud of Unknowing, Part 2
-
-
Kuan Hon, W.1
Millard, C.2
Walden, I.3
-
92
-
-
84856457281
-
-
C. Kuner, o.c., 72
-
See in particular C. Kuner, o.c., 72;
-
-
-
-
95
-
-
84856464324
-
-
l.c., 26
-
O. Tene, Privacy: The new generations, l.c., 26; Information Commissioners Office (ICO), The Information Commissioners (United Kingdom) response to the European Commissions consultation on the legal framework for the fundamental right to protection of personal data in the European Union, l.c., 9.
-
Privacy: The New Generations
-
-
Tene, O.1
-
96
-
-
84856486468
-
-
Opinion 1/2010, l.c., 6
-
Opinion 1/2010, l.c., 6.
-
-
-
-
98
-
-
84856414181
-
-
l.c., 538
-
P. Van Eecke and M. Truyens, Privacy and social networks, l.c., 538 (in relation to the role of users of social networks as data controllers within social networks). While the cited authors refer to the decision-making power of individual social network users, similar considerations apply in relation to the interaction among organisations.
-
Privacy and Social Networks
-
-
Van Eecke, P.1
Truyens, M.2
-
100
-
-
77957939701
-
-
l.c., 69
-
See also B. Van Alsenoy, J. Ballet, A. Kuczerawy and J. Dumortier, Social networks and web 2.0: are users also bound by data protection regulations?, l.c., 69.
-
Social Networks and Web 2.0: Are Users Also Bound by Data Protection Regulations?
-
-
Van Alsenoy, B.1
Ballet, J.2
Kuczerawy, A.3
Dumortier, J.4
-
102
-
-
84856503549
-
-
Opinion 1/2010, l.c., 19 and 22
-
See Opinion 1/2010, l.c., 19 and 22.
-
-
-
-
103
-
-
84856464326
-
-
Opinion 1/2010, l.c., in particular 13 and 25
-
Opinion 1/2010, l.c., in particular 13 and 25.
-
-
-
-
107
-
-
84856495971
-
-
l.c., 31-32
-
This is for instance the case for so-called integrated services, where the final service delivered to the end-user is the result of a complex value chain, which may involve any number of intermediary processing operations (e.g., authentication, authorization, discovery, retrieval, enrichment, etc.). See also J. Alhadeff and B. Van Alsenoy (eds.), D6.2 Contractual Framework, l.c., 31-32.
-
D6.2 Contractual Framework
-
-
Alhadeff, J.1
Van Alsenoy, B.2
-
108
-
-
84856486469
-
-
Article 29 Data Protection Working Party Ref.Ares(2011) 424406, 15 April last accessed 1 August 2011
-
For an example see also the recent report issued by the Biometrics & eGovernment Subgroup of the Working Party in relation to the STORK project (acknowledging that the subgroup was not able to come to a concordant conclusion as to whether or not a pan European proxy service (PEPS) should be considered as a (co-)controller or processor; despite the guidance provided by the Article 29 Working Party in Opinion 1/2010. (Article 29 Data Protection Working Party, Biometrics & eGovernment Subgroup, Written Report concerning the STORK Project, Ref.Ares(2011) 424406, 15 April 2011, 6-7, available at http://ec.europa.eu/justice/policies/privacy/docs/wpdocs/others/ 2011-04-15-letter-artwp-atos-origin-annex-en.pdf, last accessed 1 August 2011).
-
(2011)
Biometrics & EGovernment Subgroup, Written Report Concerning the STORK Project
, pp. 6-7
-
-
-
111
-
-
84856457285
-
-
C. Kuner, o.c., 70
-
C. Kuner, o.c., 70.
-
-
-
-
112
-
-
84856503553
-
-
Opinion 1/2010, l.c., 17-22
-
See Opinion 1/2010, l.c., 17-22.
-
-
-
-
115
-
-
84856495977
-
-
l.c., 10-11
-
This issue is also implicitly acknowledged by the Working Party itself in Opinion 1/2010, in relation to the choice of security measures: in some legal systems decisions taken on security measures are particularly important, since security measures are explicitly considered as an essential characteristic to be defined by the controller. This raises the issue of which decisions on security may entail the qualification of controller for a company to which processing has been outsourced. See also W. Kuan Hon, C. Millard and I. Walden, Who is Responsible for Personal Data in Cloud Computing? The Cloud of Unknowing, Part 2, l.c., 10-11.
-
Who Is Responsible for Personal Data in Cloud Computing? the Cloud of Unknowing, Part 2
-
-
Kuan Hon, W.1
Millard, C.2
Walden, I.3
-
116
-
-
84856414181
-
-
l.c., 539
-
See also P. Van Eecke and M. Truyens, Privacy and social networks, l.c., 539 (criticizing WP169 for reading the definition of a controller as an entity which determines the purpose or essential means of the processing).
-
Privacy and Social Networks
-
-
Van Eecke, P.1
Truyens, M.2
-
117
-
-
84856503551
-
-
European Court of Justice C-101/01, 6 November at paragraph 86
-
See also European Court of Justice, Göta hovrä tt (Sweden) v. Bodil Lindqvist, C-101/01, 6 November 2003, at paragraph 86: As regards Directive 95/46 itself, its provisions are necessarily relatively general since it has to be applied to a large number of very different situations.
-
(2003)
Göta Hovrä Tt (Sweden) V. Bodil Lindqvist
-
-
-
118
-
-
84856486472
-
-
C. Kuner, o.c., 72
-
See also C. Kuner, o.c., 72.
-
-
-
-
119
-
-
84856486471
-
-
Opinion 1/2010, l.c., 24
-
See also Opinion 1/2010, l.c., 24.
-
-
-
-
120
-
-
79953719223
-
-
Article 29 Data Protection Working Party WP171, 22 June (last accessed 12 December 2010)
-
Article 29 Data Protection Working Party, Opinion 2/2010 on online behavioural advertising, WP171, 22 June 2010, 11-12, available at http://ec.europa.eu/justice/policies/privacy/docs/wpdocs/2010/wp171-en.pdf (last accessed 12 December 2010). This excerpt concerns the practice whereby publishers, who rent out advertising spaces on their websites, may redirect users to the webpage of an ad network provider, thereby enabling a transfer of personal information (see also Opinion 1/2010, l.c., 23). Although Opinion 2/2010 makes clear that the obligation to inform may also stem from other legal provisions, the language of this opinion strongly suggests that the publisher may often be considered to act as a (joint) controller with regard to the redirection of the user to the webpage of the ad network provider (and the transfer of the users IP-address which takes place as a result of this re-direction).
-
(2010)
Opinion 2/2010 on Online Behavioural Advertising
, pp. 11-12
-
-
-
121
-
-
84856486475
-
-
European Court of Justice C-553/07, 7 May
-
Given the contractual flexibility that is afforded to joint controllers, an alternative resolution to this situation would be to say that the publisher should bind the ad network to accommodate those data subject rights which it cannot accommodate itself (but for which it is nevertheless legally responsible). At most, insofar as the publisher does not (and has never) maintain(ed) any records of these processing operations for which it is considered to act as a joint controller, the publisher could initially respond to an access request by explaining the manner in which the users data has been processed (i.e. in order to facilitate behavioural advertising), and by providing additional information as to the recipients to whom the data has been disclosed. However, the publisher would still need to ensure that it is in a position to obtain access to said data if it is explicitly requested by the data subject. Regarding the duration of time during which a controller must be able to respond to an access request by data subjects and the contents of this response see European Court of Justice, College van burgemeester en wethouders van Rotterdam v. M.E.E. Rijkeboer, C-553/07, 7 May 2009, available at http://curia.europa.eu/).
-
(2009)
College Van Burgemeester en Wethouders Van Rotterdam V. M.E.E. Rijkeboer
-
-
-
122
-
-
84856486474
-
Létendue dans le temps du droit daccès aux informations sur les destinataires de données àcaractère personnel
-
See also the case commentary provided by C. Deterwangne, Létendue dans le temps du droit daccès aux informations sur les destinataires de données àcaractère personnel, Revue du Droit des Technologies de lInformation 2011, vol. 43, 73-81.
-
(2011)
Revue du Droit des Technologies de LInformation
, vol.43
, pp. 73-81
-
-
Deterwangne, C.1
-
123
-
-
84856457287
-
-
Opinion 1/2010, l.c., 4
-
Opinion 1/2010, l.c., 4.
-
-
-
-
124
-
-
84856503555
-
-
Opinion 1/2010, l.c., 7. See also C. Kuner, o.c., 72
-
Opinion 1/2010, l.c., 7. See also C. Kuner, o.c., 72.
-
-
-
-
126
-
-
84856495977
-
-
l.c., 28
-
See W. Kuan Hon, C. Millard and I. Walden, Who is Responsible for Personal Data in Cloud Computing? The Cloud of Unknowing, Part 2, l.c., 28.
-
Who Is Responsible for Personal Data in Cloud Computing? the Cloud of Unknowing, Part 2
-
-
Kuan Hon, W.1
Millard, C.2
Walden, I.3
-
127
-
-
84856486476
-
-
Opinion 1/2010, l.c., 22
-
See Opinion 1/2010, l.c., 22.
-
-
-
-
129
-
-
84856495977
-
-
l.c., 28
-
See also W. Kuan Hon, C. Millard and I. Walden, Who is Responsible for Personal Data in Cloud Computing? The Cloud of Unknowing, Part 2, l.c., 28.
-
Who Is Responsible for Personal Data in Cloud Computing? the Cloud of Unknowing, Part 2
-
-
Kuan Hon, W.1
Millard, C.2
Walden, I.3
-
130
-
-
79960009988
-
-
Article 29 Data Protection Working Party WP 173, 13 July last accessed 8 February 2011
-
The principle of accountability has received considerable attention in recent policy discourses concerning the future regulation of data protection in the EU (see e.g. Article 29 Data Protection Working Party, Opinion 3/2010 on the principle of accountability, WP 173, 13 July 2010, 3, available at http://ec.europa.eu/justice/policies/privacy/docs/wpdocs/2010/wp173-en.pdf, last accessed 8 February 2011;
-
(2010)
Opinion 3/2010 on the Principle of Accountability
, pp. 3
-
-
-
131
-
-
79956108069
-
A comprehensive approach on personal data protection in the European Union
-
European Commission, Communication from the Commission to the European Parliament, the Council, the Economic and Social Committee and the Committee of the Regions November 2010, Brussels 609 final, 12 last accessed 8 February 2011
-
European Commission, Communication from the Commission to the European Parliament, the Council, the Economic and Social Committee and the Committee of the Regions, A comprehensive approach on personal data protection in the European Union, November 2010, Brussels, COM(2010) 609 final, 12, available at http://ec.europa.eu/justice/news/consulting-public/0006/com-2010-609-en.pdf, last accessed 8 February 2011).
-
(2010)
COM
-
-
-
132
-
-
0001696593
-
The Chameleon of Accountability: Forms and Discourses
-
Readers familiar with these discussions shall be aware that accountability is a relatively amorphous concept, which can mean different things to different people (see also A. Sinclair, The Chameleon of Accountability: Forms and Discourses, Accounting, Organizations and Society 1995, vol. 20, no 2/3, 219;
-
(1995)
Accounting, Organizations and Society
, vol.20
, Issue.2-3
, pp. 219
-
-
Sinclair, A.1
-
133
-
-
51249156329
-
Analysing and Assessing Accountability: A conceptual Framework
-
M. Bovens, Analysing and Assessing Accountability: A conceptual Framework, European Law Journal 2007, vol. 13, no. 4, 448).
-
(2007)
European Law Journal
, vol.13
, Issue.4
, pp. 448
-
-
Bovens, M.1
-
134
-
-
84856457290
-
The accountability principle in data protection regulation: Origin, development and future directions
-
paper presented at the
-
For more information on the different meanings associated with accountability, as well as the role that the accountability principle has played in various instruments of data protection over time see J. Alhadeff, B. Van Alsenoy and J. Dumortier, The accountability principle in data protection regulation: origin, development and future directions, paper presented at the Privacy and Accountability conference organized by the PATS project in Berlin, 5-6 April 2011 (proceedings pending), draft version available at http://papers.ssrn.com/sol3/papers.cfm?abstract-id=1933731.
-
Privacy and Accountability Conference Organized by the PATS Project in Berlin, 5-6 April 2011 (Proceedings Pending)
-
-
Alhadeff, J.1
Van Alsenoy, B.2
Dumortier, J.3
-
135
-
-
84856489250
-
-
Office of the Privacy Commissioner of Canada (last accessed 1 December 2010)
-
Office of the Privacy Commissioner of Canada, PIPEDA - Processing Personal Data Across Borders Guidelines, 2009, 8, available at http://www.priv.gc.ca/information/guide/2009/gl-dab-090127-e.pdf (last accessed 1 December 2010).
-
(2009)
PIPEDA - Processing Personal Data Across Borders Guidelines
, pp. 8
-
-
-
136
-
-
84856464328
-
-
l.c., 9
-
J. Alhadeff, B. Van Alsenoy and J. Dumortier, The accountability principle in data protection regulation: origin, development and future directions, l.c., 9.
-
The Accountability Principle in Data Protection Regulation: Origin, Development and Future Directions
-
-
Alhadeff, J.1
Van Alsenoy, B.2
Dumortier, J.3
-
137
-
-
84856463650
-
Privacy Invasive Geo-Mashups: Privacy 2.0 and the Limits of First Generation Information Privacy Laws
-
(in particular p. 32-35)
-
One should however note that the accountability chain-approach (which underlies both PIPEDA as well as Directive 95/46/EC) is also subject to criticism. See M. Burdon, Privacy Invasive Geo-Mashups: Privacy 2.0 and the Limits of First Generation Information Privacy Laws University of Illinois Journal of Law, Technology and Policy 2010, vol. 1, 1-50 (in particular p. 32-35)
-
(2010)
University of Illinois Journal of Law, Technology and Policy
, vol.1
, pp. 1-50
-
-
Burdon, M.1
-
138
-
-
84859184308
-
Contextualizing the tensions and weaknesses of information privacy and data breach notification laws
-
(in particular at p. 98, 103 and 118)
-
and M. Burdon, Contextualizing the tensions and weaknesses of information privacy and data breach notification laws, Santa Clara Computer & High Technology Law Review 2011, vol. 27, 63-129 (in particular at p. 98, 103 and 118).
-
(2011)
Santa Clara Computer & High Technology Law Review
, vol.27
, pp. 63-129
-
-
Burdon, M.1
-
139
-
-
84555200048
-
Data Protection and the Case Law of Strasbourg and Luxemburg: Constitutionalism in Action
-
S. Gutwirth, Y. Poullet, P. De Hert, J. Nouwt and C. De Terwangne (eds.) Springer Science, Dordrecht
-
While a detailed analysis into these criticisms is beyond the scope of this paper, it would seem that the main criticism set forth by this author pertains to the reductionist scope of information privacy law, which due to its overt focus on processes rather than substantive privacy issues fails to provide an appropriate regulatory response to many privacy concerns. (For an extensive analysis of the differences in scope, goals and type of protection by data protection regulation and the fundamental right to privacy respectively, see P. De Hert and S. Gutwirth, Data Protection and the Case Law of Strasbourg and Luxemburg: Constitutionalism in Action, in S. Gutwirth, Y. Poullet, P. De Hert, J. Nouwt and C. De Terwangne (eds.), Reinventing data protection?, Springer Science, Dordrecht, 2009, 3-44). The aim of this paper is not, as indicated in the introduction, to discuss the limits of data protection regulation as such. Rather, its objective is to evaluate the extent to which the current definitions of roles and responsibilities under Directive 95/46/EC (and the distinction between controllers and processors in particular) may still be considered useful and adequate in achieving the Directives core objectives.
-
(2009)
Reinventing Data Protection?
, pp. 3-44
-
-
De Hert, P.1
Gutwirth, S.2
|