Data protection the fight against terrorism eu external relations
1 / 39

- PowerPoint PPT Presentation

  • Uploaded on

Data protection, the fight against terrorism & EU external relations. Data protection, the fight against terrorism & EU external relations Paul De Hert (Tilburg & Brussels) Brussels, 7 November 2007. Table of content. What is data protection? Why was is necessary?

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

PowerPoint Slideshow about '' - romney

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Data protection the fight against terrorism eu external relations l.jpg
Data protection, the fight against terrorism & EU external relations

Data protection, the fight against terrorism & EU external relations

Paul De Hert (Tilburg & Brussels) Brussels, 7 November 2007

Table of content l.jpg
Table of content relations

  • What is data protection?

  • Why was is necessary?

  • Beginnings of Data Protection

  • Development of International Data Protection

  • Data Protection under the Third Pillar

  • External relations under First Pillar

  • External relations under Third Pillar

Preliminary remark l.jpg
Preliminary remark relations

  • I relied for some of the conclusions on the insights gained after having listened to Diana Alonso Blas, LL.M., Data Protection Officer,Eurojust, First Pillar and Third Pillar: Need for a common approach? International Conference “Reinventing Data Protection”, 12 and 13 October 2007, Brussels

This is data protection l.jpg
This is data protection relations

  • Everyone has the right to the protection of personal data concerning him or her.

  • Such data must be processed fairly for specified purposes and on the basis of the consent of the person concerned or some other legitimate basis laid down by law. Everyone has the right of access to data that has been collected concerning him or her, and the right to have it rectified. Compliance with these rules shall be subject to control by an independent authority.

    = Article 8 of the EU Fundamental rights Charter

Why data protection l.jpg
Why data protection? relations

  • Article 8 ECHR does not apply to the private sector.

  • The right to a private life would not necessarily include all personal data, and so there was the question of whether a large proportion of data would be sufficiently safeguarded.

  • The right of access to data on oneself was not covered by the concept of the right to privacy as expressed in Article 8

Beginnings of data protection l.jpg
Beginnings of data protection relations

  • 1960s: USA, two major reasons:

    1.) Technical progress based on the development of computers

    2.) Socio-political reason, raising fear of governmental surveillance “Big brother”

  • Similar development in Europe

  • 1970 – 1981

    • 1970: First law on data protection was enacted by the German Federal State of Hessen (07.10.1970).

    • Sweden (1973), Germany (1976), France (1978), Denmark (1978), Norway (1978), Austria (1978) and Luxembourg (1979) introduced national legislation on data protection

    • No role model as basis but had to be innovative in their own right

Beginnings of data protection continuation l.jpg
Beginnings of data protection (continuation) relations

  • 1981 Council of Europe:

    Convention for the Protection of Individuals with regard to automatic processing of personal data (entry into force 1985)

    • First internationally binding instrument on data protection, important point of orientation for the subsequent national data protection laws

  • In the following years, data protection legislation was enacted by

    • Finland (1987), The Netherlands (1988), Portugal (1991), Spain (1992), Belgium (1992), Italy and Greece

European data protection general l.jpg
European Data Protection (general) relations

  • Convention no. 108, January 28, 1981

  • Directive 95/46/EC of 24 October 1995

  • Directive 97/66/EC and 2002/58/EC

  • Regulation (EC) No 45/2001 processing by Community institutions of 18 December 2000

  • Charter of Fundamental Rights of 7 December 2000 of the European Union,

  • Treaty establishing a Constitution for Europe (2002)

    • Right to data protection (Art. I-51)

International data protection general l.jpg
International Data Protection (general) relations

  • From 1948 privacy rights in various national and regional human rights bills

  • From 1970 on data protection laws at national level

  • 1980 OECD: Guidelines on the Protection of Privacy and Transborder Flows of Personal Data

    • Non-binding, orientation

  • 1990 UN: Guidelines concerning computerized personal data.

    • Guidelines for orientation, procedure left to the initiative of each state

Scope of european data protection re jha l.jpg
Scope of European data protection re JHA relations

  • 1995 Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data

    • First and major First Pillar instrument regulating the processing of personal data

    • Not applicable to the processing of data in the course of an activity which falls outside the scope of Community law (Art. 3 (2) => Second and Third Pillar

    • applied by some MS, in some respects, to law enforcement as well

    • ECJ view (PNR judgment 30-05-2006)

End of the world l.jpg
End of the world? relations

  • Article 8 ECHR applies to processing by all public authorities, incl JHA

  • Council of Europe Convention 108 (1981), ratified presently by 38 countries and signed by another 5 also applies to JHA

  • Article 3 Convention 108: The Parties undertake to apply this convention to automated personal data files and automatic processing of personal data in the public and private sectors.

But is convention 108 enough l.jpg
But, is Convention 108 enough? relations

  • Convention 108 is quite general: it contains principles, not detailed regulation

  • 1987 Council of Europe: Recommendation No. R (87) 15 regulating the use of personal data in the police sector

    • Non-binding, orientation, very old and no willingness to renew them

  • For 1st pillar the EU built on Convention to go further in Directive 95/45/EC

  • Recital (11) of preamble: Whereas the principles of the protection of the rights and freedoms of individuals, notably the right to privacy, which are contained in this Directive, give substance to and amplify those contained in the Council of Europe Convention of 28 January 1981 for the Protection of Individuals with regard to Automatic Processing of Personal Data;

First jha option specific data protection rules l.jpg
First JHA option: specific data protection rules relations

  • 1985 Schengen Agreement and 1990 Convention implementing the Schengen Agreement of 14 June 1985

    • Referring to the principles laid down in the 1981 Convention and 1987 Recommendation and solid data protection framework

  • Council Act of 26 July 1995 drawing up the Convention on the establishment of a European Police Office (Europol Convention. The Europol Convention was ratified by all Member States and came into force on 1 October 1998.

    • Referring to the principles laid down in the 1981 Convention and 1987 Recommendation and solid data protection framework

  • Convention established by the Council in accordance with Article 34 of the Treaty on European Union, on Mutual Assistance in Criminal Matters between the Member States of the European Union, OJ C 197, 12.07.200: general context of judicial cooperation and some data protection (infra)

Option 1 continuation l.jpg
Option 1 (continuation) relations

  • Council Decision of 28 February 2002 setting up Eurojust with a view to reinforcing the fight against serious crime. Rules of procedure on the processing and protection of personal data, adopted by Council on 24/2/2005 (containing main principles Directive but also very detailed rules, tailored made to Eurojust tasks and purposes)

    • Referring to the principles laid down in the 1981 Convention and 1987 Recommendation and solid data protection framework

  • May 2005: Treaty of Prüm (Schengen III Agreement )

    • Extended information exchange outside the EU framework

Strength of option 1 europol example l.jpg
Strength of option 1: Europol example relations

In Covention detailed rules on the use of data:

  • Clear understanding of intelligence risks to data protection lacking in Recommendation no (87) 15 by use of different information tools in particular distinction betweenn Europol Information System (IS), (Criminal Intelligence database) and the Analysis Work Files (AWF) (Analysis of operational data)

  • Mandate – restrictions & consultation

    • Ownership

    • National Law to be respected

  • Communication with third states and third bodies

  • Right of access limited in certain cases for non involved member states

  • Correction / deletion of data

  • Time-limits storage / deletion of data

  • Security

  • Control mechanisms: see next slide

Control mechanisms in europol l.jpg
Control mechanisms in Europol relations

  • Europol internal audit

  • National Supervisory Body (Art. 23 Convention)

    • Each MS - Designates an NSB

      • Monitors input independently

      • Personal data

  • Joint Supervisory Body (Art. 24 Convention)

    • Ensures individual rights are not violated by data stored at Europol

Risks of option 1 the prum example l.jpg
Risks of option 1: the Prum example relations

  • Signed in Prüm & Ratified by the national parliaments of the seven participating states - Germany, Spain, France, Luxembourg, Netherlands, Austria and Belgium and now extended to all EU MS

  • Not part of the Schengen treaty nor the Schengen acquis

  • Integration is planned to take place, at the latest, three years after the entry into force of the

  • Based on so-called "principle of availability" : the right of access to the databases/registers of the participating states and gives the requesting state the possibility to ask for more information/intelligence.

  • Data exchange (Article 1-16) see next slide

  • Sky marshals (Article 17-18)

  • Fighting illegal migration (Chapter 4)

  • Joint Interventions (Chapter 5)

Data exchange in pr m l.jpg
Data exchange in Prüm relations

  • DNA profiles All participating states have to set up DNA profile databanks and exchange dna profiles

  • Fingerprint data The treaty allows, where a specific person is identified, access to the finger-print databases of the participating states and the automatic comparison of fingerprints, not only for reasons of criminal prosecution but also for "prevention". Same hit system for additional information

  • Vehicle databases can be accessed for criminal prosecutions and for reasons of preventing dangers for public security and order, ie including supposed threats to public order . Online access will be carried out according to the law of the requesting state.

  • Political demonstrations and other mass events (Articles 13-15) For reasons of prosecution and prevention of offences and for the prevention of dangers to public security and order, personal and non personal data can be passed on - following a request or without request, ie. at the own initiative of a state.

  • Information exchange to prevent terrorist attacks (art. 16) Data and intelligence: names and further personal identity plus the reason will; be sent out across the network, with or without a prior request.

Institutional and data protection problems with pr m l.jpg
Institutional and Data protection problems with Prüm relations

  • OK: purposes are definied; competent authorities are defined; duty to see that data is correct and up to date;technical safeguards to guarantee secrecy; rights for the persons concerned

  • Not OK: making terrorism, organised crime and illegal immigrants one affair; broad categories: why?; creating more power by centralising data;

  • Certainly not OK: no supranational supervision: need for a FD data protection: Court of Justice, 31 January 2006 (c-503/03)

Reason 1 for other second jha option general data protection rules new needs for jha cooperation l.jpg
Reason 1 for other (second) JHA option: general data protection rules: new needs for JHA cooperation

  • Cooperation in police and judicial criminal matters increases and is gradually build on new concepts that challenge data protection

  • June 2004: Draft Framework Decision on simplifying the exchange of information and intelligence between law enforcement agencies of the member states of the EU, in particular as regards serious offences including terrorist acts (Swedish Initiative)

    • Setting time limits to answer requests of information

    • Removing discrimination between national and intra-EU exchange of data accessible by police in at least one Member State

New needs for jha cooperation continuation l.jpg
new needs for JHA cooperation (continuation) protection rules: new needs for JHA cooperation

  • January 2005: White Paper on exchanges of information on convictions and the effect of such convictions in the EU

    • Nov. 2005: Council Decision on the exchange of information extracted from the criminal record

    • Dec. 2005: Proposal for a Framework Decision on the organisation and content of the exchange of information extracted from criminal records between Member States

  • October 2005: Proposal for a Council Framework Decision on the exchange of information under the principle of availability

    • Information available to law enforcement authorities in one Member State be made accessible for equivalent authorities in other Member States

Reason 2 l.jpg
Reason 2 protection rules: new needs for JHA cooperation

  • Difficulties of determining whether the processing and transfering of personal data falls under the First or Third pillar, e.g.

    US demand for Passenger Name Records to private air companies

    Commission acts on basis of first pillar

    Commission: Regulation for transfer of passenger data by private airlines = rules for harmonisation of the Internal Market

    EP problem with privacy and problem with choice of pillar

  • ECJ 30 May 2006 Data transfer motivated by concerns of public safety and = Third Pillar Institutional consequences? Data protection consequences?

  • Council Decision 2007/551/CFSP/JHA. of 23 July 2007 on the signing, on behalf of the European Union, of an Agreement between the European Union and the United States of America on the processing and transfer of Passenger Name Record (PNR) data by air carriers to the United States Department of Homeland Security (DHS) (2007 PNR Agreement)

  • Swift?

A second jha option general data protection rules l.jpg
A second JHA option: general data protection rules protection rules: new needs for JHA cooperation

  • October 2005: Proposal for a Council Framework Decision on the protection of personal data processed in the framework of police and judicial cooperation in criminal matters

    • Clear gap in data protection regulation at EU Third Pillar level

    • Directive 95/46/EC is not applicable and

    • Neither the 95/46/EC Directive nor the 1981Convention take account of the specific characteristics of the exchange of data by police and judicial authorities

    • But data protection of fundamental significance

    • To redress this imbalance, the Commission adopted a complementary Proposal for a Council Framework Decision

    • Intends to provide a comprehensive protection scheme for personal data in the in the field of Justice and Home Affairs. It also supplements multilateral efforts like the Treaty of Prüm.

However many controversies l.jpg
However: many controversies protection rules: new needs for JHA cooperation

  • re the scope of the Framework Decision

  • security v privacy and its consequence for the data protection principles

  • limitations to the principle of availability within and outside the EU

  • Schengen JSA, Europol JSB, the Eurojust JSA and the CIS JSA

The march 2007 german presidency s proposal l.jpg
The March 2007 German Presidency’s Proposal protection rules: new needs for JHA cooperation

  • general rules on the lawfulness of processing of personal data, provisions concerning specific forms of processing, rights of the data subject, confidentiality and security of processing, judicial remedies, liability, sanctions, national supervisory authorities, and the transfer to third states.

  • exchange of data between Member States, thus excluding data processing at a domestic level

  • applies to Europol, Eurojust and the Third Pillar Customs Information System whereas authorities or other offices dealing specifically with matters of national security are explicitly excluded from its scope (Article 3 II),

Continuation l.jpg
continuation protection rules: new needs for JHA cooperation

  • Fusing of Schengen JSA, Europol JSB, CIS JSA into a single data protection supervisory authority, merging with it the advisory working party provided for in the earlier draft.

  • exchange of data with third states.

    FD is without prejudice to any obligations and commitments incumbent upon Member States or upon the European Union by virtue of bilateral and/or multilateral agreements with third States.

    personal data received from or made available by the competent authority of another Member State may be transferred to third States or international bodies only if the competent authority of the Member States which transmitted the data has given its consent to transfer in compliance with its national law.

Where are we now l.jpg
Where are we now? protection rules: new needs for JHA cooperation

  • Discussion on FD on DP in 3rd pillar shows little willingness of Member States to achieve a harmonised level of DP going further than CoE Convention.

  • In fact:

    • Text under discussion is “agreement of minimums” (lower common denominator), partly because of unanimity requirement

    • Scope reduced to cross-border exchange of personal data (and does not affect existing bilateral agreements…)

    • Many exceptions included and some important issues missing

    • Doubts as to whether the text is even compliant with Convention 108 and additional protocol (see also EDPS opinions + press release of 20/9/07)

    • Eurojust/Europol/Schengen DP rules go much further than proposed text (after several formal motivated requests, happily excluded from scope of application)

Diana alonso blas brussels l.jpg
Diana Alonso Blas (Brussels) protection rules: new needs for JHA cooperation

  • Convention 108 offers a basic common approach that needs to be fully respected

  • Any new instrument should respect CoE convention + basic principles Directive

  • Not in favour of detailed overall instrument covering all pillars, not even the whole third pillar. Specificities of police and judicial work need to be taken into account (need for very clear and specific tailored made rules for the diverse third pillar areas).

  • An overall instrument would have to be relatively general but, if it has to have any added-value, it should go further than CoE convention.

Future draft reform treaty l.jpg
Future: (Draft) Reform Treaty protection rules: new needs for JHA cooperation

  • End of pillar structure

  • But this does not imply automatic application of Directive to everything

  • Sectoral declaration on DP in police and judicial cooperation in criminal matters foreseen

Data protection external relations under first pillar l.jpg
Data protection & External relations under First Pillar protection rules: new needs for JHA cooperation

  • Member States shall provide that the transfer to a third country of personal data only if, the third country in question ensures an adequate level of protection” (Art. 25.1 Directive 95/46/EC) .

  • Article 25 also contains the procedure to determine whether there is an adequate regime.

  • Commission, not the Member States, has the last say in the procedure

Data protection external relations under third pillar l.jpg
Data protection & External relations under Third Pillar protection rules: new needs for JHA cooperation

  • Discussion: need to copy adequacy idea in JHA?

  • 2001 Additional Protocol to the 1981 Council of Europe Convention introduces principle re transfer of data across national borders: “Each Party shall provide for the transfer of personal data to a recipient that is subject to the jurisdiction of a State or organisation that is not Party to the Convention only if that State or organisation ensures an adequate level of protection for the intended data transfer” (Additional Protocol, Article 2.1).

How is it happening now l.jpg
How is it happening now? protection rules: new needs for JHA cooperation

This could be answered discussing the following examples

  • Eu 2000 Convention on Mutual Assistance in Criminal Matters

  • Europol

  • Pnr

  • Swift

Article 23 eu 2000 convention on mutual assistance in criminal matters l.jpg
Article 23 EU 2000 Convention on Mutual Assistance in Criminal Matters

  • first supranational rules establishing data protection requirements for the judiciary in their cross border activities – even though they are very flexible and have clearly not the purpose of limiting the work of the judiciary.

  • No requirement of adequacy

  • According to Article 23, personal data communicated under the Convention may be used by the Member State to which they have been transferred:

    (a) for the purpose of proceedings to which the Convention applies;

    (b) for other judicial and administrative proceedings directly related to them;

    (c) for preventing an immediate and serious threat to public security;

    (d) for any other purpose, only with the prior consent of the communicating Member State, unless the Member State concerned has obtained the consent of the data subject

Europol co operation with third parties l.jpg
Europol co-operation with third parties Criminal Matters

Types of agreements:

  • Operational agreement

    Includes the exchange of personal data

    (secure link in place)

  • Strategic / Technical agreement

    Does not allow exchange of personal data

Europol operational agreements l.jpg
Europol Operational Agreements Criminal Matters

Includes the exchange of personal data

  • Norway

  • Iceland

  • Switzerland

  • Bulgaria Romania

  • Croatia

  • Canada

  • USA Federal Bureau of Investigation (FBI) & United States Secret Service (USSS

  • Eurojust

  • Interpol

Europol strategic technical agreements l.jpg
Europol Strategic / Technical Agreements Criminal Matters

Does not allow exchange of personal data

  • European Commission (EC)

  • European Central Bank (ECB)

  • European Monitoring Centre for Drugs and Drug Addiction

  • European Anti-Fraud Office (OLAF)

  • United Nations Office on Drugs and Crime (UNODC)

  • World Customs Organisation (WCO)

  • Colombia

  • Russia

  • Turkey

External relation in the fd data protection l.jpg
External relation in the FD data protection? Criminal Matters

  • Commission October 2005 proposal sets up system similar to Directive 95/45

  • German Presidency Draft march 2007: nothing!

  • Preamble “personal data are transferred from a Member State of the European Union to third countries or international bodies, these data should, in principle, benefit from an adequate level of protection”

Conclusion l.jpg
Conclusion Criminal Matters

  • Pros and Contras option 1 or 2 re data protection are hard to assess, But:

  • Whereas a European approach, based on the adequacy principle, is followed in the First Pillar, this is not the case for the Third Pillar. Though there may be arguments against such a European approach in the area of JHA my examples, including the Europol, PNR and Swift cases, learn that the absence of such a European approach can cause problems.

  • Without ignoring the benefits and arguments in favour of tailor-made regulations, I conclude that the example of Europol dealing with third countries, and of PNR and Swift, in part illustrated the lack of credibility of the current EU data protection system. Having to deal with externalities such as powerful third countries (in particular the U.S.) that do not always consult the EU officials when collecting ‘European’ data or data in (some) EU Member States, it would be beneficial to develop a general framework for data protection in the Third Pillar and for transfers of data to Third Parties with clear rules and responsibilities and a well-defined role for the EU institutions that live up to the European dimension behind cases such as PNR and Swift. Contrary to Blas, I agree with Poullet that a uniform set of data protection standards applicable to all pillars would be desirable