This document is an excerpt from the EUR-Lex website
Document 32023D1795
Commission Implementing Decision EU 2023/1795 of 10 July 2023 pursuant to Regulation (EU) 2016/679 of the European Parliament and of the Council on the adequate level of protection of personal data under the EU-US Data Privacy Framework (notified under document C(2023)4745) (Text with EEA relevance)
Commission Implementing Decision EU 2023/1795 of 10 July 2023 pursuant to Regulation (EU) 2016/679 of the European Parliament and of the Council on the adequate level of protection of personal data under the EU-US Data Privacy Framework (notified under document C(2023)4745) (Text with EEA relevance)
Commission Implementing Decision EU 2023/1795 of 10 July 2023 pursuant to Regulation (EU) 2016/679 of the European Parliament and of the Council on the adequate level of protection of personal data under the EU-US Data Privacy Framework (notified under document C(2023)4745) (Text with EEA relevance)
C/2023/4745
OJ L 231, 20/09/2023, p. 118–229
(BG, ES, CS, DA, DE, ET, EL, EN, FR, GA, HR, IT, LV, LT, HU, MT, NL, PL, PT, RO, SK, SL, FI, SV)
In force
20.9.2023 |
EN |
Official Journal of the European Union |
L 231/118 |
COMMISSION IMPLEMENTING DECISION EU 2023/1795
of 10 July 2023
pursuant to Regulation (EU) 2016/679 of the European Parliament and of the Council on the adequate level of protection of personal data under the EU-US Data Privacy Framework
(notified under document C(2023)4745)
(Text with EEA relevance)
THE EUROPEAN COMMISSION,
Having regard to the Treaty on the Functioning of the European Union,
Having regard to Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation) (1), and in particular Article 45(3) thereof,
Whereas:
1. INTRODUCTION
(1) |
Regulation (EU) 2016/679 (2) sets out the rules for the transfer of personal data from controllers or processors in the Union to third countries and international organisations to the extent that such transfers fall within its scope of application. The rules on international data transfers are laid down in Chapter V of that Regulation. While the flow of personal data to and from countries outside the European Union is essential for the expansion of cross-border trade and international cooperation, the level of protection afforded to personal data in the Union must not be undermined by transfers to third countries or international organisations (3). |
(2) |
Pursuant to Article 45(3) of Regulation (EU) 2016/679, the Commission may decide, by means of an implementing act, that a third country, a territory or one or more specified sectors within a third country, ensure(s) an adequate level of protection. Under this condition, transfers of personal data to a third country may take place without the need to obtain any further authorisation, as provided for in Article 45(1) and recital 103 of Regulation (EU) 2016/679. |
(3) |
As specified in Article 45(2) of Regulation (EU) 2016/679, the adoption of an adequacy decision has to be based on a comprehensive analysis of the third country’s legal order, covering both the rules applicable to data importers and the limitations and safeguards as regards access to personal data by public authorities. In its assessment, the Commission has to determine whether the third country in question guarantees a level of protection ‘essentially equivalent’ to that ensured within the Union (recital 104 of Regulation (EU) 2016/679). Whether this is the case is to be assessed against Union legislation, notably Regulation (EU) 2016/679, as well as the case law of the Court of Justice of the European Union (the Court of Justice) (4). |
(4) |
As clarified by the Court of Justice in its judgment of 6 October 2015 in Case C-362/14, Maximillian Schrems v Data Protection Commissioner (5) (Schrems), this does not require finding an identical level of protection. In particular, the means to which the third country in question has recourse for protecting personal data may differ from the ones employed in the Union, as long as they prove, in practice, effective for ensuring an adequate level of protection (6). The adequacy standard therefore does not require a point-to-point replication of Union rules. Rather, the test is whether, through the substance of privacy rights and their effective implementation, supervision and enforcement, the foreign system as a whole delivers the required level of protection (7). Furthermore, according to that judgment, when applying this standard, the Commission should notably assess whether the legal framework of the third country in question provides rules intended to limit interferences with the fundamental rights of the persons whose data is transferred from the Union, which the State entities of that country would be authorised to engage in when they pursue legitimate objectives, such as national security, and provides effective legal protection against interferences of that kind (8). The ‘Adequacy Referential’ of the European Data Protection Board, which seeks to further clarify this standard, also provides guidance in this regard (9). |
(5) |
The applicable standard with respect to such interference with the fundamental rights to privacy and data protection was further clarified by the Court of Justice in its judgment of 16 July 2020 in Case C-311/18, Data Protection Commissioner v Facebook Ireland Limited and Maximillian Schrems (Schrems II), which invalidated Commission Implementing Decision (EU) 2016/1250 (10) on a previous transatlantic data flow framework, the EU-U.S. Privacy Shield (Privacy Shield). The Court of Justice considered that the limitations to the protection of personal data arising from U.S. domestic law on the access and use by U.S. public authorities of data transferred from the Union to the United States for national security purposes were not circumscribed in a way that satisfies requirements that are essentially equivalent to those under Union law, as regards the necessity and proportionality of such interferences with the right to data protection (11). The Court of Justice also considered that no cause of action was available before a body which offers the persons whose data was transferred to the United States guarantees essentially equivalent to those required by Article 47 of the Charter on the right to an effective remedy (12). |
(6) |
Following the Schrems II judgment, the Commission entered into talks with the U.S. government with a view to a possible new adequacy decision that would meet the requirements of Article 45(2) of Regulation (EU) 2016/679 as interpreted by the Court of Justice. As a result of these discussions, the United States on 7 October 2022 adopted Executive Order 14086 ‘Enhancing Safeguards for US Signals Intelligence Activities’ (EO 14086), which is complemented by a Regulation on the Data Protection Review Court issued by the U.S. Attorney General (AG Regulation) (13). In addition, the framework that applies to commercial entities processing data transferred from the Union under the present Decision – the ‘EU-U.S. Data Privacy Framework’ (EU-U.S. DPF or DPF) – has been updated. |
(7) |
The Commission has carefully analysed U.S. law and practice, including EO 14086 and the AG Regulation. Based on the findings set out in recitals 9-200, the Commission concludes that the United States ensures an adequate level of protection for personal data transferred under the EU-U.S. DPF from a controller or a processor in the Union (14) to certified organisations in the United States. |
(8) |
This Decision has the effect that personal data transfers from controllers and processors in the Union (15) to certified organisations in the United States may take place without the need to obtain any further authorisation. It does not affect the direct application of Regulation (EU) 2016/679 to such organisations where the conditions regarding the territorial scope of that Regulation, laid down in its Article 3, are fulfilled. |
2. THE EU-U.S. DATA PRIVACY FRAMEWORK
2.1. Personal and material scope
2.1.1. Certified organisations
(9) |
The EU-U.S. DPF is based on a system of certification by which U.S. organisations commit to a set of privacy principles - the ‘EU-U.S. Data Privacy Framework Principles’, including the Supplemental Principles (together: the Principles) - issued by the U.S. Department of Commerce (DoC) and contained in Annex I to this Decision (16). To be eligible for certification under the EU-U.S. DPF, an organisation must be subject to the investigatory and enforcement powers of the Federal Trade Commission (FTC) or the U.S. Department of Transportation (DoT) (17). The Principles apply immediately upon certification. As explained in more detail in recitals 48-52, EU-U.S. DPF organisations are required to re-certify their adherence to the Principles on an annual basis (18). |
2.1.2. Definition of personal data and concepts of controller and ‘agent’
(10) |
The protection afforded under the EU-U.S. DPF applies to any personal data transferred from the Union to organisations in the U.S. that have certified their adherence to the Principles with the DoC, with the exception of data that is collected for publication, broadcast or other forms of public communication of journalistic material and information in previously published material disseminated from media archives (19). Such information can therefore not be transferred on the basis of the EU-U.S. DPF. |
(11) |
The Principles define personal data/personal information in the same way as Regulation (EU) 2016/679, i.e. as “data about an identified or identifiable individual that are within the scope of the GDPR received by an organization in the United States from the EU, and recorded in any form” (20). Accordingly, they also cover pseudonymised (or “key-coded”) research data (including where the key is not shared with the receiving U.S. organisation) (21). Similarly, the notion of processing is defined as “any operation or set of operations which is performed upon personal data, whether or not by automated means, such as collection, recording, organisation, storage, adaptation or alteration, retrieval, consultation, use, disclosure or dissemination and erasure or destruction” (22). |
(12) |
The EU-U.S. DPF applies to organisations in the U.S. that qualify as controllers (i.e. as a person or organisation which, alone or jointly with others, determines the purposes and means of the processing of personal data) (23) or processors (i.e. agents acting on behalf of a controller) (24). U.S. processors must be contractually bound to act only on instructions from the EU controller and assist the latter in responding to individuals exercising their rights under the Principles (25). In addition, in the case of sub-processing, a processor must conclude a contract with the sub-processor guaranteeing the same level of protection as provided by the Principles and take steps to ensure its proper implementation (26). |
2.2. EU-U.S. Data Privacy Framework Principles
2.2.1. Purpose limitation and choice
(13) |
Personal data should be processed lawfully and fairly. It should be collected for a specific purpose and subsequently used only insofar as this is not incompatible with the purpose of processing. |
(14) |
Under the EU-U.S. DPF, this is ensured through different Principles. Firstly, under the Data Integrity and Purpose Limitation Principle, similarly as under Article 5(1)(b) of Regulation (EU) 2016/679, an organisation may not process personal data in a way that is incompatible with the purpose for which it was originally collected or subsequently authorised by the data subject (27). |
(15) |
Secondly, before using personal data for a new (changed) purpose that is materially different but still compatible with the original purpose, or disclosing it to a third party, the organisation must provide data subjects with the opportunity to object (opt-out), in accordance with the Choice Principle (28), through a clear, conspicuous and readily available mechanism. Importantly, this Principle does not supersede the express prohibition on incompatible processing (29). |
2.2.2. Processing of special categories of personal data
(16) |
Specific safeguards should exist where ‘special categories’ of data are processed. |
(17) |
In accordance with the Choice Principle, specific safeguards apply to the processing of ‘sensitive information’, i.e. personal data specifying medical or health conditions, racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, information on the sex life of the individual or any other information received from a third party that is identified and treated by that party as sensitive (30). This means that any data that is considered sensitive under Union data protection law (including data on sexual orientation, genetic data and biometric data) will be treated as sensitive under the EU-U.S. DPF by certified organisations. |
(18) |
As a general rule, organisations must obtain affirmative express consent (i.e. opt-in) from individuals to use sensitive information for purposes other than those for which it was originally collected or subsequently authorised by the individual (through opt-in), or to disclose it to third parties (31). |
(19) |
Such consent does not have to be obtained in limited circumstances similar to comparable exceptions provided under Union data protection law, e.g. where the processing of sensitive data is in the vital interest of a person; is necessary for the establishment of legal claims; or is required to provide medical care or diagnosis (32). |
2.2.3. Data accuracy, minimisation and security
(20) |
Data should be accurate and, where necessary, kept up to date. It should also be adequate, relevant and not excessive in relation to the purposes for which it is processed, and in principle be kept for no longer than is necessary for the purposes for which the personal data is processed. |
(21) |
Under the Data Integrity and Purpose Limitation Principle (33), personal data must be limited to what is relevant for the purpose of the processing. In addition, organisations must, to the extent necessary for the purposes of the processing, take reasonable steps to ensure that personal data is reliable for its intended use, accurate, complete and current. |
(22) |
Moreover, personal information may be retained in a form identifying or rendering an individual identifiable (and thus in the form of personal data) (34) only for as long as it serves the purpose(s) for which it was initially collected or subsequently authorised by the individual pursuant to the Choice Principle. This obligation does not prevent organisations from continuing to process personal information for longer periods, but only for the time and to the extent such processing reasonably serves one of the following specific purposes similar to comparable exceptions provided under Union data protection law: archiving in the public interest, journalism, literature and art, scientific and historical research and statistical analysis (35). Where personal data is retained for one of these purposes, its processing is subject to the safeguards provided by the Principles (36). |
(23) |
Personal data should also be processed in a manner that ensures its security, including protection against unauthorized or unlawful processing and against accidental loss, destruction or damage. To that end, controllers and processors should take appropriate technical or organisational measures to protect personal data from possible threats. These measures should be assessed taking into consideration the state of the art, related costs and the nature, scope, context and purposes of processing, as well as the risks for the rights of individuals. |
(24) |
Under the EU-U.S. DPF, this is ensured by the Security Principle, which requires, similarly to Article 32 Regulation (EU) 2016/679, to take reasonable and appropriate security measures, taking into account the risks involved in the processing and the nature of the data (37). |
2.2.4. Transparency
(25) |
Data subjects should be informed of the main features of the processing of their personal data. |
(26) |
This is ensured through the Notice Principle (38), which, similarly to the transparency requirements under Regulation (EU) 2016/679, requires organisations to inform data subjects about, inter alia, (i) the participation of the organisation in the DPF, (ii) the type of data collected, (iii) the purpose of the processing, (iv) the type or identity of third parties to which personal data may be disclosed and the purposes for doing so, (v) their individual rights, (vi) how to contact the organisation and (vii) available redress avenues. |
(27) |
This notice must be provided in a clear and conspicuous language when individuals are first asked to provide the personal data or as soon as practicable thereafter, but in any event before the data is used for a materially different (but compatible) purpose than the one for which it was collected, or before it is disclosed to a third party (39). |
(28) |
In addition, organisations must make their privacy policies reflecting the Principles public (or, in the case of human resources data, make them readily available to the concerned individuals) and provide links to the DoC’s website (with further details on certification, the rights of data subjects and available recourse mechanisms), the Data Privacy Framework List (DPF List) of participating organisations and the website of an appropriate alternative dispute settlement provider (40). |
2.2.5. Individual rights
(29) |
Data subjects should have certain rights which can be enforced against the controller or processor, in particular the right of access to data, the right to object to the processing and the right to have data rectified and erased. |
(30) |
The Access Principle (41) of the EU-U.S. DPF provides individuals with such rights. In particular, data subjects have the right, without the need for justification, to obtain from an organisation confirmation of whether it is processing personal data related to them; have the data communicated to them; and obtain information about the purpose of the processing, the categories of personal data being processed and the (categories of) recipients to whom the data is disclosed (42). Organisations are required to respond to access requests within a reasonable period of time (43). An organisation may set reasonable limits to the number of times within a given period that access requests from a particular individual will be met and may charge a fee that is not excessive, e.g. where requests are manifestly excessive, in particular because of their repetitive character (44). |
(31) |
The right of access may only be restricted in exceptional circumstances similar to the ones provided under Union data protection law, in particular where the legitimate rights of others would be violated; where the burden or expense of providing access would be disproportionate to the risks to the individual’s privacy in the circumstances of the case (although expense and burden are not controlling factors in determining whether providing access is reasonable); to the extent that disclosure is likely to interfere with the safeguarding of important countervailing public interests, such as national security, public security or defence; the information contains confidential commercial information; or the information is processed solely for research or statistical purposes (45). Any denial of, or limitation to a right has to be necessary and duly justified, with the organisation bearing the burden of demonstrating that these requirements are fulfilled (46). In carrying out that assessment, the organisation must take particularly into account the individual’s interests (47). Where it is possible to separate information from other data to which a restriction applies, the organisation must redact the protected information and disclose the remaining information (48). |
(32) |
In addition, data subjects have the right to obtain rectification or amendment of inaccurate data, and to obtain deletion of data that has been processed in violation of the Principles (49). Moreover, as explained in recital 15, individuals have a right to object/opt-out to the processing of their data for materially different (but compatible) purposes than those for which the data was collected and to the disclosure of their data to third parties. When personal data is used for direct marketing purposes, individuals have a general right to opt-out from the processing at any time (50). |
(33) |
The Principles do not specifically address the issue of decisions affecting the data subject based solely on the automated processing of personal data. However, as regards personal data that has been collected in the Union, any decision based on automated processing will typically be taken by the controller in the Union (which has a direct relationship with the concerned data subject) and is thus directly subject to Regulation (EU) 2016/679 (51). This includes transfer scenarios where the processing is carried out by a foreign (for instance U.S.) business operator acting as an agent (processor) on behalf of the controller in the Union (or as a sub-processor acting on behalf of the Union processor having received the data from a Union controller that collected it) which on this basis then takes the decision. |
(34) |
This was confirmed by a study commissioned by the Commission in 2018 in the context of the second annual review of the functioning of the Privacy Shield (52), which concluded that, at the time, there was no evidence suggesting that automated decision-making was normally being carried out by Privacy Shield organisations on the basis of personal data transferred under the Privacy Shield. |
(35) |
In any event, in areas where companies most likely resort to the automated processing of personal data to take decisions affecting the individual (e.g. credit lending, mortgage offers, employment, housing and insurance), U.S. law offers specific protections against adverse decisions (53). These acts typically provide that individuals have the right to be informed of the specific reasons underlying the decision (e.g. the rejection of a credit), to dispute incomplete or inaccurate information (as well as reliance on unlawful factors), and to seek redress. In the area of consumer credit, the Fair Credit Reporting Act (FCRA) and Equal Credit Opportunity Act (ECOA) contain safeguards that provide consumers with some form of a right to explanation and a right to contest the decision. These Acts are relevant in a wide range of areas, including credit, employment, housing and insurance. In addition, certain anti-discrimination laws, such as Title VII of the Civil Rights Act and the Fair Housing Act, provide individuals with protections with respect to models used in automated decision-making that could lead to discrimination on the basis of certain characteristics, and grant individuals rights to challenge such decisions, including automated ones. With respect to health information, the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule creates certain rights that are similar to those of Regulation (EU) 2016/679 with respect to accessing personal health information. In addition, guidance from the U.S. authorities require medical providers to receive information that allow them to inform individuals of automated decision-making systems used in the medical sector (54). |
(36) |
Therefore, these rules offer protections similar to those provided under Union data protection law in the unlikely situation in which automated decisions would be taken by the EU-U.S. DPF organisation itself. |
2.2.6. Restrictions on onward transfers
(37) |
The level of protection afforded to personal data transferred from the Union to organisations in the United States must not be undermined by the further transfer of such data to a recipient in the United States or another third country. |
(38) |
Under the Accountability for Onward Transfer Principle (55) , special rules apply for so-called ‘onward transfers’, i.e. transfers of personal data from an EU-U.S. DPF organisation to a third party controller or processor, irrespective of whether the latter is located in the United States or a third country outside the United States (and the Union). Any onward transfer can only take place (i) for limited and specified purposes, (ii) on the basis of a contract between the EU-U.S. DPF organisation and the third party (56) (or comparable arrangement within a corporate group (57)) and (iii) only if that contract requires the third party to provide the same level of protection as the one guaranteed by the Principles. |
(39) |
This obligation to provide the same level of protection as guaranteed by the Principles, read in combination with the Data Integrity and Purpose Limitation Principle, notably means that the third party may only process the personal information transmitted to it for purposes that are not incompatible with the purposes for which it was collected or subsequently authorised by the individual (in accordance with the Choice Principle). |
(40) |
The Accountability for Onward Transfer Principle should also be read in conjunction with the Notice Principle and, in the case of an onward transfer to a third party controller (58), with the Choice Principle, according to which data subjects must be informed (among others) about the type/identity of any third party recipient, the purpose of the onward transfer and the choice offered, and can object (opt out) or, in the case of sensitive data, have to give “affirmative express consent” (opt in) for the onward transfer. |
(41) |
The obligation to provide the same level of protection as required by the Principles applies to any and all third parties involved in the processing of the data so transferred irrespective of their location (in the U.S. or another third country) as well as when the original third party recipient itself transfers those data to another third party recipient, for example for sub-processing purposes. |
(42) |
In all cases, the contract with the third-party recipient must provide that the latter will notify the EU-U.S. DPF organisation if it makes a determination that it can no longer meet its obligation. When such a determination is made, the processing by the third party must cease or other reasonable and appropriate steps must be taken to remedy the situation (59). |
(43) |
Additional protections apply in the case of an onward transfer to a third party agent (i.e. a processor). In such a case, the U.S. organisation must ensure that the agent only acts on its instructions and take reasonable and appropriate steps (i) to ensure that the agent effectively processes the personal information transferred in a manner consistent with the organisation’s obligations under the Principles and, (ii) to stop and remediate unauthorised processing, upon notice (60). The organisation may be required by the DoC to provide a summary or representative copy of the privacy provisions of the contract (61). Where compliance problems arise in a (sub-)processing chain, the organisation acting as the controller of the personal data will in principle face liability, as specified in the Recourse, Enforcement and Liability Principle, except if it proves that it is not responsible for the event giving rise to the damage (62). |
2.2.7. Accountability
(44) |
Under the accountability principle, entities processing data are required to put in place appropriate technical and organisational measures to effectively comply with their data protection obligations and be able to demonstrate such compliance, in particular to the competent supervisory authority. |
(45) |
Once an organisation has voluntarily decided to certify (63) under the EU-U.S. DPF, its effective compliance with the Principles is compulsory and enforceable. Under the Recourse, Enforcement and Liability Principle (64), EU-U.S. DPF organisations must provide effective mechanisms to ensure compliance with the Principles. Organisations must also take measures to verify (65) that their privacy policies conform to the Principles and are in fact complied with. This can be done either through a system of self-assessment, which must include internal procedures ensuring that employees receive training on the implementation of the organisation’s privacy policies and that compliance is periodically reviewed in an objective manner, or outside compliance reviews, the methods of which may include auditing, random checks or use of technology tools. |
(46) |
In addition, organisations must retain records on the implementation of their EU-U.S. DPF practices and make them available upon request in the context of an investigation or a complaint about non-compliance to an independent dispute resolution body or competent enforcement authority (66). |
2.3. Administration, oversight and enforcement
(47) |
The EU-U.S. DPF will be administered and monitored by the DoC. The Framework provides for oversight and enforcement mechanisms in order to verify and ensure that EU-U.S. DPF organisations comply with the Principles and that any failure to comply is addressed. These mechanisms are set out in the Principles (Annex I) and the commitments undertaken by the DoC (Annex III), the FTC (Annex IV) and the DoT (Annex V). |
2.3.1. (Re-)certification
(48) |
To certify under the EU-U.S. DPF (or re-certify on an annual basis), organisations are required to publicly declare their commitment to comply with the Principles, make their privacy policies available and fully implement them (67). As part of their (re-)certification application, organisations have to submit information to the DoC on, inter alia, the name of the relevant organisation, a description of the purposes for which the organisation will process personal data, the personal data that will be covered by the certification, as well as the chosen verification method, the relevant independent recourse mechanism and the statutory body that has jurisdiction to enforce compliance with the Principles (68). |
(49) |
Organisations can receive personal data on the basis of the EU-U.S. DPF from the date they are placed on the DPF list by the DoC. To ensure legal certainty and avoid ‘false claims’, organisations certifying for the first time are not allowed to publicly refer to their adherence to the Principles before the DoC has determined that the organisation’s certification submission is complete and added the organisation to the DPF List (69). To be allowed to continue to rely on the EU-U.S. DPF to receive personal data from the Union, such organisations must annually re-certify their participation in the framework. When an organisation leaves the EU-U.S. DPF for any reason, it must remove all statements implying that the organisation continues to participate in the Framework (70). |
(50) |
As reflected in the commitments set out in Annex III, the DoC will verify whether organisations meet all certification requirements and have put in place a (public) privacy policy containing the information required under the Notice Principle (71). Building on the experience with the (re-)certification process under the Privacy Shield, the DoC will carry out a number of checks, including to verify whether organisations’ privacy policies contain a hyperlink to the correct complaint form on the website of the relevant dispute resolution mechanism and, when several entities and subsidiaries of one organisation are included in a certification submission, whether the privacy policies of each of those entities meet the certification requirements and are readily available to data subjects (72). In addition, where necessary, the DoC will carry out cross-checks with the FTC and DoT to verify that the organisations are subject to oversight body identified in their (re-)certification submissions, and will work with alternative dispute resolution bodies to verify that the organisations are registered for the independent recourse mechanism identified in their (re-)certification submission (73). |
(51) |
The DoC will inform organisations that, in order to complete the (re-)certification, they must address all issues identified during its review. In case an organisation fails to respond within a timeframe set by the DoC (for example, as regards re-certification the expectation would be that the process is completed within 45 days) (74) or otherwise fails to complete its certification, the submission will be considered abandoned. In that case, any misrepresentation about participation or compliance with the EU-U.S. DPF may be subject to enforcement action by the FTC or DoT (75). |
(52) |
To ensure the proper application of the EU-U.S. DPF, interested parties, such as data subjects, data exporters and the national data protection authorities (DPAs), must be able to identify those organisations adhering to the Principles. To ensure such transparency at the ‘entry point’, the DoC has committed to maintain and make available to the public the list of organisations that have certified their adherence to the Principles and fall within the jurisdiction of at least one of the enforcement authorities referred to in Annexes IV and V to this Decision (76). The DoC will update the list on the basis of an organisation’s annual re-certification submission and whenever an organisation withdraws or is removed from the EU-U.S. DPF. Furthermore, to guarantee transparency also at the ‘exit point’, the DoC will maintain and make available to the public a record of organisations that have been removed from the list, in each case identifying the reason for such removal (77). Finally, it will provide a link to the FTC’s webpage on the EU-U.S. DPF, which will list the FTC’s enforcement action under the Framework (78). |
2.3.2. Compliance monitoring
(53) |
The DoC will monitor on an ongoing basis the effective compliance with the Principles by EU-U.S. DPF organisations through different mechanisms (79). In particular, it will carry out ‘spot checks’ of randomly selected organisations, as well as ad hoc spot checks of specific organisations when potential compliance issues are identified (e.g. reported to the DoC by third parties) to verify whether (i) point(s) of contact for handling complaints and data subject requests are available and responsive; (ii) the organisation’s privacy policy is readily available, both on its website and via a hyperlink on the DoC’s website; (iii) the organisation’s privacy policy continues to comply with the certification requirements and (iv) the organisations’ chosen independent dispute resolution mechanism is available to handle complaints (80). |
(54) |
If there is credible evidence that an organisation does not comply with its commitments under the EU-U.S. DPF (including if the DoC receives complaints or the organisation does not respond satisfactorily to inquiries of the DoC), the DoC will require the organisation to complete and submit a detailed questionnaire (81). An organisation that fails to satisfactorily and timely reply to the questionnaire will be referred to the relevant authority (the FTC or DoT) for possible enforcement action (82). As part of its compliance monitoring activities under the Privacy Shield, the DoC regularly conducted the spot checks mentioned in recital 53 and continuously monitored public reports, which allowed it to identify, address and resolve compliance issues (83). Organisations that persistently fail to comply with the Principles will be removed from the DPF List and must return or delete the personal data received under the Framework (84). |
(55) |
In other cases of removal, such as voluntary withdrawal from participation or failure to recertify, the organisation must either delete or return the data, or may retain it, provided it affirms to the DoC on an annual basis its commitment to continue to apply the Principles or provides adequate protection for the personal data by another authorized means (e.g. by using a contract that fully reflects the requirements of the relevant standard contractual clauses approved by the Commission) (85). In this case, an organisation also has to identify a contact point within the organisation for all EU-U.S. DPF-related questions. |
2.3.3. Identifying and addressing false claims of participation
(56) |
The DoC will monitor any false claims of EU-U.S. DPF participation or the improper use of the EU-U.S. DPF certification mark, both ex officio and on the basis of complaints (e.g. received from DPAs) (86). In particular, the DoC will on an ongoing basis verify that organisations that (i) withdraw from participation in the EU-U.S. DPF, (ii) fail to complete the annual re-certification (i.e. either started, but failed to complete the annual re-certification process in a timely manner or did not even start the annual re-certification process), (iii) are removed as a participant, notably for “persistent failure to comply,” or (iv) fail to complete an initial certification (i.e. started, but failed to complete the initial certification process in a timely manner), remove from any relevant published privacy policy references to the EU-U.S. DPF that imply that the organisation actively participates in the Framework (87). The DoC will also conduct internet searches to identify references to the EU-U.S. DPF in organisations’ privacy policies, including to identify false claims by organisations that never participated in the EU-U.S. DPF (88). |
(57) |
Where the DoC finds that references to the EU-U.S. DPF have not been removed or are improperly used, it will inform the organisation about a possible referral to the FTC/DoT (89). If an organisation fails to respond satisfactorily, the DoC will refer the matter to the relevant agency for potential enforcement action (90). Any misrepresentation to the general public by an organisation concerning its adherence to the Principles in the form of misleading statements or practices is subject to enforcement action by the FTC, DoT or other relevant U.S. enforcement authorities. Misrepresentations to the DoC are enforceable under the False Statements Act (18 U.S.C. § 1001). |
2.3.4. Enforcement
(58) |
In order to ensure that an adequate level of data protection is guaranteed in practice, an independent supervisory authority tasked with powers to monitor and enforce compliance with the data protection rules should be in place. |
(59) |
EU-U.S. DPF organisations must be subject to the jurisdiction of the competent U.S. authorities – the FTC and DoT – which have the necessary investigatory and enforcement powers to effectively ensure compliance with the Principles (91). |
(60) |
The FTC is an independent authority composed of five Commissioners, who are appointed by the President with the advice and consent of the Senate (92). Commissioners are appointed for a seven-year term and may only be removed by the President for inefficiency, neglect of duty, or malfeasance in office. The FTC may not have more than three Commissioners of the same political party and Commissioners may not, during their appointment, engage in any other business, vocation, or employment. |
(61) |
The FTC can investigate compliance with the Principles, as well as false claims of adherence to the Principles or participation in the EU-U.S. DPF by organisations which either are no longer on the DPF List or have never certified (93). The FTC can enforce compliance by seeking administrative or federal court orders (including ‘consent orders’ achieved via settlements) (94) for preliminary or permanent injunctions or other remedies, and will systematically monitor compliance with such orders (95). Where organisations fail to comply with such orders, the FTC may seek civil penalties and other remedies, including for any injury caused by the unlawful conduct. Each consent order issued to an EU-U.S. DPF organisation will have self-reporting provisions (96), and organisations will be required to make public any relevant EU-U.S. DPF-related sections of any compliance or assessment report submitted to the FTC. Finally, the FTC will maintain an online list of organisations subject to FTC or court orders in EU-U.S. DPF cases (97). |
(62) |
With respect to the Privacy Shield, the FTC took enforcement action in around 22 cases, both with respect to violations of specific requirements of the framework (e.g. failure to affirm to the DoC that the organisation continued to apply the Privacy Shield protections after it left the framework, failure to verify, through a self-assessment or outside compliance review, that the organisation complied with the framework) (98) and false claims of participation in the framework (e.g. by organisations that failed to complete the necessary steps to obtain certification, or allowed their certification to lapse but misrepresented their continued participation) (99). This enforcement action inter alia resulted from the proactive use of administrative subpoenas to obtain materials from certain Privacy Shield participants to check to check for substantive violations of the Privacy Shield obligations (100). |
(63) |
More generally, the FTC has in the past years taken enforcement action in a number of cases concerning compliance with specific data protection requirements that are also provided under the EU-U.S. DPF, e.g. as regards the principles of purpose limitation and data retention (101), data minimisation (102), data security (103) and data accuracy (104). |
(64) |
The DoT has exclusive authority to regulate the privacy practices of airlines, and shares jurisdiction with the FTC with respect to the privacy practices of ticket agents in the sale of air transportation. DoT officers first aim at reaching a settlement and, if this is not possible, may initiate enforcement proceedings involving an evidentiary hearing before a DoT administrative law judge who has the authority to issue cease-and-desist orders and civil penalties (105). Administrative law judges benefit from several protections under the Administrative Procedure Act (APA) to ensure their independence and impartiality. For example, they can only be dismissed for good cause; are assigned to cases in rotation; may not perform duties inconsistent with their duties and responsibilities as administrative law judges; are not subject to supervision by the investigative team of the authority they are employed by (in this case the DoT); and must conduct their adjudicative/enforcement function impartially (106). The DoT has committed to monitor enforcement orders and ensure that orders resulting from EU-U.S. DPF cases are available on its website (107). |
2.4. Redress
(65) |
In order to ensure adequate protection and in particular the enforcement of individual rights, the data subject should be provided with effective administrative and judicial redress. |
(66) |
The EU-U.S. DPF, through the Recourse, Enforcement and Liability Principle, requires organisations to provide recourse for individuals who are affected by non-compliance and thus the possibility for Union data subjects to lodge complaints regarding non-compliance by EU-U.S. DPF organisations and to have these complaints resolved, if necessary by a decision providing an effective remedy (108). As part of their certification, organisations must satisfy the requirements of this Principle by providing for effective and readily available independent recourse mechanisms by which each individual’s complaints and disputes can be investigated and expeditiously resolved at no cost to the individual (109). |
(67) |
Organisations may choose independent recourse mechanisms in either the Union or in the United States. As explained in more detail in recital 73, this includes the possibility to voluntarily commit to cooperate with the EU DPAs. Where organisations process human resources data, such commitment to cooperate with EU DPAs is mandatory. Other alternatives include independent alternative dispute resolution or private-sector developed privacy programs that incorporate the Principles into their rules. The latter must include effective enforcement mechanisms in accordance with the requirements of the Recourse, Enforcement and Liability Principle. |
(68) |
Consequently, the EU-U.S. DPF provides data subjects with a number of possibilities to enforce their rights, lodge complaints regarding non-compliance by EU-U.S. organisations and to have their complaints resolved, if necessary by a decision providing an effective remedy. Individuals can bring a complaint directly to an organisation, to an independent dispute resolution body designated by the organisation, to national DPAs, the DoC or to the FTC. In cases where their complaints have not been resolved by any of these recourse or enforcement mechanisms, individuals also have a right to invoke binding arbitration (Annex I of Annex I to this Decision). Except for the arbitral panel, which requires certain remedies to be exhausted before it can be invoked, individuals are free to pursue any or all of the redress mechanisms of their choice, and are not obliged to choose one mechanism over the other or to follow a specific sequence. |
(69) |
Firstly, Union data subjects may pursue cases of non-compliance with the Principles through direct contacts with the EU-U.S. DPF organisations (110). To facilitate resolution, the organisation must put in place an effective redress mechanism to deal with such complaints. An organisation’s privacy policy must therefore clearly inform individuals about a contact point, either within or outside the organisation, that will handle complaints (including any relevant establishment in the Union that can respond to inquiries or complaints), as well as on the designated independent dispute resolution body (see recital 70). Upon receipt of an individual’s complaint, directly from the individual or through the DoC following referral by a DPA, the organisation must provide a response to the Union data subject within a period of 45 days (111). Likewise, organisations are required to respond promptly to inquiries and other requests for information from the DoC or from a DPA (112) (where the organisation has committed to cooperate with the DPA) relating to their adherence to the Principles. |
(70) |
Secondly, individuals can also bring a complaint directly to the independent dispute resolution body (either in the United States or in the Union) designated by an organisation to investigate and resolve individual complaints (unless they are obviously unfounded or frivolous) and to provide appropriate recourse free of charge to the individual (113). Sanctions and remedies imposed by such a body must be sufficiently rigorous to ensure compliance by organisations with the Principles and should provide for a reversal or correction by the organisation of the effects of non-compliance and, depending on the circumstances, the termination of the further processing of the personal data at stake and/or their deletion, as well as publicity for findings of non-compliance (114). Independent dispute resolution bodies designated by an organisation are required to include on their public websites relevant information regarding the EU-U.S. DPF and the services they provide under it (115). Each year, they must publish an annual report providing aggregate statistics regarding these services (116). |
(71) |
As part of its compliance review procedures, the DoC may verify that EU-U.S. DPF organisations are actually registered with the independent recourse mechanisms they claim they are registered with (117). Both the organisations and the responsible independent recourse mechanisms are required to respond promptly to inquiries and requests by the DoC for information relating to the EU-U.S. DPF. The DoC will work with independent recourse mechanisms to verify that they include information on their websites regarding the Principles and the services they provide under the EU-U.S. DPF and that they publish annual reports (118). |
(72) |
In cases where the organisation fails to comply with the ruling of a dispute resolution or self-regulatory body, the latter must notify such non-compliance to the DoC and the FTC (or another U.S. authority with jurisdiction to investigate non-compliance by the organisation), or a competent court (119). If an organisation refuses to comply with a final determination by any privacy self-regulatory, independent dispute resolution or government body, or where such a body determines that an organisation frequently fails to comply with the Principles, this may be considered as a persistent failure to comply with the result that the DoC, after first providing 30 days’ notice and an opportunity to respond to the organisation that has failed to comply, will strike the organisation off the DPF List (120). If, after removal from the list, the organisation continues to make the claim of EU-U.S. DPF certification, the DoC will refer it to the FTC or other enforcement agency (121). |
(73) |
Thirdly, individuals may also bring their complaints to a national DPA in the Union, which may make use of their investigatory and remedial powers under Regulation (EU) 2016/679. Organisations are obliged to cooperate in the investigation and the resolution of a complaint by a DPA either when it concerns the processing of human resources data collected in the context of an employment relationship or when the respective organisation has voluntarily submitted to the oversight by DPAs (122). Notably, organisations have to respond to inquiries, comply with the advice given by the DPA, including for remedial or compensatory measures, and provide the DPA with written confirmation that such action has been taken (123). In cases of non-compliance with the advice given by the DPA, the DPA will refer such cases to the DoC (which may remove organisations from the EU-U.S. DPF list) or, for possible enforcement action, to the FTC or the DoT (failure to cooperate with the DPAs or to comply with the Principles is actionable under U.S. law) (124). |
(74) |
To facilitate cooperation for an effective handling of complaints, both the DoC and the FTC have put in place a dedicated point of contact that is responsible for liaising directly with DPAs (125). Those points of contact assist with DPA enquiries regarding an organisation’s compliance with the Principles. |
(75) |
The advice provided by the DPAs (126) is issued after both sides in the dispute have had a reasonable opportunity to comment and to provide any evidence they wish. The panel may deliver advice as quickly as the requirement for due process allows, and as a general rule within 60 days after receiving a complaint (127). If an organisation fails to comply within 25 days of delivery of the advice and has offered no satisfactory explanation for the delay, the panel may give notice of its intention either to submit the matter to the FTC (or other competent U.S. enforcement authority), or to conclude that the commitment to cooperate has been seriously breached. In the first alternative, this may lead to enforcement action based on Section 5 of the FTC Act (or similar statute) (128). In the second alternative, the panel will inform the DoC which will consider the organisation’s refusal to comply with the advice of the DPA panel as a persistent failure to comply that will lead to the organisation’s removal from the DPF List. |
(76) |
If the DPA to which the complaint has been addressed has taken no or insufficient action to address a complaint, the individual complainant has the possibility to challenge such (in-)action in the national courts of the respective EU Member State. |
(77) |
Individuals may also bring complaints to DPAs even when the DPA panel has not been designated as an organisation’s dispute resolution body. In these cases, the DPA may refer such complaints either to the DoC or the FTC. In order to facilitate and increase cooperation on matters relating to individual complaints and non-compliance by EU-U.S. DPF organisations, the DoC will establish a dedicated contact point to act as a liaison and to assist with DPA inquiries regarding an organisation's compliance with the Principles (129). Likewise, the FTC has committed to establish a dedicated point of contact (130). |
(78) |
Fourthly, the DoC has committed to receive, review and undertake best efforts to resolve complaints about an organisation’s non-compliance with the Principles (131). To this end, the DoC provides special procedures for DPAs to refer complaints to a dedicated contact point, track them and follow up with organisations to facilitate resolution (132). In order to expedite the processing of individual complaints, the contact point liaises directly with the respective DPA on compliance issues and in particular updates it on the status of complaints within a period of not more than 90 days following referral (133). This allows data subjects to bring complaints of non-compliance by EU-U.S. DPF organisations directly to their national DPA and have them channelled to the DoC as the U.S. authority administering the EU-U.S. DPF. |
(79) |
Where, on the basis of its ex officio verifications, complaints or any other information, the DoC concludes that an organisation has persistently failed to comply with the Principles it may remove such an organisation from the DPF list (134). Refusal to comply with a final determination by any privacy self-regulatory, independent dispute resolution or government body, including a DPA, will be regarded as a persistent failure to comply (135). |
(80) |
Fifthly, an EU-U.S. DPF organisation must be subject to the jurisdiction of U.S. authorities, in particular the FTC (136), which have the necessary investigatory and enforcement powers to effectively ensure compliance with the Principles. The FTC gives priority consideration to referrals of non-compliance with the Principles received from independent dispute resolution or self-regulatory bodies, the DoC and DPAs (acting on their own initiative or upon complaints) to determine whether Section 5 of the FTC Act has been violated (137). The FTC has committed to create a standardised referral process, to designate a point of contact at the agency for DPA referrals, and to exchange information on referrals. In addition, it may accept complaints directly from individuals and undertake EU-U.S. DPF investigations on its own initiative, in particular as part of its wider investigation of privacy issues. |
(81) |
Sixthly, as a recourse mechanism of ‘last resort’ in case none of the other available redress avenues has satisfactorily resolved an individual's complaint, the Union data subject may invoke binding arbitration by the ‘EU-U.S. Data Privacy Framework Panel’ (EU-U.S. DPF Panel) (138). Organisations must inform individuals about their possibility to invoke binding arbitration and they are obliged to respond once an individual has invoked this option by delivering notice to the concerned organisation (139). |
(82) |
This EU-U.S. DPF Panel consists of a pool of at least ten arbitrators that will be designated by the DoC and the Commission based on their independence, integrity, as well as experience in U.S. privacy and Union data protection law. For each individual dispute, the parties select from this pool a panel of one or three (140) arbitrators. |
(83) |
The International Centre for Dispute Resolution (ICDR), the international division of the American Arbitration Association (AAA), was selected by the DoC to administer arbitrations. Proceedings before the EU-U.S. DPF Panel will be governed by a set of agreed arbitration rules and a code of conduct for appointed arbitrators. The ICDR-AAA website provides clear and concise information to individuals about the arbitration mechanism and the procedure to file for arbitration. |
(84) |
The arbitration rules agreed between the DoC and the Commission supplement the EU-U.S. DPF which contains several features which enhance the accessibility of this mechanism for Union data subjects: (i) in preparing a claim before the panel, the data subject may be assisted by his or her national DPA; (ii) while the arbitration will take place in the United States, Union data subjects may choose to participate through video or telephone conference, to be provided at no cost to the individual; (iii) while the language used in the arbitration will as a rule be English, interpretation at the arbitral hearing and translation will in principle be provided upon a reasoned request and at no cost to the data subject; (iv) finally, while each party has to bear its own attorney’s fees, if represented by an attorney before the panel, the DoC will maintain a fund supplied with annual contributions by the EU-U.S. DPF organisations, which are to cover the costs of the arbitration procedure up to maximum amounts to be determined by the U.S. authorities in consultation with the Commission (141). |
(85) |
The EU-U.S. DPF Panel has the authority to impose individual-specific, non-monetary equitable relief (142) necessary to remedy non-compliance with the Principles. While the panel takes into account other remedies already obtained by other EU-U.S. DPF mechanisms when making its determination, individuals may still resort to arbitration if they consider these other remedies to be insufficient. This allows Union data subjects to invoke arbitration in all cases where the action or inaction of EU-U.S. DPF organisations, independent recourse mechanisms or the competent U.S. authorities (for instance the FTC) has not satisfactorily resolved their complaints. Arbitration may not be invoked if a DPA has the legal authority to resolve the claim at issue with respect to the EU-U.S. DPF organisation, namely in those cases where the organisation is either obliged to cooperate and comply with the advice of the DPAs as regards the processing of human resources data collected in the employment context, or has voluntarily committed to do so. Individuals can enforce the arbitration decision in the U.S. courts under the Federal Arbitration Act, thereby ensuring a legal remedy in case an organisation fails to comply. |
(86) |
Seventh, where an organisation does not comply with its commitment to respect the Principles and published privacy policy, additional avenues for judicial redress are available under U.S. law, including to obtain compensation for damages. For example, individuals can under certain conditions obtain judicial redress (including compensation for damages) under State consumer laws in cases of fraudulent misrepresentation, unfair or deceptive acts or practices (143), and under tort law (in particular under the torts of intrusion upon seclusion (144), appropriation of name or likeness (145) and public disclosure of private facts (146)). |
(87) |
Together, the various redress avenues described above ensure that each complaint regarding non-compliance with the EU-U.S DPF by certified organisations will be effectively adjudicated and remedied. |
3. ACCESS AND USE OF PERSONAL DATA TRANSFERRED FROM THE EUROPEAN UNION BY PUBLIC AUTHORITIES IN THE UNITED STATES
(88) |
The Commission also assessed the limitations and safeguards, including the oversight and individual redress mechanisms available in United States law as regards the collection and subsequent use by U.S. public authorities of personal data transferred to controllers and processors in the U.S. in the public interest, in particular for criminal law enforcement and national security purposes (government access) (147). In assessing whether the conditions under which government access to data transferred to the United States under this Decision fulfil the ‘essential equivalence’ test pursuant to Article 45(1) of Regulation (EU) 2016/679, as interpreted by the Court of Justice in light of the Charter of Fundamental Rights, the Commission took into account several criteria. |
(89) |
In particular, any limitation to the right to the protection of personal data must be provided for by law and the legal basis which permits the interference with such a right must itself define the scope of the limitation to the exercise of the right concerned (148). In addition, in order to satisfy the requirement of proportionality, according to which derogations from and limitations to the protection of personal data must apply only in so far as is strictly necessary in a democratic society to meet specific objectives of general interest equivalent to those recognized by the Union, this legal basis must lay down clear and precise rules governing the scope and application of the measures in question and impose minimum safeguards so that the persons whose data has been transferred have sufficient guarantees to protect effectively their personal data against the risk of abuse (149). Moreover, these rules and safeguards must be legally binding and enforceable by individuals (150). In particular, data subjects must have the possibility of bringing legal action before an independent and impartial tribunal in order to have access to their personal data, or to obtain the rectification or erasure of such data (151). |
3.1. Access and use by U.S. public authorities for criminal law enforcement purposes
(90) |
As regards interference with personal data transferred under the EU-U.S. DPF for criminal law enforcement purposes, the law of the United States imposes a number of limitations on the access and use of personal data, and provides oversight and redress mechanisms which are in line with the requirements referred to in recital 89 of this Decision. The conditions under which such access can take place and the safeguards applicable to the use of those powers are assessed in detail in the following sections. In this respect, the U.S. government (through the Department of Justice, DoJ) has also provided assurances on the applicable limitations and safeguards (Annex VI to this Decision). |
3.1.1. Legal bases, limitations and safeguards
3.1.1.1. Limitations and safeguards as regards the collection of personal data for criminal law enforcement purposes
(91) |
Personal data processed by certified U.S. organisations that would be transferred from the Union on the basis of the EU-U.S. DPF may be accessed for criminal law enforcement purposes by U.S. federal prosecutors and federal investigative agents under different procedures, as explained in more detail in recitals 92-99. These procedures apply in the same way when information is obtained from any U.S. organisation, regardless of the nationality or place of residence of the concerned data subjects (152). |
(92) |
Firstly, upon request of a federal law enforcement officer or an attorney for the government, a judge may issue a warrant for a search or seizure (including of electronically stored information) (153). Such a warrant may only be issued if there is ‘probable cause (154)’ that ‘seizable items’ (evidence of a crime, illegally possessed items, or property designed or intended for use or used in committing a crime) are likely to be found in the place specified by the warrant. The warrant must identify the property or item to be seized and designate the judge to which the warrant must be returned. A person subject to a search or whose property is subject to a search may move to suppress evidence obtained or derived from an unlawful search if that evidence is introduced against that person during a criminal trial (155). When a data holder (e.g. a company) is required to disclose data pursuant to a warrant, it may notably challenge the requirement to disclose as unduly burdensome (156). |
(93) |
Secondly, a subpoena may be issued by a grand jury (an investigative arm of the court impanelled by a judge or magistrate) in the context of investigations of certain serious crimes (157), usually at the request of a federal prosecutor, to require someone to produce or make available business records, electronically stored information, or other tangible items. In addition, different statutes authorise the use of administrative subpoenas to produce or make available business records, electronically stored information, or other tangible items in investigations involving health care fraud, child abuse, Secret Service protection, controlled substance cases, and Inspector General investigations (158). In both cases, the information must be relevant to the investigation and the subpoena cannot be unreasonable, i.e. overbroad, oppressive or burdensome (and can be challenged by the recipient of the subpoena on those grounds) (159). |
(94) |
Very similar conditions apply to administrative subpoenas issued to seek access to data held by companies in the US for civil or regulatory (“public interest”) purposes. The authority of agencies with civil and regulatory responsibilities to issue such administrative subpoenas must be established in statute. The use of an administrative subpoena is subject to a “reasonableness test”, which requires that the investigation is conducted pursuant to a legitimate purpose, the information requested under the subpoena is relevant to that purpose, the agency does not already have the information it is seeking with the subpoena, and the necessary administrative steps to issue the subpoena have been followed (160). Case law of the Supreme Court has also clarified the need to balance the importance of the public interest in the information being requested with the importance of personal and organisational privacy interests (161). While the use of an administrative subpoena is not subject to prior judicial approval, it becomes subject to judicial review in case of a challenge by the recipient on the above-mentioned grounds, or if the issuing agency seeks to enforce the subpoena in court (162). In addition to these general overarching limitations, specific (stricter) requirements may follow from individual statutes (163). |
(95) |
Thirdly, several legal bases enable criminal law enforcement authorities to obtain access to communications data. A court may issue an order authorising the collection of real-time, non-content dialling, routing, addressing and signalling information about a phone number or e-mail (through the use of a pen register or trap and trace device), if it finds that the authority has certified that the information likely to be obtained is relevant to a pending criminal investigation (164). The order must, inter alia, specify the identity, if known, of the suspect; the attributes of the communications to which it applies and a statement of the offense to which the information to be collected relates. The use of a pen register or trap and trace device may be authorised for a maximum period of sixty days, which may only be extended by a new court order. |
(96) |
In addition, access for criminal law enforcement purposes to subscriber information, traffic data and stored content of communications held by internet service providers, telephone companies, and other third party service providers may be obtained on the basis of the Stored Communications Act (165). To obtain the stored content of electronic communications, criminal law enforcement authorities must in principle obtain a warrant from a judge based on probable cause to believe that the account in question contains evidence of a crime (166). For subscriber registration information, IP addresses and associated time stamps, and billing information, criminal law enforcement authorities may use a subpoena. For most other stored, non-content information, such as e-mail headers without the subject line, a criminal law enforcement authority must obtain a court order, which will be issued if the judge is satisfied that there are reasonable grounds to believe that the requested information is relevant and material to an ongoing criminal investigation. |
(97) |
Providers that receive requests under the Stored Communications Act may voluntarily notify a customer or subscriber whose information is sought, except when the relevant criminal law enforcement authority obtains a protective order prohibiting such notification (167). Such a protective order is a court order requiring a provider of electronic communications services or remote computing services to whom a warrant, subpoena or court order is directed, not to notify any other person of the existence of the warrant, subpoena or court order, for as long as the court deems appropriate. Protective orders are granted if a court finds that there is reason to believe that notification would seriously jeopardise an investigation or unduly delay a trial, e.g. because it would result in endangering the life or physical safety of an individual, flight from prosecution, intimidation of potential witnesses, etc. A Deputy Attorney General memorandum (which is binding on all DoJ attorneys and agents) requires prosecutors to make a detailed determination regarding the need for a protective order and provide a justification to the court on how the statutory criteria for obtaining a protective order are met in the specific case (168). The memorandum also requires that applications for protective orders must generally not seek to delay notification for more than one year. Where, in exceptional circumstances, orders of longer duration might be necessary, such orders may only be sought with the written agreement of a supervisor designated by the U.S. Attorney or the appropriate Assistant Attorney General. In addition, a prosecutor must, when closing an investigation, immediately assess whether there is a basis to maintain any outstanding protective orders and, where this is not the case, terminate the protective order and ensure the service provider is notified thereof (169). |
(98) |
Criminal law enforcement authorities may also intercept in real time wire, oral or electronic communications on the basis of a court order in which a judge finds, inter alia, that there is probable cause to believe that the wiretap or electronic interception will produce evidence of a federal crime, or the whereabouts of a fugitive fleeing from prosecution (170). |
(99) |
Further protections are provided by various Department of Justice policies and guidelines, including the Attorney General Guidelines for Domestic FBI Operations (AGG-DOM), which, inter alia require that the Federal Bureau of Investigation (FBI) uses the least intrusive investigative methods feasible, taking into account the effect on privacy and civil liberties (171). |
(100) |
According to the representations made by the U.S. government, the same or higher protections described above apply to law enforcement investigations at State level (with respect to investigations carried out under State laws) (172). In particular, constitutional provisions, as well as statutes and case-law at State level reaffirm the above mentioned protections against unreasonable searches and seizures by requiring the issuance of a search warrant (173). Similar to the protections afforded at the federal level, search warrants may be issued only upon a showing of probable cause and must describe the place to be searched and the person or thing to be seized (174). |
3.1.1.2. Further use of the information collected
(101) |
As regards the further use of data collected by federal criminal law enforcement authorities, different statutes, guidelines and standards impose specific safeguards. With the exception of the specific instruments applicable to the activities of the FBI (AGG-DOM and FBI Domestic Investigations and Operations Guide), the requirements described in this section generally apply to the further use of data by any federal authority, including to data accessed for civil or regulatory purposes. This includes the requirements following from the Office of Management and Budget memos/regulations, the Federal Information Security Management Modernization Act, the E-Government Act and the Federal Records Act. |
(102) |
In accordance with authority provided by the Clinger-Cohen Act (P.L. 104-106, Division E) and the Computer Security Act of 1987 (P.L. 100-235), the Office of Management and Budget (OMB) issued Circular No. A-130 to establish general binding guidance that applies to all federal agencies (including law enforcement authorities) when they handle personally identifiable information (175). In particular, the circular requires all federal agencies to “limit the creation, collection, use, processing, storage, maintenance, dissemination, and disclosure of personally identifiable information to that which is legally authorized, relevant, and reasonably deemed necessary for the proper performance of authorised agency functions” (176). In addition, to the extent reasonably practicable, federal agencies must ensure that personally identifiable information is accurate, relevant, timely and complete, and reduced to the minimum necessary for the proper performance of an agency’s functions. More generally, federal agencies must establish a comprehensive privacy program to ensure compliance with applicable privacy requirements, develop and evaluate privacy policies and manage privacy risks; maintain procedures to detect, document and report privacy compliance incidents; develop privacy awareness and training programmes for employees and contractors; and put in place policies and procedures to ensure that personnel is held accountable for complying with privacy requirements and policies (177). |
(103) |
In addition, the E-Government Act (178) requires all federal agencies (including criminal law enforcement authorities) to put in place information security protections that are commensurate with the risk and magnitude of the harm that would result from unauthorized access, use, disclosure, disruption, modification, or destruction; have a Chief Information Officer to ensure compliance with information security requirements and perform an annual independent evaluation (e.g. by an Inspector General, see recital 109) of their information security program and practices (179). Similarly, the Federal Records Act (FRA) (180) and supplemental regulations (181) require information held by federal agencies to be subject to safeguards ensuring the physical integrity of the information and protecting it against unauthorized access. |
(104) |
Pursuant to federal statutory authority, including the Federal Information Security Modernisation Act of 2014, the OMB and the National Institute of Standards and Technology (NIST) have developed standards which are binding on federal agencies (including criminal law enforcement authorities) and that further specify the minimum information security requirements that have to be put in place, including access controls, ensuring awareness and training, contingency planning, incident response, auditing and accountability tools, ensuring system and information integrity, conducting privacy and security risk assessments etc. (182). Moreover, all federal agencies (including criminal law enforcement authorities) must, in accordance with guidelines of the OMB, maintain and implement a plan for handling data breaches, including when it comes to responding to such breaches and assessing the risks of harm (183). |
(105) |
As regards data retention, the FRA (184) requires U.S. federal agencies (including criminal law enforcement authorities) to establish retention periods for their records (after which such records must be disposed), which must be approved by the National Archives and Record Administration (185). The length of these retention period is fixed in light of different factors, such as the type of investigation, whether the evidence is still relevant to the investigation, etc. With respect to the FBI, AGG-DOM provides that the FBI must have in place such a records retention plan and maintain a system that can promptly retrieve the status of and basis for investigations. |
(106) |
Finally, OMB Circular No. A-130 also contains certain requirements for disseminating personally identifiable information. In principle, the dissemination and disclosure of personally identifiable information must be limited to what is legally authorised, relevant and reasonably deemed necessary for the proper performance of an agency’s functions (186). When sharing personally identifiable information with other government entities, U.S. federal agencies must impose, where relevant, conditions (including the implementation of specific security and privacy controls) that govern the processing of the information through written agreements (including contracts, data use agreements, information exchange agreements and memoranda of understanding) (187). As regards the grounds on which information may be disseminated, the AGG-DOM and FBI Domestic Investigations and Operations Guide (188) for instance provide that the FBI may be under a legal requirement to do so (e.g. under an international agreement) or is allowed to disseminate information in certain circumstances, e.g. to other U.S. agencies if disclosure is compatible with the purpose for which the information was collected and it is related to their responsibilities; to congressional committees; to foreign agencies if the information is related to their responsibilities and the dissemination is consistent with the interests of the United States; the dissemination is notably necessary to protect the safety or security of persons or property, or to protect against or prevent a crime or threat to the national security and the disclosure is compatible with the purpose for which the information was collected (189). |
3.1.2. Oversight
(107) |
The activities of federal criminal law enforcement agencies are subject to oversight by various bodies (190). As explained in recitals 92-99, in most cases this includes prior oversight by the judiciary, which has to authorise individual collection measures before they can be used. In addition, other bodies oversee different stages of the activities of criminal law enforcement authorities, including the collection and processing of personal data. Together, these judicial and non-judicial bodies ensure that law enforcement authorities are subject to independent oversight. |
(108) |
Firstly, Privacy and Civil Liberties Officers exist within various departments with criminal law enforcement responsibilities (191). While the specific powers of these officers may vary somewhat depending on the authorising statute, they typically encompass the supervision of procedures to ensure that the respective department/agency is adequately considering privacy and civil liberties concerns and has put in place adequate procedures to address complaints from individuals who consider that their privacy or civil liberties have been violated. The heads of each department or agency must ensure that Privacy and Civil Liberties Officers have the material and resources to fulfil their mandate, are given access to any material and personnel necessary to carry out their functions, and are informed about and are consulted on proposed policy changes (192). Privacy and Civil Liberties Officers periodically report to Congress, including on the number and nature of the complaints received by the department/agency and a summary of the disposition of such complaints, the reviews and inquiries conducted and the impact of the activities carried out by the Officer (193). |
(109) |
Secondly, an independent Inspector General oversees the activities of the Department of Justice, including the FBI (194). Inspectors General are statutorily independent (195) and responsible for conducting independent investigations, audits, and inspections of the Department’s programs and operations. They have access to all records, reports, audits, reviews, documents, papers, recommendations or other relevant material, if need be by subpoena, and may take testimony (196). While Inspectors General issue non-binding recommendations for corrective action, their reports, including on follow-up action (or the lack thereof) (197) are generally made public and sent to Congress, which can on this basis exercise its oversight function (see recital 111) (198). |
(110) |
Thirdly, to the extent they carry out counter-terrorism activities, departments with criminal law enforcement responsibilities are subject to oversight by the Privacy and Civil Liberties Oversight Board (PCLOB), an independent agency within the executive branch composed of a bipartisan, five-member Board appointed by the President for a fixed six-year term with Senate approval (199). According to its founding statute, the PCLOB is entrusted with responsibilities in the field of counterterrorism policies and their implementation, with a view to protect privacy and civil liberties. In its review it can access all relevant agency records, reports, audits, reviews, documents, papers and recommendations, including classified information, conduct interviews and hear testimony (200). It receives reports from the civil liberties and privacy officers of several federal departments/agencies (201), may issue recommendations to the government andlaw enforcement authorities, and regularly reports to Congressional committees and the President (202). Reports of the Board, including the ones to Congress, must be made publicly available to the greatest extent possible (203). |
(111) |
Finally, criminal law enforcement activities are subject to oversight by specific Committees in the U.S. Congress (the House and Senate Judiciary Committees). The Judiciary Committees conduct regular oversight in different ways, in particular through hearings, investigations, reviews and reports (204). |
3.1.3. Redress
(112) |
As indicated, criminal law enforcement authorities must in most cases obtain prior judicial authorisation to collect personal data. Although this is not required for administrative subpoenas, these are limited to specific situations and will be subject to independent judicial review at least where the government seeks enforcement in court. In particular, recipients of administrative subpoenas may challenge them in court on the grounds that they are unreasonable, i.e. overbroad, oppressive or burdensome (205). |
(113) |
Individuals may first of all lodge requests or complaints with criminal law enforcement authorities concerning the handling of their personal data. This includes the possibility to request access to and correction of personal data (206). As regards activities relating to counter-terrorism, individuals may also lodge a complaint with Privacy and Civil Liberties Officers (or other privacy officials) within law enforcement authorities (207). |
(114) |
Moreover, U.S. law provides for a number of judicial redress avenues for individuals, against a public authority or one of its officials, where these authorities process personal data (208). These avenues, which include in particular the APA, the Freedom of Information Act (FOIA) and the Electronic Communications Privacy Act (ECPA), are open to all individuals irrespective of their nationality, subject to any applicable conditions. |
(115) |
Generally, under the judicial review provisions of the APA (209), “any person suffering legal wrong because of agency action, or adversely affected or aggrieved by agency action”, is entitled to seek judicial review (210). This includes the possibility to ask the court to “hold unlawful and set aside agency action, findings, and conclusions found to be […] arbitrary, capricious, an abuse of discretion, or otherwise not in accordance with law” (211). |
(116) |
More specifically, Title II of the ECPA (212) sets forth a system of statutory privacy rights and as such governs law enforcement access to the contents of wire, oral or electronic communications stored by third-party service providers (213). It criminalises the unlawful (i.e. not authorised by court or otherwise permissible) access to such communications and provides recourse for an affected individual to file a civil action in U.S. federal court for actual and punitive damages as well as equitable or declaratory relief against a government official that has wilfully committed such unlawful acts, or against the United States. |
(117) |
In addition, several other statutes afford individuals the right to bring suit against a U.S. public authority or official with respect to the processing of their personal data, such as the Wiretap Act (214), the Computer Fraud and Abuse Act (215), the Federal Torts Claim Act (216), the Right to Financial Privacy Act (217), and the Fair Credit Reporting Act (218). |
(118) |
Also, under FOIA (219), 5 U.S.C. § 552 any person has the right to obtain access to federal agency records, including where these contain the individual's personal data. After exhausting administrative remedies, an individual may invoke such right to access in court unless those records are protected from public disclosure by an exemption or special law enforcement exclusion (220). In this case, the court will assess whether any exemption applies or has been lawfully invoked by the relevant public authority. |
3.2. Access and use by U.S. public authorities for national security purposes
(119) |
The law of the United States contains various limitations and safeguards with respect to the access and use of personal data for national security purposes, and provides oversight and redress mechanisms that are in line with the requirements referred to in recital 89 of this Decision. The conditions under which such access can take place and the safeguards applicable to the use of these powers are assessed in detail in the following sections. |
3.2.1. Legal bases, limitations and safeguards
3.2.1.1. Applicable legal framework
(120) |
Personal data transferred from the Union to EU-U.S. DPF organisations may be collected by U.S. authorities for national security purposes on the basis of different legal instruments, subject to specific conditions and safeguards. |
(121) |
Once personal data has been received by organisations located in the United States, U.S. intelligence agencies may seek access to such data for national security purposes only as authorised by statute, specifically under the Foreign Intelligence Surveillance Act (FISA) or and statutory provisions authorising access through National Security Letters (NSL) (221). FISA contains several legal bases that may be used to collect (and subsequently process) the personal data of Union data subjects transferred under the EU-U.S. DPF (Section 105 FISA (222), Section 302 FISA (223), Section 402 FISA (224), Section 501 FISA (225) and Section 702 FISA (226)), as described in more detail in recitals 142-152. |
(122) |
U.S. intelligence agencies also have possibilities to collect personal data outside the United States, which may include personal data in transit between the Union and the United States. The collection outside the United States is based on Executive Order 12333 (EO 12333) (227), issued by the President (228). |
(123) |
The collection of signals intelligence is the form of intelligence collection that is the most relevant for the present adequacy finding, as it concerns the collection of electronic communications and data from information systems. Such collection may be carried out by U.S. intelligence agencies both within the United States (on the basis of FISA) and while data is in transit to the United States (on the basis of EO 12333). |
(124) |
On 7 October 2022, the U.S. President issued EO 14086 on Enhancing Safeguards for United States Signals Intelligence setting limitations and safeguards for all U.S. signals intelligence activities. This EO replaces Presidential Policy Directive (PPD-28) to a large extent (229), strengthens the conditions, limitations and safeguards that apply to all signals intelligence activities (i.e. on the basis of FISA and EO 12333), regardless of where they take place (230), and establishes a new redress mechanism through which these safeguards can be invoked and enforced by individuals (231) (see in more detail recitals 176-194). In doing so, it implements in U.S. law the outcome of the talks that took place between the EU and U.S. following the invalidation of the Commission’s adequacy decision on the Privacy Shield by the Court of Justice (see recital 6). It is, therefore, a particularly important element of the legal framework assessed in this Decision. |
(125) |
The limitations and safeguards introduced by EO 14086 supplement those provided by Section 702 FISA and EO 12333. The requirements described below (in sections 3.2.1.2 and 3.2.1.3) must be applied by intelligence agencies when engaging in signals intelligence activities pursuant to Section 702 FISA and EO 12333, e.g. when selecting/identifying categories of foreign intelligence information to be acquired pursuant to Section 702 FISA; collecting foreign intelligence or counterintelligence pursuant to EO 12333; and making individual targeting decisions under Section 702 FISA and EO 12333. |
(126) |
The requirements laid down in this Executive Order issued by the President are binding on the entire Intelligence Community. They must be further implemented through agency policies and procedures that transpose them into concrete directions for day-to-day operations. In this respect, EO 14086 provides U.S. intelligence agencies with a maximum of one year to update their existing policies and procedures (i.e. by 7 October 2023) to bring them in line with the EO’s requirements. Such updated policies and procedures have to be developed in consultation with the Attorney General, the Civil Liberties Protection Officer of the Director of National Intelligence (ODNI CLPO) and the PCLOB – an independent oversight body authorised to review Executive Branch policies and their implementation, with a view to protect privacy and civil liberties (see recital 110 as regards the role and status of the PCLOB) – and be made publicly available (232). In addition, once the updated policies and procedures are in place, the PCLOB will conduct a review to ensure that they are consistent with the EO. Within 180 days of completion of such a review by the PCLOB, each intelligence agency must carefully consider and implement or otherwise address all of the PCLOB’s recommendations. On 3 July 2023, the U.S. government published such updated policies and procedures (233). |
3.2.1.2. Limitations and safeguards as regards the collection of personal data for national security purposes
(127) |
EO 14086 sets a number of overreaching requirements that apply to all signals intelligence activities (collection, use, dissemination, etc. of personal data). |
(128) |
Firstly, such activities must be based on statute or Presidential authorisation and undertaken in compliance with U.S. law, including the Constitution (234). |
(129) |
Secondly, appropriate safeguards must be in place to ensure that privacy and civil liberties are integral considerations in the planning of such activities (235). |
(130) |
In particular, any signals intelligence activity may only be carried out “following a determination, based on a reasonable assessment of all relevant factors, that the activities are necessary to advance a validated intelligence priority” (as regards the notion of ‘validated intelligence priority’, see recital 135) (236). |
(131) |
Moreover, such activities may only be conducted “to the extent and in a manner that is proportionate to the validated intelligence priority for which they have been authorized” (237). In other words, a proper balance must be achieved “between the importance of the intelligence priority pursued and the impact on the privacy and civil liberties of affected individuals, regardless of their nationality or wherever they might reside” (238). |
(132) |
Finally, to ensure compliance with these general requirements - which reflect the principles of legality, necessity and proportionality - signals intelligence activities are subject to oversight (see in more detail section 3.2.2) (239). |
(133) |
These overarching requirements are further substantiated with respect to the collection of signals intelligence through a number of conditions and limitations ensuring that the interference with the rights of individuals is limited to what is necessary and proportionate to advance a legitimate objective. |
(134) |
Firstly, the EO limits the grounds on which data can be collected as part of signals intelligence activities in two ways. On the one hand, the EO lays down the legitimate objectives that may be pursued by signals intelligence collection, e.g. to understand or assess the capabilities, intentions, or activities of foreign organisations, including international terrorist organisations, that pose a current or potential threat to the national security of the United States; to protect against foreign military capabilities and activities; to understand or assess transnational threats that impact global security, such as climate and other ecological change, public health risks and humanitarian threats (240). On the other hand, the EO lists certain objectives that must never be pursued by signals intelligence activities, e.g. for the purpose of burdening criticism, dissent, or the free expression of ideas or political opinions by individuals or the press; for the purpose of disadvantaging persons based on their ethnicity, race, gender, gender identity, sexual orientation, or religion; or to afford a competitive advantage to U.S. companies (241). |
(135) |
Moreover, the legitimate objectives laid down in EO 14086 cannot by themselves be relied upon by intelligence agencies to justify signals intelligence collection but must be further substantiated, for operational purposes, into more concrete priorities for which signals intelligence may be collected. In other words, actual collection can only take place to advance a more specific priority. Such priorities are established through a dedicated process aimed at ensuring compliance with the applicable legal requirements, including those relating to privacy and civil liberties. More specifically, intelligence priorities are first developed by the Director of National Intelligence (through the so-called National Intelligence Priorities Framework) and submitted to the President for approval (242). Before proposing intelligence priorities to the President, the Director must, in accordance with EO 14086, obtain an assessment from the ODNI CLPO for each priority as to whether it (1) advances one or more legitimate objectives listed in the EO; (2) was neither designed nor is anticipated to result in signals intelligence collection for a prohibited objective listed in the EO; and (3) was established after appropriate consideration for the privacy and civil liberties of all persons, regardless of their nationality or wherever they might reside (243). In case the Director disagrees with the CLPO’s assessment, both views must be presented to the President (244). |
(136) |
Therefore, this process notably ensures that privacy considerations are taken into account from the initial stage where intelligence priorities are developed. |
(137) |
Secondly, once an intelligence priority has been established, a number of requirements govern the decision as to whether and to what extent signals intelligence may be collected to advance such a priority. These requirements operationalise the overarching necessity and proportionality standards set forth by Section 2(a) of the EO. |
(138) |
In particular, signals intelligence may only be collected “following a determination that, based on a reasonable assessment of all relevant factors, the collection is necessary to advance a specific intelligence priority” (245). In determining whether a specific signals intelligence collection activity is necessary to advance a validated intelligence priority, U.S. intelligence agencies must consider the availability, feasibility and appropriateness of other less intrusive sources and methods, including from diplomatic and public sources (246). When available, such alternative, less intrusive sources and methods must be prioritised (247). |
(139) |
When, in the application of such criteria, the collection of signals intelligence is considered necessary, it must be as “tailored as feasible” and must “not disproportionately impact privacy and civil liberties” (248). To ensure that privacy and civil liberties are not disproportionately affected – i.e. to strike a proper balance between national security needs and the protection of privacy and civil liberties – all relevant factors have to be duly taken into account, such as the nature of the pursued objective; the intrusiveness of the collection activity, including its duration; the probable contribution of the collection to the objective pursued; the reasonably foreseeable consequences to individuals; and the nature and sensitivity of the data to be collected (249). |
(140) |
As regards the type of signals intelligence collection, collection of data within the United States, which is the most relevant for the present adequacy finding as it concerns data that has been transferred to organisations in the U.S., must always be targeted, as explained in more detail in recitals 142-153. |
(141) |
‘Bulk collection’ (250) may only be carried out outside the United States, on the basis of EO 12333. Also in this case, pursuant to EO 14086, targeted collection must be prioritised (251). Conversely, bulk collection is only allowed where the information necessary to advance a validated intelligence priority cannot reasonably be obtained by targeted collection (252). When it is necessary to carry out bulk collection of data outside the United States, specific safeguards under EO 14086 apply (253). Firstly, methods and technical measures must be applied in order to limit the data collected to only what is necessary to advance a validated intelligence priority, while minimizing the collection of non-pertinent information (254). Secondly, the EO limits the use of information collected in bulk (including querying) to six specific objectives, including protecting against terrorism, the taking of hostages, and the holding of individuals captive by or on behalf of a foreign government, organisation or person; protecting against foreign espionage, sabotage, or assassination; protecting against threats from the development possession, or proliferation of weapons of mass destruction or related technologies and threats, etc. (255) Finally, any querying of signals intelligence obtained in bulk may only take place where necessary to advance a validated intelligence priority, in pursuit of these six objectives and in accordance with policies and procedures that appropriately take into account the impact of the queries on the privacy and civil liberties of all persons, regardless of their nationality or wherever they might reside (256). |
(142) |
In addition to the requirements of EO 14086, the signals intelligence collection of data that has been transferred to an organisation in the United States is subject to specific limitations and safeguards governed by Section 702 FISA (257). Section 702 FISA allows the collection of foreign intelligence information through the targeting of non-U.S. persons reasonably believed to be located outside the United States with the compelled assistance of U.S. electronic communication service providers (258). In order to collect foreign intelligence information pursuant to Section 702 FISA, the Attorney General and the Director of National Intelligence submit annual certifications to the Foreign Intelligence Surveillance Court (FISC) which identify categories of foreign intelligence information to be acquired (259). Certifications must be accompanied by targeting, minimization and querying procedures, which are also approved by the Court and are legally binding on U.S. intelligence agencies. |
(143) |
The FISC is an independent tribunal (260) created by federal statute whose decisions can be appealed to the Foreign Intelligence Surveillance Court of Review (FISCR) (261) and, ultimately, the Supreme Court of the United States (262). The FISC (and FISCR) is supported by a standing panel of five attorneys and five technical experts that have an expertise in national security matters as well as civil liberties (263). From this group the court appoints an individual to serve as amicus curiae to assist in the consideration of any application for an order or review that, in the opinion of the court, presents a novel or significant interpretation of the law, unless the court finds that such appointment is not appropriate (264). This ensures in particular that privacy considerations are properly reflected in the court’s assessment. The court may also appoint an individual or organisation to serve as amicus curiae, including to provide technical expertise, whenever it deems this appropriate or, upon motion, permit an individual or organisation leave to file an amicus curiae brief (265). |
(144) |
The FISC reviews the certifications and the related procedures (in particular targeting and minimisation procedures) for compliance with the requirements of FISA. If it considers that the requirements are not fulfilled, it can deny the certification in full or in part and request the procedures to be amended (266). In this respect, the FISC has repeatedly confirmed that its review of Section 702 targeting and minimization procedures is not confined to the procedures as written, but also includes how the procedures are implemented by the government (267). |
(145) |
Individual targeting determinations are made by the National Security Agency (NSA, the intelligence agency responsible for targeting under Section 702 FISA) in accordance with FISC-approved targeting procedures, which require the NSA to assess, based on the totality of the circumstances, that targeting a specific person is likely to acquire a category of foreign intelligence information identified in a certification (268). This assessment must be particularized and fact-based, informed by analytical judgment, the specialized training and experience of the analyst, as well as the nature of the foreign intelligence information to be obtained (269). The targeting is carried out by identifying so-called selectors that identify specific communications facilities, like the target’s e-mail address or telephone number, but never key words or names of individuals (270). |
(146) |
NSA analysts will first identify non-U.S. persons located abroad whose surveillance will lead, based on the analysts’ assessment, to the relevant foreign intelligence specified in the certification (271). As set out in the NSA’s targeting procedures, the NSA can only direct surveillance at a target when it has already learned something about the target (272). This may follow from information from different sources, for instance human intelligence. Through these other sources, the analyst must also learn about a specific selector (i.e. communication account) used by the potential target. Once these individualised persons have been identified and their targeting has been approved by an extensive review mechanism within the NSA (273), selectors identifying communication facilities (such as e-mail addresses) used by the targets will be ‘tasked’ (i.e. developed and applied) (274). |
(147) |
The NSA must document the factual basis for the selection of the target (275) and, at regular intervals after the initial targeting, affirm that the targeting standard continues to be met (276). Once the targeting standard is no longer satisfied, collection must be ceased (277). The selection by the NSA of each target and its record of each recorded targeting assessment and rationale is reviewed for compliance with the targeting procedures on a bi-monthly basis by officials in the intelligence oversight offices at the Department of Justice, who are under an obligation to report any violation to the FISC and to Congress (278). The NSA’s written documentation facilitates the FISC’s oversight of whether specific individuals are properly targeted under Section 702 FISA, in accordance with its supervision powers described in recitals 173-174 (279). Finally, the Director of National Intelligence (DNI) is also required to report each year the total number of Section 702 FISA targets in public annual Statistical Transparency Reports. Companies that receive Section 702 FISA directives may publish aggregate data (via transparency reports) on the requests they receive (280). |
(148) |
As regards the other legal bases to collect personal data transferred to organisations in the U.S., different limitations and safeguards apply. In general, the collection of data in bulk is specifically prohibited under Section 402 FISA (pen register and trap and trace authority) and through the use of NSL, and the use of specific ‘selection terms’ is instead required (281). |
(149) |
To conduct traditional individualized electronic surveillance (pursuant to Section 105 FISA), intelligence agencies must submit an application to the FISC with a statement of the facts and circumstances relied upon to justify the belief that there is probable cause that the facility is used or about to be used by a foreign power or an agent of a foreign power (282) . The FISC will assess, among others, whether on the basis of the submitted facts there is probable cause that this is indeed the case (283). |
(150) |
To carry out a search of premises or property that is intended to result in an inspection, seizure, etc. of information, material, or property (e.g. a computer device) on the basis of Section 301 FISA, an application for an order by the FISC is required (284). Such application must, inter alia, show that there is probable cause that the target of the search is a foreign power or an agent of a foreign power; that the premise or property to be searched contains foreign intelligence information and that the premise to be searched is owned, used, possessed by, or is in transit to or from an (agent of a) foreign power (285). |
(151) |
Similarly, the installation of pen registers or trap and trace devices (pursuant to Section 402 FISA) requires an application for an order by the FISC (or a U.S. Magistrate Judge) and the use of a specific selection term, i.e. a term that specifically identifies a person, account, etc. and is used to limit, to the greatest extent reasonably possible, the scope of the information sought (286). This authority does not concern the contents of communications, but rather aims at information about the customer or subscriber using a service (such as name, address, subscriber number, length/type of service received, source/mechanism of payment). |
(152) |
Section 501 FISA (287), which allows the collection of business records of a common carrier (i.e. any person or entity transporting people or property by land, rail, water or air for compensation), public accommodation facility (e.g. a hotel, motel or inn), vehicle rental facility, or physical storage facility (i.e. which provides space for or services related to the storage of goods and materials) (288), also requires an application to the FISC or a Magistrate Judge. This application must specify the records sought and the specific and articulable facts giving reason to believe that the person to whom the records pertain is a foreign power or an agent of foreign power (289). |
(153) |
Finally, NSL are authorised by different statutes and allow investigating agencies to obtain certain information (not including the content of communications) from certain entities (e.g. financial institutions, credit reporting agencies, electronic communication providers) contained in credit reports, financial records and electronic subscriber and transactional records (290). The NSL statute that authorises access to electronic communications may be used only by the FBI and requires that requests use a term that specifically identifies a person, entity, telephone number, or account and certify that the information is relevant to an authorized national security investigation to protect against international terrorism or clandestine intelligence activities (291). Recipients of an NSL have the right to challenge it in court (292). |
3.2.1.3. Further use of the information collected
(154) |
The processing of personal data collected by U.S. intelligence agencies through signals intelligence is subject to a number of safeguards. |
(155) |
Firstly, each intelligence agency must ensure appropriate data security and prevent access by unauthorised persons to personal data collected through signals intelligence. In this respect, different instruments, including statute, guidelines and standards further specify the minimum information security requirements that have to be put in place (e.g. multifactor authentication, encryption, etc.) (293). Access to collected data must be limited to authorised, trained personnel with a need to know the information to perform their mission (294). More generally, intelligence agencies must provide appropriate training to their employees, including on procedures for reporting and addressing violations of the law (including EO 14086) (295). |
(156) |
Secondly, intelligence agencies must comply with Intelligence Community standards for accuracy and objectivity, in particular with respect to ensuring data quality and reliability, the consideration of alternative sources of information and objectivity in performing analyses (296). |
(157) |
Thirdly, as regards data retention, EO 14086 clarifies that personal data of non-U.S. persons is subject to the same retention periods as the ones that apply to the data of U.S. persons (297). Intelligence agencies are required to define specific retention periods and/or the factors that must be taken into account to determine the length of applicable retention periods (e.g. whether the information is evidence of a crime; whether the information constitutes foreign intelligence information; whether the information is needed to protect the safety of persons or organisations, including victims or targets of international terrorism), which are laid down in different legal instruments (298). |
(158) |
Fourthly, specific rules apply as regards the dissemination of personal data collected through signals intelligence. As a general requirement, personal data on non-U.S. persons may only be disseminated if it involves the same type of information that can be disseminated about U.S. persons, e.g. information needed to protect the safety of a person or organisation (such as targets, victims or hostages of international terrorist organisations) (299). Moreover, personal data may not be disseminated solely because of a person’s nationality or country of residence or for the purpose of circumventing the requirements of EO 14086 (300). Dissemination within the U.S. government may only take place if an authorised and trained individual has a reasonable belief that the recipient has a need to know the information (301) and will protect it appropriately (302). To determine whether personal data can be disseminated to recipients outside the U.S. government (including a foreign government or international organisation), the purpose of the dissemination, the nature and extent of the data being disseminated, and the potential for harmful impact on the person(s) concerned must be taken into account (303). |
(159) |
Finally, including in order to facilitate oversight of compliance with the applicable legal requirements as well as effective redress, each intelligence agency is required under EO 14086 to keep appropriate documentation about the collection of signals intelligence. The documentation requirements cover elements such as the factual basis for the assessment that a specific collection activity is necessary to advance a validated intelligence priority (304). |
(160) |
In addition to the abovementioned safeguards of EO 14086 for the use of information collected through signals intelligence, all US intelligence agencies are subject to more general requirements on purpose limitation, data minimisation, accuracy, security, retention and dissemination, following in particular from OMB Circular No. A-130, the E-Government Act, the Federal Records Act (see recitals 101-106) and guidance from the Committee on National Security Systems (CNSS) (305). |
3.2.2. Oversight
(161) |
The activities of U.S. intelligence agencies are subject to supervision by different bodies. |
(162) |
Firstly, EO 14086 requires each intelligence agency to have senior-level legal, oversight and compliance officials to ensure compliance with applicable U.S. law (306). In particular, they must conduct periodic oversight of signals intelligence activities and ensure that any non-compliance is remedied. Intelligence agencies must provide such officials with access to all relevant information to carry out their oversight functions and may not take any actions to impede or improperly influence their oversight activities (307). Moreover, any significant non-compliance incident (308) identified by an oversight official or any other employee must promptly be reported to the head of the intelligence agency and the Director of National Intelligence, who must ensure that any necessary actions are taken to remediate and prevent the recurrence of the significant incident of non-compliance (309). |
(163) |
This oversight function is fulfilled by officers with a designated compliance role, as well as Privacy and Civil Liberties Officers and Inspectors General (310). |
(164) |
As is the case with respect to criminal law enforcement authorities, Privacy and Civil Liberties Officers exist at all intelligence agencies (311). The powers of these officers typically encompass the supervision of procedures to ensure that the respective department/agency is adequately considering privacy and civil liberties concerns and has put in place adequate procedures to address complaints from individuals who consider that their privacy or civil liberties have been violated (and in some cases, like the Office of the Director of National Intelligence (ODNI), may themselves have the power to investigate complaints (312)). The heads of intelligence agencies must ensure that Privacy and Civil Liberties Officers have the resources to fulfil their mandate, are given access to any material and personnel necessary to carry out their functions, and are informed about and are consulted on proposed policy changes (313). Privacy and Civil Liberties Officers periodically report to Congress and the PCLOB, including on the number and nature of the complaints received by the department/agency with a summary of the disposition of such complaints, the reviews and inquiries conducted and the impact of the activities carried out by the Officer (314). |
(165) |
Secondly, each intelligence agency has an independent Inspector General with the responsibility, among others, to oversee foreign intelligence activities. This includes, within the ODNI, an Office of the Inspector General of the Intelligence Community with comprehensive jurisdiction over the entire Intelligence Community which is authorised to investigate complaints or information concerning allegations of unlawful conduct, or abuse of authority, in connection with ODNI and/or Intelligence Community programs and activities (315). As is the case for criminal law enforcement authorities (see recital 109), such Inspectors General are statutorily independent (316) and responsible for conducting audits and investigations relating to the programs and operations carried out by the respective agency for national intelligence purposes, including with respect to abuse or violation of the law (317). They have access to all records, reports, audits, reviews, documents, papers, recommendations or other relevant material, if need be by subpoena, and may take testimony (318). Inspectors General refer cases of suspected criminal violations for prosecution and make recommendations for corrective action to agency heads (319). While their recommendations are non-binding, their reports, including on follow-up action (or the lack thereof) (320) are generally made public and sent to Congress, which can on this basis exercise its own oversight function (see recitals 168-169) (321). |
(166) |
Thirdly, the Intelligence Oversight Board (IOB), which is established within the President’s Intelligence Advisory Board (PIAB), oversees compliance by U.S. intelligence authorities with the Constitution and all applicable rules (322). The PIAB is an advisory body within the Executive Office of the President that consists of 16 members appointed by the President from outside the U.S. government. The IOB consists of a maximum of five members designated by the President from among PIAB members. According to EO 12333 (323), the heads of all intelligence agencies are required to report any intelligence activity for which there is reason to believe that it may be unlawful or contrary to an Executive Order or Presidential Directive to the IOB. To ensure that the IOB has access to the information necessary to perform its functions, Executive Order 13462 directs the Director of National Intelligence and heads of intelligence agencies to provide any information and assistance the IOB determines is needed to perform its functions, to the extent permitted by law (324). The IOB is in turn required to inform the President about intelligence activities it believes may be in violation of U.S. law (including Executive Orders) and are not being adequately addressed by the Attorney General, Director of National Intelligence or the head of an intelligence agency (325). In addition, the IOB is required to inform the Attorney General about possible violations of criminal law. |
(167) |
Fourthly, intelligence agencies are subject to oversight by the PCLOB. According to its founding statute, the PCLOB is entrusted with responsibilities in the field of counterterrorism policies and their implementation, with a view to protect privacy and civil liberties. In its review of intelligence agencies actions, it can access all relevant agency records, reports, audits, reviews, documents, papers and recommendations, including classified information, conduct interviews and hear testimony (326). It receives reports from the civil liberties and privacy officers of several federal departments/agencies (327), may issue recommendations to the government and intelligence agencies, and regularly reports to Congressional committees and the President (328). Reports of the Board, including the ones to Congress, must be made publicly available to the greatest extent possible (329). The PCLOB has issued several oversight and follow-up reports, including an analysis of the programs run on the basis of Section 702 FISA and the protection of privacy in this context, the implementation of PPD 28 and EO 12333 (330). The PCLOB is also charged with carrying out specific oversight functions as regards the implementation of EO 14086, in particular by reviewing whether agency procedures are consistent with the EO (see recital 126) and evaluating the correction functioning of the redress mechanism (see recital 194). |
(168) |
Fifthly, in addition to the oversight mechanisms within the executive branch, specific Committees in the U.S. Congress (the House and Senate Intelligence and Judiciary Committees) have oversight responsibilities regarding all U.S. foreign intelligence activities. Members of these Committees have access to classified information as well as intelligence methods and programs (331). The Committees exercise their oversight functions in different ways, in particular through hearings, investigations, reviews and reports (332). |
(169) |
The Congressional Committees receive regular reports on intelligence activities, including from the Attorney General, the Director of National Intelligence, intelligence agencies and other oversight bodies (e.g. Inspectors General), see recitals 164-165. In particular, according to the National Security Act, ”[t]he President shall ensure that the congressional intelligence committees are kept fully and currently informed of the intelligence activities of the United States, including any significant anticipated intelligence activity as required by this subchapter” (333). In addition, “[t]he President shall ensure that any illegal intelligence activity is reported promptly to the congressional intelligence committees, as well as any corrective action that has been taken or is planned in connection with such illegal activity” (334). |
(170) |
Moreover, additional reporting requirements follow from specific statutes. In particular, FISA requires the Attorney General to “fully inform” the Senate and House Intelligence and Judiciary Committees regarding the government’s activities under certain sections of FISA (335). It also requires the government to provide the Congressional committees with copies of all decisions, orders, or opinions of the FISC or FISCR that include “significant construction or interpretation” of FISA provisions. As regards surveillance under Section 702 FISA, parliamentary oversight is exercised through statutorily required reports to the Intelligence and Judiciary Committees, as well as frequent briefings and hearings. These include a semi-annual report by the Attorney General describing the use of Section 702 FISA, with supporting documents, including Department of Justice and ODNI compliance reports and a description of any incidents of non-compliance (336), and a separate semi-annual assessment by the Attorney General and the DNI documenting compliance with the targeting and minimization procedures (337). |
(171) |
In addition, FISA requires the U.S. government to disclose to Congress (and the public) each year the number of FISA orders sought and received, as well as estimates of the number of U.S. and non-U.S. persons targeted by surveillance, among others (338). The Act also requires additional public reporting about the number of NSL issued, again both with regard to U.S. and non-U.S. persons (while at the same time allowing the recipients of FISA orders and certifications, as well as NSL requests, to issue transparency reports under certain conditions) (339). |
(172) |
More generally, the U.S. Intelligence Community undertakes various efforts to provide transparency about its (foreign) intelligence activities. For example, in 2015, the ODNI adopted Principles of Intelligence Transparency and a Transparency Implementation Plan, and directed each intelligence agency to designate an Intelligence Transparency Officer to foster transparency and lead transparency initiatives (340). As part of these efforts, the Intelligence Community has made and continues to make declassified parts of policies, procedures, oversight reports, reports on activities under Section 702 FISA and EO 12333, FISC decisions and other materials public, including on a dedicated webpage ‘IC on the Record’, managed by ODNI (341). |
(173) |
Finally, the collection of personal data pursuant to Section 702 FISA is, in addition to the supervision by oversight bodies mentioned in recitals 162-168, subject to oversight by the FISC (342). Pursuant to Rule 13 of the FISC Rules of Procedure, compliance officers in U.S. intelligence agencies are required to report any violations of FISA 702 targeting, minimization, and querying procedures to the DoJ and ODNI, who in turn report them to the FISC. Moreover, the DoJ and ODNI submit semi-annual joint oversight assessment reports to the FISC, which identify targeting compliance trends; provide statistical data; describe categories of compliance incidents; describe in detail the reasons certain targeting compliance incidents occurred, and outline the measures intelligence agencies have taken to avoid recurrence (343). |
(174) |
Where necessary (e.g. if violations of targeting procedures are identified), the Court may order the relevant intelligence agency to take remedial action (344). The remedies in question may range from individual to structural measures, e.g. from terminating data acquisition and deleting of unlawfully obtained data to a change in the collection practice, including in terms of guidance and training for staff (345). Moreover, during its annual review of Section 702 certifications, the FISC considers non-compliance incidents to determine if the submitted certifications comply with FISA requirements. Similarly, if the FISC finds that the government’s certifications were not sufficient, including because of particular compliance incidents, it can issue a so-called ‘deficiency order’ requiring the government to remedy the violation within 30 days or requiring the government to cease or not begin implementing the Section 702 certification. Finally, the FISC assesses trends it observes in compliance issues and may require changes to procedures or additional oversight and reporting to address compliance trends (346). |
3.2.3. Redress
(175) |
As explained in more detail in this section, a number of avenues in the United States provide Union data subjects with the possibility to bring legal action before an independent and impartial tribunal with binding powers. Together, they allow individuals to have access to their personal data, to have the lawfulness of government access to their data reviewed and, if a violation is found, to have such violation remedied, including through the rectification or erasure of their personal data. |
(176) |
First, a specific redress mechanism is established, under EO 14086, complemented by the AG Regulation establishing the Data Protection Review Court, to handle and resolve complaints from individuals concerning U.S. signals intelligence activities. Any individual in the EU is entitled to submit a complaint to the redress mechanism concerning an alleged violation of U.S. law governing signals intelligence activities (e.g. EO 14086, Section 702 FISA, EO 12333) that adversely affects their privacy and civil liberties interests (347). This redress mechanism is available to individuals from countries or regional economic integration organisations that have been designated by the U.S. Attorney General as ‘qualifying states’ (348). On 30 June 2023, the European Union and the three European Free Trade Association countries that together constitute the European Economic Area have been designated by the Attorney General under Section 3(f) EO 14086 as a ‘qualifying state’ (349). This designation is without prejudice to Article 4(2) of the Treaty on the European Union. |
(177) |
A Union data subject who wishes to lodge such a complaint must submit it to a supervisory authority in an EU Member State competent for the oversight of the processing of personal data by public authorities (a DPA) (350). This ensures easy access to the redress mechanism by allowing individuals to turn to an authority ‘close to home’ and with which they can communicate in their own language. After the requirements for filing a complaint referred to in recital 178 have been verified, the competent DPA will channel, via the secretariat of the European Data Protection Board, the complaint to the redress mechanism. |
(178) |
Bringing a complaint to the redress mechanism is subject to low admissibility requirements, as individuals do not need to demonstrate that their data has in fact been subject to U.S. signals intelligence activities (351). At the same time, to provide a starting point for the redress mechanism to carry out a review, certain basic information must be provided, e.g. regarding the personal data reasonably believed to have been transferred to the U.S. and the means by which it was believed to have been transferred; the identities of the U.S. Government entities believed to be involved in the alleged violation (if known); the basis for alleging that a violation of U.S. law occurred (although this again does not require showing that personal data was in fact collected by U.S. intelligence agencies) and the nature of the relief sought. |
(179) |
The initial investigation of complaints to this redress mechanism is carried out by the ODNI CLPO, whose existing statutory role and powers have been expanded for those specific actions taken pursuant to EO 14086 (352). Within the Intelligence Community, the CLPO is, inter alia, responsible for ensuring that the protection of civil liberties and privacy is appropriately incorporated in policies and procedures of the ODNI and intelligence agencies; overseeing compliance by the ODNI with applicable civil liberties and privacy requirements; and conducting privacy impact assessments (353). The ODNI CLPO can only be dismissed by the Director of National Intelligence for cause, i.e. in case of misconduct, malfeasance, breach of security, neglect of duty, or incapacity (354). |
(180) |
When conducting its review, the ODNI CLPO has access to the information for his/her assessment and can rely on the compelled assistance of Privacy and Civil Liberties Officers in the different intelligence agencies (355). Intelligence agencies are prohibited from impeding or improperly influencing the ODNI CLPO’s reviews. This includes the Director of National Intelligence who must not interfere with the review (356). When reviewing a complaint, the ODNI CLPO must “apply the law impartially”, having regard to both the national security interests in signal intelligence activities and privacy protections (357). |
(181) |
As part of its review, the ODNI CLPO determines whether a violation of applicable U.S. law has occurred and, if that is the case, decides on an appropriate remediation (358). The latter refers to measures that fully redress an identified violation, such as terminating unlawful acquisition of data, deleting unlawfully collected data, deleting the results of inappropriately conducted queries of otherwise lawfully collected data, restricting access to lawfully collected data to appropriately trained personnel, or recalling intelligence reports containing data acquired without lawful authorization or that were unlawfully disseminated (359). Decisions of the ODNI CLPO on individual complaints (including on the remediation) are binding on intelligence agencies concerned (360). |
(182) |
The ODNI CLPO must maintain documentation of its review and produce a classified decision explaining the basis for its factual findings, the determination with respect to whether a covered violation occurred and the determination of the appropriate remediation (361). If the ODNI CLPO’s review reveals a violation of any authority subject to the oversight of the FISC, the CLPO must also provide a classified report to the Assistant Attorney General for National Security, who in turn under an obligation to report the non-compliance to the FISC, which can take further enforcement action (in accordance with the procedure described in recitals 173-174) (362). |
(183) |
Once the review is completed, the ODNI CLPO informs the complainant, through the national authority, that “the review either did not identify any covered violations or the ODNI CLPO issued a determination requiring appropriate remediation” (363). This allows protection of the confidentiality of activities conducted to protect national security, while providing the individuals with a decision confirming that their complaint has been duly investigated and adjudicated. This decision can moreover be challenged by the individual. To this end, (s)he will be informed of the possibility to appeal to the DPRC for a review of the CLPO’s determinations (see recitals 184 and further) and that, in case the Court would be seized, a special advocate will be selected to advocate regarding the complainant’s interest (364). |
(184) |
Any complainant, as well as each element of the Intelligence Community, may seek review of the ODNI CLPO’s decision before the Data Protection Review Court (DPRC). Such applications for review must be submitted within 60 days after receiving the notification from the ODNI CLPO that its review is complete and include any information the individual wishes to provide to the DPRC (e.g. arguments on questions of law or the application of law to the facts of the case) (365). Union data subjects may again submit their application to the competent DPA (see recital 177). |
(185) |
The DPRC is an independent tribunal established by the Attorney General on the basis of EO 14086 (366). It consists of at least six judges, appointed by the Attorney General in consultation with the PCLOB, the Secretary of Commerce and the Director of National Intelligence for renewable terms of four years (367). The appointment of judges by the Attorney General is informed by the criteria used by the executive branch when assessing candidates for the federal judiciary, giving weight to any prior judicial experience (368). In addition, the judges must be legal practitioners (i.e. active members in good standing of the bar and duly licensed to practice law) and have appropriate experience in privacy and national security law. The Attorney General must endeavour to ensure that at least half of the judges at any given time have prior judicial experience and all judges must hold security clearances to be able to access classified national security information (369). |
(186) |
Only individuals who meet the qualifications mentioned in recital 185 and are not employees of the executive branch at the time of their appointment or in the preceding two years can be appointed to the DPRC. Similarly, during their term of office at the DPRC, the judges may not have any official duties or employment within the U.S. Government (other than as judges at the DPRC) (370). |
(187) |
The independence of the adjudication process is achieved through a number of guarantees. In particular, the executive branch (the Attorney General and intelligence agencies) are barred from interfering with or improperly influencing the DPRC’s review (371). The DPRC itself is required to impartially adjudicate cases (372) and operates according to its own rules of procedure (adopted by majority vote). Moreover, DPRC judges may be dismissed only by the Attorney General and only for cause (i.e. misconduct, malfeasance, breach of security, neglect of duty or incapacity), after taking due account of the standards applicable to federal judges laid down in the Rules for Judicial-Conduct and Judicial-Disability Proceedings (373). |
(188) |
Applications to the DPRC are reviewed by panels of three judges, including a presiding judge, who must act in accordance with the Code of Conduct for U.S. Judges (374). Each panel is assisted by a Special Advocate (375), who has access to all information pertaining to the case, including classified information (376). The role of the Special Advocate is to ensure that the complainant’s interests are represented and that the DPRC panel is well informed about all relevant issues of law and fact (377). To further inform its position on an application for review to the DPRC by an individual, the Special Advocate can seek information from the complainant through written questions (378). |
(189) |
The DPRC reviews the determinations made by the ODNI CLPO (both whether a violation of applicable U.S. law occurred and as regards the appropriate remediation) based, at a minimum, on the record of the ODNI CLPO’s investigation, as well as any information and submissions provided by the complainant, the Special Advocate or an intelligence agency (379). A DPRC panel has access to all information necessary to conduct a review, which it may obtain through the ODNI CLPO (the panel may e.g. request the CLPO to supplement its record with additional information or factual findings if necessary to carry out the review) (380). |
(190) |
When concluding its review, the DPRC may (1) decide that there is no evidence indicating that signals intelligence activities occurred involving personal data of the complainant, (2) decide that the ODNI CLPO’s determinations were legally correct and supported by substantial evidence, or (3) if the DPRC disagrees with the determinations of the ODNI CLPO (whether a violation of applicable U.S. law occurred or the appropriate remediation), issue its own determinations (381). |
(191) |
In all cases, the DPRC adopts a written decision by majority vote. In case the review reveals a violation of the applicable rules, the decision will specify any appropriate remediation, which includes deleting unlawfully collected data, deleting the results of inappropriately conducted queries, restricting access to lawfully collected data to appropriately trained personnel, or recalling intelligence reports containing data acquired without lawful authorization or that were unlawfully disseminated (382). The decision of the DPRC is binding and final with respect to the complaint before it (383). Moreover, if the review reveals a violation of any authority subject to the oversight of the FISC, the DPRC must also provide a classified report to the Assistant Attorney General for National Security, who in turn is under an obligation to report the non-compliance to the FISC, which can take further enforcement action (in accordance with the procedure described in recitals 173-174) (384). |
(192) |
Each decision of a DPRC panel is transmitted to the ODNI CLPO (385). In cases where the DPRC’s review was triggered by an application from the complainant, the complainant is notified through the national authority that the DPRC completed its review and that “the review either did not identify any covered violations or the DPRC issued a determination requiring appropriate remediation” (386). The Office of Privacy and Civil Liberties of the DoJ maintains a record of all information reviewed by the DPRC and all decisions issued, which is made available for consideration as non-binding precedent for future DPRC panels (387). |
(193) |
The DoC is also required to maintain a record for each complainant who submitted a complaint (388). To enhance transparency, the DoC must, at least every five years, contact relevant intelligence agencies to verify whether information pertaining to a review by the DPRC has been declassified (389). If this is the case, the individual will be notified that such information may be available under applicable law (i.e. that (s)he may request access to under the Freedom of Information Act, see recital 199). |
(194) |
Finally, the correct functioning of this redress mechanism will be subject to regular and independent evaluation. More specifically, pursuant to EO 14086, the functioning of the redress mechanism is subject to annual review by the PCLOB, an independent body (see recital 110) (390). As part of this review, the PCLOB will, inter alia, assess whether the ODNI CLPO and DPRC has processed complaints in a timely manner; whether they have obtained full access to necessary information; whether the substantive safeguards of EO 14086 have been properly considered in the review process; and whether the Intelligence Community has fully complied with determinations made by the ODNI CLPO and DPRC. The PCLOB will produce a report on the outcome of its review to the President, Attorney General, Director of National Intelligence, head of intelligence agencies, the ODNI CLPO and congressional intelligence committees, that will also be made public in an unclassified version – and will in turn feed into the periodic review of the functioning of the present Decision that will be conducted by the Commission. The Attorney General, Director of National Intelligence, ODNI CLPO and heads of intelligence agencies are required to implement or otherwise address all recommendations included in such reports. In addition, the PCLOB will make an annual public certification as to whether the redress mechanism is processing complaints consistent with the requirements of EO 14086. |
(195) |
In addition to the specific redress mechanism established under EO 14086, redress avenues are available to all individuals (irrespective of nationality or place of residence) before ordinary U.S. courts (391). |
(196) |
In particular, FISA and a related statute provides the possibility for individuals to bring a civil action for money damages against the United States when information about them has been unlawfully and wilfully used or disclosed (392); to sue U.S. government officials acting in their personal capacity for money damages (393); and to challenge the legality of surveillance (and seek to suppress the information) in the event the U.S. government intends to use or disclose any information obtained or derived from electronic surveillance against the individual in judicial or administrative proceedings in the U.S. (394). More generally, if the government intends to use information obtained during intelligence operations against a suspect in a criminal case, constitutional and statutory requirements (395) impose obligations to disclose certain information so the defendant can challenge the legality of the Government’s collection and use of the evidence. |
(197) |
Moreover, there are several specific avenues to seek legal recourse against government officials for unlawful government access to, or use of personal data, including for purported national security purposes (i.e. the Computer Fraud and Abuse Act (396); Electronic Communications Privacy Act (397); and Right to Financial Privacy Act (398)). All of these legal actions concern specific data, targets and/or types of access (e.g. remote access of a computer via the internet) and are available under certain conditions (e.g. intentional/wilful conduct, conduct outside of official capacity, harm suffered). |
(198) |
A more general redress possibility is offered by the APA (399), according to which “any person suffering legal wrong because of agency action, or adversely affected or aggrieved by agency action”, is entitled to seek judicial review (400). This includes the possibility to ask the court to “hold unlawful and set aside agency action, findings, and conclusions found to be […] arbitrary, capricious, an abuse of discretion, or otherwise not in accordance with law” (401). For example, a federal appellate court ruled on an APA claim in 2015 that the U.S. government’s bulk collection of telephony metadata was not authorised by Section 501 FISA (402). |
(199) |
Finally, in addition to the redress avenues mentioned in recitals 176-198, any individual has the right to seek access to existing federal agency records under FOIA, including where these contain the individual's personal data (403). Gaining such access can also facilitate bringing proceedings before ordinary courts, including in support of showing standing. Agencies may withhold information that falls within certain enumerated exceptions, including access to classified national security information and information concerning law enforcement investigations (404), but complainants who are dissatisfied with the response have the possibility to challenge it by seeking administrative and, subsequently, judicial review (before federal courts) (405). |
(200) |
It follows from the above that when U.S. law enforcement and national security authorities access personal data falling within the scope of this Decision, such access is governed by a legal framework that lays down the conditions under which access can take place and ensures that access and further use of the data is limited to what is necessary and proportionate to the public interest objective pursued. These safeguards can be invoked by individuals who enjoy effective redress rights. |
4. CONCLUSION
(201) |
The Commission considers that the United States – through the Principles issued by the U.S. DoC – ensures a level of protection for personal data transferred from the Union to certified organisations in the United States under the EU-U.S. Data Privacy Framework that is essentially equivalent to the one guaranteed by Regulation (EU) 2016/679. |
(202) |
Moreover, the Commission considers that the effective application of the Principles is guaranteed by transparency obligations and the administration of the DPF by the DoC. In addition, taken as a whole, the oversight mechanisms and redress avenues in U.S. law enable infringements of the data protection rules to be identified and punished in practice and offer legal remedies to the data subject to obtain access to personal data relating to him/her and, eventually, the rectification or erasure of such data. |
(203) |
Finally, on the basis of the available information about the U.S. legal order, including the information contained in Annexes VI and VII, the Commission considers that any interference in the public interest, in particular for criminal law enforcement and national security purposes, by U.S. public authorities with the fundamental rights of the individuals whose personal data are transferred from the Union to the United States under the EU-U.S. Data Privacy Framework, will be limited to what is strictly necessary to achieve the legitimate objective in question, and that effective legal protection against such interference exists. Therefore, in the light of the above findings, it should be decided that the United States ensures an adequate level of protection within the meaning of Article 45 of Regulation (EU) 2016/679, interpreted in light of the Charter of Fundamental Rights of the European Union, for personal data transferred from the European Union to organisations certified under the EU-U.S. Data Privacy Framework. |
(204) |
Given that the limitations, safeguards and redress mechanism established by EO 14086 are essential elements of the U.S. legal framework on which the Commission’s assessment is based, the adoption of this Decision is notably based on the adoption of updated policies and procedures to implement EO 14086 by all U.S. intelligence agencies and the designation of the Union as a qualifying organisation for the purpose of the redress mechanism that have taken place respectively on 3 July 2023 (see recital 126) and 30 June 2023 (see recital 176). |
5. EFFECTS OF THIS DECISION AND ACTION OF DATA PROTECTION AUTHORITIES
(205) |
Member States and their organs are required to take the measures necessary to comply with acts of the Union institutions, as the latter are presumed to be lawful and accordingly produce legal effects until such time as they are withdrawn, annulled in an action for annulment or declared invalid following a reference for a preliminary ruling or a plea of illegality. |
(206) |
Consequently, a Commission adequacy decision adopted pursuant to Article 45(3) of Regulation (EU) 2016/679 is binding on all organs of the Member States to which it is addressed, including their independent supervisory authorities. In particular, transfers from a controller or processor in the Union to certified organisations in the United States may take place without the need to obtain any further authorisation. |
(207) |
It should be recalled that, pursuant to Article 58(5) of Regulation (EU) 2016/679 and as explained by the Court of Justice in the Schrems judgment (406), where a national data protection authority questions, including upon a complaint, the compatibility of a Commission adequacy decision with the fundamental rights of the individual to privacy and data protection, national law must provide it with a legal remedy to put those objections before a national court which may be required to make a reference for a preliminary ruling to the Court of Justice (407). |
6. MONITORING AND REVIEW OF THIS DECISION
(208) |
According to the case law of the Court of Justice (408), and as recognised in Article 45(4) of Regulation (EU) 2016/679, the Commission should continuously monitor relevant developments in the third country after the adoption of an adequacy decision in order to assess whether the third country still ensures an essentially equivalent level of protection. Such a check is required, in any event, when the Commission receives information giving rise to a justified doubt in that respect. |
(209) |
Therefore, the Commission should on an on-going basis monitor the situation in the United States as regards the legal framework and actual practice for the processing of personal data as assessed in this Decision. To facilitate this process, the U.S. authorities should promptly inform the Commission of material developments in the U.S. legal order that have an impact on the legal framework that is the object of this Decision, as well as any evolution in practices related to the processing of the personal data assessed in this Decision, both as regards the processing of personal data by certified organisations in the United States and the limitations and safeguards applicable to access to personal data by public authorities. |
(210) |
Moreover, in order to allow the Commission to effectively carry out its monitoring function, the Member States should inform the Commission about any relevant action undertaken by the national data protection authorities, in particular regarding queries or complaints by Union data subjects concerning the transfer of personal data from the Union to certified organisations in the United States. The Commission should also be informed about any indications that the actions of U.S. public authorities responsible for the prevention, investigation, detection or prosecution of criminal offences, or for national security, including any oversight bodies, do not ensure the required level of protection. |
(211) |
In application of Article 45(3) of Regulation (EU) 2016/679 (409), the Commission, following the adoption of this Decision, should periodically review whether the findings relating to the adequacy of the level of protection ensured by the United States under the EU-U.S. DPF are still factually and legally justified. Since in particular EO 14086 and the AG Regulation require the creation of new mechanisms and the implementation of new safeguards, this Decision should be subject to a first review within one year after its entry into force, to verify whether all relevant elements have been fully implemented and are functioning effectively in practice. Following that first review, and depending on its outcome, the Commission will decide in close consultation with the Committee established under Article 93(1) of Regulation (EU) 2016/679 and the European Data Protection Board on the periodicity of future reviews (410). |
(212) |
To perform the reviews, the Commission should meet with the DoC, FTC and DoT accompanied, if appropriate, by other departments and agencies involved in the implementation of the EU-U.S. DPF, as well as, for matters pertaining to government access to data, representatives of the DoJ, ODNI (including the CLPO), other Intelligence Community elements, the DPRC as well as the Special Advocates. The participation in this meeting should be open to representatives of the members of the European Data Protection Board. |
(213) |
The reviews should cover all aspects of the functioning of this Decision with respect to the processing of personal data in the United States, and in particular the application and implementation of the Principles, with special attention paid to protections afforded in case of onward transfers; relevant case law developments; the effectiveness of the exercise of individual rights; the monitoring and enforcement of compliance with the Principles; as well as the limitations and safeguards with respect to government access, notably the implementation and application of the safeguards introduced by EO 14086, including through policies and procedures developed by intelligence agencies; the interplay between the EO 14086 and Section 702 FISA and EO 12333; and the effectiveness of the oversight mechanisms and redress avenues (including the functioning of the new redress mechanism established under EO 14086). In the context of such reviews, attention will also be paid to cooperation between the DPAs and competent authorities of the United States, including the development of guidance and other interpretative tools on the application of the Principles as well as on other aspects of the functioning of the Framework. |
(214) |
On the basis of the review, the Commission should prepare a public report to be submitted to the European Parliament and the Council. |
7. SUSPENSION, REPEAL OR AMENDMENT OF THIS DECISION
(215) |
Where available information, in particular information resulting from the monitoring of this Decision or provided by U.S. or Member States’ authorities, reveals that the level of protection afforded to data transferred under this Decision may no longer be adequate, the Commission should promptly inform the competent U.S. authorities thereof and request that appropriate measures be taken within a specified, reasonable timeframe. |
(216) |
If, at the expiry of that specified timeframe, the competent U.S. authorities fail to take those measures or otherwise demonstrate satisfactorily that this Decision continues to be based on an adequate level of protection, the Commission will initiate the procedure referred to in Article 93(2) of Regulation (EU) 2016/679 with a view to partially or completely suspend or repeal this Decision. |
(217) |
Alternatively, the Commission will initiate that procedure with a view to amend the Decision, in particular by subjecting data transfers to additional conditions or by limiting the scope of the adequacy finding only to data transfers for which an adequate level of protection continues to be ensured. |
(218) |
In particular, the Commission should initiate the procedure for suspension or repeal in case of:
|
(219) |
The Commission should also consider initiating the procedure leading to the amendment, suspension or repeal of this Decision if the competent U.S. authorities fail to provide the information or clarifications necessary for the assessment of the level of protection afforded to personal data transferred from the Union to the United States, or as regards compliance with this Decision. In this respect, the Commission should take into account the extent to which the relevant information can be obtained from other sources. |
(220) |
On duly justified imperative grounds of urgency, for example if EO 14086 or the AG Regulation would be amended in a way that undermines the level of protection described in this Decision or if the Attorney General’s designation of the Union as a qualifying organisation for the purpose of the redress mechanism is withdrawn, the Commission will make use of the possibility to adopt, in accordance with the procedure referred to in Article 93(3) of Regulation (EU) 2016/679, immediately applicable implementing acts suspending, repealing or amending this Decision. |
8. FINAL CONSIDERATIONS
(221) |
The European Data Protection Board published its opinion (411), which has been taken into consideration in the preparation of this Decision. |
(222) |
The European Parliament adopted a resolution on the adequacy of the protection afforded by the EU-US Data Privacy Framework (412). |
(223) |
The measures provided for in this Decision are in accordance with the opinion of the Committee established under Article 93(1) Regulation (EU) 2016/679. |
HAS ADOPTED THIS DECISION:
Article 1
For the purpose of Article 45 of Regulation (EU) 2016/679, the United States ensures an adequate level of protection for personal data transferred from the Union to organisations in the United States that are included in the ‘Data Privacy Framework List’, maintained and made publicly available by the U.S. Department of Commerce, in accordance with Section I.3 of Annex I.
Article 2
Whenever the competent authorities in Member States, in order to protect individuals with regard to the processing of their personal data, exercise their powers pursuant to Article 58 of Regulation (EU) 2016/679 with respect to data transfers referred to in Article 1 of this Decision, the Member State concerned shall inform the Commission without delay.
Article 3
1. The Commission shall continuously monitor the application of the legal framework that is the object of this Decision, including the conditions under which onward transfers are carried out, individual rights are exercised and U.S. public authorities have access to data transferred on the basis of this Decision, with a view to assessing whether the United States continues to ensure an adequate level of protection as referred to in Article 1.
2. The Member States and the Commission shall inform each other of cases where it appears that the bodies in the United States with the statutory power to enforce compliance with the Principles set out in Annex I fail to provide effective detection and supervision mechanisms enabling infringements of the Principles set out in Annex I to be identified and punished in practice.
3. The Member States and the Commission shall inform each other of any indications that the interferences by U.S. public authorities responsible for the pursuit of national security, law enforcement or other public interests with the right of individuals to the protection of their personal data go beyond what is necessary and proportionate, and/or that there is no effective legal protection against such interferences.
4. After one year from the date of the notification of this Decision to the Member States and subsequently at a periodicity that will be decided in close consultation with the Committee established under Article 93(1) of Regulation (EU) 2016/679 and the European Data Protection Board, the Commission shall evaluate the finding referred to in Article 1(1) on the basis of all available information, including information obtained through the review carried out together with the competent authorities of the United States.
5. Where the Commission has indications that an adequate level of protection is no longer ensured, the Commission shall inform the competent U.S. authorities. If necessary, it will decide to suspend, amend or repeal this Decision, or limit its scope, in accordance with Article 45(5) of Regulation (EU) 2016/679. The Commission may also adopt such a decision if the lack of cooperation of the U.S. government prevents the Commission from determining whether the United States continues to ensure an adequate level of protection.
Article 4
This Decision is addressed to the Member States.
Done at Brussels, 10 July 2023.
For the Commission
Didier REYNDERS
Member of the Commission
(2) For ease of reference, a list of abbreviations used in this Decision is included in Annex VIII.
(3) See recital 101 of Regulation (EU) 2016/679.
(4) See, most recently, Case C-311/18, Facebook Ireland and Schrems (Schrems II) ECLI:EU:C:2020:559.
(5) Case C-362/14, Maximilian Schrems v. Data Protection Commissioner (Schrems), ECLI:EU:C:2015:650, paragraph 73.
(6) Schrems, paragraph 74.
(7) See Communication from the Commission to the European Parliament and the Council, Exchanging and Protecting Personal Data in a Globalised World, COM(2017)7 of 10.1.2017, section 3.1, pp. 6-7.
(8) Schrems, paragraph 88-89.
(9) European Data Protection Board, Adequacy Referential, WP 254 rev. 01.available at the following link: https://ec.europa.eu/newsroom/article29/item-detail.cfm?item_id=614108.
(10) Commission Implementing Decision (EU) 2016/1250 of 12 July 2016 pursuant to Directive 95/46/EC of the European Parliament and of the Council on the adequacy of the protection provided by the EU-U.S. Privacy Shield (OJ L 207, 1.8.2016, p. 1).
(11) Schrems II, paragraph 185.
(12) Schrems II, paragraph 197.
(13) 28 CFR Part 302.
(14) This Decision has EEA relevance. The Agreement on the European Economic Area (EEA Agreement) provides for the extension of the European Union’s internal market to the three EEA States Iceland, Liechtenstein and Norway. The Joint Committee Decision incorporating Regulation (EU) 2016/679 into Annex XI to the EEA Agreement was adopted by the EEA Joint Committee on 6 July 2018 and entered into force on 20 July 2018. The Regulation is thus covered by that agreement. For the purposes of the decision, references to the EU and EU Member States should thus be understood as also covering the EEA States.
(15) This Decision does not affect the requirements of Regulation (EU) 2016/679 that apply to the entities (controllers and processors) in the Union transferring the data, for instance on purpose limitation, data minimisation, transparency and data security (see also Article 44 of Regulation (EU) 2016/679).
(16) See in this respect Schrems, paragraph 81, in which the Court of Justice confirmed that a system of self-certification can ensure an adequate level of protection.
(17) Annex I, Section I.2. The FTC has broad jurisdiction over commercial activities, with some exceptions, e.g. with respect to banks, airlines, the business of insurance and common carrier activities of telecommunications service providers (although the decision of the U.S. Court of Appeals for the Ninth Circuit of 26 February 2018 in FTC v. AT&T has confirmed that the FTC has jurisdiction over non-common carrier activities of such entities). See also Annex IV, footnote 2. The DoT is competent to enforce compliance by airlines and ticket agents (for air transportation), see Annex V, under section A.
(18) Annex I, Section III.6.
(19) Annex I, Section III.2.
(20) Annex I, Section I.8.a.
(21) Annex I, Section III.14.g.
(22) Annex I, Section I.8.b.
(23) Annex I, Section I.8.c.
(24) See e.g. Annex I, Section II.2.b and Section II.3.b and 7.d, which make clear that agents act on behalf of a controller, subject to the latter’s instructions and under specific contractual obligations.
(25) Annex I, Section III.10.a. See also the guidance prepared by the DoC, in consultation with the European Data Protection Board, under the Privacy Shield, which clarified the obligations of US processors receiving personal data from the Union under the framework. As these rules have not changed, this guidance/FAQ remains relevant under the EU-U.S. DPF (https://www.privacyshield.gov/article?id=Processing-FAQs).
(26) Annex I, Section II.3.b.
(27) Annex I, Section II.5.a. Compatible purposes may include auditing, fraud prevention, or other purposes consistent with the expectations of a reasonable person given the context of the collection (see Annex I, footnote 6).
(28) Annex I, Section II.2.a. This does not apply when an organisation provides personal data to a processor acting on its behalf and under its instructions (Annex I, Section II.2.b). That said, in this case the organisation needs to have a contract in place and ensure compliance with the Accountability for Onward Transfer Principle, as described in further detail in recital 43. In addition, the Choice Principle (as well as the Notice Principle) may be restricted when personal data is processed in the context of due diligence (as part of a potential merger or takeover) or audits, to the extent and for as long as necessary to meet statutory or public interest requirements, or to the extent and for as long as the application of these Principles would prejudice the legitimate interests of the organisation in the specific context of due diligence investigations or audits (Annex I, Section III.4). Supplemental Principle 15 (Annex I, Section III.15.a and b) also foresees an exception to the Choice Principle (as well as to the Notice and Accountability for Onward Transfer Principles) for personal data from publicly available sources (unless the EU data exporter indicates that the information is subject to restrictions that require application of those principles) or personal data collected from records open to consultation by the public in general (as long as it is not combined with non-public record information and any conditions for consultation are respected). Similarly, Supplemental Principle 14 (Annex I, Section III.14.f provides an exception to the Choice Principle (as well as to the Notice and Accountability for Onward Transfer Principles) for the processing of personal data by a pharmaceutical or medical device company for product safety and efficacy monitoring activities, to the extent that adherence to the Principles interferes with compliance with regulatory requirements.
(29) This applies to all data transfers under the EU-U.S. DPF, including where these concern data collected in the context of the employment relationship. While a certified U.S. organisation may therefore in principle use human resources data for different, non-employment-related purposes (e.g. certain marketing communications), it must respect the prohibition on incompatible processing and moreover may do so only in accordance with the Notice and Choice Principles. Exceptionally, an organisation may use personal data for an additional compatible purpose without providing Notice and Choice, but only to the extent and for the period necessary to avoid prejudicing the ability of the organisation in making promotions, appointments, or other similar employment decisions (See Annex I, Section III.9.b.(iv)). The prohibition on the U.S. organisation to take any punitive action against the employee for exercising such choice, including any restriction of employment opportunities, will ensure that, despite the relationship of subordination and inherent dependency, the employee will be free from pressure and thus can exercise a genuine free choice. See Annex I, Section III.9.b.(i).
(30) Annex I, Section II,2.c.
(31) Annex I, Section II.2.c.
(32) Annex I, Section III.1.
(33) Annex I, Section II.5.
(34) See Annex I, footnote 7, which clarifies that an individual is considered ‘identifiable’ as long as an organisation or third party could reasonably identify that individual, taking into account the means of identification reasonably likely to be used (considering, among other things, the cost and the amount of time required for identification and the available technology at the time of the processing).
(35) Annex I, Section II.5.b.
(36) Ibid.
(37) Annex I, Section II.4.a. In addition, as regards human resources data, the EU-U.S. DPF requires employers to accommodate the privacy preferences of employees by restricting access to the personal data, anonymising certain data or assigning codes or pseudonyms (Annex I, Section III.9.b.(iii).
(38) Annex I, Section II.1.
(39) Annex I, Section II.1.b. Supplemental Principle 14 (Annex I, Section III.14.b and c) lays down specific provisions for the processing of personal data in the context of health research and clinical trials. In particular, this Principle allows organisations to process clinical trial data even after a person withdraws from the trial, if this was made clear in the notice provided when the individual agreed to participate. Similarly, where an EU-U.S. DPF organisation receives personal data for health research purposes, it may only use it for a new research activity in accordance with the Notice and Choice principles. In this case, the notice to the individual should in principle provide information about any future specific uses of the data (e.g. related studies). Where it is not possible to include from the outset all future uses of the data (because a new research use could arise from new insights or medical/research developments), an explanation that the data may be used in future unanticipated medical and pharmaceutical research activities must be included. If such further use is not consistent with the general research purposes for which the data was collected (i.e. if the new purposes are materially different, but still compatible with the original purpose, see recitals 14-15), new consent (i.e. opt-in) needs to be obtained. See in addition the specific restrictions/exceptions to the Notice Principle described in footnote 28.
(40) Annex I, Section III.6.d.
(41) See also the Supplemental Principle on ‘Access’ (Annex I, Section III.8).
(42) Annex I, Section III.8.a.(i)-(ii).
(43) Annex I, Section III.8.i.
(44) Annex I, Section III.8.f.(i)-(ii) and g.
(45) Annex I, Section III.4; 8.b, c, e; 14.e, f and 15.d.
(46) Annex I, Section III.8.e.(ii). The organisation must inform the individual of the reasons for the denial/restriction and provide a contact point for any further inquiries, Section III.8.a.(iii).
(47) Annex I. Section III.8.a.(ii)-(iii).
(48) Annex I, Section III.8.a.(i).
(49) Annex I, Section II.6 and III.8.a.(i).
(50) Annex I, Section III.8.12.
(51) Conversely, in the exceptional case where the U.S. organisation has a direct relationship with the Union data subject, this will typically be a consequence of it having targeted the individual in the Union by offering him or her goods or services or monitoring his or her behaviour. In this scenario, the U.S. organisation will itself fall within the scope of application of Regulation (EU) 2016/679 (Article 3(2)) and thus has to directly comply with Union data protection law.
(52) SWD(2018)497final, section 4.1.5. The study focused on (i) the extent to which Privacy Shield organisations in the U.S. take decisions affecting individuals based on automated processing of personal data transferred from companies in the EU under the Privacy Shield; and (ii) the safeguards for individuals that U.S. federal law provides for this kind of situations and the conditions for these safeguards to apply.
(53) See e.g. the Equal Credit Opportunity Act (15 U.S.C. 1691 et seq.), Fair Credit Reporting Act (15 USC § 1681 et seq.), or the Fair Housing Act (42 U.S.C. 3601 et seq.). In addition, the United States has subscribed to the Organisation for Economic Cooperation and Developent Artificial Intelligence Principles, which inter alia include principles on transparency, explain ability, security and accountability.
(54) See e.g. the guidance available at 2042-What personal health information do individuals have a right under HIPAA to access from their health care providers and health plans? | HHS.gov.
(55) See Annex I, Section II.3 and Supplemental Principle ‘Obligatory contracts for Onward Transfers’ (Annex I, Section III.10).
(56) As an exception to this general principle, an organisation may onward transfer personal data of a small number of employees without entering into a contract with the recipient for occasional employment-related operational needs, e.g. the booking of a flight, hotel room, or insurance coverage. However, also in this case, the organisation still has to comply with the Notice and Choice Principles (see Annex I, Section III.9.e).
(57) See Supplemental Principle ‘Obligatory contracts for Onward Transfers’ (Annex I, Section III.10.b). While this principle allows for transfers based also on non-contractual instruments (e.g. intra-group compliance and control programs), the text makes clear that these instruments must always “ensur[e] the continuity of protection of personal information under the Principles”. Moreover, given that the certified U.S. organisation will remain responsible for compliance with the Principles, it will have a strong incentive to use instruments that are indeed effective in practice.
(58) Individuals will have no opt-out right where the personal data is transferred to a third party that is acting as an agent to perform tasks on behalf of and under the instructions of the U.S. organisation. However, this requires a contract with the agent and the U.S. organisation will bear the responsibility to guarantee the protections provided under the Principles by exercising its powers of instruction.
(59) The situation is different depending on whether the third party is a controller or a processor (agent). In the first scenario, the contract with the third party must provide that the latter ceases processing or takes other reasonable and appropriate steps to remedy the situation. In the second scenario, it is for the EU-U.S. DPF organisation - as the one controlling the processing under whose instructions the agent operates - to take these measures. See Annex I, Section II.3.
(60) Annex I, Section II.3.b.
(61) Ibid.
(62) Annex I, Section II.7.d.
(63) See also Supplemental Principle ‘Self-Certification’ (Annex I, Section III.6).
(64) See also Supplemental Principle ‘Dispute Resolution and Enforcement’ (Annex I, Section III.11).
(65) See also Supplemental Principle ‘Verification’ (Annex I, Section III.7).
(66) Annex I, Section III.7.
(67) Annex I, Section I. 2.
(68) Annex I, Section III.6.b and Annex III, see section ‘Verify Self-Certification Requirements’.
(69) Annex I, footnote 12.
(70) Annex I, Section III.6.h.
(71) Annex I, Section III.6.a and footnote 12, as well as and Annex III, see section ‘Verify Self-Certification Requirements’.
(72) Annex III, section ‘Verify Self-Certification Requirements.
(73) Similarly, the DoC will work with the third party that will serve as the custodian of the funds collected through a fee for the DPA panel (see recital 73) to verify that organisations choosing the DPAs as their independent recourse mechanism have paid the fee for the relevant year. See Annex III, section ‘Verify Self-Certification Requirements’.
(74) Annex III, footnote 2.
(75) See Annex III, section ’Verify Self-Certification Requirements’.
(76) Information about the management of the DPF List can be found in Annex III (see the introduction under ‘Administration and Supervision of the Data Privacy Framework Program by the Department of Commerce’) and Annex I (Section I.3, Section I.4, III.6.d, and Section III.11.g).
(77) Annex III, see the introduction under ‘Administration and Supervision of the Data Privacy Framework Program by the Department of Commerce’.
(78) See Annex III, section ‘Tailor the Data Privacy Framework Website to Targeted Audiences’.
(79) See Annex III, section ‘Conduct Periodic ex officio Compliance Reviews and Assessments of the Data Privacy Framework Program’.
(80) As part of its monitoring activities, the DoC may use different tools, including to check for broken links to privacy policies or actively monitor the news for reports that provide credible evidence of non-compliance.
(81) See Annex III, section ‘Conduct Periodic ex officio Compliance Reviews and Assessments of the Data Privacy Framework Program’.
(82) See Annex III, section ‘Conduct Periodic ex officio Compliance Reviews and Assessments of the Data Privacy Framework Program’.
(83) During the second annual review of the Privacy Shield, the DoC informed that it had conducted spot checks on 100 organisations and sent compliance questionnaires in 21 cases (after which the detected issues were rectified), see Commission SWD (2018) 497 final, p. 9. Similarly, the DoC reported during the third annual review of the Privacy Shield that it had detected three incidents through its monitoring of public reports and started the practice of carrying out spot checks on 30 companies each month, which led to follow-up with compliance questionnaires in 28% of the cases (after which the detected issues were immediately rectified, or, in three cases, were resolved after a warning letter), see Commission SWD (2019) 495 final, p. 8.
(84) Annex I, Section III.11.g. A persistent failure to comply arises, in particular, where an organisation refuses to comply with a final determination by any privacy self-regulatory, independent dispute resolution, or enforcement authority.
(85) Annex I, Section III.6.f.
(86) Annex III, section ‘Search for and Address False Claims of Participation’.
(87) Ibid.
(88) Ibid.
(89) Ibid.
(90) Under the Privacy Shield, the DoC reported during the third annual review of the framework that it had identified 669 cases of false claims of participation (between October 2018 and October 2019), most of which were resolved after the DoC’s warning letter, with 143 cases being referred to the FTC (see recital 62 below). See Commission SWD (2019) 495 final, p. 10.
(91) An EU-U.S. DPF organisation has to publicly declare its commitment to comply with the Principles, disclose its privacy policies in line with these Principles and fully implement them. Failure to comply is enforceable under Section 5 of the FTC Act prohibiting unfair and deceptive acts in or affecting commerce (15 U.S.C. §45) and 49 U.S.C. §41712 prohibiting a carrier or ticket agent from engaging in an unfair or deceptive practice in air transportation or the sale of air transportation.
(92) 15 U.S.C. § 41.
(93) Annex IV.
(94) According to information from the FTC, it has no power to conduct on-site inspections in the area of privacy protection. However, it has the power to compel organisations to produce documents and provide witness statements (see Section 20 of the FTC Act), and may use the court system to enforce such orders in case of non-compliance.
(95) See Annex IV, section ‘Seeking and Monitoring Orders’.
(96) FTC or court orders may require companies to implement privacy programs and to regularly make compliance reports or independent third-party assessments of those programs available to the FTC.
(97) Annex IV, section ‘Seeking and Monitoring Orders’.
(98) Commission SWD (2019) 495 final, p. 11.
(99) See the cases listed on the FTC’s website, available via https://www.ftc.gov/business-guidance/privacy-security/privacy-shield. See also Commission SWD (2017) 344 final, p.17; Commission SWD (2018) 497 final, p. 12 and Commission SWD (2019) 495 final, p. 11.
(100) See e.g. see Prepared Remarks of Chairman Joseph Simons at the Second Privacy Shield Annual Review (ftc.gov).
(101) See e.g. the FTC’s order in Drizly, LLC., inter alia requiring the company (1) to destroy any personal data it collected that is not necessary for it to provide products or services to consumers, (2) refrain from collecting or storing personal information unless it is necessary for specific purposes outlined in a retention schedule.
(102) See e.g. the FTC order in CafePress (24 March 2022) requiring inter alia to minimize the amount of data that is collected.
(103) See e.g. the FTC’s enforcement action in Drizzly, LLC and CafePress, where it required the relevant companies to put in place a dedicated security program or specific security measures. In addition, as regards data breaches, see also the FTC order of 27 January 2023 in Chegg, the settlement reached with Equifax in 2019 (https://www.ftc.gov/news-events/news/press-releases/2019/07/equifax-pay-575-million-part-settlement-ftc-cfpb-states-related-2017-data-breach)
(104) See e.g. the case of RealPage, Inc (16 October 2018), where the FTC took enforcement action under the FCRA against a tenant screening company that provided background reports on individuals to property owners and property management companies, based on information from rental histories, public record information (including criminal and eviction histories) and credit information, which were used as a factor in determining eligibility for housing. The FTC found that the company did not take reasonable measures to ensure the accuracy of the information that it provided on the basis of its auto-decision tool.
(105) See Annex V, section ‘Enforcement Practices’.
(106) See 5 U.S.C. §§ 3105, 7521(a), 554(d) and 556(b)(3).
(107) Annex V, see section ‘Monitoring and Making Public Enforcement Orders Concerning EU-U.S. DPF Violations’.
(108) Annex I, Section II.7.
(109) Annex I, Section III.11.
(110) Annex I, Section III.11.d.(i).
(111) Annex I, Section III.11.d.(i).
(112) This is the handling authority designated by the panel of DPAs provided for in the Supplemental Principle on ‘The Role of the Data Protection Authorities’ (Annex I, Section III.5).
(113) Annex I, Section III.11.d.
(114) Annex I, Section II.7 and III.11.e.
(115) Annex I, Section III.11.d.(ii).
(116) The annual report must include: (1) the total number of EU-U.S. DPF-related complaints received during the reporting year; (2) the types of complaints received; (3) dispute resolution quality measures, such as the length of time taken to process complaints; and (4) the outcomes of the complaints received, notably the number and types of remedies or sanctions imposed.
(117) Annex I, Section ‘Verify Self-Certification Requirements’.
(118) See Annex III, section ‘Facilitate Cooperation with Alternative Dispute Resolution Bodies That Provide Principles-Related Services’. See also Annex I, Section III.11.d.(ii)-(iii).
(119) See Annex I, Section III.11.e.
(120) See Annex I, Section III.11.g, in particular points (ii) and (iii).
(121) See Annex III, section on ‘Search for and Address False Claims of Participation’.
(122) Annex I, Section II.7.b.
(123) Annex I, Section III.5.
(124) Annex I, Section III.5.c.(ii).
(125) Annex III (see section ‘Facilitate Cooperation with DPAs’) and Annex IV (see sections ‘Referral Prioritization and Investigation’ and ‘Enforcement Cooperation with EU DPAs’).
(126) The rules of procedure of the informal DPA panel should be established by the DPAs based on their competence to organise their work and cooperate among each other.
(127) Annex I, Section III.5.c.(i).
(128) Annex I, Section III.5.c.(ii).
(129) See Annex III, section ‘Facilitate Cooperation with DPAs’.
(130) See Annex IV, sections ‘Referral Prioritization and Investigation’ and ‘Enforcement Cooperation with EU DPAs’.
(131) Annex III, see e.g. section ‘Facilitate Cooperation with DPAs’.
(132) Annex I, Section II.7.e and Annex III, section ‘Facilitate Cooperation with DPAs’.
(133) Ibid.
(134) Annex I, Section III.11.g.
(135) Annex I, Section III.11.g.
(136) An EU-U.S. DPF organisation has to publicly declare its commitment to comply with the Principles, publicly disclose its privacy policies in line with these Principles and fully implement them. Failure to comply is enforceable under Section 5 of the FTC Act prohibiting unfair and deceptive acts in or affecting commerce.
(137) See also the similar commitments undertaken by the DoT, Annex V.
(138) See Annex I, Annex I ‘Arbitral Model’.
(139) See Annex I, Section II.1.a.(xi) and II.7.c.
(140) The number of arbitrators on the panel will have to be agreed between the parties.
(141) Annex I of Annex I, Section G.6.
(142) Individuals may not claim damages in arbitration, but invoking arbitration does not foreclose the option to seek damages in the ordinary U.S. courts.
(143) See e.g. state consumer protection laws in California (Cal. Civ. Code §§ 1750 - 1785 (West) Consumers Legal Remedies Act); District of Columbia (D.C. Code §§ 28-3901); Florida (Fla. Stat. §§ 501.201 - 501.213, Deceptive and Unfair Trade Practices Act); Illinois (815 Ill. Comp. Stat. 505/1 - 505/12, Consumer Fraud and Deceptive Business Practices Act); Pennsylvania (73 Pa. Stat. Ann. §§ 201-1 - 201-9.3 (West) Unfair Trade Practices and Consumer Protection Law).
(144) I.e. in case of an intentional interference with an individual’s private affairs or concerns, in a way that would be highly offensive to a reasonable person (Restatement (2nd) of Torts, §652(b)).
(145) This tort commonly applies in case of the appropriation and use of an individual’s name or likeness to advertise a business or product, or for some similar commercial purpose (see Restatement (2nd) of Torts, §652C).
(146) I.e. when information concerning the private life of an individual is made public, where this is highly offensive to a reasonable person and the information is not of legitimate concern to the public (Restatement (2nd) of Torts, §652D).
(147) This is also relevant in light of Section I.5 of Annex I. Pursuant to this Section and similarly to the GDPR, compliance with data protection requirements and rights that are part of the Privacy Principles can be subject to limitations. However, such limitations are not absolute, but can only be relied on under several conditions, for example to the extent necessary to comply with a court order or meet public interest, law enforcement, or national security requirements. In this context and for the sake of clarity, this Section also refers to the conditions set out in EO 14086 that are assessed inter alia in recitals 127-141.
(148) See Schrems II, paragraphs 174-175 and the case-law cited. See also, as regards access by public authorities of Member States, Case C-623/17 Privacy International ECLI:EU:C:2020:790, paragraph 65; and Joined Cases C-511/18, C-512/18 and C-520/18 La Quadrature du Net and Others ECLI:EU:C:2020:791, paragraph 175.
(149) See Schrems II, paragraphs 176 and 181, as well as the case-law cited. See also, as regards access by public authorities of Member States, Privacy International, paragraph 68; and La Quadrature du Net and Others, paragraph 132.
(150) See Schrems II, paragraphs 181-182.
(151) See Schrems I, paragraph 95 and Schrems II, paragraph 194. In that respect, the CJEU has notably stressed that compliance with Article 47 of the Charter of Fundamental Rights, guaranteeing the right to an effective remedy before an independent and impartial tribunal, “contributes to the required level of protection in the European Union [and] must be determined by the Commission before it adopts an adequacy decision pursuant to Article 45(1) of Regulation (EU) 2016/679” (Schrems II, paragraph 186).
(152) See Annex VI. See for instance, with respect to the Wiretap Act, Stored Communications Act and Pen Register Act (mentioned in more detail in recital 95-98), Suzlon Energy Ltd v. Microsoft Corp., 671 F.3d 726, 729 (9th Cir. 2011).
(153) Federal Rules of Criminal Procedure, 41. In a 2018 judgment, the Supreme Court confirmed that a search warrant or warrant exception is also required for law enforcement authorities to access historical cell site location records, that provide a comprehensive overview of a user’s movements and that the user can have a reasonable expectation of privacy with respect to such information (Timothy Ivory Carpenter v. United States of America, No. 16-402, 585 U.S. (2018)). As a result, such data generally cannot be obtained from a cellular company on the basis of a court order on the basis of reasonable grounds to believe that the information is relevant and material to an ongoing criminal investigation, but requires showing the existence of probable cause when a warrant is used.
(154) According to the Supreme Court, ‘probable cause’ is a “practical, non-technical” standard that calls upon the “factual and practical considerations of everyday life on which reasonable and prudent men […] act” (Illinois v. Gates, 462 U.S. 213, 232 (1983)). As regards search warrants, probable cause exists when there is a fair probability that a search will result in evidence of a crime being discovered (id).
(155) Mapp v. Ohio, 367 U.S. 643 (1961).
(156) See In re Application of United States, 610 F.2d 1148, 1157 (3d Cir. 1979) (holding that “due process requires a hearing on the issue of burdensomeness before compelling a telephone company to provide” assistance with a search warrant) and In re Application of United States, 616 F.2d 1122 (9th Cir. 1980).
(157) The Fifth Amendment to the U.S. Constitution requires grand jury indictment for any “capital or otherwise infamous crime.” The grant jury consists of 16 to 23 members, and determines whether probable cause exists to believe a crime has been committed. To reach this conclusion, grand juries are vested with investigative powers that allow them to issue subpoenas.
(158) See Annex VI.
(159) Federal Rules of Criminal Procedure, 17.
(160) United States v. Powell, 379 U.S. 48 (1964)
(161) Oklahoma Press Publishing Co. v. Walling, 327 U.S. 186 (1946).
(162) The Supreme Court has clarified that, in case of a challenge of an administrative subpoena, a court must consider whether (1) the investigation is for a lawfully authorized purpose, (2) the subpoena authority at issue is within the power of Congress to command, and (3) the “documents sought are relevant to the inquiry.” The Court also noted that an administrative subpoena request must be “reasonable”, i.e. requiring “specification of the documents to be produced adequate, but not excessive, for the purposes of the relevant inquiry,” including “particularity in ‘describing the place to be searched, and the persons or things to be seized.”
(163) For example, the Right to Financial Privacy Act provides a government authority with the power to obtain financial records held by a financial institution pursuant to an administrative subpoena only if (1) there is reason to believe that the records sought are relevant to a legitimate law enforcement inquiry and (2) a copy of the subpoena or summons has been provided to the customer together with a notice stating with reasonable specificity the nature of the inquiry (12 U.S.C. §3405). Another example is the Fair Credit Reporting Act, which prohibits consumer reporting agencies from disclosing consumer reports in response to administrative subpoena requests (and only allows them to respond to grand jury subpoena requests or court orders, 15 U.S.C. §1681 et seq.). As regards access to communication information, the specific requirements of the Stored Communications Act apply, including with respect to the possibility to use administrative subpoenas (see recitals 96-97 for a detailed overview).
(164) 18 U.S.C. §3123.
(165) 18 U.S.C. §§ 2701-2713.
(166) 18 U.S.C. §§ 2701(a)-(b)(1)(A). If the concerned subscriber or customer is notified (either in advance or, in certain circumstances, through a delayed notification), the content information stored for longer than 180 days may also be obtained on the basis of an administrative subpoena or grand jury subpoena (18 U.S.C. §§ 2701(b)(1)(B)) or a court order (if there are reasonable grounds to believe that the information relevant and material to an ongoing criminal investigation (18 U.S.C. §§ 2701(d)). However, in accordance with a federal appeals court ruling, government investigators generally obtain search warrants from judges in order to collect the contents of private communication or stored data from a commercial communications service provider. United States v. Warshak, 631 F.3d 266 (6th Cir. 2010).
(167) 18 U.S.C. § 2705(b).
(168) See the Memorandum issued by Deputy Attorney General Rod Rosenstein on 19 October 2017 on a more restrictive policy on applications for protective (or non-disclosure) orders, available at https://www.justice.gov/criminal-ccips/page/file/1005791/download.
(169) Memorandum issued by Deputy Attorney General Lisa Moncao on 27 May 2022 on a supplemental policy regarding applications for protective orders pursuant to 18 U.S.C. §2705(b).
(170) 18 U.S.C. §§ 2510-2522.
(171) Attorney General’s Guidelines for Domestic Federal Bureau of Investigation (FBI) Operations (September 2008), available at http://www.justice.gov/archive/opa/docs/guidelines.pdf. Additional rules and policies that prescribe limitations on the investigative activities of federal prosecutors are set out in the United States Attorneys’ Manual, available at http://www.justice.gov/usam/united-states-attorneys-manual. To depart from these Guidelines, prior approval must be obtained from the FBI’s Director, Deputy Director or Executive Assistant Director designated by the Director, unless such approval cannot be obtained because of the immediacy or gravity of a threat to the safety of persons or property or to national security (in which case Director or other authorising person needs to be notified as soon as practicable). Where the Guidelines are not followed, the FBI must notify the DoJ thereof, who in turn informs the Attorney General and Deputy Attorney General.
(172) Annex VI, footnote 2. See also e.g., Arnold v. City of Cleveland, 67 Ohio St.3d 35, 616 N.E.2d 163, 169 (1993) (“In the areas of individual rights and civil liberties, the United States Constitution, where applicable to the states, provides a floor below which state court decisions may not fall”); Cooper v. California, 386 U.S. 58, 62, 87 S.Ct. 788, 17 L.Ed.2d 730 (1967) (“Our holding, of course, does not affect the State's power to impose higher standards on searches and seizures than required by the Federal Constitution if it chooses to do so.”); Petersen v. City of Mesa, 63 P.3d 309, 312 (Ariz. Ct. App. 2003) (“Although the Arizona Constitution may impose stricter standards on searches and seizures than does the federal constitution, Arizona courts cannot provide less protection than does the Fourth Amendment”).
(173) The majority of states have replicated the protections of the Fourth Amendment in their constitutions. See Alabama Const. art. I, § 5); Alaska Const. art. I, § 14; 1; Arkansas Const. art. II, § 15; California Const. art. I, § 13; Colorado Const. art. II, § 7; Conneticut Const. art. I, § 7; Delaware Const. art. I, § 6; Florida. Const. art. I, § 12; Georgia Const. art. I, § I, para. XIII; Hawai Const. art. I, § 7; Idaho Const. art. I, § 17; Illinois Const. art. I, § 6; Indiana Const. art. I, § 11; Iowa Const. art. I, § 8; Kansas Const. Bill of Rights, § 15; Kentucky Const. § 10; Louisiana Const. art. I, § 5; Maine Const. art. I, § 5; Massachusets Const. Decl. of Rights art. 14; Michigan Const. art. I, § 11; Minnesota Const. art. I, § 10; Mississippi Const. art. III, § 23; Missouri Const. art. I, § 15; Montana Const. art. II, § 11; Nebraska Const. art. I, § 7; Nevad Const. art. I, § 18; New Hampshire Const. pt. 1, art. 19; N.J. Const. art. II, § 7; New Mexico Const. art. II, § 10; New York Const. art. I, § 12; North Dakota Const. art. I, § 8; Ohio Const. art. I, § 14; Oklahoma Const. art. II, § 30; Oregon Const. art. I, § 9; Pennsylvania Const. art. I, § 8; Rhode Island Const. art. I, § 6; South Carolina Const. art. I, § 10; South Dakota Const. art. VI, § 11; Tennessee Const. art. I, § 7; Texas Const. art. I, § 9; Utah Const. art. I, § 14; Vermont Const. ch. I, art. 11; West Virginia Const. art. III, § 6; Wisconsin Const. art. I, § 11; Wyoming Const. art. I, § 4. Others (e.g. Maryland, North Carolina and Virginia) have enshrined in their constitutions specific language concerning warrants that has been judicially interpreted to provide similar or higher protections to the Fourth Amendment (see Maryland. Decl. of Rts. art. 26; North Carolina Const. art. I, § 20; Virginia Const. art. I, § 10, and relevant case law, e.g. Hamel v. State, 943 A.2d 686, 701 (Md. Ct. Spec. App. 2008; State v. Johnson, 861 S.E.2d 474, 483 (N.C. 2021) and Lowe v. Commonwealth, 337 S.E.2d 273, 274 (Va. 1985)). Finally, Arizona and Washington have constitutional provisions that protect privacy more generally (Arizona Const. art. 2, § 8; Washington Const. art. I, § 7), which have been interpreted by courts as providing more protections than the Fourth Amendment (see e.g. State v. Bolt, 689 P.2d 519, 523 (Ariz. 1984), State v. Ault, 759 P.2d 1320, 1324 (Ariz. 1988), State v. Myrick, 102 Wn.2d 506, 511, 688 P.2d 151, 155 (1984) , State v. Young, 123 Wn.2d 173, 178, 867 P.2d 593, 598 (1994) ).
(174) See, e.g. California Penal Code § 1524.3(b); Rule 3.6-3.13 Alabama Rules of Criminal Procedure; Section 10.79.035; Revised Code of Washington; Section 19.2-59 of Chapter 5, Title 19.2 Criminal Procedure, Code of Virginia.
(175) I.e. “information that can be used to distinguish or trace an individual’s identity, either alone or when combined with other information that is linked or linkable to a specific individual”, see OMB Circular No. A-130, p. 33 (definition of ‘personally identifiable information’).
(176) OMB Circular No. A-130, Managing Information as a Strategic Resource, Appendix II, Responsibilities for Managing Personally Identifiable Information, 81 Fed. Reg. 49,689 (28 July 2016), p. 17.
(177) Appendix II, §5(a)-(h).
(178) 44 U.S.C. Chapter 36.
(179) 44 U.S.C. §§ 3544-3545.
(180) FAC, 44 U.S.C. § 3105.
(181) 36 C.F.R. §§ 1228.150, et seq., 1228.228, and Appendix A.
(182) See e.g. OMB Circular No. A-130; NIST SP 800-53, Rev. 5, Security and Privacy Controls for Information Systems and Organizations (10 December 2020); and the NIST Federal Information Processing Standards 200: Minimum Security Requirements for Federal Information and Information Systems.
(183) Memorandum 17-12, ‘Preparing for and Responding to a Breach of Personally Identifiable Information’ available at https://obamawhitehouse.archives.gov/sites/default/files/omb/memoranda/2017/m-17-12_0.pdf and OMB Circular No. A-130. For example, the procedures for responding to data breaches of the Department of Justice, see https://www.justice.gov/file/4336/download.
(184) FRA, 44 U.S.C. §§3101 et seq.
(185) The National Archives and Record Administration has the authority to assess agency records management practices, and may determine whether continued retention of certain records is warranted (44 U.S.C. §§ 2904(c), 2906).
(186) OMB Circular No. A-130, Section 5.f.1.(d)
(187) OMB Circular No. A-130, Appendix I §3(d).
(188) See also FBI Domestic Investigations and Operations Guide (DIOG) Section 14.
(189) AGG-DOM, Section VI, B and C; FBI Domestic Investigations and Operations Guide (DIOG) Section 14.
(190) The mechanisms mentioned in this section also apply to the collection and use of data by federal authorities for civil and regulatory purposes. Federal civil and regulatory agencies are subject to scrutiny from their respective Inspectors Generals and oversight from Congress, including the Government Accountability Office, Congress’s auditing and investigatory agency. Unless the agency has a designated Privacy and Civil Liberties Officer - a position typically found within agencies like the Department of Justice and the Department of Homeland Security (DHS) due to their law enforcement and national security responsibilities - these duties fall to the agency’s Senior Agency Official for Privacy (SAOP). All federal agencies are legally obligated to designate an SAOP, who bears the responsibility for ensuring the agency’s compliance with privacy laws and overseeing related matters. See, e.g., OMB M-16-24, Role and Designation of Senior Agency Officials for Privacy (2016).
(191) See 42 U.S.C. § 2000ee-1. This includes for instance the Department of Justice, the Department of Homeland Security and the FBI. In the DHS, additionally, a Chief Privacy Officer is responsible for preserving and enhancing privacy protections and promoting transparency within the Department (6 U.S.C. 142, Section 222). All DHS systems, technology, forms, and programs that collect personal data or have a privacy impact are subject to the oversight of the Chief Privacy Officer who has access to all records, reports, audits, reviews, documents, papers, recommendations, and other materials available to the Department, and if need be by subpoena. The Privacy Officer has to report to Congress on an annual basis on activities of the Department that affect privacy, including complaints of privacy violations.
(192) 42 U.S.C. § 2000ee-1(d).
(193) See 42 U.S.C. §§ 2000ee-1 (f)(1)-(2). For example, the report of the DOJ’s Chief Privacy and Civil Liberties Officer and the Office of Privacy and Civil Liberties covering the period October 2020- March 2021 shows that 389 privacy reviews were carried out, including of information systems and other programs (https://www.justice.gov/d9/pages/attachments/2021/05/10/2021-4-21opclsection803reportfy20sa1_final.pdf).
(194) Similarly, the Homeland Security Act of 2002 established an Office of Inspector General in the Department of Homeland Security.
(195) Inspectors General have secure tenure and may only be removed by the President who must communicate to Congress in writing the reasons for any such removal.
(196) See Inspector General Act of 1978, § 6.
(197) See in this respect for instance the overview prepared by the DoJ Office of the Inspector General of its recommendations made and the extent to which they have been implemented through department and agency follow-up actions, https://oig.justice.gov/sites/default/files/reports/22-043.pdf.
(198) See Inspector General Act of 1978, §§ 4(5), 5. For example, the Office of the Inspector General within the Department of Justice recently published its semi-annual report to Congress (1 October 2021- 31 March 2022, https://oig.justice.gov/node/23596), which provides an overview of its audits, evaluations, inspections, special reviews and investigations of DOJ programs and operations. These activities included an investigation of a former contractor regarding unlawful disclosure of electronic surveillance (the wiretapping of an individual) in an ongoing investigation, which led to the sentencing of the contractor. The Office of the Inspector General also conducted an investigation of the DOJ agencies’ information security programmes and practices, which includes testing the effectiveness of information security policies, procedures, and practices of a representative subset of agency systems.
(199) Members of the Board must be selected solely on the basis of their professional qualifications, achievements, public stature, expertise in civil liberties and privacy, and relevant experience, and without regard to political affiliation. There may in no event be more than three members of the Board that belong to the same political party. An individual appointed to the Board may not, while serving on the Board, be an elected official, officer, or employee of the Federal Government, other than in the capacity as a member of the Board. See 42 U.S.C. § 2000ee (h).
(200) 42 U.S.C. § 2000ee (g).
(201) See 42 U.S.C. § 2000ee-1 (f)(1)(A)(iii). These include at least the Department of Justice, the Department of Defense, the Department of Homeland Security, plus any other department, agency or element of the executive branch designated by the PCLOB to be appropriate for coverage.
(202) 42 U.S.C. §2000ee, (e).
(203) 42 U.S.C. § 2000ee (f).
(204) For example, the Committees organise thematic hearings (see e.g. a recent hearing of the House Judiciary Committee on “digital dragnets”, https://judiciary.house.gov/calendar/eventsingle.aspx?EventID=4983), as well as, regular oversight hearings, e.g. of the FBI and DoJ, see https://www.judiciary.senate.gov/meetings/08/04/2022/oversight-of-the-federal-bureau-of-investigation; https://judiciary.house.gov/calendar/eventsingle.aspx?EventID=4966 and https://judiciary.house.gov/calendar/eventsingle.aspx?EventID=4899.
(205) See Annex VI.
(206) OMB Circular No. A-130, Appendix II, Section 3(a) and (f), which requires federal agencies to ensure appropriate access and correction upon request of individuals, and to establish procedures to receive and address privacy-related complaints and requests.
(207) See 42 U.S.C. § 2000ee-1 as regards for instance the DoJ and the Department of Homeland Security. See also OMB Memorandum M-16-24, Role and Designation of Senior Agency Officials for Privacy.
(208) The redress mechanisms mentioned in this section also apply to the collection and use of data by federal authorities for civil and regulatory purposes.
(209) 5 U.S.C. § 702.
(210) Generally, only “final” agency action — rather than “preliminary, procedural, or intermediate” agency action — is subject to judicial review. See 5 U.S.C. § 704.
(211) 5 U.S.C. § 706(2)(A).
(212) 18 U.S.C. §§ 2701-2712.
(213) The ECPA protects communications held by two defined classes of network service providers, namely providers of: (i) electronic communication services, for instance telephony or e-mail; (ii) remote computing services like computer storage or processing services.
(214) 18 U.S.C. §§ 2510 et seq. Under the Wiretap Act (18 U.S.C. § 2520), a person whose wire, oral, or electronic communication is intercepted, disclosed, or intentionally used may bring a civil action for violation of the Wiretap Act, including under certain circumstances against an individual government official or the United States. For the collection of non-content information (e.g. IP address, e-mail to/from address), see also the Pen Registers and Trap and Trace Devices chapter of Title 18 (18 U.S.C. §§ 3121-3127 and, for civil action, § 2707).
(215) 18 U.S.C. § 1030. Under the Computer Fraud and Abuse Act, a person may bring suit against any person with respect to intentional unauthorised access (or exceeding authorised access) to obtain information from a financial institution, a U.S. government computer system or other specified computer, including under certain circumstances against an individual government official.
(216) 28 U.S.C. §§ 2671 et seq. Under the Federal Tort Claims Act, a person may bring suit, under certain circumstances, against the United States with respect to “the negligent or wrongful act or omission of any employee of the Government while acting within the scope of his office or employment”.
(217) 12 U.S.C. §§ 3401 et seq. Under the Right to Financial Privacy Act, a person may bring suit, under certain circumstances, against the United States with respect to the obtaining or disclosing of protected financial records in violation of the statute. Government access to protected financial records is generally prohibited unless the government makes the request subject to a lawful subpoena or search warrant or, subject to limitations, a formal written request and the individual whose information is sought receives notice of such a request.
(218) 15 U.S.C. §§ 1681-1681x. Under the Fair Credit Reporting Act, a person may bring suit against any person who fails to comply with requirements (in particular the need for lawful authorisation) regarding the collection, dissemination and use of consumer credit reports, or, under certain circumstances, against a government agency.
(219) 5 U.S.C. § 552.
(220) These exclusions are, however, framed. For example, according to 5 U.S.C. § 552 (b)(7), FOIA rights are ruled out for “records or information compiled for law enforcement purposes, but only to the extent that the production of such law enforcement records or information (A) could reasonably be expected to interfere with enforcement proceedings, (B) would deprive a person of a right to a fair trial or an impartial adjudication, (C) could reasonably be expected to constitute an unwarranted invasion of personal privacy, (D) could reasonably be expected to disclose the identity of a confidential source, including a State, local, or foreign agency or authority or any private institution which furnished information on a confidential basis, and, in the case of a record or information compiled by criminal law enforcement authority in the course of a criminal investigation or by an agency conducting a lawful national security intelligence investigation, information furnished by a confidential source, (E) would disclose techniques and procedures for law enforcement investigations or prosecutions, or would disclose guidelines for law enforcement investigations or prosecutions, if such disclosure could reasonably be expected to risk circumvention of the law, or (F) could reasonably be expected to endanger the life or physical safety of any individual.” Also, “[w]henever a request is made which involves access to records [the production of which could reasonably be expected to interfere with enforcement proceedings] and– (A) the investigation or proceeding involves a possible violation of criminal law; and (B) there is reason to believe that (i) the subject of the investigation or proceeding is not aware of its pendency, and (ii) disclosure of the existence of the records could reasonably be expected to interfere with enforcement proceedings, the agency may, during only such time as that circumstance continues, treat the records as not subject to the requirements of this section.” (5 U.S.C. § 552 (c)(1)).
(221) 12 U.S.C. § 3414; 15 U.S.C. §§ 1681u-1681v; and 18 U.S.C. § 2709. See recital 153.
(222) 50 U.S.C. § 1804, which concerns traditional individualized electronic surveillance.
(223) 50 U.S.C. §1822, which concerns physical searches for foreign intelligence purposes.
(224) 50 U.S.C. § 1842 with § 1841(2) and Section 3127 of Title 18, which concerns the installation of pen registers or trap and trace devices.
(225) 50 U.S.C. § 1861, which permits FBI to submit “an application for an order authorizing a common carrier, public accommodation facility, physical storage facility, or vehicle rental facility to release records in its possession for an investigation to gather foreign intelligence information or an investigation concerning international terrorism.”
(226) 50 U.S. Code § 1881a, which allows US Intelligence Community elements to seek access to information, including the content of internet communications, from U.S. companies, targeting certain non-U.S. persons outside the United States with the legally compelled assistance of electronic communication providers.
(227) EO 12333: United States Intelligence Activities, Federal Register Vol. 40, No 235 (8 December 1981 as amended 30 July 2008). EO 12333 more generally defines the goals, directions, duties and responsibilities of U.S. intelligence efforts (including the role of the various Intelligence Community elements) and sets out the general parameters for the conduct of intelligence activities.
(228) Under Article II of the U.S. Constitution, responsibility ensuring national security including in particular gathering foreign intelligence falls within the President's authority as Commander in Chief of the armed forces.
(229) EO 14086 supersedes a previous Presidential Directive, PPD 28, with the exception of its Section 3 and a complementing Annex, (which requires intelligence agencies to annually review their signals intelligence priorities and requirements, taking into account the benefits of signals intelligence activities for the U.S.’ national interests, as well as the risk posed by those activities) and Section 6 (which contains general provisions), see the National Security Memorandum on Partial Revocation of Presidential Policy Directive 28, available at https://www.whitehouse.gov/briefing-room/statements-releases/2022/10/07/national-security-memorandum-on-partial-revocation-of-presidential-policy-directive-28/
(230) See Section 5(f) EO 14086, which explains that the EO has the same scope of application as PPD-28, which, according to its footnote 3, applied to signals intelligence activities conducted in order to collect communications or information about communications, except signals intelligence activities undertaken to test or develop signals intelligence capabilities.
(231) See in this respect e.g. Section 5(h) of EO 14086, which clarifies that the safeguards in the EO create a legal entitlement and can be enforced by individuals through the redress mechanism.
(232) See Section 2(c)(iv)(C) EO 14086.
(233) https://www.intel.gov/ic-on-the-record-database/results/oversight/1278-odni-releases-ic-procedures-implementing-new-safeguards-in-executive-order-14086.
(234) Section 2(a)(i) EO 14086.
(235) Section 2(a)(ii) EO 14086.
(236) Section 2(a)(ii)(A) EO 14086. This does not always require that signals intelligence is the sole means for advancing aspects of a validated intelligence priority. For example, the collection of signals intelligence may be used to ensure alternative pathways for validation (e.g. to corroborate information received from other intelligence sources) or for maintaining reliable access to the same information (Section 2(c)(i)(A) EO 14086).
(237) Section 2(a)(ii)(B) EO 14086.
(238) Section 2(a)(ii)(B) EO 14086.
(239) Section 2(a)(iii), in conjunction with Section 2(d) EO 14086.
(240) Section 2(b)(i) EO 14086. Because of the circumscribed list of legitimate objectives in the EO, which does not encompass possible future threats, the EO provides for the possibility for the President to update this list if new national security imperatives emerge, such as new threats to national security. Such updates must in principle be publicly released, unless the President determines that doing so would itself pose a risk to the national security of the United States (Section 2(b)(i)(B) EO 14086).
(241) Section 2(b)(ii) EO 14086.
(242) Section 102A of the National Security Act and Section 2(b)(iii) EO 14086.
(243) In exceptional cases (in particular, when such process cannot be carried out because of a need to address a new or evolving intelligence requirement), such priorities can be set directly by the President or the head of an element of the Intelligence Community, who in principle have to apply the same criteria as the ones described in section 2(b)(iii)(A)(1)-(3), see Section 4(n) EO 14086.
(244) Section 2(b)(iii)(C) EO 14086.
(245) Section 2(b) and (c)(i)(A) EO 14086.
(246) Section 2(c)(i)(A) EO 14086.
(247) Section 2(c)(i)(A) EO 14086.
(248) Section 2(c)(i)(B) EO 14086.
(249) Section 2(c)(i)(B) EO 14086.
(250) I.e. the collection of large quantities of signals intelligence that, due to technical or operational considerations, is acquired without the use of discriminants (for example, without the use of specific identifiers or selection terms), see Section 4(b) EO 14086. Pursuant to EO 14086 and as further explained in recital 141, bulk collection under EO 12333 takes place only when necessary to advance specific validated intelligence priorities and is subject to a number of limitations and safeguards designed to ensure that data is not accessed on an indiscriminate basis. Bulk collection is therefore to be contrasted to collection taking place on a generalised and indiscriminate basis (‘mass surveillance’) without limitations and safeguards.
(251) Section 2(c)(ii)(A) EO 14086.
(252) Section 2(c)(ii)(A) EO 14086.
(253) The specific rules on bulk collection of EO 14086 also apply to a targeted signals intelligence collection activity that temporarily uses data acquired without discriminants (e.g. specific selection terms or identifiers), i.e. in bulk (which is only possible outside the territory of the United States). This is not the case when such data is only used to support the initial technical phase of the targeted signals intelligence collection activity, retained only for a short period of time required to complete this phase and deleted immediately thereafter (Section 2(c)(ii)(D) EO 14086). In this case, the only purpose of the initial collection without discriminants is to allow a targeted collection of information by applying a specific identifier or selection term. In such a scenario, only data that responds to the application of a certain discriminant is inserted into government databases, while the remaining data is destroyed. Such targeted collection therefore remains governed by the general rules that apply to signals intelligence collection, including Section 2(a)-(b) and 2(c)(i) EO 14086.
(254) Section 2(c)(ii)(A) EO 14086.
(255) Section 2(c)(ii)(B) EO 14086. In case new national security imperatives emerge, such as new threats to national security, the President may update this list. Such updates must in principle be publicly released, unless the President determines that doing so would in itself pose a risk to the national security of the United States (Section 2(c)(ii)(C) EO 14086). As regards queries of data collected in bulk, see Section 2(c)(iii)(D) EO 14086.
(256) Section 2(a)(ii)(A), in conjunction with Section 2(c)(iii)(D) EO 14086. See also Annex VII.
(257) 50 U.S.C. § 1881.
(258) 50 U.S.C. § 1881a (a). In particular, as noted by the PCLOB, Section 702 surveillance “consists entirely of targeting specific [non-U.S.] persons about whom an individualised determination has been made” (Privacy and Civil Liberties Oversight Board, Report on the Surveillance Program Operated Pursuant to Section 702 if the Foreign Intelligence Surveillance Act, 2 July 2014, Section 702 Report, p. 111). See also NSA CLPO, NSA's Implementation of Foreign Intelligence Act Section 702, 16 April 2014. The term ‘electronic communication service provider’ is defined in 50 U.S.C. § 1881 (a)(4).
(259) 50 U.S.C. § 1881a (g).
(260) The FISC is comprised of judges appointed by the Chief Justice of the United States from among sitting U.S. district court judges, who previously have been appointed by the President and confirmed by the Senate. The judges, who have life tenure and can only be removed for good cause, serve on the FISC for staggered seven-year terms. FISA requires that the judges be drawn from at least seven different U.S. judicial circuits. See 50 U.S.C. § 1803 (a). The judges are supported by experienced judicial law clerks that constitute the court's legal staff and prepare legal analysis on collection requests. See Letter from the Honourable Reggie B. Walton, Presiding Judge, U.S. Foreign Intelligence Surveillance Court, to the Honourable Patrick J. Leahy, Chairman, Committee on the Judiciary, U.S. Senate (29 July 2013) (Walton Letter), p. 2, available at https://fas.org/irp/news/2013/07/fisc-leahy.pdf.
(261) The FISCR is composed of judges appointed by the Chief Justice of the United States and drawn from U.S. district courts or courts of appeals, serving for a staggered seven year term. See 50 U.S.C. § 1803 (b).
(262) See 50 U.S.C. §§ 1803 (b), 1861 a (f), 1881 a (h), 1881 a (i)(4).
(263) 50 U.S.C. § 1803 (i)(1),(3)(A).
(264) 50 U.S.C. § 1803 (i)(2)(A).
(265) 50 U.S.C. § 1803 (i)(2)(B).
(266) See e.g. FISC Opinion of 18 October 2018, available athttps://www.intelligence.gov/assets/documents/702%20Documents/declassified/2018_Cert_FISC_Opin_18Oct18.pdf , as confirmed by the Foreign Intelligence Court of Review in its Opinion of 12 July 2019, available athttps://www.intelligence.gov/assets/documents/702%20Documents/declassified/2018_Cert_FISCR_Opinion_12Jul19.pdf .
(267) See e.g. FISC, Memorandum Opinion and Order at 35 (18 Nov. 2020) (Authorised for Public Release on 26 April 2021), (Annex D).
(268) 50 U.S.C. § 1881a(a), Procedures used by the National Security Agency for Targeting Non-United States Persons Reasonably Believed to be Located outside the United States to Acquire Foreign Intelligence Information Pursuant to Section 702 of the Foreign Intelligence Surveillance Act of 1978, as amended, of March 2018 (NSA targeting procedures), available athttps://www.intelligence.gov/assets/documents/702%20Documents/declassified/2018_Cert_NSA_Targeting_27Mar18.pdf , p. 1-4, further explained in PCLOB report, pp. 41-42.
(269) NSA targeting procedures, p. 4.
(270) See PCLOB, Section 702 Report, pp. 32-33, 45 with further references. See also Semiannual Assessment of Compliance with Procedures and Guidelines Issued Pursuant to Section 702 of the Foreign Intelligence Surveillance Act, Submitted by the Attorney General and the Director of National Intelligence, Reporting Period: December 1, 2016 – May 31, 2017, p. 41 (October 2018), available at: https://www.dni.gov/files/icotr/18th_Joint_Assessment.pdf.
(271) PCLOB, Section 702 Report, pp. 42-43.
(272) NSA targeting procedures, p. 2.
(273) PCLOB, Section 702 Report, p. 46. For example, the NSA must verify that there is a connection between the target and the selector, must document the foreign intelligence information expected to be acquired, this information must be reviewed and approved by two senior NSA analysts, and the overall process will be tracked for subsequent compliance reviews by the ODNI and Department of Justice. See NSA CLPO, NSA’s Implementation of Foreign Intelligence Act Section 702, 16 April 2014.
(274) 50 U.S.C. § 1881a (h).
(275) NSA targeting procedures, p. 8. See also PCLOB, Section 702 Report, p 46. Failure to provide a written justification constitutes a documentation compliance incident that must be reported to the FISC and Congress. See Semiannual Assessment of Compliance with Procedures and Guidelines Issued Pursuant to Section 702 of the Foreign Intelligence Surveillance Act, Submitted by the Attorney General and the Director of National Intelligence, Reporting Period: December 1, 2016 – May 31, 2017, p. 41 (October 2018), DOJ/ODNI Compliance Report to FISC for Dec. 2016 – May 2017 at p. A-6, available at https://www.dni.gov/files/icotr/18th_Joint_Assessment.pdf.
(276) See U.S. Government Submission to Foreign Intelligence Surveillance Court, 2015 Summary of Notable Section 702 Requirements, at 2-3 (July 15, 2015) and the information provided in Annex VII.
(277) See U.S. Government Submission to Foreign Intelligence Surveillance Court, 2015 Summary of Notable Section 702 Requirements, at 2-3 (15 July 2015), which provides that the government “[i]f the Government later assesses that the continued tasking of a target’s selector is not expected to result in the acquisition of foreign intelligence information, prompt detasking is required, and delay may result in a reportable compliance incident”. See also the information provided in Annex VII.
(278) PCLOB, Section 702 Report, pp. 70-72; Rule 13(b) of the Rules of Procedure of the United States Intelligence Surveillance Court, available at https://www.fisc.uscourts.gov/sites/default/files/FISC%20Rules%20of%20Procedure.pdf.
(279) See also DOJ/ODNI Compliance Report to FISC for Dec. 2016 – May 2017 at p. A-6.
(280) 50 U.S.C. § 1874.
(281) 50 U.S. Code § 1842(c)(3) and, as regards NSL, 12 U.S.C. § 3414(a)(2); 15 U.S.C. § 1681u; 15 U.S.C. § 1681v(a); and 18 U.S.C. § 2709(a).
(282) ‘An agent of a foreign power’ may include non-U.S. persons that engage in international terrorism or the international proliferation of weapons of mass destruction (including preparatory acts) (50 U.S.C. § 1801 (b)(1)).
(283) 50 U.S.C. § 1804. See also § 1841(4) with respect to the choice of selection terms.
(284) 50 U.S.C. § 1821(5).
(285) 50 U.S.C. § 1823(a).
(286) 50 U.S.C. § 1842 with § 1841(2) and Section 3127 of Title 18.
(287) 50 U.S.C. § 1862.
(288) 50 U.S.C. §§ 1861-1862.
(289) 50 U.S.C. § 1862(b).
(290) 12 U.S.C. § 3414; 15 U.S.C. §§ 1681u-1681v; and 18 U.S.C. § 2709.
(291) 18 U.S.C. § 2709(b).
(292) E.g., 18 U.S.C. § 2709(d).
(293) Section 2(c)(iii)(B)(1) EO 14086. See also Title VIII of the National Security Act (detailing the requirements for access to classified information), E.O. 12333 section 1.5 (requiring the Heads of Intelligence Community Agencies to follow information sharing and security guidelines, information privacy, and other legal requirements), National Security Directive 42, “National Policy for the Security of National Security Telecommunications and Information Systems” (directing the Committee on National Security Systems to provide system security guidance for national security systems to executive departments and agencies), and National Security Memorandum 8, “Improving the Cybersecurity of National Security, Department of Defense, and Intelligence Community Systems” (establishing timelines and guidance for how cybersecurity requirements will be implemented for national security systems, including multifactor authentication, encryption, cloud technologies, and endpoint detection services).
(294) Section 2(c)(iii)(B)(2) EO 14086. In addition, personal data for which no final retention determination has been made may only be accessed in order to make or support such a determination or to conduct authorised administrative, testing, development, security or oversight functions (Section 2(c)(iii)(B)(3) EO 14086.
(295) Section 2(d)(ii) EO 14086.
(296) Section 2(c)(iii)(C) EO 14086.
(297) Section 2(c)(iii)(A)(2)(a)-(c) EO 14086. More generally, each agency must put in place policies and procedures designed to minimise the dissemination and retention of personal data collected through signals intelligence (Section 2(c)(iii)(A) EO 14086).
(298) See e.g. Section 309 of the Intelligence Authorization Act for Fiscal Year 2015; minimisation procedures adopted by individual intelligence agencies under Section 702 FISA and authorised by the FISC; procedures approved by the Attorney General and the FRA (requiring U.S. federal agencies, including national security agencies, to establish retention periods for their records that must be approved by the National Archives and Record Administration).
(299) Section 2(c)(iii)(A)(1)(a) and 5(d) EO 14086, in conjunction with Section 2.3 EO 12333.
(300) Section 2(c)(iii)(A)(1)(b) and (e)EO 14086 .
(301) See e.g., the AGG-DOM for instance provides that the FBI may only disseminate information if the recipient has a need to know to accomplish the recipient’s mission or to protect the public.
(302) Section 2(c)(iii)(A)(1)(c) EO 14086. Intelligence agencies may for instance disseminate information in circumstances relevant to a criminal investigation or relating to a crime, including for example by disseminating warnings of threats of killing, serious bodily injury, or kidnapping; disseminating cyber threat, incident, or intrusion response information; and notifying victims or warning potential victims of crime.
(303) Section 2(c)(iii)(A)(1)(d) EO 14086.
(304) Section 2(c)(iii)(E) EO 14086.
(305) See CNSS Policy No. 22, Cybersecurity Risk Management Policy and CNSS Instruction 1253, which provides detailed guidance on security measures to be put in place for national security systems.
(306) Section 2(d)(i)(A)-(B) EO 14086.
(307) Sections 2(d)(i)(B)-(C) EO 14086.
(308) I.e. a systemic or intentional failure to comply with applicable U.S. law that could impugn the reputation or integrity of an element of the Intelligence Community or otherwise call into question the propriety of an Intelligence Community activity, including in light of any significant impact on the privacy and civil liberties interests of the person or persons concerned, see Section 5(l) EO 14086.
(309) Section 2(d)(iii) EO 14086.
(310) Section 2(d)(i)(B) EO 14086.
(311) See 42 U.S.C. § 2000ee-1. This includes for instance the Department of State, the Department of Justice, the Department of Homeland Security, the Department of Defense, the NSA, Central Intelligence Agency (CIA), FBI and the ODNI.
(312) See Section 3(c) EO 14086.
(313) 42 U.S.C. § 2000ee-1(d).
(314) See 42 U.S.C. § 2000ee-1 (f)(1),(2). For example the report of the NSA’s Civil Liberties, Privacy and Transparency Office covering January 2021 – June 2021 shows that it carried out 591 reviews for civil liberties and privacy impacts in various contexts, e.g. with respect to collection activities, information-sharing arrangements and decisions, data retention decisions, etc., taking into account different factors, such as the amount and type of information associated with the activity, the individuals involved, the purpose and anticipated use for the data, the safeguards in place to mitigate potential risks to privacy, etc. (https://media.defense.gov/2022/Apr/11/2002974486/-1/-1/1/REPORT%207_CLPT%20JANUARY%20-%20JUNE%202021%20_FINAL.PDF). Similarly, the reports of the CIA’s Office of Privacy and Civil Liberties for January – June 2019 provide information on the Office’s oversight activities, e.g. a review of compliance with Attorney General Guidelines under EO 12333 with respect to the retention and dissemination of information, guidance provided on the implementation of PPD 28 and requirements to identify and address data breaches, and reviews of the use and handling of personal information (https://www.cia.gov/static/9d762fbef6669c7e6d7f17e227fad82c/2019-Q1-Q2-CIA-OPCL-Semi-Annual-Report.pdf).
(315) This Inspector General is appointed by the President, with Senate confirmation, and can be removed only by the President.
(316) Inspectors General have secure tenure and may only be removed by the President who must communicate to Congress in writing the reasons for any such removal. This does not necessarily mean that they are completely free from instructions. In some cases, the head of the department may prohibit the Inspector General from initiating, carrying out, or completing an audit or investigation where this is considered necessary to preserve important national (security) interests. However, Congress must be informed of the exercise of this authority and on this basis could hold the respective director responsible. See, e.g. Inspector General Act of 1978, § 8 (for the Department of Defense); § 8E (for the DOJ), § 8G (d)(2)(A),(B) (for the NSA); 50. U.S.C. § 403q (b) (for the CIA); Intelligence Authorization Act For Fiscal Year 2010, Sec 405(f) (for the Intelligence Community).
(317) Inspector General Act of 1978, as amended, Pub. L. 117-108 of 8 April 2022. For example, as explained in its semi-annual reports to Congress covering the period 1 April 2021 to 31 March 2022, the NSA Inspector General carried out evaluations of the handling of U.S. person information collected under EO 12333, the process to purge signals intelligence data, an automated targeting tool used by the NSA, and compliance with documentation and querying rules with respect to Section 702 FISA collection, and issued several recommendations in this context (see https://oig.nsa.gov/Portals/71/Reports/SAR/NSA%20OIG%20SAR%20-%20APR%202021%20-%20SEP%202021%20-%20Unclassified.pdf?ver=IwtrthntGdfEb-EKTOm3gg%3d%3d, pp. 5-8 and https://oig.nsa.gov/Portals/71/Images/NSAOIGMAR2022.pdf?ver=jbq2rCrJ00HJ9qDXGHqHLw%3d%3d×tamp=1657810395907, pp. 10-13). See also the recent audits and investigations carried out by the Inspector General of the Intelligence Community on information security and unauthorised disclosures of classified national security information (https://www.dni.gov/files/ICIG/Documents/Publications/Semiannual%20Report/2021/ICIG_Semiannual_Report_April_2021_to_September_2021.pdf, pp. 8, 11 and https://www.dni.gov/files/ICIG/Documents/News/ICIGNews/2022/Oct21_SAR/Oct%202021-Mar%202022%20ICIG%20SAR_Unclass_FINAL.pdf, pp. 19-20).
(318) See Inspector General Act of 1978, § 6.
(319) See ibid. §§ 4, 6-5.
(320) As regards the follow-up that is provided to reports and recommendations of Inspectors General, see e.g. the response to a report of the DoJ Inspector General that found that the FBI was not sufficiently transparent with the FISC in applications from 2014 to 2019, which led to reforms to enhance compliance, oversight, and accountability at the FBI (e.g. the FBI Director ordered more than 40 corrective actions, including 12 specific to the FISA process relating to documentation, supervision, file maintenance, training and audits) (see https://www.justice.gov/opa/pr/department-justice-and-federal-bureau-investigation-announce-critical-reforms-enhance and https://oig.justice.gov/reports/2019/o20012.pdf). See for instance also the DoJ Inspector General's audit of the FBI Office of the General Counsel's roles and responsibilities in overseeing compliance with applicable laws, policies, and procedures relating to the FBI’s national security activities and Appendix 2, which includes a letter from the FBI accepting all recommendations. In this respect, Appendix 3 provides an overview of the follow-up action and information the Inspector General required from the FBI in order to be able to close its recommendations (https://oig.justice.gov/sites/default/files/reports/22-116.pdf).
(321) See Inspector General Act of 1978, §§ 4(5), 5.
(322) See EO 13462.
(323) Section 1.6(c) EO 12333.
(324) Section 8(a) EO 13462.
(325) Section 6(b) EO 13462.
(326) 42 U.S.C. § 2000ee (g).
(327) See 42 U.S.C. § 2000ee-1 (f)(1)(A)(iii). These include at least the Department of Justice, the Department of Defense, the Department of Homeland Security, the Director of National Intelligence and the Central Intelligence Agency, plus any other department, agency or element of the executive branch designated by the PCLOB to be appropriate for coverage.
(328) 42 U.S.C. §2000ee (e).
(329) 42 U.S.C. § 2000ee (f).
(330) Available at https://www.pclob.gov/Oversight.
(331) 50 U.S.C. § 3091.
(332) For example, the Committees organise thematic hearings (see e.g. a recent hearing of the House Judiciary Committee on “digital dragnets”, https://judiciary.house.gov/calendar/eventsingle.aspx?EventID=4983, and a hearing of the House Intelligence Committee on the use of AI by the Intelligence Community, https://docs.house.gov/Committee/Calendar/ByEvent.aspx?EventID=114263) regular oversight hearings, e.g. of the FBI and DoJ national security division, see https://www.judiciary.senate.gov/meetings/08/04/2022/oversight-of-the-federal-bureau-of-investigation; https://judiciary.house.gov/calendar/eventsingle.aspx?EventID=4966 and https://judiciary.house.gov/calendar/eventsingle.aspx?EventID=4899. As an example of an investigation, see the Senate Intelligence Committee investigation of Russian interference in the 2016 U.S. elections, see https://www.intelligence.senate.gov/publications/report-select-committee-intelligence-united-states-senate-russian-active-measures. In terms of reporting, see e.g. the overview of the Committee’s (oversight) activities in the report of the Senate Intelligence Committee covering the period 4 January 2019 – 3 January 2021 to the Senate, https://www.intelligence.senate.gov/publications/report-select-committee-intelligence-united-states-senate-covering-period-january-4.
(333) See 50 U.S.C. § 3091(a)(1). This provision contains the general requirements as regards Congressional oversight in the area of national security.
(334) See 50 U.S.C. §3091(b).
(335) See 50 U.S.C. §§ 1808, 1846, 1862, 1871, 1881f.
(336) See 50 U.S.C. § 1881f.
(337) See 50 U.S.C. § 1881a(l)(1).
(338) 50 U.S.C. § 1873(b). In addition, according to Section 402, “the Director of National Intelligence, in consultation with the Attorney General, shall conduct a declassification review of each decision, order, or opinion issued by the Foreign Intelligence Surveillance Court or the Foreign Intelligence Surveillance Court of Review (as defined in section 601(e)) that includes a significant construction or interpretation of any provision of law, including any novel or significant construction or interpretation of the term “specific selection term”, and, consistent with that review, make publicly available to the greatest extent practicable each such decision, order, or opinion”.
(339) 50 U.S.C. §§ 1873(b)(7) and 1874.
(340) https://www.dni.gov/index.php/ic-legal-reference-book/the-principles-of-intelligence-transparency-for-the-ic.
(341) See ‘IC on the Record’, available at https://icontherecord.tumblr.com/.
(342) In the past, the FISC concluded that “[i]t is apparent to the Court that the implementing agencies, as well as [ODNI] and [DOJ’s National Security Division], devote substantial resources to their compliance and oversight responsibilities under Section 702. As a general rule, instances of non-compliance are identified promptly and appropriate remedial actions are taken, to include purging information that was improperly obtained or otherwise subject to destruction requirements under applicable procedures”. FISA Court, Memorandum Opinion and Order [caption redacted] (2014), available at https://www.dni.gov/files/documents/0928/FISC%20Memorandum%20Opinion%20and%20Order%2026%20August%202014.pdf.
(343) See, e.g., DOJ/ODNI FISA 702 Compliance Report to FISC for June 2018 – Nov. 2018 at 21-65.
(344) 50 U.S.C. § 1803(h). See also PCLOB, Section 702 Report, p. 76. In addition, see FISC Memorandum Opinion and Order of 3 October 2011 as an example of a deficiency order in which the government was ordered to correct the identified deficiencies within 30 days. Available at https://www.dni.gov/files/documents/0716/October-2011-Bates-Opinion-and%20Order-20140716.pdf. See Walton Letter, Section 4, pp. 10 -11. See also FISC Opinion of 18 October 2018, available at https://www.intelligence.gov/assets/documents/702%20Documents/declassified/2018_Cert_FISC_Opin_18Oct18.pdf, as confirmed by the Foreign Intelligence Court of Review in its Opinion of 12 July 2019, available at https://www.intelligence.gov/assets/documents/702%20Documents/declassified/2018_Cert_FISCR_Opinion_12Jul19.pdf, in which the FISC inter alia ordered the government to comply with certain notification, documentation and reporting requirements towards the FISC.
(345) See e.g. FISC, Memorandum Opinion and Order at 76 (6 Dec. 2019) (Authorised for Public Release on 4 September 2020), in which the FISC directed the government to submit a written report by 28 February 2020 on the steps the government was taking to improve processes for identifying and removing reports derived from FISA 702 information that were recalled for compliance reasons, as well as on other matters. See also Annex VII.
(346) See Annex VII.
(347) See Section 4(k)(iv) EO 14086, which provides that a complaint to the redress mechanism must be brought by a complainant acting on his/her own behalf (i.e. not as a representative of a government, nongovernmental or intergovernmental organisation). The notion of “adversely affected” does not require the complainant to meet a certain threshold in order to have access to the redress mechanism (see recital 178 in this regard). Rather, it clarifies that the ODNI CLPO and DPRC have the authority to remediate violations of U.S. law governing signals intelligence activities that adversely affect a complainant’s individual privacy and civil liberties interests. Conversely, violations of requirements under applicable US law that are not designed to protect individuals (e.g. budgetary requirements), would fall outside the jurisdiction of the ODNI CLPO and DPRC.
(348) Section 3(f) EO 14086.
(349) https://www.justice.gov/opcl/executive-order-14086.
(350) Section 4(d)(v) EO 14086.
(351) See Section 4(k)(i)-(iv) EO 14086.
(352) Section 3(c)(iv) EO 14086. See also National Security Act 1947, 50 U.S.C. §403-3d, Section 103D concerning the role of the CLPO within the ODNI.
(353) 50 U.S.C § 3029 (b).
(354) Section 3(c)(iv) EO 14086.
(355) Section 3(c)(iii) EO 14086.
(356) Section 3(c)(iv) EO 14086.
(357) Section 3(c)(i)(B)(i) and (iii) EO 14086.
(358) Section 3(c)(i) EO 14086.
(359) Section 4(a) EO 14086.
(360) Section 3(c)(d) EO 14086.
(361) Section 3(c)(i)(F)-(G) EO 14086.
(362) See also Section 3(c)(i)(D) EO 14086.
(363) Section 3(c)(i)(E)(1) EO 14086.
(364) Sections 3(c)(i)(E)(2)-(3) EO 14086.
(365) Sections 201.6(a)-(b) AG Regulation.
(366) Section 3(d)(i)) and the AG Regulation. The Supreme Court of the United States has recognised the possibility for the Attorney General to establish independent bodies with decision-making power, including to adjudicate individual cases, see in particular United States ex rel. Accardi v. Shaughnessy, 347 U.S. 260 (1954) and United States v. Nixon, 418 U.S. 683, 695 (1974). Compliance with the different requirements of EO 14086, e.g. the criteria and procedure for appointment and dismissal of DPRC judges, is notably subject to the supervision of the Inspector General of the Department of Justice (see also recital 109 on the statutory authority of Inspectors General).
(367) Section 3(d)(i)(A) EO 14086 and Section 201.3(a) AG Regulation.
(368) Section 201.3(b) AG Regulation.
(369) Section 3(d)(i)(B) EO 14086.
(370) Section 3(d)(i)(A) EO 14086 and Section 201.3(a) and (c) AG Regulation. Individuals appointed to the DPRC may participate in extrajudicial activities, including business, financial activities, non-profit fundraising and fiduciary activities, as well as the practice of law, as long as such activities do not interfere with the impartial performance of their duties or the effectiveness or independence of the DPRC (Section 201.7(c) AG Regulation).
(371) Sections 3(d)(iii)-(iv) EO 14086 and Section 201.7(d) AG Regulation.
(372) Section 3(d)(i)(D) EO 14086 and Section 201.9 AG Regulation.
(373) Section 3(d)(iv) EO 14086 and Section 201.7(d) AG Regulation. See also Bumap v. United States, 252 U.S. 512, 515 (1920), which confirmed the long-standing principle in US law that the power of removal is incident to the power to appoint (as also recalled by the Office of Legal Counsel of the DoJ in The Constitutional Separation of Powers Between the President and Congress, 20 Op. O.L.C. 124, 166 (1996)).
(374) Section 3(d)(i)(B) EO 14086 and Section 201.7(a)-(c) AG Regulation. The Office of Privacy and Civil Liberties of the Department of Justice (OPCL), which is responsible for providing administrative support to the DPRC and the Special Advocates (see Section 201.5 AG Regulation), selects a three-person panel on a rotating basis, seeking to ensure that each panel has at least one judge with prior judicial experience (if none of the judges on the panel has such experience, the presiding judge will be the judge first selected by the OPCL).
(375) Section 201.4 AG Regulation. At least two Special Advocates are appointed by the Attorney General, in consultation with the Secretary of Commerce, the Director of National intelligence, and the PCLOB, for two-renewable terms. Special Advocates must have appropriate experience in the field of privacy and national security law, be experienced attorneys, active members in good standing of the bar and duly licensed to practice law. In addition, at the time of their initial appointment, they must not have been employees of the Executive Branch for the preceding two years. For each review of an application, the presiding judge selects a Special Advocate to assist the panel, see Section 201.8(a) AG Regulation.
(376) Section 201.8(c) and 201.11 AG Regulation.
(377) Section 3(d)(i)(C) EO 14086 and Section 201.8(e) AG Regulation. The Special Advocate does not act as an agent of or have an attorney-client relationship with the complainant.
(378) See Section 201.8(d)(e) AG Regulation. Such questions are first reviewed by the OPCL, in consultation with the relevant Intelligence Community element, with a view to identify and exclude any classified or privileged or protected information before forwarding it to complainant. Additional information received by the Special Advocate in response to such questions is included in the submissions of the Special Advocate to the DPRC.
(379) Section 3(d)(i)(D) EO 14086.
(380) Section 3(d)(iii) EO 14086 and Section 201.9(b) AG Regulation.
(381) Section 3(d)(i)(E) EO 14086 and Section 201.9(c)-(e) AG Regulation. According to the definition of ‘appropriate remediation’, inSection 4(a) EO 14086, the DPRC must take into account “the ways that a violation of the kind identified have customarily been addressed” when deciding on a remedial measure to fully address a violation, i.e. the DPRC will consider, among other factors, how similar compliance issues were remedied in the past to ensure that the remedy is effective and appropriate.
(382) Section 4(a) EO 14086.
(383) Section 3(d)(ii) EO 14086 and Section 201.9(g) AG Regulation. Given that the decision of the DPRC is final and binding, no other executive or administrative institution/body (including the President of the United States) can overrule the DPRC’s decision. This was also confirmed in case law of the Supreme Court, which clarified that, by delegating the Attorney General's unique authority within the Executive Branch to issue binding decisions to an independent body, the Attorney General denies himself the ability to dictate the decision of that body in any way (see United States ex rel. Accardi v. Shaughnessy, 347 U.S. 260 (1954).
(384) Section 3(d)(i)(F) EO 14086 and Section 201.9(i) AG Regulation.
(385) Section 201.9(h) AG Regulation.
(386) Section 3(d)(i)(H) EO 14086 and Section 201.9(h) AG Regulation. As regards the nature of the notification see Section 201.9 (h)(3) AG Regulation.
(387) Section 201.9(j) Ag Regulation.
(388) Section 3(d)(v)(A) EO 14086.
(389) Section 3(d)(v) EO 14086.
(390) Section 3(e) EO 14086. See also https://documents.pclob.gov/prod/Documents/EventsAndPress/4db0a50d-cc62-4197-af2e-2687b14ed9b9/Trans-Atlantic%20Data%20Privacy%20Framework%20EO%20press%20release%20(FINAL).pdf.
(391) Access to these avenues is subject to the showing of ‘standing’. This standard, which applies to any individual regardless of nationality, stems from the ‘case or controversy’ requirement of the U.S. Const., Article III. According to the Supreme Court, this requires that (1) the individual has suffered an ‘injury in fact’ (i.e. an injury of a legally protected interested that is concrete and particularised and actual or imminent), (2) there is a causal connection between the injury and the conduct challenged before the court, and (3) it is likely, rather than speculative, that a favourable decision by the court will address the injury (see Lujan v. Defenders of Wildlife, 504 U.S. 555 (1992)).
(392) 18 U.S.C. § 2712.
(393) 50 U.S.C. § 1810.
(394) 50 U.S.C. § 1806.
(395) See, respectively, Brady v. Maryland, 373 U.S. 83 (1963) and the Jencks Act, 18 U.S.C. § 3500.
(396) 18 U.S.C. § 1030.
(397) 18 U.S.C. §§ 2701-2712.
(398) 12 U.S.C. § 3417.
(399) 5 U.S.C. § 702.
(400) Generally, only “final” agency action — rather than “preliminary, procedural, or intermediate” agency action — is subject to judicial review. See 5 U.S.C. § 704.
(401) 5 U.S.C. § 706(2)(A).
(402) ACLU v. Clapper, 785 F.3d 787 (2d Cir. 2015), The bulk telephony collection program challenged in these cases was terminated by the USA FREEDOM Act in 2015.
(403) 5 U.S.C. § 552. Similar laws exist at State level.
(404) If this is the case, the individual will normally only receive a standard reply by which the agency declines either to confirm or deny the existence of any records. See ACLU v CIA, 710 F.3d 422 (D.C. Cir. 2014). The criteria for and duration of classification are laid down in Executive Order 13526, which provides, as a general rule, that a specific date or event for declassification must be established based on the duration of the national security sensitivity of the information, at which time the information must be automatically declassified (see Section 1.5 of EO 13526).
(405) The court makes a de novo determination of whether records are lawfully withheld and can compel the government to provide access to records (5 U.S.C. § 552(a)(4)(B)).
(406) Schrems, paragraph 65.
(407) Schrems, paragraph 65: “It is incumbent upon the national legislature to provide for legal remedies enabling the national supervisory authority concerned to put forward the objections which it considers well founded before the national courts in order for them, if they share its doubts as to the validity of the Commission decision, to make a reference for a preliminary ruling for the purpose of examination of the decision’s validity.”
(408) Schrems, paragraph 76.
(409) According to Article 45(3) Regulation (EU) 2016/679, “[t]he implementing act shall provide for a mechanism for a periodic review, […] which shall take into account all relevant developments in the third country or international organisation.”
(410) Article 45(3) Regulation (EU) 2016/679 provides that a periodic review must take place “at least every four years”. See also European Data Protection Board, Adequacy Referential, WP 254 rev. 01.
(411) Opinion 5/2023 on the European Commission Draft Implementing Decision on the adequate protection of personal data under the EU-US Data Privacy Framework of 28 February 2023.
(412) European Parliament Resolution of 11 May 2023 on the adequacy of the protection afforded by the EU-US Data Privacy Framework (2023/2501(RSP).
ANNEX I
EU-U.S. DATA PRIVACY FRAMEWORK PRINCIPLES ISSUED BY THE U.S. DEPARTMENT OF COMMERCE
I. OVERVIEW
1. |
While the United States and the European Union (the “EU”) share a commitment to enhancing privacy protection, the rule of law, and a recognition of the importance of transatlantic data flows to our respective citizens, economies, and societies, the United States takes a different approach to privacy protection from that taken by the EU. The United States uses a sectoral approach that relies on a mix of legislation, regulation, and self-regulation. The U.S. Department of Commerce (“the Department”) is issuing the EU-U.S. Data Privacy Framework Principles, including the Supplemental Principles (collectively “the Principles”) and Annex I of the Principles (“Annex I”), under its statutory authority to foster, promote, and develop international commerce (15 U.S.C. § 1512). The Principles were developed in consultation with the European Commission (“the Commission”), industry, and other stakeholders to facilitate trade and commerce between the United States and EU. The Principles, a key component of the EU-U.S. Data Privacy Framework (“EU-U.S. DPF”), provide organizations in the United States with a reliable mechanism for personal data transfers to the United States from the EU while ensuring that EU data subjects continue to benefit from effective safeguards and protection as required by European legislation with respect to the processing of their personal data when they have been transferred to non-EU countries. The Principles are intended for use solely by eligible organizations in the United States receiving personal data from the EU for the purpose of qualifying for the EU-U.S. DPF and thus benefitting from the Commission’s adequacy decision. (1) The Principles do not affect the application of the Regulation (EU) 2016/679 (“the General Data Protection Regulation” or “the GDPR”) (2) that applies to the processing of personal data in the EU Member States. Nor do the Principles limit privacy obligations that otherwise apply under U.S. law. |
2. |
In order to rely on the EU-U.S. DPF to effectuate transfers of personal data from the EU, an organization must self-certify its adherence to the Principles to the Department (or its designee). While decisions by organizations to thus enter the EU-U.S. DPF are entirely voluntary, effective compliance is compulsory: organizations that self-certify to the Department and publicly declare their commitment to adhere to the Principles must comply fully with the Principles. In order to enter the EU-U.S. DPF, an organization must (a) be subject to the investigatory and enforcement powers of the Federal Trade Commission (the “FTC”), the U.S. Department of Transportation (the “DOT”) or another statutory body that will effectively ensure compliance with the Principles (other U.S. statutory bodies recognized by the EU may be included as an annex in the future); (b) publicly declare its commitment to comply with the Principles; (c) publicly disclose its privacy policies in line with these Principles; and (d) fully implement them (3). An organization’s failure to comply is enforceable by the FTC under Section 5 of the Federal Trade Commission (FTC) Act prohibiting unfair or deceptive acts in or affecting commerce (15 U.S.C. § 45); by the DOT under 49 U.S.C. § 41712 prohibiting a carrier or ticket agent from engaging in an unfair or deceptive practice in air transportation or the sale of air transportation; or under other laws or regulations prohibiting such acts. |
3. |
The Department will maintain and make available to the public an authoritative list of U.S. organizations that have self-certified to the Department and declared their commitment to adhere to the Principles (“the Data Privacy Framework List”). EU-U.S. DPF benefits are assured from the date that the Department places the organization on the Data Privacy Framework List. The Department will remove from the Data Privacy Framework List those organizations that voluntarily withdraw from the EU-U.S. DPF or fail to complete their annual re-certification to the Department; these organizations must either continue to apply the Principles to the personal information they received under the EU-U.S. DPF and affirm to the Department on an annual basis their commitment to do so (i.e., for as long as they retain such information), provide “adequate” protection for the information by another authorized means (for example, using a contract that fully reflects the requirements of the relevant standard contractual clauses adopted by the Commission), or return or delete the information. The Department will also remove from the Data Privacy Framework List those organizations that have persistently failed to comply with the Principles; these organizations must return or delete the personal information they received under the EU-U.S. DPF. An organization’s removal from the Data Privacy Framework List means it is no longer entitled to benefit from the Commission’s adequacy decision to receive personal information from the EU. |
4. |
The Department will also maintain and make available to the public an authoritative record of U.S. organizations that had previously self-certified to the Department, but that have been removed from the Data Privacy Framework List. The Department will provide a clear warning that these organizations are not participants in the EU-U.S. DPF; that removal from the Data Privacy Framework List means that such organizations cannot claim to be EU-U.S. DPF compliant and must avoid any statements or misleading practices implying that they participate in the EU-U.S. DPF; and that such organizations are no longer entitled to benefit from the Commission’s adequacy decision to receive personal information from the EU. An organization that continues to claim participation in the EU-U.S. DPF or makes other EU-U.S. DPF-related misrepresentations after it has been removed from the Data Privacy Framework List may be subject to enforcement action by the FTC, the DOT, or other enforcement authorities. |
5. |
Adherence to these Principles may be limited: (a) to the extent necessary to comply with a court order or meet public interest, law enforcement, or national security requirements, including where statute or government regulation create conflicting obligations; (b) by statute, court order, or government regulation that creates explicit authorizations, provided that, in exercising any such authorization, an organization can demonstrate that its non-compliance with the Principles is limited to the extent necessary to meet the overriding legitimate interests furthered by such authorization; or (c) if the effect of the GDPR is to allow exceptions or derogations, under the conditions set out therein, provided such exceptions or derogations are applied in comparable contexts. In this context, safeguards in U.S. law to protect privacy and civil liberties include those required by Executive Order 14086 (4) under the conditions set out therein (including its requirements on necessity and proportionality). Consistent with the goal of enhancing privacy protection, organizations should strive to implement these Principles fully and transparently, including by endeavouring to indicate in their privacy policies where exceptions to the Principles permitted by (b) above will apply. For the same reason, where the option is allowable under the Principles and/or U.S. law, organizations are expected to opt for the higher protection where possible. |
6. |
Organizations are obligated to apply the Principles to all personal data transferred in reliance on the EU-U.S. DPF after they enter the EU-U.S. DPF. An organization that chooses to extend EU-U.S. DPF benefits to human resources personal information transferred from the EU for use in the context of an employment relationship must indicate this when it self-certifies to the Department and conform to the requirements set forth in the Supplemental Principle on Self-Certification. |
7. |
U.S. law will apply to questions of interpretation and compliance with the Principles and relevant privacy policies by organizations participating in the EU-U.S. DPF, except where such organizations have committed to cooperate with EU data protection authorities (“DPAs”). Unless otherwise stated, all provisions of the Principles apply where they are relevant. |
8. |
Definitions:
|
9. |
The effective date of the Principles and Annex I of the Principles is the date of entry into force of the European Commission’s adequacy decision. |
II. PRINCIPLES
1. NOTICE
a. |
An organization must inform individuals about:
|
b. |
This notice must be provided in clear and conspicuous language when individuals are first asked to provide personal information to the organization or as soon thereafter as is practicable, but in any event before the organization uses such information for a purpose other than that for which it was originally collected or processed by the transferring organization or discloses it for the first time to a third party. |
2. CHOICE
a. |
An organization must offer individuals the opportunity to choose (i.e., opt out) whether their personal information is (i) to be disclosed to a third party or (ii) to be used for a purpose that is materially different from the purpose(s) for which it was originally collected or subsequently authorized by the individuals. Individuals must be provided with clear, conspicuous, and readily available mechanisms to exercise choice. |
b. |
By derogation to the previous paragraph, it is not necessary to provide choice when disclosure is made to a third party that is acting as an agent to perform task(s) on behalf of and under the instructions of the organization. However, an organization shall always enter into a contract with the agent. |
c. |
For sensitive information (i.e., personal information specifying medical or health conditions, racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership or information specifying the sex life of the individual), organizations must obtain affirmative express consent (i.e., opt in) from individuals if such information is to be (i) disclosed to a third party or (ii) used for a purpose other than those for which it was originally collected or subsequently authorized by the individuals through the exercise of opt-in choice. In addition, an organization should treat as sensitive any personal information received from a third party where the third party identifies and treats it as sensitive. |
3. ACCOUNTABILITY FOR ONWARD TRANSFER
a. |
To transfer personal information to a third party acting as a controller, organizations must comply with the Notice and Choice Principles. Organizations must also enter into a contract with the third-party controller that provides that such data may only be processed for limited and specified purposes consistent with the consent provided by the individual and that the recipient will provide the same level of protection as the Principles and will notify the organization if it makes a determination that it can no longer meet this obligation. The contract shall provide that when such a determination is made the third party controller ceases processing or takes other reasonable and appropriate steps to remediate. |
b. |
To transfer personal data to a third party acting as an agent, organizations must: (i) transfer such data only for limited and specified purposes; (ii) ascertain that the agent is obligated to provide at least the same level of privacy protection as is required by the Principles; (iii) take reasonable and appropriate steps to ensure that the agent effectively processes the personal information transferred in a manner consistent with the organization’s obligations under the Principles; (iv) require the agent to notify the organization if it makes a determination that it can no longer meet its obligation to provide the same level of protection as is required by the Principles; (v) upon notice, including under (iv), take reasonable and appropriate steps to stop and remediate unauthorized processing; and (vi) provide a summary or a representative copy of the relevant privacy provisions of its contract with that agent to the Department upon request. |
4. SECURITY
a. |
Organizations creating, maintaining, using or disseminating personal information must take reasonable and appropriate measures to protect it from loss, misuse and unauthorized access, disclosure, alteration and destruction, taking into due account the risks involved in the processing and the nature of the personal data. |
5. DATA INTEGRITY AND PURPOSE LIMITATION
a. |
Consistent with the Principles, personal information must be limited to the information that is relevant for the purposes of processing. (6) An organization may not process personal information in a way that is incompatible with the purposes for which it has been collected or subsequently authorized by the individual. To the extent necessary for those purposes, an organization must take reasonable steps to ensure that personal data is reliable for its intended use, accurate, complete, and current. An organization must adhere to the Principles for as long as it retains such information. |
b. |
Information may be retained in a form identifying or making identifiable (7) the individual only for as long as it serves a purpose of processing within the meaning of 5(a). This obligation does not prevent organizations from processing personal information for longer periods for the time and to the extent such processing reasonably serves the purposes of archiving in the public interest, journalism, literature and art, scientific or historical research, and statistical analysis. In these cases, such processing shall be subject to the other principles and provisions of the EU-U.S. DPF. Organizations should take reasonable and appropriate measures in complying with this provision. |
6. ACCESS
a. |
Individuals must have access to personal information about them that an organization holds and be able to correct, amend, or delete that information where it is inaccurate, or has been processed in violation of the Principles, except where the burden or expense of providing access would be disproportionate to the risks to the individual’s privacy in the case in question, or where the rights of persons other than the individual would be violated. |
7. RECOURSE, ENFORCEMENT AND LIABILITY
a. |
Effective privacy protection must include robust mechanisms for assuring compliance with the Principles, recourse for individuals who are affected by non-compliance with the Principles, and consequences for the organization when the Principles are not followed. At a minimum such mechanisms must include:
|
b. |
Organizations and their selected independent recourse mechanisms will respond promptly to inquiries and requests by the Department for information relating to the EU-U.S. DPF. All organizations must respond expeditiously to complaints regarding compliance with the Principles referred by EU Member State authorities through the Department. Organizations that have chosen to cooperate with DPAs, including organizations that process human resources data, must respond directly to such authorities with regard to the investigation and resolution of complaints. |
c. |
Organizations are obligated to arbitrate claims and follow the terms as set forth in Annex I, provided that an individual has invoked binding arbitration by delivering notice to the organization at issue and following the procedures and subject to conditions set forth in Annex I. |
d. |
In the context of an onward transfer, a participating organization has responsibility for the processing of personal information it receives under the EU-U.S. DPF and subsequently transfers to a third party acting as an agent on its behalf. The participating organization shall remain liable under the Principles if its agent processes such personal information in a manner inconsistent with the Principles, unless the organization proves that it is not responsible for the event giving rise to the damage. |
e. |
When an organization becomes subject to a court order that is based on non-compliance or an order from a U.S. statutory body (e.g., FTC or DOT) listed in the Principles or in a future annex to the Principles that is based on non-compliance, the organization shall make public any relevant EU-U.S. DPF-related sections of any compliance or assessment report submitted to the court or U.S. statutory body to the extent consistent with confidentiality requirements. The Department has established a dedicated point of contact for DPAs for any problems of compliance by participating organizations. The FTC and the DOT will give priority consideration to referrals of non-compliance with the Principles from the Department and EU Member State authorities, and will exchange information regarding referrals with the referring state authorities on a timely basis, subject to existing confidentiality restrictions. |
III. SUPPLEMENTAL PRINCIPLES
1. Sensitive Data
a. |
An organization is not required to obtain affirmative, express consent (i.e., opt in) with respect to sensitive data where the processing is:
|
2. Journalistic Exceptions
a. |
Given U.S. constitutional protections for freedom of the press, where the rights of a free press embodied in the First Amendment of the U.S. Constitution intersect with privacy protection interests, the First Amendment must govern the balancing of these interests with regard to the activities of U.S. persons or organizations. |
b. |
Personal information that is gathered for publication, broadcast, or other forms of public communication of journalistic material, whether used or not, as well as information found in previously published material disseminated from media archives, is not subject to the requirements of the Principles. |
3. Secondary Liability
a. |
Internet Service Providers (“ISPs”), telecommunications carriers, and other organizations are not liable under the Principles when on behalf of another organization they merely transmit, route, switch, or cache information. The EU-U.S. DPF does not create secondary liability. To the extent that an organization is acting as a mere conduit for data transmitted by third parties and does not determine the purposes and means of processing those personal data, it would not be liable. |
4. Performing Due Diligence and Conducting Audits
a. |
The activities of auditors and investment bankers may involve processing personal data without the consent or knowledge of the individual. This is permitted by the Notice, Choice, and Access Principles under the circumstances described below. |
b. |
Public stock corporations and closely held companies, including participating organizations, are regularly subject to audits. Such audits, particularly those looking into potential wrongdoing, may be jeopardized if disclosed prematurely. Similarly, a participating organization involved in a potential merger or takeover will need to perform, or be the subject of, a “due diligence” review. This will often entail the collection and processing of personal data, such as information on senior executives and other key personnel. Premature disclosure could impede the transaction or even violate applicable securities regulation. Investment bankers and attorneys engaged in due diligence, or auditors conducting an audit, may process information without knowledge of the individual only to the extent and for the period necessary to meet statutory or public interest requirements and in other circumstances in which the application of these Principles would prejudice the legitimate interests of the organization. These legitimate interests include the monitoring of organizations’ compliance with their legal obligations and legitimate accounting activities, and the need for confidentiality connected with possible acquisitions, mergers, joint ventures, or other similar transactions carried out by investment bankers or auditors. |
5. The Role of the Data Protection Authorities
a. |
Organizations will implement their commitment to cooperate with DPAs as described below. Under the EU-U.S. DPF, U.S. organizations receiving personal data from the EU must commit to employ effective mechanisms for assuring compliance with the Principles. More specifically as set out in the Recourse, Enforcement and Liability Principle, participating organizations must provide: (a)(i) recourse for individuals to whom the data relate; (a)(ii) follow-up procedures for verifying that the attestations and assertions they have made about their privacy practices are true; and (a)(iii) obligations to remedy problems arising out of failure to comply with the Principles and consequences for such organizations. An organization may satisfy points (a)(i) and (a)(iii) of the Recourse, Enforcement and Liability Principle if it adheres to the requirements set forth here for cooperating with the DPAs. |
b. |
An organization commits to cooperate with the DPAs by declaring in its EU-U.S. DPF self-certification submission to the Department (see Supplemental Principle on Self-Certification) that the organization:
|
c. |
Operation of DPA Panels
|
d. |
An organization that wishes its EU-U.S. DPF benefits to cover human resources data transferred from the EU in the context of the employment relationship must commit to cooperate with the DPAs with regard to such data (see Supplemental Principle on Human Resources Data). |
e. |
Organizations choosing this option will be required to pay an annual fee, which will be designed to cover the operating costs of the panel. They may additionally be asked to meet any necessary translation expenses arising out of the panel’s consideration of referrals or complaints against them. The amount of the fee will be determined by the Department after consultation with the Commission. The collection of the fee may be conducted by a third party selected by the Department to serve as the custodian of the funds collected for this purpose. The Department will closely cooperate with the Commission and the DPAs on the establishment of appropriate procedures for the distribution of funds collected through the fee, as well as other procedural and administrative aspects of the panel. The Department and the Commission may agree to alter how often the fee is collected. |
6. Self-Certification
a. |
EU-U.S. DPF benefits are assured from the date on which the Department places the organization on the Data Privacy Framework List. The Department will only place an organization on the Data Privacy Framework List after having determined that the organization’s initial self-certification submission is complete, and will remove the organization from that list if it voluntarily withdraws, fails to complete its annual re-certification, or if it persistently fails to comply with the Principles (see Supplemental Principle on Dispute Resolution and Enforcement). |
b. |
To initially self-certify or subsequently re-certify for the EU-U.S. DPF, an organization must on each occasion provide to the Department a submission by a corporate officer on behalf of the organization that is self-certifying or re-certifying (as applicable) its adherence to the Principles (8), that contains at least the following information:
|
c. |
Where the organization wishes its EU-U.S. DPF benefits to cover human resources information transferred from the EU for use in the context of the employment relationship, it may do so where a statutory body listed in the Principles or a future annex to the Principles has jurisdiction to hear claims against the organization arising out of the processing of human resources information. In addition, the organization must indicate this in its initial self-certification submission, as well as in any re-certification submissions, and declare its commitment to cooperate with the EU authority or authorities concerned in conformity with the Supplemental Principles on Human Resources Data and the Role of the Data Protection Authorities (as applicable) and that it will comply with the advice given by such authorities. The organization must also provide the Department with a copy of its human resources privacy policy and provide information where the privacy policy is available for viewing by its affected employees. |
d. |
The Department will maintain and make publicly available the Data Privacy Framework List of organizations that have filed completed, initial self-certification submissions and will update that list on the basis of completed, annual re-certification submissions, as well as notifications received pursuant to the Supplemental Principle on Dispute Resolution and Enforcement. Such re-certification submissions must be provided not less than annually; otherwise the organization will be removed from the Data Privacy Framework List and EU-U.S. DPF benefits will no longer be assured. All organizations that are placed on the Data Privacy Framework List by the Department must have relevant privacy policies that comply with the Notice Principle and state in those privacy policies that they adhere to the Principles. (12) If available online, an organization’s privacy policy must include a hyperlink to the Department’s Data Privacy Framework website and a hyperlink to the website or complaint submission form of the independent recourse mechanism that is available to investigate unresolved, Principles-related complaints free of charge to the individual. |
e. |
The Principles apply immediately upon self-certification. Participating organizations that previously self-certified to the EU-U.S. Privacy Shield Framework Principles will need to update their privacy policies to instead refer to the “EU-U.S. Data Privacy Framework Principles”. Such organizations shall include this reference as soon as possible, and in any event no later than three months from the effective date for the EU-U.S. Data Privacy Framework Principles. |
f. |
An organization must subject to the Principles all personal data received from the EU in reliance on the EU-U.S. DPF. The undertaking to adhere to the Principles is not time-limited in respect of personal data received during the period in which the organization enjoys the benefits of the EU-U.S. DPF; its undertaking means that it will continue to apply the Principles to such data for as long as the organization stores, uses or discloses them, even if it subsequently leaves the EU-U.S. DPF for any reason. An organization that wishes to withdraw from the EU-U.S. DPF must notify the Department of this in advance. This notification must also indicate what the organization will do with the personal data that it received in reliance on the EU-U.S. DPF (i.e., retain, return, or delete the data, and if it will retain the data, the authorized means by which it will provide protection to the data). An organization that withdraws from the EU-U.S. DPF, but wants to retain such data must either affirm to the Department on an annual basis its commitment to continue to apply the Principles to the data or provide “adequate” protection for the data by another authorized means (for example, using a contract that fully reflects the requirements of the relevant standard contractual clauses adopted by the Commission); otherwise, the organization must return or delete the information. (13) An organization that withdraws from the EU-U.S. DPF must remove from any relevant privacy policy any references to the EU-U.S. DPF that imply that the organization continues to participate in the EU-U.S. DPF and is entitled to its benefits. |
g. |
An organization that will cease to exist as a separate legal entity due to a change in corporate status, such as a result of a merger, takeover, bankruptcy, or dissolution must notify the Department of this in advance. The notification should also indicate whether the entity resulting from the change in corporate status will (i) continue to participate in the EU-U.S. DPF through an existing self-certification; (ii) self-certify as a new participant in the EU-U.S. DPF (e.g., where the new entity or surviving entity does not already have an existing self-certification through which it could participate in the EU-U.S. DPF); or (iii) put in place other safeguards, such as a written agreement that will ensure continued application of the Principles to any personal data that the organization received under the EU-U.S. DPF and will be retained. Where neither (i), (ii), nor (iii) applies, any personal data that has been received under the EU-U.S. DPF must be promptly returned or deleted. |
h. |
When an organization leaves the EU-U.S. DPF for any reason, it must remove all statements implying that the organization continues to participate in the EU-U.S. DPF or is entitled to the benefits of the EU-U.S. DPF. The EU-U.S. DPF certification mark, if used, must also be removed. Any misrepresentation to the general public concerning an organization’s adherence to the Principles may be actionable by the FTC, DOT, or other relevant government body. Misrepresentations to the Department may be actionable under the False Statements Act (18 U.S.C. § 1001). |
7. Verification
a. |
Organizations must provide follow-up procedures for verifying that the attestations and assertions they make about their EU-U.S. DPF privacy practices are true and those privacy practices have been implemented as represented and in accordance with the Principles. |
b. |
To meet the verification requirements of the Recourse, Enforcement and Liability Principle, an organization must verify such attestations and assertions either through self-assessment or outside compliance reviews. |
c. |
Where the organization has chosen self-assessment, such verification must demonstrate that its privacy policy regarding personal information received from the EU is accurate, comprehensive, readily available, conforms to the Principles, and is completely implemented (i.e., is being complied with). It must also indicate that individuals are informed of any in-house arrangements for handling complaints and of the independent recourse mechanism(s) through which they may pursue complaints; that it has in place procedures for training employees in its implementation, and disciplining them for failure to follow it; and that it has in place internal procedures for periodically conducting objective reviews of compliance with the above. A statement verifying that the self-assessment has been completed must be signed by a corporate officer or other authorized representative of the organization at least once a year and made available upon request by individuals or in the context of an investigation or a complaint about non-compliance. |
d. |
Where the organization has chosen outside compliance review, such verification must demonstrate that its privacy policy regarding personal information received from the EU is accurate, comprehensive, readily available, conforms to the Principles, and is completely implemented (i.e., is being complied with). It must also indicate that individuals are informed of mechanism(s) through which they may pursue complaints. The methods of review may include, without limitation, auditing, random reviews, use of “decoys”, or use of technology tools as appropriate. A statement verifying that an outside compliance review has been successfully completed must be signed either by the reviewer or by the corporate officer or other authorized representative of the organization at least once a year and made available upon request by individuals or in the context of an investigation or a complaint about compliance. |
e. |
Organizations must retain their records on the implementation of their EU-U.S. DPF privacy practices and make them available upon request in the context of an investigation or a complaint about non-compliance to the independent dispute resolution body responsible for investigating complaints or to the agency with unfair and deceptive practices jurisdiction. Organizations must also respond promptly to inquiries and other requests for information from the Department relating to the organization’s adherence to the Principles. |
8. Access
a. The Access Principle in Practice
i. |
Under the Principles, the right of access is fundamental to privacy protection. In particular, it allows individuals to verify the accuracy of information held about them. The Access Principle means that individuals have the right to:
|
ii. |
Individuals do not have to justify requests for access to their personal data. In responding to individuals’ access requests, organizations should first be guided by the concern(s) that led to the requests in the first place. For example, if an access request is vague or broad in scope, an organization may engage the individual in a dialogue so as to better understand the motivation for the request and to locate responsive information. The organization might inquire about which part(s) of the organization the individual interacted with or about the nature of the information or its use that is the subject of the access request. |
iii. |
Consistent with the fundamental nature of access, organizations should always make good faith efforts to provide access. For example, where certain information needs to be protected and can be readily separated from other personal information subject to an access request, the organization should redact the protected information and make available the other information. If an organization determines that access should be restricted in any particular instance, it should provide the individual requesting access with an explanation of why it has made that determination and a contact point for any further inquiries. |
b. Burden or Expense of Providing Access
i. |
The right of access to personal data may be restricted in exceptional circumstances where the legitimate rights of persons other than the individual would be violated or where the burden or expense of providing access would be disproportionate to the risks to the individual’s privacy in the case in question. Expense and burden are important factors and should be taken into account but they are not controlling factors in determining whether providing access is reasonable. |
ii. |
For example, if the personal information is used for decisions that will significantly affect the individual (e.g., the denial or grant of important benefits, such as insurance, a mortgage, or a job), then consistent with the other provisions of these Supplemental Principles, the organization would have to disclose that information even if it is relatively difficult or expensive to provide. If the personal information requested is not sensitive or not used for decisions that will significantly affect the individual, but is readily available and inexpensive to provide, an organization would have to provide access to such information. |
c. Confidential Commercial Information
i. |
Confidential commercial information is information that an organization has taken steps to protect from disclosure, where disclosure would help a competitor in the market. Organizations may deny or limit access to the extent that granting full access would reveal its own confidential commercial information, such as marketing inferences or classifications generated by the organization, or the confidential commercial information of another that is subject to a contractual obligation of confidentiality. |
ii. |
Where confidential commercial information can be readily separated from other personal information subject to an access request, the organization should redact the confidential commercial information and make available the non-confidential information. |
d. Organization of Data Bases
i. |
Access can be provided in the form of disclosure of the relevant personal information by an organization to the individual and does not require access by the individual to an organization’s data base. |
ii. |
Access needs to be provided only to the extent that an organization stores the personal information. The Access Principle does not itself create any obligation to retain, maintain, reorganize, or restructure personal information files. |
e. When Access May be Restricted
i. |
As organizations must always make good faith efforts to provide individuals with access to their personal data, the circumstances in which organizations may restrict such access are limited, and any reasons for restricting access must be specific. As under the GDPR, an organization can restrict access to information to the extent that disclosure is likely to interfere with the safeguarding of important countervailing public interests, such as national security; defense; or public security. In addition, where personal information is processed solely for research or statistical purposes, access may be denied. Other reasons for denying or limiting access are:
|
ii. |
An organization which claims an exception has the burden of demonstrating its necessity, and the reasons for restricting access and a contact point for further inquiries should be given to individuals. |
f. Right to Obtain Confirmation and Charging a Fee to Cover the Costs for Providing Access
i. |
An individual has the right to obtain confirmation of whether or not this organization has personal data relating to him or her. An individual also has the right to have communicated to him or her personal data relating to him or her. An organization may charge a fee that is not excessive. |
ii. |
Charging a fee may be justified, for example, where requests for access are manifestly excessive, in particular because of their repetitive character. |
iii. |
Access may not be refused on cost grounds if the individual offers to pay the costs. |
g. Repetitious or Vexatious Requests for Access
i. |
An organization may set reasonable limits on the number of times within a given period that access requests from a particular individual will be met. In setting such limitations, an organization should consider such factors as the frequency with which information is updated, the purpose for which the data are used, and the nature of the information. |
h. Fraudulent Requests for Access
i. |
An organization is not required to provide access unless it is supplied with sufficient information to allow it to confirm the identity of the person making the request. |
i. Timeframe for Responses
i. |
Organizations should respond to access requests within a reasonable time period, in a reasonable manner, and in a form that is readily intelligible to the individual. An organization that provides information to data subjects at regular intervals may satisfy an individual access request with its regular disclosure if it would not constitute an excessive delay. |
9. Human Resources Data
a. Coverage by the EU-U.S. DPF
i. |
Where an organization in the EU transfers personal information about its employees (past or present) collected in the context of the employment relationship, to a parent, affiliate, or unaffiliated service provider in the United States participating in the EU-U.S. DPF, the transfer enjoys the benefits of the EU-U.S. DPF. In such cases, the collection of the information and its processing prior to transfer will have been subject to the national laws of the EU Member State where it was collected, and any conditions for or restrictions on its transfer according to those laws will have to be respected. |
ii. |
The Principles are relevant only when individually identified or identifiable records are transferred or accessed. Statistical reporting relying on aggregate employment data and containing no personal data or the use of anonymized data does not raise privacy concerns. |
b. Application of the Notice and Choice Principles
i. |
A U.S. organization that has received employee information from the EU under the EU-U.S. DPF may disclose it to third parties or use it for different purposes only in accordance with the Notice and Choice Principles. For example, where an organization intends to use personal information collected through the employment relationship for non-employment-related purposes, such as marketing communications, the U.S. organization must provide the affected individuals with the requisite choice before doing so, unless they have already authorized the use of the information for such purposes. Such use must not be incompatible with the purposes for which the personal information has been collected or subsequently authorized by the individual. Moreover, such choices must not be used to restrict employment opportunities or take any punitive action against such employees. |
ii. |
It should be noted that certain generally applicable conditions for transfer from some EU Member States may preclude other uses of such information even after transfer outside the EU and such conditions will have to be respected. |
iii. |
In addition, employers should make reasonable efforts to accommodate employee privacy preferences. This could include, for example, restricting access to the personal data, anonymizing certain data, or assigning codes or pseudonyms when the actual names are not required for the management purpose at hand. |
iv. |
To the extent and for the period necessary to avoid prejudicing the ability of the organization in making promotions, appointments, or other similar employment decisions, an organization does not need to offer notice and choice. |
c. Application of the Access Principle
i. |
The Supplemental Principle on Access provides guidance on reasons which may justify denying or limiting access on request in the human resources context. Of course, employers in the EU must comply with local regulations and ensure that EU employees have access to such information as is required by law in their home countries, regardless of the location of data processing and storage. The EU-U.S. DPF requires that an organization processing such data in the United States will cooperate in providing such access either directly or through the EU employer. |
d. Enforcement
i. |
In so far as personal information is used only in the context of the employment relationship, primary responsibility for the data vis-à-vis the employee remains with the organization in the EU. It follows that, where European employees make complaints about violations of their data protection rights and are not satisfied with the results of internal review, complaint, and appeal procedures (or any applicable grievance procedures under a contract with a trade union), they should be directed to the state or national data protection or labor authority in the jurisdiction where the employees work. This includes cases where the alleged mishandling of their personal information is the responsibility of the U.S. organization that has received the information from the employer and thus involves an alleged breach of the Principles. This will be the most efficient way to address the often overlapping rights and obligations imposed by local labor law and labor agreements as well as data protection law. |
ii. |
A U.S. organization participating in the EU-U.S. DPF that uses EU human resources data transferred from the EU in the context of the employment relationship and that wishes such transfers to be covered by the EU-U.S. DPF must therefore commit to cooperate in investigations by and to comply with the advice of competent EU authorities in such cases. |
e. Application of the Accountability for Onward Transfer Principle
i. |
For occasional employment-related operational needs of the participating organization with respect to personal data transferred under the EU-U.S. DPF, such as the booking of a flight, hotel room, or insurance coverage, transfers of personal data of a small number of employees can take place to controllers without application of the Access Principle or entering into a contract with the third-party controller, as otherwise required under the Accountability for Onward Transfer Principle, provided that the participating organization has complied with the Notice and Choice Principles. |
10. Obligatory Contracts for Onward Transfers
a. Data Processing Contracts
i. |
When personal data is transferred from the EU to the United States only for processing purposes, a contract will be required, regardless of participation by the processor in the EU-U.S. DPF. |
ii. |
Data controllers in the EU are always required to enter into a contract when a transfer for mere processing is made, whether the processing operation is carried out inside or outside the EU, and whether or not the processor participates in the EU-U.S. DPF. The purpose of the contract is to make sure that the processor:
|
iii. |
Because adequate protection is provided by participating organizations, contracts with such organizations for mere processing do not require prior authorization. |
b. Transfers within a Controlled Group of Corporations or Entities
i. |
When personal information is transferred between two controllers within a controlled group of corporations or entities, a contract is not always required under the Accountability for Onward Transfer Principle. Data controllers within a controlled group of corporations or entities may base such transfers on other instruments, such as EU Binding Corporate Rules or other intra-group instruments (e.g., compliance and control programs), ensuring the continuity of protection of personal information under the Principles. In case of such transfers, the participating organization remains responsible for compliance with the Principles. |
c. Transfers between Controllers
i. |
For transfers between controllers, the recipient controller need not be a participating organization or have an independent recourse mechanism. The participating organization must enter into a contract with the recipient third-party controller that provides for the same level of protection as is available under the EU-U.S. DPF, not including the requirement that the third party controller be a participating organization or have an independent recourse mechanism, provided it makes available an equivalent mechanism. |
11. Dispute Resolution and Enforcement
a. |
The Recourse, Enforcement and Liability Principle sets out the requirements for EU-U.S. DPF enforcement. How to meet the requirements of point (a)(ii) of the Principle is set out in the Supplemental Principle on Verification. This Supplemental Principle addresses points (a)(i) and (a)(iii), both of which require independent recourse mechanisms. These mechanisms may take different forms, but they must meet the Recourse, Enforcement and Liability Principle’s requirements. Organizations satisfy the requirements through the following: (i) compliance with private sector developed privacy programs that incorporate the Principles into their rules and that include effective enforcement mechanisms of the type described in the Recourse, Enforcement and Liability Principle; (ii) compliance with legal or regulatory supervisory authorities that provide for handling of individual complaints and dispute resolution; or (iii) commitment to cooperate with DPAs located in the EU or their authorized representatives. |
b. |
This list is intended to be illustrative and not limiting. The private sector may design additional mechanisms to provide enforcement, so long as they meet the requirements of the Recourse, Enforcement and Liability Principle and the Supplemental Principles. Please note that the Recourse, Enforcement and Liability Principle’s requirements are additional to the requirement that self-regulatory efforts must be enforceable under Section 5 of the FTC Act (15 U.S.C. § 45) prohibiting unfair or deceptive acts, 49 U.S.C. § 41712 prohibiting a carrier or ticket agent from engaging in an unfair or deceptive practice in air transportation or the sale of air transportation, or another law or regulation prohibiting such acts. |
c. |
In order to help ensure compliance with their EU-U.S. DPF commitments and to support the administration of the program, organizations, as well as their independent recourse mechanisms, must provide information relating to the EU-U.S. DPF when requested by the Department. In addition, organizations must respond expeditiously to complaints regarding their compliance with the Principles referred through the Department by DPAs. The response should address whether the complaint has merit and, if so, how the organization will rectify the problem. The Department will protect the confidentiality of information it receives in accordance with U.S. law. |
d. |
Recourse Mechanisms
|
e. |
Remedies and Sanctions
|
f. |
FTC Action
|
g. |
Persistent Failure to Comply
|
12. Choice – Timing of Opt Out
a. |
Generally, the purpose of the Choice Principle is to ensure that personal information is used and disclosed in ways that are consistent with the individual’s expectations and choices. Accordingly, an individual should be able to exercise “opt out” choice of having personal information used for direct marketing at any time subject to reasonable limits established by the organization, such as giving the organization time to make the opt out effective. An organization may also require sufficient information to confirm the identity of the individual requesting the “opt out.” In the United States, individuals may be able to exercise this option through the use of a central “opt out” program. In any event, an individual should be given a readily available and affordable mechanism to exercise this option. |
b. |
Similarly, an organization may use information for certain direct marketing purposes when it is impracticable to provide the individual with an opportunity to opt out before using the information, if the organization promptly gives the individual such opportunity at the same time (and upon request at any time) to decline (at no cost to the individual) to receive any further direct marketing communications and the organization complies with the individual’s wishes. |
13. Travel Information
a. |
Airline passenger reservation and other travel information, such as frequent flyer or hotel reservation information and special handling needs, such as meals to meet religious requirements or physical assistance, may be transferred to organizations located outside the EU in several different circumstances. Under the GDPR, personal data may, in the absence of an adequacy decision, be transferred to a third country if appropriate data protection safeguards are provided pursuant to Article 46 GDPR or, in specific situations, if one of the conditions of Article 49 GDPR is fulfilled (e.g., where the data subject has explicitly consented to the transfer). U.S. organizations subscribing to the EU-U.S. DPF provide adequate protection for personal data and may therefore receive data transfers from the EU on the basis of Article 45 GDPR, without having to put in place a transfer instrument pursuant to Article 46 GDPR or meet the conditions of Article 49 GDPR. Since the EU-U.S. DPF includes specific rules for sensitive information, such information (which may need to be collected, for example, in connection with customers’ needs for physical assistance) may be included in transfers to participating organizations. In all cases, however, the organization transferring the information has to respect the law in the EU Member State in which it is operating, which may inter alia impose special conditions for the handling of sensitive data. |
14. Pharmaceutical and Medical Products
a. Application of EU/Member State Laws or the Principles
i. |
EU/Member State law applies to the collection of the personal data and to any processing that takes place prior to the transfer to the United States. The Principles apply to the data once they have been transferred to the United States. Data used for pharmaceutical research and other purposes should be anonymized when appropriate. |
b. Future Scientific Research
i. |
Personal data developed in specific medical or pharmaceutical research studies often play a valuable role in future scientific research. Where personal data collected for one research study are transferred to a U.S. organization in the EU-U.S. DPF, the organization may use the data for a new scientific research activity if appropriate notice and choice have been provided in the first instance. Such notice should provide information about any future specific uses of the data, such as periodic follow up, related studies, or marketing. |
ii. |
It is understood that not all future uses of the data can be specified, since a new research use could arise from new insights on the original data, new medical discoveries and advances, and public health and regulatory developments. Where appropriate, the notice should therefore include an explanation that personal data may be used in future medical and pharmaceutical research activities that are unanticipated. If the use is not consistent with the general research purpose(s) for which the personal data were originally collected, or to which the individual has consented subsequently, new consent must be obtained. |
c. Withdrawal from a Clinical Trial
i. |
Participants may decide or be asked to withdraw from a clinical trial at any time. Any personal data collected previous to withdrawal may still be processed along with other data collected as part of the clinical trial, however, if this was made clear to the participant in the notice at the time he or she agreed to participate. |
d. Transfers for Regulatory and Supervision Purposes
i. |
Pharmaceutical and medical device companies are allowed to provide personal data from clinical trials conducted in the EU to regulators in the United States for regulatory and supervision purposes. Similar transfers are allowed to parties other than regulators, such as company locations and other researchers, consistent with the Principles of Notice and Choice. |
e. “Blinded” Studies
i. |
To ensure objectivity in many clinical trials, participants, and often investigators as well, cannot be given access to information about which treatment each participant may be receiving. Doing so would jeopardize the validity of the research study and results. Participants in such clinical trials (referred to as “blinded” studies) do not have to be provided access to the data on their treatment during the trial if this restriction has been explained when the participant entered the trial and the disclosure of such information would jeopardize the integrity of the research effort. |
ii. |
Agreement to participate in the trial under these conditions is a reasonable forgoing of the right of access. Following the conclusion of the trial and analysis of the results, participants should have access to their data if they request it. They should seek it primarily from the physician or other health care provider from whom they received treatment within the clinical trial, or secondarily from the sponsoring organization. |
f. Product Safety and Efficacy Monitoring
i. |
A pharmaceutical or medical device company does not have to apply the Principles with respect to the Notice, Choice, Accountability for Onward Transfer, and Access Principles in its product safety and efficacy monitoring activities, including the reporting of adverse events and the tracking of patients/subjects using certain medicines or medical devices, to the extent that adherence to the Principles interferes with compliance with regulatory requirements. This is true both with respect to reports by, for example, health care providers to pharmaceutical and medical device companies, and with respect to reports by pharmaceutical and medical device companies to government agencies like the Food and Drug Administration. |
g. Key-coded Data
i. |
Invariably, research data are uniquely key-coded at their origin by the principal investigator so as not to reveal the identity of individual data subjects. Pharmaceutical companies sponsoring such research do not receive the key. The unique key code is held only by the researcher, so that he or she can identify the research subject under special circumstances (e.g., if follow-up medical attention is required). A transfer from the EU to the United States of data coded in this way that is EU personal data under EU law would be covered by the Principles. |
15. Public Record and Publicly Available Information
a. |
An organization must apply the Principles of Security, Data Integrity and Purpose Limitation, and Recourse, Enforcement and Liability to personal data from publicly available sources. These Principles shall apply also to personal data collected from public records (i.e., those records kept by government agencies or entities at any level that are open to consultation by the public in general). |
b. |
It is not necessary to apply the Notice, Choice, or Accountability for Onward Transfer Principles to public record information, as long as it is not combined with non-public record information, and any conditions for consultation established by the relevant jurisdiction are respected. Also, it is generally not necessary to apply the Notice, Choice, or Accountability for Onward Transfer Principles to publicly available information unless the European transferor indicates that such information is subject to restrictions that require application of those Principles by the organization for the uses it intends. Organizations will have no liability for how such information is used by those obtaining such information from published materials. |
c. |
Where an organization is found to have intentionally made personal information public in contravention of the Principles so that it or others may benefit from these exceptions, it will cease to qualify for the benefits of the EU-U.S. DPF. |
d. |
It is not necessary to apply the Access Principle to public record information as long as it is not combined with other personal information (apart from small amounts used to index or organize the public record information); however, any conditions for consultation established by the relevant jurisdiction are to be respected. In contrast, where public record information is combined with other non-public record information (other than as specifically noted above), an organization must provide access to all such information, assuming it is not subject to other permitted exceptions. |
e. |
As with public record information, it is not necessary to provide access to information that is already publicly available to the public at large, as long as it is not combined with non-publicly available information. Organizations that are in the business of selling publicly available information may charge the organization’s customary fee in responding to requests for access. Alternatively, individuals may seek access to their information from the organization that originally compiled the data. |
16. Access Requests by Public Authorities
a. |
In order to provide transparency in respect of lawful requests by public authorities to access personal information, participating organizations may voluntarily issue periodic transparency reports on the number of requests for personal information they receive by public authorities for law enforcement or national security reasons, to the extent such disclosures are permissible under applicable law. |
b. |
The information provided by the participating organizations in these reports together with information that has been released by the intelligence community, along with other information, can be used to inform the periodic joint review of the functioning of the EU-U.S. DPF in accordance with the Principles. |
c. |
Absence of notice in accordance with point (a)(xii) of the Notice Principle shall not prevent or impair an organization’s ability to respond to any lawful request. |
(1) Provided that the Commission Decision on the adequacy of the protection provided by the EU-U.S. DPF applies to Iceland, Liechtenstein and Norway, the EU-U.S. DPF will cover both the EU, as well as these three countries. Consequently, references to the EU and its Member States will be read as including Iceland, Liechtenstein, and Norway.
(2) REGULATION (EU) 2016/679 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation).
(3) The EU-U.S. Privacy Shield Framework Principles have been amended as the “EU-U.S. Data Privacy Framework Principles”. (See Supplemental Principle on Self-Certification).
(4) Executive Order of October 7, 2022, "Enhancing Safeguards for United States Signals Intelligence Activities.”
(5) See, e.g., section (c) of the Recourse, Enforcement and Liability Principle.
(6) Depending on the circumstances, examples of compatible processing purposes may include those that reasonably serve customer relations, compliance and legal considerations, auditing, security and fraud prevention, preserving or defending the organization’s legal rights, or other purposes consistent with the expectations of a reasonable person given the context of the collection.
(7) In this context, if, given the means of identification reasonably likely to be used (considering, among other things, the costs of and the amount of time required for identification and the available technology at the time of the processing) and the form in which the data is retained, an individual could reasonably be identified by the organization, or a third party if it would have access to the data, then the individual is "identifiable."
(8) The submission must be made via the Department’s Data Privacy Framework website by an individual within the organization who is authorized to make representations on behalf of the organization and any of its covered entities regarding its adherence to the Principles.
(9) The primary “organization contact” or the “organization corporate officer” cannot be external to the organization (e.g., outside counsel or an external consultant).
(10) See Supplemental Principle on Verification.
(11) See Supplemental Principle on Dispute Resolution and Enforcement.
(12) An organization self-certifying for the first time may not claim EU-U.S. DPF participation in its final privacy policy until the Department notifies the organization that it may do so. The organization must provide the Department with a draft privacy policy, which is consistent with the Principles, when it submits its initial self-certification. Once the Department has determined that the organization’s initial self-certification submission is otherwise complete, the Department will notify the organization that it should finalize (e.g., publish where applicable) its EU-U.S. DPF-consistent privacy policy. The organization must promptly notify the Department as soon as the relevant privacy policy is finalized, at which time the Department will place the organization on the Data Privacy Framework List.
(13) If an organization elects at the time of its withdrawal to retain the personal data that it received in reliance on the EU-U.S. DPF and affirm to the Department on an annual basis that it continues to apply the Principles to such data, the organization must verify to the Department once a year following its withdrawal (i.e., unless and until the organization provides “adequate” protection for such data by another authorized means, or returns or deletes all such data and notifies the Department of this action) what it has done with that personal data, what it will do with any of that personal data that it continues to retain, and who will serve as an ongoing point of contact for Principles-related questions.
(14) The organization should answer requests from an individual concerning the purposes of the processing, the categories of personal data concerned, and the recipients or categories of recipients to whom the personal data is disclosed.
(15) The Principles, Overview, para. 5.
(16) Independent dispute resolution bodies have discretion about the circumstances in which they use these sanctions. The sensitivity of the data concerned is one factor to be taken into consideration in deciding whether deletion of data should be required, as is whether an organization has collected, used, or disclosed information in blatant contravention of the Principles.
(17) The Department will indicate within the notice the amount of time, which will necessarily be less than 30 days, the organization has to respond to the notice.
ANNEX I: ARBITRAL MODEL
This Annex I provides the terms under which organizations participating in the EU-U.S. DPF are obligated to arbitrate claims, pursuant to the Recourse, Enforcement and Liability Principle. The binding arbitration option described below applies to certain “residual” claims as to data covered by the EU-U.S. DPF. The purpose of this option is to provide a prompt, independent, and fair mechanism, at the option of individuals, for resolution of any claimed violations of the Principles not resolved by any of the other EU-U.S. DPF mechanisms.
A. Scope
This arbitration option is available to an individual to determine, for residual claims, whether a participating organization has violated its obligations under the Principles as to that individual, and whether any such violation remains fully or partially unremedied. This option is available only for these purposes. This option is not available, for example, with respect to the exceptions to the Principles (1) or with respect to an allegation about the adequacy of the EU-U.S. DPF.
B. Available Remedies
Under this arbitration option, the “EU-U.S. Data Privacy Framework Panel” (the arbitration panel consisting of one or three arbitrators, as agreed by the parties) has the authority to impose individual-specific, non-monetary equitable relief (such as access, correction, deletion, or return of the individual’s data in question) necessary to remedy the violation of the Principles only with respect to the individual. These are the only powers of the EU-U.S. Data Privacy Framework Panel with respect to remedies. In considering remedies, the EU-U.S. Data Privacy Framework Panel is required to consider other remedies that already have been imposed by other mechanisms under the EU-U.S. DPF. No damages, costs, fees, or other remedies are available. Each party bears its own attorney’s fees.
C. Pre-Arbitration Requirements
An individual who decides to invoke this arbitration option must take the following steps prior to initiating an arbitration claim: (1) raise the claimed violation directly with the organization and afford the organization an opportunity to resolve the issue within the timeframe set forth in section (d)(i) of the Supplemental Principle on Dispute Resolution and Enforcement; (2) make use of the independent recourse mechanism under the Principles, at no cost to the individual; and (3) raise the issue through the individual’s DPA to the Department and afford the Department an opportunity to use best efforts to resolve the issue within the timeframes set forth in the Letter from the Department’s International Trade Administration, at no cost to the individual.
This arbitration option may not be invoked if the individual’s same claimed violation of the Principles (1) has previously been subject to binding arbitration; (2) was the subject of a final judgment entered in a court action to which the individual was a party; or (3) was previously settled by the parties. In addition, this option may not be invoked if a DPA (1) has authority under the Supplemental Principle on the Role of the Data Protection Authorities or the Supplemental Principle on Human Resources Data; or (2) has the authority to resolve the claimed violation directly with the organization. A DPA’s authority to resolve the same claim against an EU data controller does not alone preclude invocation of this arbitration option against a different legal entity not bound by the DPA authority.
D. Binding Nature of Decisions
An individual’s decision to invoke this binding arbitration option is entirely voluntary. Arbitral decisions will be binding on all parties to the arbitration. Once invoked, the individual forgoes the option to seek relief for the same claimed violation in another forum, except that if non-monetary equitable relief does not fully remedy the claimed violation, the individual’s invocation of arbitration will not preclude a claim for damages that is otherwise available in the courts.
E. Review and Enforcement
Individuals and participating organizations will be able to seek judicial review and enforcement of the arbitral decisions pursuant to U.S. law under the Federal Arbitration Act. (2) Any such cases must be brought in the federal district court whose territorial coverage includes the primary place of business of the participating organization.
This arbitration option is intended to resolve individual disputes, and arbitral decisions are not intended to function as persuasive or binding precedent in matters involving other parties, including in future arbitrations or in EU or U.S. courts, or FTC proceedings.
F. The Arbitration Panel
The parties will select arbitrators for the EU-U.S. Data Privacy Framework Panel from the list of arbitrators discussed below.
Consistent with applicable law, the Department and the Commission will develop a list of at least 10 arbitrators, chosen on the basis of independence, integrity, and expertise. The following shall apply in connection with this process:
Arbitrators:
(1) |
will remain on the list for a period of 3 years, absent exceptional circumstances or removal for cause, renewable by the Department, with prior notification to the Commission, for additional 3-year terms; |
(2) |
shall not be subject to any instructions from, or be affiliated with, either party, or any participating organization, or the U.S., EU, or any EU Member State or any other governmental authority, public authority, or enforcement authority; and |
(3) |
must be admitted to practice law in the United States and be experts in U.S. privacy law, with expertise in EU data protection law. |
G. Arbitration Procedures
The Department and the Commission have agreed, consistent with applicable law, to the adoption of arbitration rules that govern proceedings before the EU-U.S. Data Privacy Framework Panel. (3) In the event the rules governing the proceedings need to be changed, the Department and the Commission will agree to amend those rules or adopt a different set of existing, well-established U.S. arbitral procedures, as appropriate, subject to each of the following considerations:
1. |
An individual may initiate binding arbitration, subject to the pre-arbitration requirements provision above, by delivering a “Notice” to the organization. The Notice shall contain a summary of steps taken under Paragraph C to resolve the claim, a description of the alleged violation, and, at the choice of the individual, any supporting documents and materials and/or a discussion of law relating to the alleged claim. |
2. |
Procedures will be developed to ensure that an individual’s same claimed violation does not receive duplicative remedies or procedures. |
3. |
FTC action may proceed in parallel with arbitration. |
4. |
No representative of the U.S., EU, or any EU Member State or any other governmental authority, public authority, or enforcement authority may participate in these arbitrations, provided, that at the request of an EU individual, DPAs may provide assistance in the preparation only of the Notice but DPAs may not have access to discovery or any other materials related to these arbitrations. |
5. |
The location of the arbitration will be the United States, and the individual may choose video or telephone participation, which will be provided at no cost to the individual. In-person participation will not be required. |
6. |
The language of the arbitration will be English unless otherwise agreed by the parties. Upon a reasoned request, and taking into account whether the individual is represented by an attorney, interpretation at the arbitral hearing, as well as translation of arbitral materials will be provided at no cost to the individual, unless the EU-U.S. Data Privacy Framework Panel finds that, under the circumstances of the specific arbitration, this would lead to unjustified or disproportionate costs. |
7. |
Materials submitted to arbitrators will be treated confidentially and will only be used in connection with the arbitration. |
8. |
Individual-specific discovery may be permitted if necessary, and such discovery will be treated confidentially by the parties and will only be used in connection with the arbitration. |
9. |
Arbitrations should be completed within 90 days of the delivery of the Notice to the organization at issue, unless otherwise agreed to by the parties. |
H. Costs
Arbitrators should take reasonable steps to minimize the costs or fees of the arbitrations.
The Department will, consistent with applicable law, facilitate the maintenance of a fund, to which participating organizations will be required to contribute, based in part on the size of the organization, which will cover the arbitral cost, including arbitrator fees, up to maximum amounts (“caps”). The fund will be managed by a third party, which will report regularly to the Department on the operations of the fund. The Department will work with the third party to periodically review the operation of the fund, including the need to adjust the amount of the contributions or of the caps on the arbitral cost, and consider, among other things, the number of arbitrations and the costs and timing of the arbitrations, with the understanding that there will be no excessive financial burden imposed on participating organizations. The Department will notify the Commission of the outcome of such reviews with the third party and will provide the Commission with prior notification of any adjustments of the amount of the contributions. Attorney’s fees are not covered by this provision or any fund under this provision.
(1) The Principles, Overview, para. 5.
(2) Chapter 2 of the Federal Arbitration Act (“FAA”) provides that “[a]n arbitration agreement or arbitral award arising out of a legal relationship, whether contractual or not, which is considered as commercial, including a transaction, contract, or agreement described in [section 2 of the FAA], falls under the Convention [on the Recognition and Enforcement of Foreign Arbitral Awards of June 10, 1958, 21 U.S.T. 2519, T.I.A.S. No. 6997 (“New York Convention”)].” 9 U.S.C. § 202. The FAA further provides that “[a]n agreement or award arising out of such a relationship which is entirely between citizens of the United States shall be deemed not to fall under the [New York] Convention unless that relationship involves property located abroad, envisages performance or enforcement abroad, or has some other reasonable relation with one or more foreign states.” Id. Under Chapter 2, “any party to the arbitration may apply to any court having jurisdiction under this chapter for an order confirming the award as against any other party to the arbitration. The court shall confirm the award unless it finds one of the grounds for refusal or deferral of recognition or enforcement of the award specified in the said [New York] Convention.” Id. § 207. Chapter 2 further provides that “[t]he district courts of the United States . . . shall have original jurisdiction over . . . an action or proceeding [under the New York Convention], regardless of the amount in controversy.” Id. § 203.
Chapter 2 also provides that “Chapter 1 applies to actions and proceedings brought under this chapter to the extent that chapter is not in conflict with this chapter or the [New York] Convention as ratified by the United States.” Id. § 208. Chapter 1, in turn, provides that “[a] written provision in . . . a contract evidencing a transaction involving commerce to settle by arbitration a controversy thereafter arising out of such contract or transaction, or the refusal to perform the whole or any part thereof, or an agreement in writing to submit to arbitration an existing controversy arising out of such a contract, transaction, or refusal, shall be valid, irrevocable, and enforceable, save upon such grounds as exist at law or in equity for the revocation of any contract.” Id. § 2. Chapter 1 further provides that “any party to the arbitration may apply to the court so specified for an order confirming the award, and thereupon the court must grant such an order unless the award is vacated, modified, or corrected as prescribed in sections 10 and 11 of [the FAA].” Id. § 9.
(3) The International Centre for Dispute Resolution (“ICDR”), the international division of the American Arbitration Association (“AAA”) (collectively “ICDR-AAA”), was selected by the Department to administer arbitrations pursuant to and manage the arbitral fund identified in Annex I of the Principles. On September 15, 2017, the Department and the Commission agreed to the adoption of a set of arbitration rules to govern binding arbitration proceedings described in Annex I of the Principles, as well as a code of conduct for arbitrators that is consistent with generally accepted ethical standards for commercial arbitrators and Annex I of the Principles. The Department and the Commission agreed to adapt the arbitration rules and code of conduct to reflect the updates under the EU-U.S. DPF, and the Department will work with the ICDR-AAA to make those updates.
ANNEX II
|
UNITED STATES DEPARTMENT OF COMMERCE Secretary of Commerce Washington, D.C. 20230 |
July 6, 2023
The Honorable Didier Reynders |
Commissioner for Justice |
European Commission |
Rue de la Loi/ Westraat 200 |
1049 Brussels |
Belgium |
Dear Commissioner Reynders:
On behalf of the United States, I am pleased to transmit herewith a package of EU-U.S. Data Privacy Framework materials that, combined with Executive Order 14086, “Enhancing Safeguards for United States Signals Intelligence Activities” and 28 CFR part 201 amending Department of Justice regulations to establish the “Data Protection Review Court”, reflects important and detailed negotiations to strengthen privacy and civil liberties protections. These negotiations have resulted in new safeguards to ensure that U.S. signals intelligence activities are necessary and proportionate in the pursuit of defined national security objectives and a new mechanism for European Union (“EU”) individuals to seek redress if they believe they are unlawfully targeted by signals intelligence activities, which together will ensure the privacy of EU personal data. The EU-U.S. Data Privacy Framework will underpin an inclusive and competitive digital economy. We should both be proud of the improvements reflected in that Framework, which will enhance the protection of privacy around the world. This package, along with the Executive Order, Regulations, and other materials available from public sources, provides a very strong basis for a new adequacy finding by the European Commission. (1)
The following materials are attached:
— |
The EU-U.S. Data Privacy Framework Principles, including the Supplemental Principles (collectively “the Principles”) and Annex I of the Principles (i.e., an annex providing the terms under which Data Privacy Framework organizations are obligated to arbitrate certain residual claims as to personal data covered by the Principles); |
— |
A letter from the Department’s International Trade Administration, which administers the Data Privacy Framework program, describing the commitments that our Department has made to ensure that the EU-U.S. Data Privacy Framework operates effectively; |
— |
A letter from the Federal Trade Commission describing its enforcement of the Principles; |
— |
A letter from the Department of Transportation describing its enforcement of the Principles; |
— |
A letter prepared by the Office of the Director of National Intelligence regarding safeguards and limitations applicable to U.S. national security authorities; and |
— |
A letter prepared by the Department of Justice regarding safeguards and limitations on U.S. Government access for law enforcement and public interest purposes. |
The full EU-U.S. Data Privacy Framework Package will be published on the Department’s Data Privacy Framework website and the Principles and Annex I of the Principles will be effective on the date of entry into force of the European Commission’s adequacy decision.
You can be assured that the United States takes these commitments seriously. We look forward to working with you as the EU-U.S. Data Privacy Framework is implemented and as we embark on the next phase of this process together.
Sincerely,
Gina M. RAIMONDO
(1) Provided that the Commission Decision on the adequacy of the protection provided by the EU-U.S. Data Privacy Framework applies to Iceland, Liechtenstein and Norway, the EU-U.S. Data Privacy Framework Package will cover both the European Union, as well as these three countries.
ANNEX III