EUROPEAN COMMISSION
Brussels, 15.1.2024
SWD(2024) 3 final
COMMISSION STAFF WORKING DOCUMENT
Country reports on the functioning of the adequacy decisions adopted under Directive 95/46/EC
Accompanying the document
Report from the Commission to the European Parliament and the Council
on the first review of the functioning of the adequacy decisions adopted pursuant to Article 25(6) of Directive 95/46/EC
{COM(2024) 7 final}
TABLE OF CONTENTS
I. ANDORRA
II. REPUBLIC OF ARGENTINA
III. CANADA
IV. FAROE ISLANDS
V. BAILIWICK OF GUERNSEY
VI. ISLE OF MAN
VII. STATE OF ISRAEL
VIII. JERSEY
IX. NEW ZEALAND
X. SWITZERLAND
XI. EASTERN REPUBLIC OF URUGUAY
I. ANDORRA
1.RULES APPLYING TO THE PROCESSING OF PERSONAL DATA
1.1.Relevant developments in the data protection framework of Andorra
The Commission adopted the adequacy decision for Andorra on 19 October 2010, after having received the opinion of the Article 29 Working Party on 1 December 2009. The decision found that, for the purposes of Article 25(2) of Directive 95/46/EC (Data Protection Directive), Andorra provided an adequate level of protection for personal data transferred from the EU.
At the time of the adoption of the adequacy decision, the legislative framework for the protection of personal data in Andorra consisted of the Qualified Law 15/2003 of 18 December 2003 on the protection of personal data (LQPDP), as further implemented through two Decrees of 1 July 2004. The LQPDP and its implementing regulations were largely based on the standards of the former Data Protection Directive of the EU.
In November 2020, Andorra initiated a process to modernise the LQPDP, which led to the adoption of the new Qualified Law 29/2021 on the protection of personal data (Data Protection Act) that entered into force in May 2022. As explained in more detail below, the Data Protection Act is closely aligned with Regulation (EU) 2016/679 (GDPR) in its structure and main components, and significantly strengthens the Andorran data protection framework.
As regards the scope of application, the LQPDP already followed the same approach as the Data Protection Directive, while the new Data Protection Act brings the Andorran data protection framework even closer to the GDPR. It not only defines the key notions of ‘personal data’, ‘data subject’ and ‘processing’ in the same way as the GDPR, but also introduces definitions for the notions of ‘profiling’ and ‘pseudonymization’ that are identical to the ones used in the GDPR. The Data Protection Act also provides for a more comprehensive protection of personal data by no longer allowing certain specific data protection regulations to prevail over its general rules in case of conflict and by removing certain partial exclusions that existed under the LQPDP.
At the time of the adoption of the Commission adequacy decision, the Andorran data protection framework already contained all the basic data protection principles (i.e., the principles of purpose limitation, data quality and proportionality, transparency, fairness, data minimisation, accuracy, storage limitation, and integrity and confidentiality). Building on that foundation, the Data Protection Act reinforces some of the existing principles, better aligning them with the GDPR.
In particular, as regards the principle of lawfulness, the Data Protection Act specifies and strengthens the notion of consent by adding a definition of this term in its Article 4(2) that is identical to the one used in the GDPR, i.e., requiring that, in addition to being freely given, specific and informed, consent must be unambiguous and expressed by a clear affirmative action. Moreover, the Data Protection Act fully aligns the grounds that are available for processing with those listed in Article 6(1) GDPR
. Similarly, the Data Protection Act reinforces the existing transparency requirements by requiring the information of the data subject also in situations where data is not collected directly from the data subject.
The principle of data security has been strengthened in the Data Protection Act with respect to the handling of data breaches. Under the LQPD and its implementing regulations, there was no obligation to notify data breaches affecting personal data. The Data Protection Act establishes a duty for data controllers to notify the supervisory authority (l’Agencia Andorrana de Protecció de Dades, APDA) without undue delay and, if possible, within a maximum period of 72 hours, after becoming aware of a data breach, unless it is unlikely that the data breach constitutes a risk to the rights and freedoms of individuals.
Finally, the Data Protection Act includes several provisions that give effect to the principle of accountability. Under the LQPDP, the APDA had already introduced some aspects of this principle through a guideline, including the need to carry out impact assessments, keep records of processing activities and appoint a data protection officer in certain cases. Chapter IV of the Data Protection Act anchors these and other accountability requirements more firmly into legislation, in particular by imposing an obligation to implement appropriate technical and organisational measures to ensure and to be able to demonstrate that processing is performed in accordance with the law, to implement the principles of data protection by design and default, to carry out data protection impact assessments, to keep records of processing and make them available to the APDA upon request, and to appoint a data protection officer in certain situations.
Importantly, special categories of personal data (or sensitive data) benefit from enhanced protection under the Data Protection Act. The Act expands the current notion of sensitive data to cover all the categories of personal data that are considered ‘sensitive’ under the GDPR. In particular, the categories of genetic and biometric data, data revealing racial origin or philosophical beliefs and data concerning sexual life have been added to the list of special categories. Moreover, the Data Protection Act imposes a general prohibition to process sensitive data and the processing of sensitive data is only allowed in a limited number of situations, corresponding to the situations in which the processing of sensitive data is allowed under the GDPR.
The Data Protection Act also modernises and strengthens the existing provisions on data protection rights. In particular, the provisions on the right to rectification, the right to erasure and the right to object have been fully aligned with the GDPR. For example, the right to erasure now includes an obligation for the controller to take reasonable steps to inform other controllers that are processing the relevant information that the data subject has requested the erasure of his data. The right to object is no longer limited to personal data not collected directly from the data subject, and a specific right to object to direct marketing has been introduced. Moreover, the right of access not only requires the controller to confirm, upon request of an individual, whether or not personal data concerning him/her is being processed, and, where that is the case, give access to that data (as was already the case under the LQPDP), but also requires the controller to provide further information, e.g., the purpose of processing, the categories of personal data that is being processed, the source of personal data, information on the retention period, the right to lodge a complaint with the APDA, the existence of other rights, the fact that the controller intends to transfer the data to third countries, and the existence of automated decision-making.
In addition to the strengthening of existing rights, new rights have been introduced in the Data Protection Act, again mirroring the corresponding rights under the GDPR. In particular, the Data Protection Act provides for specific safeguards and rights for individuals in the context of automated decision-making. First, it requires controllers to provide individuals with information on the existence of automated decision-making when collecting their personal data. Second, when responding to an individual’s exercise of the right of access, controllers are required to provide information on the existence of automated decision-making, as well as meaningful information about the logic involved and the envisaged consequences of such processing for the data subject. Third, the Data Protection Act introduces the right not to be subject to a decision based solely on automated processing. Automated decision-making may only take place under certain conditions, e.g., only where authorised by law or based on the data subject’s explicit consent, and subject to specific safeguards, e.g., informing the individual about the processing, the logic involved and the envisaged consequences. In case of data processing intended for profiling, the controller must implement suitable measures to safeguard the data subject’s rights and freedoms and legitimate interests, at least the right to obtain human intervention on the part of the controller, to express his or her point of view and to contest the decision. The Data Protection Act also introduces a right to the restriction of processing and a right to data portability, which each correspond to the relevant right in the GDPR.
In terms of restrictions to the exercise of data subject rights, the Data Protection Act clarifies, in identical terms as the GDPR, the conditions for the application of such restrictions by introducing a provision which explicitly sets out that restrictions to data subject rights are only allowed when they respect the essence of the fundamental rights and freedoms and are a necessary and proportionate measure in a democratic society to safeguard certain important objectives of general public interest such as national security, public security and the prevention, investigation, detection or prosecution of criminal offences.
As regards the international transfer of personal data, the Data Protection Act introduces several changes to the existing transfer regime, putting in place a system that is very similar to the rules on international transfers set out in Chapter V of the GDPR in terms of structure and requirements.
As a general principle, international transfers may not be carried out when the third country does not establish, in its current regulations, a level of protection for personal data at least equivalent to that established under the Data Protection Act. Furthermore, when transferring data to a third country, it must be ensured that the level of protection of natural persons established by the Act is not diminished. The Data Protection Act stipulates that whether a third country offers an equivalent level of protection will be determined on the basis of three (alternative) criteria: whether the third country benefits from an adequacy decision from the European Commission, whether the third country has effectively submitted itself to the provisions of the modernised Convention 108 (Convention 108+) and whether the third country is an EU Member State.
International transfers to third countries that do not offer an equivalent level of protection are allowed where the controller or processor has provided appropriate safeguards, and on the condition that enforceable data subject rights and effective legal remedies are available to the data subject. The existence of such appropriate safeguards, enforceable rights and effective remedies will be evaluated by the APDA taking into account a set of factors that are identical to the factors listed in Article 45(2) GDPR. The instruments that can be used to provide for appropriate safeguards are legally binding arrangements, binding corporate rules, standard contractual clauses, whether adopted by the European Commission or the APDA, codes of conduct and certification mechanisms in conformity with EU data protection rules.
Finally, the Data Protection Act reduces and clarifies the derogations for specific situations, i.e., the situations in which transfers can take place to non-adequate third countries and without the existence of appropriate safeguards. The new derogations are laid down in Article 45 of the Data Protection Act and closely resemble the derogations listed in Article 49 GDPR. The Data Protection Act stipulates that they must be interpreted restrictively.
Finally, the Andorran transfer regime has also been amended so that the above-mentioned requirements cover not only transfers of personal data to third countries, but also to international organisations.
1.2.Oversight, enforcement and redress
The independent authority that is charged with oversight and enforcement under the Data Protection Act is the APDA. The Agency oversees compliance with the Data Protection Act by both private entities and by Andorran public authorities. It has the power to carry out inspections and impose sanctions for infringements of the Act. In addition, it carries out a number of additional tasks, such as answering questions from public authorities and private individuals or entities about the application of the data protection legislation, giving its opinion on current and future data protection legislation, raising public awareness about data protection, dealing with complaints it receives, and preparing annual reports on its activities. In carrying out its investigations, the Agency has access to any relevant information, as well as to the premises where processing operations are carried out, including computer systems or other resources used in data processing. It may also compel the production of evidence.
The Data Protection Act integrates in its Chapter VII the provisions of the DPD concerning the APDA without significantly changing the composition, tasks and powers of the agency and the statutory safeguards for its independence. It clarifies some aspects, including the regime on incompatible activities applicable to the Head of the Agency and the inspectors as well as on international cooperation. Furthermore, the Data Protection Act establishes a specific sanctioning regime for public authorities, including reprimands and disciplinary procedures to deal with staff liability. In addition, the decisions concerning public authorities and bodies are made public through publication on the APDA’s website.
As regards possibilities for individuals to obtain redress, the Andorran system continues to offer various avenues, including the possibility to lodge a complaint with the APDA, obtain judicial redress directly against controllers and processors (both private operators and public controllers) and obtain compensation for damages.
Despite its relatively small office, the APDA plays an active role, both when it comes to its engagement with stakeholders and exercising its oversight role.
Since the adoption of the adequacy decision, the APDA has issued several general and specific guidance documents, which cover topics such as the application of the GDPR in Andorra, data processing in the context of COVID-19, the processing of biometric data, international transfers after Brexit, the principle of proportionality, transparency obligations, cookies and obligations of the processor. Furthermore, the APDA has published several guidance documents that aim to inform the general public about data protection, covering topics such as teleworking, smart devices, data subject rights, collection of COVID-19 data in restaurants and instant messaging apps. In addition, the APDA has created several templates and standard forms to support compliance with data protection rules and the exercise of individual rights, including a consent form, templates for the exercise of data subject rights, a model complaint form and an international data transfer form.
Its annual reports show that the APDA handles a number of individual complaints every year. For example, in 2020 it received nineteen complaints for alleged infringements of the LQPDP, in 2019 it received thirteen such complaints, while in 2018 it received sixteen such complaints. These complaints have on various occasions led to enforcement actions. For example, during the period 2019-2020, in thirteen cases the APDA’s inspection service decided to carry out an inspection to establish whether a violation of the rights enshrined in the LQPDP and the DPD had taken place. In all of these thirteen cases a violation was detected and based on the severity of the violation and the number of affected data subjects, the APDA issued binding orders to remedy that violation. According to information received, in one case, a fine was imposed, due to the seriousness of the detected violation and the fact that the violation was a repeated offence.
Finally, the APDA fulfils an important consultative function. Every year it responds to numerous queries made by natural or legal persons, as well as public authorities, with regard to issues that have arisen in the context of their processing activities. For example, in 2020 a total of 2116 of queries were submitted to the ADPA, in 2019 it received 1763 queries, while in 2018 it received 1747 queries. The APDA also actively engages with the general public and stakeholders. For example, in 2020, the APDA engaged in outreach activities to disseminate information about the processing of personal data in the context of the COVID-19 pandemic, aimed both at citizens and those responsible for such processing activities. In the same year, the APDA participated in four television and three radio broadcasts. The APDA also regularly provides training in data protection to professionals. In 2019, for instance, the APDA provided data protection training to the Andorran fiscal intelligence unit (UIFAND) and the Federation of people with disabilities (FAAD). In 2020, the APDA also analysed a privacy impact assessment concerning the development of a COVID-19 contact tracing app, focusing on the proportionality with respect to the purpose pursued.
2.ACCESS TO AND USE OF PERSONAL DATA TRANSFERRED FROM THE EUROPEAN UNION BY PUBLIC AUTHORITIES IN ANDORRA
In Andorra, the personal data of EU individuals transferred under the adequacy decision can only be accessed by Andorran public authorities for purposes of criminal law enforcement. In connection with the size of its territory (~464km2) and population (which does not exceed 80 000 inhabitants), there is no specific authority in Andorra engaged in the collection of personal data for national security purposes, nor is there any specific legislation that allows access to personal data for national security purposes. While the Andorran Police may be entrusted with certain tasks in the area of national security, any data collection in that context only takes place to prevent, investigate, detect or prosecute offences under the Criminal Code and under the conditions and limitations set out in the Code of Criminal Procedure.
2.1General legal framework
When collecting and (further) processing personal data for criminal law enforcement purposes in Andorra, public authorities are subject to clear, precise and accessible rules governing the scope and application of a measure and imposing minimum safeguards. These limitations and safeguards follow from the overarching constitutional framework and specific laws that regulate activities in the areas of criminal law enforcement.
First, as an exercise of power by a public authority, government access in Andorra must be carried out in full respect of the law. In particular, fundamental rights and freedoms recognised by the Constitution – which include the right to privacy, honour and reputation and the inviolability of the home and the confidentiality of communications – may only be restricted by means of a so-called qualified law (a law that can only be enacted by qualified majority of the Parliament). With respect to the inviolability of the home and the confidentiality of communications specifically, the Constitution provides that interferences with these rights are only allowed when a reasoned judicial warrant is issued.
Second, the right to the protection of personal data is also guaranteed through Andorra’s adherence to the European Convention on Human Rights and the Council of Europe Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data (Convention 108). In addition, in October 2022, Andorra ratified the amending Protocol creating the modernised Convention 108+.
The European Convention on Human Rights protects the right to respect for private and family life (and the right to the protection of personal data as part of it). In particular, pursuant to Article 8 of that Convention, a public authority may only interfere with the right to privacy in accordance with the law, in the interests of one of the aims set out in Article 8(2), and if proportionate in light of that aim. Article 8 also requires that the interference is foreseeable, i.e., has a clear, accessible basis in law, and that the law contains appropriate safeguards to prevent abuse.
In addition, in its case law, the European Court of Human Rights has specified that any interference with the right to privacy and data protection should be subject to an effective, independent and impartial oversight system that must be provided for either by a judge or by another independent body (e.g., an administrative authority or a parliamentary body)
. Moreover, individuals must be provided with an effective remedy, and the European Court of Human Rights has clarified that the remedy must be offered by an independent and impartial body which has adopted its own rules of procedure, consisting of members that must hold or have held high judicial office or be experienced lawyers, and that there must be no evidential burden to be overcome in order to lodge an application with it. In undertaking its examination of complaints by individuals, the independent and impartial body should have access to all relevant information, including closed materials. Finally, it should have the powers to remedy non-compliance
.
Convention 108 protects the individual’s right to privacy with regard to automatic processing of personal data relating to him (data protection). Article 9 of Convention 108 provides that derogations from the general data protection principles (Article 5 Quality of data), the rules governing special categories of data (Article 6 Special categories of data) and data subject rights (Article 8 Additional safeguards to the data subject) are only permissible when such derogation is provided for by the law of the Party and constitutes a necessary measure in a democratic society in the interests of protecting State security, public safety, the monetary interests of the State or the suppression of criminal offences, or for protecting the data subject or the rights and freedoms of others.
Therefore, through adherence to the European Convention on Human Rights and Convention 108, as well as its submission to the jurisdiction of the European Court of Human Rights, Andorra is subject to a number of obligations, enshrined in international law, that frame its system of government access on the basis of principles, safeguards and individual rights similar to those guaranteed under EU law and applicable to the Member States.
These international obligations are anchored in the Andorran legal framework through the Constitution, which provides that international agreements such as the European Convention on Human Rights and Convention 108, from the moment of their publication in the official state gazette, form part of Andorran law and may not be amended or overridden by domestic laws. They are thus of direct application in Andorra and can be directly invoked before the Andorran courts
.
Third, the processing of personal data by Andorran public authorities for law enforcement purposes is subject to specific data protection rules under the new Data Protection Act. These specific rules are set out in the Data Protection Act’s third final provision and essentially replicate the core elements of the Law Enforcement Directive. The material scope of these rules is identical to the one of the Law Enforcement Directive. They apply to the processing of personal data by competent authorities for the purposes of the prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, including the safeguarding against and the prevention of threats to public security. Furthermore, the data protection principles of lawfulness and fairness, purpose limitation, data minimisation, accuracy, storage limitation and security are formulated using almost the exact same terms as Article 4(1) Law Enforcement Directive. In addition, these rules impose transparency obligations and, like the Law Enforcement Directive, establish the data subject rights of access, correction and deletion. For the same purposes as those recognised in the Law Enforcement Directive controllers are allowed to deny, in whole or in part, requests to exercise the rights of access, correction and deletion. Controllers may only restrict those rights having due regard to the fundamental rights and interest of the concerned individual. Finally, the Andorran Data Protection Authority (ADPA) is charged with monitoring and enforcing these specific rules.
The specific rules set out in the Data Protection’s Act third final provision anticipate on planned future legislation in this area. In particular, the third final provision instructs the Andorran government to present in Parliament, within two years from the entry into force of the Act (thus in May 2024 at the latest), a bill that regulates in more detail and following the model set out in the Law Enforcement Directive the processing of personal data by competent authorities for the purposes of the prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, including the safeguarding against and the prevention of threats to public security. The specific rules contained in the third final provision apply until the entry into force of this future legislation. A draft Bill on the processing of personal data by public authorities for law enforcement purposes is currently being prepared.
The Commission services welcome the Andorran legislator’s intention to replace the specific rules by a more permanent and detailed regime that is even further aligned with the rules that apply in the EU. They will closely monitor future developments in this area.
The general limitations and safeguards mentioned above can be invoked by individuals before independent oversight bodies (e.g., the APDA, see section 2.2.3) and courts (see section 2.2.4) to obtain redress.
2.2.Access and use by Andorran public authorities for criminal law enforcement purposes
In Andorra, criminal law enforcement functions are carried out by the police force, officially called the Police Force of the Principality of Andorra (Cos de Policia del Principat d’Andorra), which is headed by the Director. In the specific case of financial crime, the responsible authority is the Andorran financial intelligence unit (UIFAND). Andorran law imposes a number of limitations on the access to and use of personal data for criminal law enforcement purposes, and it provides oversight and redress mechanisms in this area. The conditions under which access to personal data can take place and the safeguards applicable to the use of these powers are assessed in the following sections.
2.2.1.Legal bases and applicable limitations/safeguards
Personal data transferred under the adequacy decision and processed by organisations in Andorra may be obtained by Andorran law enforcement authorities by means of investigative measures or interception measures under the Code of Criminal Procedure. The Code of Criminal Procedure lays down clear and precise rules on the scope and application of these measures, thereby ensuring that the interference with the rights of individuals will be limited to what is necessary for a specific criminal investigation and proportionate to the pursued purpose. Moreover, to exercise any of these powers, prior judicial authorisation is in principle required
. The police only have warrantless powers in exceptional cases, which are specifically listed in the Code of Criminal Procedure
.
To gather evidence, the police may conduct searches of homes or other premises where an offence presumably has taken place. Unless the affected person has given prior and written consent, subject to prior notice that (s)he has the right to refuse, searches may only take place based on a court-issued search warrant
. The search warrant must specify the address where the search is to be carried out, the grounds on which it is based and the reasons for conducting it
. Moreover, according to established case law of the Constitutional Court interpreting these requirements, the judge issuing the warrant must give a reasoned decision explaining the necessity and proportionality of the measure.
As regards the execution of the search warrant, the Code of Criminal Procedure provides that the search warrant must be presented to any person occupying the home or other premise. In case of the absence of the occupant, the search must be carried out in the presence of a court clerk who must draw up a detailed record.
When conducting a search, the police may seize all assets relating to the offense
. Any kind of object may be seized, including computer discs or other data storage devices. The seize power cannot be used, however, to gain access to the content of such devices. If the data stored on the seized device is not accessible without the consent of the owner/holder, a prior judicial authorisation specifically issued to have access to this content is required
. According to information received, such authorisation may only be granted under the stricter conditions for the accessing of communications, set out in the Code of Criminal Procedure (see below).
Illegal searches and seizures are subject to criminal sanctions
and any evidence that is obtained directly or indirectly through a violation of the fundamental rights and freedoms of individuals is considered inadmissible
.
The police may furthermore collect evidentiary material through the interception of communications. The Code of Criminal Procedure recognises three types of communications (telephone, telegraphic and postal) and stipulates that such communications may only be intercepted in the context of a criminal investigation involving a major offence (e.g., drug trafficking) or a minor offence in the area of corruption or influence peddling. In addition, the measure must be necessary for the purpose of seeking the truth.
Interceptions may only take place based on a prior court authorisation. The court order must specify the (major) offence in question, the suspects, the reasons why it is necessary to use this procedure, and all the identifying elements of the communication to be intercepted
. Furthermore, it must state the period within which the measure may be carried out. This period may not exceed two months and may be extended twice, by reasoned court order, under the same conditions. In addition, the Code of Criminal Procedure provides that the court must give a reasoned decision explaining the necessity and proportionality of the measure and mentioning the evidence obtained, the seriousness of the offence under investigation and the impact on the fundamental right at stake, which must always be guaranteed in its essence
.
As regards the execution of the court order, the Code of Criminal Procedure stipulates that the interception shall be carried out by a person or department designated by the judge, who is bound by professional secrecy and must keep records, under the supervision of the investigating judge. After the interception has been concluded, the individual whose communication has been intercepted must be notified by the court in case the measure did not produce evidence of a crime or in case the court has decreed the total or partial secrecy of the measure, if the confidentiality of the measure is lifted.
Illegal wiretapping and related conduct are subject to criminal sanctions
and any evidence that is obtained directly or indirectly through a violation of the fundamental rights and freedoms of individuals is considered inadmissible
.
Finally, the UIFAND may obtain personal data through disclosure by private individuals, business organisations or public authorities.
Law 14/2017 on the prevention and fight against money laundering and terrorist financing imposes an obligation on persons and undertakings subject to the law, such as financial institutions (so-called ‘parties under obligation’), to report to the UIFAND, on their own initiative, any transaction or attempted transaction related to funds where the party is aware of, knows, suspects or has reasonable grounds to suspect that are the proceeds of criminal activity or are related to terrorist financing, and to promptly respond to requests made by the UIFAND for additional information in such cases. A similar reporting duty applies to Andorran public authorities, including judicial authorities, who discover facts that could constitute indicia or proof of money laundering or terrorist financing. In those cases, they shall inform the UIFAND in writing and make available to it the information that the UIFAND requests in the exercise of its duties.
Prior to notifying the UIFAND, parties under obligation are required by the Act to investigate certain suspicious transactions (e.g., complex or unusually large transactions whose economic or lawful purpose is not apparent) and store, for a period of five years (extendable by UIFAND once for five years) all documents, data and information obtained under the application of the Act, receipts and registers of operations and transactions, account files and business correspondence, and the results of any analysis undertaken, including, where available, information obtained through electronic identification means as set out in the Law on electronic trust services. Any such processing operations performed under the Act by the parties under obligation may only be performed for the purposes of the Act and the concerned data may not be processed in a way that is incompatible with those purposes. Processing of personal data based on the Act for any other purposes, such as commercial purposes, is prohibited.
2.2.2.Further use of the information collected
The further use of data collected by Andorran criminal law enforcement authorities on one of the grounds referred to in Section 2.2.1, as well as the sharing of such data with a different authority for purposes other than the ones for which it was originally collected is subject to safeguards and limitations.
First, the processing of personal data by law enforcement authorities in Andorra is governed by the specific rules set out in the Data Protection Act as described in section 2.1. With respect to onward sharing, it follows from the Data Protection Act that personal data collected for law enforcement purposes may be further processed (whether by the original controller or by another controller) for any other law enforcement purpose, provided that the controller is authorised by law to process data for the other purpose. In this case, all the safeguards provided by the Data Protection Act and, where applicable, the specific rules referred to in section 2.1 apply to the processing carried out by the receiving authority.
Second, the different laws that allow for data collection by criminal law enforcement authorities in Andorra impose specific limitations and safeguards as to the use and further dissemination of the information obtained in exercising the powers they grant.
As regards the powers of search and seizure, the Code of Criminal Procedure provides that a detailed record must be made of all the assets seized. The seized objects must be sealed and added to the investigation file, together with the inventory. The seal on all the seized goods can only be lifted by the trial judge (batlle) or the court. Importantly, the trial judge must adopt the resolutions it deems appropriate to guarantee the restitution of the seized objects if they are not of interest to the case.
With respect to the interception of communications, Article 87 of the Code of Criminal Procedure sets out the safeguards that need to be applied to the intercepted material. Notably, recorded tapes, or the (computer) medium on which the communications are stored, must be fully sealed, and attached to the investigation file. The trial judge chooses the texts or documents to be used in the case. Unused recordings are to be kept as an annex to the file and must be destroyed, along with the used recordings, under the supervision of the judicial authority as soon as the case is closed.
In terms of investigative measures carried out in the context of the fight against money laundering and terrorism financing, Law 14/2017 requires the UIFAND to submit to the Public Prosecutor’s Office the cases in which there is reasonable suspicion of the commission of a criminal offence. It furthermore requires the UIFAND to share with other public authorities in Andorra (e.g., the Police Force, the Customs Service) any information that is essential for the exercise of their functions. The UIFAND may only respond to requests for information from other competent authorities in Andorra when these requests are motivated by concerns relating to money laundering, associated predicate offences or terrorist financing. In exceptional circumstances, where disclosure of the requested information would be clearly disproportionate to the legitimate interests of a natural or legal person or irrelevant with regard to the purposes for which it has been requested, the UIFAND is under no obligation to comply with the request for information.
In addition, the UIFAND is required to share, spontaneously or upon request, any information that may be relevant for the processing or analysis of information by other (foreign) financial intelligence units or equivalent bodies related to money laundering, its predicate offences, or terrorist financing and the natural or legal person involved. The exchange of information requires prior approval from the head of the UIFAND. The party receiving the information must furthermore prove, prior to receiving the information, that certain conditions are met, including that the receiving state shall not use the information for any other purpose than that sought by the Act and that the foreign services receiving the information are bound, under threat of criminal sanction, by a duty of professional secrecy. The UIFAND must use secure channels to exchange information with other financial intelligence units.
Law 32/2021 provides the rules on mutual legal assistance in criminal matters. It stipulates that request for legal assistance that refer to bank accounts or the interception of communications, are executed by the trial judge or the competent court, after hearing the Prosecutor’s Office and after having verified compliance of the request with Andorran law. The request must contain sufficient elements to allow the legality of the requested measure to be assessed in accordance with Andorran law and must be accompanied by the decision of the judicial authority of the requesting state. In view of the subject-matter and reason of the request, and before communicating the recordings or transcripts to the requesting state, the court must destroy the parts of the recordings or transcripts that are not of interest to the criminal procedure for which the measures have been requested. No information obtained from the Andorran authorities through judicial assistance can be used in the requesting state for purposes other than those specified and, more specifically, for other offenses or facts punishable than those that have been indicated there and of which the Andorran judge has been able to assess of the compatibility with Andorran law.
Finally, Andorra has concluded separate international agreements with France and Spain which provide specific safeguards with regard to the sharing of personal data collected for law enforcement purposes. In particular, disclosure can only take place with the express written authorisation of the competent authority of the transferring party, data may only be used for the purposes defined and under the conditions set by the transferring party, and there is a requirement to keep a record of the transferred data.
2.2.3.Oversight
In Andorra, the activities of criminal law enforcement authorities are supervised by different bodies.
First, the APDA is competent to oversee whether the Andorran police complies with the specific data protection rules set out in the Data Protection Act’s third final provision (see section 2.1). The APDA has the power to carry out inspections and impose sanctions for infringements of the Act
. In carrying out its investigations, the Agency has access to any relevant information, as well as to the premises where processing operations are carried out, including computer systems or other resources used in data processing
. It may also compel the production of evidence
.
Second, an independent Ombudsman (Raonador del ciutadá) is elected by the Andorran Parliament to defend and oversee the fulfillment and application of constitutional rights and liberties and to ensure that the public sector adheres to constitutional principles. It is competent to investigate complaints from individuals who believe their rights have been infringed by the public administration, including the Andorran police. It can also prepare, at its own initiative, reports or recommendations on matters of interest to citizens or society at large, or on matters relating to any of the functions entrusted to him. The independence of the Ombudsman is guaranteed by law. In carrying out its investigations, the Ombudsman has access to all relevant information. Based on the findings of his investigation, the Ombudsman may issue warnings, make recommendations, and otherwise state his views of a case. An annual report is laid before parliament with recommendations based on the Ombudsman’s operations throughout the year. In this report he can also recommend the introduction of changes or modifications in the existing legislation in case he observes a possible violation of human rights.
2.2.4.Redress
The Andorran system offers different (judicial) avenues to obtain redress, including compensation for damages.
First, the Data Protection Act provides the rights of access, rectification, deletion and restriction with respect to personal data processed for criminal law purposes. In the event a controller refuses or restricts the exercise of these rights, the concerned person may lodge a complaint with the APDA. Decisions of the APDA can be appealed in court, after having exhausted the prior internal administrative review procedure. The subsequent judicial process entails a review of the facts and the decision adopted by the APDA, with the judge being able to revoke or rectify the decision if it violates the appellant’s right. The appellant can also claim compensation for damages suffered.
Second, individuals may obtain compensation for damages before Andorran courts. This first of all includes the possibility to claim compensation for violations of the Data Protection Act committed by criminal law enforcement authorities. More generally, individuals may apply for compensation of damages caused by an unlawful interference with the right to privacy, honour and reputation, based on Qualified law 30/2014 on the protection of the civil rights to privacy, honour and reputation.
Third, it follows from Article 41 of the Andorran Constitution that the protection of fundamental rights and public freedoms of individuals, including data protection and privacy rights, is ensured in ordinary courts through an urgent and preferential procedure established by law which, in all cases, shall include two courts. Any action that has violated an individual right can be challenged through these proceedings, including court orders. Applicants must file a lawsuit in writing, signed by a lawyer duly registered to exercise in Andorra, outlining their request and the alleged damage. The case can be brought before the judge at any time, without mandatory deadlines or other requirements. Possible remedies can be a cessation of the offending action, the annulation of the effects that have occurred, the issuance of a rectification order and/or the fixation of an indemnity.
In addition, sentences and orders that violate constitutional rights, including the right to privacy, honor and reputation and the inviolability of the home and the confidentiality of communication, can be challenged before the Constitutional Court through the exceptional judicial remedy of ‘empara’. An appeal for empara can be filed against rulings dismissing claims brought under the urgent and preferential procedure. The empara appeal must be filed within thirteen business days following the day on which the contested ruling is delivered. Through it, the appellant requests the annulment of the ruling, and, if necessary, the suspension of its effects. If the appeal is upheld, the Constitutional Court will annul the contested ruling and all its effects, declare an infringement of a constitutional right, reinstate the appellant in the fulness of his right and adopt the necessary measures to this end, if necessary. If the violation is materially irreparable, the Constitutional Court determines the type of liability incurred by the public authority who violated the appellant’s right so that compensation can be claimed before the ordinary courts.
Finally, any individual may obtain judicial redress before the European Court of Human Rights against the unlawful collection of his/her data by Andorran criminal law enforcement authorities, provided that all available domestic remedies have been exhausted.
II. REPUBLIC OF ARGENTINA
1.RULES APPLYING TO THE PROCESSING OF PERSONAL DATA
1.1.Relevant developments in the data protection framework of Argentina
The Commission adopted the adequacy decision for Argentina on 30 June 2003, after having received the opinion of the Article 29 Working Party on 3 October 2002. The decision finds that, for the purposes of Article 25(2) of Directive 95/46/EC (Data Protection Directive), Argentina provides an adequate level of protection for personal data transferred from the EU.
In Argentina, core data protection rights are recognised by the so-called ‘habeas data action’ that was incorporated into the Argentinian Federal Constitution in 1994 and that is also part of thirteen provincial constitutions
. The recognition of these rights created the basis for the protection of the right to privacy
, and served as a foundation for Law 25.326 on Personal Data Protection of 4 October 2000 (Ley de Protección de Datos Personales, LPDP) and Regulation of Law 25.326 approved by Decree No. 1558/2001 (LPDP Regulation).
The LPDP sets out the general data protection principles, the rights of data subjects, the obligations of data controllers and data users, the set-up, tasks and powers of the supervisory authority, sanctions, and rules of procedure in seeking ‘habeas data’ as a judicial remedy. The LPDP Regulation introduces implementing provisions and further clarifies specific aspects of the LPDP.
Both the LPDP and the LPDP Regulation were already in place when the adequacy decision was adopted and continue to apply. However, as will be explained in more detail below, several elements of the Argentinian data protection system have been modernised and further reinforced since the adoption of the adequacy decision.
In particular, in a reform that has significantly strengthened the independence of the Argentinian data protection supervisory authority, the Agencia de Acceso a la Información Pública (AAIP) has been entrusted with overseeing compliance with the LPDP. Moreover, the AAIP has issued a number of binding regulations and opinions which clarify how the data protection framework is to be interpreted and applied in practice, thus helping to keep the LPDP up to date. Through these regulations/opinions, the AAIP (1) clarified the LPDP’s material scope of application by setting out requirements for ‘data dissociation’ (i.e., anonymisation), (2) expanded the notion of sensitive data, (3) strengthened data protection principles (limited data retention, data security, accountability), rights (right to erasure, right to withdraw data or block data processing) and obligations (additional safeguards required for automated decision-making, restrictions on international transfers). Furthermore, new case law of the Supreme Court has clarified the territorial scope of application of the LPDP.
Since the adoption of the adequacy decision, Argentina also strengthened its international commitments in the field of data protection. In 2019, it joined the Council of Europe Convention for the protection of individuals with regard to the automatic processing of personal data and its additional Protocol (Convention 108)
. In 2023, Argentina also ratified the amending Protocol creating the modernised Convention 108+.
While the abovementioned developments in terms of guidance, interpretation and case law contribute to an increased level of data protection in Argentina, codifying these developments in legislation would be important to enhance legal certainty and solidify the protection for personal data. The ongoing debate on a reform of the LPDP – in which the AAIP recently concluded a public consultation on a draft Data Protection Bill that is now slated to be submitted to Congress – seems to offer such an opportunity.
As regards the LPDP, it has a broad personal and material scope of application, applying to both private operators and public authorities. While the definitions of ‘personal data’, ’controller’ and ‘processor’, ‘data owner’ (data subject) and ‘data treatment’ (processing) in the LPDP have not changed since the adoption of the adequacy decision, the AAIP has, through guidance, further clarified the notion of ‘data dissociation’ in Article 2 LPDP. This notion is akin to the concept of anonymisation used in Regulation (EU) 2016/679 (GDPR) and refers to the processing of personal data in such a way that the information can no longer be associated with a particular person. The AAIP clarified in its Resolution No. 4/2019 that the data is dissociated from the data subject when the process necessary to re-identify the individual would require disproportionate or unviable means. Moreover, the process should be difficult to perform not only for the data controller, but also for third parties. The AAIP thus relies on factors that are similar to those taken into account under the GDPR to assess whether information can be considered anonymous.
In addition, the scope of application of the LPDP has been clarified with respect to journalistic information sources and databases. The Argentinian Supreme Court and the AAIP established a distinction between investigative activities and other processing activities of media and journalists. On the one hand, to protect the freedom of the press and the secrecy of sources, personal data used to ensure the truthfulness of investigative information does not fall under the LPDP. On the other hand, when media and journalists act as data controllers, for example when displaying advertising on a website, the LPDP does apply to these specific processing activities.
As regards its territorial scope of application, the LPDP distinguishes between provisions that are of general application across the country and those that are not. In accordance with Article 44, the provisions of the LPDP included in Chapters I (General Provisions), II (General data protection principles), III (Data subjects rights), IV (Data controllers and processors of files, registers and databanks) and in Article 32 (Criminal sanctions) are of public order and of general application whenever personal data is processed in the territory of Argentina. Furthermore, Articles 36 and 44 LPDP provide that “registers, data files, databases or data banks which are interconnected through networks at inter-jurisdictional (meaning ‘interprovincial’), national or international level” fall within federal jurisdiction and are thus subject to the provisions of the law, including those set out in Chapter V, VI and VII on the supervisory authority, the sanctions which may be imposed by the supervisory authority and the specific habeas data procedure that applies to such registers, data files, databases or data banks.
Since the adoption of the adequacy decision, several Argentinian courts as well as the Supreme Court have further clarified the interpretation of the notion of “interconnected networks” and thus the scope of application of Chapters V to VII of the LPDP. The judgments clarified in particular that data which is transmitted via the Internet or by any other technical means and can (theoretically) be accessed from all over the country or all over the world is captured by that notion and therefore subject to the provisions of Chapters V to VII of the LPDP, including the competence of the AAIP and the federal judges
. On the basis of the case law, data transferred from the EU to Argentina is thus captured by the scope of the entire LPDP, including the provisions regarding the supervisory authority, the applicable sanctions and the habeas data action, as such data is typically transmitted in electronic format via the internet or by other technical means and held in databases that can be accessed via interconnected networks.
The main data protection principles and obligations that were already provided by the LPDP at the time of the adoption of the adequacy decision have remained in place without substantial changes. This is the case for the principles of lawfulness and fairness, purpose limitation, data accuracy, data minimisation and transparency. At the same time, a number of principles and obligations have been further strengthened, in particular through guidance issued by the AAIP. This concerns notably the principles of limited data retention, data security, additional safeguards required for certain types of processing (processing of sensitive data, automated decision-making) and the principle of accountability.
More specifically, the AAIP has further clarified the notion of “suppression” which is relevant in the context of the principle of limited data retention. This principle is enshrined in Article 4(7) of the LPDP, which states that “data shall be destroyed once it has ceased to be necessary or relevant to the purposes for which it has been collected.” This provision is supplemented by Article 4 of the LPDP Regulation, stating that if the data is not required anymore for the purposes for which it was obtained or collected, it has to be supressed without a need for the data subject to request such a suppression. According to the AAIP’s Resolution No. 47/2018 on Recommended Security Measures, to suppress data means to “eliminate or destroy personal data in a definitive way”
.
Through the same resolution, the AAIP has also strengthened the principle of data security. First, similarly to the GDPR, the AAIP has reinforced the principles of proactive responsibility and accountability. In particular, it now recommends that organisations are able to demonstrate the appropriateness and effectiveness of the technical and organisational measures used to guarantee the security and confidentiality of the personal data they process. Moreover, the AAIP has issued guidance on how to handle security incidents, recommending that controllers (1) establish internal procedures for dealing with security incidents (2) document security incidents (e.g., the category/ies of affected personal data, the affected users and the measures taken to mitigate the incident and avoid future incidents) and (3) notify the AAIP upon a security incident
.
The AAIP has not only introduced the concept of accountability, but it has also issued concrete recommendations to operationalise that principle. In Disposition No. 18/2015 it provides privacy best practices for the development of applications, recommending taking into consideration principles like privacy by design and privacy by default. Second, in Resolution No. 40/2018 it approved a model data protection policy for public bodies that recommends the designation of a permanent data protection officer. Finally, Resolution No. 47/2018 recommends security measures for the processing and storage of personal data that include the implementation of review processes to identify, assess and correct possible vulnerabilities in information systems processing personal data.
In addition to the strengthening of data protection principles and obligations, the protections for special categories of data have been reinforced since the adoption of the adequacy decision. The LPDP defines special categories of personal data as “revealing racial or ethnic origin, political opinions, religious, philosophical or moral beliefs, labour union membership and information concerning health conditions or sexual habits or behaviours”.
Recognising that more modern data protection legislation includes biometric and genetic data in the definition of sensitive data in order to reflect new forms of processing that have emerged in the context of technological transformations, the AAIP has issued guidance on the interpretation of the notion of sensitive data with respect to those categories.
In Resolution 4/2019, the AAIP provides guidance on the notion of sensitive data with regard to biometric data. Biometric data is defined by the AAIP in the same way as in the GDPR. Moreover, the AAIP clarifies that it considers biometric data as sensitive data where it can reveal information the use of which could be potentially discriminatory for the data subject (e.g., data revealing ethnic origin or health-related information)
.
With respect to genetic data, which is again defined in the same way as in the GDPR
, the AAIP clarifies that genetic data is considered sensitive data when it uniquely identifies a natural person and where it reveals information or information may be deduced from it which is related to the health or physiology of the data subject and the use of which may be potentially discriminatory for the data subject.
It is also worth noting that Argentina has ratified Convention 108+ that requires to treat genetic and biometric data uniquely identifying a person as special categories of data
. Therefore, the same categories of sensitive data that are considered sensitive under the GDPR benefit from additional protections in Argentina
.
Furthermore, developments in case law, in combination with guidance from the AAIP, have led to a reinforcement and clarification of data subject rights under the LPDP. Importantly, in the case Rodriguez, Maria Belén c/ Google of 2014 the Argentinian Supreme Court created a right to erasure (‘right to be forgotten’) that is similar to the one provided by the GDPR. The Supreme Court required a search engine provider to de-index certain results, further to a careful balancing of the public interest in the information and the right to data protection in the concrete circumstances of the case. The AAIP recently clarified through guidance how this balancing of rights should be performed. Moreover, in its decision Google Inc. c/ Disposición DNODO No. 3/2011 s/Proceso de Conocimiento, of 2011, the AAIP confirmed that not only courts, but also the AAIP itself has the power to enforce the right to be forgotten. Basing itself on the Argentinian Supreme Court’s Rodríguez, María Belén c/ Google judgment and taking into consideration the CJEU’s judgement in Google Spain (C-131/12), the AAIP ordered the de-indexation of certain search results.
In addition, while the LPDP does not explicitly contain a right to object, the AAIP interpreted Article 27 LPDP – which provides for a “right to withdraw [data] or block [data processing]” – to contain a right to object in relation to data processing for marketing purposes. More specifically, in Disposition No. 4/2009, the AAIP required that all direct marketing messages must contain express information on the possibility of withdrawal and blocking, as well as a mechanism to exercise those rights.
Finally, even though the LPDP does not contain a right not to be subjected to automated decision-making for the private sector, the AAIP’s interpretation of the provisions on access to data has created one in practice. Taking into account the current reality that most data processing is carried out in automated forms, the AAIP considered that on the basis of the transparency principle, which requires controllers to provide clear information about the processing, the controller has to provide an explanation about the logic and specific reasons underlying decisions made exclusively on the basis of automated processing. Furthermore, it is worth noting that Argentina has ratified Convention 108+, which explicitly includes the right not to be subject to decisions based solely on automated processing.
As regards restrictions on international transfers, the rules in Argentina have evolved since the adoption of the adequacy decision, increasing the level of protection in case of onward transfers of data originally transferred from the EU. In particular, the AAIP has adopted an approach to international transfers that is similar to the one of the EU.
First, as regards adequacy, the LPDP grants the AAIP the power to adopt adequacy decisions. It currently considers as adequate only countries that have been recognised as providing an adequate level of protection by the European Commission
, as well as all EU/EEA Member States
. Second, in recent years the AAIP has developed several compliance instruments for international transfers to non-adequate countries and organisations. These are essentially the same mechanisms that are recognised by the GDPR: Binding Corporate Rules
, Standard Contractual Clauses
and ad hoc clauses/contracts
. Finally, the AAIP has clarified the scope of the exceptions to the general prohibition of transfers to countries or international organisations which do not provide adequate levels of protection, set out in Article 12(2) LPDP. The AAIP now explicitly considers that exceptions to the abovementioned requirements must be interpreted restrictively, and that falling within one of these exceptions is not sufficient to provide a legal basis for transfers; all the data protection principles, obligations and rights of the LPDP must be complied with at all times.
1.2.Oversight, enforcement and redress
Since the adoption of the adequacy decision, core elements of the Argentinian system for the monitoring and enforcing of the data protection rules have been strengthened. First, in a reform that has significantly strengthened the independence of the supervisory authority, the AAIP has been charged with monitoring and enforcing the LPDP. Second, the AAIP has adopted two new resolutions that substantially increase the maximum level of fines the Agency may impose. These changes are described in more detail below.
The LPDP provides that ‘the controlling Agency’ shall ensure compliance with its provisions. At the time of the adoption of the adequacy decision, the Dirección Nacional de Protección de Datos Personales (DNPDP) of the Ministry of Human Rights was designated as such. With a view to strengthening the independence of the controlling Agency, the AAIP in 2017 replaced the DNPDP as the supervisory authority for the LPDP. The AAIP was originally created in 2016 as the independent supervisory authority for Law No. 27.275 on Access to Public Information. In 2017, Decree No. 746/2017 expanded its oversight mandate by granting the AAIP additional responsibilities for overseeing compliance with the LPDP and with Law No. 26.951 on the creation of the Do-Not-Call-Register (Registro Nacional No Llame).
Other than the former DNPDP, the AAIP benefits from a number of institutional and procedural safeguards for its independence. First, Law No. 27.275 on Access to Public information expressly stipulates that the AAIP is set up as an independent entity with functional autonomy within the President’s Chief of Staff Office. Second, as a result of the reform, the system for the designation of the head of the supervisory authority has been reinforced
. While the Director of the AAIP is appointed by the Executive (the President of Argentina) for a five-year term that is renewable once
, (s)he must be selected through an open and transparent public selection process with a public hearing
. This new process has led to increased scrutiny of candidates for the function of Director of the AAIP, as illustrated by the procedure that has recently been followed for the selection of a new Director
. The law furthermore requires that the Director may not have any interest in, or links to, matters under his or her own right under the conditions laid down in Law No. 25.188 on Ethics in the Exercise of the Civil Service, and (s)he may not have held an elected or advocate position in the last five years prior to the appointment
. In addition, the position of Director is deemed incompatible with any other public or private activity other than part-time teaching
. Third, the Director may only be removed by the Executive in agreement with Congress, and only for specific reasons that are listed exhaustively in the law, notably misconduct, criminal offences in the performance of their duties or for common crimes. Finally, the AAIP has its own budget granted under the National Budget Law.
In terms of powers, the LPDP continues to provide that the AAIP may impose sanctions consisting of warnings, suspensions, fines ranging between one thousand pesos ($1 000) and one hundred thousand pesos ($100 000), or the closure or cancellation of the file, register or data base
. The use of these powers is regulated by resolutions of the AAIP as the controlling Agency that “shall determine the conditions and procedures for the application of the abovementioned sanctions, which shall be graded in proportion to the seriousness and extent of the violation and the damages arising from such violations, guaranteeing the due process of law principle”.
Importantly, the AAIP in 2022 adopted two new sanctioning resolutions to ensure that the sanctions provided for in the LPDP maintain an adequate deterrent effect and to further strengthen the effectiveness of the sanctioning regime as a whole. These resolutions, which replace two earlier resolutions adopted by the AAIP’s predecessor in 2015/16, increase the level of individual fines that can be imposed for specific categories of infringements and raise the maximum level of fines that the Agency may apply in case of cumulative sanctions.
More specifically, Resolution 240/2022 adjusts the system for the classification and graduation of fines
. Like its predecessor, it divides infringements into those of a ‘minor’, ‘serious’ and ‘very serious nature and provides a non-exhaustive list of examples of each. It furthermore determines the maximum fine to be applied to infringements falling within each category. Compared to the previous resolution, the maximum fines for ‘minor’ and ‘serious’ infringements have been raised. The resolution also lists the different factors that the AAIP should take into account when determining the level of the fine to be applied, which are similar to the factors taken account under the GDPR. Resolution 244/2022 then establishes the maximum level of fines to be applied in case of cumulative fines
.
With respect to the possibilities for individuals to obtain redress, the Argentinian system continues to offer various avenues, including the possibility to lodge a complaint with the AAIP, to make use of the special judicial remedy for the protection of personal data known as ‘habeas data’, to obtain judicial redress directly against controllers and processors (both private operators and public authorities) and to obtain compensation for damages.
The AAIP plays an active role, both when it comes to its engagement with stakeholders and exercising its oversight role.
In particular, the AAIP each year handles a number of files pertaining to the LDPD, including complaints, consultations and ex officio investigations. For example, according to its annual report, in 2021 the AAIP received 386 complaints concerning possible violations of the LDPD and conducted eight ex officio investigations
. In 2020 the AAIP received 239 complaints, dealt with nine written questions and conducted ten ex officio investigations
. In 2019, the AAIP handled 214 files, including seven ex officio investigations
.
These supervisory activities have led to enforcement action in multiple cases. In 2021, the AAIP imposed eleven fines
. For example, on 31 March 2021 the AAIP fined Rappi Arg S.A.S, an on-demand delivery mobile app for not responding in due time to a request for the suppression of the user’s personal data
. In 2020, according to its annual report, the AAIP imposed thirteen fines
. For instance, on 20 April 2020 the AAIP fined Google Argentina SRL for denying a data subject access to her personal data after her e-mail account was illegally accessed
. In 2019, according to its annual report, the Agency imposed eleven fines
. For example, on 6 June 2019, Yahoo Argentina SRL was fined in response to a security incident
.
Besides fines, the AAIP also applies other sanctions to enforce the LPDP (e.g., warnings, suspension, closure or cancellation of the file, register or database). For example, on 5 February 2020 the Agency issued a warning against the Federal Police in connection with a data breach, a failure to comply with security protocols and a breach of the duty of confidentiality
. When investigating private sector controllers, such non-monetary sanctions can also be imposed by the AAIP as a prelude to the imposition of a fine. The AAIP has developed a practice whereby, at the stage of the proceedings where it produces a report on the violations it has found, it simultaneously requires the controller to implement a compliance plan. The extent to which the controller implements this plan is subsequently taken into account when determining the amount of the fine. This approach was for instance followed in a case where a delivery company was found to have breached the security and confidentiality obligations of the LPDP.
In addition to the administrative sanctions that can be imposed for violations of the LPDP, the Criminal Code criminalises certain actions involving data processing. Article 117bis of the Criminal Code makes “knowingly providing false information contained in a personal data file to a third party” punishable by a prison sentence of six months up to six years. Article 157bis makes certain forms of ‘hacking’ (unduly accessing of a database, revealing or supplying confidential information recorded in a file, illegitimately inserting data in a file or database) punishable by a prison sentence of one month up to two years. These crimes are regularly prosecuted. For example, in 2004 an individual was sentenced based on Article 117bis, 156 and 157bis of the Criminal Code for publishing the user database of an internet company on his/her website. In 2007 a public official was prosecuted for unlawfully handing over, transferring, copying, or having intervened in the databases of an agency which contained a list of affiliates of social projects and of unemployed persons
Finally, the AAIP has issued a number of binding resolutions and opinions over the years which have helped to keep the LPDP up to date
. These opinions and binding resolutions cover topics ranging from the right of access to personal data collected through closed-circuit television cameras, automated processing of data, dissociation of data, biometric data, and consent, including consent of minors (Resolution No. 4/2019)
, to the processing of personal data for electoral purposes (Resolution No. 86/2019)
and the processing of personal data in the context of the COVID-19 pandemic (Resolution No. 70/2020)
.
2.ACCESS TO AND USE OF PERSONAL DATA TRANSFERRED FROM THE EUROPEAN UNION BY PUBLIC AUTHORITIES IN ARGENTINA
2.1.General legal framework
When collecting and (further) processing personal data for criminal law enforcement purposes in Argentina, public authorities are subject to precise and accessible rules governing the scope and application of a measure and imposing minimum safeguards. These limitations and safeguards follow from the overarching constitutional framework and specific laws that regulate the activities of public authorities in the areas of criminal law enforcement and national security.
First, several provisions of the Argentinian Constitution guarantee the rights to privacy and the protection of personal data. Article 18 of the Constitution stipulates that “the domicile may not be violated, as well as the written correspondence and private papers; and a law shall determine in which cases and for what reasons their search and occupation shall be allowed”. Importantly, the Supreme Court has ruled that these protections extend to communications via the internet
. Article 19 declares that “the private actions of men which in no way offend public order or morality, nor injure a third party, are only reserved to God and are exempted from the authority of judges”. The Supreme Court has interpreted this provision as protecting “a sphere of individual autonomy including feelings, practices and customs, family relations, financial situation, religious beliefs, mental and physical health, and, in sum, any actions, events, or information which, considering the lifestyles accepted by the community, are reserved for the individual”
. In addition, Article 43 of the Constitution guarantees the right to ‘habeas data’, a special remedy which any data subject can use to “obtain information on the data about himself and their purpose, registered in public records or data bases, or in private ones intended to supply information” and to achieve “the suppression, rectification, confidentiality or updating of said data” in case of “false data or discrimination”.
All laws at both the federal and the provincial levels must conform to the Argentinian Constitution
. As described in more detail in sections 2.2.1 and 2.3.1, the general principles following from the Argentinian Constitution are reflected in the specific laws that regulate the powers of law enforcement and national security authorities.
Second, the right to privacy and important aspects of the right to the protection of personal data are also guaranteed through Argentina’s adherence to international conventions.
This includes Argentina’s adherence to the American Convention on Human Rights and its submission to the jurisdiction of the Inter-American Court of Human Rights
. Pursuant to Article 11 of the Convention, everyone has the right to the protection of the law against arbitrary or abusive interference with his private life, his family, his home, or his correspondence. In accordance with Article 30 of the Convention, a public authority may only interfere with the right to privacy in accordance with laws enacted for reasons of general interest and in accordance with the purpose for which such restrictions have been established. These protections apply to all persons falling under the jurisdiction of the state parties to the Convention, irrespective of their nationality
.
While the Inter-American Court of Human Rights has not yet explicitly recognised the right to the protection of personal data as part of the right to privacy, it has ruled that the protections offered by this right extend to telephone conversations
. In addition, the Court has specified that, to determine if an interference with the right to privacy is arbitrary or abusive, three factors must be considered: (1) it must be established by law (2) it must have a legitimate purpose, and (3) it must be appropriate, necessary and proportionate
. Regarding the first factor, the Court has clarified that the law on which the interference is based must be clear and precise with detailed rules to establish the boundaries of the restriction. This includes the specific circumstances in which the restriction applies, who can request, order and carry out the restriction, and procedurally how to implement it
.
Article 75(22) of the Argentinian Constitution stipulates that the American Convention on Human Rights and other human rights treaties specifically mentioned in that provision (e.g., the International Covenant on Civil and Political Rights) enjoy “constitutional rank”. As such they have a higher hierarchy than laws and may only be terminated with the approval of two-thirds of all the members of each House of Congress
.
In 2019, Argentina acceded to the Council of Europe Convention 108 for the protection of individuals with regard to the automatic processing of personal data and its Additional Protocol, regarding supervisory authorities and transnational data flows (Convention 108)
. On 17 April 2023 Argentina also ratified the amending Protocol creating the modernised Convention 108 (Convention 108+)
. Article 9 of Convention 108 provides that derogations from the general data protection principles (Article 5 Quality of data), the rules governing special categories of data (Article 6 Special categories of data) and data subject rights (Article 8 Additional safeguards to the data subject) are only permissible when such derogation is provided for by the law of the Party and constitutes a necessary measure in a democratic society in the interests of protecting State security, public safety, the monetary interests of the State or the suppression of criminal offences, or for protecting the data subject or the rights and freedoms of others. The guarantees set out in Convention 108 are extended to every individual regardless of nationality or residence
.
Therefore, through adherence to the American Convention of Human Rights and Convention 108, as well as its submission to the jurisdiction of the Inter-American Court of Human Rights, Argentina is subject to a number of obligations, enshrined in international law, that frame its system of government access on the basis of principles, safeguards and individual rights similar to those guaranteed under EU law and applicable to the Member States.
Third, the processing of personal data by Argentinian public authorities, including for law enforcement and national security purposes, is subject to the LPDP
.
The LPDP limits the processing of personal data by law enforcement and national security authorities to what is “necessary for the strict compliance with the duties legally assigned to such bodies for (….) public security or the punishment of crimes”
. It contains the principles of lawfulness and fairness, purpose limitation, data minimisation, accuracy, storage limitation and security
. Furthermore, the LPDP imposes specific transparency obligations
and recognises the data subject rights of access, rectification and erasure (‘suppression’)
. Controllers are allowed to deny, in whole or in part, requests to exercise the rights of access, correction and deletion (‘suppression’), but only for specific purposes listed exhaustively in the law and similar to the purposes that allow for a restriction of data subject rights in the EU data protection framework
. These exemptions are not absolute but require the relevant authority to decide on a case-by-case basis whether and to what extent to apply them, after balancing the relevant interests at stake, including the privacy interests of the concerned individual
.
The LPDP and LPDP regulation also contain specific provisions on international transfers to a third country or international organisation
. As explained previously (section 1.1), these provisions follow an approach similar to the one of the EU data protection framework. Essentially, international transfers are prohibited, unless (1) the AAIP has found that the third country or international organisation provides “adequate levels of protection”, (2) such adequate protection is ensured through contractual arrangements between the data exporter and importer or a “self-regulation system”, or (3) an exception for a specific situation applies
.
Finally, the AAIP is charged with monitoring and enforcing these specific rules at the federal level
. As regards oversight and enforcement at the provincial level, the LPDP fully applies – including its provisions on supervision by the AAIP – to personal data that is stored in a database that can (theoretically) be accessed from all over the country or all over the world
.
These abovementioned limitations and safeguards can be invoked by individuals before independent administrative bodies (e.g., the AAIP) and courts to obtain redress, in particular through the habeas data action (see sections 2.2.2, 2.2.3, 2.3.2 and 2.3.3).
2.2.Access and use by Argentinian public authorities for criminal law enforcement purposes
In Argentina, criminal law enforcement functions are carried out by different authorities. At federal level, these include the federal police force, as well as other bodies with specific competences, such as the Gendarmerie and the Prefecture and Airport Police. In the specific case of financial crime, the responsible authority is the Financial Information Unit (UIF)
. At the provincial level, criminal law enforcement functions are carried out by the provincial police forces. Argentinian law imposes a number of limitations on the access and use of personal data for criminal law enforcement purposes by each of these authorities and provides oversight and redress mechanisms. The conditions under which such access can take place and the safeguards applicable to the use of those powers are described in the following sections.
2.2.1.Legal bases and applicable limitations/safeguards
Personal data transferred from the EU on the basis of the adequacy decision and subsequently processed by Argentinian controllers/processors may be obtained by Argentinian authorities for criminal law enforcement purposes by means of investigative measures under, at federal level, the Federal Code of Criminal Procedure (Código Procesal Penal Federal, CPPF)
. At the provincial level, access by Argentinian public authorities to personal data transferred under the adequacy decision is governed by the provincial codes of criminal procedure, which provide for conditions, limitations, and safeguards for the access to personal data that are similar to the ones provided by the laws at federal level
.
The CPPF provides Argentinian criminal law enforcement authorities with a legal basis to access personal data held by controllers/processors through searches and seizures, data seizures, the use of production orders, or the interception of communications. It lays down clear and precise rules on the scope and application of these measures, thereby ensuring that the interference with the rights of individuals will be limited to what is necessary for a specific criminal investigation and proportionate to the purpose pursued. Moreover, to exercise any of these powers, prior judicial authorisation is in principle required
.
More specifically, searches or seizures may only be carried out if there is a reasonable belief that evidence related to an investigation, or a suspect related to a crime may be found in a home or other place
. In terms of procedural safeguards, a search or seizure may only take place on the basis of a court-issued warrant
. Warrantless searches or seizures are allowed only in a limited number of exceptional circumstances set out in the CPPF
. The person subject to the search is always notified of the search and is in principle present when it is carried out. Where this is not the case, this must be recorded in the minutes of the search
. Searches and seizures must be carried out with as little interference as possible with the right to privacy
. Moreover, certain communications between the defendant and individuals who must abstain from being a witness (spouse, partner, family member, lawyers, etc.) and objects may not be seized (notes that these individuals might have taken about confidential communications with the defendant or any other circumstances to which the right or duty to abstain from witnessing is extended)
. Finally, illegal searches are subject to criminal sanctions
and any evidence that is obtained directly or indirectly through a violation of the fundamental rights and freedoms of individuals is considered inadmissible
.
Specific limitations and safeguards apply to data seizures, defined in the CPPF as the seizure of an entire or partial computer system or data stored on a storage disk or hard drive, with the purpose of seizing the elements of the system, copying the system, or preserving data or information of interest for the investigation
. The rules that apply to searches and searches, described above, apply mutatis mutandis to data seizures (e.g., data seizures can in principle only take place based on a judicial warrant). Illegal accessing of computer data is subject to criminal sanctions
and any evidence that is obtained directly or indirectly through a violation of the fundamental rights and freedoms of individuals is considered inadmissible
.
Argentinian law enforcement authorities may furthermore obtain personal data through the interception of communications
. This power may only be used in the context of a criminal investigation and on the basis of a judicial warrant
. An interception of communications may be authorised whenever this is “useful for the investigation of a crime”
. Importantly, the Supreme Court, in its capacity as head of the Argentinian judiciary, has introduced additional conditions for the interception of communications by issuing guidelines, addressed to all judicial bodies, which clarify that the interception of communications is “an exceptional measure that may only be authorised with a restrictive approach”
. Moreover, based on settled case-law of the Supreme Court and the Inter-American Court of Human Rights, any interference with the inviolability of communications must be provided for by law, pursue a legitimate aim and comply with the requirements of suitability, necessity and proportionality
.
Procedurally, interception requests must be submitted to federal judges
, who must approve interception warrants before the interception is conducted by or at the request of the Legal Assistance Directorate for Complex and Organised Crime, a subsidiary body of the Supreme Court
. An interception warrant is only valid for a maximum period of 30 days and may be renewed by the court once for the same period, if there are reasons that justify the prolongation of this term given the nature and circumstances of the crime under investigation
. The interception must be stopped if the reasons used to authorise the measure disappear, or once the interception warrant has expired or its aim has been achieved
. According to explanations received from the AAIP, the defendant will be notified during the criminal proceedings of any interference with his/her privacy, when this no longer endangers the investigation, to enable him/her to contest the legality of that measure and exercise his/her constitutional right of defence in court
.
Illegal wiretapping and related conduct are subject to criminal sanctions
and evidence that is obtained directly or indirectly through a violation of the fundamental rights and freedoms of individuals is considered inadmissible
.
Under the CPPF, criminal law enforcement authorities may also obtain a production order from a court, ordering a person to hand over objects or documents under his/her power that can serve as evidence
. When the production order is not being complied with, the sought-after objects or documents may be seized.
Finally, the UIF may obtain personal data through disclosure by private individuals, business organisations or public authorities.
Law 25.246 imposes an obligation on persons and undertakings subject to the law, such as financial institutions (so-called “parties under obligation”)
, to report to the UIF, on their own initiative, any suspicious fact or transaction, regardless of the amount involved. A suspicious transaction is defined as “those transactions which, in accordance with the customs and practises of the activity in question, as well as the experience and suitability of the persons obliged to report, are unusual, without economic or legal justification or of unusual or unjustified complexity, whether carried out on an isolated or repeated basis”
. Prior to notifying the UIF, parties under obligation are required to identify their clients, determine the origin and legality of their funds and to store, in physical or digital form, the information collected on their clients for a minimum period of five years. This information must allow for the reconstruction of transactions carried out, whether domestical or international, and be available for the UIF or the competent authorities when required by them
.
2.2.2.Further use of the information collected
The further use of data collected by Argentinian criminal law enforcement authorities on one of the grounds referred to in Section 2.2.1, as well as the sharing of such data with a different authority for purposes other than the ones for which it was originally collected (so-called ‘onward sharing’), is subject to safeguards and limitations.
First, the processing of personal data by law enforcement authorities in Argentina is governed by the LPDP as described in section 2.1. With respect to onward sharing, it follows from the LPDP that personal data collected for law enforcement purposes may be shared with other public authorities for purposes directly related to the legitimate interests of the original controller and the recipient. In this case, the recipient shall be subject to the same regulatory and legal obligations as the controller disclosing the data and the latter shall respond jointly and severally for the observance of such obligations before the AAIP and the data subject
. Even though the further processing does not require the consent of the data subject in this case
, the Argentinian authorities have confirmed that, in accordance with the LPDP, the data subject must nevertheless be informed about the purpose of the processing and the identity of the recipient, or other elements that enable the data subject to identify the recipient. Moreover, these requirements are without prejudice to the principles, obligations and rights provided for in the LPDP (e.g., the purpose of the onward sharing has to be compatible with the original purpose of collection). The LPDP and LPDP regulation furthermore contain specific provisions on international transfers to a third country or international organisation. As explained previously (see section 2.1), these provisions follow an approach similar to the one of the EU data protection framework.
Second, the different laws that allow for data collection by criminal law enforcement authorities in Argentina impose specific limitations and safeguards as to the use and further dissemination of the information obtained in exercising the powers they grant.
As regards the powers of search and seizure, the CPPF provides that seized objects must be described, inventoried and placed in safe custody to prevent their modification or substitution
. Seized objects that are not subject to confiscation, restitution or embargo must be returned immediately to their owners, after carrying out the procedures for which they were obtained
. Regarding data seizures, the CPPF notably provides that any elements that are seized, but are unrelated to the investigation, must be returned to their rightful owner and that any copies that have been made must be destroyed. The data subject may turn to the judge to ensure that the elements are returned and that any copies are destroyed
.
With respect to the interception of communications, the CPPF sets out the safeguards that need to be applied to the intercepted material. The officials in charge with the execution of the interception warrant and/or those who are responsible for the evidence are bound to a duty of confidentiality with respect to the information obtained. Those who fail to comply with this duty can be held criminally liable
. Once the correspondence or intercepted elements have been obtained, a representative from the Public Prosecutor’s Office must open them, examine the elements and read the contents of the correspondence. The representative must subsequently explain to a judge, in a one-party hearing, how and why the seized objects are related and necessary to the investigation. The judge must keep any remaining content confidential and order its return to the defendant, his or her representatives, or close relatives
. At the end of the proceedings, the sound records of the communications and transcripts that have been made must be protected from public access. They may not be accessed for any purpose, except by court order, and for justified reasons
.
In terms of investigative measures carried out in the context of the fight against money laundering and terrorism financing, Law 25.246 requires the UIF to submit to the Public Prosecutor’s Office the cases in which there is reasonable suspicion of the commission of a criminal offence
.
Finally, Law No. 24.767 provides the rules on mutual legal assistance in criminal matters
. This law only applies when there is no mutual legal assistance treaty in place between Argentina and the requesting State
. In such cases, the law provides that Argentina shall render to any State that so requires the widest assistance in the investigation, prosecution and punishment of offences falling within its jurisdiction
. Under this ‘principle of broad and prompt cooperation’ the granting of assistance (e.g., the provision of evidence, the execution of a search warrant or the interception of communications) is in principle an obligation for the Argentine authorities
. However, the request for assistance must be admissible
and the obligation to grant assistance does not apply if the assistance sought involves the seizure of property, search of premises, surveillance of persons, postal interception, or phone tapping
.
2.2.3Oversight
The activities of Argentinian criminal law enforcement authorities are supervised by different bodies.
First, the AAIP is competent to oversee the processing of personal data by Argentinian criminal law enforcement authorities
. The AAIP can, at its own initiative or acting on a complaint by an individual, investigate potential violations of the provisions of the LPDP or its complementary rules
. In carrying out its oversight activities, the AAIP has access to all relevant information. In particular, it may request information from public authorities, which are required to provide background, documents, software or any other elements relating to personal data that such entities may be required to process
. In addition, it may request a judicial authorisation to access data processing premises, equipment, or software to verify violations of the LPDP
.
If the AAIP finds a violation of the LPDP, it provides the relevant public authority with a decision stating that the facts investigated constitute an infraction, who is responsible for that infraction, and the sanction to be applied
. For example, in 2019 the Agency carried out an ex officio investigation into the Argentinian Federal Police over the leaking of information from its databases
. This investigation established that the police had not taken the necessary measures to ensure the security and confidentiality of the personal data processed. As a consequence, the AAIP issued three warnings to the Federal Police, two for having breached the duties of data security and confidentiality and one for not having fully cooperated with the AAIP’s investigation.
Second, the Argentine Constitution provides for an independent Ombudsman (Defensor del Pueblo) to be elected by the Argentine Parliament whose mission is “the defense and protection of human rights and other rights, guarantees and interests protected in this Constitution and the laws, against facts, acts or omissions of the Administration; and control of the exercise of public administrative functions”
. It may investigate, ex officio or at the request of an individual, any act or omission of the public administration or its agents that involves the illegitimate, defective, irregular, abusive, arbitrary, discriminatory, negligent, seriously inconvenient or inappropriate exercise of their functions, including those capable of affecting diffuse or collective interests
. The independence of the Ombudsperson is guaranteed by law
, and in carrying out its investigations the Ombudsman has access to all relevant information
.
Based on the findings of his investigation, the Ombudsman may issue warnings and recommendations, reminders of the public authority’s legal and functional duties, and proposals for the adoption of new measures
. If the Ombudsman through his work becomes aware of potential crimes committed by public authorities, he must immediately notify the Attorney-General
. The Ombudsman is required to lay an annual report before Parliament with an account of the number and types of complaints submitted, those that have been rejected and the reason for their rejection, as well as those that have been investigated and their outcome
. According to the last figures available, the Ombudsman in 2022 initiated 234 ex officio investigations and received 12.210 complaints from citizens
.
Finally, different specialised bodies play a role in ensuring law enforcement authorities’ compliance with data protection law, for example the General National Syndicate (SIGEN) and the General National Auditor (AGN)
. The SIGEN responds to the President of Argentina and has investigative powers to undertake or coordinate independent audits into, inter alia, the legality of public authorities’ actions, which could include data protection law
. The AGN reports to the National Congress and enjoys similar powers
.
2.2.4Redress
The Argentinian system offers different (judicial) avenues to obtain redress, including compensation for damages.
First, individuals have a right to obtain access to and rectification or deletion (‘suppression’) of their data held by public authorities.
The LPDP provides that data subjects have the right to request and obtain information on their personal data included in, inter alia, public data registers or databanks
. In addition, every person has the right to rectify, update, and when applicable, suppress or keep confidential his or her personal data included in a data bank
. Both the right of access and the right to rectification and deletion may be exercised free of charge
. The relevant public authority may only refuse requests based on the right of access and the right to rectification and deletion in the interest of safeguarding certain important public interest (i.e., public order, the investigation of crimes and the verification of administrative violations) or to protect the rights and interests of others
. These exemptions are not absolute but require the relevant authority to decide on a case-by-case basis whether to invoke them, after balancing the relevant interests at stake, including the privacy interests of the individual concerned
. As will be explained in more detail below, individuals whose requests have been denied have the possibility to pursue the special judicial remedy of ‘habeas data’ to gain access to their data or to have that data rectified or deleted
.
Second, any individual may lodge a complaint with the AAIP in respect of any matter relating to the handling of personal information by a criminal law enforcement authority
. As described in section 2.2.3, if the AAIP finds a violation of the LPDP, it provides the relevant public authority with a decision stating that the facts investigated constitute an infraction, who is responsible for the infraction and what is the administrative sanction to be applied
. Decisions of the AAIP may be challenged before the courts in accordance with Title 4 of the Law on Administrative Procedure
. The court may declare the decision void
. Decisions that are declared void must be revoked or replaced by the AAIP
.
Third, judicial redress is available to all data subjects via the constitutional right to a habeas data action. The LPDP provides the conditions for a habeas data action before courts against actions by public authorities
. Once the deadline for the controller to either provide the information requested by the data subject, or to correct, delete or update the information, has expired and the controller has not complied with the request, or if the data subject considers the response insufficient, s/he may initiate a judicial habeas data procedure
. Importantly, the Supreme Court has ruled that the standing requirement for a habeas data action against a public authority must be interpreted extensively in order to facilitate the exercise of the fundamental right to privacy as enshrined in Article 43 of the Constitution
.
Judicial redress is also available via the general civil and administrative law actions available against public authorities, including law enforcement authorities.
First, data subjects may pursue a claim for the compensation of damages
in court, subject to the four basic requirements for any damages claim under Argentinian law: illegality of the damaging action; real and actual damage; cause-effect relationship between the action and the damage; and negligence, wrongful misconduct and fault. Second, a preventative action
would allow a data subject to request a judge to impose preventive restrictions and obligations on a data controller before there is specific damage, if the data subject is in a position to prove that the damage has a qualified probability to occur. Third, via a generic action
a data subject may request a judge to make a controller comply with any of the mandatory principles of the LPDP, even if he has not filed a complaint with the AAIP. This type of remedy is available when the habeas data action is not possible, i.e., when the action does not concern the exercise of a right of access, rectification or deletion of personal data. In practice, this type of action is most often combined with a claim for damages. Fourth, through an action for annulment
an individual who has been the object of a criminal investigation may challenge the court orders affecting him. This type of action can only be brought after the facts affecting his or her privacy have occurred. In case the challenge is rejected, the individual can request a review by the superior court. Moreover, under certain circumstances, the individual can become a plaintiff in the criminal proceeding. Finally, Article 52 of the Civil and Commercial Code establishes that any individual harmed in his or her personal or family privacy, honour or reputation, image or identity, or who in any way has his or her personal dignity undermined, may claim prevention and reparation of the damage suffered.
Finally, when all national redress avenues are exhausted, data subjects may lodge a case before the Inter-American Court of Human Rights for any violation of their fundamental right of privacy enshrined in the American Convention on Human Rights.
2.3Access and use by Argentinian public authorities for national security purposes
In Argentina, two agencies may access personal data transferred from the EU to Argentina for national security purposes: the Federal Intelligence Agency (AFI) and the National Criminal Intelligence Directorate (DINICRI). The AFI is the highest-ranking intelligence agency in Argentina and the director of the so-called National Intelligence System, which consists of the AFI, the DNICRI and the National Military Intelligence Directorate (DINIEM)
. The AFI was established in 2015 by Law 27.126 on the creation of the Federal Intelligence Agency and Presidential Decree No. 1311/2015 approving the “New National Intelligence Doctrine”, as part of a major overhaul of Argentina’s intelligence services
. In accordance with Article 2(5) of Law 25.520 (National Intelligence Act) and Decree No. 1311/2015, the basic task of these intelligence agencies is to generate knowledge for the purpose of contributing to decision-making in relation to matters relevant to national defence and internal security
. More specifically, the AFI is tasked with producing (1) national intelligence and (2) criminal intelligence related to complex federal crimes
. The DINICRI is tasked with producing criminal intelligence unless it is related to complex federal crimes
. The relevant powers of these agencies, as regulated by the National Intelligence Act and its regulatory decree are described in the following sections.
2.3.1Legal bases and applicable limitations/safeguards
Based on the National Intelligence Act and Decree No. 1311/2015, the AFI and DNICRI may access personal data transferred from the EU to Argentina as part of different activities, which are subject to specific limitations and safeguards following from the National Intelligence Act itself, from the LPDP, the Argentinian Constitution, the Argentina Digital Act, and case law.
Pursuant to the National Intelligence Act, the intelligence agencies must “unequivocally frame their activities within the general prescriptions of the Personal Data Protection Act 25.326”. Therefore, the accessing of personal data transferred from the EU to Argentina by these agencies for national security purposes may only take place in so far this is necessary for the performance of their legal duties
.
According to Decree No. 1311/2015, the task of the intelligence agencies is to develop “intelligence information, which comprises the body of observations and measurements obtained or gathered from public or classified sources concerning an event or relevant issues in the field of national defence or internal security”
. It furthermore specifies that intelligence is developed through three core institutional tasks: information gathering, information management and information analysis. Specifically with regard to the AFI, the decree stipulates that the AFI may, for the purpose of the production of national intelligence, engage in “the collection, gathering and analysis of information on facts, risks and conflicts affecting national defence and internal security through the agencies that are part of the National Intelligence System”
. This activity involves the gathering of strategic intelligence
and (ii) counterintelligence
. Furthermore, to produce criminal intelligence relating to complex federal crimes, the AFI may engage in “the collection, systematisation and analysis of information on the criminal issues in question using AFI resources”
.
The use of these powers is subject to limitations and safeguards that are specifically designed to prevent their (mis)use for political purposes and operations, and to ensure the protection of fundamental rights, including those guaranteed by Article 18 and 19 of the Argentinian Constitution. In particular, the Act provides that no intelligence agency may (1) exercise law enforcement powers or carry out criminal investigations (2) produce intelligence based solely on sensitive data of data subjects or (3) interfere in any way with the country’s institutional, political, military, police, social or economic situation, its foreign policy, its political parties, public opinion, individuals, media or associations of any kind
.
In terms of procedural safeguards, any intelligence activity must be ordered by the highest body of each authority
. Moreover, any intelligence activities involving the interception of private communications of any kind
may, without exception
, only be carried out when authorised by a judicial warrant
.
An interception warrant may only be issued when this “is necessary in the conduct of intelligence or counter-intelligence activities”
. Procedurally, interception requests must be submitted to federal judges with criminal competence by the Intelligence Secretariat or an official to whom that power is expressly delegated. Requests must be in writing, justified and must precisely indicate the telephone number(s) or e-mail address(es) or any other facilities/means, intended to be intercepted or collected
. As explained above (see section 2.1.1), once approved, the interception may only be conducted by or at the request of the Legal Assistance Directorate for Complex and Organised Crime, a subsidiary body of the Supreme Court
. An interception warrant may be granted for a period no longer than sixty days, a period which automatically expires unless it is extended by the judge (or the respective Chamber in the event of a refusal at first instance) when necessary to complete the ongoing investigation, and such an extension may only be for up to sixty days
. After the expiry of the time-limit for the initial collection established by judicial order, another judicial order must be issued to determine whether the retention should be prolonged or whether the data should be destroyed
.
The role of the judge in assessing the request for an interception warrant is essentially to verify whether the warrant sought is reasonable in light of the facts put forward. This follows from guidelines, issued by the Supreme Court, on the interception of communications (see section 2.2.1)
. These guidelines, which address all judicial bodies, clarify that the interception of communications is “an exceptional measure that may only be authorised with a restrictive approach” and that the warrant authorising the interception must be “well founded” and “may not granted on the basis of generic terms.” Moreover, based on settled case-law of the Supreme Court and the Inter-American Court of Human Rights, any interference with the inviolability of communications must be provided for by law, pursue a legitimate aim and comply with the requirements of suitability, necessity and proportionality
.
Lastly, violations of the above-mentioned rules are subject to criminal sanctions. Those who, in the permanent or transitory development of the tasks regulated by the National Intelligence Act, “unduly intercept, seize or divert telephonic, postal, telegraphic or fax communications or any other type of information, archive, record and/or private documents whose reading is not authorised nor accessible to the public, and that have not been addressed to them” may be punished by three to ten years of imprisonment and professional disqualification for twice that time
. The same sentence is incurred by any official or civil servant who carries out intelligence activities prohibited by Laws No 23.554 (National Defence), Law 24.059 (Internal Security) or the National Intelligence Act
. Anyone who fails “to destroy or eliminate the records of wiretaps, copies of postal, cable and fax interceptions or of any other element that accounts for the interceptions, recordings or diversions” after having been compelled to do so by judicial order or otherwise incurs a prison sentence from two to six years and professional disqualification for twice that time
.
2.3.2Further use of the information collected
The processing of personal data by the AFI and DINICRI is subject to the LPDP (see sections 2.1 and 2.3.1). In addition, the National Intelligence Act sets out specific safeguards for the storage of data collected by the intelligence agencies. It stipulates that “data which, once stored, is not used for the purposes laid down by this Law, is destroyed” and prohibits the storage of data in intelligence databases “for reasons of race, religious faith, private actions, political opinion, membership of or membership of advocacy, social, human rights, trade unions, community, cooperatives, care, cultural or labour organisations, as well as their lawful activity in any sphere”
.
With respect to the further sharing of data with other entities (within or outside Argentina), the National Intelligence Act and the LPDP (which applies to intelligence services, as explained in section 2.1) impose specific limitations. Based on Article 11 LPDP, personal data collected for national security purposes may only be shared with other public authorities for purposes directly related to the legitimate interests of the original controller and the recipient, subject to the conditions and safeguards described in section 2.2.2. Furthermore, the National Intelligence Act provides that the disclosure or dissemination of personal data, acquired by intelligence agencies in the course of their duties, requires a judicial order and a presidential authorisation pursuant to Article 16 of the Act
, except when the disclosure or dissemination is provided for in a legal provision
.
Based on the LPDP, the transfer of any type of personal data to third countries or international organisations which do not provide adequate levels of protection, is prohibited, subject to limited exceptions (e.g., when the transfer is made for international cooperation purposes between intelligence agencies in the fight against organized crime, terrorism and drug-trafficking)
. However, as explained above (see section 1.1.), these exceptions must be interpreted restrictively. Falling within the scope of one of these exceptions is not sufficient to ensure the lawfulness of the transfer; all the data protection principles, obligations and rights of the LPDP must be always complied with.
2.3.3Oversight
The activities of Argentinian national security authorities are supervised by different bodies.
First, the AAIP oversees the activities of the AFI and DINICRI, as provided for in the LPDP and the National Intelligence Act. This oversight follows similar conditions as in a law enforcement context and for public authorities in general, as detailed in Section 2.2.3.
Second, parliamentary oversight in the area of national security is carried out by the Bicameral Commission for the Audit of Intelligence Bodies and Intelligence Activities
. This Commission was established in 2001 by the National Intelligence Act as an independent review mechanism composed of officials from the Chamber of Deputies and the Senate
. It is charged with supervising the bodies belonging to the National Intelligence System, with a view to oversee that their operation strictly complies with the constitutional, legal and regulatory requirements
. To perform its oversight role, the Bicameral Commission may initiate ex officio investigations
. Its oversight activities furthermore include (1) studying, analysing and assessing the execution of the National Intelligence Plan (2) studying the Annual Intelligence Activities Report
(3) receiving any explanations and reports deemed appropriate from government ministers (4) giving opinions on any draft legislation linked to intelligence activities, and (5) receiving complaints from natural and legal persons about abuses and wrongdoings committed by intelligence agencies
.
The Bicameral Commission has, in principle, access to all the information or documentation it requests from the bodies that make up the National Intelligence System
.The Bicameral Commission furthermore has the power to request classified reports containing a list of interceptions carried out within a specified period. It may request such reports from the Legal Assistance Directorate for Complex and Organised Crime, its representatives within the country and from telecom operators active in Argentina, for the purpose of controlling the legality of such interceptions
.
The Bicameral Commission submits annual reports with recommendations to the National Executive and the Parliament. These annual reports evaluate the activities, performance, and organization of the National Intelligence System with regard to the National Intelligence Plan
. In 2018, the Bicameral Commission wrote a detailed opinion on a new legislative proposal to amend the National Intelligence Act
. In addition, in 2020-2021 the Bicameral Commission conducted an in-depth investigation into certain alleged breaches by the AFI during the period of 2016 to 2019. Its extensive report of 20 April 2021 included proposals for structural reforms within the National Intelligence System such as the creation of a whistle-blower system
.
Finally, SIGEN (see section 2.2.3) has the possibility to control the administrative processes and the budget execution of the AFI’s public funds
.
2.3.4Redress
The Argentinian system offers different avenues to obtain redress, including compensation for damages.
First, individuals have a right to obtain access to and rectification or deletion (“suppression”) of their data held by the AFI or DINICRI under the LPDP, subject to the same conditions as described in section 2.2.4.
Second, any individual may lodge a complaint with the AAIP in respect of any matter relating to the handling of personal information by the AFI or DINICRI, in the same way as described in section 2.2.4.
Third, judicial redress may be sought via a constitutional habeas data action against the AFI, or DINICRI, subject to the same conditions as described in section 2.2.4. For instance, in the Supreme Court case of R. P., R. D. c/Estado Nacional – Secretaría de Inteligencia del Estado, the complainant initiated a habeas data action against the former State Intelligence Service (SIDE) to gain access to information gathered by SIDE from 1961 to 1973, which he considered necessary to receive pension entitlements from the national administration (ANSES). The Supreme Court considered that information processed by intelligence organisations does not per se constitute classified information, and that the judiciary is authorised to have access to the documents in question and to verify whether the decision to refuse the requested access is lawful
.
Fourth, the same judicial avenues as the ones described in section 2.2.4 (i.e., a claim for the compensation of damages, preventative action, generic action, action for annulment) are also available against the AFI and DINICRI.
Finally, once all national law remedies are exhausted, data subjects may bring their case before the Inter-American Commission of Human Rights.
III. CANADA
1.RULES APPLYING TO THE PROCESSING OF PERSONAL DATA
1.1.Relevant developments in the data protection framework of Canada
On 20 December 2001, the European Commission adopted its adequacy decision on the adequate protection of personal data provided by the Canadian Personal Information Protection and Electronic Documents Act (PIPEDA). The decision covers transfers of personal data from the EU to recipients in Canada that are subject to PIPEDA. The Article 29 Working Party adopted its opinion on 20 January 2001.
Since the Commission adopted its adequacy finding in 2001, PIPEDA has been amended on five occasions; by the Anti-Terrorism Act (S.C. 2001, c. 41), the Public Safety Act (which entered into force in 2004, S.C. 2004, c. 15), the Public Servants Disclosure Protection Act (S.C. 2005, c. 46), Canada’s Anti-Spam Legislation (S.C. 2010, c. 23) and the Digital Privacy Act (S.C. 2015, c. 32). Moreover, further interpretations and clarifications have been provided by the courts and the federal data protection authority (the Office of the Privacy Commissioner, OPC).
In June 2022, the Canadian government introduced a bill (Bill C-27) in the Canadian Parliament to enact the Consumer Privacy Protection Act, the Personal Information and Data Protection Tribunal Act and the Artificial Intelligence and Data Act. The bill is currently being examined by the House of Commons of the Canadian Parliament, after which it will go to the Senate. The proposed Consumer Privacy Protection Act would amend PIPEDA in several ways, e.g., by codifying certain clarifications provided over the years by courts and the OPC (for instance on the validity and modalities of consent, requirements for the legitimacy/lawfulness of data processing, the right to deletion and international data transfers) and by further strengthening the powers of the OPC.
PIPEDA has a specific scope of application, which has been extended several times since the adoption of the adequacy decision. Currently, PIPEDA applies to the collection, use and disclosure of personal information by an organization in the course of a commercial activity, as well as to the processing of personal information about employees of (or applicants for employment with) an organisation that is federally regulated. Since 2015, PIPEDA also applies to processing of personal information by the World Anti-Doping Agency. It does not apply to personal information handled by public authorities, non-profit organisations (unless they handle personal information for commercial purposes), individuals (to the extent they handle the information for purely personal or domestic purposes), or employee information of non-federally regulated organisations. In addition, an amendment in 2015 introduced a specific exception for the processing of business contact information (e.g., name, title, work address, work contact details) solely for the purpose of communicating or facilitating communication with the individual in relation to their employment, business or profession. This exception only applies to a limited number of situations (e.g., to use the work e-mail address of a lawyer to obtain legal advice) and cannot be relied upon to use information for different purposes (e.g., to use that same work e-mail address for marketing purposes).
As regards its territorial scope of application, PIPEDA provides for the possibility to exempt organisations or activities from its application with respect to the processing that occurs solely within a province that has passed legislation deemed to be substantially similar to PIPEDA. In that case, this provincial legislation applies to the processing of personal information taking place within that province. Any processing that takes place across provincial or international borders or that is carried out by federally regulated businesses (regardless of where it takes place) remains subject to PIPEDA. So far, Quebec, Alberta and British Columbia have been found to have substantially similar (comprehensive) privacy legislation, while the health-related privacy laws of Ontario, New Brunswick, Nova Scotia and Newfoundland and Labrador have been declared substantially similar to PIPEDA with respect to health information. However, this does not affect personal data transferred from the EU/EEA to Canada on the basis of the adequacy decision; data transfers from the EU/EEA under the adequacy decision are considered cross-border data transfers, which are subject to PIPEDA.
While the definition of personal information under PIPEDA (i.e., “information about an identifiable individual”) has not changed since the adoption of the adequacy decision, this notion has been further interpreted by the OPC, case law and guidance. In particular, it has been clarified the definition of personal information must be given a broad and expansive interpretation
, similar to the one under Regulation (EU) 2016/679 (GDPR), taking into account whether there is a serious possibility that an individual could be identified through the use of that information, either alone or in combination with other Information
. For example, a decision of the OPC has clarified that de-identified information remains personal information if it is still possible to link the data back to an identifiable individual.
Since the adoption of the adequacy decision, the main data protection principles provided by PIPEDA, which are closely aligned to the corresponding principles under EU data protection rules, have not changed. This is the case for the principle of purpose limitation (subsection 5(3)), purpose specification (Principle 4.2 of Schedule 1 PIPEDA) data accuracy (Principle 4.6 of Schedule 1), data minimisation (Principles 4.4 and 4.5, of Schedule 1), data retention (Principle 4.5 of Schedule 1), security (Principle 4.7 of Schedule 1), accountability (Principle 4.1 of Schedule 1), and transparency (Principle 4.8 of Schedule 1). At the same time, several aspects of the legal framework have been further clarified and developed, either through legislative amendments or through case law and/or guidance of the OPC.
In particular, the requirements for lawfulness of processing have been further strengthened in different ways. As a general principle, PIPEDA requires the knowledge and consent of the individual for any collection, use or disclosure of personal information, although PIPEDA also contains certain exceptions (see below). The requirements for valid consent have been reinforced by an amendment to PIPEDA introduced by the Digital Privacy Act (2015), by making clear that that consent is only valid if it is reasonable to expect that individuals understand the nature, purpose and consequences of the collection, use or disclosure of the personal information to which they are consenting. According to the guidance of the OPC, this requires that individuals are provided with information on what personal information will be collected, the purpose of processing, the third parties with whom information will be shared and possible (negative) consequences for the individual (e.g., financial loss, negative effects on credit records, etc.). Organisations must provide this information in an easily accessible form, provide individuals with a clear and easily accessible choice (not) to consent, obtain new consent when making relevant changes to their privacy practices and allow consent to be withdrawn.
Moreover, case law and guidance have provided further clarifications on the form and way consent should be obtained, which may vary, depending on the circumstances and type of information. A Supreme Court decision in 2016 confirmed that, in determining whether consent must be expressly given, organisations need to take into account the sensitivity of the information and the reasonable expectations of the individual, both of which depend on the specific circumstances of the case. OPC guidance and decisions specify that express consent is, in principle, the most appropriate form in any circumstance and must in any event be obtained when the information is sensitive (see below on the notion of sensitivity under PIPEDA), when the processing is outside of the reasonable expectations of the individual (e.g., certain sharing of information with a third party, tracking of location), or when it creates a meaningful risk of significant harm (which is to be understood broadly, including both material and reputational impact). Implied or opt-out consent are only allowed in limited and strictly defined circumstances.
Since the adoption of the adequacy decision, some additional exceptions to consent have been introduced, which may permit the collection, use or disclosure of personal information without obtaining consent from the individual for specific and circumscribed purposes. For example, the Digital Privacy Act (2015) introduced exceptions that allow collection and use (1) when personal information is contained in a witness statement and the collection or use is necessary to assess, process or settle an insurance claim; and (2) when personal information was produced by the individual in the course of employment, business or profession and the collection or use is consistent with the purpose for which the information was produced. In addition, exceptions were introduced allowing the use and disclosure of personal information in the context of prospective and completed business transactions (e.g., in case of a merger or sale of business, but not in case of business transactions where the primary purpose or result is the purchase, sale or other acquisition or disposition, or lease, of personal information) under certain conditions. Finally, other exceptions were added to permit federal works, undertakings or businesses to collect, use and disclose personal information if necessary to establish, manage or terminate an employment relationship and the organisation has informed the individual thereof.
Case law and guidance of the OPC have furthermore elaborated on the requirements for the legitimacy/lawfulness of data processing, regardless of whether personal information is processed on the basis of consent, or an exception applies. In particular, PIPEDA provides that any collection, use or disclosure of personal information may only take place “for purposes that a reasonable person would consider are appropriate in the circumstances”. In Turner v. Telus Communications Inc, the Federal Court set out a number of factors that should be taken into account to determine whether a purpose is appropriate, including the degree of sensitivity of the personal information at issue, whether the processing would be effective in meeting the organization’s need, whether there are less invasive means of achieving the same ends at comparable cost and with comparable benefits and whether the loss of privacy is proportional to the benefits. Consequently, organisations are required to engage in a balancing of interests of the individual and the organisation itself. In order to determine the appropriateness of a purpose, an organisation must take into account the particular facts surrounding the collection, use and disclosure.
Another area of the Canadian data protection regime that has developed since the adoption of the adequacy decision concerns the requirements with respect to security safeguards. In 2015, a mandatory data breach notification requirement was introduced, which entered into force on 1 November 2018. Organisations are now required to report breaches to the OPC and concerned individuals, if it is reasonable in the circumstances to believe that the breach creates a real risk of significant harm to an individual. To determine whether that is the case, organisations have to take into account factors such as the sensitivity of the personal information, the probability that the information has been, is being or will be misused, etc.. Organisations must provide the notification as soon as feasible after determining that the breach has occurred, maintain a record of every breach and provide such records to the Privacy Commissioner upon request. Deliberately failing to report a breach or maintain data breach records are offences subject to fines.
PIPEDA requires organizations to be accountable for personal information under their control and sets out a number of obligations in this regard. Guidance developed by the OPC has also further clarified how the accountability requirements of PIPEDA should be implemented, for instance by developing privacy management programs, appointing privacy officers or offices, keeping records and establishing internal reporting mechanisms, conducting internal audit and assurance programs to monitor compliance, developing personal information inventories, conducting risk assessments and developing training and education programs.
As regards the processing of special categories of data, PIPEDA does not provide for a closed listed of categories that are subject to additional protections. Instead, PIPEDA considers any information as potentially sensitive, depending on the circumstances and context in which it is collected/used/disclosed. This has the potential to apply additional protections to a broader range of personal information depending on the circumstances. Since the adequacy decision, the OPC and the courts have considered the question of sensitivity in a variety of cases. In 2022, the OPC consolidated existing case law and OPC decisions in an interpretation bulletin clarifying that certain types of information will generally be considered sensitive because of the specific risks to individuals when said information is collected, used or disclosed. This includes information such as health and financial data, ethnic and racial origins, political opinions, genetic and biometric data, an individual’s sex life or sexual orientation, and religious/philosophical beliefs
. Such information is subject to specific requirements as regards the form and way in which consent is obtained (see earlier) and the security measures to be put in place.
As regards individual rights, there have been several developments in the Canadian legal framework since the adoption of the adequacy decision. PIPEDA continues to provide individuals with rights of access and correction, and, while PIPEDA in principle does not create a separate right to deletion, the OPC has indicated that a combination of provisions may create rights for individuals/obligations for organisations to delete personal information. For example, the OPC considers that, where individuals withdraw consent, they should be able to delete information they have themselves provided to an online forum involved in a commercial activity, such as on a social network. The same reasoning has also been applied in a broader context, for instance in a case where an individual had requested deletion of personal information contained in an insurance form.
In addition, the entry into force of Canada’s Anti-Spam Legislation (CASL) in 2014 introduced several safeguards that are relevant to the processing of personal information for direct marketing purposes. CASL amended PIPEDA by limiting the possibility for processing an individual’s electronic address without consent, if it is collected by the use of a computer program that is designed or marketed primarily for use in generating or searching for and collecting electronic addresses.
With respect to the rules in PIPEDA on international data transfers, certain requirements have been further interpreted and clarified by the OPC. In particular, as regards the sharing of data with a third party for processing (i.e., a ‘processor’) in a third country, the OPC has clarified that organisations are required to inform individuals of the risk that their personal information may be lawfully accessed under the laws of the third country. This approach has been applied by the OPC in concrete cases that were triggered by complaints from individuals.
1.2.Oversight, enforcement and redress
The OPC is the independent authority charged with oversight and enforcement of PIPEDA. In addition to its power to investigate complaints and undertake audits, it is also tasked with developing and conducting information programs to foster public understanding, undertaking research, encouraging organisations to comply with PIPEDA and otherwise promoting the protection of personal information under PIPEDA.
In terms of powers, the OPC may participate in sector- or issue-wide international privacy sweeps, issue letters of concern to organizations. With respect to its more formal enforcement authorities, it may ask an organization for access to their internal breach records, carry out audits
and conduct complaint investigations (in response to a complaint or on its own initiative)
. In carrying out audits and investigations, the OPC has access to any relevant information, may summon and enforce the appearance of persons and compel the production of evidence
. Upon completing an investigation or audit, the OPC issues a report setting out the findings and recommendations
. Since the adoption of the Commission’s adequacy decision, the powers of the OPC under PIPEDA have been strengthened by amendments introduced by the Digital Privacy Act in 2015. Following this amendment, the OPC may now enter into a compliance agreement with an organisation if it believes on reasonable grounds that an organisation has violated, is about to violate or is likely to violate PIPEDA. Such a compliance agreement may contain any terms the OPC deems necessary to ensure compliance and is considered a settlement with the concerned organisation. At the same time, compliance agreements do not preclude individuals from obtaining judicial redress and do not prevent the prosecution of an offence. If an organisation fails to comply with the agreement, the OPC may apply to the Federal Court to obtain an order requiring the organisation to do so. As explained in more detail below, the OPC actively exercises its powers to enforce compliance with PIPEDA.
As regards the possibility for individuals to obtain redress, different avenues continue to be available in the Canadian system. In particular, individuals may turn directly to organisations, file a complaint with the OPC and obtain judicial redress (against organisations or against the findings of the OPC), which may lead to different types of remedies, including binding orders to bring the handling of personal information in compliance with PIPEDA and compensation for damages.
Since the adoption of the adequacy decision, the OPC has carried out a number of important investigations under PIPEDA. Among the most prominent cases are the investigation of a data breach at Equifax in 2019 (which led to the conclusion of a compliance agreement), the use of facial recognition tools by Clearview in 2021 (which was a joint investigation with provincial data protection authorities that led to provincial commissioners issuing binding orders requiring Clearview to stop several practices and delete personal data that was unlawfully collected), the Facebook/Cambridge Analytica scandal (as part of which the OPC applied to the Federal Court in 2020 to seek a binding enforcement order to ensure that Facebook’s unlawful privacy practices are corrected).
Its annual reports to the Parliament also show that the OPC deals with a number of complaints under PIPEDA on an annual basis: for example, the annual report of 2018-2019 refers to 380 accepted complaints, 178 closed through early resolution and 104 closed through a standard investigation; the report of 2019-2020 to 289 accepted complaints, 221 closed through early resolution and 97 closed through standard investigation; and the report of 2020-2021 to 309 accepted complaints, 210 closed through early resolution and 86 closed through standard investigation.
The OPC has also been very proactive in providing guidance on the interpretation and application of PIPEDA, including on topics such as the processing of employee data, biometric data, cloud computing, the development of mobile apps, online behavioural advertising, the processing of data from children, e-marketing, internet of things, etc.. Moreover, the OPC issued several ‘interpretation bulletins’ that summarise the general principles that emerge from court decisions and OPC findings, e.g., on the definition of personal information, accountability, accuracy, transparency and consent. The OPC also developed a number of tools to assist organisations with training and compliance efforts, and provides detailed information on various topics to raise awareness among data subjects (e.g., specifically targeting certain groups such as parents, teachers and seniors; on mobile devices; human resource issues; data concerning health, etc.).
Finally, the OPC regularly engages with stakeholders, such as businesses (e.g., through 19 advisory engagements in the period of 2019-2020 and 13 in 2020-2021), and the Parliament (e.g., with 8 appearances before Parliamentary committees in the period of 2019-2020 and 3 in 2020-2021, and e.g., having reviewed 29 bills, laws and parliamentary studies for privacy implications during the period of 2019-2020 and 17 in 2020-2021). The OPC also advised the government and Parliament on the protection of personal data in the context of the response to the Covid-19 pandemic and has been an active voice in debates about reforms of data protection legislation at both provincial and federal level.
2.ACCESS TO AND USE OF PERSONAL DATA TRANSFERRED FROM THE EUROPEAN UNION BY PUBLIC AUTHORITIES IN CANADA
2.1.General legal framework
The limitations and safeguards that apply to the collection and subsequent use of personal information by Canadian public authorities for criminal law enforcement and national security purposes follow from the overarching constitutional framework, specific laws regulating data access, as well as the rules that apply to the processing of personal information by the public sector.
According to the Supreme Court of Canada, the interception and recording of a private communication by public authorities constitutes a serious intrusion into privacy rights and would (unless all parties to the conversation expressly consent to the recording) be considered a search within the meaning of Section 8 of the Charter, generally only permissible with prior judicial authorisation. Similarly, personal computers (because of the vast amounts of information they contain, including intimate correspondence, details of financial, medical and personal situations, internet browsing histories, etc.) and internet subscriber information (as it may not only relate to the person’s name or address, but to his or her identity as the source or possessor of certain information) engage a high level of privacy.
To comply with Section 8 of the Charter, a search/seizure must be “reasonable”. In principle, this requires prior judicial authorisation, when the court is satisfied that “the public’s interest in being left alone by government must give way to the government’s interest in intruding on the individual’s privacy in order to advance the goals of law enforcement”. For a warrantless search or seizure, there is therefore a presumption of “unreasonableness,” which can be rebutted by the relevant public authority by establishing that the search was authorised by law, the law itself is reasonable, and the manner in which the search or seizure takes place is reasonable. If no prior judicial authorisation is required, additional safeguards may be required, such as after-the-fact notice to the target of the search and record-keeping requirements. Even when a search or seizure is authorised pursuant to a warrant or reasonable law, it can be found to be in violation of Section 8 because of the manner in which it is carried out. In particular, a search or seizure must be no more intrusive than is reasonably necessary to achieve its objectives.
All laws and government actions at both the federal and provincial levels must conform to the Charter. As described in more detail in sections 2.2.1 and 2.3.1, the general principles following from the Charter are reflected in the specific laws that regulate the powers of law enforcement and national security authorities.
Moreover, the processing of personal information by Canadian federal public authorities (including federal criminal law enforcement authorities and national security authorities) is subject to the Privacy Act (R.S.C., 1985, c. P-21). The Act limits the collection of personal information by federal institutions to what relates directly to their programs or activities and regulates its use, disclosure and retention. It reflects the principles of purpose limitation, data accuracy, transparency and storage limitation, and provides individuals with a right of access to their personal information and a right of correction. The processing of personal information by provincial/territorial authorities (e.g., local criminal law enforcement authorities) is subject to similar personal information protection laws. In particular, these laws impose limitations on the collection, use and disclosure of personal information, contain key personal information protection principles (such as transparency, accuracy, security, storage limitation and purpose limitation) and provide individuals with a right of access and correction. Moreover, all thirteen provinces and territories have an independent supervisory authority to oversee compliance and handle complaints.
These general limitations and safeguards can be invoked by individuals before independent administrative bodies (e.g., the OPC, provincial personal information protection authorities, the Civilian Review and Complaints Commission for the Royal Canadian Mounted Police and the National Security and Intelligence Review Agency) and courts to obtain redress (see sections 2.2.4 and 2.3.4).
2.2.Access and use by Canadian public authorities for criminal law enforcement purposes
In Canada, criminal law enforcement functions are carried out by different authorities. At federal and territorial levels, these include the federal police force (the Royal Canadian Mounted Police, RCMP), as well as other bodies with specific competences, such as the Canada Border Services Agency, the Canada Revenue Agency, the Canadian Food Inspection Agency and the Competition Bureau. At provincial and municipal levels, criminal law enforcement functions are carried out by the RCMP or local police and peace officers. Canadian law imposes a number of limitations on the access and use of personal information for criminal law enforcement purposes by each of these authorities and provides oversight and redress mechanisms. The conditions under which such access can take place and the safeguards applicable to the use of those powers are described in the following sections.
2.2.1.Legal bases and applicable limitations/safeguards
Personal information transferred under the adequacy decision and processed by Canadian organisations subject to PIPEDA may be obtained by Canadian criminal law enforcement authorities by means of investigative measures under statutes providing for law enforcement access, the primary one being the Criminal Code or on the basis of anti-money laundering and anti-terrorist financing legislation; or through voluntary disclosures.
The Criminal Code provides Canadian criminal law enforcement authorities (at federal, provincial and municipal levels) with a legal basis to access personal information held by commercial operators through searches and seizures, the interception of communications, accessing tracking and transmission data, and the use of production orders. The Criminal Code lays down clear and precise rules on the scope and application of these measures, thereby ensuring that the interference with the rights of individuals will be limited to what is necessary for a specific criminal investigation and proportionate to the pursued purpose. Moreover, to exercise any of these powers, prior judicial authorisation is in principle required (with certain exceptions, e.g., in emergencies, as described in more detail below).
Searches or seizures may be permitted under a search warrant to take place if there are reasonable grounds to believe that there is anything in a building, receptacle or place for which a connection with an offence can be established (e.g., anything that will produce evidence with respect to the commission of an offence). In terms of procedural safeguards, a search/seizure may as a general rule only take place on the basis of a court-issued warrant. A search of a computer system in order to seize, reproduce or copy data, must be specifically authorised by the warrant
. In principle, the person subject to the search is present when the search is carried out and, where this is not the case, a copy of the warrant is left to inform the individual. Warrantless searches or seizures may take place if the conditions for obtaining a warrant exist but there are exigent circumstances that make it impracticable to obtain a warrant. In accordance with case law, this will be the case if there is an “imminent danger of the loss, removal, destruction or disappearance of the evidence if the search is delayed” or if there is a degree of urgency that necessitates action by law enforcement.
Specific limitations and safeguards apply to the interception of private communications, which in principle may only take place in the context of investigations of serious offences and in most cases on the basis of a judicial authorisation. Procedurally, the application for the authorisation must in principle be signed by the Attorney General of the relevant province or the Minister of Public Safety and Emergency Preparedness and submitted to a judge of a superior court of criminal jurisdiction. An authorisation may be issued if it is in the best interests of the administration of justice and other investigative procedures have been tried and have failed/are unlikely to succeed or the urgency of the matter is such that it would be impractical to carry out the investigation of the offence using only other investigative procedures. An interception authorisation is valid for a maximum period of 60 days (one year for offences related to terrorism or criminal organizations) and may be renewed by the court once for the same period by a judge if the abovementioned conditions remain fulfilled. Intercepting private communications in violation of the Criminal Code is an offence liable to imprisonment for a maximum of five years.
In terms of additional safeguards, the Criminal Code imposes specific reporting and transparency requirements. In particular, within 90 days after the end of the authorisation, the individual that was the object of the interception must be notified in writing and a certification of that notification must be provided to the court that authorised the interception. A longer period for notification must be specifically requested when applying for authorisation and may not exceed three years. Such extension may only be granted if the investigation of the offence to which the authorisation relates is ongoing and it is in the interest of justice. In addition, the contents of private communications may only be used as evidence in judicial proceedings if the accused has been provided with reasonable notice of that intention together with a transcript of the communication and a statement setting out the time, place, date, and parties to the communication. More generally, the Minister of Public Safety and Emergency Preparedness is required to issue an annual public report with, inter alia, the number of applications and authorisations, the number of persons identified in an authorisation against whom proceedings were commenced, the average period for which authorisation and renewals were granted, etc.
Interception of private communications without a prior judicial authorisation by a police officer are permitted to take place (in the context of investigations of any offence) in two exceptional circumstances. First, this may be the case if there are reasonable grounds to believe that a) the urgency of the situation is such that an authorisation could not, with reasonable diligence, be obtained; b) the interception is immediately necessary to prevent an offence that would cause serious harm to any person or to property; and c) either the originator of the private communication or the person intended to receive it is the person who would commit the offence or is the (intended) victim. In this case, the concerned individuals must be notified in the same way as was described above. Second, a warrantless interception may take place by an agent of the state if a) either the originator of the communication or the person intended to receive it has consented to the interception; b) the authority believes on reasonable grounds that there is a risk of bodily harm to the person who consented to the interception; and c) the purpose of the interception is to prevent the bodily harm. In that case, the content of the intercepted communications will only be admissible as evidence in court proceedings for the purposes of proceedings in which actual, attempted or threatened bodily harm is alleged.
In addition to intercepting the content of private communications, criminal law enforcement authorities may collect transmission data if there are reasonable grounds to suspect that an offence has been or will be committed and the data will assist in the investigation. Such collection may again only take place on the basis of a court-issued warrant. Case law
confirmed that such a warrant could be used “either to obtain names and records where the suspected phone number but not the name of the suspect is known, or alternatively, to produce the phone number and records, if any, where the police are able to provide the service provider with the name and address but not the cell phone number of the suspected person for whom they seek records”.
Similarly, to collect data related to the location of a transaction, individual or thing (tracking data), a warrant must be obtained. Such a warrant may authorise the use of a “tracking device” (a device, including a computer program, which may be used to obtain or record tracking data or to transmit it by a means of telecommunication) for a maximum period of 60 days. When used to track an individual’s movement by identifying the location of a thing that is usually carried or worn by the individual, it may only be used if there are reasonable grounds to believe that an offence has been or will be committed and tracking the individual will assist in the investigation.
Under the Criminal Code, criminal law enforcement authorities may also obtain a production order from a court, ordering a person to produce a copy of a document/prepare or produce a document containing data that is in their possession or control. To issue a general production order, the judge must be satisfied that there are reasonable grounds to believe that an offence has been or will be committed, the document or data is in the person’s possession or control and will produce evidence. For orders requiring the production of specific types of information, i.e., transmission data, tracking data or financial data, the judge must be satisfied that there are reasonable grounds to suspect that an offence has been or will be committed; the relevant information is in the persons control and will assist in the investigation of the offence.
As a general safeguard, warrants authorising the collection of tracking/transmission data and production orders are considered public records to which individuals can obtain access, unless a sealing order has been issued by a judge. A sealing order must be requested by a law enforcement authority at the time of applying for the warrant/order and may be issued if the disclosure would affect the course of justice (e.g., if it would compromise the identity of an informant, compromise an ongoing investigation, etc.) or the information might be used for an improper purpose and this reason outweighs the importance of access to the information by the individual.
In addition to disclosing information pursuant to binding measures adopted under the Criminal Code, organisations subject to PIPEDA may in certain circumstances disclose information to public authorities on a voluntary basis, either on their own initiative or to comply with a request for the information. When receiving information in such cases, criminal law enforcement authorities may only use or disclose it in accordance with the requirements described in section 2.2.2. An organisation may collect and disclose personal information to a government institution on its own initiative when it has reasonable grounds to believe that the information relates to a violation of the law. Organisations may also disclose personal information when receiving a request from a government institution and may collect and use personal information for the purpose of such disclosure. When making a request, the institution must identify its lawful authority to obtain the information. The existence of a reasonable expectation of privacy of the concerned individual is a central factor to take into account in determining whether there is such lawful authority.
Case law clarifies how these provisions are to be applied in practice. For example, the Ontario Court of Appeal found that the routine sharing of information with public authorities (in this case the informal sharing of energy consumption data by electricity provider with the police) does not comply with PIPEDA and needs to be distinguished from a situation where a service provider discloses specific information to the police with concerns that a crime has been committed. The Supreme Court of Canada found that obtaining IP addresses (which can, when associated with an identity, reveal highly personal information) through a request where the police had no authority to compel compliance with that request constituted an unconstitutional search. According to the Court, obtaining such information engaged a reasonable expectation of privacy and therefore constituted a search within the meaning of Section 8 of the Charter, requiring either a warrant or specific empowerment by law. The police could therefore not rely solely on PIPEDA’s provisions relating to voluntary disclosures to obtain the information. Following this decision in 2014, all telecommunication providers that have published transparency reports have reported zero voluntary disclosures of subscriber information.
2.2.2.Further use of the information collected
The processing of personal information collected by Canadian criminal law enforcement authorities is subject to the federal Privacy Act and privacy legislation at provincial/territorial level. The Privacy Act sets requirements on purpose limitation, accuracy, transparency and storage limitation and specify the circumstances in which federal criminal law enforcement authorities may use or disclose personal information. Further processing (use and disclosure) without consent is only allowed under a limited number of grounds that are enumerated in the Act, e.g., when permitted by a federal statute, where necessary to comply with a warrant or subpoena, for internal audit purposes, or where the public interest in the processing clearly outweighs the invasion of privacy or where it clearly benefits the concerned individual. The Act also requires public authorities to keep records of the personal information under their control, including of the purposes for which personal information is used and the applicable retention period. Similar obligations apply under provincial and territorial privacy laws.
In addition, different instruments have been adopted by the Canadian government that further specify how public authorities should protect personal information. With respect to the sharing of data with other entities (within or outside Canada), guidance of the Treasury Board of Canada Secretariat (which is responsible for developing policy instruments, including guidance, concerning the application and implementation of the federal Privacy Act) recommends to put in place information sharing agreements (legally binding agreements or arrangements/memoranda of understanding) containing appropriate personal information protection safeguards. The latter for instance include purpose specification and limitation, security measures, maximum retention periods, rights of access and to request correction for individuals, conflict resolution mechanisms, etc.. More generally, including under the Avoiding Complicity in Mistreatment by Foreign Entities Act, ministerial direction prohibits the disclosure of information by criminal law enforcement authorities with foreign entities where this would result in a substantial risk of mistreatment of an individual by those entities.
The Security of Canada Information Disclosure Act (SCIDA) permits Government institutions to share information related to threats to the security of Canada with other Canadian federal government institutions, such as federal law enforcement and security and intelligence agencies, but places strict parameters around doing so, including by requiring that the information relates to the receiving institutions mandate or responsibilities, and that disclosing would not impact personal privacy rights more than reasonably necessary in the circumstances. Disclosures under the SCIDA are also reviewed annually by the National Security and Intelligence Review Agency (NSIRA), on which a public report is tabled in Parliament.
Finally, with respect to the content of intercepted communications or the existence of such communications, the Criminal Code imposes specific limitations, subject to criminal sanctions (e.g., by prohibiting the use or disclosure without the consent of the concerned individual, except where required in the course of a criminal investigation).
2.2.3.Oversight
The activities of Canadian criminal law enforcement authorities are supervised by different bodies.
First, the OPC carries out oversight of compliance with the Privacy Act by federal authorities. The OPC receives and investigates complaints from individuals, may initiate investigations on its own initiative and may more generally review processing activities of government institutions to ensure compliance with the Privacy Act. In carrying out investigations, the OPC has access to all relevant information,
. In particular, it may summon and enforce the appearance of persons, compel them to give oral or written evidence on oath and produce such documents and things as the OPC deems relevant to the investigation. Similarly, the OPC may enter any premises occupied by any government institution. If the OPC finds a violation of the Privacy Act, it provides the relevant agency with a report setting out the findings and recommendations
. Where appropriate, the OPC may also request that, within a specified time, notice must be given of any action taken or proposed to implement the recommendations (or reasons why no such action has been or is proposed to be taken). The OPC is required to report annually to the Parliament and may also make its reports on specific investigations available to the Parliament
. For example, in June 2021, the OPC submitted a special report to the Parliament on its investigation on the use of facial recognition technology by the RCMP. The annual reports of the OPC also show that it regularly engages with law enforcement authorities, including at an early stage when new technologies are being tested or rolled out (e.g., body-worn cameras, drones), e.g., in the context of privacy impact assessments and advisory consultations.
Second, at provincial and territorial levels, oversight of compliance by criminal law enforcement authorities with personal information protection rules is carried out by independent Information and Privacy Commissioners, ombudspersons or review officers. Specific oversight powers may vary in each province or territory. For example, some supervisory authorities can issue binding or enforceable orders (in Alberta, British Columbia, Ontario, Quebec and Prince Edward Island), while others issue recommendations (Northwest Territories, Nova Scotia, Nunavut, Saskatchewan, Yukon) that can in some cases be enforced by a court (New Brunswick, Newfoundland and Labrador) or an independent adjudicator (Manitoba).
Third, different specialised bodies oversee the activities of the police more generally, at federal, provincial and territorial levels. In particular, the RCMP is subject to oversight by the Civilian Review and Complaints Commission for the Royal Canadian Mounted Police (CRCC). The CRCC can review any activity of the RCMP for the purpose of ensuring compliance with applicable legislation, regulations, ministerial directions, policies, procedures or guidelines, either on the basis of a complaint or on its own initiative and issue a report to the responsible Minister and the head of the RCMP with its findings and recommendations. In carrying out reviews and investigations, the CRCC has access to all relevant information. In 2020-2021, the CRCC issued 322 review reports, with 239 recommendations (e.g., with operational guidance or recommending retraining or policy reviews), of which 88% were accepted by the RCMP.
Similar bodies provide oversight of law enforcement agencies at provincial and territorial level, e.g., the Independent Investigations Office of British Columbia, the Law Enforcement Review Board in Alberta, the Office of the Independent Police Review Director in Ontario, the Public Complaints Commission in Saskatchewan, the Police Ethics Commissioner in Quebec, the Police Complaints Commissioner in Nova Scotia, etc.
2.2.4.Redress
The Canadian system offers different avenues to obtain redress, including compensation for damages.
In addition, the privacy legislation for the public sector in each province and territory grants any individual (i.e., without limitations related to nationality or residence) the right of access to his/her personal information and to have inaccurate information corrected. Moreover, individuals can request a review of a decision on an access/correction request before the competent supervisory authority. Depending on the province/territory, the rights of access/correction of individuals may be enforced directly by the supervisory authority (by issuing binding orders, e.g., in Alberta, British Columbia, Ontario, Prince Edward Island), an adjudicator (e.g., in Manitoba), or the courts (e.g., in New Brunswick, Newfoundland and Labrador, Nova Scotia, Nunavut, Québec, Saskatchewan and Yukon).
Second, individuals may file complaints with independent oversight bodies.
At the federal level, any individual may file a complaint with the Privacy Commissioner in respect of any matter relating to the handling of personal information by a criminal law enforcement authority or other federal government institution. The Privacy Act does not require the individual to have been personally affected, or to demonstrate injury for a complaint to be admissible. If a complaint is well-founded, the Commissioner issues a report containing findings and non-binding recommendations, as well as, where appropriate, a request to inform the Commissioner of any action taken to Implement a recommendation within a specified time. Where the described action taken or proposed to be taken to implement the recommendations would be inadequate, the OPC must inform the complainant thereof. Individuals may challenge the investigations and reports of the OPC before the Federal Court, pursuant to Section 18.1 of the Federal Courts Act on procedural grounds. For instance, the Federal Court may grant relief if it is satisfied that the Commissioner acted without/beyond jurisdiction; failed to observe a principle of natural justice, procedural fairness or other procedure that it was required by law to observe; erred in law; or based its report on an erroneous finding of fact that it made in a perverse or capricious manner or without regard for the material before it. For example, in Oleinik v Canada (Privacy Commissioner), the Federal Court noted that “the [Privacy Commissioner’s] investigation itself is amenable to review. If the report had material omissions, reached unreasonable conclusions, contained unsustainable inferences, misconstrued the factual and legal context or evinced a bias or pre-disposition on the part of the investigator, the Court could intervene.” The Court may, inter alia, order the OPC to do any act or thing that was unlawfully refused, delayed or failed to be carried out, or declare invalid or unlawful, quash or set aside and refer back a decision, order, act or proceeding.
With respect to compliance by provincial/territorial authorities with local privacy legislation, individuals may file complaints before the independent personal information protection authorities in each province/territory, which can issue binding orders (in Alberta, Quebec, British Columbia, Ontario and Prince Edward Island), orders enforceable by the courts or an adjudicator (in Manitoba, New Brunswick and Newfoundland and Labrador) or recommendations (in Yukon, Saskatchewan, Nunavut and the Northwest Territories). In Nova Scotia, an individual can appeal directly to the Supreme Court if it considers that a public authority has not complied with the recommendations of the personal information protection authority.
Third, individuals may in certain circumstances also file complaints with independent oversight bodies in the area of criminal law enforcement. For example, the CRCC handles complaints from any individual against the RCMP. Individuals may complain directly to the CRCC, or first file a complaint with the RCMP and, if they are not satisfied with the outcome, request a review before the CRCC. Once the investigation of a complaint is concluded, the CRCC prepares a report setting out its findings and recommendations, which is shared with the responsible Minister, the RCMP and the complainant. Reports of the CRCC are final and cannot be appealed or reviewed. In the period 2020-2021, 3361 complaints were filed by individuals (3144 before the Commission and 201 before the RCMP), of which 2273 were admissible. In the same time frame, 2254 complaints were finalised. Similarly, in 2019-2020, 3641 complaints were received, of which 2317 were admissible, and 2067 complaints were finalised. In certain provinces/territories, individuals may similarly obtain redress against law enforcement authorities before independent oversight bodies (e.g., before the Office of the Police Complaint Commissioner in British Columbia, The Saskatchewan Public Complaints Commission, the Commissaire à la déontologie policière in Quebec, the New Brunswick Police Commission, etc.).
Fourth, different judicial remedies are available, allowing individuals to invoke the limitations and safeguards described in section 2.2.1 to obtain redress.
In particular, anyone directly affected by the improper handling of personal information by government institutions may apply for judicial review before the Federal Court, which does not require a showing of harm or injury.
In addition, civil proceedings for damages can be brought against the federal government for torts committed by government agents, servants or members of the federal police force. While the specific details of tort law vary across provinces, generally speaking the torts of negligence, breach of confidence or intrusion on seclusion could be invoked against the federal government where it misuses personal information. For a negligence claim to succeed, the individual must establish that a duty of care existed (which requires foreseeability of harm and proximity between the parties), that there was a breach of the applicable standard of care (which requires demonstrating that the defendant’s conduct fell below what would have been reasonable in the circumstances) and that this breach caused compensable harm. A successful breach of confidence claim requires establishing that the information that is the subject of the lawsuit was confidential, communicated in confidence and used in an unauthorised manner to the detriment of the plaintiff. With respect to the tort of intrusion on seclusion, a person who intentionally or recklessly intrudes, physically or otherwise, upon the seclusion of another person’s private affairs or concerns may be liable if the invasion would be highly offensive to a reasonable person and causes distress, humiliation or anguish. These same principles generally also apply to civil claims against provincial or municipal authorities. Several court cases demonstrate how these principles may apply to privacy violations by public authorities. For example, in Condon v. Canada, a proposed class action based in negligence and breach of confidence for losing a hard drive containing personal information was allowed to proceed. Similarly, in TDC Broadband Inc. v. Nova Scotia, compensation was successfully claimed against a provincial government for a breach of confidence (involving the unauthorised use of confidential information).
Finally, judicial remedies are available to any individual whose rights under the Charter have been violated, as a result of government action or legislation.
In particular, under Section 24 of the Charter, anyone whose rights under the Charter have been violated may apply to a court to obtain such remedy as the court considers appropriate and just in the circumstances. This may include compensation for damages, declaratory relief and injunctive relief. Moreover, where the court concludes that evidence was obtained in a manner that infringed any rights or freedoms guaranteed by the Charter and the court finds that the admission of evidence would bring the administration of justice into disrepute, the evidence must be excluded. For a claim under Section 24 of the Charter to be successful, an individual must a) establish an adequate factual foundation, b) bring his or her claim at the correct stage of litigation and c) persuade the court that, on a balance of probabilities, his or her Charter rights have been violated
.
In addition, individuals can bring an action for a declaration that certain laws conflict with the Charter and are, therefore, of no force of effect under Section 52 of the Constitution Act 1867. For example, in one case the Supreme Court found that provisions of the Criminal Code were unreasonable because they did not require notification of individuals whose communications had been intercepted without a warrant. Claimants may invoke Section 52 of the Constitution by alleging infringements of their own rights and freedoms; based on being affected by an allegedly unconstitutional law or administrative decision; or based on “public interest standing”, i.e., if there is a serious issue as to the validity of the legislation, the individual has a genuine interest in the measure’s validity, and the litigation is a reasonable and effective way to bring the matter before the court.
2.3.Access and use by Canadian public authorities for national security purposes
In Canada, two agencies collect personal information for national security purposes.
The core mandate of the Canadian Security Intelligence Service (CSIS) is to collect foreign intelligence in Canada, investigate activities suspected of constituting threats to the security of Canada and advise the Government about these threats, which entails that CSIS is collecting, analysing and retaining information, including personal information. CSIS also has the mandate to take lawful measures to reduce threats to the security of Canada.
The Communications Security Establishment (CSE) is the national signals intelligence agency for foreign intelligence and the expert body for cybersecurity and information assistance. Since the activities of the CSE may not be directed at Canadian individuals or corporations, or any person in Canada, it may in principle only access personal information transferred on the basis of the adequacy decision while it is in transit between the EU and Canada. The relevant powers of both agencies, as regulated by the CSIS Act and CSE Act, are described in the following sections.
2.3.1.Legal bases and applicable limitation/safeguards
2.3.1.1.The Canadian Security Intelligence Service (CSIS)
On the basis of the CSIS Act, CSIS may access personal information transferred from the EU to private operators subject to PIPEDA as part of different activities, each of which is subject to specific limitations and safeguards following from the CSIS Act, the Canadian Constitution (Section 8 of the Charter) and case law.
First, CSIS can, “to the extent strictly necessary,” collect information and intelligence on activities that may on reasonable grounds be suspected of constituting threats to the security of Canada (threat investigations). Second, CSIS may, in relation to the defence of Canada or the conduct of international affairs, assist the Ministers of National Defence or Foreign Affairs in the collection of information or intelligence within Canada in relation to the capabilities, intentions or activities of any foreign state or group of foreign states and any person other than Canadian citizens, permanent residents, or Canadian corporations (foreign intelligence collection). Third, if there are reasonable grounds to believe that a particular activity constitutes a threat to the security of Canada, CSIS may, within or outside Canada, take measures to reduce the threat (threat reduction measures), which may in certain circumstances require ancillary access to (personal) information.
For the first and second powers, CSIS must obtain judicial authorisation in the form a warrant issued by the Federal Court prior to using any techniques that would intrude more than minimally on a privacy interest protected by Section 8 of the Charter and/or otherwise violate Canadian law in the execution of the judicial authorisation. This is for example the case for the interception of an individual’s communications, obtaining detailed billing or subscriber information from communication service providers, or using cell-site simulator technology to track an individual’s device. In other words, nothing in the CSIS Act authorises CSIS to violate Section 8 of the Charter. The judicial warrant obtained in this context ensures that lawful authority underlies those CSIS activities that intrude more than minimally on protected privacy interest, thus making make the activities in question compliant with Section 8 of the Charter. Likewise, the warrant may authorise activities that, absent the warrant, would otherwise contravene Canadian law.
A warrant to investigate threats to the security of Canada may be issued if (1) it is required to enable the CSIS to investigate a specific threat (i.e., “the information sought is factually related to a threat to the security of Canada”) and (2) other investigative procedures have been tried and have failed or are unlikely to succeed, the urgency of the matter is such that it would be impractical to carry out the investigation using only other investigative procedures, or it is unlikely that the information could be obtained without a warrant. The CSIS Act lists the information that must be provided in the application for a warrant and the warrant itself, which includes the type of communication to be intercepted or the type of information, records, documents or things to be obtained; the identity of the target, if known; and a general description of the place where the warrant is to be executed. In principle, a warrant may be issued for a period up to one year and may be renewed by a judge, on written application by CSIS, for a period not exceeding the period for which the warrant was issued.
The role of the judge in assessing the application for a warrant is to “ensure all requirements of the legislation are respected in the application for warrants and that the measures sought are justified in light of the facts put forward”. In light of the requirements of the CSIS Act, the judge therefore assesses, inter alia, whether the information sought is “strictly necessary” to investigate a threat and whether other less intrusive techniques or procedures are not available or would not be effective. Moreover, in assessing compliance with Section 8 of the Charter, the judge may look at additional elements, e.g., whether the proposed measure is no more intrusive than is reasonably necessary to achieve its objectives (i.e., whether the measure strikes an appropriate balance between the rights of the individual and the objectives being pursued by the state). The judge issuing a warrant may specify terms and conditions considered advisable in the public interest.
For the third power (threat reduction measures), CSIS must also obtain judicial authorisation in the form a warrant issued by the Federal Court prior to undertaking any threat reduction measure that would either limit a right or freedom guaranteed by the Charter or otherwise be contrary to Canadian law. A warrant to take threat reduction measures may be issued if the measure required to reduce the threat and the measure is “reasonable and proportionate” in the circumstances of the case, having regard to the nature of the threat, the nature of the measures and the reasonable availability of other means to reduce the threat, as well as the reasonably foreseeable effects on third parties, including their right to privacy. Moreover, the measure must comply with the Charter, e.g., the limit effected by the measure on a Charter right or freedom should not be more intrusive than is reasonably necessary to achieve its threat reduction objectives. Terms and conditions deemed advisable in the public interest may be specified in the warrant. The warrant may in principle be issued for a maximum of 120 days and may, upon written application, be renewed twice if the conditions continue to be fulfilled.
Finally, CSIS may, to support its abovementioned duties and functions, collect datasets that contain personal information and that do not directly and immediately relate to activities that represent a threat to the security of Canada, where it is satisfied that the dataset is relevant to the performance of those duties and functions and the dataset is reasonably believed: to be publicly available (i.e., available to the public at the time of collection), to belong to an approved class of Canadian datasets (i.e., relating predominantly to Canadians or individuals/corporations within Canada), or to predominantly relate to non-Canadians who are outside Canada (i.e., foreign dataset).
Specific substantive and procedural requirements to collect, retain, exploit and query these three types of datasets are set out in the CSIS Act and differ for each type of dataset. When it comes to the retention of a collected dataset, this report focuses on the procedural requirements applicable to foreign datasets, as this is the type of collection that is the most relevant in an adequacy context (i.e., where personal information is transferred from the EU to Canadian commercial operators and may subsequently be accessed by Canadian public authorities). In particular, once a dataset is collected, CSIS has to assess and confirm within 90 days what type of dataset (i.e., whether it is a Canadian, foreign or publicly available dataset) it concerns. During this period, the dataset may in principle (see below) not be queried or exploited. In the course of conducting the evaluation during the 90-day period, a limited number of CSIS staff (“designated employees”) may delete any extraneous, erroneous, or poor-quality information contained in the dataset. During this time, designated employees may also decrypt or translate the information in the collected dataset or apply specific privacy protection techniques. During the 90-day evaluation period, a designated employee must delete any personal information from the dataset that is not relevant to the performance of the CSIS’ duties and functions if its deletion does not affect the integrity of the dataset.
Once the Minister’s authorisation to retain the dataset is approved by the IC, the dataset may only be queried and exploited by a limited number of designated employees at CSIS to assist the Service in its duties and functions under specific conditions. A dataset may be queried and exploited to the extent that it is strictly necessary to assist CSIS in the performance of its duties and functions in relation to threat investigations and taking threat reduction measures, or if required to assist the Ministers of National Defence or Foreign Affairs in collecting foreign intelligence. In exigent circumstances, i.e., that require the querying of a dataset to preserve the life or safety of any individual or to acquire intelligence of significant importance to national security (the value of which would be diminished or lost if the CSIS would be required to comply with the ordinary authorisation procedure), the Director of the CSIS may authorise such querying even if no Ministerial authorisation to retain the dataset has been obtained (yet). However, in such cases, the IC must first review whether the assessment carried out by the Director is reasonable and must approve the decision, before the query can take place. Notably, the CSIS Act does not allow for exploitation in exigent circumstances.
The results from queries or exploitation may only be retained where the collection, analysis and retention of the results are carried out in performing CSIS’ functions with respect to threat investigations; where the retention is strictly necessary to assist CSIS with the taking of threat reduction measures; or where the retention is required to assist the Ministers of National Defence or Foreign Affairs in collecting foreign intelligence. Any query or exploitation result that does not satisfy abovementioned conditions must be destroyed without delay.
In terms of additional safeguards, any foreign dataset must be stored and managed separately from all other information collected and retained by CSIS. In addition, only designated employees may have access to the datasets and reasonable measures must be taken to ensure that any information to which employees have access in only communicated for the purpose of their duties and functions under the CSIS Act. Moreover, records must be kept on the rationale for their collection and retention, the details of each query and exploitation, the statutory provision under which the result of a query or exploitation is retained and the results that were retained. CSIS is also required to verify, periodically and on a random basis, if the queries, exploitations and retention of results were carried out in accordance with the CSIS Act. Finally, CSIS must provide NSIRA with, inter alia, reports on the periodic verifications and the authorisations of the Director to query foreign datasets in exigent circumstances.
2.3.1.2.The Communications Security Establishment (CSE)
The CSE may not direct activities carried out in furtherance of the foreign intelligence, cybersecurity and information assurance, defensive cyber operations or active cyber operations aspects of its mandate at Canadian individuals or corporations, or any person in Canada and may not infringe the Charter. Moreover, activities of the CSE as part of its foreign intelligence, cybersecurity and (defensive or active) cyber operations mandates that would otherwise contravene any Act of Parliament (including legislation in the foreign country where the activity takes place) or interfere with the reasonable expectation of privacy of a Canadian or person in Canada can only be carried out after having been authorised by the competent Minister and, for foreign intelligence and cybersecurity authorisations, approved by the independent Intelligence Commissioner .
An authorisation for defensive and active cyber operations may be issued if there are reasonable grounds to believe that the activity is “reasonable and proportionate, having regard to the nature of the objective to be achieved and the nature of the activities” and “the objective of the cyber operation could not reasonably be achieved by other means” and that no information will be acquired under the authorisation except in accordance with a (separately issued) foreign intelligence or cybersecurity authorisation.
A foreign intelligence authorisation may be issued if there are reasonable grounds to believe that: (1) the activity is “reasonable and proportionate, having regard to the nature of the objective to be achieved and the nature of the activities” (which would require taking into account the benefits to be achieved by the activities and any anticipated impact on privacy interests); (2) any information acquired under the authorisation “could not reasonably be acquired by other means and will be retained for no longer than is reasonably necessary”; and (3) if the authorisation authorises the acquisition of unselected information: any unselected information could not reasonably be acquired by other means.
Similarly, a cybersecurity authorisation may be issued if there are reasonable grounds to believe that, inter alia, (1) the activity is “reasonable and proportionate, having regard to the nature of the objective to be achieved and the nature of the activities”; (2) any information acquired will be retained for no longer than is reasonably necessary; (3) the consent of all persons whose information may be acquired could not reasonably be obtained (in case the activity concerns the information infrastructure of federal institutions), and (4) any information acquired under the authorisation is necessary to identify, isolate, prevent or mitigate harm to electronic information or information infrastructure of federal institutions or that has been designated as being of importance to the Government of Canada.
A copy of each decision of the IC must be provided to the NSIRA to assist it in its review role. According to its annual reports, in 2021 the IC approved two foreign intelligence authorisations, while finding one authorisation “partially reasonable”, and approved two cyber security authorisations. In 2020, the IC received (and approved) three foreign intelligence authorisations and one cybersecurity authorisation.
In emergency situations, i.e., if the Minister believes on reasonable grounds that the conditions for the authorisation are met, but the time required to obtain the IC’s approval would defeat the purpose of issuing the authorisation, an authorisation may be issued and will be valid without having been approved by the IC. Such an authorisation must be notified to the IC and the NSIRA as soon as feasible after it has been issued and is valid for a maximum period of five days.
2.3.2.Further use of the information collected
The processing of personal information by CSIS and CSE is subject to the Privacy Act (see the information provided in section 2.2.2). With respect to the further sharing of data with other entities (within or outside Canada), the Act specifically governing the activities of the CSIS and CSE impose specific limitations.
In accordance with the CSIS Act, CSIS may not disclose any information it has obtained except in specific, limited situations, e.g., (1) for the purposes of the performance of its duties and function; (2) to a police officer or Attorney General, where the information may be used in an investigation or prosecution of an offence; (3) to the Minister of Foreign Affairs, where the information relates to the conduct of international affairs of Canada; (4) to the Minister of National Defence, where the information is relevant to the defence of Canada; or (5) to any other Minister, where necessary in the public interest, which clearly outweighs any invasion of privacy that could result from the disclosure. Disclosures under the last ground have to be reported to the NSIRA. The CSE may, on the basis of the CSE Act, enter into arrangements with entities that have similar powers and duties (including of foreign states or international organisations), for the purpose furthering its mandate, including for information sharing or other cooperation. An arrangement with a foreign entity must be approved by the competent Minister, after consultation with the Minister of Foreign Affairs.
The rules on data sharing under the CSIS Act and CSE Act are supplemented by the guidance of the Treasury Board of Canada on the need to put in place appropriate personal information protection safeguards in information sharing agreements/arrangements and by the Avoiding Complicity in Mistreatment by Foreign Entities Act (ACMFEA), Directions [for Avoiding Complicity in Mistreatment by Foreign Entities, and Ministerial Direction collectively addressing the disclosure of information that would result in a substantial risk of mistreatment (i.e., torture or other cruel, inhuman, or degrading treatment or punishment) of an individual by a foreign entity (as described in more detail in section 2.2.2).
2.3.3.Oversight
In Canada, the activities of national security authorities are supervised by different bodies.
First, the OPC oversees compliance of data processing by the CSIS and CSE with the Privacy Act, in the same way as described in section 2.2.3. In its annual report of 2020 - 2021, the OPC reported a rise in requests for consultation from national security authorities under the Privacy Act. In exercising its oversight function over intelligence agencies, the OPC also collaborate closely with NSIRA, including on the basis of a memorandum of understanding that establishes procedures for coordination, carrying out joint reviews or investigations and information sharing.
Second, independent review of the activities of the CSIS and CSE (as well as any other activity that relates to national security or is referred to it by a Minister) is carried out by NSIRA. The NSIRA may review any of the CSIS’ and CSE’s activities and in this context adopt any findings and recommendations it considers appropriate, including with respect to compliance with the law or ministerial directions, as well as the reasonableness and necessity of their exercise of powers. In carrying out its reviews, the NSIRA is in principle entitled to access almost any information held by the CSIS and CSE with the exception of confidences of the King’s Privy Council. The NSIRA is required to report annually to the relevant Minister on the compliance of the activities of the two intelligence agencies with the law and applicable Ministerial Directions, as well as the reasonableness and necessity of the exercise of their powers. When finding that an activity may be contrary to the law, the NSIRA must report this to the relevant Minister and to the Attorney General of Canada. Moreover, the NSIRA must report annually on its findings and recommendations to the Prime Minister, who in turn is required to report to the Parliament. The 2020 annual report of the NSIRA indicates that it conducted two reviews of the CSIS’ activities (the use of threat reduction measures and intelligence sharing with the RCMP) and three of the CSE’s activities (including of ministerial authorisations and the CSE’s data retention policies and procedures for signals intelligence). The recommendations issued by the NSIRA in the context of these reviews and the response of both agencies (which accepted the recommendations) are described in the NSIRA’s public annual report.
Finally, parliamentary oversight in the area of national security is carried out by the National Security and Intelligence Committee of Parliamentarians (NSICOP). The NSICOP is tasked with reviewing the legislative, regulatory, administrative, policy and financial framework for national security and intelligence, any matter relating to national security or intelligence that is referred to it by a Minister as well as any activity relating to national security or intelligence, unless it concerns an ongoing operation and the competent Minister determines that the review would be injurious to national security. In the latter case, the Minister must inform the Committee that the review may be conducted once (s)he determines that review by the NSICOP would no longer be injurious to national security, or the activity is no longer ongoing, the Minister must inform the Committee that the review may be conducted. The NSICOP must inform the appropriate Minister and Attorney General of any activity related to national security that may not be in compliance with the law.
In conducting its tasks, the NSICOP is entitled to have access to any information under the control of a government department that is related to the fulfilment of the Committee’s mandate, including information that is protected by litigation privilege, solicitor-client privilege or the professional secrecy of advocates and notaries. Exceptions to this power include a confidence of the King’s Privy Council, the identity of a confidential source of information to the Government, or information directly relating to an ongoing investigation carried out by a law enforcement agency that may lead to a prosecution. The competent Minister may also refuse to provide information which the NSICOP is entitled to access if it constitutes special operational information and if provision of the information would be injurious to national security. In that case, the Minister must provide the refusal and the reasons therefore to the NSICOP, as well as to the NSIRA.
The NSICOP submits annual reports with findings and recommendations to the Prime Minister, who submits it to Parliament, subject to possible redactions where the disclosure of specific information would be injurious to national security, national defence or international relations, or is protected by litigation privilege or by solicitor-client privilege or the professional secrecy of advocates and notaries. Such reports must also contain the number of times that a Minister determined that a review would be injurious to national security and the number of times that a Minister refused to provide information in the course of a review.
2.3.4.Redress
The Canadian system offers different avenues to obtain redress, including compensation for damages.
Third, any individual may file a written complaint to the NSIRA with respect to any activity carried out by CSIS or CSE. The NSIRA investigates such complaints if the complainant has first complained to the Director of the CSIS/ Chief of CSE and has not received a response within a reasonable time or is not satisfied with the response, and if it is satisfied that the complaint is not trivial, frivolous, vexatious or made in bad faith (there are no further admissibility requirements and the complainant therefore does not have to demonstrate that (s)he has in fact been injured for the complaint to be handled). The NSIRA may attempt to resolve the complaint informally or conduct a formal investigation, and may ask the Canadian Human Rights Commission for its opinion on the complaint. In the course of an investigation of a complaint, the complainant as well as the Director or concerned deputy head must be given an opportunity to give representations, present evidence and be heard. Moreover, the NSIRA has the power to summon and enforce the appearance of persons and compel them to give oral or written evidence, as well as to produce all relevant documents. If an individual is not satisfied with a decision of the NSIRA, he or she may apply to the Federal Court for judicial review of that decision. In 2020, the NSIRA received 15 complaints against CSIS, of which it accepted three, and received one complaint against the CSE. In the same year, the NSIRA closed five complaint investigations, of which three were withdrawn by the complainant, one was resolved informally, and one was completed with a final report.
Finally, the same judicial avenues as the ones described in section 2.2.4 (i.e., review before the Federal Court, redress pursuant to Section 24 of the Charter, civil claims for damages, or redress under Section 52 of the Constitution) are also available against CSIS and CSE.
IV. FAROE ISLANDS
1.RULES APPLYING TO THE PROCESSING OF PERSONAL DATA
1.1.Relevant developments in the data protection framework of the Faroe Islands
The Commission adopted the adequacy decision for the Faroe Islands on 5 March 2010, after having received the opinion of the Article 29 Working Party on 9 October 2007. The decision found that, for the purposes of Article 25(2) of Directive 95/46/EC (Data Protection Directive), the Faroe Islands provided an adequate level of protection for personal data transferred from the EU to recipients subject to the Faroese Act on Processing of Personal Data (APPD).
At the time of the adoption of the adequacy decision, the legislative framework for the protection of personal data in the Faroe Islands consisted of the APPD, which entered into force on 1 January 2002 and was based on the standards of the Data Protection Directive. In August 2017, a process to modernise the APPD was initiated, which led to the adoption of a new Data Protection Act (DPA) that entered into force on 1 January 2021. As explained in more detail below, the DPA is closely aligned with Regulation (EU) 2016/679 (GDPR) and has strengthened the Faroese data protection framework in several areas. The DPA is accompanied by a special commentary, which refers to the GDPR and its recitals, in particular by specifying that the GDPR is to be used when interpreting the Act.
Like the previous APPD, the new DPA has a broad scope of application, applying to both private operators and public authorities. While the definitions of ‘personal data’, ‘controller’, ‘processor’, ‘data subject’ and ‘processing’ (which are identical to those used in the GDPR) have not changed compared to the previous APPD, the DPA has brought even more convergence with the GDPR, e.g., by introducing a definition of ‘pseudonymisation’ and further clarifying when a person is ‘identifiable’ by applying the same criteria of recital 26 of the GDPR. The DPA has also extended the territorial scope of the Faroese data protection rules by adopting the same approach as Article 3 of the GDPR.
The main data protection principles and obligations that were already provided by the APPD at the time of the adoption of the adequacy decision have remained in place without substantial changes. This is the case for the principles of purpose limitation, data quality and proportionality, data retention and data security. At the same time, a number of principles and obligations have been further strengthened, in particular in the context of the recent reforms, e.g., the principle of lawfulness of processing, the requirements for data breach notification, the transparency obligations and the principle of accountability.
As regards the principle of lawfulness and fairness of processing, the DPA has reduced and further clarified the grounds that are available for processing, which are now identical to those listed in Article 6(1) GDPR. Furthermore, the requirements for valid consent have been reinforced under the DPA, by making clear that, in addition to being freely given, specific and informed, consent must be unambiguous and expressed by a clear affirmative action.
Similarly, the DPA has strengthened the existing transparency obligations by requiring that additional information is provided to the individual (e.g., the contact details of the data protection officer, the fact that the controller intends to transfer the data to a third country, the retention period, the right to withdraw consent, the existence of automated decision-making, etc.) when data is collected directly from the individual or from third parties and when it is further processed. The exceptions to transparency requirements have also been narrowed and further clarified. In particular, under the DPA, the transparency obligations do not apply in limited circumstances, e.g., if disclosing the information would endanger national security or jeopardise the investigation of a criminal offence. In this respect, the special commentary clarifies that to rely on an exception, a concrete assessment should be made in each individual case. Restrictions could only be made if a concrete assessment leads to the conclusion that the information, if disclosed, would fall under one of the exceptions.
With respect to the principle of data security, the DPA expanded the requirements on reporting data breaches. While controllers were already required to notify data breaches to the Data Protection Agency, the DPA has clarified the modalities for such notifications, e.g., by specifying that breaches should be reported without undue delay (and where feasible within 72 hours), and exempting data breaches that are unlikely to result in a risk to the rights of individuals. Moreover, the DPA introduced a requirement to notify data breaches to the concerned individuals, where it is likely to result in a high risk to their rights.
The DPA has also modernised the accountability requirements that applied under the previous regime (e.g., on record keeping and risk assessments), by introducing an obligation to implement principles of data protection by design and by default, keep records of processing, appoint a data protection officer and carry out data protection impact assessments (and consult the Data Protection Agency prior to processing where a data protection impact assessment indicates that the processing would result in a high risk in the absence of measures taken by the controller to mitigate the risk).
In addition to the strengthening of data protection principles and obligations, the protections for special categories of data have been reinforced since the adoption of the adequacy decision. The APPD already offered additional protection for data about colour and family bonds; religion, philosophy, or political conviction; sexual life; health; trade union connections; relative social problems and other private concerns. The DPA has codified the existing interpretation of “colour and family bonds,” “sexual life” and “data about health” by explicitly mentioning data revealing racial and ethnic origin, sexual orientation and genetic data in the list of special categories of data and included biometric data processed for the purpose of uniquely identifying a natural person. As regards the safeguards that apply to the processing of special categories of data, the DPA has replaced the previous requirement to obtain prior authorisation from the Data Protection Agency by a general prohibition on processing, only allowing the processing of such data in a limited number of situations. For example, similarly to the GDPR, the DPA allows the processing of special categories of data where the data subject has given explicit consent, where processing is based on a law, where processing is necessary to protect the vital interest of the data subject, or where processing is necessary for reasons of substantial public interest.
The DPA has also modernised the APPD’s provisions on data subject rights, which included a right to obtain information, a right of insight (i.e., access) and the rights of rectification, erasure and blocking. In particular, the DPA contains updated provisions on the rights of rectification, erasure, restriction and object (also including a general right to object to the processing of personal data for direct marketing purposes) that correspond to the rights provided by the GDPR, both as regards the conditions under which these rights can be exercised and possible exceptions. In addition, the right of access has been further strengthened, by not only requiring controllers to provide individuals with information about the processing of their data (as was already the case under the APPD), but also to give access to personal data (including by providing a copy). The DPA has also further circumscribed the exceptions to the right of access, which only apply in limited circumstances, e.g., if disclosing the information would endanger national security or jeopardise the investigation of a criminal offence, and, according to the special commentary, must be applied on a case-by-case basis.
Moreover, the DPA introduced new rights. This includes a right for individuals not to be subject to a decision based solely on automated processing, including profiling, which produces legal effects concerning them or similarly significantly affect them. Such automated decision making may only take place under certain conditions (e.g., only if authorised by law or based on the data subject’s explicit consent) and subject to specific safeguards (e.g., informing the individual about the processing and the envisaged consequences). In addition, the DPA introduced a right to data portability that corresponds to the same right available under the GDPR.
The DPA has also introduced several changes to the rules on international transfers (onward transfers for the purpose of the adequacy decision). In particular, the regime of the APPD that allowed international transfers on the basis of a specific transfer instrument (an adequacy decision adopted by the Minister of Justice, adequate safeguards or certain statutory grounds) after obtaining prior permission from the Data Protection Agency has been updated. The DPA abolished the prior authorisation requirement and allows transfers to non-EEA countries under the same conditions as the GDPR. In particular, as a general principle, the special commentary clarifies that the rules on international transfers are intended to ensure that the level of protection ensured by the DPA will not be lowered, which also applies when personal data are onward transferred from the third country to which they were transferred from the Faroe Islands.
Moreover, as was the case under the APPD, different instruments can be used for data transfers. First, the Minister of Justice can adopt an adequacy decision, for which the special commentary specifies that the same elements as those provided by Article 45 GDPR have to be taken into account and adequacy decisions adopted by the European Commission may be taken into account. In practice, the same countries that have received an adequacy decision from the Commission under the Data Protection Directive have been recognised by the Faroe Islands, with the addition of Gibraltar. In addition, a transfer may take place on the basis of appropriate safeguards (by means of a legally binding and enforceable instrument between public authorities, standard data protection clauses adopted by the Minister or contractual clauses approved by the Data Protection Agency), on the condition that enforceable data subject rights and effective legal remedies are available to the data subject. In particular, the Minister has approved the standard contractual clauses for the transfer of personal data to third countries set out in the Commission implementing decision (EU) 2021/914. Finally, the DPA allows transfers on the basis of ‘derogations’, which correspond to those provided by Article 49 GDPR and which, according to the special commentary, have a narrow scope and cannot be relied upon for regular and repeated transfers.
1.2.Oversight, enforcement and redress
The independent entity in charge of overseeing compliance with the data protection rules is the Data Protection Agency. The Agency supervises compliance of any processing activity, either on its own initiative or on the basis of complaints from data subjects. In addition, it carries out a number of tasks, such as promoting public awareness in relation to data protection, giving its opinion on administrative and legislative measures relating to data protection, promoting the awareness of controllers and processors of their obligations, monitoring and informing of relevant developments regarding data protection on the Faroe Islands and abroad, and publishing annual reports on its activities. In performing its supervisory duties, the Agency has access to all relevant information, as well as to the premises where processing operations are carried out or administered and where data or technical equipment are stored or used.
Since the adoption of the adequacy decision, both the resources and powers of the Agency have been strengthened. In particular, the number of members of the Agency (i.e., the Council) has increased from three under the APPD (a chair and two other members) to five under the new DPA (a chair and four members, two of which are nominated by the Association of Municipalities and the Faroe Employer’s Association). Furthermore, the number of staff members of the Agency has doubled, from three to six members of staff. To further strengthen the independence of the Council, the special commentary to the DPA provides that the members must remain free from external influence, whether direct or indirect, and may neither seek nor take instructions from anybody. In addition, the budget of the Agency has increased in the past years, from 2.0 million DKK (~ 268 000€) in 2018 and 2.445 million DKK (~ 324 000€) in 2018, to 3.252 million DKK (~ 435 000€) in 2020.
Under the former APPD, compliance with data protection requirements was ensured through a combination of different measures, including notification, prior authorisation, corrective measures (issued by the Data Protection Agency) and criminal sanctions (i.e., fines or imprisonment, imposed by the Prosecution Service). The new DPA has strengthened the enforcement powers of the Data Protection Agency, while abolishing most prior notification and authorisation requirements.
The DPA has provided the Agency with a broad range of powers, in particular to issue warnings, reprimands and orders (inter alia to discontinue processing, bring processing into compliance with the Act, implement security measures and rectify, erase or restrict processing), and to make its decisions public. The DPA also introduced the possibility for the Data Protection Agency to issue a fixed penalty notice, i.e., a fine that may be imposed where an infringement is estimated not to result in a penalty higher than a fine, if the concerned entity admits to being guilty and accepts the fine indicated in the notice within a specified time limit. This procedure deviates from the general principle that the police, prosecution service and courts handle criminal cases and allows the settle a case without legal proceedings. Because of the criminal nature of a penalty notice, it may only be issued for infringements that are simple and where there is no evidentiary doubt.
In addition to the powers of the Data Protection Agency, the new DPA has also retained a regime of criminal sanctions, e.g., for violations of the provisions on data protection principles, the obligations for controllers and processors, international transfers, and individual rights
. As regards the amount of fines, the special commentary provides that the Faroese authorities should take into account the same factors as those listed in Article 83(2) GDPR, i.e., the intentional or negligent character of the infringement, any action taken by the controller or processor to mitigate the damage suffered by data subjects, duration of the infringement etc. Moreover, as a starting point, the level of fines on the Faroe Islands should follow the developments in Denmark under the GDPR.
As regards possibilities for individuals to obtain redress, the Faroese system continues to offer various avenues, including the possibility to lodge a complaint with the Data Protection Agency, obtain judicial redress directly against controllers and processors (both private operators and public authorities) and obtain compensation for damages.
Despite its relatively small office, the Data Protection Agency plays an active role, both when it comes to its engagement with stakeholders and exercising its oversight role.
In particular, according to information received from the Faroese authorities, the Data Protection Agency annually handles a number of files, including inspections, notifications, written questions, complaints and proposals for legislation. For example, in 2022, 379 files were handled and 319 in 2023. In the context of the Covid-19 pandemic, the Agency also advised the Faroese Government on issues relating to data protection (e.g., as regards the processing of sensitive data as part the testing strategy). Moreover, since the entry into force of the new DPA, the Data Protection Agency handled over 500 files, as part of which it received more than 22 notifications of data breaches and launched more than 28 data protection inspections. It also sent questionnaires to various controllers investigating different aspects of compliance with the new Act. This has already led to enforcement action in several cases, including reprimands and orders demanding that processing be brought into line with the new Act.
Finally, since June 2020, when the new DPA was passed by the Faroese parliament, the Data Protection Agency issued over 20 guidelines (e.g., on data protection officers, data protection in the workplace, data breaches, consent and data subject rights) and around ten templates (e.g., for notifying data breaches). The Agency also engages in various outreach activities, such as presentations and courses for both the private and public sector (so far reaching around 1000 participants) and launched a new website, as well as a podcast series about data protection.
2.ACCESS TO AND USE OF PERSONAL DATA TRANSFERRED FROM THE EUROPEAN UNION BY PUBLIC AUTHORITIES IN THE FAROE ISLANDS
2.1.General legal framework
The Faroe Islands enjoy a special status as an autonomous nation within the Danish Kingdom, regulated by the Home Rule Act of 1948 (Act No. 137 of 23 March 1948). Whereas certain aspects (the Constitution, the foreign exchange and monetary policy, the Supreme Court and the foreign, defence and security policy) always remain under Danish authority, the Takeover Act (Act No. 578 of 24 June 2005) provides the Faroe Islands with the possibility to assume legislative and executive power in all other areas. If the Faroe Islands decide not to take over a certain area, it remains under the jurisdiction of Denmark. This is the case for the activities of the police, the prosecution service, the prison and probation service and the courts, which have not been taken over by the Faroe Islands. Given that criminal law enforcement and national security therefore remain under Danish jurisdiction, activities in these areas in the Faroe Islands are exercised exclusively by Danish authorities. As explained in more detail below, these authorities are subject to laws under Danish auspices that, after having been approved by the Faroese Parliament, have been put into force in the Faroe Islands by an Executive Order of the Danish government.
The limitations and safeguards that apply to the collection and subsequent use of personal data by public authorities on the territory of the Faroe Islands for criminal law enforcement and national security purposes follow from the overarching constitutional framework of the Danish Kingdom, specific laws regulating data access, as well as rules that apply to the processing of personal data.
Firstly, Section 72 of the Danish Constitution guarantees the right to privacy. It stipulates that no house search, seizure, examination of letters and other papers, or any breach of secrecy in postal, telegraph and telephone matters may take place except under a judicial order, unless a particular exception is warranted by statute.
In addition, the European Convention on Human Rights applies to the Faroe Islands. The European Convention on Human Rights protects the right to respect for private and family life (and the right to the protection of personal data as part of it). In particular, pursuant to Article 8 of that Convention, a public authority may only interfere with the right to privacy in accordance with the law, in the interests of one of the aims set out in Article 8(2), and if proportionate in light of that aim. Article 8 also requires that the interference is “foreseeable”, i.e., has a clear, accessible basis in law, and that the law contains appropriate safeguards to prevent abuse.
In addition, in its case law, the European Court of Human Rights has specified that any interference with the right to privacy and data protection should be subject to an effective, independent and impartial oversight system that must be provided for either by a judge or by another independent body (e.g., an administrative authority or a parliamentary body)
. Moreover, individuals must be provided with an effective remedy, and the European Court of Human Rights has clarified that the remedy must be offered by an independent and impartial body which has adopted its own rules of procedure, consisting of members that must hold or have held high judicial office or be experienced lawyers, and that there must be no evidential burden to be overcome in order to lodge an application with it. In undertaking its examination of complaints by individuals, the independent and impartial body should have access to all relevant information, including closed materials. Finally, it should have the powers to remedy non-compliance
.
Therefore, through its adherence to the European Convention on Human Rights, as well as its submission to the jurisdiction of the European Court of Human Rights, the Faroe Islands is subject to a number of obligations, enshrined in international law, that frame its system of government access on the basis of principles, safeguards and individual rights similar to those guaranteed under EU law and applicable to the Member States.
Secondly, as explained in more detail in section 2.2.1 and 2.3.1, these general principles are reflected in specifics laws that regulate the access and use of personal data for criminal law enforcement and national security purposes and impose minimum safeguards. This includes in particular the Faroese Administration of Justice Act.
Thirdly, the processing of personal data by public authorities for criminal law enforcement and national security purposes is subject to specific data protection rules. Danish law enforcement authorities in the Faroe Islands are subject to the Act on the Processing of Personal Data by Law Enforcement Authorities that was set into force in the Faroe Islands on 1 July 2022. This Act essentially transposes the legislation that was adopted by Denmark to implement Directive (EU) 2016/680 (Law Enforcement Directive) in the Faroe Islands, with minor adaptions to reflect the local conditions (for instance removing references to cooperation in/with the European Data Protection Board). It inter alia provides for key data protection principles (e.g., purpose limitation, data minimisation, data accuracy, data security), obligations for law enforcement authorities (e.g., on the processing of sensitive data, international data transfers, notification of data breaches, etc.) and rights for individuals (e.g., to obtain access, correction or deletion of personal data). In addition, the Act is complemented by several Executive Orders that have been put into force in the Faroe Islands:
(1)Executive Order No. 1051 of 12 September 2017 for the Faroe Islands on security measures for the protection of personal data processed by the public administration;
(2)Executive Order No. 1058 of 12 September 2017 for the Faroe Islands on derogating from the obligation to notify certain proceedings carried out by the public administration;
(3)Executive Order No. 1057 of 12 September 2017 for the Faroe Islands derogating from the obligation to notify certain proceedings conducted by the courts;
(4)Executive Order No. 1059 of 12 September 2017 for the Faroe Islands on security measures for the protection of personal data processed before the courts;
(5)Executive Order No. 442 of 16 March 2021 on Processing of Personal Data in the Central Criminal Register (Order no. 442 of 16 March 2021 for the Faroe Islands).
In the area of national security, the Act on the Security and Intelligence Service (ASIS) governs the activities of the Danish Security and Intelligence Service in the Faroe Islands with regard to the collection and (further) processing of personal data for national security purposes. This Act was set into force on the Faroe Islands on 1 January 2021 and mirrors the Danish Act on the Security and Intelligence Service, with some adaptations for the local Faroese situation. As explained in more detail in section 2.3.2, under the Act, all core principles (lawfulness, purpose limitation, data minimisation, data accuracy, storage limitation), individual rights and data protection obligations (e.g., rules on international transfers) apply. The Act is complemented by two Executive Orders:
(1)Executive Order for the Faroe Islands on security measures to protect information about natural and legal persons processed by the Danish Security and Intelligence Service (Order No.254 of 22 February 2021, DSIS Order on security measures);
(2)Executive Order for the Faroe Islands on the Danish Security and Intelligence Service’s processing of information on natural and legal persons, etc. (Order No. 253 of 22 February 2021, EOFIDSIS).
These general limitations and safeguards can be invoked by individuals before independent oversight bodies (e.g., the Danish data protection authority, the Intelligence Oversight Board) and courts to obtain redress (see sections 2.2.4 and 2.3.4).
2.2.Access and use by public authorities in the Faroe Islands for criminal law enforcement purposes
The legal framework that applies to criminal law enforcement authorities in the Faroe Islands imposes a number of limitations on the access and use of personal data for criminal law enforcement purposes and provides oversight and redress mechanisms. The conditions under which such access can take place and the safeguards applicable to the use of those powers are described in the following sections.
2.2.1.Legal bases and applicable limitations/safeguards
Personal data transferred from the EU on the basis of the adequacy decision and subsequently processed by Faroese controllers or processors may be collected by Danish authorities (i.e., the Danish police) for criminal law enforcement purposes in the context of a search or seizure, on the basis of a production order, by accessing communications or by collecting location data through telecommunications observation. The conditions, limitations and safeguards that apply to the use of these powers are laid down in the Faroese Administration of Justice Act. This Act lays down clear and precise rules on the scope of application of these measures, thereby ensuring that the interference with the rights of individuals will be limited to what is necessary for a specific criminal investigation and proportionate to the pursued purpose. As explained in more detail below, prior judicial authorisation is in principle required in order to access personal data, unless in exceptional cases specifically listed in the Act. Moreover, specific (procedural) safeguards exist to guarantee due process rights for individuals.
First, searches of places, documents (including electronic documents), objects, papers, etc. may in principle only take place if the targeted person is suspected on reasonable grounds of an offence that is subject to public prosecution and the search may be presumed to be of major importance to the investigation. To perform searches of accommodation, documents, papers and the content of locked objects, additional requirements must be met, i.e., the investigation must concern an offence punishable by imprisonment or there must be specific reasons to presume that evidence will be found. With regard to searches concerning a person who is not a suspect, a higher threshold applies: such a search may only be conducted if the person consents to the search or if the investigation concerns an offence punishable by imprisonment and there are specific reasons to presume that the search will produce evidence. In all cases, a search is not allowed where, considering the purpose of the measure, the significance of the case, and the intrusion and inconvenience that the measure may be presumed to cause, the measure would be disproportionate
.
Procedurally, searches of accommodation, documents or papers may in principle only be conducted on the basis of a court order that contains information on the specific circumstances of the case demonstrating that the abovementioned conditions are met. Where the purpose of the search would be defeated by applying for a court order (i.e., if the search would no longer lead to the collection of evidence in the investigation if it would be delayed to obtain a court order), a search may take place without a court order, upon a decision of the police. In principle, persons whose accommodation, premise or object is to be searched are informed of and/or present at the search (whether the search is conducted on the basis of a court order or not). This requirement may only be derogated from under certain conditions (in particular if it is of crucial importance for the investigation that the search is conducted without the knowledge of the suspect and others, and only with respect to investigations of intentional violations of certain crimes, such as crimes against the independence of the State) and on the basis of a court order.
Second, seizures may be conducted to secure evidence; to secure the State’s claim for legal costs, confiscation and fines; to secure the victim’s claim for restoration or compensation, and where the accused has evaded prosecution. Any seizure may only take place as part of an investigation of an offence subject to public prosecution, if there is reason to presume that the object may serve as evidence or should be confiscated, or if the object was taken from someone during the offence who can claim it back
. A production order requiring a person who is not a suspect to produce or surrender objects may be issued under the same conditions
. A seizure may not take place and a production order may not be issued if the measure is disproportionate in light of the significance of the case and the loss or inconvenience that the measure is likely to cause
. Moreover, a seizure or production order may only be conducted/issued to the least extent necessary. If the purpose of the measure may be achieved by less intrusive means, a written agreement to this effect may be concluded with the person against whom the measure is directed.
Seizures and production orders may only take place/be issued when authorised by a court order, which must contain information on the specific circumstances of the case demonstrating that the abovementioned conditions are met. If the purpose of the seizure/production order would be defeated by waiting for a court order, the objects/information may be obtained without a court order. In that case, the person against whom the measure is directed may request that the case is brought before the court (as soon as possible and at the latest within 24 hours) to determine whether the seizure/production order can be approved. In principle, the person against whom a seizure is directed is informed thereof when the measure is initiated, unless upon a court decision finding that it is of crucial importance to the investigation that it is conducted without the knowledge of the suspect or others.
Third, the police may intercept communications and collect information on communications (e.g., through telephone tapping, the interception of mail, or by obtaining information on which devices are connected to a phone number or communication device). These measures may only be carried out under strict conditions: (1) there must be specific grounds for supposing that information is being passed or items sent to or from a suspect; (2) the measures may be assumed to be of crucial importance to the investigation and (3) the investigation concerns an offence that is punishable by law with imprisonment of at least six years or another serious offence specified by the Act
, or, for certain measures (telephone tapping and obtaining information on which telephones or similar communication devices within a specified area are connected to a particular telephone or other communication device), a crime that has endangered or may endanger human life or important public assets. In any event, such measures may not take place where, considering the purpose of the measure, the significance of the case, and the intrusion and inconvenience that the measure may be presumed to cause the person or persons affected, the measure would be disproportionate
.
Similarly, the police may obtain information from telecommunication providers on the location of a mobile telephone that is presumed to be used by a suspect (‘telecommunications observation’). Such collection of location data may take place in the context of an investigation concerning an offence punishable by a term of imprisonment of at least 1.5 years, if there are specific reasons to assume that the mobile phone is used by a suspect and the measure is of major importance for the investigation. Telecommunications observation may not be initiated if it would be disproportionate in light of the purpose of the interception and the importance of the case, as well as the harm and inconvenience it would likely cause to the concerned individual
.
Specific procedural safeguards apply to the interception of communications, the collection of information about communications and the collection of location data, which may in principle only take place on the basis of a court order, which must set out the specific circumstances of the case justifying that the abovementioned conditions are met, as well as the telephone numbers, premises, addressees, or items of mail affected by the measure. The court order must also specify the time period in which the measure may be conducted, which must be as short as possible, not exceeding four weeks, unless extended by another court order. Exceptionally, the police may collect (information on) communications without a court order, where obtaining the order would defeat the purpose of the measure, in which case approval from the court must be sough as soon as possible and no later than 24 hours after the measure is implemented.
Moreover, when an application to a court is made by the police for the authorisation of measures concerning communications (including the interception of communications and the collection of location data), a lawyer must be appointed to represent the concerned individual, who is entitled to access the materials provided by the police, attend hearings and provide comments. In addition, the concerned individual must in principle be notified by the court within 14 days after the measure has ended. Such notice may only be dispensed with or deferred upon a decision of a court and after having provided the appointed lawyer with the opportunity to comment, if it would prejudice an ongoing investigation or the protection of confidential information on the police’s investigative methods, or if other circumstances argue against notification.
Fourth, on the basis of a court order, the police may read data in an information system that is not publicly accessible with the aid of programs or other equipment (data reading) where (1) there are specific grounds for supposing that the information system is being used by a suspect in connection with certain serious crimes (i.e., crimes punishable with imprisonment of at least six years or crimes against the independence of the State and security or against the State constitution and the highest State authorities) and (2) the measure may be assumed to be of crucial importance to the investigation. Data reading may not take place where, considering purpose of the measure, the significance of the case, and the intrusion and inconvenience that the measure may be presumed to cause the person or persons affected, the measure would be disproportionate. The safeguards mentioned above for the collection of communications (i.e., on exceptional collection without a court order, the appointment of a lawyer and the notification of concerned individuals) also apply to data reading.
Finally, certain entities in the Faroe Islands are required to report information (including personal data) to criminal law enforcement in accordance with rules on the prevention of money laundering and the financing of terrorism. In particular, the Act on Measures to prevent Money Laundering and Financing of Terrorism (Money Laundering Act) requires certain entities (e.g., banks, fund brokers, payment service providers, investment management companies, etc.) to investigate complex and unusually large transactions, as well as all unusual patterns of transactions and activities that have no clear economic or demonstrable lawful purpose, in order to determine whether there is suspicion or reasonable grounds to presume that those transactions or activities are or have been connected to money laundering or financing of terrorism. They must immediately notify the Public Prosecutor for Serious Economic and International Crime when they suspect, or have reasonable grounds to presume, that a transaction is or has been connected to money laundering or financing of terrorism. Similarly, the Royal Decree on Specific Measures to combat Terrorism requires entities covered by the Money Laundering Act to immediately notify the Danish Money Laundering Secretariat of a transaction or request that has or has had a connection to persons or entities mentioned on the lists of names used in connection with Denmark’s implementation of the sanctions under United Nations Security Council Resolution No 1373 of 28 September 2001.
2.2.2.Further use of the information collected
The processing of personal data collected by law enforcement authorities in the Faroe Islands is subject to the Act on the Processing of Personal Data by Law Enforcement Authorities. As explained above, this Act essentially mirrors (with some minor adjustments to take the Faroese context into account, e.g., by removing references to cooperation with/in the European Data Protection Board) the Danish Act on the Processing of Personal Data by Law Enforcement Authorities, which has transposed the Law Enforcement Directive into the Danish legal order. Therefore, the legal framework that applies in the Faroe Islands to the processing of personal data by criminal law enforcement authorities is based on the framework that applies in the EU. It provides for key data protection principles (e.g., purpose limitation, data minimisation, data accuracy, data security, accountability), imposes data protection obligations on law enforcement authorities (e.g., prohibiting the processing of sensitive data unless this is necessary for the protection of vital interests of individuals or the data is manifestly made public by the individual; to report data breaches, keep records of processing activities, appoint a data protection officer etc.) and imposes specific conditions for transfers of personal data to third countries or international organisations (in particular allowing transfers to countries/organisations for which the European Commission has adopted an adequacy decision under the Law Enforcement Directive, or, in the absence thereof, on the basis of an international agreement containing data protection safeguards or a self-assessment of all the circumstances of the transfer carried out by the controller).
In addition, more specific requirements on the use of information collected by criminal law enforcement authorities follow from the Administration of Justice Act. For example, the Act provides that any information incidentally obtained by the police in the context of a search or the collection of (information on) communications may not be used as evidence in court, unless a court decides otherwise if other investigative measures are unlikely to provide evidence in the case and the case concerns an offence that is punishable by imprisonment for at least 1.5 years (for information obtained through the collection of communications) or 6 years (for information obtained through a search). Moreover, under the Administration of Justice Act, any material obtained through the collection of (information on) communications must be destroyed if it proves not to be relevant to the investigation.
2.2.3.Oversight
The activities of Danish criminal law enforcement authorities in the Faroe Islands are supervised by different bodies.
First, oversight of the processing of personal data by Danish criminal law enforcement authorities in the Faroe Islands is carried out by the Danish data protection authority (Danish DPA), under the Act on the Processing of Personal Data by Law Enforcement Authorities. The Danish DPA may investigate compliance with the Act, on the basis of complaints from individuals or on its own initiative. It has access to all information relevant to its activities and may conduct on-site inspections. In terms of remedial powers, the Danish DPA may issue opinions that planned processing activities are likely to infringe the Act, may order processing operations to comply with the Act, or may temporarily or definitely restrict/prohibit the processing of personal data. Non-compliance with an order of the Danish DPA is punishable by a criminal fine imposed by a court.
Second, the activities of the Danish criminal law enforcement authorities in the Faroe Islands are subject to the general oversight of the Danish Ombudsman, the Danish Independent Police Complaint Authority and the Danish Audit Office.
The Danish Parliamentary Ombudsman is elected by the Danish Parliament to investigate, at its own initiative or acting on a complaint by an individual, whether public authorities act unlawfully or otherwise commit errors or derelictions in the discharge of their duties. The Ombudsman is independent from the Parliament and may only be dismissed by the Parliament if (s)he ceases to enjoy its confidence. The Ombudsman has jurisdiction over all parts of the public administration, with the exception of courts. In conducting investigations, the Ombudsman has access to all relevant information and can access all relevant premises. The Ombudsman may express criticism, issue recommendations and otherwise state his/her views of a case, but cannot take legally binding decisions. If the Ombudsman’s investigation of a case reveals errors or derelictions of major importance, it must be reported to the Parliament’s Legal Affairs Committee, as well as to the minister, municipal council or regional council concerned.
The Independent Police Complaints Authority is an independent body with the power to investigate, on the basis of complaints or on its own initiative, allegations of police misconduct (including in the Faroe Islands). In conducting an investigation of possible misconduct, the Authority has access to all relevant information. Unless an investigation is terminated, the Authority issues a decision within a reasonable time, in which it may include comments on the conduct of the police. The Authority may also initiate an investigation into allegations of criminal offences committed by the police, either upon a complaint from an individual or ex officio, when there is a reasonable suspicion that police personnel in service have committed a criminal offense which is subject to prosecution by the public authorities. In this context, the Authority has access to all relevant information and may use the investigatory powers, including the coercive powers, which are available to the police,. When an investigation is completed, the Authority sends the case to the public prosecutor for a decision on possible prosecution. In addition, the Authority shares an annual report on its investigation with the Danish Attorney General. According to the 2022 annual report of the Authority, it handled 17 cases concerning the Faroe Islands in 2022, including two criminal cases concerning the unlawful disclosure of information.
The Danish Audit Office is an independent body headed by an Auditor General, who is appointed by the Speaker of the Danish Parliament and approved by the Parliament’s Standing Orders Committee. While the main role of the Audit Office is to conduct financial audits, it may also examine whether government-funded agencies and enterprises comply with applicable laws and regulations and on the efficiency and effectiveness of the administration. For example, in 2020, the Audit Office published a report on the outsourcing of sensitive and confidential personal data by central government IT systems.
2.2.4.Redress
Individuals whose personal data is collected by criminal law enforcement authorities in the Faroe Islands have access to different avenues to obtain redress, including compensation for damages.
First, individuals have a right to obtain access to, correction of and deletion of their data processed by criminal law enforcement authorities under the Act on the Processing of Personal Data by Law Enforcement Authorities. The exercise of the right of access may be postponed, restricted or refused if providing access would be prejudicial to (1) official or legal inquiries, investigations or procedures, (2) the prevention, detection, investigation or prosecution of criminal offences or the execution of criminal penalties, (3) the protection of national security, (4) the protection of public security or (5) the protection of the rights of the data subject or others. In response to a request for erasure, the authority may instead restrict the processing of personal data where the accuracy of the data is contested by the data subject and the accuracy/inaccuracy cannot be ascertained, or the data must be maintained for the purposes of evidence. In case of a postponement/restriction/refusal, a law enforcement authority has to inform the individual of the reasons thereof or indicate to the individual that it is not possible to disclose whether or not personal data regarding him/her are being processed. In both cases, the individual has to be informed about the possibility to appeal the decision, or to request that the Danish DPA exercises the rights on behalf of the individual (the outcome of which can in turn be appealed before a court).
Second, any individual may lodge a complaint concerning the processing of their data by a criminal law enforcement authority with the Danish DPA. In response to a complaint, the latter may make use of all of the investigatory and remedial powers described in the previous section. Decisions or inaction of the Danish DPA can be appealed before the Danish courts. The court may annul administrative decisions and return the decision to the specific authority (cassation) or replace an administrative decision with a new decision.
Third, any individual can lodge a complaint about the actions of Danish criminal law enforcement authorities in the Faroe Islands, including the collection and use of personal data, before the Danish Parliamentary Ombudsman, who can make use of the powers described in the previous section. Similarly, individuals can turn to the Independent Police Complaints Authority, which can make use of the powers described in the previous section to investigate and handle complaints or allegations of criminal offences concerning activities of Danish criminal law enforcement authorities.
Fourth, individuals can also directly invoke the Act on the Processing of Personal Data by Law Enforcement Authorities against criminal law enforcement authorities in court to obtain judicial redress. This also includes the possibility to obtain compensation for material or immaterial damage suffered as a result of unlawful data processing by a criminal law enforcement authority.
Fifth, different judicial redress avenues are available to individuals to challenge the unlawful use of investigative measures (e.g., search, seizure, intervention with the secrecy of communications, etc.). In particular, disputes on the lawful use of investigatory powers may be brought before the court during an investigation, in which case an individual can invoke Section 72 of the Danish Constitution. Furthermore, depending on the circumstances, unlawfully obtained evidence may be ruled inadmissible by the court in the criminal case. In addition, any individual who, in the course of criminal proceedings, has been subjected to investigative measures may obtain compensation for financial damage, mental suffering, inconvenience, disturbance or deterioration of position or condition as a result of these measures. The Prosecution Service decides whether to award a claim for damages. If the claim for damages is refused, the claimant can, within two months of notification of the refusal, request that the claim is brought before the district court.
Finally, any individual may obtain judicial redress before the European Court of Human Rights against the unlawful collection of his/her data by Danish criminal law enforcement authorities in the Faroe Islands, provided that all available domestic remedies have been exhausted.
2.3.Access and use by public authorities for national security purposes
Personal data transferred from the EU to the Faroe Islands based on the adequacy decision may be accessed for national security purposes by the Danish Security and Intelligence Service (DSIS) on the basis of legislation put into force in the Faroe Islands and Faroese implementing rules. The DSIS, which is part of the police, is primarily tasked with preventing, investigating and combating crimes against the independence and security of the State, as well as crimes against the constitution and supreme State authorities
. In addition, the DSIS performs several other tasks in the area of national security, such as informing the Minister of Justice of matters relating to internal security, collecting intelligence on threats to the country, and drawing up threat assessments
. As described in more detail below, the collection of personal data by the DSIS in the Faroe Islands, as well as the further use of such data, is regulated by the ASIS, the Faroese Administration of Justice Act and Faroese Executive Orders.
2.3.1.Legal bases and applicable limitations/safeguards
The ASIS lays down the different powers of the DSIS (described in more detail below), as well as the overarching conditions and limitations that apply to the use of each power. Importantly, while the ASIS provides the DSIS with a legal basis to collect information (including personal data), the DSIS can only make use of coercive measures – such as carrying out a search/seizure, issuing a production order, or intercepting communications – in accordance with the conditions, limitations and safeguards of the Administration of Justice Act described in section 2.2.1. As a result, the same requirements as the ones that apply to criminal law enforcement activities of the Police, also apply to the national security activities of the DSIS. For example, the information must be important in the context of a specific criminal investigation, the DSIS must comply with the principle of proportionality, prior judicial authorisation must in principle be obtained, and individuals must in principle be notified about the collection of their data (e.g., within 14 days after the interception of communications), etc.
More generally, the DSIS is, as any other public authority, subject to principles of general administrative law, including the principle of proportionality. This means, inter alia, that the means and methods used by the DSIS to collect or obtain personal data must be appropriate for that purpose, that less intrusive means and methods must be deemed not to be sufficient, and that the method chosen must not be disproportionate to the purpose for which the data are collected or obtained.
In accordance with the ASIS, the DSIS provides that it may open “inquiries” into natural and legal persons, if the inquiry is likely to be relevant for the performance of its tasks relating to the prevention and investigation of crimes against the independence and security of the State or against the constitution, or if the inquiry is necessary for the performance of its other tasks. An inquiry is an activity aimed at specifically selected natural or legal persons for the purpose of collecting or obtaining information about them. The actual collection of personal data in the context of an inquiry may only take place if additional conditions are met.
First, the Act provides that the DSIS may collect and obtain data that may be relevant to its activities. Based on the preparatory work for the Danish DSIS Act (on which the Faroese Act is based), the “collection” of personal data means accessing data that is readily available (e.g., information available on the internet), while “obtaining” personal data means accessing data that is not readily available but can be obtained by contacting a third party such as a public authority, association, organisation or private person. According to an evaluation report of the Danish Ministry of Justice on the activities of the DSIS, the criterion “may be relevant” implies that data may only be collected or obtained by the DSIS if the data is likely to have an impact on the effectiveness of the Service. In any event, a third party receiving a request is not obliged under the ASIS to disclose personal data to the DSIS. Whether the requested data can be disclosed must therefore be determined based on the legal grounds for processing set out in the applicable data protection legislation, in this case the Faroese Data Protection Act. The only way for the DSIS to compel the third party to disclose data is by following the procedures of the Administration of Justice Act (e.g., to obtain a production order).
Second, the DSIS may obtain data from other public authorities (including in the Faroe Islands), which are obliged to disclose the data if the DSIS considers that the data are likely to be relevant to the performance of its tasks relating to the prevention and investigation of crimes against the independence and security of the State, as well as crimes against the constitution. The criterion “likely to be relevant” implies that there must be a more specific presumption that the data which the Service wishes to obtain will have an impact on the performance of the Service’s tasks. In other words, there must be a certain probability (and not a remote possibility) that the data may contribute to the Service’s performance of those tasks.
Additional limitations and safeguards follow from the EOFIDSIS, which for instance requires that the collection of particularly sensitive health data (e.g., information on psychiatric diagnoses) and data on groups of persons who are not identified in advance may only take place with the prior approval of the head or general counsel of the DSIS. When obtaining data on groups of unidentified persons, the DSIS is required, as soon as circumstances permit, to assess whether the persons to whom the data relates are relevant for its tasks. To the extent this is deemed not to be the case, the irrelevant data must be deleted immediately. In addition, the use of coercive investigative measures must always be approved by the head or general counsel of the DSIS or their deputies. If the measure in question requires a court order, the approval must be given before the case is referred to the court in accordance with the rules of the Administration of Justice Act.
As stressed above, the provisions of the ASIS on the possibility for the DSIS to open inquiries and in that context collect information do not by themselves authorise the DSIS to initiate criminal investigations or to make use of coercive powers such as searches, seizures, production and the interception of communications (or collection of information on communications). The latter may only be carried out if all relevant legal requirements are fulfilled, i.e., under (1) the ASIS (e.g., establishing the relevance or necessity of the collection for the performance of the DSIS’ tasks), (2) the EOFIDSIS (e.g., as regards internal approval) and (3) the Administration of Justice Act (e.g., relevance/importance to a specific criminal investigation, compliance with the principle of proportionality, need to obtain prior authorisation from a court, obligation to notify concerned individuals, etc.).
2.3.2.Further use of the information collected
The processing of personal data collected by the DSIS is also governed by the ASIS, which imposes the principle of purpose limitation, data minimisation, data accuracy and limited data retention. With respect to data retention, the ASIS generally requires the DSIS to delete data on natural persons where no new information has been obtained in connection with the inquiry or investigation in the last 15 years. Data may only be kept longer where the data is needed on imperative grounds relating to the performance of the DSIS’ tasks, in which case the DSIS must inform the Intelligence Oversight Board (see below) thereof. However, if the DSIS becomes aware that there is no longer a legal basis to keep data before the abovementioned retention period has expired (i.e., because the data is no longer relevant to the performance of its tasks relating to the investigation of certain crimes or the data is no longer necessary for the performance of the DSIS’ other tasks), that data must be deleted immediately. This obligation does not apply where the information is included in documents for which there is still a legal basis for the processing. The DSIS must carry out regular spot checks on the deletion of data, on which it is required to regularly report to the Intelligence Oversight Board.
The DSIS is also required to have technical and organisational measures in place to ensure the security of the data it processes, in accordance with the DSIS Order on security measures. This includes having internal rules on inter alia physical security measures, access control and authorisation schemes, guidance on the use of computer equipment, etc., which must be reviewed at least annually. More generally, the EOFIDSIS requires the DSIS to regularly carry out spot checks on deletion, logging, opening of investigations, obtaining of data, investigative measures and transfer of data and report on such checks to the Intelligence Oversight Board.
Under the ASIS, the further sharing of personal data with other entities is subject to specific requirements. First, the DSIS may share data with the Danish Defence Intelligence Service if such sharing may be relevant to the performance of the tasks of both services. The disclosure of information to other entities (within or outside the Faroe Islands) may take place only (1) in compliance with all data protection principles (e.g., purpose limitation, data minimisation, data accuracy); (2) if the individual has given consent, the disclosure is likely to be relevant to the performance of the DSIS’ tasks relating to the prevention and investigation of crimes against the independence and security of the State or against the constitution, or the disclosure is necessary for the performance of its other tasks and (3) when the disclosure is presumed reasonable following a case-by-case assessment (which, according to the preparatory work on the ASIS, requires to examine in particular, the content of the information, the purpose of the disclosure and an assessment of the damaging effect that such disclosure could cause for the concerned individual). An additional requirement applies to sensitive personal data, which may only be transferred to foreign authorities with the prior approval of the head or general counsel of the DSIS or their deputies.
Finally, when making use of the powers under the Administration of Justice Act, the same limitations under that Act as the ones described in Section 2.2.2, e.g., as regards the use of intercepted communications as evidence or the deletion thereof when the information is not relevant for the investigation, also apply to data processed by the DSIS.
2.3.3.Oversight
The activities of the DSIS are supervised by different bodies.
First, compliance by the DSIS with the ASIS, including its requirements on the processing of personal data, is overseen by the independent Danish Intelligence Oversight Board. The Board can investigate compliance with the ASIS (and the rules established under the ASIS, such as the EOFIDSIS) on its own initiative or on the basis of a complaint from an individual. For example, in 2021, the Board inter alia carried out checks of compliance by the DSIS with the requirements for obtaining information from other public authorities, the data retention requirements, the rules for data sharing with third parties, as well as data security. In carrying out its oversight activities, the Board can access all relevant information (including by ordering the DSIS to provide any information or material relevant to its activities, to access the premises of as well as the data processed by the DSIS). In addition, the DSIS is required to regularly report to the Board, e.g., about the collection of personal data from public authorities and about its regular internal audits concerning data deletion, logging, the opening of investigations, obtaining of data, the use of investigative measures and transfers of data. The Board may issue an opinion with recommendations to the DSIS, which may also be provided to the Minister of Justice. If, in exceptional cases, the DSIS does not comply with a recommendation of the Board, it must notify the Board and immediately submit the matter to the relevant minister for decision. If also the minister decides not to follow the recommendation of the Board, the Government must notify the Parliamentary Committee for the Intelligence Services.
Second, the DSIS is more generally subject to independent oversight by the Danish Parliamentary Ombudsman, who can make use of all the powers described in section 2.2.3.
Third, the DSIS, as a part of the Danish police, is also subject to the oversight of the Independent Police Complaints Authority, which can make use of all the powers described in section 2.2.3.
Fourth, the Danish National Audit Office also has the power to supervise the activities of the DSIS, under the same conditions as described in section 2.2.3.
Finally, the DSIS is subject to specific parliamentary oversight by the Danish Parliamentary Committee for the Intelligence Services. To this end, the Government must provide the Committee with an annual update on the activities of the intelligence services, including the DSIS, and keep it informed of significant circumstances of a security nature and foreign policy issues relevant to the activities of the intelligence services. The Committee may also request information from the government on the activities of the intelligence services, including statistical information. Finally, prior to issuing guidelines on the activities of the intelligence services, the government must inform the Committee of their content. The Committee may, either orally or in writing, provide the government with its opinion on all the matters under its consideration. However, since the members of the Committee are bound by a duty of confidentiality, the recommendations of the Committee are not made public.
2.3.4.Redress
Individuals can make use of different avenues to obtain redress against the DSIS, including compensation for damages.
First, individuals may request the Intelligence Oversight Board to investigate whether the Service is processing personal data about them “without justification”. Following such a request, the Board must ensure that this is not the case and inform the person concerned thereof. In particular, the Board will, on the basis of a request from an individual, verify whether the DSIS complies with the ASIS, including for instance with the applicable data protection principles (e.g., purpose limitation, data accuracy, data minimisation). If during its investigation the Board finds that the Service is processing personal data without a legal basis (or no longer has a legal basis for the processing), the DSIS is obliged to delete that data under the ASIS. In addition, in case “special circumstances so warrant”, the Board may also order the Service to provide the data subject full or partial access to personal data about him/her processed by the Service. For example, in 2021, the Board received 35 requests from individuals, which led to a finding that data was processed unlawfully in six cases, after which the data was deleted by the DSIS. Decisions of the Board in response to a request from an individual can be challenged before the Danish courts in accordance with Section 63(1) of the Constitution to obtain judicial review, as described in section 2.2.4.
In addition, while under the ASIS individuals are in principle not entitled to have direct access to data processed by the DSIS or to know whether the DSIS is processing such data, the DSIS may provide full or partial access to data upon request “if special circumstances so warrant”, i.e., where the individual has a vital interest in having access to the data, e.g., if it could have serious psychological harmful effects if the person is not informed that he or she is not registered with the Service, or in cases where unlawful processing of personal data has caused a person significant financial or non-financial damage.
Second, any individual can lodge a complaint about the actions of Danish national security authorities in the Faroe Islands, including the collection and use of personal data, before the Danish Parliamentary Ombudsman, who can make use of the powers described in the previous section.
Third, individuals can turn to the Independent Police Complaints Authority, which can make use of the powers described in the previous section to investigate and handle complaints concerning activities of Danish national security authorities.
Fourth, the same judicial avenues as the ones described in section 2.2.4 (e.g., invoking Section 72 of the Danish Constitution, claiming compensation for damages suffered because of the unlawful use of investigative measures under the Administration of Justice Act) are also available against the DSIS.
Finally, any individual may obtain judicial redress before the European Court of Human Rights against the unlawful collection of his/her data by the DSIS, provided that all available domestic remedies have been exhausted.
V. BAILIWICK OF GUERNSEY
1.RULES APPLYING TO THE PROCESSING OF PERSONAL DATA
1.1.Relevant developments in the data protection framework of Guernsey
On 21 November 2003 the European Commission adopted a decision in which the Bailiwick of Guernsey was considered as providing an adequate level of protection for personal data. The Article 29 Working Party had adopted a positive opinion on the level of protection of personal data in Guernsey on 13 June 2003. At the time, the legal framework for the protection of personal data was set out in the Data Protection (Bailiwick of Guernsey) Law 2001 (Data Protection Law 2001), which was closely aligned with the UK’s Data Protection Act 1998. The latter had been enacted to give effect to the provisions of Directive 95/46/EC (Data Protection Directive).
Since the adoption of the Commission’s adequacy decision, Guernsey has significantly modernised its data protection framework, in particular by adopting the Data Protection (Bailiwick of Guernsey) Law 2017 (Data Protection Law). The Data Protection Law was intended to bring the Guernsey regime in line with Regulation (EU) 2016/679 (GDPR). It applies in full since 26 May 2019.
The Data Protection Law is complemented by several Ordinances and Regulations. The most important one is the Data Protection (Law Enforcement and Related Matters) (Bailiwick of Guernsey) Ordinance, 2018 (LEO), which regulates the processing of personal data by competent authorities for criminal law enforcement and national security purposes.
With the adoption and full entry into force of the Data Protection Law and the abovementioned Ordinances and Regulations, the Guernsey data protection regime has been significantly strengthened. As set out in more detail below, the Data Protection Law mirrors the provisions of the GPDR with respect to all of its key aspects. In particular, in areas where the GDPR has enhanced the protection of personal data when compared to the protection offered by its predecessor, the Data Protection Directive, the Data Protection Law of Guernsey has been strengthened as well.
Like the Data Protection Law 2001, the new Data Protection Law has a broad scope of application, applying to both private operators and public authorities. While the definitions of ‘personal data’, ‘controller’, ‘processor’, ‘data subject’ and ‘processing’ (which are identical to those used in the GDPR) have not changed, the Data Protection Law has brought even more convergence with the GDPR, e.g., by introducing a definition of ‘pseudonymisation’ and further clarifying when a person is “identifiable” by applying the same criteria of recital 26 of the GDPR. Also the territorial scope of the Law has been extended to cover the processing of personal data by controllers or processors not established in Guernsey, subject to the same conditions that are set out in Article 3 of the GDPR. This confirms the intention of the Guernsey legislator to strengthen the effectiveness of Guernsey’s data protection regime.
The main data protection principles (i.e., the principles of lawfulness, fairness, transparency, purpose limitation, data minimisation, accuracy, storage limitation, integrity and confidentiality) were already present in the Data Protection Law 2001 and are present also in the modernised Law. Some of them have been further strengthened, e.g., the principle of lawfulness of processing, the transparency obligations, the security principle and the principle of accountability.
In particular, as regards the principle of lawfulness, the requirements for valid consent have been reinforced, by making clear that, in addition to being freely given, specific and informed, consent must be unambiguous and expressed by a clear affirmative action. Similarly, the Data Protection Law has strengthened the existing transparency obligations by requiring that additional information is provided to the individual (e.g., the contact details of the data protection officer, the fact that the controller intends to transfer the data to a third country, the retention period, the right to withdraw consent, the existence of automated decision-making, etc.) when data is collected directly from the individual or from third parties and when it is further processed.
With respect to the principle of data security, the Data Protection Law has introduced the obligation to notify data breaches, which was previously not present in the Guernsey regime. As also required by the GDPR, in case of a personal data breach, the controller must, as soon as practicable, and in any event, within 72 hours after becoming aware of the breach (unless the latter is not practicable), notify the personal data breach in writing to the Authority. If a personal data breach is likely to pose a high risk to the significant interests of a data subject, written notice must be provided also to the data subject.
In terms of accountability, the obligations have been fully aligned with the GDPR and requirements that were not present in the Data Protection Law 2001 have been introduced: The Data Protection Law contains the obligations to implement principles of data protection by design and by default, to keep records of processing, to designate a data protection officer, and to conduct impact assessments. Like the GDPR, the Data Protection Law follows a risk-based approach, and the scope of the obligations is tailored to the risks for the rights and freedoms of natural persons.
In addition to the strengthening of data protection principles and obligations, the protections for special categories of personal data have been reinforced since the adoption of the adequacy decision. The Data Protection Law 2001 already offered additional protection for information about the racial or ethnic origin, political opinions, religious beliefs or other beliefs of a similar nature, about membership in a trade union or other labour organisation, about physical or mental health and the commission or alleged commission of an offence. The Data Protection Law extends this protection to biometric and genetic data. As regards the safeguards that apply to the processing of special categories of data, the Data Protection Law allows the processing of special categories of data only in specific circumstances, and, in certain cases requires the processing to be accompanied by additional safeguards. That was already the case under the Data Protection Law 2001.
In terms of rights, Part III of the Data Protection Law provides individuals with all of the key data protection rights, notably the right of access, rectification, and erasure
, and it also provides for a right to restriction
and objection. In addition, the Law provides for a right not to be subject to decisions based on automated processing.
Compared to the previous legislation, the Data Protection Law has strengthened the rights of individuals in several ways. The right of access not only requires controllers to provide individuals with information about the processing of their data (as was already the case under the Data Protection Law 2001), but also to give access to personal data (including by providing a copy)
. Moreover, additional grounds to object to processing have been added. For instance, individuals have a right to object to the processing of their personal data where such processing is based exclusively on grounds of public interest or on the legitimate interest of the controller. In addition, the data subject no longer has to apply to a court to order the rectification and erasure of their personal data, as was required under the Data Protection Law 2001, but instead can make a request directly to the controller
.
Importantly, new rights have been introduced in the Guernsey Data Protection Law. This includes a right for individuals not to be subject to a decision that is based solely on automated processing and affects the significant interests of the data subject.. Such automated decision making may only take place under certain conditions (e.g., only where authorised by law or based on the data subject’s explicit consent) and subject to specific safeguards (e.g., informing the individual about the processing, the logic involved and the envisaged consequences, allowing the data subject to obtain human intervention). In addition, the Data Protection Law introduced a right to data portability that corresponds to the same right available under the GDPR.
As is the case in the GDPR, the data subject rights are subject to certain restrictions intended to allow the balancing of the data protection interests of individuals with objectives of general public interest and with the fundamental rights and freedoms of others.
First, Part I of Schedule 8 allows the restriction of individual rights based on the nature of the personal data being processed. These restrictions apply automatically whenever one of the listed categories of personal data is being processed. The categories are listed in an exhaustive manner and cover a narrowly construed set of situations, such as the provision of references in confidence by the controller in the context of the education, employment or appointment of the data subject, or personal data recorded by a candidate during an examination or marking. These categories are not only very limited in scope, but also do not typically cover situations where personal data is transferred to Guernsey from the EU.
Second, Part II of Schedule 8 sets out restrictions on grounds of prejudice. They can be invoked only when (and to the extent that) the application of the provisions “would be likely to prejudice” the legitimate aim pursued. For example, controllers can restrict data subject rights to the extent that their application would be likely to prejudice the combat effectiveness of the armed forces of the Crown, or would be likely to prejudice judicial independence or the conduct of judicial proceedings.
The Data Protection Authority of Guernsey has issued interpretative guidance that clearly frames the application of the exemptions. It clarifies the scope of the different exemptions, including by means of examples, which helps to prevent these exemptions being misunderstood and applied in an overly broad manner. It also explains how the requirements of necessity and proportionality should be applied with respect to a specific exemption.
With respect to international transfers of personal data, i.e., concerning the potential onward transfer of personal data that has been transferred from the EU, Guernsey has reorganised and clarified its transfer regime and put in place a system that is very similar to the rules on international transfers set out in Chapter V of the GDPR in terms of structure and requirements. Section 55 of the Data Protection Law lays down a prohibition on transferring data to unauthorised jurisdictions, except when specifically authorised by the Law. Authorised jurisdictions are Member States of the European Union, as well as any country or international organisation for which the European Commission has determined that it ensures an adequate level of protection within the meaning of Article 45(2) of the GDPR.
The Data Protection Law further clarifies that countries which have been found adequate by the European Commission are only considered as authorised jurisdictions as long as the adequacy finding is still in force. Guernsey has thus ensured an automatic alignment between the adequacy decisions of the EU and its own data transfer authorisations.
Sections 56, 57 and 59 of the Data Protection Law set out the conditions for transfers to unauthorised jurisdictions. Section 56 allows transfers if the controller or processor is satisfied of the existence of appropriate safeguards and of a mechanism for data subjects to enforce their rights and obtain effective legal remedies against the recipient. The instruments that can be used to provide such safeguards are similar to those provided in Article 46 of the GDPR: (1) a legally binding and enforceable agreement between public authorities, (2) binding corporate rules, (3) standard data protection clauses, (4) an approved code of conduct and (5) an approved certification mechanism.
Under the conditions laid down in Section 57, personal data can be transferred to unauthorised jurisdictions if authorised by the Data Protection Authority. Section 57 explicitly requires the Authority to take into account any opinions or decisions of the European Data Protection Board in determining whether to authorise a transfer. In this area, Guernsey has thus ensured that beyond the alignment of the law itself, also the interpretation of the law remains in line with the interpretation within the EU.
Finally, transfers can take place on the basis of certain statutory grounds listed in Section 59(1) of the Data Protection Law. These statutory grounds for transfers overlap to a large extent with the derogations for specific situations listed in Article 49 of the GDPR. Moreover, the Guernsey authorities have confirmed that a transfer under Section 59(1) would need to be justified on a case-by-case basis, i.e., each instance of transfer, and each piece of personal data transferred would need to fulfil the specific statutory conditions in the relevant provision of Section 59(1) in order for the transfer to be lawful. They have also confirmed that Section 59(1) of the Data Protection Law has to be interpreted in a manner equivalent to Article 49 of the GDPR to preclude systematic or repetitive transfers.
1.2.Oversight, enforcement and redress
Guernsey has also reformed its system of oversight and enforcement of the Data Protection Law. Oversight and enforcement are carried out by the Data Protection Authority (the Authority), which replaces the Commissioner under the Data Protection Law 2001. The Authority is composed of a chairman, four to eight other voting members (the Members), and a commissioner (an ex officio and non-voting member). Compared to the previous Commissioner, the independence of the Authority has been significantly strengthened in several ways.
First, the independence of the Authority is explicitly provided by Section 62 of the Data Protection Law, which requires it to act independently, free from direct or indirect external influence and without seeking or taking instructions from any person. Second, the Authority now enjoys a status of a legal person separate from its members. Third, the Law lays down specific requirements for the appointment and dismissal of the Members and the Commissioner. The Members are appointed by resolution of the Parliament of Guernsey among individuals nominated by a Parliamentary Committee. The Commissioner, which is the chief executive of the Authority, is appointed by the Authority itself. They must have the qualifications, experience and skills necessary to exercise and perform their functions, in particular in the area of data protection. In addition, the Members must have a strong sense of integrity and must be able to maintain confidentiality.
Members can only be removed from office by a resolution of the Parliament of Guernsey, on the basis of a report and recommendation from the Parliamentary Committee, on the basis that the specific conditions for dismissal as set out in the Law are met. The conditions for the dismissal of the Commissioner by the Authority are equally set out in the Law. The Commissioner may not engage in any other employment, occupation or business, or receive any benefits other than the salary, allowances and other expenses awarded by the Authority, except with the approval of the Authority.
The Data Protection Law has also equipped the Authority with additional investigatory and enforcement powers that are very similar to those foreseen in the GDPR. In particular, the Authority can conduct audits, investigate individual complaints and carry out general inquiries on its own initiative. In carrying out its functions, the Authority has access to all relevant information. Upon finding of a violation of the Data Protection Law, the authority can impose various sanctions, ranging from warnings and reprimands to binding orders (for instance to discontinue processing, bring processing into compliance with the Law, rectify, erase or restrict processing or suspend the transfer of personal data).
Moreover, the Authority can impose administrative fines for certain violations of the Law. The fines must be effective, proportionate and have a deterrent effect. As regards the amount of fines, the Authority has to take into account the same factors as those listed in Article 83(2) GDPR, i.e., the intentional or negligent character of the infringement, any action taken by the controller or processor to mitigate the damage suffered by data subjects, duration of the infringement etc.. In addition, several violations of the Data Protection Law continue to constitute offences and may therefore be subject to criminal sanctions.
As regards possibilities for individuals to obtain redress, the Guernsey system continues to offer various avenues, including the possibility to lodge a complaint with the Authority, to obtain judicial redress directly against controllers and processors (both private operators and public authorities) and obtain compensation for damages. In addition, individuals can obtain judicial redress against decisions of the Authority.
Despite its relatively small size, the Authority plays an active role, both when it comes to its engagement with stakeholders and exercising its oversight role. The Authority handles a number of files, including inspections, notifications, written questions and complaints each year. For example, between 25 May and 31 December 2018, the Authority handled 34 complaints and conducted 30 investigations. In 2019, the Authority handled 67 complaints and conducted 50 investigations, which led to a breach determination in 8 cases and reprimands being imposed in 6 cases. Moreover, the Authority held 11 public events and organised sessions for organisations every two weeks, in which it provided information and advice. In 2020, the Authority issued seven reprimands, one warning, two fines and one order and again dealt with a number of complaints and investigations. The Authority also engages in various outreach activities on an ongoing basis, such as presentations for both the private and public sector, for instance on data protection for start-ups and small businesses, on individual rights or on how to respond to data subject access requests.
2.ACCESS TO AND USE OF PERSONAL DATA TRANSFERRED FROM THE EUROPEAN UNION BY PUBLIC AUTHORITIES IN GUERNSEY
2.1.General legal framework
The limitations and safeguards that apply to the collection and subsequent use of personal data for purposes of criminal law enforcement and national security follow from Guernsey’s international obligations in the area of fundamental rights and personal data protection, from the rules that apply to the processing of personal data by the public sector, as well as from specific laws regulating access to data by Guernsey public authorities.
First, as an exercise of power by a public authority, government access in Guernsey must be conducted in full respect of the law. The ratification of the European Convention of Human Rights by the United Kingdom has been extended to Guernsey since 1953
. The right to respect for private and family life (and the right to data protection as part of that right) is protected by the Human Rights (Bailiwick of Guernsey) Law 2000, which incorporates the European Convention on Human Rights into Guernsey law
. Article 8 of the Convention provides that any interference with privacy must be in accordance with the law, in the interests of one of the aims set out in Article 8(2) and proportionate in light of that aim. Article 8 also requires that the interference is “foreseeable”, i.e., have a clear, accessible basis in law, and that the law contains appropriate safeguards to prevent abuse.
In addition, in its case law
, the European Court of Human Rights has specified that any interference with the right to privacy and data protection should be subject to an effective, independent and impartial oversight system that must be provided for either by a judge or by another independent body
(e.g., an administrative authority or a parliamentary body).
Moreover, individuals must be provided with an effective remedy, and the European Court of Human Rights has clarified that the remedy must be offered by an independent and impartial body which has adopted its own rules of procedure, consisting of members that must hold or have held high judicial office or be experienced lawyers, and that there must be no evidential burden to be overcome in order to lodge an application with it. In undertaking its examination of complaints by individuals, the independent and impartial body should have access to all relevant information, including closed materials. Finally, it should have the powers to remedy non-compliance
.
Second, the Council of Europe Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data (Convention 108) also applies in Guernsey
. Article 9 of Convention 108 provides that derogations from the general data protection principles, the rules governing special categories of data and data subject rights are only permissible when such derogation is provided for by the law of the Party and constitutes a necessary measure in a democratic society in the interests of protecting State security, public safety, the monetary interests of the State or the suppression of criminal offences, or for protecting the data subject or the rights and freedoms of others.
Therefore, through adherence to the European Convention of Human Rights and to Convention 108, Guernsey is subject to a number of obligations, enshrined in international law and that frame its system of government access on the basis of principles, safeguards and individual rights similar to those guaranteed under EU law and applicable to the Member States. Furthermore, as far as the ECHR is concerned, compliance with these obligations is subject to the judicial control of the European Court of Human Rights.
Third, the Guernsey Parliament has adopted specific provisions for the processing of personal data for law enforcement purposes, i.e., the Data Protection (Law Enforcement and Related Matters) (Bailiwick of Guernsey) Ordinance, 2018 (LEO). The material scope of the LEO is similar to the one of the Law Enforcement Directive. It applies to the processing of personal data by competent authorities
for the purposes of the prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, including the safeguarding against and the prevention of threats to public security or national security, as well as for exercising or performing any power or duty conferred or imposed on a public authority by a criminal proceeds enactment
.
Furthermore, the data protection principles of lawfulness and fairness
, purpose limitation
, data minimisation
, accuracy
, storage limitation
and security
are retained in the LEO in similar terms as in the Law Enforcement Directive. In essence, the processing of personal data by a competent authority for a law enforcement purpose is permitted only if and to the extent that it is carried out in the context of a function imposed by law and the data subject has given consent, the processing is necessary for the performance of a task carried out by the authority, or an enactment authorises or requires such processing
. In addition, the LEO imposes specific transparency obligations
and recognises the same data subject rights as the LED
. In particular, individuals enjoy a right of access
, correction
and deletion
and have the right not to be subject to automated decision-making
. Competent authorities are also required to implement data protection by design and default
, to keep records of processing activities
, and, in certain situations, to conduct data protection impact assessments and to pre-consult the Data Protection Authority
. Moreover, they are required to put in place appropriate measures to ensure security of processing
and are subject to specific obligations in case of a data breach, including notification of such breaches to the Authority and data subjects
. Like in the Law Enforcement Directive, there is also a requirement for a controller (unless it is a court or other judicial authority acting in a judicial capacity) to designate a data protection officer who assists the controller in complying with its obligations as well as monitoring that compliance
. Finally, the LEO contains specific provisions on international transfers of personal data
. The provisions substantially echo those in the Law Enforcement Directive. Essentially, transfers to “unauthorised jurisdictions”
are prohibited unless they are necessary for a law enforcement purpose and based on appropriate safeguards
. In the absence of appropriate safeguards, transfers to unauthorised jurisdictions are only possible in specific circumstances that are listed in the law in an exhaustive manner and correspond to the ‘derogations' set forth in the Law Enforcement Directive
.
Under similar conditions as under the Law Enforcement Directive, Section 24 of the LEO specifies that certain specific provisions of the LEO
may be restricted to the extent that and as long as, having regard to the significant interests of the data subject, the restriction is a necessary and proportionate measure for one of the purposes listed in the law
.
Moreover, Schedule 3 to the LEO imposes the same restrictions (where relevant in the context of the LEO) to specific provisions
of the LEO as the ones provided by the Data Protection Law
. First, Schedule 3 allows the restriction of individual rights based on the nature of the personal data being processed. These restrictions apply automatically whenever one of the listed categories of personal data is being processed. These categories are listed in an exhaustive manner and cover a very limited, narrowly construed set of situations. In addition, they do not typically cover situations where personal data is transferred to Guernsey from the EU
. Second, Schedule 3 sets out restrictions on grounds of prejudice. They can be invoked only when and to the extent that the application of the provisions “would be likely to prejudice” the legitimate aim pursued. For example, controllers can restrict data subject rights to the extent that their application would be likely to prejudice the combat effectiveness of the armed forces of the Crown
, or would be likely to prejudice judicial independence or the conduct of judicial proceedings
. As explained in section 1.1., the Data Protection Authority of Guernsey has issued interpretative guidance that clearly frames the application of the restrictions. It clarifies the scope of the different restrictions, including by means of examples, which helps to prevent them being misunderstood and applied in an overly broad manner. It also explains how the requirements of necessity and proportionality should be applied with respect to specific restrictions
.
The processing of personal data for national security purposes in Guernsey is either subject to the provisions of the Data Protection Law described in Section 1.1., or to the provisions of LEO as described above. As explained above, the LEO applies to the processing of personal data by a competent authority, including for the purpose of safeguarding against or preventing threats to national security. The Data Protection Law applies if the processing of personal data for national security purposes is not conducted by a competent authority. While both the LEO
and the Data Protection Law
provide for an exemption from specified provisions for national security purposes, these provisions may only be restricted to the extent that their application would be likely to prejudice national security. In addition, the application of these exemptions has been clarified through detailed guidance. As recalled above for restrictions applicable in the field of criminal law enforcement, in particular, relying on the exemption must be necessary and proportionate in a democratic society. The exemption cannot be invoked in a blanket manner but can be relied upon only the basis of a case-by-case analysis and considering the actual consequences of applying the relevant provision. Controllers must be able to show that there is a real possibility of an adverse effect on national security if the relevant provision is applied. All decisions to rely on an exemption have to be documented and controllers must be prepared to share that documentation with the Data Protection Authority
.
Moreover, according to paragraph 18(2) of Schedule 3 to the LEO and paragraph 18(2) of Schedule 8 to the Data Protection Law, a certificate signed by Her Majesty’s Procureur can confirm the legality of the reliance on the restriction
. That means that the certificate serves as conclusive evidence of the fact that a restriction from one or more provision specified in the certificate is required for the purposes of national security. It is important to note that the national security certificate does not provide for an additional ground for restricting data protection rights and obligations for national security reasons. In other words, the controller or processor can only rely on a certificate when it has concluded that it is necessary to rely on the national security restriction which, as explained above, must be applied on a case-by-case basis
. Even if a national security certificate applies to the matter in question, the Guernsey Data Protection Authority can investigate whether or not reliance on the national security restriction was justified in a specific case
. Moreover, any person directly affected by the issuing of a certificate may appeal to the Royal Court. The Royal Court will review the decision to issue a certificate and decide whether there were reasonable grounds for issuing it. The Court can consider a wide range of issues, including necessity, proportionality and lawfulness, having regard to the impact on the rights of data subjects and balancing the need to safeguard national security. As a result, the Court can quash the certificate or determine that the certificate does not apply to specific personal data which is the subject of the appeal
.
It follows from the above that limitations and conditions are in place under the applicable Guernsey legal provisions, as interpreted by the Guernsey Data Protection Authority, to ensure that these exemptions and restrictions remain within the boundaries of what is necessary and proportionate to protect criminal law enforcement and national security.
2.2.Access and use by Guernsey public authorities for criminal law enforcement purposes
In Guernsey, criminal law enforcement functions are carried out by the Island Police Force, which is headed by the Chief Officer. Guernsey law imposes a number of limitations on how the Police Force has access to and uses personal data for criminal law enforcement purposes, and it also provides oversight and redress mechanisms in this area. The conditions under which access to personal data can take place and the safeguards applicable to the use of these powers are assessed in the following sections.
2.2.1.Legal bases and applicable limitations/safeguards
Personal data transferred under the adequacy decision and processed by organisations in Guernsey may be obtained by Guernsey criminal law enforcement authorities by means of investigative measures under the Police Procedures and Criminal Evidence (Bailiwick of Guernsey) Law 2003 (PPCE), on the basis of the Regulation of Investigatory Powers (Bailiwick of Guernsey) Law 2003 (RIPL), or on the basis of anti-money laundering legislation
.
The PPCE provides the Guernsey police with a legal basis for accessing personal data held by commercial operators through searches and seizures. The PPCE lays down detailed rules on the scope and application of these measures, aimed at ensuring that the interference with the rights of individuals will be limited to what is necessary for a specific criminal investigation and proportionate to the pursued purpose. Searches and seizures may only take place on the basis of a court-issued search warrant
and the issuing of such warrant is subject to specific procedural and substantive requirements.
More specifically, a police officer may apply for a search warrant to the Bailiff
or an appropriate judicial officer in Alderney or Sark
. An application for a warrant must set out the grounds for the application, the premises to be searched and, as far as practicable, the articles or persons to be sought
.
A search warrant may be issued only if the Bailiff/judicial officer is satisfied that there are reasonable grounds
to believe that (1) a serious arrestable offence
has been committed; (2) there is material which is likely to be of substantial value to the investigation of the offence; (3) the material is likely to be relevant evidence; and (4) it does not consist of or include items that are subject to legal professional privilege or otherwise excluded
.
In terms of formal requirements, the warrant must specify the identity of the person who applied for it, the date of issuance, the enactment under which it is issued, the premise to be searched and, in as far as practicable, the articles or persons to be sought
. The police officer carrying out the search must provide the occupier of the searched premise with the warrant, or in case the latter is not present, leave a copy of the warrant
.
A police officer who is lawfully on any premises may seize anything at that premise if (s)he has reasonable ground for believing that it has been obtained in consequence of the commission of an offence and that it is necessary to seize it in order to prevent it being concealed, lost, damaged, altered or destroyed
. Moreover, the police officer may require any information which is stored in electronic form and is accessible from the premises to be produced in a form in which it can be taken away and in which it is visible and legible, provided that (s)he has reasonable grounds for believing that it is evidence in relation to an offence which he is investigating or any other offence, or that it has been obtained in consequence of the commission of an offence, and that it is necessary to do so to prevent it being concealed, lost, damaged, tampered with or destroyed
.
Specific limitations and safeguards also apply to the use of investigatory powers by public authorities in Guernsey. The use of investigatory powers to obtain information on communications is governed by the Regulation of Investigatory Powers (Bailiwick of Guernsey) Law 2003 (RIPL)
. The RIPL regulates notably the interception of communications, acquisition of communications data (i.e., metadata stored by the service providers), the use of surveillance (such as covert investigations), and the investigation of electronic data protected by encryption (for example to obtain passwords allowing access to electronic devices) by a specified list of public authorities.
Section 1 RIPL introduces a general principle of confidentiality of communications by providing that it is an offence to intercept communications in the course of their transmission by means of a public postal service or a public or private telecommunication system without lawful authority
. Sections 1(5) and 5 RIPL further clarify that to be lawful, any interception of communications must be authorised by an interception warrant
issued by Her Majesty’s Procureur
.
An interception warrant is issued on application by certain persons specifically listed in the law
if the Procureur is satisfied that it is necessary for one of the purposes listed in Section 5(3) RIPL. These include the purpose of preventing or detecting serious crime
. Importantly, the law explicitly requires that the conduct that would be authorised must be proportionate to what is sought to be achieved by that conduct
. In considering the necessity and proportionality of the measure, the Procureur must take into account whether any alternative means could be reasonably used to obtain the information
. In addition, Section 2.5 of the Code of Practice on Interception of Communications further clarifies that this requires a balance of the intrusiveness of the interference against the need for it in operational terms. The interception of communications will not be proportionate if it is excessive in the circumstances of the case. In addition, any interception should be carefully managed to meet the objective in question and must not be arbitrary or unfair
.
In accordance with Section 7 RIPL, the warrant must either name or describe one person as the interception subject or specify a single set of premises as the premise in relation to which the interception is to take place. The warrant must also describe the communications for which interception is authorised, including the addresses, numbers, apparatus or other factors used to identify the communications
. An interception warrant ceases to have effect after 3 months beginning with the day of the warrant's issue, unless it is renewed. A renewal may be authorised by Her Majesty’s Procureur only where (s)he is satisfied that the warrant remains necessary for the purposes described in Section 5(3) RIPL
.
The RIPL also regulates the acquisition of communications data. The acquisition of communications data is not aimed at obtaining the content of a communication, but aimed at obtaining information such as traffic data, information about the use of a postal service or telecommunications service, and any other information held or obtained by a postal service/telecommunication service in relation to persons to whom the service is provided
.
Persons designated with respect to a specific public authority
may obtain communications data by giving notices to a postal or telecommunications operator, requiring the operator to obtain and/or disclose relevant data
. A notice may only be issued if the designated person believes that it is necessary to obtain communications data for one of the specific purposes listed exhaustively in the law, including for the purpose of preventing or detecting crime or of preventing disorder
.
Importantly, the notice or authorisation may only be granted if the designated person believes that obtaining the data in question is proportionate to what is sought to be achieved
. According to the Code of Practice on Accessing Communications Data, this means that even if an action that interferes with a Convention right is directed at pursuing a legitimate aim, this will not justify the interference if the means used to achieve the aim are excessive in the circumstances
. Any interference with a Convention right must be carefully designed to meet the objective in question and must not be arbitrary or unfair
. Even taking all these considerations into account, in a specific case interference may still not be justified because the impact on the individual or group is too severe
.
The notice must be issued in writing and specify the communications data to be obtained, the grounds on which it is necessary to obtain the data, the office, rank or position held by the person issuing the notice, and the manner in which any disclosure required by the notice is to be carried out
. The effect of a notice is limited and unless it is renewed, it ceases to require that data be obtained one month after the date on which the notice is given
. A notice may be renewed before the end of the period of one month under the same conditions as described above
.
Finally, Part III RIPL covers the investigation of electronic data protected by encryption and allows for the issuing of notices requiring the disclosure of the key to encrypted information that is lawfully within the possession of the authorities (such as to obtain passwords allowing access to electronic devices). Such notices may be given where any protected information has come into possession of authorities
and a person with the appropriate permission
reasonably believes that a key to the protected information is in the possession of a person and that the imposition of a disclosure requirement in respect of the protected information is necessary for one of the purposes listed exhaustively in the law, notably in the interest of national security or for the purpose of preventing or detecting crime
. In addition, the person imposing the disclosure requirement must believe on reasonable grounds that the measure is proportionate to what is sought to be achieved and that it is not reasonably practicable to obtain possession of the protected information in an intelligible form without the disclosure requirement
. The notice must be given in writing or in a manner that produces a record
and must describe the protected information to which the notice relates, must specify the office, rank or position held by the person giving it, must specify the time by which the notice is to be complied with and must set out the disclosure that is required by the notice and the form and manner in which it is to be made
.
In Guernsey, criminal law enforcement authorities can also obtain personal data from business organisations in the context of investigations into whether a person has engaged in or benefited from criminal conduct, or into the whereabouts of the proceeds of criminal conduct.
These powers are governed by the Criminal Justice (Proceeds of Crime (Bailiwick of Guernsey) Law, 1999 (POCL). In addition, the Drug Trafficking (Bailiwick of Guernsey) Law, 2000 (DTL) introduces similar powers in connection with investigations into whether a person has carried on or has benefited from drug trafficking, the whereabouts of the proceeds of drug trafficking, or drug money laundering.
In accordance with these laws, the Bailiff can, on an application of a police officer, make orders to make material available, issue search warrants to obtain that material where a production order is not appropriate or not complied with, make customer information orders and account monitoring orders.
Each type of order is subject to strict formal and substantial requirements. In essence, the scope of such orders is always limited to one individual or one set of premises, they must contain specific mandatory information, and they may only be issued for limited purposes.
For instance, under the POCL, the Bailiff can make an order
to make material available if there are reasonable grounds for suspecting that a specified person has engaged in or benefited from criminal conduct, there are reasonable grounds for suspecting that the material is likely to be of substantial value to the investigation, and does not consist of or include items subject to legal professional privilege or excluded material
, and there are reasonable grounds for believing that it is in the public interest that the material should be produced or that access to it should be given
.
The Bailiff can issue a search warrant
under the POCL authorising a police officer to enter and search specific premises, provided that the same conditions as described above are met and an order to make material available has not been complied with, or it would not be appropriate to make such an order. Where a police officer has entered premises in the execution of a search warrant, he or she may seize and retain any material, other than items subject to legal professional privilege or excluded material, which is likely to be of value to the investigation. All applications for production orders and search warrants must have the consent of Her Majesty's Procureur.
A customer information order requires a financial services business
, on a notice given by Her Majesty’s Procureur or a police officer, to provide any customer information
that the institution has relating to a person specified in the application
, in such manner, and by such time, as they require
. An account monitoring order requires the financial services business specified in the application to provide account information specified in the order to an appropriate officer, for the period
, in a manner, and by the time stated in the order
. The conditions for issuing these orders are identical to the ones described above
.
Under the Disclosure (Bailiwick of Guernsey) Law, 2007 (DL) obligations are placed on financial services businesses
and other (non-financial services) businesses to disclose certain information
to a prescribed police officer, where they know or suspect, or have reasonable grounds for knowing or suspecting, that another person is engaged in money laundering or that certain property is or is derived from the proceeds of criminal conduct
.
Importantly, any disclosure of personal data obtained on the basis of the abovementioned provisions has to comply with the Data Protection Law, and the further processing by criminal law enforcement authorities of personal data obtained through such disclosures is subject to the provisions of the LEO.
2.2.2.Further use of the information collected
The further use of data collected by Guernsey criminal law enforcement authorities on one of the grounds referred to in Section 2.2, as well as the sharing of such data with a different authority for purposes other than the ones for which it was originally collected (so-called ‘onward sharing’), is subject to safeguards and limitations.
First, the processing of personal data by law enforcement authorities in Guernsey is governed by the provisions of the LEO as described in section 2.1. With respect to onward sharing, Article 6(2) of the LEO, like the Law Enforcement Directive, allows that personal data collected for a law enforcement purpose may be further processed (whether by the original controller or by another controller) for any other (secondary) law enforcement purpose if the data subject has given its consent to the further processing, if the further processing is for a historical or scientific purpose, or if the controller processes the data for the secondary purpose in the context of discharging a function imposed by law, and the processing is necessary and proportionate to that secondary purpose. In this case, all the safeguards provided by the LEO and the Data Protection Law (referred to in section 2.1) apply to the processing carried out by the receiving authority.
When law enforcement authorities in Guernsey intend to share personal data processed under the LEO with law enforcement authorities of a third country, specific requirements apply
. These requirements are very similar to those set out by the Law Enforcement Directive. Transfers of personal data to “unauthorised jurisdictions” (essentially jurisdictions other than the EU Member States and any country or international organisation that the European Commission has found to ensure an adequate level of protection within the meaning of Article 36 of the LED)
can only take place if they are necessary for a law enforcement purpose and based on appropriate safeguards
. In the absence of appropriate safeguards, transfers to unauthorised jurisdictions are only possible in specific circumstances that are listed in the law in an exhaustive manner, e.g., for the protection of vital interests of individuals, to safeguard legitimate interests of the data subject, to prevent immediate and serious threats to the public or national security of any country, in individual cases for a law enforcement purpose, and in individual cases in the context of legal proceedings and legal advice relating to a law enforcement purpose
.
Second, the different laws that allow for data collection by criminal law enforcement authorities in Guernsey impose specific limitations and safeguards as to the use and further dissemination of the information obtained in exercising the powers they grant.
As regards the powers of search and seizure under the PPCE, the police officer who seizes anything must, if requested by the occupier of premises, provide in reasonable time that person with a record of what he has seized. The police officer must also grant access to or supply a photograph or a copy of the seized or retained item at the request of the person who had custody of the item before it was seized
. Importantly, anything that has been seized by the police may not be retained longer than necessary in the circumstances
.
With respect to the interception of communications, Sections 12 and 13 RIPL set out the safeguards that need to be applied to material intercepted on the basis of a warrant. In particular, the Procureur must make arrangements to ensure that the dissemination of the intercepted material (i.e., the number of people who can access it, the extent to which the material is disclosed or copied, the number of copies
, etc.) is limited to the minimum necessary for the purposes authorised by the warrant. Each copy made of any of the materials must be destroyed as soon as there are no longer any grounds for retaining it as necessary for any of the authorised purposes
. Intercepted material may be shared with authorities of a country or territory outside of Guernsey only if the Procureur has made arrangements that ensure corresponding limitations, to the extent that the Procureur seems fit, and that prevent any disclosure that would not be lawful within Guernsey
.
These safeguards are further specified in the Codes of Practice on the Interception of Communications. In particular, the Code of Practice requires all intercepted material to be handled in accordance with the arrangements made by the Procureur, the details of which must be made available to the Investigatory Powers Commissioner (see section 2.2.3 below)
. All intercepting agencies are required to keep detailed records of interception warrants for which they have applied
. The Code further requires intercepted material, as well as copies and summaries of the material, to be handled and stored securely to minimise the risk of loss or theft. In particular, it must be inaccessible to persons without the required level of security clearance, and this requirement for secure storage also applies to communications service providers. It also requires intercepted material to be securely destroyed as soon as it is no longer needed for any of the authorised purposes and retained material to be reviewed at appropriate intervals to confirm that its retention is justified and valid.
Concerning the acquisition of Communications Data, the Code of Practice on Accessing Communications Data provides that applications and notices for communications data must be retained by the relevant public authority until they have been audited by the Investigatory Powers Commissioner. The public authority should also keep a record of the dates on which an authorisation or notice is started and cancelled. The Code furthermore provides that communications data, as well as all copies, extracts and summaries of it, must be handled and stored securely
.
For the investigation of electronic data protected by encryption, Section 51 RIPL sets out additional safeguards. In particular, it requires all persons involved in such investigations to make arrangements in order to ensure that any key disclosed in the context of the investigation is used only for obtaining access to information to which the investigation relates, that the use and retention of the key are proportionate to what is sought to be achieved, that the key is stored in a secure manner and that it is destroyed as soon as it is no longer needed
.
Finally, under the DL any information obtained by Her Majesty's Procureur or a police officer under this law or any other enactment, or in connection with the carrying out any of their respective functions, may be disclosed to any other person only if the disclosure takes place for a specified purpose, notably for the prevention, detection, investigation or prosecution of criminal offences, whether in Guernsey or elsewhere, the carrying out the functions of the Guernsey Financial Services Commission or a body in another country or territory which carries out any similar function to the Commission, or for the carrying out of any functions of any intelligence service. Any such disclosure must not contravene the Data Protection Law or LEO
.
2.2.3.Oversight
Different bodies carry out oversight of the activities of criminal law enforcement authorities.
First, the processing of personal data by competent authorities for criminal law enforcement purposes is subject to the oversight of the Data Protection Authority, whose independence is enshrined in law
. The tasks and powers of the Data Protection Authority mirror those set out in Article 46 and 47 of the LED
. To perform those tasks, the Data Protection Authority may investigate complaints, conduct inquiries into the processing of personal data by criminal law enforcement authorities
, issue recommendations, make a determination of a violation of the Law and impose sanctions
. These sanctions can include reprimands, warnings or corrective orders (e.g., requiring the authority to bring processing in compliance with the Law, rectify or erase data, cease the processing, etc.). In determining which order to impose, the Authority must have regard to different factors, such as the nature, gravity and duration of the violation, whether the violation was intentional or negligent, the degree of cooperation with the Authority to remedy the breach, any other action taken to mitigate any damage suffered by data subjects etc.
.
According to information provided by the Data Protection Authority, since the entry into force of the LEO, the Authority has been involved in 17 complaints, two inquiries and 11 self-reported data breaches that concerned data processing carried out by law enforcement authorities. The Authority issued one enforcement notice against a law enforcement authority in a case that concerned the unlawful sharing of data. The notice required the authority to review safeguarding and associated data sharing procedures. The Data Protection Authority also regularly engaged with law enforcement authorities by providing guidance and advice.
Second, the use of investigatory powers under the RIPL is overseen by the Investigatory Powers Commissioner. Under Part IV of the RIPL, the Bailiff must appoint a judge of the Court of Appeal (of Guernsey) as the Investigatory Powers Commissioner. The Commissioner is responsible for reviewing the activities under the RIPL, including the issuing of interception warrants, notices for the collection of communications data and investigations of electronic data protected by encryption
. All persons involved in the use of investigatory powers are required to disclose or provide to the Commissioner all documents and information that the Commissioner may require for the purpose of enabling him to carry out his functions
. The Commissioner is in turn required to prepare an annual report on the use of investigatory powers for submission to the Bailiff of Guernsey
. The Bailiff must lay before the Royal Court a copy of every annual report made by the Commissioner
. The Commissioner’s report is also made public. If it appears to the Commissioner that there has been a contravention of the RIPL or insufficient safeguards have been put in place for intercepted communications, he/she must report that to the Bailiff
.
As described in the Commissioner’s recent annual reports, the overwhelming majority of warrants requested and granted in Guernsey are in support of the activities of the Guernsey Police and the Guernsey Border Agency and for the purpose of preventing or detecting crime, notably drug trafficking and related anti-money laundering. In his annual reports, the Commissioner found that warrants had been issued for properly identified statutory purposes, in respect of the principles of necessity and proportionality and in compliance with procedural requirements. He also noted that the safeguards required by Sections 12 and 51 RIPL had been implemented in a satisfactory manner. In a limited number of instances, the Commissioner noted that he had made recommendations for further practical improvements
.
2.2.4.Redress
As regards the processing of personal data by law enforcement authorities in Guernsey, redress mechanisms are available under the data protection legislation, under the Human Rights Act 2001 and under the RIPL. This series of mechanisms provide data subjects with effective administrative and judicial means of redress, enabling them in particular to ensure their rights, including the right to have access to their personal data, or to obtain the rectification or erasure of such data.
First, data subjects have the right to lodge a complaint with the Data Protection Authority concerning the processing of their personal data by criminal law enforcement authorities
. The Authority has the power to determine breaches of the LEO and impose necessary sanctions. It also has the power, on request by a data subject or on its own initiative, to bring proceedings before a court in respect of any breach or anticipated breach of the Law. Following such complaint, the court can make any order, relief and remedy it considers just under the circumstances, including an award of compensation to any person who suffers damage as a result of the breach, an injunction or interim injunction to restrain any actual or anticipated breach of an operative provision, and a declaration that a breach was committed
.
Second, individuals can obtain judicial redress against decisions of the Authority. This includes the possibility to challenge an action or inaction of the Authority before a court, e.g., decisions not to investigate a complaint, or decisions finding that there has been no violation of the Law. Moreover, an individual can appeal to court against any failure of the Authority to provide written notice that a complaint is either being investigated or not being investigated, within the time period specified in the Law, or if the complaint is being investigated, written notice of the progress and, where applicable, the outcome of the investigation within the time period specified in the Law
. If a determination of the Authority is appealed, the court has the power to confirm or annul the determination of the Authority and remit the matter back to the Authority for reconsideration and make any other order it considers just
.
Third, under Section 79 of the Data Protection Law, individuals can also obtain judicial redress against criminal law enforcement authorities directly before the courts. In particular, if there is a breach of the operative provisions of the Law and the breach causes damage to another person, it is actionable in court by that person
.
Fourth, as far as any person considers that their rights, including rights to privacy and data protection, have been violated by public authorities, individuals can obtain redress before the Guernsey courts under the Human Rights Law 2001. Under Section 6(1) of the Human Rights Law, it is unlawful for a public authority to act in a way which is incompatible with rights provided in the law
. A person who claims that a public authority has acted (or proposes to act) in a way which is unlawful under Section 6(1) can bring proceedings against the authority under this Law in the appropriate court or tribunal, when he or she is (or would be) a victim of the unlawful act
. If the court finds any act of a public authority to be unlawful, it can grant such relief or remedy, or make such order, within its powers as it considers just and appropriate
.
Finally, any individual may obtain judicial redress before the European Court of Human Rights against the unlawful collection of his/her data by criminal law enforcement authorities, provided that all available domestic remedies have been exhausted.
For violations of the RIPL, individuals can obtain redress before the Interception of Communications Tribunal. This redress avenue is described in section 2.3.4 below.
2.3.Access and use by Guernsey public authorities for national security purposes
In Guernsey, access to information transferred under the adequacy decision for purposes of national security can take place in the form of the interception of communications, the acquisition of communications data and the investigation of data protected by encryption on the basis of the RIPL
.
2.3.1.Legal bases and applicable limitations/safeguards
The interception of communications, acquisition of communications data and investigation of data protected by encryption on the basis of the RIPL may not only take place in the context of criminal investigations, but also when necessary in the interests of national security or to safeguard the economic well-being of the Bailiwick
. The use of these powers for those purposes is subject to the same substantive and procedural limitations and safeguards as described in section 2.2.1 in the context of criminal law enforcement, notably the need for independent authorisation, requirements of necessity and proportionality and limitation to specific communications or information
.
Moreover, although the notion of “economic well-being” may appear broad, Section 5 RIPL sets out that an interception warrant can only be considered necessary for the purpose of safeguarding the economic well-being of Guernsey if the purpose is to obtain information relating to the acts or intentions of persons outside Guernsey
. In addition, the Code of Practice on the Interception of Communications further specifies that Her Majesty's Procureur can only issue an interception warrant for the purpose of safeguarding the economic well-being of Guernsey if he considers, on the basis of the facts of each case, that there is a direct link between the economic well-being of the Bailiwick and national security
. Similarly, the Code of Practice on Accessing Communications Data sets out that communications data can only be obtained for the purpose of the economic well-being of Guernsey if, on the basis of the facts of each case, the economic well-being is related to national security
.
2.3.2.Further use of the information collected
The further use of personal data obtained in the interests of national security is governed either by the provisions of the LEO or of the Data Protection Law, as described in section 2.1
. Section 6(2) of the LEO allows that personal data collected for a law enforcement purpose (within the meaning of the LEO) may be further processed for any other (secondary) law enforcement purpose only if the data subject has given its consent to the further processing, if the further processing is for a historical or scientific purpose, or if the controller processes the data for the secondary purpose in the context of discharging a function imposed by law, and the processing is necessary and proportionate to that secondary purpose. Pursuant to Sections 5and 6(1)(b) of the LEO, data processing must be lawful and fair, and data must not be further processed in a manner that is incompatible with the purpose for which it was collected.
Moreover, specific requirements apply when personal data is shared with authorities outside of Guernsey
. As described in more detail in sections 1.1, 2.1 and 2.2.2, these requirements are very similar to those set out by the EU’s data protection framework. Transfers of personal data to “unauthorised jurisdictions” (essentially jurisdictions other than the EU Member States and any country or international organisation that the European Commission has found to ensure an adequate level of protection)
can only take place if they are based on appropriate safeguards
. In the absence of appropriate safeguards, transfers to unauthorised jurisdictions are only possible in specific circumstances that are listed in the law in an exhaustive manner
.
In addition, the RIPL, complemented by the relevant Codes of Practice, sets out specific safeguards for the further use and sharing of data obtained on the basis of its provisions. These involve particular arrangements to ensure that the dissemination of material obtained is limited to the minimum necessary for the purposes pursued with the authorisation. Material must be handled and stored securely to minimise the risk of loss or theft and must be destroyed as soon as there are no longer any grounds for retaining it as necessary for any of the authorised purposes. Retained material must be reviewed at appropriate intervals to confirm that its retention is justified and valid. All agencies exercising powers on the basis of the RIPL are required to keep detailed records of warrants or authorisations for which they have applied
. Intercepted material may be shared with authorities of a country or territory outside of Guernsey only if arrangements are in place to ensure corresponding limitations and to prevent any disclosure that would not be lawful within Guernsey
.
2.3.3.Oversight
Government access for national security purposes in Guernsey is overseen by different bodies. The Data Protection Authority oversees the processing of personal data in light of the LEO and the Data Protection Law, while specific oversight on the use of the investigatory powers under the RIPL is provided by the Investigatory Powers Commissioner.
The processing of personal data carried out for national security purposes is governed by the provisions of both the LEO and the Data Protection Law. The general functions and powers of the Guernsey Data Protection Authority are laid down in Section 61 et seq. of the Data Protection Law in conjunction with Schedule 7 to the Data Protection Law
. The tasks include, but are not limited to, monitoring and enforcement, promoting public awareness, advising the Guernsey parliament and government and other institutions on legislative and administrative measures, promote the awareness of controllers and processors of their obligations, provide information to a data subject concerning the exercise of the data subject’s rights, handle complaints, conduct investigations, issue guidance etc. The Authority has the powers to notify controllers of an alleged infringement and to issue warnings that a processing is likely to infringe the rules, issue reprimands, ban processing or order the controller to take certain actions
. While the Data Protection Law
allows exemptions from certain provisions, including from those that concern the Authority, for national security purposes, these provisions may only be restricted on a case-by-case basis to the extent that their application would be likely to prejudice national security and if necessary and proportionate (as explained in section 2.1).
Furthermore, as described in section 2.2.3 above, the Investigatory Powers Commissioner oversees the application of the RIPL i.e., the interception of communications, the acquisition of communications data and the investigation of data protected by encryption. In his recent annual reports, the Commissioner noted that the overwhelming majority of warrants in Guernsey were requested and granted in support of the activities of the Guernsey Police and the Guernsey Border Agency and for the purpose of preventing or detecting crime
.
2.3.4.Redress
First, an individual who believes that his or her rights under the LEO have been (or are about to be) breached can make a complaint to the Data Protection Authority, which exercises oversight over processing by competent authorities (as described in section 2.3.3 above). Redress mechanisms under the LEO and the Data Protection Law include breach determinations or sanctions issued by the Authority, and civil proceedings before a court, in which a court can make any order, relief and remedy it considers just under the circumstances, including an award of compensation to any person who suffers damage as a result of the breach, an injunction or interim injunction to restrain any actual or anticipated breach of an operative provision, and a declaration that a breach was committed (as described in section 2.2.4 above).
Individuals can also obtain redress for violations of the RIPL before an independent Tribunal established by Section 56 RIPL
.
The Tribunal is the appropriate forum for any complaint by a person, including any individual in the EU, who believesthat conduct under the RIPL has taken place in relation to him, his property or his communications
, including conduct by or on behalf of any of the UK intelligence services, conduct in connection with the interception of communications in the course of their transmission, conduct in connection with the collection of communications data, or conduct in connection with the investigation of data protected by encryption
. In addition, the complainant is required to believe that the conduct has taken place either in “challengeable circumstances”
or has been carried out by or on behalf of the intelligence services
.
When considering a complaint, it is the duty of the Tribunal to investigate whether surveillance has taken place in relation to the complainant, as well as the authority for such surveillance, if any
. The Tribunal determines whether any errors of law, errors of fact or procedural errors have been committed, or whether there has been any other irregularity, such as a lack of proportionality
. All persons involved in the exercise of powers under the RIPL are required to provide to the Tribunal all such documents and information that the Tribunal may need to carry out its functions
. The Tribunal also has the power to require the Investigatory Powers Commissioner to provide the Tribunal with all such assistance (including the Commissioner's opinion as to any issue to be determined by the Tribunal) as the Tribunal think fit
. The Commissioner must be kept informed about the proceedings and any determination, award, order, or other decision made in relation to those proceedings
.
If the Tribunal makes a determination in favour of the complainant, the Tribunal must provide the complainant with a summary of that determination including any findings of fact. The tribunal must also give notice to the complainant if no determination has been made in his/her favour
. The Tribunal has the power to issue interim orders and to provide any such award of compensation or other order as it thinks fit. This may include an order quashing or cancelling any warrant or authorisation and an order requiring the destruction of any records of information obtained in exercise of any power conferred by a warrant or authorisation, or otherwise held by any public authority in relation to any person
. According to Section 58(8) RIPL, a determination, award, order, or other decision of the Tribunal, is not subject to appeal
.
Finally, as also described in section 2.2.4 above, as far as individuals consider that their rights, including rights to privacy and data protection, have been violated by public authorities, they can obtain redress before the Guernsey courts under the Human Rights Law 2001. In addition, any individual may obtain judicial redress before the European Court of Human Rights against the unlawful collection of his/her data for national security purposes, provided that all available domestic remedies have been exhausted.
VI. ISLE OF MAN
1.RULES APPLYING TO THE PROCESSING OF PERSONAL DATA
1.1.Relevant developments in the data protection framework of the Isle of Man
On 28 April 2004 the Commission adopted a decision in which the Isle of Man was considered as providing an adequate level of protection for personal data transferred from the EU. The Article 29 Working Party had adopted a positive opinion on the level of protection of personal data in the Isle of Man on 21 November 2003. At the time, the legal framework for the protection of personal data in the Isle of Man was set out in the Data Protection Act 2002, which entered into force on 1 April 2003. The Data Protection Act 2002 was closely aligned with the UK’s Data Protection Act 1998 that had been enacted in the UK to give effect to the provisions of Directive 95/46/EC (Data Protection Directive).
Since the adoption of the adequacy decision, the Isle of Man has further modernised and significantly strengthened its data protection framework through a comprehensive reform. The Data Protection Act 2002 was replaced with new legislation that closely aligns the Isle of Man regime with the EU’s current data protection legislation. In particular, the Isle of Man has incorporated most of the provisions of Regulation (EU) 2016/679 (GDPR) into its own legal order while making only minor adjustments on specific aspects, in particular to adapt the framework to the local context. The recitals of the GDPR have also been maintained in the new data protection framework to assist with contextualising and interpreting relevant provisions.
The Isle of Man main data protection framework now consists of:
(1)the Data Protection Act 2018, which enables the Isle of Man to apply EU instruments relating to data protection (including, but not limited to the GDPR, Directive (EU) 2016/680 (Law Enforcement Directive), Directive (EU) 2016/681 (PNR Directive)
and Directive (EU) 2016/1148 (NIS Directive
) as part of the law of the Isle of Man;
(2)the Data Protection (Application of GDPR) Order 2018
and Data Protection (Application of LED) Order 2018
(Applied GDPR and Applied LED, respectively), which stipulate that the GDPR and the Law Enforcement Directive apply as part of the law of the Isle of Man, subject to the modifications laid down in those orders; and finally
(3)the GDPR and LED Implementing Regulations 2018 (Implementing Regulations), which provide supplementing provisions for the implementation of both of the above-mentioned orders
.
More specifically, the Applied GDPR retains the broad scope of application of the GDPR. Like the GDPR, the Applied GDPR covers the processing of personal data wholly or partly by automated means, or other processing, if the personal data forms part of a filing system
. Moreover, the GDPR’s definitions of ‘personal data,’ ‘processing’
, ‘pseudonymisation’ ‘controller’ and ‘processor’ have been retained without modifications in the Applied GDPR. Concerning its territorial scope, the Applied GDPR covers the processing of personal data by controllers or processors established in the Isle of Man
, under identical conditions to those set out in Article 3 of the GDPR. It has also been extended to cover the processing of personal data by controllers or processors not established in the Isle of Man, subject to the same conditions that are set out in Article 3(2) of the GDPR; thereby strengthening the effectiveness of the Isle of Man data protection regime
.
The Data Protection Act 2002 already contained the data protection principles that were set out in the Data Protection Directive. The Applied GDPR retains those principles – namely, the principles of lawfulness and fairness; transparency; purpose limitation; data minimisation, accuracy and storage limitation; security, integrity and confidentiality and accountability. At the same time, it further strengthens several principles by introducing concrete obligations to implement them. In particular, the Applied GDPR introduces the obligation to notify data breaches subject to the same conditions as in the GDPR
, and reinforces accountability requirements by establishing obligations such as record keeping, data protection by design and default, data protection impact assessments and data protection officers.
The Applied GDPR also guarantees the same data subject rights as enshrined in the GDPR, i.e., the rights of information, access, rectification, erasure, restriction, objection, and portability
. The provisions establishing these rights have been retained without changes. Concerning the specific rights to object to direct marketing, and not to be subject to automated individual decision-making, Isle of Man law now also fully mirrors the GDPR.
As is the case in the GDPR, the data subject rights in the Isle of Man are subject to certain restrictions intended to allow the balancing of the data protection interests of individuals with objectives of general public interest and with the fundamental rights and freedoms of others.
Some of those allow the restriction of individual rights based on the nature of the personal data being processed. They apply automatically whenever one of the listed categories of personal data is being processed. These categories are listed in an exhaustive manner and cover a narrowly construed set of situations, such as data processing for the purpose of assessing a person’s suitability for certain specific offices (e.g., judicial appointments or appointment made by the Crown), the processing of personal data for purposes of providing confidential references or where personal data consists in marks or other information processed for the purpose of determining the result of an exam. These categories are not only (very) limited in scope, but also do not typically cover situations where personal data is transferred to the Isle of Man from the EU.
The majority of the restrictions have to be based either on grounds of prejudice or can only be invoked to the extent that the application of a certain right would interfere with a protected interest at stake, i.e., a public interest or the rights and freedoms of others. Restrictions subject to the prejudice test can be invoked only when (and to the extent that) the application of the provisions “would be likely to prejudice” the legitimate aim pursued. For example, controllers can restrict data subject rights to the extent that their application would be likely to prejudice the prevention or detection of crime or the assessment or collection of any tax or duty
, or would be likely to prejudice the combat effectiveness of any of the armed forces of the Crown
.
The Isle of Man Information Commissioner, as well as the Attorney General’s Chambers together with the Cabinet Office, have issued interpretative guidance that clearly frames the application of the exemptions. It clarifies the scope of the different exemptions, including by means of concrete examples, which should help preventing that they are misunderstood and applied in an overly broad manner. It also explains how the requirements of necessity and proportionality should be applied with respect, in general, to the “likely to prejudice” or “to the extent” standard, and for specific exemptions
. Finally, and importantly, the guidance explicitly states that it should be read in conjunction with the Guidelines 10/2020 on restrictions under Article 23 of the GDPR that have been issued by the EDPB.
The current Isle of Man regime for special categories of personal data is similar to that of the GDPR. The Applied GDPR recognises as special categories of data all data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, trade-union membership, genetic and biometric data, and data concerning a natural person’s sex life or sexual orientation. The processing of such data is prohibited unless specific exceptions apply, which correspond to those in the GDPR. Moreover, the processing of special categories of data is subject to additional requirements, in particular the obligation to appoint a data protection officer in case of large-scale processing and to conduct a data protection impact assessment. Finally, the Applied GDPR retains without modification the GDPR’s prohibition on automated individual decision-making on the basis of special categories of data
.
In the field of international transfers of personal data, the legal framework of the Isle of Man is closely aligned with Chapter V of the GDPR and therefore ensures continuity of protection for the onward transfer of personal data that was originally received from the EU. In particular, the Applied GDPR incorporates Chapter V of the GDPR into the Isle of Man legal framework with certain adaptations to the local context (e.g., by deleting references to binding corporate rules and to procedures before the EDPB)
and is complemented by the Implementing Regulations, which further specify under which conditions international data transfers can take place. Transfers of personal data to third countries or international organisations are prohibited except if the country or international organisation benefits from an adequacy decision, if appropriate safeguards that meet the requirements of Article 46 of the GDPR are in place, or if one of the derogations set out in the Implementing Regulations apply.
With respect to adequacy, the Applied GDPR and Implementing Regulations refer to decisions adopted by the European Commission. As a result, controllers and processors in the Isle of Man can transfer personal data freely, without having to put in place specific safeguards, to all countries and territories for which the Commission has adopted an adequacy finding. Appropriate safeguards may be provided by a legally binding and enforceable instrument between public authorities or bodies, standard contractual clauses, an approved code of conduct or an approved certification scheme. The Information Commissioner has so far not issued specific standard contractual clauses but has instead directed controllers and processors to use the standard contractual clauses adopted by the European Commission. Moreover, subject to prior authorisation by the Information Commissioner, an international transfer can be carried out on the basis of ad hoc contractual clauses or administrative arrangements between public authorities
. Finally, in specific situations (i.e., as an exception to the general rule that an adequacy decision or appropriate safeguards should be in place), data transfers may take place on the basis of one of the grounds listed in the Implementing Regulations. These ‘derogations/exceptions’ correspond to those of Article 49 GDPR, while providing for certain specifications as regards the situations in which they may apply.
1.2.Oversight, enforcement and redress
Since the adoption of the adequacy decision, oversight and enforcement of compliance with the Isle of Man data protection law have been strengthened, notably by reinforcing the supervisory authority’s independence and by extending its powers.
Oversight and enforcement of the Applied GDPR and the Implementing Regulations are now carried out by the Information Commissioner, whose appointment and powers are governed by the Freedom of Information Act 2015. The Commissioner is explicitly mandated to perform his or her functions and powers independently and, in doing so, not to be subject to the direction of Tynwald (the Isle of Man parliament), its Branches or the Council of Ministers. The Commissioner is appointed by the Council of Ministers for a term of up to 5 years. Only candidates with appropriate qualifications, skills and competence can be appointed, and the candidate has to be approved by Tynwald. The Information Commissioner may be removed before the end of his or her term only for very specific reasons set out in law, and the Freedom of Information Act covers cases where the office may become vacant.
The functions and powers of the Information Commissioner have been aligned with those of supervisory authorities under the GDPR. In particular, the Information Commissioner may issue enforcement and penalty notices for violations of provisions of the Applied GDPR and Implementing Regulations on data protection principles, lawfulness of processing, transparency and individual rights, obligations for controllers and processors and the rules on international transfers, or for non-compliance with an information notice, an assessment notice or an enforcement notice. The Information Commissioner also has the power to bring proceedings before a court in respect of a failure to comply with its notices and order compliance. Certain violations of data protection legislation may also constitute offences and lead to criminal sanctions such as fines, imprisonment, or both. This would for example be the case when information is altered or erased with the intention of preventing disclosure of information that any person has requested to access, or with the intention of preventing the controller or processor from supplying the information requested by the Information Commissioner.
Avenues for redress for violations of the Applied GDPR and the Implementing Regulations are available to data subjects under the same conditions as those provided by the GDPR
. In essence, data subjects have a right to an effective judicial remedy both before courts and before the Information Commissioner. The Data Protection Tribunal is the competent forum to hear appeals against decisions from the Information Commissioner
. Obtaining judicial redress directly before the Data Protection Tribunal against controllers and processors
is also possible, under the cause of action of breach of statutory duty (i.e., for violations of a data subjects’ right).
Taking into account of the size of the territory for which it has jurisdiction, the office of the Information Commissioner has been active in exercising its different functions. For example, in 2021, the Information Commissioner received 112 personal data breach reports and 44 complaints, engaged in four investigations and issued three information notices, five reprimands, and three enforcement notices. In 2022, it handled 225 breach reports and 32 complaints, carried out seven investigations and issued two information notices, three warnings, one reprimand, three enforcement notices and one penalty notice.
Moreover, the Information Commissioner has issued several guidance documents for organisations, for instance concerning specific categories of controllers (such as churches, religious organisations or small businesses), specific processing activities (e.g., in the context of cloud computing services), or on specific obligations (e.g., on carrying out data protection impact assessments). To facilitate the exercise of rights by individuals, the Information Commissioner has also developed dedicated guidance and template letters (e.g., for submitting access requests), as well as an online tool for submitting complaints to the Information Commissioner.
2.ACCESS TO AND USE OF PERSONAL DATA TRANSFERRED FROM THE EUROPEAN UNION BY PUBLIC AUTHORITIES IN THE ISLE OF MAN
2.1.General legal framework
The limitations and safeguards that apply to the collection and subsequent use of personal data for purposes of criminal law enforcement and national security follow from the Isle of Man’s international obligations in the area of fundamental rights and personal data protection, from the rules that apply to the processing of personal data by the public sector, as well as from specific laws regulating access to data by Isle of Man public authorities.
First, the right to the protection of personal data forms part of the right to respect for private and family life enshrined in the Human Rights Act 2001, which incorporates into Isle of Man law the rights stemming from the European Convention of Human Rights
. According to the Human Rights Act 2001, all actions of public authorities must be in compliance with the Convention
, and all primary and subordinate legislation shall be read and given effect in a way that is compatible with the Convention’s rights
. Article 8 of the Convention provides that any interference with privacy must be in accordance with the law, in the interests of one of the aims set out in Article 8(2) and proportionate in light of that aim. Article 8 also requires that the interference is “foreseeable”, i.e., have a clear, accessible basis in law, and that the law contains appropriate safeguards to prevent abuse.
In addition, in its case law
, the European Court of Human Rights has specified that any interference with the right to privacy and data protection should be subject to an effective, independent and impartial oversight system that must be provided for either by a judge or by another independent body
(e.g., an administrative authority or a parliamentary body). Moreover, individuals must be provided with an effective remedy, and the European Court of Human Rights has clarified that the remedy must be offered by an independent and impartial body which has adopted its own rules of procedure, consisting of members that must hold or have held high judicial office or be experienced lawyers, and that there must be no evidential burden to be overcome in order to lodge an application with it. In undertaking its examination of complaints by individuals, the independent and impartial body should have access to all relevant information, including closed materials. Finally, it should have the powers to remedy non-compliance
.
Second, the Council of Europe Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data (Convention 108) applies to the Isle of Man by virtue of the United Kingdom’s membership to this convention
. Article 9 of Convention 108 provides that derogations from the general data protection principles (Article 5 Quality of data), the rules governing special categories of data (Article 6 Special categories of data) and data subject rights (Article 8 Additional safeguards to the data subject) are only permissible when such derogation is provided for by the law of the Party and constitutes a necessary measure in a democratic society in the interests of protecting State security, public safety, the monetary interests of the State or the suppression of criminal offences, or for protecting the data subject or the rights and freedoms of others.
Therefore, through adherence to the European Convention of Human Rights and submission to the jurisdiction of the European Court of Human Rights, the Isle of Man is subject to a number of obligations, enshrined in international law, that frame its system of government access on the basis of principles, safeguards and individual rights similar to those guaranteed under EU law and applicable to the Member States.
Third, the processing of personal data by criminal law enforcement authorities in the Isle of Man is subject to the rules of the Applied LED, which essentially replicates the Law Enforcement Directive. The material scope of the Applied LED is identical to the one of the Law Enforcement Directive. It applies to the processing of personal data by competent authorities
for the purposes of the prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, including the safeguarding against and the prevention of threats to public security
. Furthermore, the data protection principles of lawfulness and fairness, purpose limitation, data minimisation, accuracy, storage limitation and security are retained in the Applied LED in the exact same terms as in the LED
. In essence, the processing of personal data by a competent authority is only permitted when necessary for a law enforcement purpose, and only in accordance with a law specifying at least the objectives of the processing, the personal data to be processed, and the purposes of the processing
. In addition, the Applied LED imposes specific transparency obligations
and recognises the same data subject rights as the Law Enforcement Directive without any modifications
. In particular, data subjects enjoy a right to access
, correction
and deletion
and have the right not to be subject to automated decision-making
. Competent authorities are also required to implement data protection by design and default
, to keep records of processing activities
, and, for certain processing operations, to carry out data protection impact assessments and to pre-consult the Information Commissioner
. Moreover, they are required to put in place appropriate measures to ensure security of processing
and are subject to specific obligations in case of a data breach, including notification of such breaches to the Information Commissioner and data subjects
. Like in the Law Enforcement Directive, there is also a requirement for a controller (unless it is a court or other judicial authority acting in a judicial capacity) to designate a data protection officer who assists the controller in complying with its obligations as well as monitoring that compliance
. Finally, the Applied LED contains specific provisions on international transfers of personal data to a third country or an international organisation
. The provisions substantially echo those in the Law Enforcement Directive. Essentially, transfers are prohibited unless the receiving country benefits from an adequacy decision by the European Commission, or if appropriate safeguards are in place
. Transfers are still possible in the absence of an adequacy decision or appropriate safeguards, but only in specific circumstances listed in an exhaustive manner and identical to those set forth in the LED
.
Under identical conditions as under the Law Enforcement Directive, the Implementing Regulations specify that certain specific provisions of the Applied LED
may be restricted to the extent that the application of those provisions would be likely to prejudice any of the matters mentioned in Article 1(1) of the Applied LED (i.e., the prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, including the safeguarding against and the prevention of threats to public security)
.
The Isle of Man Information Commissioner and the Attorney General’s Chambers and Cabinet Office have clarified through guidance how the law enforcement exemption functions in practice
. Importantly, the guidance stresses that the exemptions must not be applied in a blanket manner, but “on a case-by-case basis”, i.e., where necessary and proportionate for law enforcement purposes in light of all the circumstances of the specific case. Finally, in the absence of specific judicial authority in the Isle of Man, the guidance refers to the case law of the High Court of England and Wales where it has been held that the term “likely” connotes a degree of probability where there is a very significant and weighty chance of prejudice to the identified public interests
.
The processing of personal data for national security purposes in the Isle of Man is subject to the provisions of the Applied GDPR and the Implementing Regulations that are described in section 1 above
. At the same time, Regulation 22 of the Implementing Regulations provides for an exemption from specified provisions of the Applied GDPR and the Implementing Regulations
when such exemption is required for the purpose of safeguarding national security or for defence purposes. The application of this exemption has been clarified through detailed guidance by the Isle of Man Information Commissioner and the Attorney General’s Chambers and Cabinet Office
. In particular, relying on the exemption must be necessary and proportionate in a democratic society. The exemption cannot be invoked in a blanket manner but can be relied upon only the basis of a case-by-case analysis and considering the actual consequences of applying the relevant provision of the Applied GDPR. Controllers must be able to show that there is a real possibility of an adverse effect on national security if the relevant provision is applied. All decisions to rely on an exemption have to be documented and controllers must be prepared to share that documentation with the Information Commissioner
.
Moreover, according to Regulation 23 of the Implementing Regulations, controllers may apply for a certificate signed by the Chief Minister which certifies that the restriction of the specific provisions listed under Regulation 22 is required to the protection of national security. It is important to note that the national security certificates do not provide for an additional ground for restricting data protection rights for national security reasons. In other words, the controller or processor can only rely on a certificate when it has concluded it is necessary to rely on the national security exemption which, as explained above, must be applied on a case-by-case basis
. Even if a national security certificate applies to the matter in question, the Isle of Man Information Commissioner can investigate whether or not reliance on the national security exemption was justified in a specific case
.
Any person directly affected by the issuing of the certificate may appeal to the Isle of Man Data Protection Tribunal
against the certificate
or, where the certificate identifies data by means of a general description, challenge the application of the certificate to specific data
. The tribunal will review the decision to issue a certificate and decide whether there were reasonable grounds for issuing the certificate. It can consider a wide range of issues, including necessity, proportionality and lawfulness, having regard to the impact on the rights of data subjects and balancing the need to safeguard national security. As a result, the tribunal can quash the certificate or determine that the certificate does not apply to specific personal data which is the subject of the appeal
.
It follows from the above that limitations and conditions are in place under the applicable Isle of Man legal provisions, as interpreted by the Isle of Man government and the Isle of Man Information Commissioner, to ensure that these exemptions and restrictions remain within the boundaries of what is necessary and proportionate to protect criminal law enforcement and national security.
2.2.Access and use by Isle of Man public authorities for criminal law enforcement purposes
In the Isle of Man, criminal law enforcement functions are carried out by the police force, officially called the Isle of Man Constabulary, which is headed by the Chief Constable. In the specific case of financial crime, the responsible authority is the Financial Intelligence Unit (FIU)
. The law of the Isle of Man imposes a number of limitations on the access to and use of personal data for criminal law enforcement purposes, and it provides oversight and redress mechanisms in this area. The conditions under which access to personal data can take place and the safeguards applicable to the use of these powers are assessed in the following sections.
2.2.1.Legal bases and applicable limitations/safeguards
Personal data transferred under the adequacy decision and processed by organisations in the Isle of Man may be obtained by Isle of Man criminal law enforcement authorities by means of investigative measures under the Police Powers and Procedures Act 1998, on the basis of the Interception of Communications Act 1988, or on the basis of anti-money laundering and anti-terrorist (financing) legislation, including through (voluntary) disclosures.
The Police Powers and Procedures Act 1998 (PPP Act) provides the Isle of Man police with a legal basis for accessing personal data held by commercial operators through searches and seizures. The PPA Act lays down detailed rules on the scope and application of these measures, aimed at ensuring that the interference with the rights of individuals will be limited to what is necessary for a specific criminal investigation and proportionate to the pursued purpose. Searches and seizures may only take place on the basis of a court-issued search warrant
and the issuing of such warrant is subject to specific procedural and substantive requirements.
More specifically, a police officer must apply for a search warrant to a Justice of the Peace
. An application for a warrant must set out the grounds for the application, the legal basis for issuing the warrant and, as far as practicable, the persons and premises
to be searched
. In case the application would request authorisation for more than one search entry, it should also indicate the maximum number of entries desired
.
A search warrant may be issued only if the Justice of the Peace is satisfied that: (1) a serious offence
has been committed and there is material on the premises to be searched which is likely to be of substantial value to the investigation of the offence, or a person has in his possession any property in respect of which an offence has been committed; (2) the material or the property is likely to be relevant evidence; and (3) it does not consist of excluded material or items subject to legal privilege
.
In terms of formal requirements, the warrant must specify the name of the person who applies for it, the date of issuance, the enactment under which it is issued, and the particular premises to be searched, or (in the case of an all-premises warrant) the person who is in occupation or control of the premises to be searched, together with any premises under that person’s occupation or control that can be specified and that are to be searched. The warrant must also identify, as far as it is practicable, the articles or persons to be sought
.
According to Section 22 PPP Act, a police officer who is lawfully on any premises may furthermore seize anything at those premises, including any information which is stored in electronic form
, if he has reasonable grounds for believing
that it has been obtained in consequence of the commission of an offence or that the item is evidence in relation to an offence which he is investigating or any other offence, and that it is necessary to seize it in order to prevent it being concealed, lost, damaged, altered or destroyed
.
Importantly, the Isle of Man Department of Home Affairs has adopted a code of practice for searches and the seizure and treatment of property by police officers which sets out additional limitations and safeguards
. The Code notably stresses that “[t]he right to privacy and respect for personal property are key principles of the Human Rights Act 2001. Powers of entry, search and seizure should be fully and clearly justified before use because they may significantly interfere with the occupier’s privacy. Officers should consider if the necessary objectives can be met by less intrusive means. Powers to search and seize must be used fairly, responsibly, with respect for people who occupy premises being searched or are in charge of property being seized and without unlawful discrimination”
. The Code also specifies in more detail the requirements for making an application for a search warrant, in particular the need to check the accuracy of information on which an application for a search warrant is based
.
Specific limitations and safeguards also apply to the interception of communication in the course of transmission by post, by means of a courier service or a public telecommunication system
. The interception of communications is regulated in the Interception of Communications Act 1988 (IOCA). Section 1 IOCA introduces a general principle of confidentiality of communications by providing that it is an offence to intentionally intercept communications. Section 1 further clarifies that to be lawful, any interception of communications must be authorised by a warrant issued by the Chief Minister under section 2 IOCA
. The Chief Minister can only issue a warrant if s/he considers that the warrant is necessary in the interests of national security or for the purpose of preventing or detecting serious crime
. Importantly, in considering the necessity of a warrant, the Chief Minister must assess whether the information sought to be obtained could reasonably be acquired by other, less intrusive means
. Before issuing or renewing a warrant the Chief Minister is required to consult the Attorney General, i.e., obtain legal advice from the Government’s principal legal adviser on whether the conditions for issuing a warrant are fulfilled.
As the further conditions, limitations and safeguards that apply to the issuing of interception warrants are identical for interception carried out for law enforcement and for national security purposes, they are addressed in detail in the section on access and use of personal data by Isle of Man public authorities for national security purposes.
In the Isle of Man, criminal law enforcement authorities can also obtain personal data from business organisations in the context of financial and asset recovery investigations. These powers are governed by the Proceeds of Crime Act 2008 (POCA) which covers confiscation investigations
, money laundering investigations
, civil recovery investigations
, and detained cash investigations
. During such investigations, police officers
may request a Deemster
to issue several types of orders: production orders
, search and seizure warrants
, disclosure orders
, customer information orders
, and account monitoring orders
. Each type of order is subject to strict formal and substantial requirements. In essence, the scope of such orders is always limited to one individual or one set of premises, they must contain specific mandatory information, and they may only be issued for limited purposes. For example, search and seizure warrants must specify the subject of the investigation (a person or property), they must state that the order is sought for the purposes of the investigation and in relation to material specified in the application, and that the person specified in the application appears to be in possession or control of that material
. Then, a Deemster may only issue the order if there are reasonable grounds to believe or suspect
that there is related material specified in the warrant
on the premises
, and that, for instance, in the case of a money laundering investigation, the person specified in the application has committed a money laundering offence or an ancillary money laundering offence
.
The Anti-Terrorism and Crime Act 2003 (ATCA) provides the Isle of Man police with specific powers to obtain information in the course of terrorism investigations, including by conducting searches and seizures, by obtaining customer information and through account monitoring orders. These powers can generally be exercised only on the basis of a search warrant issued by a Justice of the Peace under similar procedural and substantive conditions as regular warrants
. However, in the specific context of anti-terrorism, warrantless searches are allowed on the basis of a written order from a police officer of at least the rank of chief inspector, but only in case of serious emergency requiring immediate action
. Furthermore, a police officer, or a person authorised in writing by the Attorney General, may also request account monitoring orders to a High Court judge
. Such an order may not exceed 90 days
, is subject to formal requirements
, and may only be issued if the tracing of the terrorist property is desirable for the purposes of the investigation and will enhance its effectiveness
. Lastly, the police also have the power to obtain customer information orders
. Such orders may be issued by a High Court judge under the same conditions as an account monitoring order
.
Finally, criminal law enforcement authorities in the Isle of Man, including the FIU, may obtain personal data through (voluntary) disclosure by private individuals, business organisations or public authorities.
In terms of disclosures to the FIU, Sections 142 – 144 POCA introduce an obligation to disclose information related to suspected money laundering when a person obtained that information in the course of a business in the so-called regulated sector
. Section 14 ACTA similarly imposes a duty on the regulated sector to disclose information where there are reasonable grounds for knowing or suspecting that another person has committed an offence related to financing of terrorism
. Section 11 of the ACTA requires any other person that believes or suspects, based on information which comes to his or her attention in the course of a business or employment, that another person has committed an offence related to the financing of terrorism, to disclose this suspicion, and the information on which it is based. According to Section 12 ACTA, any person may disclose to the FIU a suspicion or belief that any money or other property is terrorist property (or is derived from terrorist property), as well as any matter on which the suspicion or belief is based. Pursuant to the Financial Intelligence Unit Act 2016 (FIUA), any person may disclose information if the disclosure is made for the purposes of the exercise of any functions of the FIU
. The FIU then has the power to request additional information from certain entities or individuals
, but only when it reasonably considers that, for the proper fulfilment of any of its functions, it is necessary or expedient to seek additional information from the person in question
.
In terms of disclosures to the Isle of Man police, Section 26 ACTA imposes a duty on any person to disclose specific information which he or she knows or believes to be of material assistance in preventing the commission of an act of terrorism, or in securing the apprehension, prosecution or conviction of another person, in the Isle of Man, for an offence involving the commission, preparation or instigation of an act of terrorism. In addition, Section 56 ACTA provides that public authorities may (voluntarily) disclose certain information obtained under other Isle of Man legislation
. In that case, no disclosure of information can be made unless the public authority is satisfied that making the disclosure is proportionate to what is sought to be achieved by it
.
Importantly, any disclosure of personal data on the basis of the abovementioned provisions has to comply with the Applied GDPR and the Implementing Regulations, and the further processing by criminal law enforcement authorities of personal data obtained through such disclosures is subject to the provisions of the Applied LED and the Implementing Regulations.
2.2.2.Further use of the information collected
The further use of data collected by Isle of Man criminal law enforcement authorities on one of the grounds referred to in Section 2.1.1, as well as the sharing of such data with a different authority for purposes other than the ones for which it was originally collected (so-called ‘onward sharing’), is subject to safeguards and limitations.
First, the processing of personal data by law enforcement authorities in the Isle of Man is governed by the provisions of the Applied LED and the Implementing Regulations as described in section 2.1. With respect to onward sharing, Article 4(2) of the Applied LED, like the LED, allows that personal data collected for a law enforcement purpose may be further processed (whether by the original controller or by another controller) for any other law enforcement purpose, provided that the controller is authorised by law to process data for the other purpose and the processing is necessary and proportionate to that purpose. In this case, all the safeguards provided by the Applied LED, the Applied GDPR and the Implementing Regulations (referred to in section 2.1) apply to the processing carried out by the receiving authority.
Second, the different laws that allow for data collection by criminal law enforcement authorities in the Isle of Man impose specific limitations and safeguards as to the use and further dissemination of the information obtained in exercising the powers they grant.
As regards the powers of search and seizure under the PPP Act, the police officer who seizes anything must, if requested by the occupier of premises, provide in reasonable time that person with a record of what he has seized. The police officer must also grant access to or supply a photograph or a copy of the seized or retained item at the request of the person who had custody of the item before it was seized
. Importantly, anything that has been seized by the police may not be retained longer than necessary in the circumstances
.
With respect to the interception of communications, Section 6 of the IOCA sets out the safeguards that need to be applied to intercepted material. Notably, when issuing an interception warrant, the Chief Minister is required to make arrangements to limit the dissemination of the material to the minimum necessary for the purposes authorised by the warrant. In particular, the Chief Minister must limit the extent to which the material is disclosed, the number of persons to whom any of the material is disclosed, the extent to which the material is copied as well as the number of copies made of any of the material
. In addition, the IOCA explicitly provides that the material may not be retained for longer than necessary to fulfil the purpose for which it was obtained
.
In terms of investigative measures carried out in the context of terrorism offenses and money laundering, the ATCA allows the sharing of information with any of the British intelligence services for the purpose of the exercise by that service of any of its functions, but only if such sharing is not in violation of the data protection legislation or prohibited by the IOCA
.
Finally, the Criminal Justice Act 1991 provides the rules on mutual legal assistance in criminal matter
. The Attorney General may provide evidence located on the Isle of Man to a third country’s court or prosecuting authority if there are reasonable grounds to suspect that an offence according to that third country’s law has been committed, and if proceedings or an investigation are ongoing about that offence
. The Attorney General must request a warrant to a Deemster before granting access to the evidence
. For the warrant to be granted, the offense in the third country would need to also be recognised as such under Isle of Man law had it taken place on the Island, and there needs to be reasonable grounds to suspect that the evidence is located on premises on the Island
.
2.2.3.Oversight
Different bodies have oversight over the processing of personal data by criminal law enforcement authorities in the Isle of Man.
First, the Information Commissioner, whose independence is enshrined in law
, oversees the application of the Applied LED and the Implementing Regulations
. The tasks and powers of the Information Commissioner mirror those set out in Article 46 and 47 of the Law Enforcement Directive. To perform those tasks, the Information Commission may issue several types of notices and orders and has the power to bring court proceedings for non-compliance with such notices or orders
. Information notices require a controller or processor to disclose the information the Commissioner needs for the discharge of his or her functions under the data protection legislation
. Assessment notices permit to verify a controller or processor’s compliance with data protection legislation, for instance by allowing on-site investigations and access to any data processing equipment, any document, material or information
. Enforcement orders permit to compel a person to take or refrain from taking certain actions, for example in relation to the data protection principles, data subjects’ rights, or the obligation to notify data breaches
. According to information provided by the Isle of Man authorities, since the entry into force of the Applied LED and the Implementing Regulations, the Information Commissioner has investigated several complaints that concerned the Isle of Man Constabulary. In two cases, minor compliance issues were detected, such as non-compliance with a data subject’s request for access to personal data. Those issues were rectified further to the Commissioner’s advice. The Information Commissioner also regularly engages with law enforcement authorities by providing guidance and advice, notably to the authorities’ data protection officers.
Second, the Interception of Communications Commissioner oversees the application of the IOCA, i.e., the interception of communications for the purposes of national security and of detecting and preventing serious crime
. The functions of the Commissioner are to keep under review the activities of the Chief Minister relating to his functions under the IOCA and the adequacy of the safeguards implemented in connection with interception under the IOCA. The Interception of Communications Commissioner must also assist the Interception of Communications Tribunal (see section 2.2.4) for the purpose of enabling it to carry out its functions under the IOCA
.
Every person holding office under the Crown, a person engaged in the business of the Post Office or a person in the running of a courier service or a public telecommunications system is required to disclose to the Interception of Communication Commissioner all documents or information that the Commissioner may require for the purpose of enabling him to carry out his functions
.
The Interception of Communication Commissioner is required to prepare an annual report to the Governor in Council
. A copy of every annual report must be submitted to the Isle of Man parliament (Tynwald) and made public
.
If it appears to the Interception of Communication Commissioner that there has been a contravention of rules governing the issuance of interception warrants which has not been the subject of a report made by the Tribunal under the IOCA (see section 2.2.4), or that the safeguards that have been put in place in relation to the retention and disclosure of the intercepted material are inadequate, (s)he must report to the Governor in Council
.
Pursuant to the Commissioner’s recent annual reports, interception warrants in the Isle of Man have been issued for the purposes of the detection and prevention of serious crimes. The Commissioner found that the warrants had been issued in respect of the principles of necessity and proportionality and in compliance with procedural requirements, notably the need to consult the Attorney General before the issuing of a warrant. Finally, she found that the safeguards required by Section 6 IOCA had been implemented in a satisfactory manner, while noting in her latest annual report of 2020 that the related policies and procedures had been recently updated by the Cabinet Office in cooperation with the Constabulary, leading to an improvement in the practical aspects of the procedure
.
2.2.4.Redress
As regards the processing of personal data by law enforcement authorities in the Isle of Man, redress mechanisms are available under the data protection legislation, the Human Rights Act 2001 and under the IOCA.
This series of mechanisms provide data subjects with effective administrative and judicial means of redress, enabling them in particular to ensure their rights, including the right to have access to their personal data, or to obtain the rectification or erasure of such data.
First, pursuant to Regulation 122 of the Implementing Regulations, data subjects have the right to lodge a complaint with the Information Commissioner if the data subject considers that, in connection with personal data relating to him or her, there is an infringement of the data protection legislation. The Information Commissioner has the power to assess the compliance of the controller and processor with the Applied LED and the Implementing Regulations and require them to take necessary steps in case of non-compliance
.
Second, the Implementing Regulations provide the right to a remedy against the Information Commissioner if it fails to take appropriate steps
to respond to a complaint made by the data subject. More specifically, the complainant can apply to the Data Protection Tribunal, which can issue an order requiring the Information Commissioner to take any steps specified in the order or to provide the requested information to the data subject
.
Third, data subjects can also invoke violations of the data protection rules by criminal law enforcement authorities directly before the courts
. If, on an application by a data subject, a court is satisfied that there has been an infringement of the data subject's rights under the data protection legislation, the court may order the controller or processor to take or refrain from taking steps specified in the order. Moreover, a person who suffers damage by reason of a contravention of a requirement of the data protection legislation is entitled to compensation for that damage from the competent authority. A controller or processor is not liable if it proves that it is not in any way responsible for the event giving rise to the damage
.
Fourth, as far as any person considers that their rights, including rights to privacy and data protection, have been violated by public authorities, individuals can obtain redress before the courts of the Isle of Man under the Human Rights Act 2001
. If the court finds any act of a public authority to be unlawful, it can grant such relief or remedy, or make such order, within its powers as it considers just and appropriate
. The court can also declare a provision of primary legislation to be incompatible with a right provided by the Human Rights Act
. Finally, after having exhausted national remedies, a person, non-governmental organisation or groups of individuals can obtain redress before the European Court of Human Rights for violations of the rights guaranteed under the European Convention of Human Rights
.
For violations of the IOCA, individuals can obtain redress before the Interception of Communications Tribunal. This redress avenue is described in section 2.2.4 below.
2.3.Access and use by Isle of Man public authorities for national security purposes
In the Isle of Man, access to information transferred under the adequacy decision for purposes of national security takes place in the form of the interception of communications on the basis of the IOCA
. It is the Isle of Man Constabulary that carries out such interception.
2.3.1.Legal bases and applicable limitations/safeguards
The IOCA provides the legal framework for the interception of communications in the course of transmission by post, by means of a courier service or a public telecommunication system. The IOCA introduces a general principle of confidentiality of communications and makes it a criminal offence to intentionally intercept communications
. This is reflected in the fact that interception is lawful only when carried out on the basis of a warrant
. An interception warrant is issued by the Chief Minister and requires the person to whom it is addressed to intercept the communications described in the warrant or to disclose the intercepted material to such persons and in such manner as are described in the warrant
. An interception warrant can only be issued if the Chief Minister considers that the information sought to be obtained could not reasonably be acquired by other, less intrusive means
. Before issuing or renewing a warrant the Chief Minister is required to consult the Attorney General, i.e., obtain legal advice from the Government’s principal legal adviser on whether the conditions for issuing a warrant are fulfilled. A register of warrants must be maintained, including details of every warrant, and of every amendment, renewal and cancellation thereof, and details of every consultation of the Attorney General
.
In accordance with Section 3 IOCA, the warrant must require the interception of communications in relation to one particular person named or described in the warrant or in relation to a single set of premises named or described in the warrant. The warrant must also describe the communications for which interception is required by references to addresses, numbers, apparatus or other factors to be used for identifying those communications
.
Unless it is renewed, a warrant ceases to have effect two months after its issuance. The Chief Minister may, at any time before the end of the relevant period, renew the warrant if he considers that the warrant continues to be necessary (on the same grounds for which it was issued)
. If the Chief Minister considers that any factor specified in a warrant is no longer relevant for identifying the communications authorised to intercept, he must amend the warrant by deleting that factor
.
2.3.2.Further use of the information collected
The further use of personal data obtained in the interests of national security is governed by the provisions of the Applied GDPR and the Implementing Regulations as described in sections 2.1 and 1
. In particular, pursuant to Articles 5(1)(a) and (b) of the Applied GDPR, such processing must be lawful, and data must not be processed in a manner that is incompatible with the purpose for which it was collected. The controller can process the data for another purpose, different from that for which the data was collected, when it is compatible with the original one and provided that the controller is authorised by law to process the data.
In addition, the IOCA sets out specific safeguards for the further use and sharing of data obtained through the interception of communications, including for the sharing of such data with third countries. Section 6 IOCA specifies that the Chief Minister has the duty to make arrangements to limit the dissemination of the material obtained to the minimum necessary for the purposes authorised by the warrant. In particular, the Chief Minister must limit the extent to which the material is disclosed, the number of persons to whom any of the material is disclosed, the extent to which the material is copied as well as the number of copies made of any of the material
. In addition, the IOCA explicitly provides that the material may not be retained for longer than necessary to fulfil the purpose for which it was obtained
.
2.3.3.Oversight
Government access for national security purposes in the Isle of Man is overseen by different bodies. The Information Commissioner oversees the processing of personal data in light of the Applied GDPR and the Implementing Regulations, while specific oversight on the use of the interception powers under the IOCA is provided by the Interception of Communications Commissioner, which oversees interception both for law enforcement and for national security purposes.
The processing of personal data carried out for national security purposes is governed by the Applied GDPR and the Implementing Regulations. The general functions and powers of the Information Commissioner are laid down in Articles 57 and 58 of the Applied GDPR. The tasks include, but are not limited to, monitoring and enforcement, promoting public awareness, advising Tynwald, the government and other institutions on legislative and administrative measures, promote the awareness of controllers and processors of their obligations, provide information to a data subject concerning the exercise of the data subject’s rights, handle complaints, conduct investigations etc. The Commissioner has the powers to notify controllers of an alleged infringement and to issue warnings that a processing is likely to infringe the rules, issue reprimands, ban processing or order the controller to take certain actions. While Regulation 22 of the Implementing Regulations provides an exception to certain tasks and powers of the Commissioner if this is required for the purposes of safeguarding national security, these exceptions apply only if necessary and proportionate and on a case-by-case basis (as explained in section 2.1).
Furthermore, as described in section 2.1.3 above, the Interception of Communications Commissioner oversees the application of the IOCA, i.e., the interception of communications for the purposes of national security and for detecting and preventing serious crime
. (S)he reviews the activities of the Chief Minister relating to his functions under the IOCA and the adequacy of the safeguards implemented in connection with interception under the IOCA and assists the Interceptions of Communications Tribunal (see section 2.2.4)
. The Commissioner prepares an annual report to the Governor in Council
, a copy of which must be submitted to the Isle of Man parliament and made public
. If it appears to the Commissioner that there has been a contravention of rules governing the issuance of interception warrants or that safeguards that have been put in place in relation to the retention and disclosure of the intercepted material are inadequate, (s)he must report to the Governor in Council
.
Pursuant to the Commissioner’s recent annual reports, no interception warrants since 2016 have been issued in the interest of national security
.
2.3.4.Redress
Individuals can obtain redress for violations of the IOCA before the Interception of Communications Tribunal.
Any person, including any individual in the EU, who believes
that communications sent to or by him have been intercepted, can apply to the Interception of Communications Tribunal for an investigation. The Tribunal has been established in accordance with Section 8 IOCA and it is independent from the executive
. When receiving an application, the Interception of Communications Tribunal must investigate whether there is or has been a relevant
warrant or certificate, and where this is the case, whether there has been any violation of the rules under the IOCA in relation to that warrant or certificate. The Tribunal may only reject applications that appear to be frivolous or vexatious.
If the Interception of Communications Tribunal concludes that there has been a violation of the rules of the IOCA, it must notify the applicant about its conclusions, report its findings to the Governor in Council and, if appropriate, make an order to (1) quash the relevant warrant or the relevant certificate; (2) delete copies of the intercepted material; (3) direct the Treasury to pay to the applicant a compensation
. The Interception of Communications Tribunal must also notify the applicant in case it comes to the conclusion that there has been no contravention of the rules of the IOCA. According to Section 8(8) IOCA the decision of the Tribunal is not subject to appeal.
Finally, as also described in section 2.1.4 above, as far as individuals consider that their rights, including rights to privacy and data protection, have been violated by public authorities, they can obtain redress before the courts of the Isle of Man under the Human Rights Act 2001. In addition, any individual may obtain judicial redress before the European Court of Human Rights against the unlawful collection of his/her data for national security purposes, provided that all available domestic remedies have been exhausted.
VII. STATE OF ISRAEL
1.RULES APPLYING TO THE PROCESSING OF PERSONAL DATA
1.1.Relevant developments in the data protection framework of Israel
On 31 January 2011 the European Commission adopted a decision in which the State of Israel, as defined in accordance with international law, was considered as providing an adequate level of protection for personal data
. The Article 29 Working Party had provided its opinion on the level of protection for personal data in Israel on 1 November 2009. At the time, the legal framework for the protection of personal data in Israel was set out in the Privacy Protection Law 5741 - 1981 (PPL) and Regulations. The PPL was first passed in 1981 and applies to both the public and the private sector.
Since the adoption of the Commission’s adequacy decision, Israel’s framework for the protection of privacy and personal data has been significantly strengthened through a number of developments at legislative, regulatory and enforcement level. In particular, as described in more detail below, Israel adopted Privacy Protection (Data Security) Regulations, 5777-2017 (Data Security Regulations) which apply to the public and to the private sector and are aimed at improving the level of data security across all sectors by setting general legally binding standards
. In addition, Israel introduced specific safeguards to reinforce the protection of personal data transferred from the European Economic Area by adopting Privacy Protection Regulations (Instructions for Data that was Transferred to Israel from the European Economic Area), 5783-2023 (Privacy Protection Regulations). Moreover, Israeli Courts have clarified and further reinforced the existing framework in several judgments that interpret the right to privacy set out in the Basic Law and the provisions of the PPL. Finally, Israel’s Privacy Protection Authority (PPA) has clarified important elements of the data protection system in Israel through the adoption of guidelines, opinions and directives, for instance on the interpretation of the term ‘data’ and on the right of access.
While the developments in terms of guidance, interpretation and case law that are described in more detail below contribute to an increased level of data protection in Israel, codifying these developments in legislation would be important to enhance legal certainty and solidify the protection for personal data. The ongoing debate on a draft bill that would amend the PPL
seems to offer such an opportunity.
More specifically, since the adoption of the adequacy decision, the PPL’s scope of application has been further clarified in various judgments, government resolutions and opinions of the PPA.
In the Israeli system, personal data is protected in accordance with Chapters A and B of the PPL. Chapter A protects the right to privacy more generally, while Chapter B specifically regulates the protection of data in databases.
Chapter A of the PPL prohibits certain infringements of privacy by reference to categories such as “information on a person’s private affairs”
, as well as “a matter that relates to a persons’ intimate life”
and “other data obtained in a way which infringes privacy under the provisions of the Article”
. Since the adoption of the adequacy decision, the categories used in Chapter A of the PPL have been further clarified by Israeli courts. For example, courts have confirmed that data such as residential address and telephone number also constitute “information of a person's private affairs” and are protected under the law. Moreover, a person’s bank account number, credit card number, personal calls log, and a person's application to the authorities for filing a complaint were considered as information on a person’s private affairs.
In Chapter B, the notion of ‘database’ is defined as “a collection of data, kept by magnetic or optic means, and intended for computer processing”, which has been interpreted broadly to apply to any type of data stored digitally. Article 7 PPL defines the term ‘data’ as data on personality, personal status, intimate affairs, state of health, economic state, vocational qualifications, opinions, and beliefs of a person. To ensure more comprehensive protection, Article 7 PPL has been interpreted broadly by Israeli courts to apply to almost any kind of data. For example, the case law rejected the claim that foreclosure orders are not ‘data’ as defined in the PPL and held that, in the digital age which enables enhanced searches and processing of data and cross-referencing, the definition of private data must be interpreted more broadly
. In another ruling, the Supreme Court rejected the claim that national identity numbers do not constitute ‘private data’ as defined by the PPL and found that a national identity number is not just a “sequence of numbers”, but rather an identifier that, in combination with additional data, can be used to conclude more personal data such that “the person and the ID number becomes identical”.
Such broad approach has also been adopted in two resolutions adopted by and binding on the Israeli government, reflecting its understanding of the term ‘data.’ One of them concerns the right to public access to documents in government databases
. It exempts personal ‘identifiable data’ from the government’s obligation to grant access, and personal ‘identifiable data’ is defined broadly to include un-identified data that can be potentially identifiable if combined with additional data. The second resolution concerns the promotion of “Digital Health” and requires certain safeguards to be provided in future legislation in this field
. Some of these safeguards are tailored depending on the level of identifiability of the data concerned.
Finally, such broad interpretation has also been reflected in Directives and Opinions issued by the PPA. According to PPA Directive No. 4/2012, the provisions of Chapter B of the PPL apply to identified or identifiable data about a person. In the context of security and surveillance cameras, the PPA’s interpretation , in line with Directive No. 4/2012, is that the use of such cameras in the public domain and the storage of the footage captured by these cameras constitute a database, even if the identity of the people appearing in the footage is unknown to the camera owner, in light of the possibility to cross-reference data from different databases, such as the camera owner's client database. In an opinion issued in December 2022, the PPA quoted the opinion of Israel’s Attorney General filed in the Greenberg case, in which it was asserted that the provisions of the Privacy Protection Law apply to data “as long as it is possible by reasonable means to identify the data subject”. The Attorney General further stated that “data should be treated as identifiable data about a person, as long as it is possible, with reasonable effort, to identify the data subject (the client). In this context, one should take into account the possibility of re-identifying the data subjects, even when the data is supposed to be anonymous”. In addition, the PPA’s opinion of December 2022 quoted the Israeli Supreme Court in the Gottesmann case, where it ruled that “[e]ven information that is shown anonymously might establish a connection with a specific person. […] it is therefore not necessary for a person's name or picture to appear alongside the publication; it suffices for it to be possible by some means to connect the information with a specific person by “reverse engineering”. This is thus an approach which is similar to the one to be carried out under Regulation (EU) 2016/679 (GDPR).
In addition, since the adoption of the adequacy decision, several of the data protection principles provided by the PPL have been further clarified through case law, guidance of the PPA, or the adoption of regulations.
As regards the principle of lawfulness, the Israeli data protection regime requires that the collection and processing of personal data is made on the basis of the data subject’s consent or based on an authorisation by law
. Importantly, the conditions for obtaining an individual’s consent have been further developed in case law of the Israeli courts, aligning them more closely with the conditions required by EU law. In Isakov Inbar v. The State of Israel, the Commissioner for Women Labor Law
, the court clarified that the monitoring of an employee’s email account requires the employee’s explicit, specific, informed and freely given consent to the infringement of privacy. With respect to a purely private email account, the court held that in view of the inherent power asymmetry in the employer-employee relationship, it had to be presumed that any consent to the monitoring of such an account had not been given freely, so that such monitoring activities could not be based on consent alone, but could take place only pursuant to a court order. The case law further specified the concept of freely given consent, stressing that consent would not be freely given in case of any coercion, whether direct or indirect, such as the sanctioning of an employee
. It also set out the requirements for appropriately informing an individual, notably that the information to the individual would have to be clear and include all relevant details, such as the nature of the data collected, the applicable retention period, where the data would be stored and who would have access to it, how it would be secured etc.
The purpose limitation principle is recognised both in Chapter A and in Chapter B of the PPL. In Chapter A, Section 2(9) PPL sets out that the “use or passing of information on a person’s private affairs for a purpose other than which was provided” in the absence of the individual’s consent constitutes an infringement of privacy, as well as a felony under Section 5 PPL and a civil wrong under Section 4 PPL. As mentioned above, the term ‘a person’s private affairs’ has been interpreted broadly by Israeli courts
, thus ensuring a wide scope of application for the purpose limitation principle. In Chapter B PPL, Section 8(b) PPL stipulates that “no person shall use the data in a database which must be registered under this Section, except for the purposes for which the database was established”. The purpose limitation principle has been upheld also by Israeli courts, for example in the IDI case
, in which it was ruled that data obtained by a company in connection with a foreclosure could not be used for the purpose of assessing the individual’s eligibility for car insurance, as such use violated the purpose limitation provisions of the PPL.
The principle of data security and confidentiality is reflected in Articles 16, 17, 17A and 17B of the PPL. Article 7 PPL defines ‘data security’ as the “protection of the integrity of data, or protection of the data from exposure, use or copying, all when done without due permission”. Article 16 PPL protects the confidentiality of data by setting out that data may not be disclosed by an employee, manager or possessor of a database except in certain specific circumstances, such as for performing his work or pursuant to a court order. Article 17 specifies that a database owner, the possessor of a database and the manager of a database are each responsible for the security of a database. Article 17A provides for access restrictions in order to prevent unauthorised access to databases, and Article 17B obliges specific bodies to appoint a Security Officer, who is also personally responsible for the security of the database. Moreover, since the adoption of the adequacy decision, the Data Security Regulations have established mechanisms aimed at strengthening data security in both the private and public sectors by making it part of the management routines of all organizations processing personal data, and more specifically, by creating awareness, accountability and working procedures. In particular, the Data Security Regulations classify databases into different categories according to the level of risk created by the processing activity. This level of risk is defined by the data sensitivity, the number of data subjects and the number of authorised access holders. The duties of the database owners are determined in accordance with the level of risk. Among others, the Data Security Regulations contain obligations concerning the mapping of data processing activities, data security protocol, “data security risk evaluation”, physical security measures and access controls, as well as an obligation to notify severe “data incidents” to the PPA, and to the data subjects if so instructed by the PPA.
In addition, several data protection principles that were previously recognised only implicitly in the PPL have been codified in the Privacy Protection Regulations and/or the Data Security Regulations and have thus been significantly strengthened after the adoption of the adequacy decision.
While the principle of data quality/data accuracy was previously not set out as an independent principle, but recognised implicitly in the context of the right to rectification provided in Article 14 PPL, for data that has been transferred to Israel from the EU, Regulation 5 of the Privacy Protection Regulations now explicitly requires the database controller to have in place an organizational, technological or other mechanism, the purpose of which is to ensure that the data in the database is correct, complete, clear and updated. If the database controller finds, on the basis of, inter alia, the abovementioned mechanism, that the database contains data that is not correct, complete, clear or updated, he is required to take reasonable measures in the circumstances of the case for the purpose of rectifying or deleting the data.
Also the principle of limited data retention has been reinforced through the adoption of the Privacy Protection and the Data Security Regulations. For data that has been transferred to Israel from the EEA, Regulation 4 of the Privacy Protection Regulations requires the database controller to have in place an organizational, technological or other mechanism, the purpose of which is to ensure that the database does not include data that is no longer necessary for the purpose for which it was collected or retained, or for any other purpose for which it may be retained in accordance with any law (referred to as data that is not necessary). If the database controller finds, on the basis of, inter alia, the abovementioned mechanism, that data that is not necessary is kept in the database, he is required to delete the said data at the earliest opportunity in the circumstances of the case. In addition, Regulation 2(c) of the Data Security Regulations provides that database owners must annually examine if the data stored in their databases is excessive for the purpose of each database.
Finally, the principle of transparency was so far only reflected in the PPL through the right to information. Article 11 PPL provides that if data is collected from a person for use in a database, this person needs to be informed about whether (s)he is under a legal obligation to provide the data or whether the provision of data depends on his or her volition and consent, about the purpose of the collection and the recipient of the data, as well as the purpose of any further sharing of the data. To enhance transparency for data subjects in the EU whose personal data is transferred to Israel, Regulation 6 of the Privacy Protection Regulations now imposes additional transparency requirements. A database controller in Israel who received data about a person is required to provide the said person, whether directly or indirectly through the entity that provided the data from the EU, with information about the identity of the database controller and the database manager, their addresses and contact information, the purpose of the data transfer, the type of the data that was transferred, and the data subject rights that are available in the Israeli framework. The information must be provided as soon as possible after receiving the data and no later than one month as of the date of receiving the data. In this way, the Privacy Protection Regulations ensure that individuals in the EU continue to be informed of the specific controllers processing their information and are able to exercise their rights vis-à-vis the relevant entities.
In addition to the strengthening of data protection principles, the protections for special categories of personal data in Israel have been reinforced since the adoption of the adequacy decision. The PPL already offered stronger protections for data on the personality, intimate affairs, state of health, economic state, opinions, and beliefs. In addition, in the Kalanswa case, the court ruled that biometric fingerprints taken in the workplace constitute sensitive personal data and confirmed also more generally that biometric data would normally be considered sensitive data
. Moreover, the Israeli Genetic Data Law, 5761-2000 (Genetic Data Law) recognises the sensitivity of genetic data and sets out additional safeguards for their processing. For instance, consent to the processing of genetic data must be given in writing and there are specific rules for the storage of genetic data. The above is also reflected in the Data Security Regulations, which refer to biometric and genetic data as data with special sensitivity that require at least the medium level of protection. Finally, for data that has been transferred to Israel from the EU, Regulation 7 of the Privacy Protection Regulations extends the protections for sensitive data also to data regarding a person’s ethnic origin and to data regarding trade union membership, so that all data considered sensitive under EU law now benefit from additional protections also under the Israeli framework.
Since the adoption of the adequacy decision, also the data protection rights of individuals have been strengthened in several ways.
The right of access is guaranteed in Article 13(a) PPL, which sets out that “every person is entitled to review, in person, or through a representative authorised by him in writing, or through his legal guardian, any data regarding such person which is kept in a database.” The PPA has further clarified this right in a guideline issued in 2017
. This guideline notably specifies that the right of access should be granted with respect to data in any format or file type, including video, text messaging or voice recordings. The guideline also confirms that data subjects benefit from the right of access with respect to data stored by their service provider. Finally, the guideline clarifies that under the right of access, data subjects should have the right to receive data in a digital format that may be read, heard or viewed by publicly available software, via email, secure website or any other digital means. In the past, the Israeli Supreme Court had already aligned the scope of the right of access in Israel with the scope of this right in the EU legal framework, interpreting the right of access as including the right of the data subject to receive a copy of the data
.
The right to rectification is provided for by Article 14 PPL, according to which a person who reviewed data about himself and found it to be incorrect, incomplete, unclear, or not up to date, may request the database owner to correct or delete the data. Pursuant to Article 14(c) PPL, the database owner may refuse to comply with such request for rectification, but the PPA’s Directive No. 2/2012 clarifies that in view of the explicit language of Articles 13, 14 and 31A(4) PPL, a refusal to grant the right to rectification under this Directive with no grounds provided or not made in good faith will be considered by the PPA as a violation of that right. Moreover, pursuant to Article 15 PPL, an individual can appeal before a Court the refusal to grant the right to rectification
. Finally, for data that has been transferred to Israel from the EU, the Privacy Protection Regulations require the database controller to have in place an organizational, technological or other mechanism to ensure that the data in the database is correct, complete, clear and updated, and to take reasonable measures for the purpose of rectifying or deleting the data if the database controller finds that the database contains data that is not correct, complete, clear or updated.
The right to deletion of personal data in the Israeli system was so far only available under Article 14 PPL, i.e., in cases where data is found to be incorrect, incomplete, unclear or not up to date. In addition, data subjects could obtain the deletion of their data by filing a complaint with the PPA or by bringing a case before court. With the adoption of the Privacy Protection Regulations, the right to deletion has been significantly strengthened for data that has been transferred to Israel from the EU. Regulation 3(a) of the Privacy Protection Regulations explicitly requires the database controller to delete data on request of the data subject if the data was created, obtained, accrued or collected in contravention of the provisions of any law, if the further use of the data is in violation of the law, or if the data is no longer necessary for the purposes for which it was created, obtained, accrued or collected. Pursuant to Regulation 3(b) of the Privacy Protection Regulations, a request to delete data may only be refused in certain limited and specific situations and subject to the requirements of necessity and proportionality.
With respect to the transfer of personal data abroad, certain requirements in the Privacy Protection (Transfer of Databases Abroad) Regulations (Transfer Regulations) have been further interpreted and clarified by the PPA. In addition, the Data Security Regulations have established additional accountability obligations for controllers with respect to international transfers.
As regards Article 3 of the Transfer Regulations, which sets out the safeguards that need to be ensured for data that is transferred abroad, the PPA has clarified in a legal opinion that the scope and content of the guarantee required by that Article can include different but sufficient assurances to ensure the privacy of the data subjects, taking into account the scope of the data, its sensitivity and other relevant circumstances, even if these assurances are not completely identical to the Israeli privacy and data protection legislation.
In addition, in an effort to align the Israeli transfer regime more closely with the respective rules at EU and international level, the PPA clarified that Article 3 should not be understood as prohibiting the onward transfer of data that has been received from Israel, provided that (1) the owner of the database in Israel from which the data was originally transferred had given written consent to the onward transfer to a third party, (2) that the onward transfer itself was done lawfully, i.e., based on consent of the data subjects or authorised by law; and (3) if the data were transferred to the third party directly from Israel, the transfer would comply with the conditions set out in Article 1 or Article 2 of the Transfer Regulations so that some continuity of protection is ensured.
As regards accountability requirements, the Data Security Regulations compel the data controller to define in the “database definitions document” (which describes key aspects of the database and the processing activities carried out) also the details of a possible transfer abroad. In particular, the database definitions document needs to specify “details of transferring the database or material parts thereof outside the State borders or using the data outside the State borders, the purpose of transfer, destination country, manner of transfer and identity of the transferee”.
1.2.Oversight, enforcement and redress
Oversight and enforcement of the PPL is ensured by the PPA. While being part of the administrative structure of the Israeli Ministry of Justice, the PPA carries out its functions independently. Since the adoption of the adequacy decision, this independence has been strengthened.
More specifically, as formally clarified by a Resolution adopted by the Israeli government in October 2022 and its accompanying Explanatory Notes, the PPA is “independent in exercising the powers vested in the Head of the Authority for performing its duties”, which notably means that it “is not subordinate to the ministerial level or to intervention from outside the Authority.” Moreover, the Government Resolution clarifies that within the Ministry of Justice’s budget, the PPA’s operational budget must be managed separately.
In addition to its independence, also the PPA’s role and powers have been reinforced since the adoption of the adequacy decision. First, the PPA has been equipped with additional powers under the Data Security Regulations. Pursuant to Article 11(d) of the Data Security Regulations, in cases of severe security events the database owner is required to immediately notify the PPA and report on the measures taken following the event. The PPA is entitled to order a database owner to notify the security event to any data subject who may be harmed by the event. Moreover, in specific circumstances the PPA may impose additional requirements on a database in order to strengthen its security or may exempt certain databases from specific provisions. Second, to reflect its increasing role and its wide-ranging tasks, the PPA’s budget and number of staff members have increased significantly. Third, Israeli courts have clarified the PPA's powers to issue guidelines and enforce them, stressing that these powers are to be construed broadly and are not limited to what is set forth explicitly in the law. According to the courts, the PPA is entitled to exercise its discretion in an individual case or according to a general policy determined in accordance with the professional interpretation of the PPL. Thus, it is within the authority of the PPA to issue guidelines and corrective orders to database controllers, processors and managers, reflecting the PPA's interpretation to the provisions of the law.
As regards possibilities for individuals to obtain redress, the Israeli system continues to offer various avenues. A person claiming data about him or her was used contrary to the PPL may lodge a complaint with the PPA and may apply directly to court if a request for access or rectification is refused. Moreover, a person claiming data about him was used contrary to the provisions under the PPL, can apply to the court with a civil tort lawsuit when the defendants are civil entities. When the defendant is a government agency, the individual may file an administrative petition, either to the Supreme Court or to the Administrative Court.. Where a violation of the PPL constitutes a criminal offence, individuals can also submit a criminal complaint or a private criminal indictment against another individual pursuant to Article 68 of the Israeli Criminal Procedure Law (combined version) 5742-1982. In the Israeli system, individuals can also obtain damages for violations of the PPL. Finally, in addition to any other penalty and relief, the court may, in a criminal or civil trial for infringement of any provision of the PPL, issue an order, for instance on the destruction of the information that was illegally received or on the prohibition of the use of such information.
The PPA plays a very active role in the interpretation and enforcement of data protection law, both when it comes to its engagement with stakeholders and when exercising its oversight role. Its activities include the issuing of opinions and guidelines, enforcement actions and the promotion of legislation. Since the adoption of the adequacy decision, the PPA issued numerous guidelines, position papers and legal opinions. Among other, it published guidelines on the Data Security Regulations, on the right to access, on the use of surveillance cameras in the public domain, on workplace surveillance, on the use of outsourcing services for data processing, on privacy protection during recruitment procedures and on the use of voter registers during elections. Most recently, in 2022, the PPA updated its policy regarding the receipt of reports on data security incidents, requiring serious incidents to be reported immediately. In addition, it recommended that organizations and companies in all sectors of the economy that process personal data should appoint privacy protection officers.
Since the adoption of the adequacy decision, the PPA has also stepped up its enforcement activities. In terms of investigations, the PPA carried out a number of audits (resulting in specific corrective orders) in sectors that had been identified for a high risk of invasion of privacy (for instance retail companies, insurance funds, as well as the health sector). Its annual reports for instance show that the PPA conducted 244 audits across seven sectors in 2020, 224 audits across four sectors in 2021 and 400 audits across seven sectors in 2022. For example, the PPA investigated the trading of sensitive health data of patients by health care service providers, and investigated a breach of the Population Registry Database. In recent years, the PPA imposed administrative fines on various controllers and processors. In addition, the PPA carried out important criminal investigations that were followed by criminal proceedings, resulting in significant fines as well as imprisonment for certain individuals involved. In particular, the PPA opened six criminal investigations in 2020 and eight in 2022. For instance, following a joint criminal investigation by the Israel Police and the PPA, the mayor of a medium-sized Israeli city was, among other, charged under Article 5 PPL for the use of personal data from municipal databases for political purposes
. Each year, the PPA handles a high number of security breach reports, as well as a significant number of public inquiries (e.g., 1470 public inquiries in 2020, 1670 in 2021 and 1935 in 2022).
Finally, the PPA carries out various outreach activities, including by sending a periodic newsletter to a large number of subscribers, by regularly organising information sessions and events and by managing a forum for privacy awareness and training for the private and government sectors
2.ACCESS TO AND USE OF PERSONAL DATA TRANSFERRED FROM THE EUROPEAN UNION BY PUBLIC AUTHORITIES IN ISRAEL
2.1.General legal framework
The limitations and safeguards that apply to the collection and subsequent use of personal data by Israeli public authorities for purposes of criminal law enforcement and national security follow from Israel’s overarching constitutional framework, the rules that apply to the processing of personal data, as well as specific laws regulating access to data.
Access to and processing of personal information by Israeli public authorities is first of all governed by general principles that follow from the constitutional framework, i.e., Basic Law: Human Dignity and Liberty adopted in 1992
. In particular, Article 7 of the Basic Law provides that all persons have the right to privacy and to intimacy, that there shall be no entry into the private premises of a person who has not consented thereto, that no search shall be conducted on the private premises of a person, nor in the body or personal effects, and that there shall be no violation of the confidentiality of conversation, or of the writings or records of a person
. This article has been interpreted by Israel’s Supreme Court as providing a comprehensive protection of the right to privacy for any individual and as including the right to the protection of personal data
. Moreover, case law has confirmed the particular importance of the protection of the right to privacy in the Israeli legal order, as an essential precondition for a democratic regime
.
While the right to privacy is not absolute, any interference with this right by a public authority must be provided for in law or on the basis of a law through an explicit authorisation therein. A law providing for a lawful interference with the rights laid down in the Basic Law must be consistent with the values of the State of Israel, pursue an appropriate purpose and fulfil the principle of proportionality
. As regards the principle of proportionality, the Supreme Court has clarified that any limitation of a right (such as through e.g., the processing, including the collection, of personal data by public authorities) must meet three cumulative elements. First, it must be suitable for the appropriate purpose that it is intended to achieve. Second, it must be the least harmful/intrusive measure to achieve that purpose (i.e., a limitation may not be imposed if the purpose can be achieved by another, less harmful measure). Third, there must be a proper balance between the benefits that would be achieved by the limitation and the harm that would be caused to the individual
.
In addition, the processing of personal information by Israeli public authorities (including criminal law enforcement authorities and national security authorities) is subject to the PPL and the Regulations adopted on the basis of the PPL
. The PPL and the Regulations adopted on its basis, as interpreted by the PPA and case law of Israeli courts, reflect the principles of lawfulness
, purpose limitation
, accuracy
, transparency
, storage limitation
and security
, and provide individuals with the right of access to their personal information
, the right to correction
and the right to deletion
. Finally, the Transfer Regulations contain specific provisions on international transfers of personal data
. In addition to the PPL, criminal law enforcement and national security authorities are also subject to specific laws and regulations, which provide for limitations and safeguards concerning the collection and use of personal data reflecting the general principles following from the Basic Law: Human Dignity and Liberty, as further described below.
These general limitations and safeguards can be invoked by individuals before the PPA and courts to obtain redress (see sections 2.2.4 and 2.3.4).
In addition, the Attorney General has issued a binding legal opinion further clarifying the application of the constitutional principles of lawfulness, necessity and proportionality to the processing of personal data by public bodies in Israel
. The opinion confirms that any public authority in Israel, including law enforcement and national security authorities, may only take a measure that interferes with the right to privacy of individuals if such measure is provided for or authorised by law, pursues an appropriate purpose (i.e., a purpose that is legitimate and in accordance with legal authority laid down in law), is suitable to achieve that purpose, constitutes the least intrusive measure (compared to other available measures) and is proportionate (which requires balancing the benefits that would be achieved by the measure against the harm that would be caused to the individual)
.
2.2.Access and use by Israeli public authorities for criminal law enforcement purposes
The Israel Police is the main law enforcement authority in Israel. Its functions and mandate are defined in the Police Order [New Version], 5731 – 1971, whereas the rules regulating the collection and processing of personal data by the Israel Police are enshrined in laws implementing the Police’s general mandate and duties. Israeli law imposes a number of safeguards and limitations on how the Police has access to and uses personal data for criminal law enforcement purposes, and it also provides oversight and redress mechanisms in this area. The conditions under which access to personal data can take place and the safeguards applicable to the use of these powers are assessed in the following sections.
2.2.1.Legal bases and applicable limitations/safeguards
Personal data transferred under the adequacy decision and processed by organisations in Israel may be obtained by Israeli criminal law enforcement authorities mainly by means of investigative measures under the Criminal Procedure Ordinance (Arrest and Search) [New Version], 5729–1969 (Criminal Procedure Ordinance), the Criminal Procedure Law (Enforcement Powers – Communication Data), 5768 – 2007 (Communication Data Law), and the Wiretapping Law, 5739-1979. When collecting information on the basis of these laws, criminal law enforcement authorities also have to comply with the Constitutional requirements of necessity and proportionality, as developed in case law and reflected in the AG opinion (see also section 3.2.1.).
The Criminal Procedure Ordinance provides the Israel police with a legal basis for accessing personal data held by commercial operators through searches and seizures. It lays down detailed rules on the scope and application of these measures, aimed at ensuring that the interference with the rights of individuals will be limited to what is necessary for a specific criminal investigation and proportionate to the pursued purpose. Searches may only take place on the basis of a court-issued search warrant
and the issuing of such warrant is subject to specific procedural and substantive requirements.
More specifically, a judge may issue a search warrant only if (1) the search is necessary in order to assure presentation of an object for purposes of any investigation, trial or other proceeding; (2) the judge has reason to believe that the place is used for the storage or sale of a stolen object (or that it contains an object with which or in respect of which an offense was committed, or which was used or is intended to be used for an illegal purpose); or (3) the judge has reason to believe that that an offense was committed or is intended to be committed against a person in that place
. Moreover, access to computer data, irrespective of the kind of hardware on which it is stored (e.g., including smartphones etc.) is permitted only subject to a Court order which “details the objectives of the search and its conditions, that will be determined in a manner that will not harm the privacy of a person in an excessive manner.”
Any search, including the search of computers, must be carried out in the presence of two witnesses that are not policemen
and the occupant of the house or place or the person whose computer material is being searched is entitled to be present during the search. On the basis of a search warrant, a policeman may seize any object described in the search warrant
, or any other object if he has reasonable grounds to assume that an offense was or is about to be committed with it or that it is likely to serve as evidence in a judicial proceeding for an offense
. A list of objects seized is to be drawn up by the person who conducts the search and the occupant of the house or place or the person whose computer material is being searched shall be given a copy of the list of the objects seized
.
The Communication Data Law allows the Israel Police and other investigating authorities
to obtain communication data, i.e., metadata
, from telecommunications companies. Such data may be collected from telecommunication providers on the basis of a detailed request
by an investigating authority approved by the Magistrates Court
, and only for the purposes of saving or protecting the life of a person, investigating or preventing offences of the felony or misdemeanour class
, determining the identity of offenders and bringing legal action against them, as well as for the purpose of confiscation of assets according to law (for instance in order to gather evidence of the beneficial ownership of an asset)
. The Court may only grant access to such data by means of an order if the conditions provided in the law are met, i.e., on condition that granting the authority access to the data does not harm the privacy of the data subject in an excessive manner, and that the collection of data is carried out only for one of the purposes specified in the law
. When deciding on the application, the Court will consider, among others, the need to achieve the purposes specified in the law, the type of communication data sought, the extent of the infringement of privacy, and the severity of the offense. In the order, the Court sets out a timeframe during which communication data may be obtained, which cannot exceed 30 days from the date when the order is issued
.
In a situation where data is urgently needed, so that there is no time to submit an application to the Court pursuant to the above-described procedure, for the purpose of preventing a felony class offense or discovering its perpetrator, or for saving human life, a member of the Israel Police or Military Police may request access to communication data for a period of maximum 24 hours without a Court order
. In this case, the request for this special permit is submitted to the relevant authorised officer
. The authorised officer will grant such permit only upon condition that there is an urgent need to obtain communication data for the abovementioned purposes, and that there is no time to obtain a Court order. After having issued such a permit, the authorised officer is required to report in writing to a higher-ranking member of their respective police corps the reasons for issuing the permit
.
Importantly, all the above-mentioned provisions for the collection and use of communication data have been examined and further clarified by the Israeli Supreme Court in the case of The Association for Civil Rights in Israel
, where the Supreme Court assessed the constitutionality of some of the provisions of the Communication Data Law. It held that, in order to ensure the correct balance between the purpose of the law and the protection of the right to privacy, the legal arrangements for accessing personal data provided by the law would need to be interpreted narrowly and applied in a proportionate manner. In particular, the law should be interpreted as allowing the authorities to access data solely for the purpose of investigating or preventing specific offenses or offenders, and not for general intelligence activity purposes relating to offenses or offenders.
The Israel Police may also access personal data transferred from the EU on the basis of the Wiretapping Law. Wiretapping is defined as listening to a conversation without the consent of any of the parties, whereas “conversation” is defined to include oral conversations, but also conversations by means of telecommunication, including (inter alia) between computers
. The Wiretapping Law thus regulates the collection of the content of communications. Wiretapping is prohibited and subject to imprisonment, except if explicitly authorised by law
. The collection of the content of communications or the use of such information in violation of the Wiretapping Law is also subject to imprisonment. Communications that are intercepted in violation of the Wiretapping Law are inadmissible as evidence in judicial proceedings, except in limited circumstances, e.g., if the proceedings concern a violation of the Wiretapping Law subject to criminal sanctions
.
In the area of criminal law enforcement, the Wiretapping Law allows, in relation to offences of the felony class (i.e., offenses that are punishable by a prison term of more than three years), wiretapping for the purposes of detecting, preventing or investigating offences, of identifying or capturing offenders, and for the investigation of a forfeiture of property related to an offence
. In these cases, wiretapping has to be authorised in an order by the Chief Justice of a District Court or a Deputy Chief Justice of a District Court authorised by the Chief Justice for this purpose. The order can be issued only following a request by an authorised police officer and only if the Judge is convinced, after having considered the extent of the violation of privacy, that such measure is required to achieve the purposes listed in the Law
.
If known in advance, the order needs to describe the identity of the person for whose conversation wiretap was approved, or the identity of the line or facility used or intended for use for reception, transfer or transmission of telecommunications and for which wiretap was approved, as well as the location or type of conversation. Moreover, the order needs to detail the manners of wiretapping that are permitted
. The validity of the order is limited to three months, but it may be renewed subject to the same conditions as the initial order
.
Exceptionally, the Israeli Police General Commissioner can permit in writing wiretapping for a maximum period of 48 hours, if he is convinced that for preventing a felony or identifying its perpetrators there is need for immediate wiretapping and no time to obtain a Court order through the abovementioned procedure
. The Police Commissioner is required to notify immediately the Attorney General in writing of such permit, and the Attorney General is entitled to revoke the permit
. The Court may authorise to prolong the wiretapping if the conditions for wiretapping are fulfilled
.
Finally, the Police may, in the performance of its functions, receive information, including personal data, from other public authorities that can provide such information subject to their discretion under the PPL where they are not prohibited from doing so by other laws
. As a general requirement, public authorities can share personal data with other authorities (1) where doing so is within the scope of the mandate or functions of the entity providing the information and is required for a purpose of implementing a law or for the performance of tasks by the providing or receiving entity; or (2) where the receiving entity may, by law, obtain the information in any event from any other source
. Any personal data transfer between public authorities is subject to the constitutional necessity and proportionality requirements, as described in the AG Opinion.
2.2.2.Further use of the information collected
The further use of data collected by Israeli criminal law enforcement authorities on one of the grounds referred to in Section 2.2.1, as well as the sharing of such data with a different authority for purposes other than the ones for which it was originally collected (so-called ‘onward sharing’), is subject to different safeguards and limitations.
First, the processing of personal data by law enforcement authorities in Israel is governed by the provisions of the PPL and the Regulations adopted on the basis of the PPL, as described in section 2.1. The PPL and the relevant Regulations set requirements on lawfulness
, purpose limitation
, accuracy
, transparency
, storage limitation
and security
. In addition, Chapter D of the PPL provides for specific rules on the sharing of information between public bodies (as described in the section 2.2.1). When law enforcement authorities in Israel intend to share personal data with law enforcement authorities of a third country, specific requirements set out in the Transfer Regulations apply. According to these Regulations, the transfer abroad of data from databases in Israel is prohibited, unless the law of the country to which the data is transferred ensures a level of protection that is not lower than the level of protection provided for by Israeli law, and provided that certain principles listed in the Regulations apply
. In a limited number of situations listed exhaustively in the Regulations, data may be transferred abroad even if the law of the country to which the data is transferred does not ensure an equivalent level of protection. These are either situations in which the recipient of the data is bound by an agreement with the database owner in Israel to guarantee the protection of privacy after the transfer in a way that would comply with the conditions for data processing in Israel, or situations that are similar to the specific situations in which transfers to third countries are possible in the absence of an adequacy finding or appropriate safeguards under the GDPR. Transfers may notably take place if the data subject has consented to the transfer, if the consent of the data subject cannot be obtained and the transfer is vital to the protection of his health or physical wellbeing, the data was made available to the public or was opened for public inspection by legal authority, or if the transfer of data is vital to public safety or security
. Finally, in any case of transfer of personal data abroad, the database controller must ensure that the recipient of the data undertakes in writing to apply adequate measures in order to protect the privacy of the data subjects and guarantee that the data shall be transferred to no other person, whether in the recipient’s country or in another
. In any event, as follows in particular from case law, reflected in the AG Opinion, any processing, including the use, retention or sharing, of personal data by public authorities has to comply with the principles of lawfulness, necessity and proportionality.
Second, the different laws that allow for data collection by criminal law enforcement authorities in Israel impose specific limitations and safeguards as to the use and further dissemination of the information obtained in exercising the powers they grant.
With respect to wiretapping, the Wiretapping Law requires that wiretap material which is not needed to prevent offences or identify offenders shall be deleted
. Moreover, further rules on the retention and use of wiretap data are contained in the Wiretapping Regulations, 5746-1986 (Wiretapping Regulations). In terms of retention, the Wiretapping Regulations stipulate that where an order was received to delete the recording material, every possessor of such material will delete it within ten days from the order receipt
. Moreover, the Wiretapping Regulations requires that recorded material is kept safe and in a manner that ensures confidentiality
. The Wiretapping Regulations provide that information obtained through wiretapping or recorded material may be shared with a competent authority
different from the one that requested the wiretapping or with the Institute for Intelligence and Special Operations if it may serve for preventing harm to the State security
or serve to prevent felony class offences or to identify the perpetrators of such offences
. Such information sharing may only take place to the extent it is necessary for the receiving authority to conduct its functions. The receiving authority has to confirm in writing the receipt of the information and the extent to which it is necessary to perform its functions
.
2.2.3.Oversight
Different bodies carry out oversight of the activities of criminal law enforcement authorities in Israel.
Internally, the Data Security Unit within the Israeli police is responsible for supervising the classification of all data held by the police (including data collected pursuant to the Communication Data Law or the Wiretapping Law) and its proper use. The Unit can conduct investigations and inquiries to detect any irregularity, unlawful use of data or use of data without permission. Irregularities or violations detected by the Data Security Unit are dealt with through administrative, disciplinary or criminal proceedings.
In terms of independent oversight, the processing of personal data by competent authorities for criminal law enforcement purposes is first of all subject to the oversight of the PPA, which is responsible for supervising compliance with the provisions of the PPL and of the regulations adopted thereunder
. In order to carry out its functions, the staff of the PPA can request relevant information and documents from any person involved, as well as enter, search and seize any object in any place for which there are reasonable grounds to believe that a database is operated therein
. The PPA can act on the basis of individual complaints or on its own initiative. If a possessor or owner of a database has infringed any provision of the PPL or fails to comply with a demand from the PPA, the PPA may suspend or cancel the registration of a database, the result of which is that the database owner is not allowed to process data in this database
.
The PPA conducts oversight actions that concern the processing activities carried out by law enforcement authorities. For example, in January 2023, the PPA imposed a fine on an employee of the Israeli Tax Authority for unauthorised use and disclosure of personal data from the Authority’s database. The annual reports of the PPA also show that it regularly engages with law enforcement authorities, including at an early stage when new technologies are being tested or rolled out.
Second, independent oversight of the Police is carried out by the State Comptroller (
, who, as part of his auditing mandate, may examine the lawfulness of acts carried out by public authorities and any other matter he deems necessary in regard to such acts
. In his/her audit reports, the State Comptroller details any infringements of any law, of the principles of economy and efficiency or of moral integrity, and matters that demand for rectification
. The head of the audited authority is required to report to the Comptroller on the envisaged actions to rectify identified deficiencies and the timing for implementing them. The findings of the State Comptroller are also brought to the knowledge of the Minister concerned, the Prime Minister, the Israeli Parliament (Knesset), as well as, in the case of a suspicion of a criminal act, the Attorney General
. The Prime Minister must submit to the State Comptroller a detailed response to each report within eight months, including on the steps taken to rectify any deficiencies. While reports of the State Comptroller are in general made public, they may be redacted or withheld where necessary for the protection of national security or to avoid damage to Israel’s foreign relations or international trade relations
.
Finally, oversight over the activities of law enforcement authorities in Israel is carried out by the Attorney General and the Knesset.
Under the Communication Data Law, the Head of Investigation and Intelligence Department is required to submit a report to the Attorney General once every three months concerning permits issued
. Under the Wiretapping Law, the Police Commissioner is similarly required to submit monthly reports to the Attorney General on wiretapping permits issued to prevent offenses and identify offenders, and the Minister of Police reports annually to the Joint Committee for the Constitution, Law and Justice and the National Security Committee of the Knesset, including on the number of applications filed and the number of permits issued, as well as on the number of persons, telecommunication lines and facilities for which wiretap was permitted
. Both the Attorney General and the Knesset may ask for any further information they consider necessary for the performance of their oversight role. The Attorney General may determine that a particular activity was unlawful and should be terminated or require to review and/or change unlawful police procedures. The Knesset’s Committees may organise debates, summon public officials and civil servants to provide information at their disposal on the activities of the body in which they serve, and issue recommendations.
In addition to its review of the abovementioned periodic reports, the Knesset is also authorised, as part of its constitutional role, to require from any governmental authority, including from security authorities, any information regarding their activities.
2.2.4.Redress
The Israeli system offers different avenues to obtain redress, including the possibility to obtain compensation for damages.
First, pursuant to the PPL and the Privacy Protection Regulations, individuals have the rights of access to
and correction
and deletion
of their personal data held by public authorities, including public authorities in the areas of criminal law enforcement and national security. While the exercise of the right of access to personal data granted by the PPL may be restricted with respect to certain data
, the case law of Israeli courts on the right of access, as confirmed by the PPA in an opinion on the individual right of access pursuant to the PPL
, has clarified that this restriction does not exempt the relevant entities “from examining, on a case-by-case basis, the justification for applying the exemption, with regard to the individual's access to data about him in databases of these entities” and that “[…] the exemption is to be applied only to the extent necessary and proportionate” More specifically, the Israeli Supreme Court has held that any limitation to the individual right of access should be done while striking a balance with the interests standing against it, in each and every case. The striking of such balance should be made while taking into consideration the nature of the case, its circumstances, the essence of the harm that the authority's decision will cause for the individual, and the question of the finality of the decision for which access is requested
. If a request for the exercise of rights is refused, individuals have the possibility to file a complaint with the PPA or, if a request for access or rectification is refused, may apply directly to court
.
Second, any individual may lodge a complaint concerning the processing of personal data by an Israeli law enforcement authority with the PPA, who can make use of all of its investigative and enforcement powers described in section 1.2.
Third, any individual may file a complaint with the Ombudsman against an act or omission of a public authority, including any unlawful processing of personal data by the Police
. In investigating a complaint, the Ombudsman has access to any relevant information and may hear the complainant, the entity against which the complaint is directed, as well as any other person
. Where the Ombudsman finds that the complaint is justified, the complainant will be notified thereof, together with the reasons
. The Ombudsman may indicate to the relevant public authority the need to rectify an issue revealed by the investigation (including for instance by paying a monetary compensation), as well as how and within what time period such rectification should be carried out
. The concerned authority must inform, within the time frame set by the Ombudsman, of the steps that have been taken in response to the Ombudsman’s decision regarding the complaint
. If the Ombudsman is not satisfied with the information provided, (s)he may bring the matter to the knowledge of the concerned Minister or the relevant Knesset Committee. Any complaint which raises the suspicion of a criminal act having occurred is forwarded to the Attorney General by the Ombudsman.
Fourth, individuals can make use of the different judicial avenues described in section 1.2, including to obtain compensation for damages for violations of the PPL, submit a criminal complaint pursuant to Article 68 of the Israeli Criminal Procedure Law where unlawful processing of personal data constitutes a criminal offence (e.g., under the PPL).
Importantly, an individual seeking to challenge the collection of his or her personal data for the purposes of criminal law enforcement has the possibility to file a petition for judicial review to the Israeli Supreme Court
. In accordance with Article 15(d) of the Basic Law: The Judiciary, the Supreme Court, sitting as High Court of Justice is empowered to hear and adjudicate petitions against state authorities or other bodies fulfilling by law public functions in the state, and thus exercises judicial review of the activities of government authorities. More specifically, a petition may be filed by an individual, including a non-Israeli national or resident, against any act or omission of any of the state authorities, including the Israel Police, which in the opinion of the petitioner violate the laws. The Supreme Court has a wide discretion in deciding whether to hear petition brought before them, so that even citizens and bodies not directly affected by the actions of the state can petition against it
.
The Supreme Court, sitting as High Court of Justice, is empowered to grant equitable relief, to order State and local authorities and the officials and bodies thereof, and other persons carrying out public functions under the law, to do or refrain from doing any act in the lawful exercise of their functions; to order courts, tribunals and bodies and persons having judicial or quasi-judicial powers under law, to hear, refrain from hearing, or continue hearing a particular matter or to void a proceeding improperly taken or a decision improperly given. It is also empowered to issue any order it sees fit towards any public body or any body exercising public authority. In case of a violation of privacy or data protection, this includes the power to order the deletion of personal data held by the relevant authority. Furthermore, the Supreme Court, sitting as a court of appeal, is empowered to order remedies in accordance with other laws, such as the PPL, including by ordering alternative relief (whereby the petitioner may for instance turn to a civil court to demand compensation)
.
2.3.Access and use by Israeli public authorities for national security purposes
In Israel, the main authority competent to collect personal data for national security purposes is the Israel Security Agency (ISA)
, whose powers are mainly governed by the Israel Security Agency Law, the Wiretapping Law and the PPL. Israeli law imposes a number of safeguards and limitations on how the ISA has access to and uses personal data for national security purposes and provides oversight and redress mechanisms in this area. The conditions under which access to personal data can take place and the safeguards applicable to the use of these powers are assessed in the following sections.
2.3.1.Legal bases and applicable limitations/safeguards
The ISA’s functions and mandate are defined in the ISA Law, which provides that it is in charge of the “protection of State security and the order and institutions of the democratic regime against threats of terrorism, sabotage, subversion, espionage, and disclosure of State secrets, and to safeguard and promote other State interests vital for national State security”
. The ISA may exercise different functions and powers, including protecting individuals, information and places determined by the Government; conducting intelligence research, as well as collecting and receiving information to safeguard and promote the abovementioned interests
. In doing so, the ISA may access personal data transferred from the EU to Israel (including while in transit), subject to specific limitations and safeguards.
The ISA may intercept the content of communications on the basis of the Wiretapping Law, may collect communications data (i.e., metadata, excluding the content of communications) on the basis of the ISA Law and may, on the basis of the PPL, receive personal data from other Israeli public authorities. In addition to the limitations and safeguards that follow from these laws (as described below), the Attorney General has issued a binding legal opinion further clarifying the application of the constitutional principles of lawfulness, necessity and proportionality to the activities of public bodies in Israel and the ISA in particular.
As any other public authority, the ISA may only take a measure that interferes with the right to data protection of individuals if such measure is provided for or authorised by law, pursues an appropriate purpose, is suitable to achieve that purpose, constitutes the least intrusive measure (compared to other available measures) and is proportionate (which requires balancing the benefits that would be achieved by the measure against the harm that would be caused to the individual)
.
Accordingly, and as further specified in the legal opinion issued by the Attorney General, the ISA may only process personal data on the basis of the ISA Law and the Wiretapping Law, and in accordance with the PPL if the following conditions are met
. First, there must be a legitimate purpose for the processing
. The specific purposes for which the ISA may collect and process data follow from specific legislation (e.g., the ISA Law)
, as described below. Second, the processing must be necessary to attain the legitimate purpose. In this respect, the ISA must examine whether there are less intrusive means to achieve the same purpose and ensure that only the minimum data required for the legitimate purpose is processed
. Finally, in assessing the proportionality of a surveillance measure, the ISA must take several factors into account, such as the nature and sensitivity of the data processed, the amount/scope of data processed, the duration of the processing (including how long it would be stored), the transparency of the processing towards concerned individuals, the number of employees that will have access to the data and the severity of the threat to national security
. These requirements, which follow from the Basic Law and case law and are confirmed in the binding legal opinion of the Attorney General, apply to any processing of personal data by the ISA (e.g., to the collection, use, storage and sharing of personal data)
. They constitute the standard against which bodies that authorise surveillance measures (see below), as well as oversight bodies and courts, have to assess the lawfulness of the collection and further processing of personal data for national security purposes
.
In terms of specific powers that have to be exercised in compliance with above legal requirements, the ISA may, on the basis of the Wiretapping Law, collect the content of communications. Procedurally, such collection must, upon request from the ISA, be authorised in writing by the Prime Minister
, if (s)he is satisfied that the collection is necessary (as interpreted in line with the principles set out above) for the protection of national security, after considering the level of interference with the rights of individuals (i.e., if the abovementioned requirement of proportionality is met)
. The authorisation issued by the Prime Minister must, if known in advance, indicate the identity of the concerned individual or of the line or facility used, as well as the location and duration of the wiretap and manner in which it will be carried out
. A wiretap authorisation is valid for a maximum period of three months, renewable under the same conditions
. The Prime Minister must notify the Attorney General every three months about authorisations issued
. In urgent cases, i.e., if the head of the ISA concludes that the protection of national security requires an immediate wiretap and there is no time to obtain authorisation, the head of the ISA may issue a written authorisation containing the same elements as described above
. Such an authorisation is only valid for 48 hours and must be reported immediately to the Prime Minister, who may revoke it
.
Pursuant to the ISA Law, the ISA may also collect communications data (i.e., metadata, excluding the content of a conversation, which can only be intercepted on the basis of the Wiretapping Law) from telecommunication operators (i.e., companies licensed in Israel to offer communication services)
. In particular, the ISA may request metadata where necessary for the performance of its duties, i.e., for the protection of national security and the order and institutions of the democratic regime against threats of terrorism, sabotage, subversion, espionage and disclosure of State secrets, as well as for safeguarding and promoting other State interests vital for national security
. Any such request may only be issued by the ISA if it complies with the requirements of necessity and proportionality, as confirmed by the binding legal opinion of the Attorney General. With respect to the possibility to access data obtained in response to a request of the ISA, the ISA Law imposes additional safeguards. In particular, any employee of the ISA may only access such data for the performance of his/her official duties if specifically authorised to do so by the head of the ISA
.
Finally, the ISA may, under the same conditions as described in section 2.2.2 with respect to the Police, receive information, including personal data, from other public authorities providing such information on a voluntary basis
.
2.3.2.Further use of the information collected
The processing of personal data obtained by the ISA for national security purposes is governed by the provisions of the PPL and of the Regulations adopted on its basis, as described in section 2.1
. As regards the sharing of information obtained through wiretapping with other Israeli authorities, the same requirements of the Wiretapping Regulations as the ones described in section 2.2.2 apply.
Additional requirements for the retention, deletion and further sharing of the content of communications and communications data follow from specific classified rules issued by the Prime Minister under the Wiretapping Law and ISA Law
. At the same time, as indicated in section 2.3.1 and as follows in particular from case law, reflected in the binding legal opinion of the Attorney General, any such processing, including the use, retention or sharing, of personal data by the ISA has to comply with the principles of lawfulness, necessity and proportionality.
2.3.3.Oversight
The access of personal data by Israeli security agencies for purposes of national security is subject to similar oversight mechanisms as already outlined with respect to criminal law enforcement.
Internally, the ISA Comptroller is responsible for internal audits, including with respect to the ISA’s processing of personal data for national security purposes
. The Comptroller has access to all relevant information and reports annually to the Head of the ISA, the Ministerial Committee on ISA Affairs and the Knesset Committee on ISA Affairs
. If the comptroller finds a violation of the law, such findings must be included in the periodic reports
.
In terms of independent oversight, the PPA oversees the processing of personal data by national security authorities in light of the PPL and the relevant Regulations. The PPA can request relevant information and documents from any person involved in the processing of personal data for national security purposes. If a possessor or owner of a database has infringed any provision of the PPL, the PPA has the power to suspend or cancel the registration of a database, and thus suspend or prohibit the database owner from processing or managing this database.
In addition, the State Comptroller is competent to oversee the activities of the ISA, in the same way as described in section 2.2.3.
In terms of governmental and parliamentary oversight, Article 11(d) of the ISA Law requires the Head of the ISA to report every three months to the Prime Minister and to the Attorney general on the permits issued to use communication data that has been transmitted to the ISA pursuant to Article 11(b) of the ISA Law, and on the mode of use of such data under Article 11(c) of the Law. The reports include information on the number of permits issued by virtue of Article 11, the ways in which the information was used. The same type of report is submitted to the Knesset Service Affairs Committee, i.e., the Sub-Committee for Intelligence and Secret Services of the Foreign Affairs and Defence Committee of the Knesset, on an annual basis. Moreover, the Head of the ISA reports every three months to the Ministerial Committee (i.e., a committee appointed by the Israeli government for Security Agency affairs, which for these matters operates in the name of the government) and the Knesset Service Affairs Committee on the general activities of the agency. Both the Ministerial Committee and the Knesset Service Affairs Committee may also request special reports from the Head of the ISA
. Both the Attorney General and the Knesset may ask for any further information they consider necessary for the performance of their oversight role. The Attorney General may determine that a particular activity was unlawful and should be terminated or require to review and/or change unlawful procedures. The Knesset’s Committees may organise debates, summon public officials and civil servants to provide information and issue recommendations.
As regards the Wiretapping Law, under Article 4(d) any issuing or renewal of a wiretap permit for the purposes of State Security has to be immediately notified to the Prime Minister, if the Minister of Defence issued it. Moreover, the Minister of Defence notifies the Attorney General once every three months of wiretap permits issued for the purposes of State Security
. The Attorney General, together with the ISA, examines specific issues in order to ensure that data is used in a limited and proportionate manner, and solely for the purposes of state security set out in the Law. The issues discussed during these examinations may concern specific cases or broader trends and can lead to changes of internal procedures.
Finally, the Minister also reports on an annual basis the number of permits issued in this area to a joint committee of the Knesset Constitution, Law and Justice Committee and the Foreign Affairs and Security Committee
.
2.3.4.Redress
The Israeli system offers different avenues to obtain redress, including compensation for damages.
First, individuals can exercise their rights of access, correction and deletion with respect to data held by the ISA under the PPL, under the same conditions as described in section 2.2.4. If a request is refused, any individual has the possibility to lodge a complaint with the PPA, that can make use of all of its investigative and enforcement powers.
Second, any individual, can file complaints with the PPA about the processing of their personal data by the ISA. The PPA is bound to review every complaint it receives and to notify the applicant of its decision in that regard.
Third, any individual can lodge a complaint before the Ombudsman concerning the handling of their data by the ISA, in the same way as described in section 2.2.4.
Finally, the same judicial avenues as the ones described in section 2.2.4 (e.g., to obtain compensation for damages for violations of the PPL, to submit a criminal complaint, or to file a petition to the Israeli Supreme Court) are also available against the ISA.
VIII. JERSEY
1.RULES APPLYING TO THE PROCESSING OF PERSONAL DATA
1.1.Relevant developments in the data protection framework of Jersey
On 8 May 2008 the European Commission adopted a decision in which Jersey was considered as providing an adequate level of protection for personal data. The Article 29 Working Party had adopted a positive opinion on the level of protection of personal data in Jersey on 9 October 2007. At the time, data protection in Jersey was governed by the Data Protection (Jersey) Law 2005 (Data Protection Law 2005). The Data Protection Law 2005 was substantially identical to the UK’s Data Protection Act 1998, which implemented Directive 95/46/EC (Data Protection Directive). It also established the independent office of the Information Commissioner, which regulated compliance with the law.
Since the adoption of the Commission’s adequacy decision, Jersey has significantly modernised its data protection framework, in particular by adopting the Data Protection (Jersey) Law 2018 (Data Protection Law), which repeals the previous 2005 Law. Along with the Data Protection Authority (Jersey) Law 2018 (Data Protection Authority Law), it was drafted to ensure a level of protection in line with Regulation (EU) 2016/679 (GDPR). It entered into force in May 2018.
With the adoption and full entry into force of the Data Protection Law, the Jersey data protection regime has been significantly strengthened. As set out in more detail below, the Data Protection Law mirrors the provisions of the GPDR with respect to all of its key aspects. In particular, in areas where the GDPR has enhanced the protection of personal data when compared to the protection offered by its predecessor, the Data Protection Directive, the Data Protection Law of Jersey has been strengthened as well.
Like the Data Protection Law 2005, the new Data Protection Law has a broad scope of application, applying to both private operators and public authorities. While the definitions of ‘personal data’, ‘controller’, ‘processor’, ‘data subject’ and ‘processing’ (which are identical to those used in the GDPR) have not changed, the Data Protection Law has brought even more convergence with the GDPR, e.g., by introducing a definition of ‘pseudonymisation’. Moreover, the recent reform further aligned the notion of personal data with the GDPR by clarifying when a person is “identifiable”. Also the territorial scope of the Law has been extended to cover the processing of personal data by controllers or processors not established in Jersey, subject to the same conditions that are set out in Article 3 of the GDPR. This confirms the intention of the Jersey legislator to strengthen the effectiveness of Jersey’s data protection regime.
The main data protection principles (i.e., the principles of lawfulness, fairness, transparency, purpose limitation, data minimisation, accuracy, storage limitation, integrity and confidentiality) were already present in the Data Protection Law 2005 and are present also in the modernised Law. Some of them have been further strengthened, e.g., the principle of lawfulness of processing, the transparency obligations, the security principle and the principle of accountability.
In particular, as regards the principle of lawfulness, the requirements for valid consent have been reinforced, by making clear that, in addition to being freely given, specific and informed, consent must be unambiguous and expressed by a clear affirmative action
. Similarly, the Data Protection Law has strengthened the existing transparency obligations by requiring that additional information is provided to the individual (e.g., the contact details of the data protection officer, the fact that the controller intends to transfer the data to a third country, the retention period, the right to withdraw consent, the existence of automated decision-making, etc.) when data is collected directly from the individual or from third parties
and when it is further processed
.
With respect to the principle of data security, the Data Protection Law has introduced the obligation to notify data breaches
, which was previously not present in the Jersey regime. As also required by the GDPR, in case of a personal data breach, the controller must, as soon as practicable, and in any event, within 72 hours after becoming aware of the breach (unless the latter is not practicable), notify the personal data breach in writing to the Authority. If a personal data breach is likely to pose a high risk to the significant interests of a data subject, written notice must be provided also to the data subject.
In terms of accountability, the obligations have been fully aligned with the GDPR and requirements that were previously not present in the Jersey law have been introduced: The Data Protection Law contains the obligations to implement principles of data protection by design and by default
, to keep records of processing
, to designate a data protection officer
, and to conduct impact assessments
. Like the GDPR, the Data Protection Law follows a risk-based approach, and the scope of the obligations is tailored to the risks for the rights and freedoms of natural persons.
In addition to the strengthening of data protection principles and obligations, the protections for special categories of personal data have been reinforced since the adoption of the adequacy decision. The Data Protection Law 2005 already offered additional protection for information about the racial or ethnic origin, political opinions, religious beliefs or other beliefs of a similar nature, about membership in a trade union or other labour organisation, about physical or mental health and the commission or alleged commission of an offence. The Data Protection Law extends this protection to biometric and genetic data, as well as to data concerning a natural person’s sexual orientation. As regards the safeguards that apply to the processing of special categories of data, the Data Protection Law allows the processing of special categories of data only in specific circumstances, as was already the case under the Data Protection Law 2005. Moreover, controllers and processors that process special categories of data may be subject to specific accountability requirements, such as the keeping of records, the appointment of a data protection officer, and the carrying out of impact assessments.
In terms of rights, Part 6 of the Data Protection Law provides individuals with all of the key data protection rights, i.e., the rights of access
rectification, and erasure, and it also provides for a right to restriction
and objection
. The exercise of these rights is subject to conditions that are very similar to those of the GDPR. Moreover, when compared to the previous legislation, the Data Protection Law has strengthened the rights of individuals in several ways, further aligning them with the GDPR. The right of access not only requires controllers to provide individuals with information about the processing of their data (as was already the case under the Data Protection Law 2005
), but also to give access to personal data, including by providing a copy
. Moreover, additional grounds to object to processing have been added
. For instance, individuals have a right to object to the processing of their personal where such processing is based exclusively on grounds of public interest or on the legitimate interest of the controller
. In addition, the data subject no longer has to apply to a court to order the rectification and erasure of his or her personal data, as was required under the Data Protection Law 2005, but instead can make a request directly to the controller
. Finally, the rights in relation to automated decision-making have been further strengthened and aligned with the GDPR through the introduction of a right for individuals not to be subject to a decision that is based solely on automated processing and that produces legal effects or similarly significantly affects the individual
. Such automated decision-making may only take place under certain conditions (e.g., only where authorised by law or based on the data subject’s explicit consent) and subject to suitable safeguards, including the possibility to obtain human intervention
. In addition, the Data Protection Law introduced a right to data portability that corresponds to the same right available under the GDPR
.
As it is the case in the GDPR, transparency requirements and data subject rights in Jersey are subject to certain restrictions intended to allow the balancing of the data protection interests of individuals with objectives of general public interest and with the fundamental rights and freedoms of others.
These restrictions are set out in Part 7 of the Data Protection Law. Some of them are based on the nature of the personal data being processed and apply automatically whenever one of the listed categories of personal data is being processed. These categories cover a narrowly construed set of situations, such as information that the controller is obliged under any enactment to make available to the public, personal data processed for purposes of assessing a person’s suitability for judicial appointments or appointments by the Crown, the provision of references in confidence by the controller in the context of the education, employment or appointment of the data subject, or personal data recorded by a candidate during an academic, professional or other examination. These categories are not only very limited in scope, but also do not typically cover situations where personal data is transferred to Jersey from the EU.
In the majority of cases, the restrictions are based on a prejudice standard. Namely, they can be invoked only if - and to the extent that - the application of the provisions “would be likely to prejudice” the legitimate aim pursued. For example, controllers can restrict data subject rights if their application would be likely to prejudice the combat effectiveness of the armed forces of the Crown
, or where personal data is processed for the purposes of the prevention, detection, or investigation of a crime or the assessment or collection of any tax or duty, and the application of the requirements or rights would be likely to prejudice that purpose
.
The Jersey Office of the Information Commissioner (JOIC) has issued interpretative guidance that clearly frames the application of the exemptions It further clarifies the scope of the different exemptions, which helps to prevent them from being understood and applied in an overly broad manner, and explains how the requirements of necessity and proportionality should be applied with respect to a specific exemption
.
With respect to international transfers of personal data, i.e., concerning the potential onward transfer of personal data that has been transferred from the EU, Jersey has reorganised and clarified its transfer regime. It has put in place a system that is very similar to the rules on international transfers set out in Chapter V of the GDPR in terms of structure and requirements. Article 66 of the Data Protection Law lays down the general principle for cross-border data transfers, permitting them only if the third country or international organisation provides an adequate level of protection. The level of protection is considered adequate if the European Commission has adopted an adequacy decision pursuant to Article 45 of the GDPR, if appropriate safeguards as described in Article 67 have been put in place, or if the transfer falls within the scope of one of the exceptions listed in Schedule 3 of the Data Protection Law.
Article 67 sets out the conditions for putting in place appropriate safeguards, requiring in particular that enforceable data subject rights and effective legal remedies for data subjects comparable to those under the Data Protection Law must be available in the third country or organization. The instruments that can be used to provide appropriate safeguards are similar to those provided in Article 46 of the GDPR: (1) a legally binding and enforceable agreement between public authorities, (2) binding corporate rules, (3) standard data protection clauses, (4) a code of conduct approved by another authority under the GDPR, and (5) a certification mechanism either approved by Regulations under the Data Protection Law or approved by another authority under the GDPR.
Moreover, under the conditions laid down in Article 67(3), personal data can be transferred subject to the specific authorisation of the JOIC. Article 67(4) explicitly requires the JOIC to take into account any opinions or decisions of the EDPB in determining whether to authorise a transfer. In this area, Jersey has thus ensured that beyond the alignment of the law itself, also the interpretation of the law remains in line with the interpretation within the EU.
Finally, Schedule 3 of the Data Protection Law provides an exhaustive list of narrowly defined exceptions to the conditions for cross-border transfers laid down in Articles 66 and 67. These exceptions overlap to a large extent with the derogations for specific situations listed in Article 49 of the GDPR, and their interpretation by the JOIC is also aligned with the EU. In its guidance on international transfers, the JOIC confirms that the exceptions are for specific situations, should only be used if it is not possible to rely on an adequacy decision or to put in place appropriate safeguards, and that organisations should take into account the EDPB’s guidance on derogations.
1.2.Oversight, enforcement and redress
Jersey has also reformed its system of oversight and enforcement of the Data Protection Law, strengthening both the independence and the powers of the oversight body.
Under the Data Protection Authority Law, oversight and enforcement is carried out by the Data Protection Authority (the Authority), which replaces the Commissioner under the Data Protection Law 2005. The Authority is composed of a chairperson, three to eight other voting members (the Members), and a commissioner (an ex officio and non-voting member). Importantly, a statutory guarantee of the Authority’s independence has been introduced in the Data Protection Authority Law, which requires it to act independently and in a manner free from direct or indirect external influence. In addition, the Authority now enjoys the status of a legal person separate from its members.
The Authority’s Members are appointed by the Chief Minister, who must present, at least two weeks prior to the appointment, to the States Assembly (i.e., the Jersey Parliament) a reasoned report about his intention to appoint. It is required by Law that the Minister must have particular regard to the need to ensure that Members have the qualifications, experience and skills necessary to exercise and perform the functions of a Member, in particular relating to the protection of personal data, as well as a strong sense of integrity and the ability to maintain confidentiality. The appointments are overseen by the Jersey Appointments Commission.
The Commissioner is the Chief Executive of the Authority, in charge of its day-to-day operations and responsible for managing other employees. The role of the Commissioner is in principle incompatible with any other employment, business or occupation. The Commissioner is appointed by the Members of the Authority and holds office for a (renewable) term of 5 years.
Members can be removed from office by the Chief Minister, but only if the specific conditions for dismissal that are listed exhaustively in the Law are met and if the States are informed at least two weeks in advance of the intended removal. The conditions for the dismissal of the Commissioner by the Authority are equally set out in the Law.
Compared to the previous regime - regarding which the Article 29 Working Party had raised some questions concerning the extent of the Commissioner’s investigatory and enforcement powers - the Data Protection Authority Law has significantly strengthened the Authority’s powers that are now very similar to those foreseen in the GDPR. In particular, the Authority can conduct audits, investigate individual complaints and carry out general inquiries on its own initiative. In carrying out its functions, the Authority has access to all relevant information, including the power to enter and search premises, to seize devices and information, to inspect etc.. Upon finding of a violation of the Data Protection Law, the authority can impose various sanctions, ranging from warnings and reprimands to binding orders (for instance to discontinue processing, bring processing into compliance with the Law, rectify, erase or restrict processing or suspend the transfer of personal data).
Moreover, the Authority can impose administrative fines for certain violations of the Law. The fines must be effective, proportionate and have a deterrent effect. As regards the amount of fines, the Authority has to take into account the same factors as those listed in Article 83(2) GDPR, i.e., the intentional or negligent character of the infringement, any action taken by the controller or processor to mitigate the damage suffered by data subjects, duration of the infringement etc.. In addition, several violations of the Data Protection Law continue to constitute offences and may therefore be subject to criminal sanctions.
As regards possibilities for individuals to obtain redress, the Jersey system continues to offer various avenues, including the possibility to lodge a complaint with the Authority for any possible breach of the Data Protection Law, to obtain judicial redress directly against controllers with respect to any alleged or potential violation of the transparency and subject rights provisions of the Jersey Data Protection Law and to obtain compensation for damages. In addition, individuals can obtain judicial redress against decisions of the Authority.
Despite its relatively small size, the Authority plays an active role. Each year it handles a number of files, including enquiries, complaints, investigations and data breach notifications. In 2019, the Authority received 89 enquiries and 145 complaints. With respect to those complaints that required further action, the organisations concerned either took measures to resolve the complaint on their own account and those measures were deemed satisfactory, organisations were required to implement measures recommended by the Authority, or the complaints could be resolved through the provision of information to the Authority. In several cases the Authority issued warnings, informing organisations that any further breach of the law may be subject to formal sanctions. In 2020, the Authority handled 106 enquiries and 140 complaints. In 60 cases, the Authority’s investigation revealed contraventions of the Data Protection Law, which were remedied further to recommendations given by the Authority. Two cases were considered serious enough to warrant the issuing of public statements
. In terms of outreach, the Authority organises a “Data Protection Week” each year in which it provides information and advice to a large audience, covering topics such as requests for access to data, surveillance in the workplace and data transfers
. It also engages in outreach activities on an ongoing basis, such as presentations and courses for instance on data security for small businesses, on issues relating to the collection of employee data or on how to handle data breaches. Finally, the Authority provides a significant amount of information online, including toolkits and practical advice, addressing typical questions that organisations and individuals may face.
2.ACCESS TO AND USE OF PERSONAL DATA TRANSFERRED FROM THE EUROPEAN UNION BY PUBLIC AUTHORITIES IN JERSEY
2.1.General legal framework
The limitations and safeguards that apply to the collection and subsequent use of personal data for purposes of criminal law enforcement and national security follow from Jersey’s international obligations in the area of fundamental rights and personal data protection, from the rules that apply to the processing of personal data by the public sector, as well as from specific laws regulating access to data by Jersey public authorities.
First, as an exercise of power by a public authority, government access in Jersey must be carried out in full respect of the law. The ratification of the European Convention of Human Rights by the United Kingdom has been extended to Jersey since 1953. The right to respect for private and family life (and the right to data protection as part of that right) is protected by the Human Rights (Bailiwick of Jersey) Law 2000, which incorporates the majority of rights under the European Convention on Human Rights into Jersey law. Article 8 of the Convention provides that any interference with privacy must be in accordance with the law, in the interests of one of the aims set out in Article 8(2) and proportionate in light of that aim. Article 8 also requires that the interference is “foreseeable”, i.e., have a clear, accessible basis in law, and that the law contains appropriate safeguards to prevent abuse.
In addition, in its case law, the European Court of Human Rights has specified that any interference with the right to privacy and data protection should be subject to an effective, independent and impartial oversight system that must be provided for either by a judge or by another independent body (e.g., an administrative authority or a parliamentary body).
Moreover, individuals must be provided with an effective remedy, and the European Court of Human Rights has clarified that the remedy must be offered by an independent and impartial body which has adopted its own rules of procedure, consisting of members that must hold or have held high judicial office or be experienced lawyers, and that there must be no evidential burden to be overcome in order to lodge an application with it. In undertaking its examination of complaints by individuals, the independent and impartial body should have access to all relevant information, including closed materials. Finally, it should have the powers to remedy non-compliance.
Second, the Council of Europe Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data (Convention 108) also applies in Jersey. Article 9 of Convention 108 provides that derogations from the general data protection principles, the rules governing special categories of data and data subject rights are only permissible when such derogation is provided for by the law of the Party and constitutes a necessary measure in a democratic society in the interests of protecting State security, public safety, the monetary interests of the State or the suppression of criminal offences, or for protecting the data subject or the rights and freedoms of others.
Therefore, through adherence to the European Convention of Human Rights and to Convention 108, Jersey is subject to a number of obligations, enshrined in international law and that frame its system of government access on the basis of principles, safeguards and individual rights similar to those guaranteed under EU law and applicable to the Member States. Furthermore, as far as the ECHR is concerned, compliance with these obligations is subject to the judicial control of the European Court of Human Rights.
Third, the Jersey Parliament has adopted specific provisions for the processing of personal data in the law enforcement context, i.e., the Data Protection (Jersey) Law 2018, as modified by Schedule 1 to the Law. The material scope of the Data Protection Law is similar to the one of the GDPR. It applies to the processing of personal data by both commercial and public entities
. Furthermore, the data protection principles of lawfulness and fairness, purpose limitation
, data minimisation
, accuracy
, storage limitation
and security
are retained in the Data Protection Law, as modified by Schedule 1, in similar terms as in the Law Enforcement Directive. In essence, the processing of personal data by a competent authority for a law enforcement purpose is permitted only if it is authorised by law and either the data subject has given its consent, or the processing is necessary for the performance of a task carried out by the controller for a law enforcement purpose
. In addition, the Data Protection Law as modified by Schedule 1 imposes specific transparency obligations and recognises the same data subject rights as the LED. In particular, individuals enjoy a right of access, correction and deletion and have the right not to be subject to automated decision-making. Competent authorities are also required to implement data protection by design and default
, to keep records of processing activities
, and, in certain situations, to carry out data protection impact assessments and to pre-consult the Data Protection Authority
. Moreover, they are required to put in place appropriate measures to ensure security of processing
and are subject to specific obligations in case of a data breach, including notification of such breaches to the Authority and data subjects
. Like in the Law Enforcement Directive, there is also a requirement for a controller (unless it is a court or other judicial authority acting in a judicial capacity) to designate a data protection officer who assists the controller in complying with its obligations as well as monitoring that compliance
. Finally, the Data Protection Law, as modified by Schedule 1, contains specific provisions on international transfers of personal data
. The provisions substantially echo those in the Law Enforcement Directive. Essentially, transfers to a third country or an international organisation are prohibited unless they are necessary for a law enforcement purpose and based either on an adequacy decision adopted by the European Commission in accordance with Article 37 Law Enforcement Directive or on appropriate safeguards
. In the absence of an adequacy decision and appropriate safeguards, transfers to unauthorised jurisdictions are only possible in specific circumstances that are listed in the law in an exhaustive manner and correspond to the ‘derogations’ set forth in the Law Enforcement Directive
.
Under similar conditions as under the Law Enforcement Directive, Schedule 1 to the Data Protection Law specifies that certain specific provisions of the Data Protection Law
may be restricted to the extent that and for as long as the restriction is a necessary and proportionate measure for one of the purposes listed in the law, having regard to the fundamental rights and legitimate interests of the data subject concerned.
Moreover, Part 7 of the Data Protection Law imposes restrictions to specific provisions of the Law
. First, Part 7 allows the restriction of individual rights based on the nature of the personal data being processed. These restrictions apply automatically whenever one of the listed categories of personal data is being processed. These categories are listed in an exhaustive manner and cover a very limited, narrowly construed set of situations, which are to a large extent irrelevant in a law enforcement context. In addition, they do not typically cover situations where personal data is transferred to Jersey from the EU. Second, Part 7 sets out restrictions on grounds of prejudice. They can be invoked only when and to the extent that the application of the provisions “would be likely to prejudice” the legitimate aim pursued. For example, controllers can restrict data subject rights to the extent that their application would be likely to prejudice the combat effectiveness of the armed forces of the Crown
, or would be likely to prejudice the prevention, detection, or investigation of crime
. As explained in section 1.1., the JOIC has issued interpretative guidance that clearly frames the application of the restrictions. It clarifies the scope of the different restrictions, including by means of examples, which helps to prevent them from being misunderstood and applied in an overly broad manner. It also explains how the requirements of necessity and proportionality should be applied with respect to these specific restrictions
.
The processing of personal data for national security purposes in Jersey is subject to the provisions of the Data Protection Law. As explained above, the Data Protection Law applies to the processing of personal data by both private entities and by public authorities, including for the purpose of safeguarding against or preventing threats to national security. While the Law provides for an exemption from specified provisions
for national security purposes, these provisions may only be restricted to the extent it is necessary to safeguard national security. In addition, the application of these exemptions has been clarified through detailed guidance. As recalled above for restrictions applicable in the field of criminal law enforcement, in particular, relying on the exemption is only allowed to the minimum extent necessary to protect the particular functions or activities the exemptions concern. The exemption cannot be invoked in a blanket manner but can be relied upon only on the basis of a case-by-case analysis and considering the actual consequences of applying the relevant provision. All decisions to rely on an exemption have to be documented and controllers must be prepared to share that documentation with the Data Protection Authority.
Moreover, according to Article 41(2) of the Data Protection Law, a certificate signed by the Minister for Home Affairs can confirm the legality of the reliance on the national security restriction. That means that the certificate serves as conclusive evidence of the fact that a restriction from one or more provision specified in the certificate is required for the purposes of national security. It is important to note that the national security certificate does not provide for an additional ground for restricting data protection rights and obligations for national security reasons. In other words, the controller or processor can only rely on a certificate when it has concluded that it is necessary to rely on the national security restriction which, as explained above, must be applied on a case-by-case basis
. Even if a national security certificate applies to the matter in question, the Jersey Data Protection Authority can investigate whether or not reliance on the national security restriction was justified in a specific case
. Moreover, any person directly affected by the issuing of a certificate may appeal to the Royal Court. The Royal Court will review the decision to issue a certificate and decide whether there were reasonable grounds for issuing it. As a result, the Court can quash the certificate or determine that the certificate does not apply to specific personal data which is the subject of the appeal
.
It follows from the above that limitations and conditions are in place under the applicable Jersey legal provisions, as interpreted by the Jersey Data Protection Authority, to ensure that these exemptions and restrictions remain within the boundaries of what is necessary and proportionate to protect criminal law enforcement and national security.
2.2.Access and use by Jersey public authorities for criminal law enforcement purposes
In Jersey, criminal law enforcement functions are primarily carried out by the States of Jersey Police, which is headed by the Chief Officer. Jersey law imposes a number of limitations on how law enforcement authorities have access to and use personal data for criminal law enforcement purposes, and it also provides oversight and redress mechanisms in this area. The conditions under which access to personal data can take place and the safeguards applicable to the use of these powers are assessed in the following sections.
2.2.1.Legal bases and applicable limitations/safeguards
Personal data transferred under the adequacy decision and processed by organisations in Jersey may be obtained by Jersey criminal law enforcement authorities notably by means of investigative measures under the Police Procedures and Criminal evidence (Jersey) Law 2003 (PPCE), on the basis of the Regulation of Investigatory Powers (Jersey) Law 2005, or in the context of anti-money laundering legislation.
The PPCE provides the Jersey police with a legal basis for accessing personal data held by commercial operators through searches and seizures, and production orders. The PPCE lays down detailed rules on the scope and application of these measures, aimed at ensuring that the interference with the rights of individuals will be limited to what is necessary for a specific criminal investigation and proportionate to the pursued purpose. With limited exceptions, searches and seizures may only take place on the basis of a court-issued search warrant
and the issuing of such warrant is subject to specific procedural and substantive requirements. An application for a production order requiring a person to provide the police with access to information must also be made to a court and will also be subject to specific procedural and substantive requirements.
More specifically, a police officer may apply for a search warrant to the Bailiff or a Jurat
. An application for a warrant must state the ground on which it is made and specify the premises to be searched, as well as the articles and persons to be sought.
A search warrant may be issued only if the Bailiff or Jurat is satisfied that there are reasonable grounds to believe
that (1) a serious offence has been committed of which there is evidence on the premises specified in the application or (2) that there are goods on premises specified in the application which have been unlawfully obtained.
In terms of formal requirements, the warrant must specify the identity of the person who applied for it, the date of issuance, the enactment under which it is issued, the premise to be searched and, in as far as practicable, the articles or persons to be sought. The police officer carrying out the search must provide the occupier of the searched premise with the warrant, or in case the latter is not present, leave a copy of the warrant.
A police officer may seize and retain anything for which a search was authorised. A police officer who is lawfully on any premises may furthermore seize anything at the premise if he/she believes on reasonable grounds that the item has been obtained as a result of committing a crime and it is necessary to seize it in order to prevent it from being concealed, lost, tampered with or destroyed. Moreover, the police officer may require information stored in electronic form to be produced in a form in which it can be taken away if he/she has reasonable grounds to believe that it is evidence or has been obtained as a result of the commission of an offence and it is necessary to do so to prevent it from being concealed, lost, tampered with or destroyed.
In addition to the powers of search and seizure described above, Article 101 PPCE allows the Attorney General to authorise the taking of any action as the Attorney General may specify, in respect of any property or wireless telegraphy. Such authorisation can be issued by the Attorney General only if (s)he believes that such action is necessary for detecting or preventing serious crime or in the interests of the security of Jersey and the action is proportionate to what it seeks to achieve. In considering whether this is the case, the Attorney General must take into account whether what it is thought necessary to achieve by the authorised action could reasonably be achieved by other means. An authorisation must be in writing and ceases to have effect after three months.
Specific limitations and safeguards also apply to the use of investigatory powers by public authorities in Jersey. The use of investigatory powers to obtain information on communications is governed by the Regulation of Investigatory Powers (Bailiwick of Jersey) Law 2003 (RIPL)
. The RIPL regulates notably the interception of communications, the acquisition and disclosure of communications data (i.e., metadata stored by the service providers), and the use of surveillance (such as covert investigations).
Article 5 RIPL introduces a general principle of confidentiality of communications by providing that it is an offence to intercept communications in the course of their transmission by means of a public postal service or a public or private telecommunication system without lawful authority. Article 7 RIPL further clarifies that to be lawful, any interception of communications must be authorised by an interception warrant
issued by the Attorney General
.
An interception warrant can be issued on application by certain persons specifically listed in the law only if the Attorney General believes that it is necessary for one of the purposes listed in Article 10(3) RIPL. These include the purpose of preventing or detecting serious crime
. Importantly, the law explicitly requires that the conduct that would be authorised must be proportionate to what is sought to be achieved by that conduct. In considering the necessity and proportionality of the measure, the Attorney General must take into account whether any alternative means could be reasonably used to obtain the information. In addition, paragraph 2.5 of the Code of Practice on the Interception of Communications Data further clarifies that this requires a balance of the intrusiveness of the interference against the need for it in operational terms. The interception of communications will not be proportionate if it is excessive in the circumstances of the case. In addition, any interception should be carefully managed to meet the objective in question and must not be arbitrary or unfair.
In accordance with Article 12 RIPL, the warrant must either name or describe one person as the interception subject or specify a single set of premises as the premise in relation to which the interception is to take place. The warrant must also describe the communications for which interception is authorised, including the addresses, numbers, apparatus or other factors used to identify the communications
. An interception warrant in principle ceases to have effect after 3 months beginning with the day of the warrant's issue, unless it is renewed. A renewal may be authorised by the Attorney General only where (s)he believes that the warrant continues to be necessary for the purposes described in Article 10(3) RIPL
.
The RIPL also regulates the acquisition and disclosure of communications data. The acquisition and disclosure of communications data is not aimed at obtaining the content of a communication, but aimed at obtaining information such as traffic data, information about the use of a postal service or telecommunications service, and any other information held or obtained by a postal service/telecommunication service in relation to persons to whom the service is provided
.
Persons designated with respect to a specific public authority
may obtain communications data by giving notices to a postal or telecommunications operator, requiring the operator to obtain and/or disclose relevant data
. The designated person may also grant an authorisation for persons holding relevant offices, ranks or positions in that public authority to obtain communications data. A notice or authorisation may only be issued if the designated person believes that it is necessary to obtain communications data for one of the specific purposes listed exhaustively in the law, including for the purpose of preventing or detecting crime or of preventing disorder.
Importantly, the notice or authorisation may only be granted if the designated person believes that obtaining the data in question is proportionate to what is sought to be achieved. According to the Code of Practice on Accessing Communications Data, this means that even if an action that interferes with a Convention right is directed at pursuing a legitimate aim, this will not justify the interference if the means used to achieve the aim are excessive in the circumstances. Any interference with a Convention right must be carefully designed to meet the objective in question and must not be arbitrary or unfair. Even taking all these considerations into account, in a specific case interference may still not be justified because the impact on the individual or group is too severe
.
The notice must be issued in writing and specify the communications data to be obtained, the grounds on which it is necessary to obtain the data, the office, rank or position held by the person issuing the notice, and the manner in which any disclosure required by the notice is to be carried out. The effect of a notice is limited and unless it is renewed, it ceases to require that data be obtained one month after the date on which the notice is given. A notice may be renewed before the end of the period of one month under the same conditions as described above.
In Jersey, criminal law enforcement authorities can also obtain personal data from business organisations in the context of investigations into whether a person has engaged in or benefited from criminal conduct, or into the whereabouts of the proceeds of criminal conduct. These powers are governed by the Proceeds of Crime (Jersey) Law 1999 (POCL).
In accordance with the POCL, the Bailiff can, on an application of a police officer, make orders to produce or give access to material, issue search warrants to obtain that material where a production order is not appropriate or not complied with, make customer information orders and account monitoring orders.
Each type of order is subject to strict formal and substantial requirements. In essence, the scope of such orders is always limited to one individual or one set of premises, they must contain specific mandatory information, and they may only be issued for limited purposes.
For instance, under the POCL, the Bailiff can make an order to make material available if there are reasonable grounds for suspecting that a specified person has engaged in or benefited from criminal conduct, there are reasonable grounds for suspecting that the material is likely to be of substantial value to the investigation, and does not consist of or include items subject to legal professional privilege, and there are reasonable grounds for believing that it is in the public interest that the material should be produced or that access to it should be given.
The Bailiff can issue a search warrant under the POCL authorising a police officer to enter and search specific premises, provided that the same conditions as described above are met and an order to make material available has not been complied with, or it would not be appropriate to make such an order. Where a police officer has entered premises in the execution of a search warrant, he or she may seize and retain any material, other than items subject to legal professional privilege, which is likely to be of value to the investigation for the purposes of which the warrant was issued
.
A customer information order is an order made by the Bailiff with the consent of the Attorney General on application by a police officer which requires a financial services business
to provide any customer information
that the institution has relating to a person specified in the application for the order
, in such manner, and within such time as specified in the application
. An account monitoring order requires the financial services business specified in the application to provide account information specified in the order to an appropriate officer, for the period
, in a manner, and by the time stated in the order
. The conditions for issuing these orders are identical to the ones described above.
Importantly, any disclosure of personal data obtained on the basis of the abovementioned provisions has to comply with the Data Protection Law, and the further processing by criminal law enforcement authorities of personal data obtained through such disclosures is subject to the provisions of the Data Protection Law, as modified by Schedule 1 to the Law.
2.2.2.Further use of the information collected
The further use of data collected by Jersey criminal law enforcement authorities on one of the grounds referred to in Section 2.2, as well as the sharing of such data with a different authority for purposes other than the ones for which it was originally collected (so-called ‘onward sharing’), is subject to safeguards and limitations.
First, the processing of personal data by law enforcement authorities in Jersey is governed by the provisions of the Data Protection Law, as modified by Schedule 1 to the Law (see section 2.1. above) With respect to onward sharing, Article 13 of the Data Protection Law as modified by Schedule 1, like the LED, allows that personal data collected for a law enforcement purpose may be further processed (whether by the original controller or by another controller) for any other (secondary) law enforcement purpose provided that the controller is authorised by law to process the data for the other purpose and the processing is necessary and proportionate to that other purpose. In this case, all the safeguards provided by the Data Protection Law (referred to in section 2.1) apply to the processing carried out by the receiving authority. The Law explicitly prohibits personal data collected for a law enforcement purpose from being processed for a purpose that is not a law enforcement purpose, unless that processing is authorised by law.
When law enforcement authorities in Jersey intend to share personal data processed under the Data Protection Law with law enforcement authorities of a third country, specific requirements apply
. These requirements are very similar to those set out by the Law Enforcement Directive. Essentially, transfers of personal data to a third country or an international organisation are prohibited, unless the intended recipient is a law enforcement authority, the transfers are necessary for a law enforcement purpose, and they are based on an adequacy decision adopted by the European Commission pursuant to Article 36 Law Enforcement Directive or on appropriate safeguards
. In the absence of an adequacy decision or appropriate safeguards, transfers are only possible in specific circumstances that are listed in the law in an exhaustive manner, e.g., for the protection of vital interests of individuals, to safeguard legitimate interests of the data subject, to prevent immediate and serious threats to the public security of any country, and in individual cases for a law enforcement purpose or a legal purpose, provided that there are no fundamental rights and freedoms of the data subject overriding the public interest in the transfer
.
Second, the different laws that allow for data collection by law enforcement authorities in Jersey impose specific limitations and safeguards as to the use and further dissemination of the information obtained in exercising the powers they grant.
As regards the powers of search and seizure under the PPCE, the police officer who seizes anything must, if requested by the occupier of premises, provide in reasonable time that person with a record of what he has seized. The police officer must also grant access to or supply a photograph or a copy of the seized or retained item at the request of the person who had custody of the item before it was seized. Importantly, anything that has been seized by the police may not be retained longer than necessary in the circumstances
.
With respect to the interception of communications, Article 19 RIPL sets out the safeguards that need to be applied to material intercepted on the basis of a warrant. In particular, the Attorney General must make arrangements to ensure that the dissemination of the intercepted material (i.e., the number of people who can access it, the extent to which the material is disclosed or copied, the number of copies
, etc.) is limited to the minimum necessary for the authorised purposes. Each copy made of any of the materials must be destroyed as soon as there are no longer any grounds for retaining it as necessary for any of the authorised purposes. If intercepted material is shared with authorities of a country or territory outside of Jersey, the Attorney General is required to make arrangements that ensure corresponding limitations, to the extent that the Attorney General seems fit, and that prevent any disclosure that would not be lawful within Jersey.
These safeguards are further specified in the Codes of Practice. In particular, the Code of Practice on the Interception of Communications requires all intercepted material to be handled in accordance with the arrangements made by the Attorney General, the details of which must be made available to the Investigatory Powers Commissioner (see section 2.2.3 below). The Attorney General must ensure that the safeguards are in force before any interception can begin. The Commissioner is required to review the adequacy of the safeguards. All intercepting agencies are required to keep detailed records of interception warrants for which they have applied. The Code further requires intercepted material, as well as copies and summaries of the material, to be handled and stored securely to minimise the risk of loss or theft. In particular, it must be inaccessible to persons without the required level of security clearance, and this requirement for secure storage also applies to communications service providers. It also requires intercepted material to be securely destroyed as soon as it is no longer needed for any of the authorised purposes and retained material to be reviewed at appropriate intervals to confirm that its retention is justified and valid.
Concerning the acquisition and disclosure of Communications Data, the Code of Practice on Accessing Communications Data provides that applications and notices for communications data must be retained by the relevant public authority until they have been audited by the Investigatory Powers Commissioner. The public authority should also keep a record of the dates on which an authorisation or notice is started and cancelled. The Code furthermore provides that communications data, as well as all copies, extracts and summaries of it, must be handled and stored securely.
2.2.3.Oversight
Different bodies carry out oversight of the activities of criminal law enforcement authorities.
First, the processing of personal data by competent authorities for criminal law enforcement purposes is subject to the oversight of the JOIC, whose independence is enshrined in law. The tasks and powers of the JOIC mirror those set out in Article 46 and 47 of the LED. To perform those tasks, the JOIC may investigate complaints, conduct inquiries into the processing of personal data by criminal law enforcement authorities, issue recommendations, make a determination of a violation of the Law and impose sanctions. These sanctions can include reprimands, warnings or corrective orders (e.g., requiring the authority to bring processing in compliance with the Law, rectify or erase data, cease the processing, etc.). In addition, the JOIC may issue a public statement concerning data breaches, violations of the Data Protection Law or imposed corrective orders/sanctions, where it considers that it would be in the public interest to do so given the gravity of the matter or other exceptional circumstances. In determining which order to impose, the JOIC must have regard to different factors, such as the nature, gravity and duration of the violation, whether the violation was intentional or negligent, the degree of cooperation with the JOIC to remedy the breach, any other action taken to mitigate any damage suffered by data subjects etc.. Since the entry into force of the Data Protection Law, the JOIC has engaged with law enforcement authorities by providing guidance and advice on the application of the Data Protection Law
. The JOIC and SOJP have also worked together on joint initiatives such as a Fraud Prevention Forum and CCTV awareness.
Second, the activities of the Attorney General under the PPCE, i.e., the authorisation of interference with property or wireless telegraphy pursuant to Article 101 PPCE, are subject to the oversight of a commissioner appointed by the Bailiff among one of the ordinary judges of the Court of Appeal. The role of the Commissioner is to keep under review the carrying out by the Attorney General of his functions. To that end, the Attorney General is required to notify the Commissioner of any authorisations given, renewed or cancelled at least every 12 months. The Commissioner has a duty to make a report to the Bailiff on the carrying out of the Attorney General’s functions under the PPCE as soon as practicable after the end of each year. The Bailiff in turn is required to submit a copy of that report to the States.
Third, the use of investigatory powers under the RIPL is overseen by the Investigatory Powers Commissioner. Under Part IV of the RIPL, the Bailiff must appoint a judge of the Court of Appeal (of Jersey) as the Investigatory Powers Commissioner. The Commissioner is responsible for reviewing the activities under the RIPL, including the issuing of interception warrants, and the issuing of authorisations and notices for the collection and disclosure of communications data
. All persons involved in the use of investigatory powers are required to disclose or provide to the Commissioner all documents and information that the Commissioner may require for the purpose of enabling him to carry out his functions. The Commissioner is in turn required to prepare an annual report on the use of investigatory powers for submission to the Bailiff of Jersey. The Bailiff must lay before States a copy of every annual report made by the Commissioner. The Commissioner’s report is also made public. If it appears to the Commissioner that there has been a contravention of the RIPL or insufficient safeguards have been put in place for intercepted communications, he/she must report that to the Bailiff.
As described in the Commissioner’s recent annual reports, the overwhelming majority of warrants requested and granted in Jersey are in support of law enforcement activities, notably for the purpose of detecting and preventing large-scale commercial drug trafficking and associated money laundering. In his annual reports, the Commissioner found that warrants had been issued for properly identified statutory purposes, in respect of the principles of necessity and proportionality and in compliance with procedural requirements. He also noted that the safeguards required by Article 19 RIPL had been implemented in a satisfactory manner
.
2.2.4.Redress
As regards the processing of personal data by law enforcement authorities in Jersey, redress mechanisms are available under the data protection legislation, under the Human Rights Law 2000 and under the RIPL. This series of mechanisms provide data subjects with effective administrative and judicial means of redress, enabling them in particular to ensure their rights, including the right to have access to their personal data, or to obtain the rectification or erasure of such data.
First, data subjects have the right to lodge a complaint with the JOIC concerning the processing of their personal data by criminal law enforcement authorities. The JOIC has the power to determine breaches of the Data Protection Law and impose necessary sanctions. It also has the power, on request by a data subject or on its own initiative, to bring proceedings before a court in respect of any breach or anticipated breach of the Law. Following such complaint, the court can make any order, relief and remedy it considers just under the circumstances, including an award of compensation to any person who suffers damage as a result of the breach, an injunction or interim injunction to restrain any actual or anticipated breach of an operative provision, and a declaration that a breach was committed
.
Second, individuals can obtain judicial redress against decisions of the JOIC. This includes the possibility to challenge an action or inaction of the JOIC before a court, e.g., decisions not to investigate a complaint, or decisions finding that there has been no violation of the Law. Moreover, an individual can appeal to the court against any failure of the JOIC to provide written notice that a complaint is either being investigated or not being investigated, within the time period specified in the Law, or if the complaint is being investigated, written notice of the progress and, where applicable, the outcome of the investigation within the time period specified in the Law. If a determination of the Authority is appealed, the court has the power to confirm or annul the determination of the JOIC and remit the matter back to the JOIC for reconsideration and make any other order it considers just
.
Third, under Articles 68 and 69 of the Data Protection Law, individuals can also obtain judicial redress against criminal law enforcement authorities directly before the courts. In particular, if there is a breach of the operative provisions of the Law and the breach causes damage to another person, it is actionable in court by that person.
Fourth, as far as any person considers that their rights, including rights to privacy and data protection, have been violated by public authorities, individuals can obtain redress before the Jersey courts under the Human Rights Law 2000. Under Article 7(1) of the Human Rights Law, it is unlawful for a public authority to act in a way which is incompatible with rights provided in the law. A person who claims that a public authority has acted (or proposes to act) in a way which is unlawful under Article 7(1) can bring proceedings against the authority under this Law in the appropriate court or tribunal, when he or she is (or would be) a victim of the unlawful act. If the court finds any act of a public authority to be unlawful, it can grant such relief or remedy, or make such order, within its powers as it considers just and appropriate.
Finally, any individual may obtain judicial redress before the European Court of Human Rights against the unlawful collection of his/her data by criminal law enforcement authorities, provided that all available domestic remedies have been exhausted.
For violations of the RIPL or the PPCE, individuals can also obtain redress before the Interception of Communications Tribunal. This redress avenue is described in section 2.3.4 below.
2.3.Access and use by Jersey public authorities for national security purposes
In Jersey, access to information transferred under the adequacy decision for purposes of national security can take place in the form of the interception of communications and the acquisition and disclosure of communications data on the basis of the RIPL
.
2.3.1.Legal bases and applicable limitations/safeguards
The interception of communications and acquisition and disclosure of communications data may not only take place in the context of criminal investigations, but also when necessary in the interests of national security or to safeguard the economic well-being of the Bailiwick. The use of these powers for those purposes is subject to the same substantive and procedural limitations and safeguards as described in section 2.2.1 in the context of criminal law enforcement, notably the need for independent authorisation, requirements of necessity and proportionality and limitation to specific communications or information
.
Moreover, although the notion of “economic well-being” may appear broad, Article 10 RIPL sets out that an interception warrant can only be considered necessary for the purpose of safeguarding the economic well-being of Jersey if the purpose is to obtain information relating to the acts or intentions of persons outside Jersey. In addition, the Code of Practice on the Interception of Communications further specifies that the Attorney General can only issue an interception warrant for the purpose of safeguarding the economic well-being of Jersey if he considers, on the basis of the facts of each case, that there is a direct link between the economic well-being of the Bailiwick and national security. Similarly, the Code of Practice on Accessing Communications Data sets out that communications data can only be obtained for the purpose of the economic well-being of Jersey if, on the basis of the facts of each case, the economic well-being is directly related to national security.
2.3.2.Further use of the information collected
The further use of personal data obtained in the interests of national security is governed by the provisions the Data Protection Law, as described in section 2.1
. Pursuant to Article 8(1)(a) and (b) of the Data Protection Law, data processing must be lawful, and data must not be further processed in a manner that is incompatible with the purpose for which it was collected.
Moreover, specific requirements apply when personal data is shared with authorities outside of Jersey
. As described in more detail in sections 1.1 and 2.1, these requirements are very similar to those set out by the EU’s data protection framework. Transfers of personal data to a third country or an international organisation are prohibited, unless they are based on an adequacy decision adopted by the European Commission pursuant to either Article 45 GDPR or Article 36 of the Law Enforcement Directive, or on appropriate safeguards
. In the absence of an adequacy decision or appropriate safeguards, transfers are only possible in specific circumstances that are listed in the law in an exhaustive manner
.
In addition, the RIPL, complemented by the relevant Codes of Practice, sets out specific safeguards for the further use and sharing of data obtained on the basis of its provisions. These involve particular arrangements to ensure that the dissemination of material obtained is limited to the minimum necessary for the purposes pursued with the authorisation. Material must be handled and stored securely to minimise the risk of loss or theft and must be destroyed as soon as there are no longer any grounds for retaining it as necessary for any of the authorised purposes. Retained material must be reviewed at appropriate intervals to confirm that its retention is justified and valid. All agencies exercising powers on the basis of the RIPL are required to keep detailed records of warrants or authorisations for which they have applied
. Intercepted material may be shared with authorities of a country or territory outside of Jersey only if arrangements are in place to ensure corresponding limitations and to prevent any disclosure that would not be lawful within Jersey
.
2.3.3.Oversight
Government access for national security purposes in Jersey is overseen by different bodies. The Data Protection Authority oversees the processing of personal data in light of the Data Protection Law, while specific oversight on the use of the investigatory powers under the RIPL is provided by the Investigatory Powers Commissioner.
The processing of personal data carried out for national security purposes is governed either by the provisions of the Data Protection Law. The general functions and powers of the JOIC are laid down in Article 11 et seq. of the Data Protection Authority Law. The tasks include, but are not limited to, monitoring and enforcement, promoting public awareness, advising the Jersey parliament and government and other institutions on legislative and administrative measures, promote the awareness of controllers and processors of their obligations, provide information to a data subject concerning the exercise of the data subject’s rights, handle complaints, conduct investigations, issue guidance etc. The JOIC has the powers to notify controllers of an alleged infringement and to issue warnings that a processing is likely to infringe the rules, issue reprimands, ban processing or order the controller to take certain actions. While the Data Protection Law
allows exemptions from certain provisions, including from those that concern the JOIC, for national security purposes, these provisions may only be restricted on a case-by-case basis to the extent that their application would be likely to prejudice national security and if necessary and proportionate (as explained in section 2.1).
Furthermore, as described in section 2.2.3 above in the context of criminal law enforcement, the Investigatory Powers Commissioner oversees the application of the RIPL i.e., the interception of communications and the acquisition and disclosure of communications data. In his recent annual reports, the Commissioner noted that the overwhelming majority of warrants in Jersey were requested and granted in a law enforcement context, in particular for the purposes of detection and prevention of drug trafficking and associated money laundering.
2.3.4.Redress
Individuals can obtain redress for violations of the RIPL or the PPCE before the independent Investigatory Powers Tribunal established by Article 46 RIPL.
The Tribunal is the appropriate forum for any complaint by a person, including any individual in the EU, who believes that conduct under the RIPL or under the PPCE has taken place in relation to him, his property or his communications or in relation to that person’s use of any postal service, telecommunications service or telecommunication system. In addition, the complainant is required to believe that the conduct has taken place either in “challengeable circumstances”
or has been carried out by or on behalf of the intelligence services.
When considering a complaint, it is the duty of the Tribunal to investigate whether surveillance has taken place in relation to the complainant, as well as the authority for such surveillance, if any
. The Tribunal determines whether any errors of law, errors of fact or procedural errors have been committed, or whether there has been any other irregularity, such as a lack of proportionality. All persons involved in the exercise of powers under the RIPL are required to provide to the Tribunal all such documents and information that the Tribunal may need to carry out its functions. The Tribunal also has the power to require the Investigatory Powers Commissioner to provide the Tribunal with all such assistance (including the Commissioner's opinion as to any issue to be determined by the Tribunal) as the Tribunal think fit
. The Commissioner must be kept informed about the proceedings and any determination, award, order, or other decision made in relation to those proceedings
.
If the Tribunal makes a determination in favour of the complainant, the Tribunal must provide the complainant with a summary of that determination including any findings of fact. The tribunal must also give notice to the complainant if no determination has been made in his/her favour
. The Tribunal has the power to issue interim orders and to provide any such award of compensation or other order as it thinks fit. This may include an order quashing or cancelling any warrant or authorisation and an order requiring the destruction of any records of information obtained in exercise of any power conferred by a warrant or authorisation, or otherwise held by any public authority in relation to any person.
Further, an individual who believes that his or her rights under the Data Protection Law have been (or are about to be) breached can make a complaint to the JOIC, (as described in section 2.3.3 above). Redress mechanisms under the Data Protection Law include breach determinations or sanctions issued by the JOIC, and civil proceedings before a court, in which a court can make any order, relief and remedy it considers just under the circumstances, including an award of compensation to any person who suffers damage as a result of the breach, an injunction or interim injunction to restrain any actual or anticipated breach of an operative provision, and a declaration that a breach was committed (as described in section 2.2.4 above).
Finally, as also described in section 2.2.4 above, as far as individuals consider that their rights, including rights to privacy and data protection, have been violated by public authorities, they can obtain redress before the Jersey courts under the Human Rights Law 2000. In addition, any individual may obtain judicial redress before the European Court of Human Rights against the unlawful collection of his/her data for national security purposes, provided that all available domestic remedies have been exhausted.
IX. NEW ZEALAND
1.RULES APPLYING TO THE PROCESSING OF PERSONAL DATA
1.1.Relevant developments in the data protection framework of New Zealand
The adequacy decision for New Zealand was adopted on 19 December 2012, following the opinion of the Article 29 Working Party of 4 April 2011. At the time of the adoption of the decision, the protection of personal data in New Zealand was mainly governed by the Privacy Act of 17 May 1993. Since the adoption of the adequacy decision, the Privacy Act 1993 was amended several times: by the Privacy Amendment Act 2013, the Harmful Digital Communications Act 2015, the Intelligence and Security Act 2017 and the Enhancing Identity Verification and Border Processes Legislation Act 2017. Moreover, a comprehensive reform of the Privacy Act 1993 was launched in 2018 and concluded in 2020 with the adoption of the Privacy Act 2020, which entered into force in December 2020. In addition, further interpretations and clarifications have been provided by the courts and the data protection authority (the Office of the Privacy Commissioner, OPC).
Like its predecessor, the Privacy Act 2020 has a broad scope of application, applying to “agencies”, i.e., private operators and the public sector, regardless of where they collect or hold personal information, and regardless of where the concerned individuals are located. While the definition of personal information in the Privacy Act 2020 itself (i.e., information about an identifiable individual) has not changed, decisions of the OPC have confirmed its broad interpretation, e.g., by clarifying that information will be considered personal information as long as “any person can link the information with other information to identify the individual or individuals to which it relates”. The territorial scope of the New Zealand data protection rules have been extended by the Privacy Act 2020, which also applies to overseas agencies that carry on business in New Zealand (which is understood broadly and does not necessarily imply a commercial operation, having a place of business in New Zealand, receiving any monetary payment for the supply of goods or services or intending to make a profit from the business in New Zealand).
The main data protection principles provided under the New Zealand data protection framework at the time of the adoption of the adequacy decision, which are mainly reflected in the Privacy Act’s Information Privacy Principles (IPP), have remained in place. This is the case for the principles of lawfulness, purpose limitation (IPP 1, 10 and 11), data minimisation (IPP 1), data accuracy (IPP 7(2) and 8), data retention (IPP 9), data security (IPP 5) and accountability. At the same time, several aspects of the legal framework have been further clarified and developed, either through legislative amendments or case law and/or guidance and decisions of the OPC.
In particular, several aspects of the requirements for lawfulness of processing have been strengthened. Whereas agencies were already only allowed to collect personal information for a lawful purpose connected with their function or activity, the Privacy Act 2020 has further clarified that, even if there is such a purpose, but pursuing it does not require the collection of an individual’s identifying information, the agency may not require such information. The Act also requires agencies to specifically take into account the situation of children or young people when collecting personal information, to ensure that the way in which the information is collected is fair in the circumstances.
In addition, since the adoption of the adequacy decision, certain legal bases for the use or disclosure of personal information have been further circumscribed. First, the possibility to use or disclose personal information whose source is publicly available has been limited through an amendment introduced by the Harmful Digital Communications Act 2015 that clarified that this ground cannot be relied upon if, in the circumstances of the case, it would be unfair or unreasonable to use/disclose the information. The OPC has clarified that different factors should be taken into account in this context, including how old the information is, how it was made public, the sensitivity of the information, the seriousness of the possible impact of it and the steps that have been taken by an agency to verify the information. Second, the Privacy Amendment Act 2013 clarified in which situations personal information may be used or disclosed to prevent or lessen a serious threat to public health or public safety, or the life or health of an individual. In particular, to determine whether there is a serious threat, regard has to be given to the likelihood of the threat being realised; the severity of the consequences if the threat is realised and the time at which the threat may be realised.
With respect to public authorities, the Privacy Amendment Act 2013 introduced the possibility for the government to approve so-called information sharing agreements (AISAs), which allow different bodies or different parts/departments within one authority to share personal information to facilitate the provision of public services. AISAs are adopted after consulting the OPC, as well as any person or organisation representing the interests of the (classes of) individuals whose information would be shared. AISAs may provide for modifications to the IPPs, e.g., by establishing specific grounds to collect, use or disclose personal information and must specify the categories of information that may be shared, as well as the purposes for which and circumstances in which this may take place. There are currently 13 approved AISAs, including between Inland Revenue and the Department of Internal Affairs, between the Ministry of Social Development and the New Zealand Customs Service, as well as an AISA for improving public services to vulnerable children. Before recommending an AISA, a Minister must inter alia be satisfied that it will facilitate the provision of a public service, the type and quantity of personal information to be shared is no more than necessary to facilitate the provision of the public service and the AISA contains adequate safeguards to protect the privacy of concerned individuals. The handling of personal information under AISAs remains subject to the oversight of the OPC.
As regards transparency, the Privacy Act 2020 generally requires agencies to provide certain information, including about their contact details, the purpose of collection and intended recipients (IPP 3), when they collect information directly from the individual. To further strengthen the level of transparency, the New Zealand government introduced in September 2023 a bill in the Parliament to amend the Privacy Act 2020 to extend these proactive notification requirements to also apply to situations where information is collected indirectly (i.e., where it is obtained from other entities and further used/disclosed).
Another area of the New Zealand data protection regime that has evolved since the adoption of the adequacy decision concerns the requirements with respect to security. Although until recently, New Zealand agencies would voluntarily report data breaches to the OPC, the Privacy Act 2020 introduced an obligation to notify both the OPC and concerned individuals as soon as practicable after becoming aware of notifiable privacy breaches (i.e., a privacy breach that it is reasonable to believe has caused serious harm to an affected individual or individuals or is likely to do so). To assess whether a privacy breach has or is likely to cause serious harm, different factors should be taken into account, including any action taken by the agency to reduce the risk of harm following the breach; the sensitivity of the information; and the nature of the harm that may be caused to affected individuals. In limited situations, an agency is not required to inform individuals, e.g., where doing so would prejudice the security or defence of New Zealand or endanger the safety of a person, or may delay the notification (where and as long as providing the information may constitute a risk for the security of the information that outweighs the benefits of informing the individuals). Failure to notify the OPC without a reasonable excuse is an offence subject to a fine. In this context, an agency may not use the fact that it has taken steps to address the breach as a defence.
Whereas the accountability requirements under the Privacy Act 2020 have not changed, the OPC has developed several tools to assist agencies with their compliance efforts. For example, the OPC issued detailed guidance and a toolkit to carry out privacy impact assessments. It also launched a “Privacy Trust Mark” in 2018, which may be issued for a specific product or service on the basis of an assessment of several criteria, including whether a privacy impact assessment has been carried out, whether the product/service demonstrates privacy by design and by default, how end-to-end security is demonstrated, etc.
As regards the processing of special categories of data, the New Zealand privacy framework considers information sensitive depending on the circumstances and context in which it is processed. The OPC has clarified through guidance that this will generally be the case when the inferences that can be drawn about the individual from information are potentially sensitive. This for example applies to information about a person’s race, ethnicity, gender, sexual orientation, sex life, health, disability, age, membership of an advocacy group, trade union or political party and religious, cultural or political beliefs., i.e., categories of data that are also considered sensitive under EU data protection law. The sensitivity of personal information is a relevant factor to take into in the application of several requirements of the Privacy Act 2020, e.g., to determine which security safeguards to apply (IPP 5) and whether the means to collect personal information are fair and not unreasonably intrusive (IPP 4).
With respect to data subject rights, the New Zealand data protection framework continues to provide individuals with a right of access and correction, which have been further and strengthened through legislative developments, as well as case law and OPC guidance. For example, recent case law has confirmed that the right of access extends to any information necessary to provide meaningful access, including for instance on the purpose of processing, the logic involved in the processing of personal information on the basis of algorithms, as well as third parties with whom information may be shared. In addition, the restrictions to the right of access have further evolved. Like Regulation (EU) 2016/679 (GDPR), the New Zealand data protection regime provides agencies with the possibility to refuse to disclose personal information in response to a request for access from an individual in specific, limited circumstances, e.g., if disclosure of the information would be likely to prejudice the security or defence of New Zealand; the prevention, investigation and detection of offences or would disclose a trade secret. The recent reform added limited additional grounds for refusal, e.g., where disclosure would be likely to pose a serious threat to the life or health of an individual, or to public health or public safety; or would create a significant likelihood of serious harassment of an individual. The Privacy Act 2020 also introduced the possibility to, instead of refusing access, impose conditions relating to the use and/or disclosure of the information by the applicant, where one of the exceptions laid down in the Act applies. Moreover, it provided the OPC with the power to issue a binding written notice directing agencies to grant individuals access to their personal information (see below).
Under NZ law, individuals can obtain erasure of their data in different circumstances, although not expressly formulated as a separated right under Privacy Act 2020. In particular, exercising the right of correction may lead to deletion, i.e., where this is necessary to ensure that the information is accurate, up to date, complete and not misleading. In addition, agencies have to delete personal information that was collected unlawfully or can no longer be lawfully used (e.g., where the purpose has been obtained). In those situations, individuals can obtain deletion before the OPC or the Human Rights Review Tribunal (HRRT, which may order deletion as one of the possible remedies, see below). Several cases handled by the OPC and the Tribunal demonstrate that erasure may for instance be obtained where information was collected without being necessary for a lawful purpose or by means that intruded to an unreasonable extent on the personal affairs of an individual (in violation of IPP 1 and 4), upon request of an individual to erase incorrect or misleading information, and where information is disclosed unlawfully. Moreover, on the basis of the Harmful Digital Communications Act 2015, an individual that has suffered or will suffer serious emotional distress as a result of a digital communication may apply to a court that may order the deletion of such material.
Finally, the rules on international transfers have been significantly strengthened since the adoption of the adequacy decision. The previous regime – by which the OPC could prohibit transfers to third countries if the personal information was received from another third country in certain situations – remains in place but has been complemented by a comprehensive set of rules that agencies have to comply with in order to disclose personal information outside New Zealand. First, such a transfer may only take place if the concerned individual authorises the transfer (after having been expressly informed that the recipient may not be required to protect the information in a way that provides comparable safeguards to the Privacy Act 2020). Alternatively, a transfer may take place if the transferring agency believes on reasonable grounds that (1) the recipient is subject to the Privacy Act 2020 (because it is carrying on business in New Zealand, see earlier); (2) the recipient is subject to privacy laws that, overall, provide comparable safeguards to those in New Zealand; (3) the recipient is a participant in a “prescribed binding scheme” or is located in a “prescribed country”; or (4) the recipient is otherwise required to protect the information in a way that, overall, provides comparable safeguards to those in the Privacy Act 2020 (in particular because it entered into an agreement with the New Zealand agency). In practice, the OPC recommends that agencies rely on contractual instruments providing for comparable data protection safeguards in order to transfer personal information overseas. To assist agencies in developing such instruments, the OPC has developed model contract clauses, which share a number of similarities with the standard contractual clauses adopted by the European Commission (e.g., with respect to data protection principles, individual rights, onward transfers, and redress).
The abovementioned requirements do not apply in limited circumstances, i.e., if the information is disclosed to the concerned individual; if the source of the information is a publicly available publication and it would not be unfair or unreasonable to provide the information in the circumstances of the case; if the disclosure is necessary to enable New Zealand’s intelligence agencies to perform their functions; if the disclosure is necessary on important public interest grounds (e.g., to avoid prejudice to the maintenance of the law by a public sector agency, for the conduct of legal proceedings) and it is not reasonably practicable in the circumstances to comply with the general transfer requirements; or if the disclosure is necessary to prevent or lessen a serious threat to public health/safety or the life or health of an individual and it is not reasonably practicable in the circumstances to comply with the general transfer requirements.
1.2.Oversight, enforcement and redress
The OPC is the independent authority in charge of the oversight and enforcement of the New Zealand data protection rules. Its tasks include engaging in awareness activities, conducting audits of agencies upon their request, carrying (general) inquiries, undertaking research, examining and advising on proposed legislation, etc..
In terms of powers, the OPC may carry out general inquiries into any matter (including any practice or procedure) if it appears that the privacy of individuals is being, or may be infringed; conduct an audit to ascertain whether personal information is handled in accordance with the IPPs, upon request of an agency; and initiate investigations (on the basis of a complaint or on its own initiative) concerning an interference with the privacy of an individual. In carrying out inquiries or investigations, the OPC has access to all relevant information. In principle, the OPC aims at reaching a settlement between the parties (in case the investigation was initiated on the basis of a complaint) or obtaining a satisfactory assurance against the repetition of the action that was investigated. Where the OPC is unable to secure a settlement or assurance, or an agency has acted against a previously reached settlement or provided assurance, it may refer the matter to the Director of Human Rights Proceedings. The Director (or the individual themselves) may in turn initiate proceedings before the HRRT, which may grant appropriate remedies (e.g., a declaration that an action is an interference with privacy, a corrective order, damages, or other relief).
The Privacy Act 2020 significantly strengthened the powers of the OPC, by introducing the possibility to (1) adopt binding “access directions”, i.e., decisions with respect to individuals’ requests for access to their personal information ordering agencies to provide individuals with access in any manner the OPC considers appropriate; and (2) issue binding compliance notices if a breach of the Act (or a code of practice) has occurred, requiring the concerned agency to remedy the breach (including by identifying the specific steps the OPC considers needed). The OPC can enforce a compliance notice before the HRRT if there is reason to believe that the agency has not remedied or will not remedy the violation, or the agency fails to report timely on the steps taken to remedy the violation. The Tribunal may order that the agency comply with the notice or perform any act specified in the order. Failure to comply with an order of the Tribunal constitutes an offence and may be subject to a fine. Fines are imposed by the District Court, which takes a number of factors into account in determining the level of the fine and may not exceed 10 000 NZD for each charge. The OPC may also publish information on compliance notices, including the identity of agencies to whom they have been issued, if it considers it in the public interest to do so.
As regards the possibility for individuals to obtain redress, different avenues continue to be available in the New Zealand system. In particular, individuals may turn directly to agencies, file a complaint with the OPC and obtain judicial redress (against agencies or against the findings of the OPC), which may lead to different types of remedies, including injunctive relief and compensation for damages.
Its annual reports show that the OPC deals with a number of investigations and complaints on an annual basis. For example, between June 2018 – June 2019, the OPC closed 894 investigation files and referred two cases to the HRRT (while 23 individuals turned to the HRRT themselves), and between June 2019 – June 2020, the OPC closed 769 investigation files and referred three cases to the HRRT (23 individuals turned to the HRRT themselves). This for instance includes an inquiry into the unlawful sharing of data between credit companies and investigations into the unlawful disclosure of data to the police by a bank and the use of inaccurate debt records. In the same reporting periods, the OPC received a total of 427 voluntary notifications on data breaches. In addition, the OPC conducted several general inquiries, e.g., into the police’s conduct relating to the photographing of members of the public, the use and disclosure of COVID-19 patient information by the Ministry of Health, and Trade Me’s (New Zealand’s largest online auction website) privacy policy and compliance with the Privacy Act 1993.
According to the first annual report after the entry into force of the Privacy Act 2020, the OPC received 531 complaints (and closed 580 complaints) during June 2020 – June 2021, and received 544 data breach notifications (which have become mandatory after the reform). In September 2021, the OPC issued its first compliance notice, addressed to the Reserve Bank in relation to its response to a cyber-attack. The notice was closed in September 2022, after the Reserve Bank introduced all the improvements requested by the OPC.
The OPC has also issued guidance on various topics, including on health data, biometric data, privacy impact assessments, the use of data and analytics by government agencies, contact tracing and individual rights. Moreover, it developed several tools to assist agencies with training and compliance efforts (e.g., e-learning tools, a privacy statement generator and a platform to report data breaches), as well as to help individuals with exercising their rights (e.g., through a dedicated online tool by which the right of access can be exercised).
Finally, the OPC regularly engages with stakeholders, through campaigns regional visits, presentations, livestreams (so-called PrivacyLive events), responding to public inquiries (including through a call centre) and podcasts. The OPC also advised the government and parliament on the protection of personal data in relation to bills and legislative reforms (including through public submissions), e.g., in the context of the response to the COVID-19 pandemic, the use of DNA in criminal investigations, counterterrorism and tax administration.
2.ACCESS TO AND USE OF PERSONAL DATA TRANSFERRED FROM THE EUROPEAN UNION BY PUBLIC AUTHORITIES IN NEW ZEALAND
2.1.General legal framework
The limitations and safeguards that apply to the collection and subsequent use of personal data by New Zealand public authorities for criminal law enforcement and national security purposes follow from the overarching constitutional framework, specific laws regulating data access, as well as the rules that apply to the processing of personal data.
New Zealand does not have a single written constitution, but a number of statutes are of particular constitutional importance. These statutes set out principles relating to fundamental rights and freedoms that must be taken into account when developing or proposing new legislation. These include the Bill of Rights Act 1990, the Human Rights Act 1993 and the Privacy Act 2020, which are relevant for the protection of personal data.
Section 21 of the New Zealand Bill of Rights Act of 1990 guarantees the right to be secure against unreasonable search or seizure, whether of the person, property, correspondence or otherwise. This right may be subject “only to such reasonable limits prescribed by law as can be demonstrably justified in a free and democratic society”. The New Zealand Supreme Court has held that Section 21 protects against unjustified intrusions on an individual’s “reasonable expectation of privacy”
, which is directed at protecting “a biographical core of personal information which individuals in a free and democratic society would wish to maintain and control from dissemination by the state”. It applies to information that “tends to reveal intimate details of the lifestyle and personal choices of the individual”.
As described in more detail in sections 2.2.1 and 2.3.1, the general principles following from the Bill of Rights Act are reflected in specific laws that regulate the powers of law enforcement and national security authorities.
Moreover, the processing of personal information by New Zealand public authorities (including criminal law enforcement and national security authorities) is subject to the Privacy Act 2020. The Privacy Act 2020 lays down the conditions under which public authorities may use and disclose personal information; reflects the principles of purpose limitation, data accuracy, transparency and storage limitation; and provides individuals with a right to obtain access to or correction of their personal data (see section 1.1).
With respect to the activities of criminal law enforcement authorities, the Privacy Act 2020 applies in its entirety. In addition, following a reform that entered into force with the Intelligence and Security Act 2017, intelligence and security agencies are subject to the majority of the IPPs, including the Principles governing the use and disclosure of information (IPP 10 and 11), security (IPP 5), purpose limitation, data accuracy and limited data retention (IPP 1, 8 and 9) as well as the Principles providing for individual rights (IPP 6 and 7). The only principles that do not apply to personal information collected by intelligence and security agencies are IPP 2 (i.e., the general requirement to collect information directly from the individual), IPP 3 (concerning transparency) and IPP 4(b) (concerning the manner of collection).
The general limitations and safeguards described in this section can be invoked by individuals before independent administrative bodies (e.g., the Independent Police Conduct Authority), the OPC and courts to obtain redress (see sections 2.2.4 and 2.3.4).
2.2.Access and use by New Zealand public authorities for criminal law enforcement purposes
New Zealand law imposes a number of limitations on the access and use of personal data for criminal law enforcement purposes and provides oversight and redress mechanisms. The conditions under which such access can take place and the safeguards applicable to the use of those powers are described in the following sections.
2.2.1.Legal bases and applicable limitations/safeguards
Personal data transferred under the adequacy decision and processed by New Zealand agencies may be obtained by criminal law enforcement authorities by means of investigative measures under the Search and Surveillance Act, on the basis of anti-money laundering and anti-terrorist financing legislation or through voluntary disclosures.
The Search and Surveillance Act 2012 empowers law enforcement authorities to obtain evidential material (i.e., evidence of the offence, or any other item, tangible or intangible, of relevance to the investigation of the offence) in relation to an offence or a suspected offence through searches, production orders and surveillance device warrants. The information that may be collected can take different forms, such as phone call recordings, financial records and e-mails. The Act generally applies to the Police, but also governs certain activities of other law enforcement authorities, such as animal welfare inspectors, fisheries inspectors, product safety officers, food officers, forestry officers, gambling inspectors, immigration officers, etc..
The Search and Surveillance Act lays down clear and precise rules on the scope and application of these measures, thereby ensuring that the interference with the rights of individuals will be limited to what is necessary for a specific criminal investigation and proportionate to the pursued purpose. As explained in more detail below, prior judicial authorisation is in principle required in order to access personal information on the basis of the Search and Surveillance Act. It is only in exceptional cases that law enforcement authorities do not have to obtain a judicial warrant. These exceptions are specifically set out in the Act. At the same time, even in those exceptional cases, case law has clarified that a warrant is to be preferred if it is possible to obtain one without prejudicing the purpose of the search.
Specific limitations and safeguards apply to carrying out surveillance, i.e., to intercept private communications, use a tracking device, observe and record private activities, or use a surveillance device, which may in principle only take place on the basis of a judicial ‘surveillance device warrant’. Moreover, trespass surveillance (other than by means of a tracking device) and interception devices (to intercept private communications) may only be deployed to obtain information in relation to offences punishable by a term of imprisonment of seven years or more, certain offences covered by the Arms Act of 1983 and certain offences laid down in the Psychoactive Substances Act of 2013. A surveillance device warrant may only be issued if there are reasonable grounds to suspect that an offence has been/is being/will be committed and there are reasonable grounds to believe that the proposed use of the surveillance device will obtain evidence in respect of the offence.
Warrantless surveillance activities are only allowed in exceptional situations, for example for recording what an enforcement officers observes when being lawfully in private premises, when recording an oral communication with the consent of at least one of the persons involved, or in emergency situations. In emergency situations, a surveillance device may only be used if obtaining a warrant would be impracticable in the circumstances, for a period not exceeding 48 hours. The enforcement officer must have reasonable grounds to suspect that certain specific crimes described in the Act have been, are being or are about to be committed and that the use of a surveillance device is necessary to prevent it. Within one month, the enforcement officer must report to a judge whether the surveillance resulted in obtaining evidence of the relevant offense, preventing the offense from being committed or averting the emergency, as well as the circumstances in which the device was used. A judge receiving such a report may give directions as to the destruction or retention of the obtained material, order that the individual is notified or report to the chief executive of the relevant agency if he/she considers that the use of the device was not lawful.
Under the Search and Surveillance Act, a law enforcement authority may also obtain a production order to require another agency to produce documents, for instance financial records, call associated data and the content of communications that may be stored in the normal course of business. A production order may only be issued by a court if there are reasonable grounds to suspect that an offence has been committed, is being committed or will be committed and there are reasonable grounds to believe that the documents sought constitute evidential material in respect of the offense and are in the possession or under the control of the person against whom the order is sought (or will do so while the order is in force). A production order must inter alia contain information on the grounds on which the order is made, the documents required to be given and the person to whom it is directed. Production orders are in force for a maximum of 30 days after the order is issued.
In addition to disclosing information pursuant to coercive powers adopted under the Search and Surveillance Act, private operators may in certain circumstances provide information to public authorities on a voluntary basis to comply with an informal request. Depending on the nature of the information and whether there is a reasonable expectation of privacy in the specific circumstances of the case, requesting personal information by law enforcement authorities may constitute a ‘search’ within the meaning of Section 21 of the New Zealand Bill of Rights Act, in which case a judicially authorised warrant is in principle required for the request to be lawful. When receiving information on the basis of voluntary requests, criminal law enforcement authorities may only use or disclose it in accordance with the requirements described in section 2.2.2.
The conditions under which agencies are allowed to respond to informal requests are laid down in the Privacy Act 2020 and have been further clarified in guidance of the OPC. First, an agency may disclose personal information when it believes on reasonable grounds that it is necessary to avoid prejudice to the maintenance of the law, including the prevention, detection, investigation, prosecution and punishment of offences. As clarified by the OPC, this exception only covers situations where not providing the information would prejudice or be detrimental to enforcing the law, i.e., there must be a direct connection between the disclosure and the prejudice to the maintenance of the law that would otherwise arise. The OPC has also specified that the requesting law enforcement authority must provide sufficient information to allow an agency to form a view of whether there are indeed reasonable grounds to believe that the disclosure of information would be necessary. In particular, it must indicate a link between the offence being investigated and the relevance of the requested information. Moreover, when deciding whether or not to disclose, agencies must take the sensitivity or intimacy of the requested information into account. Second, an agency may disclose personal information when it believes on reasonable grounds that disclosure is necessary to prevent or lessen a serious threat to public health or public safety, or the life or health of the individual concerned or another individual. To determine whether a threat is “serious”, an agency must take into account the likelihood of the threat being realised, the severity of the consequences if the threat is realised and the time at which the threat may be realised. The information may only be disclosed to an authority that will be able to do something to prevent or lessen the threat.
2.2.2.Further use of the information collected
The processing of personal data collected by New Zealand criminal law enforcement authorities is subject to all requirements of the Privacy Act 2020, including with respect to purpose limitation, lawfulness of use and provision to third parties, international transfers, proportionality/data minimisation and storage limitation (see section 1.1). In addition, more specific requirements follow from certain statutes.
For example, the Policing Act 2008 imposes specific conditions for the disclosure of personal information by the Police to overseas authorities with corresponding functions and for a corresponding purpose. Such a disclosure may only take place if it is reasonably necessary to enable the overseas authority to perform its policing function. Moreover, personal information may only be disclosed in accordance with an international disclosure instrument (such as an international agreement or agency-to-agency agreement that must be made publicly available) or on the basis of directions issued by the Police Commissioner and made publicly available, which describe the circumstances in which personal information may be disclosed without a request from the corresponding overseas agency and set out any criteria for the disclosure.
As regards raw surveillance data, the Search and Surveillance Act sets out a specific retention period, which generally lasts until the conclusion of criminal proceedings in relation to an offence in respect of which the data was collected, or for a maximum of three years if no criminal proceedings have commenced but the data is necessary for an ongoing investigation. Any information that may not be retained within this timeframe must be deleted.
2.2.3.Oversight
The activities of New Zealand criminal law enforcement authorities are supervised by different bodies.
Within the public sector, the Government Chief Privacy Officer (GCPO) is the central entity for the management of personal information across the public sector. The GCPO is in charge with setting the vision for privacy in the public sector, developing guidance, capability building within public bodies, providing assurance to government and engagement with the Privacy Commissioner and other stakeholders. The GCPO has issued ten core expectations describing good practices for privacy management within the public sector, supported by a Privacy Maturity Assessment Framework to help agencies assess their own privacy capability and identify where and how they can make improvements.
In addition, independent oversight is ensured through different bodies: the OPC oversees law enforcement agencies’ compliance with the Privacy Act 2020, while the Independent Police Conduct Authority (IPCA) carries out general oversight of conduct, practices, policies and procedures of the New Zealand Police. The OPC and IPCA may also conduct joint reviews. For example, in 2022, the OPC and IPCA conducted a joint inquiry into the collection and use of photographs (biometric information) by the Police, which led to a number of recommendations and a compliance notice from the OPC.
In carrying out its oversight of criminal law enforcement authorities, the OPC can make use of all of its powers provided under the Privacy Act 2020. This includes the possibility to conduct general inquiries, audits (upon request of the relevant authority) and investigations (on the basis of a complaint or on its own initiative) and to endeavour to secure a settlement or assurance, reach findings, make recommendations and/or determinations and issue binding access directions and compliance notices (that can be enforced before the HRRT), as described in more detail in section 1.2.
The IPCA may investigate Police conduct/policies/procedures on the basis of a complaint or on its own motion. After conducting an investigation, the IPCA forms an opinion on whether or not any decision, recommendation, act, omission, conduct, policy, practice, or procedure which was the subject matter of the investigation was contrary to law, unreasonable, unjustified, unfair or undesirable. The IPCA may provide recommendations to the Commissioner of the Police, including a recommendation that disciplinary or criminal proceedings be considered or instituted. If no adequate and proportionate action is taken in response to its recommendations, the IPCA must send its opinion and recommendation to the Attorney-General and the Minister of Police and may provide the Attorney-General with a report to be presented to Parliament.
2.2.4.Redress
The New Zealand system offers different avenues to obtain redress, including compensation for damages.
Fifth, depending on the type of remedies sought, individuals may invoke a violation of Section 21 of the Bill of Rights Act in different procedures to obtain redress. For example, individuals can invoke Section 21 of the Bill of Rights Act in the course of judicial review proceedings to have a decision/action (e.g., a warrant) quashed. In addition, individuals may bring a civil claim for public law damages, alleging a violation of Section 21 of the Bill of Rights Act. To determine whether such compensation is an effective and proportionate remedy, the court must examine the nature of the right and the nature of the breach. In addition, any awarded sum must reflect any relevant intention behind the conduct, the duration of the breach and the ways in which the state has acknowledged the wrongdoing. Moreover, if criminal proceedings are instituted against the individual, Section 21 of the Bill of Rights Act can be invoked to challenge the admissibility of evidence if it was unlawfully obtained.
2.3.Access and use by New Zealand public authorities for national security purposes
There are two intelligence and security agencies in New Zealand, the Government Communications Security Bureau (GCSB) and the New Zealand Security Intelligence Service (NZSIS). The GCSB specialises in signals intelligence, information assurance and cybersecurity, whereas the NZSIS specialises in human intelligence activities. Both agencies may access personal information on the basis of the Intelligence and Security Act of 2017 (I&S Act), subject to specific limitations and safeguards. The objective of the I&S Act, which was the result of a significant reform in 2017 of the rules applicable to intelligence activities, is inter alia to ensure that the functions of the intelligence and security agencies are performed in accordance with New Zealand law and human rights and in a manner that facilitates effective democratic and institutional oversight).
2.3.1.Legal bases and applicable limitations/safeguards
As a general principle, the I&S Act stipulates that, when performing their functions, the intelligence agencies must act (1) in accordance with New Zealand law and all human rights obligations recognised by New Zealand; (2) independently and impartially in the performance of their operational functions; (3) with integrity and professionalism and (4) in a manner that facilitates effective democratic oversight. The Directors-General of the two intelligence and security agencies must take all reasonable steps to ensure that the agencies’ activities are limited to those that are relevant to the performance of their functions, kept free from any influence or consideration that is not relevant to the performance of their functions and politically neutral. Moreover, any cooperation with foreign jurisdictions and international organisations must take place in accordance with New Zealand law, including human rights obligations.
In June 2023 (after a previous version in 2021), 14 national security priorities were approved by the government, which direct the intelligence and security agencies’ collection of information. These priorities include, for instance, foreign interference and espionage, malicious cyber activity, national security implications of climate change, national security implications of disinformation, terrorism and violent extremism, transnational serious and organised crime, and economic security. On the basis of the I&S Act, the two intelligence and security agencies may make use of different powers to collect personal information to pursue these priorities.
First, an ‘intelligence warrant’ may authorise different activities, such as human intelligence, surveillance, the interception of private communications and searches and seizures. The I&S Act foresees a ‘Type 1’ warrant issued by the responsible Minister and the Chief Commissioner of Intelligence Warrants (for the collection of information on New Zealand citizens or permanent residents) and a ‘Type 2’ warrant issued by the responsible Minister (for the collection of information on non-New Zealand nationals or residents) intelligence warrant. An application for an intelligence warrant (Type 1 and Type 2) must be made in writing by the Director-General of the relevant agency and set out, inter alia, the details of the activity proposed to be carried out and the grounds on which the application is made (including the reasons why the legal requirements for issuing the warrant are believed to be satisfied).
A Type 1 intelligence warrant may be issued if it will enable the intelligence and security agency to carry out an activity that (1) is necessary to contribute to the protection of national security and identifies, enables the assessment of, or protects against certain harms listed in the I&S Act (e.g., terrorism or violent extremism, espionage, proliferation of weapons of mass destruction), or (2) will contribute to he international relations and well-being of New Zealand, or the economic well-being of New Zealand and there are reasonable grounds to suspect that the targeted individual is acting on behalf of a foreign person, organisation or terrorist entity. A Type 2 intelligence warrant may only be issued if the authorising Minister is satisfied that the warrant will enable the intelligence agency to carry out an activity that is necessary to contribute to the protection of national security; or will contribute to the international relations and well-being of New Zealand, or the economic well-being of New Zealand (i.e., an activity that is necessary to pursue the government’s national security priorities, as described above).
In addition to the abovementioned criteria, Type 1 and Type 2 warrants may only be issued if (1) the activity is “necessary to enable the agency to carry out its functions”; (2) the activity is “proportionate to the purpose for which it is to be carried out”; (3) the purpose of the warrant “cannot be reasonably be achieved by less intrusive means” and (4) arrangements are in place to ensure that nothing will be done in reliance on the warrant beyond what is necessary and reasonable to perform the agency’s function, all reasonably practicable steps will be taken to minimise the impact on any members of the public and any information obtained in reliance on the warrant will be retained, used and disclosed only in accordance with the law. According to the Inspector General of Intelligence and Security, the key concepts in this assessment are the principles of ‘necessity’ (i.e., “more than useful, reasonable or desirable, although not necessarily indispensable” – requiring a law enforcement authority “to make a compelling case” for the use of its powers) and ‘proportionality’ (which requires weighing different factors, such as the gravity of any adverse effects, the importance of the purpose, the anticipated benefits to be gained, the likelihood of success, any alternative ways to achieve the result sought, and any measures that can be taken to mitigate adverse effects).
Type 1 and Type 2 warrants must specify, among other information, the objective and purpose of the warrant, as well as the person or class of persons (e.g., a terrorist cell) that will be subject to the activity. The validity of an intelligence warrant may not exceed 12 months and may at any time be revoked by the responsible Minister, who may in that case require that all information collected under that warrant is destroyed.
In situations of urgency, the authorising Minister (and, for Type 1 warrants, a Commissioner of Intelligence Warrants) may allow the application for a warrant to be done orally and issue the warrant subsequently in accordance with the abovementioned criteria. Such a warrant is revoked by law 48 hours after its issue unless, before the expiry of that period, the applicant applies in writing for a warrant in accordance with the previously described procedure. Upon receiving such an application, the responsible Minister (and, for Type 1 warrants, a Commissioner for Intelligence Warrants) may either confirm or revoke the warrant. If revoked, all information obtained under that warrant must be destroyed as soon as practicable. In addition, in very urgent situations – i.e., only if the delay in making an application for an urgent issue of a warrant would defeat the purpose of obtaining the warrant – the Director-General of an intelligence agency may authorise an activity on the basis of the abovementioned criteria. In this case, the relevant Minister (and, for Type 1 warrants, the Chief Commissioner of Intelligence Warrants) must be notified and an application for a warrant must be filed within 24 hours after the authorisation is given (otherwise the warrant is revoked, and all collected information must be destroyed). Moreover, the reasons for the urgent issue of a warrant must be recorded and all urgent warrants must be sent to the Inspector-General of Intelligence and Security for review.
More generally, any unauthorised information that has been collected must be destroyed immediately after it is obtained, unless an application for a warrant is made as soon as practicable and a warrant is issued. Incidentally obtained information may only be retained for the purpose of disclosing it to the Police, the New Zealand Defence Force or another public authority (in New Zealand or overseas) if there are reasonable grounds to believe that such a disclosure may assist in (1) preventing or detecting serious crime; (2) preventing or responding to threats to the life of any person; (3) identifying, preventing or responding to threats or potential threats to security or defence or (4) preventing the death of any person who is outside the territorial jurisdiction of any country. In addition, the Director General of an intelligence and security agency must keep a register of intelligence warrants that were issued to them, which may be accessed at any time by the responsible Minister as well as the Inspector-General of Intelligence and Security (see below), and the Chief Commissioner of Intelligence Warrants, in relation to Type 1 intelligence warrants. Violations of several requirements with respect to intelligence warrants (e.g., failure to destroy information, unlawful use or disclosure of collected information, providing false or misleading information when applying for a warrant) are subject to criminal sanctions.
Second, the intelligence and security agencies may have access to business records of telecommunication network operators and financial service providers, after obtaining approval from the responsible Minister and the Chief Commissioner of Intelligence Warrants. Such approval is only granted if the Minister and Commissioner are satisfied that (1) obtaining business records is necessary to enable the carrying out of a function of the intelligence agency; (2) the privacy impact does not outweigh the importance of performing that function; (3) it would not be more appropriate to apply for an intelligence warrant; (4) there are satisfactory arrangements in place to ensure that nothing will be done beyond what is necessary and reasonable for the proper performance of a function of the agency and (5) there are satisfactory arrangements in place to ensure that obtained information will be retained, used and disclosed only in accordance with the law. The approval must state, inter alia, the circumstances in which the business records may be accessed, the business records that may be accessed, and any restrictions or conditions. An approval expires 6 months after the date on which it is granted and may be extended upon application for a subsequent approval. The Director-General of an intelligence and security agency must keep a register of all business records directions that received the approval referred to above. All business records obtained under a business records direction must be destroyed as soon as practicable if they are not required or are no longer required for the performance of the agency's functions.
Finally, the NZSIS and GCSB may obtain personal information from any public or private sector agency on a voluntary basis. In particular, the Privacy Act 2020 allows the disclosure of information (either upon request or on their own initiative) if a private entity or public authority believes on reasonable grounds that the disclosure of the information is necessary to enable an intelligence and security agency to perform any of its functions. The Director-General of an intelligence and security agency may request information if he/she believes on reasonable grounds that the information is necessary to enable the agency to perform any of its functions. Such a request must provide the details of the requested information and confirm that it is necessary for the agency to carry out its functions. To enable agencies to decide whether or not to disclose information upon request, the Director-General of an intelligence and security agency may certify that he or she believes that the relevant requirements are met. A Ministerial Policy Statement provides further guidance as to the elements to be taken into account by intelligence and security agencies when making requests for voluntary disclosure. In particular, they must consider the legality, necessity and proportionality of each request, must take reasonable steps to mitigate the impact on privacy, consider less intrusive means and, in, general, ensure that they make use of the most appropriate statutory mechanism to access personal information. Intelligence agencies must keep registers of all certificates they have issued, which may be accessed any time by the responsible Minister, as well as the Inspector-General.
2.3.2.Further use of the information collected
The processing of personal data by the two intelligence and security agencies is subject to most provisions of the Privacy Act 2020, including the Principles governing the use and disclosure of information, security, purpose limitation, data accuracy and limited data retention.
With respect to the further sharing of data with other entities, the I&S Act also imposes specific limitations. In particular, it only allows the intelligence and security agencies to share collected information with the Chief Executive of the Department of the Prime Minister and Cabinet, or other persons (whether in New Zealand or overseas) when authorised to do so by the responsible Minister. The Minister may only authorise a disclosure if he/she is satisfied that it would take place in accordance with New Zealand law and human rights obligations. A Ministerial Policy Statement on Cooperation with Overseas Public Authorities provides further guidance to intelligence agencies in this respect. For example, it requires them to comply with the following principles: legality, compliance with human rights obligations, necessity, reasonableness and proportionality, information management, and oversight. In accordance with the I&S Act, all intelligence and security agency employees are required to have regard to any relevant Ministerial Policy Statement in making any decision or taking any action.
2.3.3.Oversight
The activities of the NZSIS and GCSB are supervised by different bodies.
First, the OPC independently oversees compliance of data processing by the NZSIS and GCSB with the Privacy Act 2020. In doing so, the OPC may make use of different powers, including to conduct general inquiries, audits (upon request) and investigations (see also section 2.2.3). If, after completing an investigation, the OPC concludes that an action of an intelligence and security agency is an interference with the privacy of an individual, the OPC must issue a report setting out its opinions and reasons for that opinion. The report may include any recommendations the OPC considers appropriate and may request the intelligence and security agency to notify the OPC within a specified time of any steps the agency proposes to take in response. If the intelligence and security agency does not take steps in response to a report that the OPC considers to be adequate and appropriate within a reasonable time, the OPC may send a copy of the report to the Prime Minister, who in turn may present the report to the Parliament. In addition, the OPC may issue a binding compliance notice, which may be enforced before the HRRT in accordance with the procedure described above (see section 1.2 and 2.2.3).
2.3.4.Redress
The New Zealand system offers different avenues to obtain redress, including compensation for damages.
First, individuals have a right to obtain access to and correction of their data held by the NZSIS and GCSB under the Privacy Act 2020, under the same conditions as described under section 2.2.4. If a request to obtain access or correction to data is refused, any individual has the possibility to lodge a complaint with the OPC, that can issue a report with recommendations, that may also contain a request to notify the OPC within a specified time of any steps the intelligence agency proposes to take in response to the recommendations. If an intelligence agency does not take steps that the OPC considers to be adequate and appropriate in response to a report of the OPC within a reasonable time, the OPC can send a copy of the report to the Prime Minister, who may in turn present the report to the House of Representatives. Moreover, individuals can also enforce their right of access directly against public authorities before the ordinary courts.
Second, any individual may lodge a complaint concerning an interference with privacy by an intelligence agency with the OPC, who can issue recommendations and binding compliance notices which may be enforced before the HRRT in accordance with the procedure described above (see section 1.2 and 2.2.4).
Finally, the same judicial avenues as the ones described in section 2.2.4 (i.e., to obtain judicial review of decisions/actions of intelligence agencies, exclude illegally obtained evidence from judicial proceedings and/or obtain compensation for damages, including by invoking a violation of Section 21 of the New Zealand Bill of Rights Act) are also available against the NZSIS and GCSB.
X. SWITZERLAND
1.
RULES APPLYING TO THE PROCESSING OF PERSONAL DATA
1.1.Relevant developments in the data protection framework of Switzerland
On 26 July 2000, the Commission adopted the adequacy decision for Switzerland, following an opinion of the Article 29 Working Party of 7 June 1999. At the time of the adoption of the adequacy decision, the protection of personal data in Switzerland was mainly governed by the Federal Act on Data Protection of 19 June 1992 (FADP 1992) and its implementing Data Protection Ordinance of 14 June 1993 (DPO 1993).
Since then, there have been a number of significant developments in the Swiss data protection framework that created a higher level of convergence with the EU one. More specifically, in order to implement the data protection requirements of Convention 108 of the Council of Europe and the Schengen acquis, the FADP was subject to revisions in 2006 and 2010. On 25 September 2020, the Federal Assembly adopted a new Federal Act on Data Protection (FADP 2020) to replace the Act from 1992. The FADP entered into force on 1 September 2023. It takes into account the revised Convention 108 of the Council of Europe (Convention 108+), ratified by Switzerland on 7 September 2023, and Regulation (EU) 2016/679 (GDPR). The FADP 2020 also incorporates the content of the previous Swiss Schengen Data Protection Act, thereby implementing Directive (EU) 2016/680 (Law Enforcement Directive) with respect to data processing in the context of Schengen cooperation in criminal matters. The FADP 2020 is complemented by a new Data Protection Ordinance (DPO 2022), which was adopted by the Federal Council on 31 August 2022 and also entered into force on 1 September 2023. As explained in more detailed below, the FADP 2020 has strengthened the Swiss data protection framework in several areas.
While the core definitions (e.g., of ‘personal data’ and ‘processing’) have remained the same, the FADP 2020 brought further convergence with the GDPR, e.g., by aligning the notion of ‘controller’ and introducing new definitions that are very similar or identical to the ones used in the GDPR (e.g., of ‘processor’, ‘profiling’ and ‘data breach’). The FADP 2020 codifies the territorial scope of the Swiss data protection rules, making clear that they apply to events producing effects in Switzerland, even if they take place abroad.
The main data protection principles provided under the Swiss data protection framework that were in place at the time of the adoption of the adequacy decision have remained in place without substantial changes. This is the case for the principles of lawfulness, purpose limitation, proportionality, data accuracy, data security, and accountability. At the same time, case law and the recent reforms have further strengthened a number of principles (e.g., the principles of data minimisation and storage limitation) and introduced new obligations (e.g., with respect to transparency, data breach notification and accountability).
As regards the principle of fairness of data processing, the Federal Administrative Court confirmed in 2009 that, to ensure fairness of processing, personal data may not be collected or otherwise processed in a way that the data subject would not expect and would not agree to. Similarly, the Federal Administrative Court has also further explained the legal implications of the principle of purpose limitation, by clarifying that personal data may be processed for purposes compatible with the original purpose. The FADP 2020 codified this case law by enshrining that personal data may be collected only for specified purposes that are recognisable to the data subject and must be further processed in a manner compatible with those purposes.
Similarly, the principle of data minimisation has further developed through case law and the FADP 2020. The principle of proportionality (i.e., requiring that the processing of personal data must be carried out in good faith and in a proportionate manner) has been further clarified in case law as requiring that data must be limited to what is actually and objectively necessary for the defined purposes of processing. The FADP 2020 consolidated the principle of proportionality (as interpreted in case law) and complements it with the principle of data protection by design and by default, explicitly requiring data controllers to ensure (prior to the processing) that the processing of personal data is limited to the minimum necessary to achieve the intended purpose.
The FADP 2020 also strengthened the requirement of storage limitation, by introducing a clear obligation to destroy or anonymise data as soon as it is no longer needed for the purpose of processing. While the principle of proportionality under the FADP 1992 already implied that personal data can be stored only as long as needed for the purpose of the processing, the FADP 2020 has provided a more explicit requirement of limited data retention, in the same way as the GDPR.
Another area that has been further strengthened by the FADP 2020 concerns transparency of data processing. The FADP 1992 already contained a general principle of transparency (by requiring the controller to ensure that the collection of personal data and the purpose of its processing are evident to the data subject) and obligations to proactively inform individuals about the processing of their data in certain situations (e.g., when the processing was carried out by federal public authorities or sensitive data is processed by private operators). The FADP 2020 now requires any controller (i.e., private operators and federal public authorities) to proactively inform the individual. Where data is collected from the data subject, the data controller must at the time when data are obtained, provide the data subject at least with information on the identity and contact details of the controller, the purpose of the processing and, where applicable, the recipients or categories of recipients to whom personal data are transmitted. Where data has not been obtained from the data subject, the controller must provide the data subject with the aforementioned (and additional) information within one month or at the latest when the personal data are first disclosed to another recipient. This obligation concerns both federal administration and private entities processing personal data. Where data are transferred abroad, data subjects must be informed about the country of destination and the safeguards that are put in place.
With respect to data security, the DPO 2022 has extended previous obligations, by requiring controllers and processors to put in place technical and organisational measures appropriate to the risks in order to ensure security of data, taking into account several factors (e.g., the type of data processed, the purpose of the processing, the risks for the rights of individuals). The DPO 2022 also specifies the types of measures that controllers and processors must have in place (e.g., storage control, recovery, transport control, data integrity) and requires them to keep records of such measures. In addition, the FADP 2020 introduced a requirement for controllers to notify data breaches as soon as possible: (1) to the federal data protection authority (Federal Data Protection and Information Commissioner, FDPIC), where they are likely to result in a high risk to the data subject’s personality or fundamental rights; and, (2) to the data subject, where necessary for his or her protection or when required by the FDPIC.
This is particularly the case for the right of access. Under the FADP 1992, any individual could request information from a private controller or federal public authority as to whether data concerning him or her is being processed. The data controller was in turn required to inform the data subject of all data collected on him or her and provide additional information, including the source of the data and the purpose of the processing. Under the FADP 2020, controllers are required to provide additional information in response to an access request (including the identity and contact details of the controller, the retention period and the recipients or categories of recipients to whom personal data are disclosed), as well as any information necessary to enable them to assert their rights and to ensure the transparency of the processing. With respect to the right of correction, the FADP 2020 limits the possibility for controllers to refuse to rectify inaccurate data to situations where a statutory obligation prohibits the rectification, or the personal data is processed for archiving purposes in the public interest.
Finally, the rules on international transfers of personal data have been reinforced. As a general rule, personal data may only be transferred if the data is subject to adequate protections in the country of destination. Under the FADP 1992, the FDPIC had developed an indicative list of countries that provide an adequate level of data protection, but it remained the responsibility of the data exporter to assess whether and ensure that data will be adequately protected in a third country. With the FADP 2020, the Federal Council is in charge of deciding whether a State or international organisation offers an adequate level of protection, on which data exporters can rely to transfer data without the need to carry out their own assessment or put in place specific safeguards. The criteria to be taken into account for the evaluation of the adequacy of the level of protection are listed in Article 8 of the DPO 2022, referring inter alia to the international obligations of the country/organisation, the rule of law and respect for human rights, applicable data protection legislation and its implementation, the effective functioning of one or more independent authorities responsible for data protection, etc. A list of States, territories, specific sectors in a State and international organisations adequately protecting personal data, published in Annex 1 to the DPO 2022, includes members of the European Economic Area and most countries that have received an adequacy decision from the EU.
If a third country is not recognised as providing an adequate level of data protection, personal data may only be transferred to that country if sufficient safeguards are put in place by the data exporter and importer to ensure an adequate level of protection (e.g., by means of contractual clauses or binding corporate rules) or on the basis of specific statutory grounds (e.g., if the individual has consented to the transfer, the transfer is necessary in a specific case to safeguard an overriding public interest, the transfer is necessary in a specific case to protect the life of the data subject, etc.). The FDPIC has recognised the modernised standard contractual clauses adopted by the European Commission in June 2021 (with some modifications to adapt it to the domestic legal framework) as an instrument that can be used by Swiss data exporters for data transfers to countries without an adequate level of data protection.
1.2.Oversight, enforcement and redress
In addition, the Swiss legal framework imposes criminal sanctions (fines) for certain violations of the data protection rules by private operators. The FADP 2020 expanded the list of violations for which fines can be imposed (adding inter alia intentional infringements of the obligations to inform data subjects and cooperate with the FDPIC, violating the duty of care, and failing to comply with a decision of the FDPIC) and has imposed a maximum amount of CHF 250 000. While such fines are in principle imposed on individuals, the FADP 2020 also foresees the possibility of fining a company, where determining who in the organisation is responsible for the infringement would require disproportionate investigative efforts. Other Swiss laws, including the Swiss Criminal Code contain further criminal sanctions (custodial sentences or monetary penalties) for violations of the privacy of individuals as well (e.g., obtaining personal data without authorisation).
As regards the possibility for individuals to obtain redress, different avenues continue to be available in the Swiss system. In particular, individuals can obtain judicial redress before the civil courts (against private operators) and under the Administrative Procedure Act (against public authorities), including by directly enforcing their individual rights, obtaining the termination of unlawful processing, or claiming compensation for damages.
Finally, the FDPIC has issued a number of guidance documents (e.g., on data subject rights, cross-border data flows, the processing of biometric data, the processing of data for marketing purposes and technical and organisational measures). The FDPIC also provides assistance to individuals by answering queries, running a phone helpline and offering model letters which can be used by data subjects to exercise their rights.
2.ACCESS TO AND USE OF PERSONAL DATA TRANSFERRED FROM THE EUROPEAN UNION BY PUBLIC AUTHORITIES IN SWITZERLAND
2.1.General legal framework
The limitations and safeguards that apply to the collection and subsequent use of personal data by Swiss public authorities for criminal law enforcement and national security purposes follow from the overarching constitutional framework, specific laws regulating data access, as well as rules that apply to the processing of personal data.
The Swiss Federal Constitution recognises privacy and the protection of personal data as fundamental rights. Any restrictions of these rights must have a legal basis, must be justified in the public interest or for the protection of the fundamental rights of others, must be proportionate and respect the essence of fundamental rights. Similar rights and restrictions apply under cantonal constitutions. Pursuant to the Federal Constitution, cantonal constitutions must be compatible with federal law and the latter prevails in case of conflict. While cantonal constitutions may provide additional protections, they must at least provide for the same rights (and conditions for restrictions) as the Federal Constitution, either by directly referring to the provisions of the Federal Constitution (as is for instance done in Article 10 of the Constitution of the Canton of Zurich) or by providing for their own constitutional guarantees (see e.g., Articles 21 and 43 of the Constitution of the Canton of Geneva). Moreover, all fundamental rights guaranteed by the Federal Constitution apply directly in the entire Swiss legal system and must be respected by all state organs and public bodies at federal, cantonal and communal level.
In addition, Switzerland is a party to the European Convention on Human Rights (ECHR), which protects the right to respect for private and family life (and the right to the protection of personal data as part of it). According to settled case law in Switzerland, obligations under international law, in particular agreements such as the ECHR that deal with human rights, take precedence over federal legislation in case of a conflict. Pursuant to Article 8 of the ECHR, a public authority may only interfere with the right to privacy in accordance with the law, in the interests of one of the aims set out in Article 8(2), and if proportionate in light of that aim. Article 8 also requires that the interference is “foreseeable”, i.e., has a clear, accessible basis in law, and that the law contains appropriate safeguards to prevent abuse.
Moreover, in its case law, the European Court of Human Rights has specified that any interference with the right to privacy and data protection should be subject to an effective, independent and impartial oversight system that must be provided for either by a judge or by another independent body (e.g., an administrative authority or a parliamentary body)
. Moreover, individuals must be provided with an effective remedy, and the European Court of Human Rights has clarified that the remedy must be offered by an independent and impartial body which has adopted its own rules of procedure, consisting of members that must hold or have held high judicial office or be experienced lawyers, and that there must be no evidential burden to be overcome in order to lodge an application with it. In undertaking its examination of complaints by individuals, the independent and impartial body should have access to all relevant information, including closed materials. Finally, it should have the powers to remedy non-compliance
.
Therefore, through its adherence to the European Convention on Human Rights, as well as its submission to the jurisdiction of the European Court of Human Rights, Switzerland is subject to a number of obligations, enshrined in international law, that frame its system of government access on the basis of principles, safeguards and individual rights similar to those guaranteed under EU law and applicable to the Member States.
As described in more detail in sections 2.2.1 and 2.3.1, these general principles are reflected in specific laws that regulate the access and use of personal data for criminal law enforcement and national security purposes.
Moreover, the processing of personal data by Swiss public authorities (including criminal law enforcement and the national security authority) is subject to specific data protection rules.
Federal criminal law enforcement authorities are first of all subject to the FADP 2020, which lays down the conditions under which public authorities may use and disclose personal information; reflects the principles of purpose limitation, data accuracy, transparency and storage limitation; and provides individuals with several rights (see section 1.1 and below). The substantive provisions of the FADP 2020 do not apply to court proceedings or the processing of personal data in pending civil, criminal (including preliminary investigations of specific offences by the police and the prosecution) and international mutual legal assistance proceedings. In those cases, the processing of personal data and the rights of data subjects are regulated by other statutes, in particular the Civil Procedure Code, Criminal Procedure Code (CrimPC), Criminal Code, International Mutual Assistance in Criminal Matters Act and Administrative Procedure Act. However, the FDPIC in principle remains competent to supervise compliance by law enforcement authorities with data protection requirements either following from the FADP 2020 (i.e., outside of judicial proceedings) or from those other statutes (i.e., in the context of judicial proceedings). The only exceptions (i.e., activities/entities for which the FDPIC is not competent) are the federal courts, the Office of the Attorney General in relation to data processing as part of criminal proceedings and courts or federal authorities in relation to proceedings for international mutual assistance in criminal matters. In those cases, compliance with applicable data protection requirements is subject to the supervision of courts.
Similarly, the processing of personal data by criminal law enforcement authorities at the cantonal and communal level is subject to cantonal data protection laws and/or the CrimPC , which, as explained in section 1.1, contain key data protection principles, obligations and individual rights, and ensure supervision by an independent data protection authority or, in the context of judicial proceedings, by courts.
The processing of personal data by national security authorities is subject to specific data protection requirements in the Intelligence Service Act and accompanying Ordinances, as well as the FADP 2020, which applies to the extent no specific provisions are foreseen under the Intelligence Service Act. These different legal instruments impose key data protection principles (principles of purpose limitation, data minimisation, accuracy, security), provide individuals with data protection rights and subject the processing of personal data by intelligence agencies to independent oversight.
These safeguards, including corresponding limitations applicable to the criminal law enforcement and national security areas can be invoked by individuals before independent administrative bodies (e.g., the FDPIC, cantonal data protection authorities) and courts to obtain redress (see sections 2.2.4 and 2.3.4).
2.2.Access and use by Swiss public authorities for criminal law enforcement purposes
In Switzerland, criminal law enforcement functions are mainly carried out by cantonal and communal authorities, whereas the Federal Office of Police investigates offences falling under federal jurisdiction, such as inter-cantonal or international organised crime (e.g., terrorism and terrorist financing), corruption and money laundering. Swiss law imposes a number of limitations on the access and use of personal information for criminal law enforcement purposes by each of these authorities and provides oversight and redress mechanisms. The conditions under which such access can take place and the safeguards applicable to the use of those powers are described in the following sections.
2.2.1.Legal bases and applicable limitations/safeguards
Personal data transferred under the adequacy decision and processed by Swiss controllers and processors may be obtained by Swiss criminal law enforcement authorities at federal level by means of investigative measures under the Criminal Procedure Code (CrimPC), or on the basis of anti-money laundering and anti-terrorist financing legislation. At cantonal/communal level, access by Swiss public authorities to personal data transferred under the adequacy decision is, since 2011, also governed by the CrimPC.
The CrimPC provides Swiss criminal law enforcement authorities with a legal basis to access personal data through searches, seizures, surveillance of (the content of and/or the current metadata of) post and telecommunications, and surveillance of financial transactions. It lays down clear and precise rules on the scope and application of these measures, thereby ensuring that the interference with the rights of individuals will be limited to what is necessary for a specific criminal investigation and proportionate to the pursued purpose. Moreover, to exercise these powers, judicial authorisation is in principle required (except for instance in emergencies, as described in more detail below).
As a general requirement, the CrimPC provides that criminal law enforcement authorities must comply with the principle of good faith, may not abuse the rights of others and are prohibited from using methods that violate human dignity when obtaining evidence. In addition, the use of coercion, threats, promises, deception and methods that may compromise the ability of the persons concerned to decide freely are prohibited, also if the person consents to their use.
In accordance with the CrimPC, as an overarching requirement, any compulsory measure (including a search, seizure or surveillance of post and telecommunications) may only be taken if (1) it is permitted by law, (2) there is a reasonable suspicion that an offence has been committed, (3) the aims cannot be achieved by less stringent measures and (4) the seriousness of the offence justifies the compulsory measure.
A search of a house, dwelling or other not generally accessible premise may only be searched with the consent of the owner, or if it is suspected that there are wanted persons, that there is forensic evidence or assets that must be seized, or offences are being committed. A document, recording (audio, video or other), data carrier or equipment for processing and storing information (e.g., a computer) may be searched if it is suspected that it contains information that is liable to seizure (see below, e.g., if it is expected that the information will be used as evidence). Procedurally, a search must be authorised by a warrant issued by a public prosecutor or a court. In case of urgency, a search may be authorised orally, but such authorisation must be confirmed subsequently in writing. In principle, the proprietor must be present during the search and, as regards searches of documents, recordings, data carriers or processing equipment, has the possibility to comment on the content of the information.
The seizure of items belonging to an accused or a third party may take place if it is expected that the items will be used as evidence; will be used as security for procedural costs, monetary penalties, fines or damages; will have to be returned to persons suffering harm or will have to be forfeited. Certain items that could be used as evidence may nevertheless not be seized, such as personal records and correspondence belonging to the accused, if the interest in protecting their privacy outweighs the interest in prosecution. A seizure must be authorised by a warrant issued by a public prosecutor or a court that sets out the grounds for the seizure. In urgent cases, a seizure may also be ordered orally, in which case the authorisation must be confirmed in writing afterwards. Where there is a risk in any delay, the police may provisionally seize items on behalf of the public prosecutor or the courts.
Specific substantive and procedural limitations apply to the use of covert surveillance measures (i.e., monitoring/interception of post and telecommunications, including e-mails, communications via the internet, etc.). Covert surveillance may only be ordered by the public prosecutor (1) if there is a strong suspicion that certain specific offences (e.g., murder, serious assault, fraud, extortion, human trafficking, crimes related to narcotics, nuclear energy or weapons, etc.) have been committed, (2) the seriousness of the offence justifies the surveillance and (3) other investigative activities have been unsuccessful, or the investigation would otherwise have no prospect of success or would be made unreasonably complicated. Only the communications of the accused may be monitored, or of a third party if there is reason to believe based on specific information that the accused uses the communication service of the third party or the latter receives/transmits communications on behalf of the accused. A public prosecutor may also request metadata relating to telecommunications (1) if there is a strong suspicion that a felony or misdemeanour has been committed, (2) the seriousness of the offence justifies the request and (3) other investigative activities have been unsuccessful, or the investigation would otherwise have no prospect of success or would be made unreasonably complicated. Metadata may be requested for the six months prior to the date of the request.
Procedurally, the use of covert surveillance or the collection of metadata relating to telecommunications must first be ordered by a public prosecutor and must subsequently be authorised by a court (the Compulsory Measures Court). In particular, within 24 hours of ordering the surveillance or release of information, the public prosecutor must inform the Compulsory Measures Court of the order and the reasons therefor (and provide relevant documentation). The court must decide within 5 days to grant or refuse the authorisation, and may impose a time limit or other conditions, or request further information or investigations. An authorisation may be issued for a maximum of three months, with a possibility to extend for periods of three months at a time, again upon authorisation of the Court. The public prosecutor must stop surveillance immediately if the abovementioned requirements are no longer fulfilled or the authorisation or its extension is refused. Documents and data carriers obtained through unauthorised surveillance activities must be destroyed immediately and the results of unauthorised surveillance operations may not be used.
The surveillance of post and telecommunications is carried out with the assistance of the Post and Telecommunications Surveillance Service (PTSS), which is administratively assigned to the Federal Department of Justice and Police but performs its tasks autonomously. The PTSS operates a processing system in which it receives data requested by law enforcement authorities (in accordance with the abovementioned procedure) from telecommunication providers and makes it available to the relevant authorities. The PTSS must keep documentation on inter alia the requests it has received, related authorisations, confirmations from the providers required to cooperate about the surveillance carried out, etc.. In addition, it is required to publish annual statistics about surveillance carried out, including the measures that were used, the type of offences that were being investigated, the authorities requesting the surveillance, the duration of the surveillance and the nature of the information that was collected.
Individuals subject to surveillance must be notified thereof (as well as of the reason for, type of and duration of the surveillance) by the public prosecutor at the latest when the preliminary proceedings (i.e., the police inquiry and the investigation by the prosecutor) are concluded. This notification may only be deferred or dispensed with upon the authorisation of the Compulsory Measures Court, if the findings are not used as evidence in court proceedings and deferring or dispensing with notice is necessary to protect overriding public or private interests.
Pursuant to the CrimPC, the Compulsory Measures Court may also, at the request of the public prosecutor, order the surveillance of banking transactions, in order to investigate felonies or misdemeanours. The account holder must in this case be notified under the same conditions as described above for the surveillance of communications.
Finally, criminal law enforcement authorities may also indirectly receive personal data from the Swiss Money Laundering Reporting Office, under the Anti-Money Laundering Act (AMLA). The AMLA requires financial intermediaries (e.g., banks, investment companies, insurance institutions, securities firms, payment systems, etc.) as well as dealers (natural/legal persons that deal in goods commercially and in doing so accept cash) to report assets or cash payments for which there are reasonable grounds to suspect that they are connected to money laundering or terrorist financing to the Money Laundering Reporting Office. Similarly, authorities that are charged with the supervision of financial intermediaries (e.g., the Financial Market Supervisory Authority, the Federal Gaming Board) are also required to report to the Reporting Office if they have reasonable grounds to suspect that a money laundering or terrorist financing offence has been committed. The Reporting Office is located in the Federal Office of Police and acts as a relay point between financial intermediaries and law enforcement authorities. It must immediately notify the responsible prosecution authority if it has reasonable doubts that an offence relating to money laundering or terrorist financing has been/is being committed. The information received from the Reporting Office can only be processed by a criminal law enforcement authority in accordance with the requirements described below in section 2.2.2.
2.2.2.Further use of the information collected
The processing of personal data by federal and cantonal criminal law enforcement authorities in the context of criminal investigations/proceedings is subject to specific data protection rules laid down in the CrimPC and Criminal Code. As a general requirement, the CrimPC provides that personal data must be obtained from the individual concerned or with their knowledge, unless the proceedings would otherwise be prejudiced, or unreasonable inconvenience or expense would be incurred. If personal data is obtained without the knowledge of the individual, (s)he must be notified immediately, although such notification may be dispensed with or postponed where necessary for overriding public or private interests. When processing personal data, law enforcement authorities must distinguish between different categories of data subjects and between personal data based on facts and personal data based on personal assessments.
The CrimPC also imposes the principle of data accuracy, as well as limitations on the further use and disclosure of data in pending criminal proceedings. In particular, personal data from pending criminal proceedings may in principle only be disclosed for use in other pending proceedings if there are grounds for assuming that the data will make a significant contribution to the clarification of the facts. In some cases however, criminal law enforcement authorities are obliged to disclose such personal data on the basis of other statutes, i.e., to the Federal Intelligence Service (in order for the Service to carry out its tasks, see below section 2.3.1); in response to requests from individuals exercising their right of access with respect to different police information systems (e.g., the Schengen Information System); and to criminal police central offices (in charge of the fight against organised international crime) upon their request. In terms of data retention, the CrimPC provides that, after the conclusion of proceedings, case documents must be preserved at least until conclusion of the time limits for prosecution and for the execution of the sentence have expired.
In the context of administrative assistance on police matters or mutual legal assistance cooperation, the sharing of personal data with third country (i.e., non-Schengen) law enforcement authorities or international organisations is subject to specific limitations. In particular, such sharing may not take place if this would seriously endanger the privacy of individuals, in particular due to a lack of adequate protection. Adequate protection may be ensured by the legislation of a third country (if the country benefits from an adequacy decision adopted by the European Commission), an international treaty or specific guarantees. Exceptionally, personal data may also be disclosed if necessary in a particular case (1) to protect the life or physical integrity of an individual, (2) to prevent imminent serious danger threatening the public security of a Schengen or a third country, (3) to prevent, detect or prosecute a criminal offence, provided that disclosure does not conflict with the overriding legitimate interests of the individual, or (4) to exercise or enforce legal claims against a criminal law enforcement authority, provided that disclosure does not conflict with the overriding legitimate interests of the individual.
The processing of personal data by criminal law enforcement authorities outside of criminal proceedings (e.g., in the context of a preventative investigation or once criminal proceedings are concluded) is subject to the FADP 2020 (for federal law enforcement authorities) and cantonal data protection laws (for cantonal law enforcement authorities). For federal criminal law enforcement authorities, the FADP 2020 contains requirements on inter alia purpose limitation, data accuracy, transparency, storage limitation and data security, as described in more detail in section 1.1 As regards the sharing of personal data with third countries, the requirements for international transfers of personal data of the FADP 2020 apply. As explained in section 1.1, ssimilar obligations apply under cantonal data protection laws.
2.2.3.Oversight
The activities of Swiss criminal law enforcement authorities are supervised by different bodies.
The FDPIC supervises compliance by the federal police with the FADP 2020 and other federal data protection regulations. In particular, whereas in the past, the supervisory powers of the FDPIC only covered the processing of personal data by the federal police outside pending criminal proceedings, the FADP 2020 has extended them to all data processing by the federal police (whether before, during or after criminal proceedings). Depending on the stage of the investigation/proceedings, the FDPIC will oversee compliance with the FADP 2020 (e.g., in preventative investigations or once criminal proceedings have ended) or with the data protection provisions of the CrimPC and Criminal Code (e.g., during the criminal investigation, court proceedings and in the context of international mutual legal assistance cooperation). In exercising its supervisory role, the FDPIC can make use of all of its investigatory and remedial powers, as described in section 1.2. Compliance of the processing of personal data by the federal public prosecutor with the FADP 2020 (outside of pending criminal proceedings) and the data protection requirements of the CrimPC and Criminal Code (during criminal proceedings) is supervised by the FDPIC and the Federal Criminal Court respectively. Compliance of data processing by cantonal police and prosecutors with cantonal data protection laws (for data processing outside of criminal proceedings) and the CrimPC and Criminal Code (during criminal proceedings) is supervised by cantonal data protection authorities and courts respectively.
The activities of the federal public prosecutor are subject to independent oversight by a Supervisory Authority that may issue general instructions to the public prosecutor on the performance of its duties and monitor compliance with those instructions. It may carry out inspections and obtain information from the public prosecutor. If the Supervisory Authority finds that the public prosecutor or a deputy has breached official duties, it may take disciplinary measures (warnings, reprimands, wage reductions) and, if it considers that conditions for impeachment are met, submit a request for removal from office to the Federal Assembly. Similar oversight bodies that supervise the activities of cantonal public prosecutors exist at cantonal level.
Finally, activities of federal law enforcement authorities related to state security are subject to parliamentary oversight by the Control Delegation (CDel) of the Federal Assembly, which consists of three members of the House of Representatives (National Council) and three members of the Senate (Council of States). The CDel oversees the legality, expediency and effectiveness of such activities. In carrying out its oversight tasks, the CDel has unrestricted access to information, including secret intelligence information. According to the “Action principles of the Control Delegation” developed by the CDel itself, it may request reports, carry out regular inspections/investigations and on-site visit, etc. As a result of an investigation, the CDel can issue recommendations.
2.2.4.Redress
The Swiss system offers different avenues to obtain redress, including compensation for damages.
First, individuals can exercise different rights against criminal law enforcement authorities.
While criminal proceedings are pending, individuals have, in accordance with their right to inspect case documents, the right to information on personal data relating to them that has been processed. This applies to parties to the proceedings, as well as third parties adversely affected by procedural acts. The provision of information can only be restricted if there is a justified suspicion that the individual is abusing his or her rights or if necessary to safeguard public or private interests in preserving confidentiality. In this case, the information must be granted retrospectively and in a suitable form, as soon as the reason for the restriction no longer exists.
After the conclusion of criminal proceedings, individuals can exercise their rights under the FADP 2020 and cantonal data protection laws. Under the FADP 2020, individuals have a right of access, correction, erasure, as well as a right to object, including vis-à-vis criminal law enforcement authorities. A request for access to data may be refused, restricted or delayed if (1) this is necessary to satisfy overriding public interests, in particular Switzerland's internal or external security, or (2) providing the information may compromise an enquiry, an investigation or administrative or judicial proceedings. Case law has clarified that whether such a limitation to the right of access can be applied must be assessed on a case-by-case basis, on the basis of the concrete circumstances of a case. A refusal to provide information must be limited to what is absolutely necessary and restrictions must be subject to a balancing of interests (i.e., the existence of a public interest cannot in itself justify a restriction). Moreover, the reasons for applying a restriction must be provided in reply to the individual by the relevant public authority, which carries the burden of proof that a restriction is justified. In response to a request for deletion, a federal law enforcement authority may, instead of deleting the data, restrict its processing if this is necessary for an overriding public interest (in particular Swiss internal or external security) or deleting the data may jeopardise an enquiry,
If an individual is not satisfied with the response to his/her request, (s)he can lodge a complaint before the FDPIC, which can make use of its different enforcement powers as described in section 1.2. Moreover, the reply from a federal criminal law enforcement authority to a request to exercise individual rights constitutes a ”ruling” that can be appealed before the Federal Administrative Court in accordance with the Administrative Procedure Act (APA). In particular, an individual may for instance argue that their discretionary powers have been exceeded or abused, that the decision is inadequate, or that there has been an incorrect/incomplete determination of the legally relevant facts of the case. The Federal Administrative Court may amend the contested decision if it violates federal law or is based on an incorrect or incomplete determination of the facts of the case.
With respect to personal data processed in police information systems or in the context of international administrative assistance on police matters (within the framework of the application of the Schengen acquis), individuals are also provided with an indirect avenue to exercise their rights (introduced in the Swiss legal framework as a result of the implementation of the Law Enforcement Directive). In particular, while the police may defer providing access to information processed in police information systems if there are overriding interests related to criminal prosecution that require maintaining secrecy, it must notify the individual about his or her right to request the FDPIC to check whether any data relating to him or her is being processed lawfully and whether overriding interests in secrecy justify the postponement. Following an audit, the FDPIC informs the individual (through a standard reply) that either no data about him or her is being processed unlawfully or that, in the event of errors in the processing of personal data, an investigation under the FADP 2020 will be opened. If the individual demonstrates that it is likely that the postponement of the response will seriously and irreparably harm him/her, the FDPIC can order the police to immediately and exceptionally provide the information requested, provided that this does not constitute a threat to internal or external security.
Similarly, an individual may request the FDPIC to check whether any data relating to the data subject is being processed lawfully by competent law enforcement authorities in Switzerland in the context of administrative assistance on police matters (i.e., with other Schengen countries or with non-Schengen countries) if his/her request to obtain access, correction or deletion is restricted, deferred or refused. After carrying out an audit, the FDPIC informs the individual (using a standard formulation) that either no data about him or her is being processed unlawfully or that an investigation under the FADP 2020 has been opened. In the context of an investigation, the FDPIC can make use of all of its enforcement powers provided by the FADP 2020.
In addition, individuals are granted rights of access, correction, deletion and objection against cantonal and communal criminal law enforcement authorities under cantonal data protection laws, which can be enforced before cantonal data protection authorities and courts.
Second, individuals can lodge complaints before different bodies concerning the processing of their data by criminal law enforcement authorities under the FADP 2020. Anyone that has a legitimate interest (i.e., whose data is being processed) may request a criminal law enforcement authority to (1) stop unlawful processing of personal data, (2) redress the consequences of the unlawful processing or (3) declare the processing to be unlawful. The response from a public authority to such a request can be challenged by the individual (e.g., arguing that the decision is inadequate or that discretionary powers have been abused) before the Federal Administrative Court, which may may amend the contested decision if it violates federal law or is based on an incorrect or incomplete determination of the facts of the case. Moreover, any individual may lodge a complaint before the FDPIC or cantonal data protection authorities about compliance with the FADP 2020, data protection provisions in criminal (procedural) rules (e.g., the Criminal Code, CrimPC), and/or cantonal data protection rules. The FDPIC and cantonal data protection authorities may make use of all of their various investigatory and enforcement power, as described in section 1.2. Any decision of the FDPIC can be challenged before the Federal Administrative Court, whose decisions can in turn be challenged before the Federal Supreme Court.
Third, in the context of criminal proceedings, individuals may file an objection before an “objections authority” against any “ruling” by the federal police, the public prosecutor, federal courts of first instance and the Compulsory Measures Court (e.g., on the authorisation of a search, seizure or collection of communications). An objection may for instance concern an infringement of the law (e.g., an unlawful disclosure of personal data, or a rejection to a request for access to information), including exceeding and abusing discretionary powers, or a decision that is inequitable. In response to an objection, a court may inter alia issue a new decision, quash the contested decision, or award reasonable compensation and reparation (if compulsory measures were applied unlawfully).
Fourth, any individual that has an interest worthy of protection may request an injunction from a federal public authority that is responsible for acts based on federal law that affect rights or obligations (including a criminal law enforcement authority), i.e., that it (1) refrains from, discontinues or revokes unlawful acts, (2) rectifies the consequences of unlawful acts or (3) confirms the illegality of such acts. The response from a public authority to such a request is considered a “ruling” that can be challenged by the individual (e.g., arguing that the ruling/decision is inadequate or that discretionary powers have been abused) before the Federal Administrative Court, which may may amend the contested decision if it violates federal law or is based on an incorrect or incomplete determination of the facts of the case.
Fifth, any individual may obtain compensation for damage caused by federal public authorities (including criminal law enforcement authorities) on the basis of the Federal Act on the Liability of the Confederation, Members of its Authorities and Officials. The state will be held liable for damage caused by an unlawful activity by a civil servant in the performance of his/her duties, regardless of the culpability of that civil servant. All cantons have enacted similar laws on state liability.
Finally, after exhausting domestic remedies, any individual may obtain judicial redress before the European Court of Human Rights concerning the collection and use of their data by Swiss criminal law enforcement authorities.
2.3.Access and use by Swiss public authorities for national security purposes
In Switzerland, the main authority competent to collect personal data for national security purposes is the Federal Intelligence Service (FIS). There are no intelligence agencies at cantonal level, but each canton must designate an authority to work with the FIS, which may issue assignments to such an authority. The legal framework in which the FIS and cantonal authorities carrying out national security assignments operate is laid down in the Intelligence Service Act (IntelSA), complemented by three Ordinances: the Ordinance on the Federal Intelligence Service (FISO), the Ordinance on the FIS Information and Storage Systems (ISSO-FIS) and the Ordinance on the Supervision of Intelligence Activities (OSIA).
2.3.1.Legal bases and applicable limitations/safeguards
On the basis of the IntelSA, the FIS may access personal data transferred from the EU to Switzerland (including while in transit) as part of different activities, subject to specific limitations and safeguards.
The FIS may collect information (including personal data) for the following purposes: (1) the early recognition and prevention of threats to internal or external security resulting from certain activities (terrorism; espionage; the proliferation of nuclear, biological or chemical weapons; violent extremism and attacks on critical infrastructures); (2) to identify, observe and assess events outside Switzerland that are of security-policy significance; (3) to safeguard Switzerland’s capacity to act; and (4) to safeguard other important national interests (i.e., the basis constitutional order in Switzerland; Swiss foreign policy; or Switzerland as a location for employment, business and finance) in the event of a serious and immediate threat, where the Federal Council has issued a specific mandate to do so. The FIS may not gather or process any information relating to political activities or the exercises of freedom of speech, assembly or association in Switzerland except if there are specific indications that a person is exercising these rights in order to prepare for or carry out terrorist, espionage or violent activities.
As a general principle applicable to all FIS collection activities, the IntelSA provides that, in each case, the FIS must choose the measure that (1) is most suitable and necessary for achieving a specific information gathering objective and (2) causes the least interference with the fundamental rights of the persons concerned.
The FIS may collect information (including personal data) in Switzerland without specific external authorisation when gathering it from public sources, carrying out observations in public and generally accessible places, or when using human sources as well as in cases of issuing alerts regarding individuals and property. By contrast, the following information gathering measures require prior authorisation: surveillance of post and telecommunications; the use of special technical devices to monitor telecommunications, record transmissions or identify a person/object or ascertain their location (which may only be carried out if other surveillance techniques have been unsuccessful, would be without prospect of success or would be unreasonably difficult); the use of localisation devices; the use of monitoring devices to listen to and record conversations in non-public places; the intrusion into computer systems and networks; and the search of premises, vehicles or storage facilities.
Such measures may only be carried out if there is a specific threat to the internal or external security of Switzerland, the seriousness of the threat justifies the measure, and intelligence investigations so far have been unsuccessful or would be without prospect of success or unreasonably difficult. In terms of procedural safeguards, the FIS must first obtain authorisation of the Federal Administrative Court and, subsequently, clearance of the Head of the Federal Department of Defence, Civil Protection and Sport (DDPS). An authorisation of the Court is valid for a maximum of three months and can be extended by a further Federal Administrative Court authorisation. Once a measure has been authorised by the Court, the Head of the DDPS, after consulting in writing with the Head of the Federal Department of Foreign Affairs (FDFA) and the Head of the Federal Justice and Police Department (FDJP) decides on the clearance for the measure to be carried out.
In cases of urgency, the FIS may order the immediate use of information gathering measures requiring authorisation but must immediately inform the Federal Administrative Court and the DDPS, both of which may terminate the measure with immediate effect. An application for authorisation must in this case be filed before the Court within 24 hours and must include an explanation of the reasons for the urgency. If the measure is authorised by the Court, the DDPS, after consulting the FDFA and the FDJP, decides on clearance for the measure to be continued. Any information gathering measure requiring authorisation must immediately be terminated if the authorisation period expires, the requirements for the measure are no longer fulfilled, or authorisation/clearance is not granted. In case of the use of urgency measures, the FIS is required to ensure immediate destruction of the collected information if an application for a measure is rejected by the Federal Administrative Court or the Head of the DDPS terminates the measure or refuses clearance for continuation.
In terms of additional safeguards, the IntelSA requires the FIS to notify the individual whose information was collected within one month after the conclusion of the intelligence operation of the reason for, nature and duration of the measure. Such notification may be postponed or dispensed with if necessary to avoid jeopardising an ongoing information gathering measure or ongoing legal proceedings; if necessary due to another overriding public interest to safeguard internal or external security or Swiss or foreign relations; if the notification could cause serious danger to third parties; or if the concerned individual cannot be contacted. However, such a postponing or dispensing with notification must be authorised by the Federal Administrative Court and cleared by the DDPS in accordance with the abovementioned procedure. More generally, the FIS is required to keep written documentation on each information gathering measure, which must inter alia contain information on the authorisation and clearance, when the measure ended, as well as the notification (and/or postponing of/dispensing with such notification).
The IntelSA also provides the FIS with a legal basis to collect information about events outside of Switzerland. In this case, the FIS must ensure that the risk following from the information gathering is not disproportionate to the expected benefit and that interference with the fundamental rights of the persons concerned can be limited to what is necessary.
The FIS may obtain cable communication intelligence (e.g., internet traffic transmitted by international telecommunications cables, such as emails, internet telephony, etc.) in order to gather information about events outside Switzerland that are of significance to security and, in the event of a serious and immediate threat and in accordance with a mandate issued by the Federal Council, to safeguard important national interests (the protection of the basic constitutional order in Switzerland, supporting Swiss foreign policy and the protection of Switzerland as a location for employment, business and finance). The purposes for which such collection may take place are further specified in the FISO, which clarifies that the collection of cable communications may be carried out in specific fields: terrorism (e.g., to identify activities, lines and structures of terrorist groups), proliferation (e.g., to identify weapons of mass destruction programmes), counter-espionage (to identify activities and structures of foreign state or non-state actors), foreign actions and motives directed against Switzerland and foreign acts or conflicts affecting Switzerland (e.g., to assess the security situation or stability of the concerned foreign regimes), and cyber threat exploration and critical infrastructure protection.
The recording of cross-border signals from cable-based networks is done by the Centre for Electronic Operations (CEO) of the Swiss Armed Forces, upon a mandate issued by the FIS. To issue a mandate for cable communications intelligence, the FIS must obtain authorisation from the Federal Administrative Court, as well as a clearance from the Head of the DDPS (who must in turn consult in writing the Heads of the FDFA and FDJP). An authorisation from the Court is valid for a maximum of six months and may be extended by another Court authorisation for a maximum of three months. In cases of urgency, the same procedure as the one described above for issuing/authorising urgent information gathering measures in Switzerland applies. The CEO may only pass recorded signals on to the FIS if the content corresponds to the search parameters defined for the operation, which must be defined in such a way that their application causes as little interference as possible in the private life of persons. Search terms may for instance be the names of legal or natural persons, telephone numbers, IP addresses, etc.. The CEO receives signals from operators of cable-based networks and telecommunication service providers, who are obliged to provide the relevant information, converts them into data and assesses on the basis of the content which data meets a search parameter and therefore has to be passed on to the FIS. If the data contains information about events in Switzerland or abroad that provides evidence of a specific threat to internal security (e.g., terrorism, espionage, the proliferation of weapons of mass destruction), the data is passed unchanged to the FIS. The CEO must destroy data that does not contain any relevant information as quickly as possible.
In addition to conducting cable communication intelligence, the FIS may carry out radio communication intelligence (i.e., recording electro-magnetic emissions from telecommunication systems located abroad, in practice relating primarily to telecommunication satellites and shortwave transmitters). This type of collection may be used to gather information about events outside Switzerland that are of significance to security or in the event of a serious and immediate threat and in accordance with a mandate issued by the Federal Council, to safeguard important national interests (the protection of the basic constitutional order in Switzerland, supporting Swiss foreign policy and the protection of Switzerland as a location for employment, business and finance). The purposes for which such collection may take place are further specified in the Ordinance on Electronic Warfare and Radio Exploration, which clarifies that radio exploration may be carried out in specific fields: terrorism (e.g., to identify activities, lines and structures of terrorist groups), proliferation (e.g., to identify weapons of mass destruction programmes), counter-espionage (to identify activities and structures of foreign state or non-state actors), foreign conflicts affecting Switzerland (e.g., to assess the security the security situation or stability of regimes), army and armaments (e.g., to recognise actual or potential military conflicts), the engagement of the Swiss Armed Forces.
While the use of these measures does not require prior authorisation by a court, each mandate for radio communication intelligence must be reported to an independent oversight body, the Independent Control Authority for Radio and Cable Communications Intelligence, which verifies the legality of radio communication intelligence mandates on an annual basis. The Authority may carry out audits, issue recommendations, and request the termination of radio communication intelligence as well as the deletion of collected information. More information on the Authority and its oversight powers is provided in section 2.3.3.
According to its annual report 2023, the FIS used 92 information gathering measures (affecting 26 individuals in total), issued three cable communication intelligence orders, and issued 30 radio communication intelligence orders, in 2022.
Finally, the FIS may obtain data from other public authorities (at federal and cantonal level), which are either, under certain conditions, obliged to disclose information to the FIS upon its request, or are allowed to voluntarily share information, again under specific conditions. Such authorities are obliged to respond to a justified request from the FIS with information required to identify or repel a specific threat to internal or external security or to safeguard other important national interests. With some exceptions, public authorities may (but are not required to) share information with the FIS on their own initiative if the same conditions are met. Some authorities (e.g., courts, prosecution authorities, customs authorities, authorities responsible for diplomatic and consular matters, authorities receiving reports of money laundering and terrorist financing) are obliged to proactively report to the FIS if they identify a specific and serious threat to internal or external security.
2.3.2.Further use of the information collected
The processing of personal data by intelligence agencies is first of all subject to specific data protection obligations following from the IntelSA and its accompanying ordinances.
The FIS operates different information systems (e.g., for information about violent extremism, information that only initiates administrative processes, data from publicly accessible sources, etc.) and the IntelSA establishes for each of those systems how collected data may be used. In particular, it provides for each system which information must be recorded, for which purposes and which employees/entities can access and search the information. In accordance with the IntelSA, the FIS must assess the relevance and accuracy of personal data before recording it in its information systems and destroy any data that is not necessary to fulfil its tasks as set out in the Act. The FIS must correct or delete any incorrect data and periodically check whether personal data recorded in its information systems is still required to carry out its tasks (and if not delete such data). In addition, the FIS is required to, inter alia, verify by random sample the legality, expediency, effectiveness and accuracy of the data processing in all of the FIS’ information systems. Moreover, the ISSO-FIS imposes the principle of data security, including by referring to obligations under the FADP 2020.
Data collected through information gathering measures that require court authorisation (e.g., the content of communications collected through interception) must initially be stored separately from other information systems. Only FIS employees that have the task of carrying out the information gathering measure and evaluating the results have access to such data. Any personal data obtained through such measures that is not related to the specific threat situation for which the measure was taken may not be used and must be destroyed at the latest 30 days after conclusion of the measure. Personal data related to specific threat situations that is not used in legal proceedings or an ongoing intelligence operation must be deleted (1) within six months after the notification of the measure to the data subject concerned (including where such notification is postponed); (2) immediately after the entry into force of a court decision on dispensing with the obligation to notify the individual; or (3) immediately after the entry into force of a decision on an appeal against the measure ordered. If such data is used in an intelligence operation, it is recorded in one of the FIS’ information systems and subject to the specific requirements applying to that system. The ISSO-FIS lays down specific maximum retention periods depending on each system, with periods varying from 2 (e.g., for data from public sources) to 45 years (e.g., for data relevant to national security).
As a general requirement, before disclosing personal data to any other entity (whether in Switzerland or outside), the FIS must ensure that the disclosure is lawful and necessary in a specific case. The FIS may only disclose personal data to other Swiss authorities if this is necessary to safeguard internal or external security, unless doing so would be contrary to overriding public or private interests. The FIS may share data with other authorities for the use of the prosecution of offences, prevention of serious offences or maintaining public order, upon their request or on its own initiative. It is always required to disclose data obtained through measures requiring authorisation to a prosecution authority if the information contains specific evidence of an offence in connection with the prosecution of which the prosecution authority would have been entitled to order a comparable criminal procedural measure. Any sharing of personal data with other authorities must be recorded in writing by the FIS, including the recipient, the object and the reason for the sharing. The authorities with which personal data may be shared and the purposes for which such sharing may take place are listed in Annex 3 to the FISO, and for instance includes criminal prosecution authorities at federal and cantonal level, the Federal Department of Foreign Affairs (e.g., for the assessment of the threat situation and the security policy interests of Switzerland), the Federal Department of Home Affairs (e.g., for the enforcement of legislation on narcotics), etc.
Personal data processed by the FIS may only be disclosed to a foreign authority if it is in a country that guarantees an adequate level of data protection under the FADP 2020, or, if that is not the case, only if Switzerland maintains diplomatic relations with the relevant country and (1) Switzerland is required by law or by an international agreement to disclose the personal data to the state; (2) disclosure is required to safeguard an overriding public security interest in Switzerland or in the receiving state (such as preventing a serious criminal offence that is also qualified as such in Switzerland); (3) it is necessary in order to justify a request for information from Switzerland; (4) it is in the interest of the person concerned, who has consented to disclosure or consent may be clearly assumed in the circumstances or (5) it is necessary in order to protect the life and limb of third parties. The possibility of access online to personal data is limited to foreign security agencies whose states benefit from an adequacy decision and with which Switzerland has concluded an international agreement on international cooperation. Personal data may not be disclosed to a foreign security agency if the person concerned will be exposed to the risk of being punished twice or of serious harm to his or her life, limb or freedom under the ECHR or other international agreements that Switzerland has ratified. For each disclosure to a foreign authority, the FIS must inform the addressee of the purpose for which the latter is exclusively authorised to use the data and the fact that the FIS reserves the right to request information on such use. The FIS must keep documentation on each disclosure, the subject thereof and the recipient.
Finally, the FIS may disclose personal data to other third parties only if the individual concerned has consented to the disclosure; if the disclosure is indisputably in the interest of the individual; if the disclosure is necessary in order to repel a serious immediate danger; or if it is necessary in order to justify a request for information.
To the extent that the IntelSA and other laws/ordinances to do not provide specific data processing rules, the FADP 2020 applies (see the information provided in section 2.2.2).
2.3.3.Oversight
The activities of the FIS are supervised by different bodies.
First, the FDPIC oversees compliance of data processing by the FIS with the FADP 2020 and other federal data protection requirements (in particular those following from the IntelSA and its accompanying Ordinances). In carrying out this task, the FDPIC makes use of all of its powers, as described in section 1.2, including to adopt binding decisions.
Second, the activities of the FIS and cantonal authorities to whom the FIS has delegated tasks are supervised by the Independent Oversight Authority for Intelligence Activities (OA-IA). In carrying out its tasks, it has access to all relevant information and documents, as well as the premises of the FIS/cantonal authorities and their information systems. The OA-IA may audit these activities to confirm their legality, expediency and effectiveness. Following an audit, the OA-IA provides the DDPS with a written report, which may include recommendations. The DDPS is required to implement such recommendations and must submit any recommendation it intends to reject to the Federal Council for a decision. According to information received from the Swiss government, all recommendations from OA-IA have so far been implemented. According to its annual reports, the OA-IA issued 55 recommendations in 2020, 18 recommendations in 2021 and 13 recommendations in 2022. In 2022, the OA-IA for instance conducted audits of the information gathering management by the FIS, as well as the collection of information from telecommunication providers.
Third, the use of radio and cable communications intelligence is, in addition to the supervision by the OA-IA, also subject to oversight by a separate independent body – the Independent Control Authority (ICA). The ICA is in charge of verifying the legality of radio communication intelligence and supervising the conduct of authorised and cleared cable communications intelligence assignments given to the CEO. In particular, it may review cable network exploration applications, approval and validation decisions, analyse the results obtained via radio and cable exploration, annually verify radio exploration mandates, etc.. To carry out its oversight activities, it has access to all relevant information and facilities. In addition, the intelligence services must notify the ICA of every new radio or cable intelligence order and must provide the ICA with an updated and complete list of all keywords used and inform the ICA of completion of mandates. The ICA lay issue recommendations, request that radio communications intelligence assignments are terminated, and that collected information is deleted.
Finally, intelligence services are also subject to parliamentary oversight by the CDel of the Federal Assembly, which oversees the legality, expediency and effectiveness of activities of the intelligence services. In carrying out its oversight tasks, the CDel has unrestricted access to information, including secret intelligence information. According to the “Action principles of the Control Delegation” developed by the CDel itself, it may request reports from the intelligence services, carry out regular inspections/investigations and on-site visit, etc. As a result of an investigation, the CDel can issue recommendations addressed to the relevant intelligence service. The CDel also publishes the annual report. In 2019, the CDel concluded an investigation on the basis of a petition from an NGO, in which it included several recommendations on the processing of data by the FIS in different databases and the impact thereof on the possibility for individuals to exercise their right of access, as well as applicable retention periods.
2.3.4.Redress
The Swiss system provides different avenues to obtain redress, including compensation for damages.
First, individuals can invoke different rights against the FIS. The IntelSA specifically regulates the exercise of the right of access with respect to data processed for national security purposes (as regards data processed by the FIS for administrative or other purposes not related to national security, the IntelSA specifies that the FADP 2020 applies). The FIS will defer its response (through a standard notification) (1) if and to the extent that there are overriding interests that justify preserving secrecy that are connected with the fulfilment of the FIS’ intelligence tasks or a prosecution or other investigation; (2) if and to the extent that it is required because of overriding interests of third parties; or (3) if no data about the individual is being processed. As soon as there are no longer overriding interests in preserving secrecy and at the latest on expiry of the applicable data retention period, the FIS must provide the individual with the information required under the FADP 2020 in response to access requests, unless this would involve excessive work and expense. According to its annual report, the FIS received a total of 675 access requests (under the IntelSA and the FADP) in 2022. In 594 cases, the individuals were provided with the relevant information in response to their requests, whereas the answer was deferred in 50 cases, in accordance with the criteria of the IntelSA.
If the response is deferred, the FIS must inform the individual that he or she has the right to request the FDPIC to examine whether the data, if any, is being lawfully processed and whether overriding interests in preserving secrecy justify the deferral. Upon request from an individual, the FDPIC conducts an examination and informs the individual (through a standard notification) that either (1) no data is being processed unlawfully in relation to him or (2) that the FDPIC has found errors in the processing of the data/regarding the postponement of the information and has opened an investigation pursuant to the FAPD 2020. In the context of an investigation, the FDPIC can make use of its different investigatory and enforcement powers foreseen in the FADP 2020. In addition, the IntelSA provides that the FDPIC may order the FIS to rectify any errors in the processing of data or regarding the postponement of the reply to the individual. Moreover, if an individual credibly demonstrates that (s)he will suffer significant irreparable damage by postponing the disclosure of information in response to an access request, the FDPIC may order the FIS to immediately provide the information, provided that this does not endanger internal or external security.
In addition to a right of access, individuals also have a right of correction, erasure and a right to object with respect to personal data processed by the FIS, pursuant to the FADP 2020. In response to a request for deletion, the FIS may, instead of deleting the data, restrict its processing if this is necessary for an overriding public interest (in particular Swiss internal or external security) or deleting the data may jeopardise an enquiry, investigation or administrative/judicial procedure.
As regards the processing of personal data by cantonal bodies, when they are carrying tasks in the area of national security, individuals are granted rights of access, correction, deletion and objection under cantonal data protection laws, which can be enforced before cantonal data protection authorities and courts.
Second, individuals can lodge complaints before different bodies concerning the (unlawful) processing of their data by intelligence under the FADP 2020. Anyone that has a legitimate interest (i.e., whose data is being processed) may request a national security authority to (1) stop unlawful processing of personal data, (2) redress the consequences of the unlawful processing or (3) declare the processing to be unlawful. The response from a public authority to such a request is considered a “ruling” that can be challenged by the individual (e.g., arguing that the ruling/decision is inadequate or that discretionary powers have been abused) before the Federal Administrative Court, which may amend the contested decision if it violates federal law or is based on an incorrect or incomplete determination of the facts of the case. Moreover, any individual may lodge a complaint before the FDPIC about compliance with the FADP 2020 and data protection provisions in the IntelSA and accompanying ordinances. The FDPIC may make use of all of its various investigatory and enforcement power, as described in section 1.2.
Third, under the same conditions as explained in section 2.2.4, any individual that has an interest worthy of protection may request an injunction from an intelligence authority, whose response can be challenged by the individual before the Federal Administrative Court (whose decisions can in turn be appealed before the Federal Supreme Court). In this respect, a Supreme Court judgment has for instance clarified that, because surveillance measures in the context of radio and cable intelligence are secret and individuals are not able to demonstrate that they are individually affected (and therefore cannot establish a legal interest to challenge an individual surveillance measure), a complainant is considered to have such a legal interest if there is a sufficient probability (i.e., a “reasonable likelihood”, interpreted in accordance with the standard developed by the ECtHR) that the FIS processes their data in the context of radio and cable intelligence.
Fourth, under the same conditions as explained in section 2.2.4, any individual may obtain compensation for damage caused by federal public authorities (including criminal law enforcement authorities) on the basis of the Federal Act on the Liability of the Confederation, Members of its Authorities and Officials.
Finally, after exhausting domestic remedies, any individual may obtain judicial redress before the European Court of Human Rights concerning the collection and use of their data by Swiss intelligence agencies.
XI. EASTERN REPUBLIC OF URUGUAY
1.Rules Applying to the processing of personal data
1.1.Relevant developments in the data protection framework of Uruguay
On 21 August 2012, the Commission adopted a decision in which Uruguay was considered providing an adequate level of protection for personal data. The Article 29 Working Party had adopted a positive opinion on the level of protection of personal data in Uruguay on 12 October 2010. At the time of the adoption of the adequacy decision, the protection of personal data in Uruguay was governed by the Law 18.331 on the Protection of Personal Data and the Habeas Data Action 2008 (Ley de Protección de Datos Personales, LPDP) and Decree No. 414/009 Regulating Law 18.331 Relating to the Protection of Personal Data (Reglamentación de la ley 18.331, relativa a la Protección de Datos Personales, RPDP).
Since the adoption of the adequacy decision, certain specific aspects of the LPDP were amended in 2012 and 2015. In 2018 Uruguay started a legislative process for a more comprehensive modernisation and strengthening of its data protection regime, taking inspiration from Regulation (EU) 2016/679 (GDPR). As described in more detail below, the territorial scope of the data protection legislation was broadened and new accountability requirements were introduced, including impact assessments and data protection by design and by default, data breach notification and the appointment of data protection officers. These new provisions were introduced by Law No. 19.670 on Accountability and Budgetary Execution Balance Exercise 2017 that the Parliament of Uruguay passed in October 2018. The Law entered into force in January 2019 and has been further developed through a decree published in February 2020. Further changes to the LPDP concerning the regime applicable to the processing of biometric data were introduced through Law 19.924 of 18 December 2020. In addition, Uruguay ratified Convention 108 through Law No. 19.030 on the approval of the Council of Europe's Convention for the Protection of Individuals with Regard to Automatic Processing of Personal Data and its Additional Protocol. More recently, Uruguay has been the first country from the American continent to ratify also the modernised Convention 108 (Convention 108+).
Like the GDPR, the LPDP has a broad scope of application, applying to both private operators and public authorities. The definitions of ‘personal data’, ‘controller’, ‘processor’, ‘data subject’ and ‘processing’ (which are similar to those used in the GDPR) have not changed since the adoption of the adequacy decision. However, the amendments to the LPDP that were introduced in 2018 have further increased convergence with the GPDR by extending the territorial scope of the LPDP, subject to conditions that are similar to those in Article 3 GDPR. The LPDP now applies also to the processing of personal data by controllers or processors not established in Uruguay when they offer goods or services to data subjects in Uruguay, and to processing activities aimed at the monitoring of their behaviour. This confirms the intention of the Uruguayan legislator to strengthen the effectiveness of Uruguay’s data protection regime.
The main data protection principles and obligations that were already provided by the LPDP at the time of the adoption of the adequacy decision have remained in place without substantial changes. This is notably the case for the principles of lawfulness, purpose limitation, accuracy and data minimisation and proportionality and data retention and data security. At the same time, several principles and obligations have been further strengthened, bringing Uruguay’s data protection framework closer to the requirements of the GDPR.
With respect to the principle of data security, an obligation to report data breaches has been introduced into the LPDP. Similarly to what is required under the GDPR, a controller or processor that becomes aware of a data breach affecting the protection of personal data must inform as soon as possible the URCDP, and also the affected individuals if they have suffered a significant impact on their rights. Controllers and processors are required to adopt mitigating measures in the first 24 hours following the detection of a data breach. Once the breach has been properly managed and its effects contained, the controller must prepare a detailed report for the URCDP.
In terms of accountability, the LPDP now expressly provides that controllers and processors are responsible for any violation of the data protection law. In exercising their responsibilities, they must put in place adequate technical and procedural measures in order to ensure fair processing and they must demonstrate the effective implementation of such measures. Moreover, the reform of 2018 modernised the accountability requirements that applied under the previous regime by introducing obligations that are also part of the GDPR, in particular to implement the principles of data protection by design and by default, to appoint a data protection officer in specific cases, to carry out data protection impact assessments and to consult the URCDP prior to starting any processing activities which, according to the assessment, would result in a high risk for the individual if no measures to mitigate the risks are taken.
In addition to the strengthening of data protection principles and obligations, the protections for special categories of data (i.e., sensitive data) have been reinforced since the adoption of the adequacy decision. The LPDP already offered additional protections for most of the categories of personal data that are considered sensitive in the GDPR, i.e., for data about an individual’s ethnic origin, religion, philosophy, political opinions or sexual life, as well as for health data (including genetic data) and data revealing membership in a political organisation or trade union. In the context of the amendment of the LPDP in 2020, additional protections were introduced also for biometric data. First, a definition of biometric data processed for the purpose of uniquely identifying a natural person has been added to the LPDP and that definition is very close to the one provided by the GDPR. Second, the LPDP now provides that biometric data can be processed only after an impact assessment has been carried out. Uruguay has also ratified Convention 108+ that requires to treat genetic and biometric data uniquely identifying a person as special categories of data
. Finally, the protection of sensitive data has been strengthened more generally by requiring an impact assessment whenever the processing of special categories of data is the core business of the controller.
As regards individual rights, the rights that were already guaranteed by the LPDP at the time of the adoption of the adequacy decision have remained in place without substantial changes, including the right to obtain information about the processing, the right of access, the right to rectification and the right to object decisions based on automated processing, including profiling. Concerning the right to erasure, the URCDP has established through various decisions a ‘right to be forgotten’
similar to the one recognised in the EU (i.e., a right to the de-indexation of information available through search engines) by extending the rights to deletion and objection and drawing on the principles of purpose limitation and data accuracy set out in the LPDP. Moreover, the URCDP created an obligation for controllers assessing this type of request to carry out a balancing between the right to data protection and the rights to freedom of the press and freedom of expression. More recently, the exercise of the ‘right to be forgotten’ was upheld in a decision of a civil court which was based on the arguments used in decisions of the URCDP. The URCDP has also issued guidance and made available online tools to facilitate the exercise of individual rights
.
According to the LPDP, transfers to third countries or international organisations that do not provide an adequate level of protection according to international or regional data protection standards are in principle prohibited. The URCDP can determine which countries provide such adequate level of protection. In practice, EU/EEA Member States as well as countries or territories benefitting from an adequacy finding from the European Commission under Directive 95/46/EC (Data Protection Directive) or the GDPR have been recognised by the URCDP as countries providing an adequate level of protection. A first list of countries that were considered to provide an adequate level of protection was published in June 2009, using Uruguay's own rules and the Data Protection Directive as the standard for assessment. In June 2019, a new instruction of the URCDP modified the assessment criteria, setting the GDPR and the Ibero-American Standards approved in 2017 by the Ibero-American Data Protection Network as the standard for an adequacy finding
.
Subject to authorisation from the URCDP, data transfers to non-adequate countries or organisations can also take place if sufficient guarantees for the protection of private life and the fundamental rights and freedoms of individuals, including the exercise of individual rights, are provided. These guarantees can be provided through contractual clauses or codes of conduct within multinational companies or international organisations. The URCDP has recently issued an instruction setting out the “minimum content” of contractual clauses which ensure the level of protection required by the LPDP. These clauses must provide details of the transfer and the processing activities, including their purpose, definitions of relevant terms, rules on the use of processors and sub-processors, the obligation to notify data breaches and to put in place accountability measures, a right to information and to deletion, limited data retention and rules on onward transfers, dispute resolution clauses, clauses ensuring the exercise of individual rights and clauses on the competence of the supervisory authority, as well as rules regarding confidentiality and access to information by government authorities
.
Finally, the transfer of personal data to third countries not considered adequate is allowed in certain limited situations which are similar to the derogations recognised by the GDPR, notably where the individual has given its unambiguous consent, where transfers are necessary for the performance of contracts between the data subject and the controller, including for pre-contractual relationships, in case of important public interests and for the vital interests of the individual
.
Importantly, prior to any transfer of data to a non-adequate country or international organisation, a data protection impact assessment must be carried out. In those cases in which the impact assessment concludes that there are high risks for the protection of personal data, the data controller is required to inform the URCDP
, which can in turn exercise its role of monitoring compliance with the LPDP, including through inspections.
1.2.Oversight, enforcement and redress
The independent entity in charge of overseeing compliance with the data protection rules in Uruguay is the URCDP. The Agency can act either on its own initiative or on the basis of complaints from data subjects. It carries out a number of tasks, such as promoting public awareness in relation to data protection, giving its opinion on administrative and legislative measures relating to data protection, promoting the awareness of controllers and processors of their obligations, monitoring and informing about relevant developments regarding data protection in Uruguay and abroad, and publishing annual reports on its activities. In carrying out its supervisory duties, the Agency has access to all relevant information, as well as to the premises where processing operations are carried out or administered and where data or technical equipment are stored or used.
Under the LPDP, compliance with data protection requirements is ensured through a combination of different measures. The LPDP provides the URCDP with a broad range of powers that are similar to those foreseen in the GDPR, in particular to issue warnings, reprimands and orders (inter alia to suspend processing or engaging in Court proceedings to request the closure of a database, bring processing into compliance with the Act, implement security measures and rectify, erase or restrict processing), and to make its decisions public. The URCDP can issue fines that can amount up to 500 000 Indexed Units.
As regards the rules to establish the amounts of the fines, the URCDP issued an instruction in 2015 which groups the possible infringements of the LPDP under four categories (very minor, minor, serious and very serious infringements) and sets a range for the amount of the administrative fines for each category. The instruction also sets out the factors to be taken into account when deciding on whether to impose a fine and on its amount. Those factors are similar to the factors listed in the GDPR and include the gravity and reiteration of the infringement, previous records of the controller as well as the categories of personal data affected, the volume of the processing, the existence of security measures, the affected individual rights, the damage caused to the affected data subjects, the benefits derived from the infringing processing activities and any other circumstances relevant to assess the infringement.
As regards possibilities for individuals to obtain redress, the Uruguayan system continues to offer various avenues, including the possibility to lodge a complaint with the Data Protection Agency, obtain judicial redress directly against controllers and processors (both private operators and public authorities) through the habeas data action and to obtain compensation for damages.
The URCDP plays an active role in Uruguay and Latin America when it comes to exercising its oversight role, engaging with stakeholders and cooperating with other authorities at regional and international level.
As part of its supervisory powers, the URCDP carries out supervision and enforcement activities, including inspections, and handles notifications, written questions and complaints. For example, in 2021 the URCDP issued three administrative fines. In 2020, 14 decisions with observations to data controllers, 24 decisions including warnings and eight administrative fines, as well as 20 calls on data controllers to adapt processing activities to the requirements of the LPDP. In 2019, four administrative fines were imposed. In 2018 the URDCP issued three decisions with observations to data controllers, seven decisions including warnings and three administrative fines.
The URCDP is also active in terms of awareness-raising and providing guidance. Its website includes resources for data controllers, data processors and individuals, including the possibility to lodge complaints online and to seek advice using online tools. A new functionality allowing online data breach notification has been recently added. In the context of the Covid-19 pandemic, the URCDP advised the Government and the public on issues relating to data protection (e.g., as regards the processing of personal data in a situation of national emergency, the processing of sensitive data as part the vaccination strategy or the processing of personal data in the telework context)
.
The URCDP has also provided extensive guidance through the publication of user guides. Among the most recent are the general guide on data protection in Uruguay
, the guidance on processing by foreign controllers subject to the LPDP
, the guidance on management and notification of personal data breaches
, the guidance on how to carry out a data protection impact assessment
, the guidance on data protection officers
, the guidance on data processing activities carried out by telecommunications operators, the guidance on data processing in the education sector and the guidance for data processing activities in the public administration. The URCDP also carries out training activities addressed to public authorities, controllers and the general public. Recent examples are the workshops for data protection officers or activities with schools and public administrations.
In terms of international engagement, the URCDP held the Presidency of the Ibero American Data Protection Network from 2016 to 2020 and is also part of the Bureau of the Consultative Committee for the protection of individuals with regard to the automatic processing of personal data (Convention 108).
2.ACCESS TO AND USE OF PERSONAL DATA TRANSFERRED FROM THE EUROPEAN UNION BY PUBLIC AUTHORITIES IN URUGUAY
2.1General legal framework
When collecting and (further) processing personal data for criminal law enforcement purposes in Uruguay, public authorities are subject to precise and accessible rules governing the scope and application of a measure and imposing minimum safeguards. These limitations and safeguards follow from the overarching constitutional framework and specific laws that regulate the activities of public authorities in the areas of criminal law enforcement and national security.
First, several provisions of the Constitution of Uruguay guarantee the right to privacy. In particular, Article 28 of the Constitution provides that “the papers of private individuals, their correspondence, whether epistolary, telegraphic, or of any other nature, are inviolable, and they may never be searched, examined, or intercepted except in conformity with laws which may be enacted for reasons of public interest”; while Article 11 of the Constitution states that “the sanctity of the home is inviolable” and that “no one may enter it by night without the consent of its master, and by day only at the express order of a competent judge, in writing, and in cases determined by law”. Moreover, Article 10 of the Constitution stipulates that “private actions of persons which do not in any way affect the public order or prejudice others shall be outside the jurisdiction of the magistrates”. It should also be noted that although the Constitution does not expressly recognise the right to the protection of personal data, its Article 72 states that “the enumeration of rights, duties, and guarantees made in this Constitution does not exclude others which are inherent in human beings or which are derived from a republican form of government”. Both case law and legal doctrine interpret rights as being “inherent in human beings” when they are part of international human rights treaties to which Uruguay is a party, such as Convention 108
. Importantly, Article 1 of the LPDP expressly stipulates that “the right to the protection of personal data is inherent in human beings and it is therefore included in Article 72 of the Constitution of the Republic”.
All laws must conform to the Constitution of Uruguay
. As described in more detail in sections 2.2.1 and 2.3.1, the general principles following from the Constitution of Uruguay are reflected in the specific laws that regulate the powers of law enforcement and national security authorities.
Second, the right to privacy and important aspects of the right to the protection of personal data are also guaranteed through Uruguay’s adherence to international conventions.
This includes Uruguay’s adherence to the American Convention on Human Rights and its submission to the jurisdiction of the Inter-American Court of Human Rights
.
Pursuant to Article 11 of the Convention, everyone has the right to the protection of the law against arbitrary or abusive interference with his private life, his family, his home, or his correspondence. In accordance with Article 30 of the Convention, a public authority may only interfere with the right to privacy in accordance with laws enacted for reasons of general interest and in accordance with the purpose for which such restrictions have been established. These protections apply to all persons falling under the jurisdiction of the state parties to the Convention, irrespective of their nationality
.
The Inter-American Court of Human Rights has notably ruled that the protections offered by the right to privacy extend to telephone conversations
. In addition, the Court has specified that, to determine if an interference with the right to privacy is arbitrary or abusive, three factors must be considered: (1) it must be established by law (2) it must have a legitimate purpose, and (3) it must be appropriate, necessary and proportionate
. Regarding the first factor, the Court has clarified that the law on which the interference is based must be clear and precise with detailed rules to establish the boundaries of the restriction. This includes the specific circumstances in which the restriction applies, who can request, order and carry out the restriction, and procedurally how to implement it
.
Moreover, in 2013, Uruguay ratified Convention 108
. On 5 August 2021 Uruguay also ratified the amending Protocol creating the modernised Convention 108 (Convention 108+)
. Article 9 of Convention 108 provides that derogations from the general data protection principles (Article 5 Quality of data), the rules governing special categories of data (Article 6 Special categories of data) and data subject rights (Article 8 Additional safeguards to the data subject) are only permissible when such derogation is provided for by the law of the Party and constitutes a necessary measure in a democratic society in the interests of protecting State security, public safety, the monetary interests of the State or the suppression of criminal offences, or for protecting the data subject or the rights and freedoms of others. The guarantees set out in Convention 108 are extended to every individual regardless of nationality or residence
.
Therefore, through adherence to the American Convention of Human Rights and Convention 108, as well as its submission to the jurisdiction of the Inter-American Court of Human Rights, Uruguay is subject to a number of obligations, enshrined in international law, that frame its system of government access on the basis of principles, safeguards and individual rights similar to those guaranteed under EU law and applicable to the Member States.
Third, the LPDP’s general rights and principles apply to the processing of personal data by public authorities for law enforcement and national security purposes
, notably the rights to information
, access
, rectification
and erasure
, and the principles of lawfulness
, purpose limitation
, accuracy and data minimisation
, proportionality
, data retention
and data security
. In addition, specific safeguards are set out for processing in the law enforcement and national security area. Article 25 LPDP specifically limits the processing of personal data by law enforcement and national security authorities to what is “necessary for the strict compliance with the duties legally assigned to such bodies for national defence, public security or the suppression of crime”
. It also stipulates that law enforcement authorities shall delete personal data that is no longer necessary for the purposes that led to their storage. Moreover, Article 26 LPDP specifically confirms that data subjects may exercise their rights of access, rectification and erasure against law enforcement or national security authorities, including with respect to data that is being processed for public safety, defence, national security and law enforcement purposes. Controllers are allowed to deny, in whole or in part, requests to exercise these rights, but only to the extent necessary for specific purposes listed exhaustively in the law and similar to the purposes that allow for a restriction of data subject rights in the EU data protection framework
.
These abovementioned principles and safeguards can be invoked by individuals before independent administrative bodies and courts to obtain redress, in particular through the habeas data action (see sections 2.2.2, 2.2.3, 2.3.2 and 2.3.3).
2.2Access and use by Uruguayan public authorities for criminal law enforcement purposes
In Uruguay, criminal law enforcement functions are carried out by the National Police, the National Naval Prefecture and the National Air Police. In the specific case of financial crime, the responsible authority is the Financial Information and Analysis Unit (UIAF)
. Uruguayan law imposes a number of limitations on the access to and use of personal data for criminal law enforcement purposes and provides oversight and redress mechanisms. The conditions under which access to personal data can take place and the safeguards applicable to the use of these powers are described in the following sections.
2.2.1Legal bases and applicable limitations/safeguards
Personal data transferred from the EU on the basis of the adequacy decision and subsequently processed by Uruguayan controllers/processors may be obtained by Uruguayan law enforcement authorities by means of investigative measures under statutes providing for law enforcement access, the main one being the Criminal Procedure Code 2017 (CPC 2017)
, or on the basis of anti-money laundering and anti-terrorist financing legislation.
The CPC 2017 provides Uruguayan law enforcement authorities with a legal basis to access personal data held by controllers/processors through searches and seizures, the use of production orders or the interception of communications. It lays down clear and precise rules on the scope and application of these measures, thereby ensuring that the interference with the rights of individuals will be limited to what is necessary for a specific criminal investigation and proportionate to the purpose pursued. Moreover, as explained in more detail below, prior judicial authorisation is in principle required to exercise these powers.
More specifically, searches and seizures may only be carried out if there are reasonable grounds to believe that objects (including hard drives or other electronic devices where personal data is kept or stored) from criminal activity or objects relevant to the investigation may be found in a home or other enclosed place
. In terms of procedural safeguards, a search or seizure may only take place on the basis of a court-issued warrant
. Warrantless searches or seizures are allowed only in a limited number of exceptional circumstances set out in the CPC 2017
. The inhabitant of the premise subject to the search is always notified of the search and in principle present when it is carried out. Where this is not the case, this must be recorded in the minutes of the search
.
Illegal searches are subject to criminal sanctions. Article 287 of the Criminal Code provides that a public official who, by abusing his functions or without the formalities prescribed by law, orders or carries out a personal inspection or search, shall be punished with three to twelve months imprisonment
. Furthermore, Article 294 provides that anyone who enters another person’s home or its premises against the express or tacit will of the owner or the person acting in his stead, or who enters it clandestinely or by deception, shall be punished with three to twenty-four months imprisonment. When committed by a public official, without the conditions and formalities prescribed by law, this counts as an aggravating circumstance
.
Under the CPC 2017, the public prosecutor may also order the production of public or private documents that are relevant to an investigation
. Whoever is in possession of the requested documents is obliged to immediately produce them or hand them over to the public prosecutor, unless he invokes a legitimate reason
for not doing so, in which case it will be for the court to take a decision
. Furthermore, the Public Prosecutor’s Office may request from public or private institutions all necessary information that is available in their records for the investigation to be carried out, provided that the disclosure of such information does not imply interferences with the fundamental rights and guarantees applicable to individuals, including the right to privacy
. Communications between the accused and his defence counsel or persons covered by professional secrecy may not be admitted as evidence or used in any other way
.
Specific limitations and safeguards apply to the interception of communications
. This power may only be used in the context of a criminal investigation and on the basis of a judicial warrant
. An interception of communications may be authorised “when there is sufficient evidence to consider that a punishable offence has been or may be committed”
. Importantly, the Court of Appeals in Criminal Matters No. 2 has ruled that the judge, when assessing the application for an interception warrant, must always review the proportionality of the measure in light of the circumstances of the case and assess whether there are no other effective, less intrusive means of collecting evidence available
. This standard is also enshrined in Article 208(1) CPC 2017, which provides that the judge’s decision (which must be well-founded) must “expressly consider the necessity and proportionality of the measure with respect to the restriction of the exercise of the limited right, under penalty of nullity”. In addition, based on settled case-law of the Inter-American Court of Human Rights, any interference with the inviolability of communications must be provided for by law, pursue a legitimate aim and comply with the requirements of suitability, necessity and proportionality
.
Procedurally, interception requests must be submitted by the prosecutor to the competent judge
. An interception warrant is only valid for a – non-renewable – maximum period of six months
. The interception must be stopped if the reasons used to authorise the measure no longer exist, or once the interception warrant has expired
.
Specific rules govern investigative activities with respect to the prevention of money laundering and the financing of terrorism. In this respect, Article 62 of Law No 19.574 allows the use of electronic surveillance as part of a criminal investigation into any of the serious crimes listed in Articles 30 to 33 of the Law (money laundering offences) and in Article 34 of the Law (so-called “predicate offences” that precede the crime of money laundering, such as drug trafficking and related crimes)
. As is the case with regard to the interception of communications under the CPC 2017, electronic surveillance measures that interfere with the inviolability of communications are only allowed insofar these measures are suitable, necessary and proportionate. This follows from the previously mentioned case-law of the Court of Appeals in Criminal Matters No. 2 and the Inter-American Court of Human Rights
.
Procedurally, Article 62 of the Law prescribes that requests for electronic surveillance must be submitted by the public prosecutor’s office to the competent court and must be reasoned. The competent court is responsible for the supervision of the process. The results of the surveillance activities must be transcribed in certified records so that they can be incorporated into the proceedings. Once the defence council of the defendant has been appointed, the proceedings must be made available to it for its control and analysis, and the material must be submitted to the defendant for the recognition of voices and images.
Illegal wiretapping and related conduct are subject to criminal sanctions. Those who open, intercept, destroy or hide correspondence, parcels, and other postal objects with the intention of taking possession of their content or of disrupting their normal course may be punished with one year of imprisonment or up to four years of penitentiary. When the offender is a public official, this is considered an aggravating circumstance
.
Finally, Article 12 and 13 of Law No. 19.574 impose an obligation on persons and undertakings subject to the law, such as financial institutions
, to report to the UIAF, on their own initiative, any suspicious transaction, carried out or not, and any financial transaction involving assets suspected of being illegitimate
. Prior to notifying the UIAF, persons and undertakings subject to the law are required to identify their clients and take certain customer due diligence measures, including identifying the beneficial owner of the account or transaction (taking reasonable measures to verify its identity), gathering information on the purpose of the commercial relationship and the nature of the business to be conducted and monitoring the business relationship
. They are furthermore required to keep records of all transactions carried out with or for their customers, both national and international, including all the information obtained during the due diligence process, for a minimum period of five years after the end of the business relationship or after the conclusion of the occasional transaction or for a longer period of up to ten years, in accordance with the provisions of the regulations. This information must be sufficient to allow for the reconstruction of transactions and to constitute elements of evidence in court, if necessary, and be available to the supervisory authorities and the competent criminal court upon request
.
2.2.2Further use of the information collected
The further use of data collected by Uruguayan criminal law enforcement authorities on one of the grounds referred to in Section 2.2.1, as well as the sharing of such data with a different authority for purposes other than the ones for which it was originally collected (so-called ‘onward sharing’), is subject to safeguards and limitations.
First, the LPDP contains specific protections for personal data that is processed by public authorities for law enforcement purposes, as explained in section 2.1. With respect to onward sharing, it follows from Article 25 LPDP that the dissemination of personal data by these authorities is limited to what is strictly necessary for the fulfilment of their respective tasks. In addition, Article 25 LPDP provides that personal data that is collected for law enforcement purposes must be deleted when they are no longer necessary for the purposes for which they were stored.
Second, the different laws that allow for data collection by criminal law enforcement authorities in Uruguay impose specific limitations and safeguards as to the use and further dissemination of the information obtained in exercising the powers they grant.
As regards the powers of search and seizure, the CPC 2017 provides that the assets subject to seizure shall be registered and duly individualised, and a record shall be kept of the person who assumes the depositary
. The public prosecutor or the administrative authority, with the authorisation of the court, may return the seized objects to the victim or to third parties
.
With respect to the interception of communications, the CPC 2017 stipulates that intercepted, recorded or registered material which is not incorporated into the investigation shall be destroyed, unless a court order to the contrary is made for good reason to keep it on file for the maximum duration of the investigation
. In a similar vein, Article 62 of Law No. 19.574 provides that the court must discard material obtained through electronic surveillance that does not relate to the subject matter of the investigation. On the other hand, the court is required to preserve and safeguard the electronic media containing the obtained material until the sentence has been served.
In terms of investigative measures carried out in the context of the fight against money laundering and terrorism financing, Law No. 19.574 provides that the UIAF may disclose information relating to unusual or suspicious transactions to public authorities specialised in combating money laundering and its predicate offences, when it considers the participation of such authorities essential to complete ongoing investigations, for the purpose of obtaining the elements of judgment necessary to link the transactions under investigation with the aforementioned offences and to enable the competent criminal court to be informed
.
Finally, rules on mutual legal assistance in criminal matters are provided for by Law No. 19.574. These rules only apply to requests for legal assistance from foreign authorities for the investigation or prosecution of the money laundering offences referred to in Articles 30 to 33 of the law and the predicate offences referred to in Article 34 of the law. Article 72 of the law provides that in cases of requests for legal assistance in criminal matters concerning searches, lifting of the bank secrecy, seizure, confiscation and delivery of any object, including, inter alia, documents, records or effects, the acting national court shall process the request if it determines that the request contains all the information justifying the measure requested. Such measure shall be subject to the procedural and substantive Uruguayan law.
2.2.3Oversight
Different bodies provide oversight over the processing of personal data for criminal law enforcement purposes by the relevant authorities of Uruguay.
First, the URCDP is competent to oversee compliance with the LPDP’s rights and principles in the context of processing activities carried out by criminal law enforcement authorities. Furthermore, the URCDP oversees compliance with the specific safeguards set out in Article 25 LPDP (see section 2.1 above). If the URCDP finds an infringement of the LPDP, it provides the relevant public authority with a reasoned decision, stating that the facts investigated constitute an infraction, who is responsible for that infraction, and the sanction to be applied
. For example, in 2019 the URCDP delivered a number of opinions and reports addressed to the National Secretariat for the Fight against Money Laundering and Terrorist Financing
. One opinion dealt with the question whether it was lawful for the Secretariat to publish the resolutions that impose sanctions to reporting entities
.
Second, the National Institution for Human Rights and the Ombudsman (INDDHH) adds another layer of independent oversight. The INDDHH is a specialized institution of the legislative branch, tasked to defend, promote and protect fundamental rights recognised by the Constitution and international law
. It is headed by the Board of Directors, a collegiate body whose five members are elected by the Uruguayan Parliament
. The INDDHH is competent to investigate alleged human rights violations at the request of a party or of its own initiative, and to report on the human rights situation at national, departmental or local level
. The independence of the INDDHH is guaranteed by law
and in carrying out its investigations the INDDHH has access to all relevant information and can access all relevant premises
.
Based on the findings of its investigation, the INDDHH may propose
to the competent authorities the adoption of the measures it deems appropriate to put an end to the human rights violation it has found and establish the time period within which they must be complied with, suggesting the reparation measures it deems appropriate
. In urgent cases, it may propose (at any stage of the proceedings) the adoption of interim measures in order to cease alleged violations of human rights or to prevent harm or further damage. Moreover, in that case it may also turn to the judiciary in order to request the precautionary measures it deems appropriate, and to file appeals for “amparo” or “habeas corpus” (see next section)
. If the INDDHH through an investigation becomes aware of potential crimes committed by public authorities, it must bring it to the attention of the competent courts
. The Ombudsman is required to lay an annual report before Parliament which must contain, inter alia, an account of the number and types of complaints submitted, those that have been rejected and the reason for their rejection, as well as those that have been investigated and their outcome
. According to the last figures available, the INDDHH handled 617 cases and issued 127 resolutions in 2022
.
2.2.4Redress
The Uruguayan system offers different (judicial) avenues to obtain redress, including compensation for damages.
First, individuals have a right to obtain access to and rectification or deletion of their data held by public authorities.
Article 14 LPDP provides that any data subject has the right to obtain all information about him- or herself held in public or private databases
. In addition, Article 15 LPDP stipulates that, subject to certain conditions, any natural or legal person shall have the right to request the rectification, updating, inclusion or erasure of personal data relating to him/her included in a database
. Both the right of access and the right to rectification or deletion may be exercised free of charge
. The relevant public authority may only refuse requests based on the right of access and the right to rectification and deletion to the extent necessary for the purpose of safeguarding certain important public interest (i.e., the defence of the State or public security, the protection of the rights and freedoms of third parties or the needs of investigations being carried out)
. These exemptions are not absolute but require the relevant authority to decide on a case-by-case basis whether to invoke them, after balancing the relevant interests at stake, including the privacy interests of the individual concerned
. In addition, Article 26 LPDP gives individuals the right to ask the URCDP to check the decision of the relevant public authority when access, rectification or deletion requests are rejected. The URCDP must then determine whether the decision was appropriate (or not) in view of the documents and justification provided by the authority. As will be explained in more detail below, individuals whose requests have been denied also have the possibility to pursue the special judicial remedy of ‘habeas data’ to gain access to their data or to have that data rectified or deleted
.
Second, any individual may lodge a complaint with the URCDP concerning processing activities carried out by criminal law enforcement authorities. As described in section 2.2.3, if the URCDP finds a violation of the LPDP, it provides the relevant public authority with a decision stating that the facts investigated constitute an infraction, who is responsible for the infraction and the administrative sanction to be applied. Decisions of the URCDP may be challenged before the Court of Administrative Litigation in accordance with Decree Law No. 15.524
. The court may declare the decision void, in which case the URCDP will have to take a new decision, taking the judgement of the court into account
.
Third, judicial redress is available to all data subjects through the habeas data action or the writ of amparo.
Through the habeas data action every person may enforce the right to access any personal data processed by public or private entities concerning him or her, as well as to receive information on the purposes of processing. In addition, the individual may seek rectification, insertion, deletion or review of his or her personal information in cases of error, misrepresentation, discrimination, data outdated or prohibition to process data
. The LPDP provides the conditions for a habeas data action before courts against actions by public authorities
. Once the deadline for the controller to either provide the information requested by the data subject, or to correct, delete or update the information, has expired and the controller has not complied with the request, or if the data subject considers the response insufficient, s/he may initiate a judicial habeas data procedure
.
After having exhausted all available judicial and administrative remedies, individuals can also file a writ of amparo against any act, omission or deed of the relevant public authority that in their opinion, injures, restricts, alters or threatens, with manifest illegitimacy, any of their rights and freedoms expressly or implicitly recognised by the Uruguayan Constitution (which, as explained in section 1.1., includes the right to protection of personal data)
. If the writ is granted, individuals can obtain an injunction containing a “precise determination of what must or must not be done” to remedy the violation of the right or freedom at stake
.
Fourth, judicial redress is also available via the general civil law actions available against public authorities, including law enforcement authorities. Based on Article 12 LPDP and the general regulations of Uruguayan civil law, and in particular of its Civil Code, any interested party who has suffered damages as a consequence of their personal data being processed may request the relevant redress. Said redress may include the material damages suffered as well as moral damages.
Finally, once all national law remedies are exhausted, data subjects may bring their case before the Inter-American Commission of Human Rights.
2.3Access and use by Uruguayan public authorities for national security purposes
In Uruguay, the State Strategic Intelligence Secretariat (SIEE) and certain entities carrying out intelligence and counterintelligence tasks within the ministries of Interior, National Defence, Foreign Affairs and Economy and Finances may access personal data transferred from the EU to Uruguay for national security purposes
. The SIEE is the highest-ranking intelligence agency in Uruguay and the head of the so-called National Intelligence System
. The SIEE is tasked – among others
– to “produce strategic intelligence in order to support strategic decision-making aimed at achieving national objectives”
and to “provide for the application of intelligence and counter-intelligence measures in order to detect and deal with threats to the State”
. The relevant powers of the SIEE and the other intelligence agencies, as regulated by the National Intelligence Act and its regulatory decree
, are described in the following sections.
2.3.1Legal bases and applicable limitations/safeguards
Based on the National Intelligence Act, the SIEE and the other intelligence agencies may access personal data transferred to Uruguay as part of different activities, which are subject to specific limitations and safeguards following from the National Intelligence Act itself, the LPDP, the Uruguayan Constitution, and case law.
As an exercise of public authority, government access for national security purposes in Uruguay must be carried out in full respect of the law (legality principle)
. In particular, pursuant to Article 6 of the National Intelligence Act, each intelligence agency must take the necessary measures to ensure its strict compliance with “the regulations in force on the management and use of personal data”. As such, based on 25 LPDP, the accessing of personal data transferred from the EU to Uruguay by the SIEE and other intelligence agencies for national security purposes may only take place in so far this is necessary for the performance of their legal duties. In a similar vein, in accordance with Article 5(e) of the National Intelligence Act, only the necessary information may be collected (principle of balancing).
Based on Article 20 of the National Intelligence Act, any intelligence agency belonging to the National Intelligence System may obtain relevant background information, including personal data, necessary for the fulfilment of the specific operational mission of that intelligence agency, by carrying out “special procedures that may affect the freedom and privacy of citizens”. Such special procedures include: (1) surveillance of telephone, computer, radio communications or correspondence in any of its forms, (2) surveillance of information systems and networks, (3) electronic listening and tapping, including of audio-visual communications and (4) interception of any other technological system intended for the transmission, storage and processing of communications or information
. Any intelligence activity involving the use of these “special procedures that may affect the freedom and privacy of citizens” may only be carried out when authorised by a judicial warrant
. Moreover, in accordance with the case-law of the Inter-American Court of Human Rights mentioned in section 2.2.1 with respect to the interception of communications under the CPC 2017, any surveillance measures that interfere with the inviolability of communications are only allowed insofar these measures are suitable, necessary and proportionate.
The use of the abovementioned powers is also subject to limitations and safeguards that are specifically designed to prevent their (mis)use, and to ensure the protection of fundamental rights, including those guaranteed by Article 10, 11 and 72 of the Uruguayan Constitution. In particular, the National Intelligence Act provides that no intelligence agency may (1) carry out repressive tasks or perform, on their own, police or criminal investigation functions, unless such activity is within their specific legal duties or mandated by court order in the framework of a specific case, (2) intervene in the political, social or economic activity of the country, in its foreign policy or in the internal life of political parties, or (3) influence in any way public opinion, individuals, the media, associations or groups of any kind
.
Finally, violations of the above-mentioned rules are subject to criminal sanctions, as detailed in section 2.2.1.
2.3.2Further use of the information collected
The LPDP contains specific protections for personal data that is processed by the SIEE and other bodies that make up the National Intelligence System for national security purposes, as explained in section 2.1. In addition, the National Intelligence Act imposes specific limitations on the further sharing of data, including personal data, with other entities inside or outside Uruguay. When sharing data with each other or with third parties, intelligence agencies must observe the principle of balancing, requiring that the dissemination of data they have collected is limited to what is strictly necessary for the fulfilment of their respective tasks
. Intelligence agencies are furthermore prohibited from revealing or divulging any type of information acquired in the exercise of their functions, outside the provisions of the National Intelligence Act, except in the case of a court order
.
2.3.3Oversight
The activities of Uruguayan national security authorities are supervised by different bodies.
First, as explained in more detail in sections 2.1 and 2.2.3, the URCDP is competent to oversee compliance with the LPDP’s rights and principles in the context of processing activities carried out by national security authorities. This includes overseeing compliance with the specific safeguards set out in Article 25 LPDP, which notably limits the processing of personal data by law enforcement and national security authorities to what is “necessary for the strict compliance with the duties legally assigned to such bodies for national defence, public security or the suppression of crime”
.
Second, as explained in more detail in section 2.2.3, INDDHH carries out independent oversight over the respect for fundamental rights, recognised by the Constitution of Uruguay and international law, by public authorities. This includes authorities responsible for protecting national security.
Third, parliamentary oversight in the area of national security is ensured by the Bicameral Commission for the Control and Supervision of the National Intelligence System, which has been active since May 2020. The Commission was created by the National Intelligence Act as an independent review mechanism composed of members of the two legislative chambers covering all the parliamentary parties
. It is charged with the control and supervision of all the activities carried out in the context of the National Intelligence System
. The government is obliged to provide the Commission with detailed information concerning the general activities of the intelligence bodies as well as on events of particular relevance
. To perform its oversight role, the Bicameral Commission may initiate ex officio investigations
. If the investigation leads to the suspicion of a criminal offence, the Commission may recommend that the case be referred to the competent criminal court for further investigation
.
The Bicameral Commission has access to all the information or documentation it requests from the bodies that make up the National Intelligence System. Such access may only be denied for imperative reasons listed in the law, notably the protection of sources or the protection of the identity of third parties
. The invocation of these exemptions is regarded as an ultimum remedium; the exemptions must be interpreted restrictively, and their use strictly limited
.
The Bicameral Commission is actively performing its duties. It holds regular meetings to discuss topics and issues related to the functioning of the National Intelligence System and to exercise its oversight role. For example, in the past three years the Commission has held several meetings with the Director of the SIEE, to discuss topics such as the work of the SIEE, the National Intelligence Policy, the National Intelligence Plan and the SIEE’s annual report
.
2.3.4Redress
The Uruguayan system offers different avenues to obtain redress, including compensation for damages.
First, individuals have a right to obtain access to and rectification or deletion of their data processed by the SIEE or other bodies that are part of the National Intelligence System, as described in more detail in sections 2.1 and 2.2.4
.
Second, any individual may lodge a complaint with the URCDP concerning processing activities carried out by national security authorities, as explained in section 2.2.4.
Third, judicial redress may be sought via a habeas data action or writ of amparo against the SIEE or other bodies that are part of the National Intelligence System, subject to the same conditions described in section 2.2.4.
Fourth, the same judicial avenues as the ones described in section 2.2.4 are also available against the SIEE and the other bodies that are part of the National Intelligence System.
Finally, once all national remedies are exhausted, data subjects may bring their case before the Inter-American Commission of Human Rights.