This document is an excerpt from the EUR-Lex website
Document 02019D1765-20200717
Commission Implementing Decision 2019/1765 of 22 October 2019 providing the rules for the establishment, the management and the functioning of the network of national authorities responsible for eHealth, and repealing Implementing Decision 2011/890/EU (notified under document C(2019) 7460) (Text with EEA relevance)Text with EEA relevance
Consolidated text: Commission Implementing Decision 2019/1765 of 22 October 2019 providing the rules for the establishment, the management and the functioning of the network of national authorities responsible for eHealth, and repealing Implementing Decision 2011/890/EU (notified under document C(2019) 7460) (Text with EEA relevance)Text with EEA relevance
Commission Implementing Decision 2019/1765 of 22 October 2019 providing the rules for the establishment, the management and the functioning of the network of national authorities responsible for eHealth, and repealing Implementing Decision 2011/890/EU (notified under document C(2019) 7460) (Text with EEA relevance)Text with EEA relevance
ELI: http://data.europa.eu/eli/dec_impl/2019/1765/2020-07-17
02019D1765 — EN — 17.07.2020 — 001.001
This text is meant purely as a documentation tool and has no legal effect. The Union's institutions do not assume any liability for its contents. The authentic versions of the relevant acts, including their preambles, are those published in the Official Journal of the European Union and available in EUR-Lex. Those official texts are directly accessible through the links embedded in this document
COMMISSION IMPLEMENTING DECISION 2019/1765 of 22 October 2019 providing the rules for the establishment, the management and the functioning of the network of national authorities responsible for eHealth, and repealing Implementing Decision 2011/890/EU (notified under document C(2019) 7460) (OJ L 270 24.10.2019, p. 83) |
Amended by:
|
|
Official Journal |
||
No |
page |
date |
||
COMMISSION IMPLEMENTING DECISION (EU) 2020/1023 of 15 July 2020 |
L 227I |
1 |
16.7.2020 |
COMMISSION IMPLEMENTING DECISION 2019/1765
of 22 October 2019
providing the rules for the establishment, the management and the functioning of the network of national authorities responsible for eHealth, and repealing Implementing Decision 2011/890/EU
(notified under document C(2019) 7460)
(Text with EEA relevance)
Article 1
Subject matter
This Decision provides the necessary rules for the establishment, the management and the functioning of the eHealth Network of national authorities responsible for eHealth, as provided for by Article 14 of Directive 2011/24/EU.
Article 2
Definitions
For the purposes of this Decision:
‘eHealth Network’ means the voluntary network connecting national authorities responsible for eHealth designated by the Member States and pursuing the objectives laid down in Article 14 of Directive 2011/24/EU;
‘National Contact Points for eHealth’ means organisational and technical gateways for the provision of Cross-Border eHealth Information Services under the responsibility of the Member States;
‘Cross-Border eHealth Information Services’ means existing services that are processed via National Contact Points for eHealth and through a core service platform developed by the Commission for the purpose of cross-border healthcare;
‘eHealth Digital Service Infrastructure for Cross-Border eHealth Information Services’ means the infrastructure that enables the provision of Cross-Border eHealth Information Services via National Contact Points for eHealth and the European core service platform. This infrastructure includes both generic services, as defined in Article 2(2)(e) of Regulation (EU) No 283/2014, developed by the Member States and a core service platform, as defined in Article 2(2)(d) therein, developed by the Commission;
‘other shared European eHealth Services’ means digital services that may be developed in the framework of the eHealth Network and shared between Member States;
‘governance model’ means a set of rules concerning the designation of bodies participating in decision-making processes concerning the eHealth Digital Service Infrastructure for Cross-Border eHealth Information Services or other shared European eHealth Services developed in the framework of the eHealth Network, as well as description of those processes;
‘application user’ means a person in possession of a smart device who has downloaded and runs an approved contact tracing and warning mobile application;
‘contact tracing’ means measures implemented in order to trace persons who have been exposed to a source of a serious cross-border threat to health within the meaning of Article 3(c) of Decision No 1082/2013/EU of the European Parliament and of the Council ( 1 );
‘national contact tracing and warning mobile application’ means a software application approved at national level running on smart devices, in particular smartphones, designed usually for wide-ranging and targeted interaction with web resources, which processes proximity data and other contextual information collected by many sensors found in the smart devices for the purpose of tracing contacts with persons infected with SARS-CoV-2 and alerting persons who may have been exposed to SARS-CoV-2. These mobile applications are able to detect the presence of other devices using Bluetooth and exchange information with backend servers by using the internet;
‘federation gateway’ means a network gateway operated by the Commission through a secure IT tool that receives, stores and makes available a minimum set of personal data between Member States’ backend servers for the purpose of ensuring the interoperability of national contact tracing and warning mobile applications;
‘key’ means a unique ephemeral identifier related to an application user reporting to have been infected with SARS-CoV-2, or who may have been exposed to SARS-CoV-2;
‘verification of infection’ means the method applied for confirming an infection with SARS-CoV-2, namely whether this was self-reported by the application user or resulted from confirmation from a national health authority or a laboratory test;
‘countries of interest’ means the Member State, or Member States, where an application user has been in the 14 days prior to the date of upload of the keys and where he has downloaded the approved national contact tracing and warning mobile application and/or has travelled;
‘country of origin of the keys’ means the Member State where the backend server that uploaded the keys to the federation gateway is located;
‘log data’ means an automatic record of an activity in relation to the exchange of, and access to, data processed through the federation gateway, that show in particular the type of processing activity, the date and time of the processing activity, and the identifier of the person processing the data.
Article 3
Membership of the eHealth Network
Member States wishing to participate in the eHealth Network shall notify the Commission in writing of:
the decision to participate in the eHealth Network;
the national authority responsible for eHealth which will become a Member of the eHealth Network, as well as the name of the representative and that of his/her alternate.
Members shall notify the Commission in writing of the following:
their decision to withdraw from the eHealth Network;
any change in the information referred to in point (b) of paragraph 2.
Article 4
Activities of the eHealth Network
In pursuing the objective referred to in Article 14(2)(a) of Directive 2011/24/EU the eHealth Network may, in particular:
facilitate greater interoperability of the national information and communications technology systems and cross-border transferability of electronic health data in cross-border healthcare;
provide guidance to Member States, in cooperation with other competent supervisory authorities, in relation to sharing health data between Member States and empowering citizens to access and share their own health data;
provide guidance to Member States and facilitate the exchange of good practices concerning the development of different digital health services, such as telemedicine, m-health, or new technologies in the area of big data and artificial intelligence, taking into consideration ongoing actions at EU level;
provide guidance to Member States as regards supporting health promotion, disease prevention and improved delivery of healthcare through better use of health data and by improving digital skills of patients and healthcare professionals;
provide guidance to Member States and facilitate voluntary exchange of best practices on the investments in digital infrastructure;
provide guidance, in collaboration with other relevant bodies and stakeholders, to Member States on the necessary use cases for clinical interoperability and the tools for achieving it;
provide guidance to the Members on security of the eHealth Digital Service Infrastructure for Cross-Border eHealth Information Services or other shared European eHealth Services developed in the framework of the eHealth Network, taking into account legislation and documents elaborated at Union level in particular in the area of security, as well as recommendations in the field of cybersecurity, working in close cooperation with the Network and Information Security Cooperation Group and with the European Union Agency for Network and Information Security and with national authorities, where relevant;
provide guidance to the Member States on the cross-border exchange of personal data through the federation gateway between national contact tracing and warning mobile applications.
Article 5
Functioning of the eHealth Network
The eHealth Network shall elaborate, together with the Commission, the governance models of the eHealth Digital Service Infrastructure for Cross-Border eHealth Information Services and participate in that governance by:
agreeing on the priorities of the eHealth Digital Service Infrastructure, and overseeing their operation;
drawing up guidelines and requirements for the operation, including the selection of the standards used for the eHealth Digital Service Infrastructure for Cross-Border eHealth Information Services;
agreeing whether the Members of the eHealth Network should be allowed to start and continue exchanging electronic health data through the eHealth Digital Service Infrastructure for Cross-Border eHealth Information Services via their National Contact Points for eHealth, based on their compliance with the requirements established by the eHealth Network, as evaluated in tests provided and audits carried out by the Commission;
endorsing the annual work plan for the eHealth Digital Service Infrastructure for Cross-Border eHealth Information Services.
Article 6
Relation between the eHealth Network and the Commission
The Commission shall:
attend and co-chair the meetings of the eHealth Network together with the representative of the Members;
cooperate with and provide support to the eHealth Network in relation to its activities;
provide secretarial services for the eHealth Network;
develop, implement and maintain appropriate technical and organisational measures related to the core services of the eHealth Digital Service Infrastructure for Cross-Border eHealth Information Services;
support the eHealth Network in agreeing on the technical and organisational compliance of National Contact Points for eHealth with the requirements for the cross-border exchange of health data by providing and carrying out the necessary tests and audits. Experts from the Member States may assist Commission auditors;
develop, implement and maintain appropriate technical and organisational measures related to the security of transmission and hosting of personal data in the federation gateway for the purpose of ensuring the interoperability of national contact tracing and warning mobile applications;
support the eHealth Network in agreeing on the technical and organisational compliance of the national authorities with the requirements for the cross-border exchange of personal data in the federation gateway by providing and carrying out the necessary tests and audits. Experts from the Member States may assist the Commission auditors.
Article 7
Protection of personal data processed through the eHealth Digital Service Infrastructure
Article 7a
Cross-border exchange of data between national contact tracing and warning mobile applications through the federation gateway
The pseudonymised personal data exchanged through and processed in the federation gateway shall only comprise the following information:
the keys transmitted by the national contact tracing and warning mobile applications up to 14 days prior to the date of upload of the keys;
log data associated to the keys in line with the technical specifications protocol used in the country of origin of the keys;
the verification of infection;
the countries of interest and the country of origin of the keys.
Article 8
Expenses
Article 9
Repeal
Implementing Decision 2011/890/EU is repealed. References to the repealed Decision shall be construed as references to this Decision.
Article 10
Addressees
This Decision is addressed to the Member States.
ANNEX I
Responsibilities of the Commission as data processor for the eHealth Digital Service Infrastructure for Cross-Border eHealth Information Services
The Commission shall:
Set up and ensure a secure and reliable communication infrastructure that interconnects networks of the Members of the eHealth Network involved in eHealth Digital Service Infrastructure for Cross-Border eHealth Information Services (‘Central Secure Communication Infrastructure’). To fulfil its obligations, the Commission may engage third parties. The Commissions shall ensure that the same data protection obligations as set out in this Decision apply to these third parties.
Configure part of the Central Secure Communication Infrastructure so that the National Contact Points for eHealth may exchange information securely, reliably and efficiently.
The Commission shall process the personal data on documented instructions from the Controllers.
Take all organisational, physical and logical security measures to maintain the Central Secure Communication Infrastructure. To this end, the Commission shall:
designate a responsible entity for the security management at the level of Central Secure Communication Infrastructure, communicate to the data controllers its contact information and ensure its availability to react to security threats;
assume the responsibility for the security of the Central Secure Communication Infrastructure;
ensure that all individuals that are granted access to Central Secure Communication Infrastructure are subject to contractual, professional or statutory obligation of confidentiality;
ensure that the personnel having access to classified information fulfil the corresponding criteria of clearance and confidentiality.
Take all necessary security measures to avoid compromising the smooth operational functioning of the other’s domain. To this end, the Commission shall put in place the specific procedures related to the connection to the Central Secure Communication Infrastructure. This information includes:
risk assessment procedure, to identify and estimate potential threats to the system;
audit and review procedure to:
check the correspondence between the implemented security measures and the security policy in application;
control on a regular basis the integrity of system files, security parameters and granted authorisations;
monitor to detect security breaches and intrusions;
implement changes to avoid existing security weaknesses and
define the conditions under which to authorise, including at the request of controllers, and contribute to the performance of independent audits, including inspections, and reviews on security measures.
change control procedure to document and measure the impact of a change before its implementation and keep the National Contact Points for eHealth informed of any changes that can affect the communication with and/or the security of the other national infrastructures;
maintenance and repair procedure to specify the rules and conditions to follow when maintenance and/or repair of equipment should be performed;
security incident procedure to define the reporting and escalation scheme, inform without delay the responsible national administration, as well as the European Data Protection Supervisor of any security breach and define a disciplinary process to deal with security breaches.
Take physical and/or logical security measures for the facilities hosting the Central Secure Communication Infrastructure equipment and for the controls of logical data and security access. To this end, the Commission shall:
enforce physical security to establish distinctive security perimeters and allowing detection of breaches;
control access to the facilities and maintain a visitor register for tracing purposes;
Ensure that external people granted access to premises are escorted by duly authorised staff of its respective organisation;
ensure that equipment cannot be added, replaced or removed without prior authorisation of the designated responsible bodies;
control access from and to other network(s) interconnected to the Central Secure Communication Infrastructure;
ensure that individuals who access the Central Secure Communication
Infrastructure are identified and authenticated;
review the authorisation rights related to the access to the Central Secure Communication Infrastructure in case a security breach affecting this infrastructure;
keep the integrity of the transmitted information through the Central Secure Communication Infrastructure;
implement technical and organisational security measures to prevent unauthorized access to personal data;
implement, whenever necessary, measures to block unauthorised access to the Central Secure Communication Infrastructure from the domain of National Contact Points for eHealth (i.e.: Block a location/IP address).
Take steps to protect its domain, including the severing of connections, in the event of substantial deviation from the principles and concepts for quality or security.
Maintain a risk management plan related to its area of responsibility.
Monitor — in real time — the performance of all the service components of its Central Secure Communication Infrastructure services, produce regular statistics and keep records.
Provide support for all Central Secure Communication Infrastructure services in English 24/7 via phone, mail or Web Portal and accept calls from authorised callers: Central Secure Communication Infrastructure’s coordinators and their respective helpdesks, Project Officers and designated people from the Commission.
Support the controllers by providing information concerning the Central Secure Communication Infrastructure of the eHealth Digital Service Infrastructure for Cross-Border eHealth Information Services, in order to implement the obligations in Articles 35 and 36 of the Regulation (EU) 2016/679.
Ensure that data transported within the Central Secure Communication Infrastructure are encrypted.
Take all relevant measures to prevent that the Central Secure Communication Infrastructure’s operators have unauthorised access to transported data.
Take measures in order to facilitate the interoperability and the communication between the Central Secure Communication Infrastructure’s designated national competent administrations.
ANNEX II
RESPONSIBILITIES OF THE PARTICIPATING MEMBER STATES AS JOINT CONTROLLERS FOR THE FEDERATION GATEWAY FOR CROSS-BORDER PROCESSING BETWEEN NATIONAL CONTACT TRACING AND WARNING MOBILE APPLICATIONS
SECTION 1
Subsection 1
Division of responsibilities
(1) The joint controllers shall process personal data through the federation gateway in accordance with the technical specifications stipulated by the eHealth Network ( 3 ).
(2) Each controller shall be responsible for the processing of personal data in the federation gateway in accordance with the General Data Protection Regulation and Directive 2002/58/EC.
(3) Each controller shall set up a contact point with a functional mailbox that will serve for the communication between the joint controllers and between the joint controllers and the processor.
(4) A temporary subgroup set up by the eHealth network in accordance with Article 5(4) shall be tasked to examine any issues arising from the interoperability of national contact tracing and warning mobile applications and from the joint controllership of related processing of personal data and to facilitate coordinated instructions to the Commission as a processor. Amongst other issues, the controllers may, in the framework of the temporary subgroup, work towards a common approach on the retention of data in their national backend servers, taking into account the retention period set forth in the federation gateway.
(5) Instructions to the processor shall be sent by any of the joint controllers’ contact point, in agreement with the other joint controllers in the subgroup referred to above.
(6) Only persons authorised by the designated national authorities or official bodies may access personal data of users exchanged in the federation gateway.
(7) Each designated national authority or official body shall cease to be joint controller from the date of withdrawal of its participation in the federation gateway. It shall however remain responsible for processing in the federation gateway that occurred prior to its withdrawal.
Subsection 2
Responsibilities and roles for handling requests of and informing data subjects
(1) Each controller shall provide the users of its national contact tracing and warning mobile application (‘the data subjects’) with information about the processing of their personal data in the federation gateway for the purposes of cross-border interoperability of the national contact tracing and warning mobile applications, in accordance with Articles 13 and 14 of the General Data Protection Regulation.
(2) Each controller shall act as the contact point for the users of its national contact tracing and warning mobile application and shall handle the requests relating to the exercise of the rights of data subjects in accordance with the General Data Protection Regulation, submitted by those users or their representatives. Each controller shall designate a specific contact point dedicated to requests received from data subjects. If a joint controller receives a request from a data subject, which does not fall under its responsibility, it shall promptly forward it to the responsible joint controller. If requested, the joint controllers shall assist each other in handling data subjects’ requests and shall reply to each other without undue delay and at the latest within 15 days from receiving a request for assistance.
(3) Each controller shall make available to the data subjects the content of this Annex including the arrangements laid down in points 1 and 2.
SECTION 2
Management of security incidents, including personal data breaches
(1) The joint controllers shall assist each other in the identification and handling of any security incidents, including personal data breaches, linked to the processing in the federation gateway.
(2) In particular, the joint controllers shall notify each other of the following:
any potential or actual risks to the availability, confidentiality and/or integrity of the personal data undergoing processing in the federation gateway;
any security incidents that are linked to the processing operation in the federation gateway;
any personal data breach, the likely consequences of the personal data breach and the assessment of the risk to the rights and freedoms of natural persons, and any measures taken to address the personal data breach and mitigate the risk to the rights and freedoms of natural persons;
any breach of the technical and/or organisational safeguards of the processing operation in the federation gateway.
(3) The joint controllers shall communicate any personal data breaches with regard to the processing operation in the federation gateway to the Commission, to the competent supervisory authorities and, where required so, to data subjects, in accordance with Articles 33 and 34 of Regulation (EU) 2016/679 or following notification by the Commission.
SECTION 3
Data Protection Impact Assessment
If a controller, in order to comply with its obligations specified in Articles 35 and 36 of the General Data Protection Regulation needs information from another controller, it shall send a specific request to the functional mailbox referred to in Subsection 1(3) of Section 1. The latter shall use its best efforts to provide such information.
ANNEX III
RESPONSIBILITIES OF THE COMMISSION AS DATA PROCESSOR FOR THE FEDERATION GATEWAY FOR CROSS-BORDER PROCESSING BETWEEN NATIONAL CONTACT TRACING AND WARNING MOBILE APPLICATIONS
The Commission shall:
Set up and ensure a secure and reliable communication infrastructure that interconnects national contact tracing and warning mobile applications of the Member States participating in the federation gateway. To fulfil its obligations as data processor of the federation gateway, the Commission may engage third parties as sub-processors; the Commission shall inform the joint controllers of any intended changes concerning the addition or replacement of other sub-processors thereby giving the controllers the opportunity to jointly object to such changes as set out in Annex II, Subsection 1(4) of Section 1. The Commission shall ensure that the same data protection obligations as set out in this Decision apply to these sub-processors.
Process the personal data, only based on documented instructions from the controllers, unless required to do so by Union or Member State law; in such a case, the Commission shall inform the controllers of that legal requirement before processing, unless that law prohibits submitting such information on important grounds of public interest.
The processing by the Commission entails the following:
Authentication of national backend servers, based on national backend server certificates;
Reception of the data referred to in Article 7a, paragraph 3, of the Implementing Decision uploaded by national backend servers by providing an application programming interface that allows national backend servers to upload the relevant data;
Storage of the data in the federation gateway, upon receiving them from national backend servers;
Making the data available for download by national backend servers;
Deletion of the data when all participating backend servers have downloaded them or 14 days after their reception, whichever is earlier.
After the end of the provision of service, delete any remaining data unless Union or Member State law requires storage of the personal data.
The processor shall take the necessary measures to preserve the integrity of the data processed.
Take all state of the art organisational, physical and logical security measures to maintain the federation gateway. To this end, the Commission shall:
designate a responsible entity for the security management at the level of the federation gateway, communicate to the controllers its contact information and ensure its availability to react to security threats;
assume the responsibility for the security of the federation gateway;
ensure that all individuals that are granted access to the federation gateway are subject to contractual, professional or statutory obligation of confidentiality;
Take all necessary security measures to avoid compromising the smooth operational functioning of the national backend servers. To this end, the Commission shall put in place specific procedures related to the connection from the backend servers to the federation gateway. This includes:
risk assessment procedure, to identify and estimate potential threats to the system;
audit and review procedure to:
check the correspondence between the implemented security measures and the applicable security policy;
control on a regular basis the integrity of system files, security parameters and granted authorisations;
monitor to detect security breaches and intrusions;
implement changes to mitigate existing security weaknesses
allow for, including at the request of controllers, and contribute to, the performance of independent audits, including inspections, and reviews on security measures, subject to conditions that respect Protocol (No 7) to the TFEU on the Privileges and Immunities of the European Union ( 4 );
changing the control procedure to document and measure the impact of a change before its implementation and keep the controllers informed of any changes that can affect the communication with and/or the security of their infrastructures;
laying down a maintenance and repair procedure to specify the rules and conditions to be respected when maintenance and/or repair of equipment should be performed;
laying down a security incident procedure to define the reporting and escalation scheme, inform without delay the controllers, as well as the European Data Protection Supervisor of any personal data breach and define a disciplinary process to deal with security breaches.
Take state of the art physical and/or logical security measures for the facilities hosting the federation gateway equipment and for the controls of logical data and security access. To this end, the Commission shall:
enforce physical security to establish distinct security perimeters and allowing detection of breaches;
control access to the facilities and maintain a visitor register for tracing purposes;
ensure that external people granted access to the premises are escorted by duly authorised staff;
ensure that equipment cannot be added, replaced or removed without prior authorisation of the designated responsible bodies;
control access from and to the national backend servers to the federation gateway;
ensure that individuals who access the federation gateway are identified and authenticated;
review the authorisation rights related to the access to the federation gateway in case of a security breach affecting this infrastructure;
keep the integrity of the information transmitted through the federation gateway;
implement technical and organisational security measures to prevent unauthorised access to personal data;
implement, whenever necessary, measures to block unauthorised access to the federation gateway from the domain of the national authorities (i.e.: block a location/IP address).
Take steps to protect its domain, including the severing of connections, in the event of substantial deviation from the principles and concepts for quality or security.
Maintain a risk management plan related to its area of responsibility.
Monitor – in real time – the performance of all the service components of its federation gateway services, produce regular statistics and keep records.
Provide support for all federation gateway services in English, 24/7 via phone, mail or Web Portal and accept calls from authorised callers: the federation gateway’s coordinators and their respective helpdesks, Project Officers and designated persons from the Commission.
Assist the controllers by appropriate technical and organisational measures, insofar as it is possible, for the fulfilment of the controller’s obligation to respond to requests for exercising the data subject’s rights laid down in Chapter III of the General Data Protection Regulation.
Support the controllers by providing information concerning the federation gateway, in order to implement the obligations pursuant to Articles 32, 35 and 36 of the General Data Protection Regulation.
Ensure that data processed within the federation gateway is unintelligible to any person who is not authorised to access it.
Take all relevant measures to prevent that the federation gateway’s operators have unauthorised access to transmitted data.
Take measures in order to facilitate the interoperability and the communication between the federation gateway’s designated controllers.
Maintain a record of processing activities carried out on behalf of the controllers in accordance with Article 31(2) of Regulation (EU) 2018/1725.
( 1 ) Decision No 1082/2013/EU of the European Parliament and of the Council of 22 October 2013 on serious cross-border threats to health and repealing Decision No 2119/98/EC (OJ L 293, 5.11.2013, p. 1).
( 2 ) Commission Decision (EU, Euratom) 2015/444 of 13 March 2015 on the security rules for protecting EU classified information (OJ L 72, 17.3.2015, p. 53).
( 3 ) In particular, the interoperability specifications for cross-border transmission chains between approved apps, of 16 June 2020, available at: https://ec.europa.eu/health/ehealth/key_documents_en#anchor0
( 4 ) Protocol (No 7) on the Privileges and Immunities of the European Union (OJ C 326, 26.10.2012, p. 266).