• Collecting debts - what not to do... Search for law notes: From today's Muncie Star-Press:BREAK-IN: A Muncie man was arrested Saturday afternoon, accused of dealing several thousand dollars worth of...
  • Blogging for business plans... Search for law notes: You want to start a business. You read everything you can about starting a business. You probably have read enough about needing a...
  • Starting a corporation... Search for law notes: The law require three things for starting a corporation:1. Corporate by-laws.2. Articles of Incorporation.3. An Employer Identification...
  • Best wishes to Marcia Oddi... Search for law notes: I have been remiss but Marcia Oddi of The Indiana Law Blog is ill. My best wishes go out to here. The Indiana Law Blog was the first...
  • Spatial Law and Policy Update (Augu... Search for law notes: PrivacyGoogle Street View in Germany - a non-issueSpain joins countries Probing Street ViewFacebook Location and PrivacyFacebook Enters...
  • Update on Spatial Law and Policy... Search for law notes: California has revised its proposed "Pay As You Drive" insurance regulations. A full copy of the regulations can be found here.Vector One...
  • Indiana Blog: Indiana Commercial Fo... Search for law notes: I ran across this blog in the past week and with more time I would have mentioned it earlier. The writer is John Waller from Indianapolis'...

Implementing the E-Privacy Directive.




The art. 29 data protection working party recently published a report on the implementation of the E-privacy Directive.




After a summary of the main elements of the personal data breach provisions in the ePrivacy Directive (Section II), the working document summarizes the personal data breach legislation in Member States (Section III). The summary is based on information provided by the national data protection authorities ("DPAs") but not reproduced here given the evolving character of the transposition. Section IV puts forward various actions to be carried out by competent authorities and by the Article 29 Working Party towards developing internal processes and setting forth cooperation procedures. Section V and VI focus on the new policy developments by recalling the overall scope and procedures for the expected policy actions regarding personal data breach and providing policy recommendations.








As explained in the report, the core elements set out in the ePrivacy Directive are:





a. The definition of data breach ex Art. 2 (i) which establishes that a
personal data breach "means a breach of security leading to the accidental
or unlawful destruction, loss, alteration, unauthorized disclosure of, or
access to, personal data transmitted, stored or otherwise processed in
connection with the provision of a publicly available electronic
communications service in the Community". Thus, for the personal data
breach to occur, it must include "personal data", as defined under Art. 2(a)
of the Data Protection Directive6. A personal data breach encompasses
cases of unauthorized disclosure or unauthorized access to personal data
but also cases of simple accidental destruction or alteration which is not
followed (or very unlikely to be followed) by unauthorized access.





b. The applicable legal thresholds to notify individuals and authorities (Art.
4(3), subparagraphs 1-2). The thresholds define when an entity suffering a
breach is obliged to notify the breach to authorities and affected
individuals. The ePrivacy Directive requires notification to individuals
“When the personal data breach is likely to adversely affect the personal
data or privacy of a subscriber or individual...". All data breaches shall be
reported to the authorities.





c. The content and time of the notification. The time of notification to
individuals, according to Art. 4(3) subparagraphs 1-2: is "...without undue
delay...". As for content of the notification, it should include the nature of
the personal data breach, contact information and recommend measures to
mitigate possible adverse effects. The notification to the competent
national authority must also describe steps taken by the provider to address
the breach.





d. The possible exceptions relating to technological protection measures and
law enforcement (Art 4(3) subparagraph 3).




0 comments:

Post a comment on: Implementing the E-Privacy Directive.

Info recommended by: Law and Law blogger online Sponsored by: Law daily
  • The Cluetrain Manifesto... Search for law notes: I got to admit I have read bits and pieces and a lot about The Cluetrain Manifesto and I am still not sure how to put it all into effect...
  • Franchising - reading around... Search for law notes: Today, I found a new franchising resource: FranchiseBrief.com. I have not examined the site in any depth but it seems fairly sober in its...
  • Recent Spatial Law Links... Search for law notes: Privacy - in all it forms - continues to be a hot Spatial Law issue. An article in the Washington Post discusses how the Department of...
  • State v. Jay C. Fisher... Search for law notes: 08-14-07 A-3026-05T3Pursuant to N.J.S.A. 2C:11-5.1, a driver involved in amotor vehicle accident that results in the death of...
  • OECD Report published... Search for law notes: Earlier this months, the OECD published its communication outlook which presents the most recent comparable data on the performance of the...
  • Dying without a Will in Indiana ver... Search for law notes: I will take Indiana. This story from the Times of London, Wills injustice: fit for Dickens?, is worth reading if only to make us...
  • Follow up on powers of attorney and... Search for law notes: Just a few passing thoughts on the previous article Powers of Attorney - uses and problems and Times of London article I was commenting on...
  • Powers of Attorney - uses and probl... Search for law notes: I sum up a power of attorney as creating an alter ego for the person making the power of attorney. Let me throw in a couple of terms here....
  • Spatial Law and Policy Update (Augu... Search for law notes: Licensing/Intellectual Property rightsPirating of Sat Nav Maps in ChinaViacom to Appeal YouTube DecisionBing Adds OpenStreetMapDoes your...
  • Spatial Law and Policy Update (Augu... Search for law notes: PrivacyPrivacy pirates: Self-regulation is a sinking ship (IT World)Facial recognition App enables next-level web-stalking (Good...
  • Recent Developments in Spatial Law... Search for law notes: Rick Crowsey, of Crowsey Incorporated, forwarded me this article from the Washington Post on the increased use of GPS devices by law...
  • Commission comments on margin squee... Search for law notes: The European Commission has issued interesting comments to the Italian telecoms regulator Agcom over its proposed guidelines for ex-ante...