On November 11, 2020, the European Data Protection Board (the “EDPB”) published its long-awaited recommendations following the Schrems II judgement regarding supplementary measures in the context of international transfer safeguards such as Standard Contractual Clauses (“SCCs”) (the “Recommendations”). In addition, the EDPB published recommendations on the European Essential Guarantees for surveillance measures (the “EEG Recommendations”), which complement the Recommendations. The Recommendations are subject to a public consultation, which closes on December 21, 2020.
As a result of the Schrems II judgment, controllers relying on a transfer mechanism under Article 46 of the EU General Data Protection Regulation (“GDPR”) to transfer personal data outside the European Economic Area (“EEA”) (“data exporters”) must verify, on a case-by-case basis and in collaboration with the data importers, as appropriate, whether the law of the importer’s country ensures a level of protection for the personal data that is essentially equivalent to the EEA’s protections. If not, data exporters need to assess whether they can implement supplementary measures to help ensure the requisite level of protection.
The Recommendations are intended to assist data exporters with the challenge of identifying and implementing such supplementary measures. Accordingly, the Recommendations include a 6-step process outlining the steps data exporters must take to determine if they need to identify and implement effective supplementary measures. The Recommendations also include examples of supplementary measures, setting forth some of the conditions they must satisfy in order to be effective. In the Recommendations, the EDPB is cautions that it may not be possible to implement sufficient supplementary measures in every case, in which case, transfers might not be possible.
The Recommendations provide that organizations, when making international data transfers, should:
Map Data Transfers
Map the data transfers that they carry out, keeping in mind that access from a third country (e.g., storage in the cloud outside the EU) constitutes a transfer, and verify that the data transferred is adequate, relevant and limited to what is necessary in relation to the purposes for which it is transferred. The mapping exercise should include onward transfers made by processors to whom data is disclosed.
Identify Data Transfer Mechanisms
Verify the transfer mechanism under Chapter V of the GDPR that will be relied upon. No transfer mechanism or further steps are required where there is a valid adequacy decision in force from the European Commission with respect to the recipient country. The Recommendations emphasize that the transfer tools listed under Article 46 of the GDPR, e.g. SCCs and binding corporate rules, should be used where transfers are regular and repetitive, and that the derogations provided by Article 49 of the GDPR should only be used for occasional and non-repetitive transfers and “must be interpreted restrictively.”
Assess Legal System of Recipient Country
Assess whether the law or practice of the data importer’s country may impinge on the effectiveness of the appropriate safeguards of the transfer tools relied on, in the context of the specific transfer, particularly under legislation that prevents the data importer from complying with its obligations under the relevant transfer tool. The Recommendations provide that this should be particularly carefully considered when legislation or regulations governing access to data by public authorities are “ambiguous or not publicly available.” In addition, any onward transfers also should be considered.
The Recommendations highlight that recognition of the rule of law in the data importer’s country may be relevant in assessing the effectiveness of redress mechanisms available to individuals with regard to unlawful government access to personal data. Where a comprehensive data protection law or an independent data protection authority exists, this may contribute to ensuring the proportionality of government access. In making an assessment as to whether or not there is likely to be unjustifiable government access to data, organizations should consult the EEG Recommendations.
The Recommendations also state that Section 702 of the U.S. FISA “does not respect the minimum safeguards resulting from the principle of proportionality under EU law and cannot be regarded as limited to what is strictly necessary,” meaning that where data importers or any recipients of onward transfers are subject to Section 702 of FISA, additional supplementary technical measures will be required in addition to a transfer tool under Article 46 of the GDPR.
Consider Supplementary Measures
If the legal assessment reveals that the recipient third country’s legislation impinges on the effectiveness of the Article 46 GDPR transfer safeguards relied upon, data exporters must identify and adopt supplementary measures, as they are required to provide a standard of protection for the data that is essentially equivalent to that provided by EU law. The supplementary measures appropriate in each case will depend on a number of factors, including the nature of the data transferred and the possibility that it may be subject to onward transfers. Examples of supplementary measures provided by the Recommendations include:
- Technical measures: such as forms of encryption, with encryption keys kept beyond the reach of relevant public authorities, and pseudonymization that does not permit re-identification of data.
- Additional contractual measures: such as obligations to implement the technical measures discussed above, transparency obligations regarding the level of access available to government authorities in the recipient jurisdiction and the measures taken to prevent access to personal data, and reinforced power for the data exporter to conduct audits of the data importer. Data exporters should also consider contractually requiring data importers to review the legality of any access requests received and to challenge such requests where appropriate.
- Organizational measures: such as adoption of internal policies with clear allocation of responsibilities for data transfers and operating procedures in the event of an access request, transparency and accountability measures including documentation of access requests, and ensuring data minimization.
The Recommendations also provide examples of where supplementary measures cannot ensure an appropriate level of protection, such as where the power granted to public authorities of the recipient country to access the transferred data goes beyond what is necessary and proportionate in a democratic society. In these circumstances, organizations are required to avoid, suspend or terminate the relevant transfer, and data already transferred should be returned or destroyed by the data importer.
Address Formalities
Take any formal procedural steps that the adoption of supplementary measures may require, such as seeking authorization from the competent supervisory authority if there is an intention to modify the SCCs.
Keep Data Transfer Arrangements Under Review
Re-evaluate at appropriate intervals the level of protection provided and monitor any developments that may affect it. The Recommendations highlight that the principle of accountability requires “continuous vigilance” as to the level of protection of personal data.
In addition, the EDPB adopted the EEG Recommendations to provide data exporters with criteria to assist in determining whether the legal framework of a recipient country, governing public authorities’ access to personal data for surveillance purposes, can be regarded as permitting justifiable interference with the rights of EU individuals to privacy and the protection of their personal data.
The EEG Guarantees provide that, “the applicable legal requirements to make the limitations to the data protection and privacy rights recognized by the Charter [of Fundamental Rights of the EU] justifiable can be summarized in four European Essential Guarantees:
- Processing should be based on clear, precise and accessible rules;
- Necessity and proportionality with regard to the legitimate objectives pursued need to be demonstrated;
- An independent oversight mechanism should exist; and
- Effective remedies need to be available to the individual.”
The EDPB provides that these “core elements” are not to be assessed independently, but instead holistically, reviewing the relevant legislation having regard to surveillance measures, the minimum level of safeguards for the protection of the rights of individuals, and the remedies provided under the national law of the recipient jurisdiction.
The Recommendations are open for public consultation until December 21, 2020. The Recommendations are immediately applicable following their publication .
Search
Recent Posts
- Website Use of Third-Party Tracking Software Not Prohibited Under Massachusetts Wiretap Act
- HHS Announces Additional Settlements Following Ransomware Attacks Including First Enforcement Under Risk Analysis Initiative
- Employee Monitoring: Increased Use Draws Increased Scrutiny from Consumer Financial Protection Bureau
Categories
- Behavioral Advertising
- Centre for Information Policy Leadership
- Children’s Privacy
- Cyber Insurance
- Cybersecurity
- Enforcement
- European Union
- Events
- FCRA
- Financial Privacy
- General
- Health Privacy
- Identity Theft
- Information Security
- International
- Marketing
- Multimedia Resources
- Online Privacy
- Security Breach
- U.S. Federal Law
- U.S. State Law
- Workplace Privacy
Tags
- Aaron Simpson
- Accountability
- Adequacy
- Advertisement
- Advertising
- American Privacy Rights Act
- Anna Pateraki
- Anonymization
- Anti-terrorism
- APEC
- Apple Inc.
- Argentina
- Arkansas
- Article 29 Working Party
- Artificial Intelligence
- Australia
- Austria
- Automated Decisionmaking
- Baltimore
- Bankruptcy
- Belgium
- Biden Administration
- Big Data
- Binding Corporate Rules
- Biometric Data
- Blockchain
- Bojana Bellamy
- Brazil
- Brexit
- British Columbia
- Brittany Bacon
- Brussels
- Business Associate Agreement
- BYOD
- California
- CAN-SPAM
- Canada
- Cayman Islands
- CCPA
- CCTV
- Chile
- China
- Chinese Taipei
- Christopher Graham
- CIPA
- Class Action
- Clinical Trial
- Cloud
- Cloud Computing
- CNIL
- Colombia
- Colorado
- Committee on Foreign Investment in the United States
- Commodity Futures Trading Commission
- Compliance
- Computer Fraud and Abuse Act
- Congress
- Connecticut
- Consent
- Consent Order
- Consumer Protection
- Cookies
- COPPA
- Coronavirus/COVID-19
- Council of Europe
- Council of the European Union
- Court of Justice of the European Union
- CPPA
- CPRA
- Credit Monitoring
- Credit Report
- Criminal Law
- Critical Infrastructure
- Croatia
- Cross-Border Data Flow
- Cyber Attack
- Cybersecurity and Infrastructure Security Agency
- Data Brokers
- Data Controller
- Data Localization
- Data Privacy Framework
- Data Processor
- Data Protection Act
- Data Protection Authority
- Data Protection Impact Assessment
- Data Transfer
- David Dumont
- David Vladeck
- Delaware
- Denmark
- Department of Commerce
- Department of Health and Human Services
- Department of Homeland Security
- Department of Justice
- Department of the Treasury
- District of Columbia
- Do Not Call
- Do Not Track
- Dobbs
- Dodd-Frank Act
- DPIA
- E-Privacy
- E-Privacy Directive
- Ecuador
- Ed Tech
- Edith Ramirez
- Electronic Communications Privacy Act
- Electronic Privacy Information Center
- Elizabeth Denham
- Employee Monitoring
- Encryption
- ENISA
- EU Data Protection Directive
- EU Member States
- European Commission
- European Data Protection Board
- European Data Protection Supervisor
- European Parliament
- Facial Recognition Technology
- FACTA
- Fair Credit Reporting Act
- Fair Information Practice Principles
- Federal Aviation Administration
- Federal Bureau of Investigation
- Federal Communications Commission
- Federal Data Protection Act
- Federal Trade Commission
- FERC
- FinTech
- Florida
- Food and Drug Administration
- Foreign Intelligence Surveillance Act
- France
- Franchise
- Fred Cate
- Freedom of Information Act
- Freedom of Speech
- Fundamental Rights
- GDPR
- Geofencing
- Geolocation
- Georgia
- Germany
- Global Privacy Assembly
- Global Privacy Enforcement Network
- Gramm Leach Bliley Act
- Hacker
- Hawaii
- Health Data
- Health Information
- HIPAA
- HIPPA
- HITECH Act
- Hong Kong
- House of Representatives
- Hungary
- Illinois
- India
- Indiana
- Indonesia
- Information Commissioners Office
- Information Sharing
- Insurance Provider
- Internal Revenue Service
- International Association of Privacy Professionals
- International Commissioners Office
- Internet
- Internet of Things
- IP Address
- Ireland
- Israel
- Italy
- Jacob Kohnstamm
- Japan
- Jason Beach
- Jay Rockefeller
- Jenna Rode
- Jennifer Stoddart
- Jersey
- Jessica Rich
- John Delionado
- John Edwards
- Kentucky
- Korea
- Latin America
- Laura Leonard
- Law Enforcement
- Lawrence Strickling
- Legislation
- Liability
- Lisa Sotto
- Litigation
- Location-Based Services
- London
- Madrid Resolution
- Maine
- Malaysia
- Markus Heyder
- Maryland
- Massachusetts
- Meta
- Mexico
- Microsoft
- Minnesota
- Mobile App
- Mobile Device
- Montana
- Morocco
- MySpace
- Natascha Gerlach
- National Institute of Standards and Technology
- National Labor Relations Board
- National Science and Technology Council
- National Security
- National Security Agency
- National Telecommunications and Information Administration
- Nebraska
- NEDPA
- Netherlands
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- New Zealand
- Nigeria
- Ninth Circuit
- North Carolina
- Norway
- Obama Administration
- OECD
- Office for Civil Rights
- Office of Foreign Assets Control
- Ohio
- Oklahoma
- Opt-In Consent
- Oregon
- Outsourcing
- Pakistan
- Parental Consent
- Payment Card
- PCI DSS
- Penalty
- Pennsylvania
- Personal Data
- Personal Health Information
- Personal Information
- Personally Identifiable Information
- Peru
- Philippines
- Phyllis Marcus
- Poland
- PRISM
- Privacy By Design
- Privacy Policy
- Privacy Rights
- Privacy Rule
- Privacy Shield
- Protected Health Information
- Ransomware
- Record Retention
- Red Flags Rule
- Regulation
- Rhode Island
- Richard Thomas
- Right to Be Forgotten
- Right to Privacy
- Risk-Based Approach
- Rosemary Jay
- Russia
- Safe Harbor
- Sanctions
- Schrems
- Scott Kimpel
- Securities and Exchange Commission
- Security Rule
- Senate
- Serbia
- Service Provider
- Singapore
- Smart Grid
- Smart Metering
- Social Media
- Social Security Number
- South Africa
- South Carolina
- South Dakota
- South Korea
- Spain
- Spyware
- Standard Contractual Clauses
- State Attorneys General
- Steven Haas
- Stick With Security Series
- Stored Communications Act
- Student Data
- Supreme Court
- Surveillance
- Sweden
- Switzerland
- Taiwan
- Targeted Advertising
- Telecommunications
- Telemarketing
- Telephone Consumer Protection Act
- Tennessee
- Terry McAuliffe
- Texas
- Text Message
- Thailand
- Transparency
- Transportation Security Administration
- Trump Administration
- United Arab Emirates
- United Kingdom
- United States
- Unmanned Aircraft Systems
- Uruguay
- Utah
- Vermont
- Video Privacy Protection Act
- Video Surveillance
- Virginia
- Viviane Reding
- Washington
- Whistleblowing
- Wireless Network
- Wiretap
- ZIP Code