Lee & White

Dedicated to Excellence

  • Home
  • About Us
  • Services
  • Blog
  • Press
  • Publications
  • News
Home > Blog
Go Back
  • Toothless lion grows teeth

    Thursday, October 24, 2013

    Sleeping LionIt has finally happened.

    The Belgian Privacy Commission was once regarded as a toothless lion where its role was mainly passive in nature - giving advice and recommendations. Although it had the power to send warnings and denounce violations to the public prosecutor (only if a complaint first reaches the Commission), it was unable to sanction or do much else. This has resulted in violations of the Data Protection Law nationwide where companies and organisations fearlessly processed personal data according to their whims and fancies. The Privacy Commission has finally realised its inability to bite and is doing something about it.

    On October 21, 2013, the Belgian Privacy Commission announced in De Standaard, its intention to set up a special investigation team which would actively seek out breaches of privacy. The Commission wants to play a more active role in checking whether companies or organisations are breaching privacy. By policing, it would be able to better protect the privacy of the individual and maintain law and order.

    The initiative is said to have stemmed from recent data breaches:
    • The National Railway Company of Belgium (NMBS/SNCB) stored personal data of 1.46 million customers  on a non-secure server which resulted in the leak of these data (which included first and last names, gender, date of birth, email addresses, phone numbers, and in some cases home addresses) whereby there was possible access by a mere online search engine query.
    • Belgacom's (Belgium's largest telecoms company) internal IT systems had been breached and compromised with malware by a third party which enabled hackers to access telephone and online information.
    Although this realisation has come in much later than preferred in comparison with the ICO, its UK counterpart, it is a move that must be applauded.

    The gravity of the current situation where the protection of personal data is currently in shambles has reached its limit, and more than ever, the Privacy Commission needs stronger powers to tackle these breaches and safeguard the privacy of the individual. The Commission stated that the investigation team will in the first instance, look into companies and organisations which handle sensitive personal data such as insurance companies and hospitals and focus on a particular sector each year.

    The Commission is also seeking to obtain the power to sanction non-compliant companies and organisations as the current situation is such that the Commission can refer violations to the courts, but this is regarded as an overkill. With such a power, the Commission would be able to make decisions such as to no longer allow an offender access to a particular database to render their operations and business more difficult or to revoke permission to build a database.

    With this development, companies and organisations which are still relaxed in their attitude towards the protection of personal data and regard such protection as non-profitable, should re-think the business case of protecting personal data and have it as priority in their next budget before it is too late.

    Read the Full Story

    Posted by: Lee & White

    Category:

    Tags Data Breach Personal Data Government Organisations

  • Protocol agreement reduces administrative burden for data transfer contracts

    Monday, July 15, 2013

    Data Transfer ContractOn 25th of June 2013, the Belgian Privacy Commission and the Ministry of Justice entered into a protocol agreement which forms the framework for the transfer of personal data outside the EU. Following this, contracts governing the exchange of personal data between companies outside the EU will be handled more smoothly from now on.

    The immense volume of personal data transferred between countries has rightly demanded the need for the protection of such personal data. Where the data is transferred within Belgium and the EU, personal data may be transferred subject to the Belgian Data Protection Law. EU member states are accorded the same level of protection for the processing of personal data by virtue of the European Directive 95/46/EC.

    Where the data is transferred outside the EU, personal data can only be transferred to countries which provide an adequate level of protection of the data - similar to the protection accorded within the EU. The European Commission has recognised a number of countries which are regarded as providing an adequate level of protection of personal data. This can be viewed on the European Commission's website.

    Where a country is not recognised as offering an adequate level of protection, personal data may still be transferred through:
    • European Commission's model contracts or contractual clauses drawn up by organizations themselves offering an adequate level of protection of the personal data to be transferred
    • Binding Corporate Rules
    • Exceptions provided by law.
    In Belgium, where the European Commission's model contracts are used, these contracts are sent to the Belgian Privacy Commission to be checked to ensure conformity with the European Commission's standard contractual clauses. There is however, no need for a Royal Decree to validate such contracts and this has been clearly stated in the recent protocol agreement between the Belgian Privacy Commission and the Ministry of Justice. The date on which conformity with the standard contractual clauses is confirmed in writing by the Privacy Commission is also the date on which the data transfer is allowed.

    In the second instance where organizations themselves draw up their own contractual clauses binding themselves and the receivers of the personal data, the existing situation is such that a Royal Decree is necessary. However, owing to the shared jurisdiction of the Belgian Privacy Commission and the Ministry of Justice, the process became long and cumbersome and meant that very few organizations took up this method of providing an adequate level of protection.

    The protocol agreement has changed that - the Privacy Commission will now play the leading role in this procedure and quicken the process. Organizations can send the contracts to the Privacy Commission for review. If the necessary guarantees for the protection of personal data are in place, the Privacy Commission will forward these contracts to the Ministry of Justice along with a positive assessment and a proposed wording for a Royal Decree for the King's signature and publication in the Belgian Official Gazette. If not, the Privacy Commission will contact the applicant and refer to the principles which are required to be addressed properly in the contractual clauses.

    The new procedure will significantly shorten the period of approval of such contracts and is said to be a win-win situation for the government, organizations and citizens. It will also prevent the possible consequences of violation and provide more legal certainty for the data subjects whos personal data is transferred as well as the organizations involved. The protocol agreement takes effect immediately.

    Read the Full Story

    Posted by: Lee & White

    Category:

    Tags Best Practices EU Personal Data Government Organisations Data Handling Manual

  • Shadow Profiles

    Monday, July 8, 2013

    Facebook, as mentioned in detail in the news, was exposed for keeping shadow profiles on users and non-users.

    Through an incident (which should have been classified as a bug as it had been available for months) it was revealed that Facebook is keeping so-called shadow profiles of its users as well as data subjects who do not use their services.

    A shadow profile is information about a certain data subject which the data subject in question did not give to the data processor. This profile is created without consent of the data subject and possibly without his knowledge. This means the data processor gathered this information through or by combining other sources, either through other data subjects or from other sources such as other web sites, chat sessions, search history, phone conversations…

    European Data Protection law forbids this kind of ‘data brokerage’, gathering, combining and reprocessing data from different sources to build a file with personal data for these reasons:
    • Data processors can only process your data with your explicit consent.
    • Data processors can only process such personal data which is relevant to their services to you.
    Your personal data has become a commodity which they use for their own profit and without a relationship with you, the data subject. Quite a number of companies, small and large, have made it their business to gather everybody’s personal data and sell it on to the highest bidder. Recent times have made it very easy for such companies to gather all information in an automated way and from the comfort of their own office. They are also not bothered by the fact that they are serving stale information which is no longer or never was correct, but can have very deep implications on your personal life.

    European Data Protection Law has several safeguards:
    • If a data subject suspects a data processor has such a shadow profile, the law provides a means to officially request a complete list of data kept by the data processor concerning the data subject.
    • If a data subject objects to the data processor’s use of the data subject’s data, the data subject can submit a request to cease processing such data.
    • The new EU Data Protection proposal mentions the right to be forgotten, but lobbying by major data processors is probably going to water this down.
    The lessons for our clients are clear:
    • Be transparent, only gather personal data from your data subjects through informed and explicit consent.
    • Do not process other information than that given by the data subject and only if it is relevant to the purpose of your relationship with the data subject.
    • Keep it alive, keep data up to date and do not keep data of data subjects beyond the duration of the relationship with your data subject.
    • Protect the personal data entrusted to you.

    Read the Full Story

    Posted by: Lee & White

    Category:

    Tags Best Practices EU Data Breach Private Persons Personal Data Organisations Internet

  • The Business Incentive

    Thursday, May 23, 2013

    Google's Eric Schmidt spoke about privacy at its annual Big Tent event in Watford, about the use and misuse of personal data gathered and kept by his company. Whilst we cannot comment whether they walk the talk, we do need to take note of some of the points he made:

    We (you ed.) need to fight for privacy or we are going to lose it

    Yes we are - if we haven't lost it already. Our personal data is everywhere and just about anyone knows who we are and what we do - to the smallest details. And if they don't yet, they know how to get it.

    We are being observed willingly and unwillingly, and are spreading very detailed and sensitive information about ourselves. These days, anyone can pick up a name and put a face and all the trimmings, and they would identify us spot on. It's not difficult to put the pieces together - especially if it is lying about everywhere, like a cookie trail right to your doorstep.

    So yes, we do need to keep striving to keep control over our personal data. This is both a task for the data subjects (i.e. you) and the data controllers (i.e. the organisations, but also you).

    There's this concern that we (Google ed.) are somehow going to misuse this data and we're not telling you.

    Is it only concern? Perhaps, the feelings go deeper...
    • coercion - the feeling that you are forcing them to give you their personal data because your services are needed and there are really no alternatives.
    • suspicion - the feeling that you are going to sell them to the highest bidder.
    • distrust - the feeling that they cannot trust you,  know that you are in fact not to be trusted - but cannot do a thing about it.
    • concern - yes, the overall wondering and worrying about what you are going to do with their personal data and for how long.
    Do they ever have that ultimate control of their property or it is all a lie?

    The solution is simple - be truthful and honest about your processing. It sounds like a lesson in ethics and morality, but yes, that is the bottom line. Say what you are doing and going to do, and do what you say. Set this out in a clear and complete privacy policy stating what you will and will not do with their personal data, how they can count on you to do so or question you if you do not.

    I (Eric Schmidt ed.) can assure from a privacy perspective... we would lose you and not get you back.

    That's right, you won't get them back.

    Google has a "clear business incentive" to protect user's data; do it properly or lose your business. Not handling personal data properly, not keeping the relationship with your data subject (i.e. the person behind the 'customer', 'supplier' or 'prospect') will make you lose them. Perhaps not immediately, as perhaps you are delivering a service which they need and only you can supply, but certainly in the longer term, when an alternative company rises which offers the same services and which does handle personal data properly.

    So, are you going to start handling the personal data under your care properly, or are you waiting for that competitor to do so first?

    Read the Full Story

    Posted by: Lee & White

    Category:

    Tags Best Practices Business Incentive Private Persons Personal Data Organisations Internet IT

  • Getting to know you, getting to know all about you

    Sunday, February 19, 2012

    Hush Little BabyGetting to know you, getting to know all about you... sounds familiar, but unfortunately, it has nothing to do with Rodgers and Hammerstein's musical The King and I, nor is there an ounce of good, wholesome fondness to that phrase.

    Rather, the phrase is cloaked with an ulterior motive - Money, Money, Money (and this is not with reference to ABBA's song).

    What's wrong with that? Everyone is entitled to pursue that ultimate goal, and surely everyone does - or at least tries to make more money.

    True. Perhaps it is safe to say that every business is set up for the purpose of making money, and more money if possible. The question in any business case for an expense is whether there will be a profit to gain - apart from ensuring the customers' happiness and satisfaction, of course.

    Alright, enough about the musical influences, and down to more serious business.

    Businesses are trying to get to know you. They want to get to know you better. The better they know you, the better they can get more out of you. To do just that, they need your personal information - from your name to how you spend your leisure time, every bit counts. This desire to obtain personal information is not new of course. But how far is that desire corresponding with the individual's best interest? The privacy right?

    By researching and analysing an individual's browsing habits on its e-commerce site, coupled with his/her personal information already obtained, an online retailer is able to advertise products/services which are most relevant to that individual.

    It is also the case for those companies/retailers which seek to match the type of products/services/brands to the individual customer's taste. Shops with their own payment cards to facilitate quicker payments at the till (to obtain a card, just fill in your personal information in the given form) analyse the information obtained at every purchase (of the type and quantity of things bought...) to send catalogues relevant to the individual customer/household. If toys/stationery items are the most frequent products purchased, the customer finds a catalogue filled with the latest promotions on toys/stationery items in his/her mailbox.

    To an extent, it does seem quite harmless as the individual gets what he is interested in and it does save his time and effort in looking for the 'right' or 'most suitable' product/service/brand. And better yet, businesses carrying out these forms of advertising are actually saving cost. No more unwanted, wasted printing materials. No more spending a fortune on advertising products which a particular individual will never take a second glance at.

    A very recent report in the New York Times showed that companies can even make predictions about their customers.

    Companies can learn your secrets. 

    A statistician from Target, a large retailer from the US, divulged that two colleagues from Target's marketing department popped the odd question, "If we want to figure out if a customer is pregnant, even if she didn't want us to know, can you do that?"

    Timing is essential in this case. As most new parents are almost immediately bombarded with offers and advertisements on baby products from the moment the birth records are made public, the key is to get this group before any other retailer knows that a baby is on the way. By being able to identify these mothers-to-be as early as their second trimester (the time when most of these women are changing their lives and buying pre-natal vitamins, maternity clothing and baby stuff) the chances of keeping them for years to come are great. These women are then likely to buy diapers from Target, pass by the baby food aisle and grab a box or two, and on the way to the till, add a few more items to the cart. Once the customers get comfortable with the offered products, they will keep coming back - and for more.

    The questions for the businesses are:
    • Did you tell the individuals clearly that you were doing/are doing/will do this?
    • Did you give them a chance to opt out?
    • Did you ensure that the individuals can always exercise their rights under the data protection law any time?
    • Are you ensuring the security of their personal information both organisationally and technically?
    • Can you ensure that if there is a transfer/sharing of their personal information to third parties, that these third parties will ensure an adequate level of protection of their personal information too?
    Answer all these with a YES, and you're likely to be a trusted organisation and you understand the business case for privacy. Privacy is profitable. Personal information is an asset. You protect that asset and you will gain trust, the customers that go with it and the profit that comes from doing business with them.

    The questions for the individual are:
    • Did you ask for any of this?
    • Did you ask for your shopping behaviour to be scrutinised? checked? spied on?
    • Are you aware of all that they know about you?
    • Do you mind that they can build your profile almost spot on?
      For example, Spying On You Mart knows that Mr.Joe Customer who lives at 123 No Privacy Lane and shops at Spying On You Mart, has an estimated salary of $$$. He has at least one son and one daughter (judging from purchases of boys and girls toys) of the ages between 5-8 years of age (judging from the age group of the toys purchased) and potentially has a wife/female partner who is a size 38 (EU) (again judging from the several pieces of female clothing purchased) and they like barbecuing in the summer and eat Activia yoghurts.
    • And with this information that they have about you, do they share it with third parties?
    • And if they do, what are those third parties going to do with it?
    • Will they protect that information from getting into the wrong hands?
    • Did you opt in without realising?
    • Can you ever stop them if you wanted/needed to?
    Answer all these with a YES, and you've consented with full knowledge and with full trust in that organisation. If you can truly exercise your rights as a data subject, and know that that organisation is protecting and will continue to protect your personal information,  then the protection of your personal information is upheld and the duty of that organisation to you is fulfilled.

    But in all cases, think very carefully, read the fine print, and do not give your personal information out unless you know what you're in for, your rights and how to get out. Otherwise, it's Hush Little Baby, Don't Say A Word.

    Read the Full Story

    Posted by: Lee & White

    Category:

    Tags Best Practices Private Persons Personal Data Organisations Human Rights Internet

  • Keep it alive!

    Wednesday, February 1, 2012

    People"Privacy law is not allowing us to do this", "We're not allowed to do that". But what can proper personal data management, protection and handling actually do for you... Create business!

    On our many encounters we regularly have lively discussions with professionals of all backgrounds and all levels, not surprisingly quite often on our favourite subject, personal data protection and management.

    Most feedback we receive however, is related to the repressive perception of data protection law, and how it does not align with the commercial goals and roadmap of the organisation, more likely to limit rather than to offer opportunities.

    What we try to explain in such cases, is that the law on the one hand forbids and regulates, but on the other hand enables and guides.

    The law forbids that you do anything illegal with the data and use it in a way that can harm the individual identified by the data. It regulates the way that the individual can keep control over his property, i.e. his personal data, and what purposes this data can be used for.

    On the other hand, the law creates the framework that allows you to handle personal data and guides both yourself and the data subjects on how to interact in an official and transparent way. You stay in full control but if you mess up, the law is there to enable the individual data subject to exercise his rights.

    The basis of the law is the relationship between you and the data subject.
    • It needs to be a live relationship.
    • Both parties need to be in control.
    • New relationships with other parties only with permission and knowledge of the data subject.
    • The relationship needs to be transparent.
    • Once the relationship ends, the data is no longer of any use and should not be used anymore.
    The benefits are many:
    As a company, you have many individuals with whom you regularly interact and who support you fully. You do not waste time on stale or dead relationships and do not waste resources on it. Your investment in personal data yields the maximum return. You send out communications to people who want to hear from you and will hear what you have to say.

    As an individual, you know which companies you are working with and what they are doing with your information. Once you decide to move on, you know your personal data is not retained and can never be abused.

    The downsides of not following this guidance:
    As a company, your databases, cupboards and backup tapes are clogged down with stale information of people whom you once worked with but might never work with again. The information of 'live' relationships is hidden and lost in the noise of 'stale' data.

    As an individual, your data is lingering forever and you have no control over what will happen with it. Will it end up in the company's archive forever, or in a hacker's database, or somewhere on a hard disk on eBay?

    In our personal data workshops, we help every department within organisations maximize the full potential of handling personal data, exploring new potential and advising on ways of using the personal data, within the limits and spirit of the several international data protection legislations. The combination of the detailed knowledge and experience of our team in all related disciplines (data protection law, CRM, marketing, online presence, social networking) together with the knowledge, experience and market savvy of your team, creates novel and powerful new applications with many quick wins and long term benefits.

    More information on our Personal Data Workshops and other services can be found here.

    Read the Full Story

    Posted by: Lee & White

    Category:

    Tags Best Practices Private Persons Personal Data Government Organisations IT

  • EU Data Protection Law getting more bite

    Tuesday, January 24, 2012

    EU LawIt is looking good for Data Protection in Belgium and the EU as Ms. Viviane Reding, Vice-President of the European Commission and EU Commissioner for Justice, Fundamental Rights and Citizenship, announced groundbreaking changes to EU Data Laws to be introduced in a Bill to the EU Parliament this week.

    Speaking at the “Digital, Life, Design” conference in Munich on January 22nd, 2012, she confirmed that personal data is indeed an asset, a  message which has already begun passing around since the UK Information Commissioner commissioned a report on privacy by design to help articulate the business case for proactive protection of privacy in 2008 and which we believe and preach with conviction. “Personal Data is the currency of today’s digital market, and like any currency, it needs stability and trust. Only if consumers can ‘trust’ that their data is well protected, will they continue to entrust businesses and authorities with it, buy online, and accept new services.”, she stated. And the amount of data, including Personal Data, is growing by a whopping 40% a year worldwide.

    Given the fact that 72% of European Citizens said in a recent poll that they are concerned about how their personal data is used by companies, and given that businesses are concerned too, how can they keep control over data which races around the globe in a virtual cloud?

    “Trust has to prevail”, states Ms. Reding. Rightly so. If the population is to give the current growth continued support, they need to have a good understanding of the issues and be able to trust that their data is not being abused. They entrust the EU with the task to draw up the rules and follow up on their correct implementation and execution. Trust is the key to any relationship - and how much more in the business world?

    We have a unified currency in the EU, but Data Protection law is fragmented into 27 different, and sometimes conflicting, regulations. Whilst some member states are top of the class, others have watered the 1995 EU Directive down so much that it is no more than a sign on the wall showing how bad things are. A lot of burden has been added, sometimes in the form or red tape and lengthy cumbersome administrative procedures. As such, it has all been a futile exercise as it missed its economic goal.

    Ms. Reding states “Privacy concerns are one of the most frequent reasons why people don’t buy goods and services online.”. She is adamant about the way forward: “This needs to be changed.”

    Two legislative texts will be proposed:

    “First, a Regulation to enhance opportunities for companies that want to do business in the EU's internal market, while ensuring a high level of data protection for individuals.

    Second, a Directive to ensure a smoother exchange of information between Member States' police and judicial authorities in the fight against serious crime while at the same time protecting people’s fundamental right to data protection.”


    The first point, legal certainty, will be achieved by one Data Protection Law in the form of a directly applicable Regulation which will apply to all Member States in the European Union, and to all organisations offering their goods and services to consumers in the EU – even if their servers are based outside the EU.

    This new Regulation will unleash the potential of the Digital Single Market, and will save businesses around 2.3 billion Euros per year, removing barriers to market entry, which were especially affecting our clients, the small and medium-sized enterprises. It will simplify the regulatory environment and drastically cut red tape. Current notification requirements are replaced by a duty for companies to be responsible and accountable for the protection of Personal Data in their business field. Each company will have to appoint a Data Protection Officer.

    There will be one law, applicable to all member states, and companies will only have to deal with a single Data Protection Authority linked to the country of its main establishment.

    All Data Protection Authorities will have the same adequate tools and powers to enforce the EU Law.

    They will:
    • Deal with complaints
    • Carry out investigations
    • Take binding decisions
    • Impose effective and dissuasive sanctions.
    The rules for international data transfers will be strengthened and simplified - a necessary step in a world where data travels freely around the world and major companies have made it their specialty to circumvent the more ‘difficult’ countries by operating in or via countries with weaker Data Protection legislation.

    Trust from the individuals will be earned through a few key principles, boiling down to one point: Transparency.
    • Informed
      • People need to be informed in simple, clear, and unambiguous language.
    • Consent
      • People need to freely give their specific and informed consent.
    • Control
      • People need to have control over their own data at all time. Aside from the control we know already, it will also include portability, the possibility to take one’s data and easily move it from one provider to another, and the right, not the option, to be forgotten.
    • Alert
      • Individuals need to be swiftly informed, within 24 hours, when any of their personal data is lost or stolen.
      • Companies suffering such a breach need to notify their Data Protection Authority without undue delay, i.e. ‘within 24 hours’.

    Ms. Reding concludes:

    "We will get a strong, consistent and future-proof framework for data protection, applied consistently across all Member States and across all European Union policies. We will make our data protection legislation fit for the digital age so it encourages innovation and development of new technologies and services.

    We will adjust the rules to the reality of multinational businesses. And will adjust the rules to the reality of people's lives. Europeans live, work, shop and travel freely in the EU, so their data must travel freely as well: Freely and safely. The reform will become a golden opportunity for business: complying with the EU’s laws on data protection will lead to a competitive advantage. European data protection rules will become a trademark people recognise and trust worldwide. I would welcome if everyone here put these new rules to life."


    Well said. Data Protection without a doubt enables businesses to make more and better business, leading to a competitive advantage over competitors, having a solid and healthy relationship with loyal customers. Any organisation would pay good money for this.

    You can read the full text of Ms. Reding's speech here

    It will take some time to bring the new law into practice, but organisations should be aware and prepared, making the necessary changes sooner rather than later.

    If you need to assess your current status with relation to the new Data Protection Law or need advice on implementing or improving compliance with current or the next legislation, review our services and contact us.

    Read the Full Story

    Posted by: Lee & White

    Category:

    Tags Best Practices EU Data Protection Officer Data Breach Personal Data Government Organisations Internet IT

  • The Year of Privacy: 2013

    Wednesday, January 4, 2012

    2013Is this a typo? No, it isn't, the outlook for data protection is bleak, and no immediate improvement is to be expected.

    First of all, the team at Lee & White would like to wish you a Happy New Year.

    Happy because you chose to come here on your own accord and happy that we did not spam you with - probably sincere but spam wishes all the same and which are likely to be loaded with the inevitable commercial 'opportunities'.

    As the new year has just started, we are hopeful that protection of personal data and control over use of your own personal data will improve significantly.

    But looking back, what happened in 2011?

    • A year of major privacy incidents that made it harder - but still normal to many- to ignore the importance of such incidents.
    • The rise of moguls that devour personal data and any other data they can 'find', who make it difficult for you to control who is (ab)using your data, and even make you want and think it is normal to share your most personal of data with the world, but mainly the moguls themselves.
    • Personal data collection devices with functions such as recording, tracking, spying, eavesdropping, ... commonly known as smartphones.
    • ...

    2012 will be the year of
    • Street View becoming even more commonplace, exposing your most private locations.
    • Spies recording your every move and thought using their personal data collection device.
    • Full commercial exploitation of our most personal data of all... our face.
    • Automatic identification and tracking through techniques such NFC, RFID, Bluetooth, GSM, Wifi, face and car registration recognition.
    • Economic crisis... if privacy does not obviously have a positive business case (despite the fact that it actually does), then it gets deferred or cancelled.
    • Basically, no place to hide or control who processes your personal data.
    • ...
    Technology is moving very fast, lawgivers are trying to keep up, priorities are economic and profit rules.

    Well, I'm sure privacy will be top of the agenda in 2013.

    Read the Full Story

    Posted by: Lee & White

    Category:

    Tags Data Breach Private Persons Personal Data Spam Government Organisations Internet IT

  • Poof! Your Privacy Evaporated in a Cloud of Smoke!

    Wednesday, December 21, 2011

    Cloud SecurityCloud computing, it is a hot topic these days. But what is it all about?

    Basically, it describes technologies to deliver software as a service. The cloud provider provides processing power, software, data access, and storage in order to deliver services to the consumer of the cloud services.

    How does it look from your end of the screen? Compare it to your water supplier; at the end of the day, the average user would probably require that when he turns on the tap, water comes out. The more concerned user would be a bit more interested in the quality and origin of the water coming out.

    A better parallel with regard to your data however would be the attended cloakroom. You would arrive at the theatre and hand your coat to the cloakroom attendant in exchange for a numbered ticket. After the show, you would hand the ticket to the attendant in order to have your coat returned.

    So as a user (the data subject), you would hand your personal data to a company (the data controller) you trust, and this company would store your data or process it in ‘the cloud’ through his cloud provider (a data processor).

    If the attended cloakroom is unattended (after closing hours) or in case of an emergency, you could browse through the coat hangers in the cloak room and find your coat. What if it wasn’t there, what if the cloakroom had ‘outsourced’ storing the coats? You would appreciate a sign saying ‘We outsource our coat storage to external sites in x, y and z’. You could still go to x, y and z and retrieve your coat.

    With data however, nobody is guaranteeing that the data is stored completely in one location, it might be distributed over multiple data stores. It is also not guaranteed that the data is stored only once, only that it is stored at least once. And no guarantees that if data is deleted or moved, it is physically removed or erased in the original location.

    So what can we learn from this short story:
    It is vital that everybody involved knows where the data resides, handles it with care and only for as long as needed and wanted, keeps it safe from abuse, and deletes it when no longer needed.

    Data Controller
    • Draw up and adhere to rules regarding handling personal data. (data handling procedures)
    • Draw up and implement procedures to allow data subjects to execute their legal rights under the Data Protection Law.
    • Ensure your subcontractors abide by the same rules you impose on yourself.
    • Inform your data subjects of these rules, be transparent. (privacy statement)
    • Audit yourself regularly to check adherence to your rules and the Data Protection Law.
    • Audit your subcontractors to check the above.
    • Be vigilant!
    Data Subject
    • Read the information provided by the data controller before handing over your personal data.
    • Execute your legal rights under the Data Protection Law.
    • Stay in control of your personal data, know who is using it and what for.
    • Be vigilant!

    And finally. if in doubt, do not hand over your personal data and look for another provider.

    Read the Full Story

    Posted by: Lee & White

    Category:

    Tags Best Practices Personal Data Organisations Internet IT Data Handling Manual

  • The Rise of a New EU Data Protection Regime

    Tuesday, December 13, 2011

    The time has come. High time, in fact - given the numerous intentional and ignorant breaches that has occurred in the last decade.

    Many organisations in Belgium, especially in the private sector have frequently set aside matters of data protection on the ground that no one ever gets caught in Belgium, and even if one was found out, the low risk of a fine meant that to spend resources (both monetary and manpower) was a waste of time. Profits are essential - and budgets are limited.

    Coupled with the fact that the Privacy Commission's powers are quite restricted (having a mainly advisory role...), and seeing the lack of bite in previous breaches, complying with the duties set out by the Data Protection Law is just an unnecessary expense which no data controller in the business world wants to indulge in.

    On December 7, 2011 in Brussels, Viviane Reding, Vice President of the European Commission, EU Justice Commissioner revealed plans to strengthen data protection by the choice of a type of legal instrument, new data protection rights and a new tool to ensure compliance with the new single data protection law in Europe.

    As part of the effort to ensure greater data protection compliance, the powers of Data Protection Authorities in member states are to be strengthened so that they are able to effectively sanction breaches of the law.

    In order to assist the authorities to enforce the new laws, a new Data Protection Board will be created from the current Article 29 Working Party. "When the reform will enter into force, a new European Data Protection Board will be created from the current Article 29 Working Party. Given its enhanced future responsibilities the Board should have an efficient and dedicated secretariat. How to do it? I think that this secretariat should be hosted by the European Data Protection Supervisor's office which would be a cost-effective solution drawing upon the ready-made experience of that office." said Reding.

    She also went on to assure that it was not the intention of the European Commission to take over the enforcement of the data protection rules. "Last but not least, let me stress that the European Commission has neither the intention nor the means at its disposal to take over your role as interpreters and enforcers of data protection rules on the ground, or as decision-makers on individual cases. On the contrary, with the reform, you will have a fully independent secretariat at your disposal and better tools to develop a common legal doctrine."

    The proposals for the new regime will also include the following:
    • Individuals will get more rights that will be enforceable in the online environment and simultaneously, data controllers will be subject to stricter obligations.
    • The principles of data minimisation and privacy by design will be strengthened.
    • The right to be forgotten and the right to data portability are to be included.
    • Adequate protection of children against abusive profiling or tracking on the internet.
    • The administrative burden of compulsory notifications on personal data processing is to be reduced and prior checks are to be limited only to cases where they bring real added value. However, privacy impact assessments for risky processing will be introduced so that data protection is not undermined.
    • Data breach notifications to be extended to all sectors and the role of data protection officers in the public sector and in large companies and in companies with risky processing will be strengthened.
    If all goes well, and the proposals outlined become part of the new legal framework, EU will have a very promising data protection regime and data controllers will have little choice but to put protection of personal data first on their business agenda and make room in their limited budget to comply.

    Read the Full Story

    Posted by: Lee & White

    Category:

    Tags Personal Data Government Organisations

1    2    3    4   

Archive

  • 2014
    • March 2014
  • 2013
    • October 2013
    • July 2013
    • May 2013
  • 2012
    • March 2012
    • February 2012
    • January 2012
  • 2011
    • December 2011
    • July 2011
    • June 2011
    • May 2011
    • April 2011
    • February 2011
  • 2010
    • December 2010
    • September 2010
    • June 2010
    • May 2010
    • April 2010
    • February 2010
  • 2009
    • October 2009
    • August 2009
    • June 2009
    • April 2009
  • 2008
    • November 2008
    • October 2008
    • August 2008
    • July 2008
    • June 2008
    • May 2008
    • April 2008
    • March 2008
    • February 2008
    • January 2008
  • 2007
    • December 2007
    • November 2007



Tags

  • Best Practices (11)
  • Business Incentive (1)
  • Data Breach (8)
  • Data Handling Manual (5)
  • Data Protection Officer (1)
  • EU (4)
  • FSA (1)
  • Government (13)
  • Human Rights (6)
  • Internet (21)
  • IT (21)
  • Organisations (40)
  • Personal Data (48)
  • Private Persons (30)
  • Spam (4)

 

Copyright © 2003-2025 Lee & White®. All rights reserved.

Legal Notice  -  Privacy Policy  -  Contact