Privacy and Data Protection based on the GDPR

Privacy and Data Protection based on the GDPR
Автор книги: id книги: 1911050     Оценка: 0.0     Голосов: 0     Отзывы, комментарии: 0 5474,95 руб.     (53,5$) Читать книгу Купить и скачать книгу Купить бумажную книгу Электронная книга Жанр: Учебная литература Правообладатель и/или издательство: Ingram Дата добавления в каталог КнигаЛит: ISBN: 9789401806787 Скачать фрагмент в формате   fb2   fb2.zip Возрастное ограничение: 0+ Оглавление Отрывок из книги

Реклама. ООО «ЛитРес», ИНН: 7719571260.

Описание книги

Information about people is becoming increasingly valuable. Enabled by new technologies, organizations collect and process personal data on a large scale. Free flow of data across Europe is vital for the common market, but it also presents a clear risk to the fundamental rights of individuals. This issue was addressed by the Council of the European Union and the European Parliament with the introduction of the General Data Protection Regulation (GDPR). For many organizations processing personal data, the GDPR came as a shock. Not so much its publication in the spring of 2016, but rather the articles that appeared about it in professional journals and newspapers leading to protests and unrest. “The heavy requirements of the law would cause very expensive measures in companies and organizations”, was a concern. In addition, companies which failed to comply “would face draconian fines”.This book is intended to explain where these requirements came from and to prove that the GDPR is not incomprehensible, that the principles are indeed remarkably easy to understand. It will help anyone in charge of, or involved in, the processing of personal data to take advantage of the innovative technologies in processing without being unduly hindered by the limitations of the GDPR. The many examples and references to EDPB (European Data Protection Board) publications, recent news articles and case law clarify the requirements of the law and make them accessible and understandable.“Leo’s book can provide very effective support to you and your colleagues in reaching this understanding and applying it in practice.” Fintan Swanton, Managing Director of Cygnus Consulting Ltd., Ireland.

Оглавление

Leo Besemer. Privacy and Data Protection based on the GDPR

Other publications by Van Haren Publishing

Privacy and Data. Protection based. on the GDPR

Colophon

Foreword

Contents

Acknowledgements

How this book is organized

PART I | Privacy and data protection history and scope

1 History and context

1.1 The history of privacy and data protection

1.1.1 Human rights law. 1.1.1.1 Universal Declaration of Human Rights

1.1.1.2 European Convention on Human Rights

1.1.1.3 OECD Guidelines and the Treaty of Strasbourg

1.1.1.4 Council of Europe (CoE) Convention 108

1.1.1.5 Data Protection Directive 95/46/EC

1.1.1.6 Charter of Fundamental Rights

1.1.1.7 Treaty of Lisbon

1.1.1.8 General Data Protection Regulation (EU) 2016/679

1.1.2 Milestones in Data Protection history

1.2 Context within European and national law. 1.2.1 European legal acts

1.2.1.1 Regulation

1.2.1.2 Directive

1.2.1.3 Decision

1.2.1.4 Recommendation

1.2.2 European legal acts complementing the GDPR. 1.2.2.1 Directives 2002/58/EC and 2009/136/EC (on privacy and electronic communications)

1.2.2.2 ePrivacy Directive and Regulation

1.2.2.3 Decisions 2001/497, 2004/915 and 2010/87 (standard contractual clauses)

1.2.2.4 Directive 2016/680 (police and judicial cooperation in criminal matters)

1.2.2.5 Directive 2016/681 (on the use of passenger name record (PNR) data)

1.2.2.6 Regulation (EU) 2018/1725 (on processing by Union institutions)

1.2.3 GDPR implementation laws

1.2.4 Other complementing law

1.2.5 The concepts of subsidiarity and proportionality

1.3 The scope of the GDPR

1.3.1 The concept of personal data

1.3.1.1 Direct personal data

1.3.1.2 Indirect personal data

1.3.1.3 Pseudonymized personal data

1.3.1.4 Anonymized data

1.3.1.5 The concept of processing

1.3.2 Material scope of the GDPR

Filing system

1.3.2.1 Other exceptions. Crime prevention and prosecution by competent authorities

Household activities

1.3.3 Geographical scope of the GDPR. 1.3.3.1 Establishment criterion

“… an establishment in the Union, …”

“… in the context of the activities of an establishment” …

“…in the Union”

1.3.3.2 Targeting criterion

PART II | Principles and practice of processing

2 Stakeholder roles, rights and obligations

2.1 Controller

2.1.1 Accountability

2.1.2 Implementing data protection by design and by default

2.1.2.1 The seven principles of data protection by design

Proactive not Reactive; Preventative not Remedial

Data Protection as the Default Setting

Privacy Embedded into Design

Full Functionality — Positive-Sum, not Zero-Sum

End-to-End Security — Full Lifecycle Protection

Visibility and Transparency — Keep it Open

Respect for User Privacy — Keep it User-Centric

2.1.3 Required types of administrations

2.1.3.1 Records of processing activities

2.1.3.2 Records of personal data breaches

2.1.3.3 Derogation for small companies

2.1.4 GDPR security requirements

2.1.5 Outsourcing of processing actions

2.1.5.1 Processor agreement

2.2 Processor

2.2.1 Obligations of the processor

2.2.1.1 Required types of administration

Records of processing operations

Record of personal data breaches

2.3 Representative

2.4 Data protection officer (DPO)

2.4.1 Mandatory appointment

2.4.1.1 Notification obligation

2.4.1.2 Core activities

2.4.1.3 Regular and systematic monitoring

2.4.1.4 Processing on a large scale

2.4.1.5 Optional appointment of a DPO

2.4.2 Tasks of a data protection officer

2.4.3 Position of the DPO in the organization

2.4.3.1 Independence

2.4.3.2 Protection of the DPO

2.4.3.3 Conflicts of interest

2.5 Recipients and third parties

3 The principles of processing personal data

Six principles (or seven?)

Principles relating to processing of personal data

3.1 Lawfulness, fairness and transparency

3.1.1 Lawfulness

3.1.2 Fairness and transparency

3.2 Purpose specification and purpose limitation

Specified

Explicit

Legitimate

3.2.1 Purpose limitation and further processing

3.2.1.1 Further processing

3.2.1.2 Compatibility assessment. The relationship between initial purposes and purposes of further processing

The context in which the data has been collected and the reasonable expectations of the data subjects as to its further use

The nature of the data and the impact of the further processing on the data subjects

3.2.1.3 Derogations

3.3 Data minimization

3.4 Accuracy

3.4.1 Reasonable steps

3.4.2 Not incorrect or misleading as to any matter of fact

3.4.3 Need to update

3.4.4 Personal data challenged

3.5 Storage limitation

3.6 Integrity and confidentiality

3.6.1 A level of security appropriate to the risk

3.6.1.1 State of the art

3.6.1.2 Multi-factor access control

3.6.1.3 Awareness

3.6.1.4 Pseudonymization

3.6.1.5 Encryption

3.6.1.6 Authenticity and non-repudiation

3.7 Subsidiarity and proportionality

3.7.1 Subsidiarity

3.7.2 Proportionality

4 Lawful grounds for processing

4.1 Personal data: processing is permitted, provided …

Lawfulness of processing

4.1.1 Necessary for the performance of a contract

The concept of “contract”

4.1.2 Necessary for compliance with a legal obligation

4.1.3 Necessary to protect a vital interest

4.1.4 Necessary in the public interest or by an official authority

4.1.5 Necessary for a legitimate interest of the controller

4.1.5.1 Legitimate Interest Assessment (LIA)

The concept of interest

Legitimate

Necessity

Subsidiarity

Balancing test

Transfer of data

Services directed at children and other vulnerable individuals

4.1.6 Consent of the data subject

4.1.6.1 Conditions for consent

Freely given

Specific

Informed

Unambiguous

4.1.6.2 Consent of children

4.2 Sensitive data: processing is prohibited, unless…

4.2.1 The concept of “sensitive data”? Categories of special personal data:

4.2.1.1 Genetic data

4.2.1.2 Biometric data

4.2.2 Derogations from the prohibition to process sensitive data

Explicit consent

Employment

Vital interest

Membership of organizations

Publicly disclosed data

Legal proceedings

Substantial public interest

Medicine

Public health

Research

Other rules and types of data

4.3 Recapitulating: the case of Santa Claus

5 The rights of the data subjects

5.1 Right to transparent information, communication and modalities

5.1.1 Information to be provided to the data subject

Required information on the controller and the processing

Required information on the rights of the data subject

Required information on automated decision-making, including profiling

Required information to be provided when transferring personal data

Required information when personal data is obtained from the data subject directly

Required information when personal data is not obtained from the data subject

5.1.2 Derogations to the obligation to provide information

5.1.3 Timing of the response to a request

5.2 Right of access (inspection)

5.2.1 Timing and limitations to the right of access

5.2.2 Refusing a request

5.2.3 Conditions for compliance

5.3 Right to rectification

5.3.1 The concepts of “inaccurate” and “incomplete”

5.3.2 Timing of the response to a request

5.3.3 Refusing a request

5.3.4 Notification obligation

5.3.5 Conditions for compliance

5.4 Right to erasure (“right to be forgotten”)

5.4.1 Timing of the response to a request

5.4.2 Refusing a request

5.4.3 Notification obligation

5.4.4 Conditions for compliance

5.5 Right to restriction of processing

5.5.1 Grounds to have processing restricted

5.5.2 Timing of the response to a request

5.5.3 Refusing a request

5.5.4 Notification obligation

5.5.5 Conditions for compliance

5.6 Right to data portability

5.6.1 Concepts addressed in the right to portability

5.6.1.1 Without hindrance

5.6.1.2 Structured

5.6.1.3 Commonly used

CSV

XML

JSON

5.6.1.4 Machine-readable

5.6.2 Timing of the response to a request

5.6.3 Refusing a request

5.6.4 Conditions for compliance

5.7 Right to object

Direct marketing

Public task or legitimate interests

Research and archive purposes

5.7.1 Timing of the response to a request

5.7.2 Refusing a request

Direct marketing

Research, Archiving, Statistics

Legal claims

5.7.3 Conditions for compliance

5.8 Rights related to automated decision-making, including profiling

5.8.1 The concepts of profiling and automated decision-making

Legal effects

Similarly significant

5.8.2 Legitimate use of profiling and/or automated decision-making

5.8.2.1 Profiling for direct marketing

5.8.3 Conditions for compliance

5.9 Right to lodge a complaint with a supervisory authority

5.9.1 Representation

6 Data governance

6.1 Data governance

6.1.1 Understanding the data streams

6.1.1.1 Data collection

6.1.1.2 Permissions structure

6.1.1.3 Build in retention and deletion rules

6.1.2 Data lifecycle management (DLM)

6.1.2.1 The purpose of Data Lifecycle Management (DLM)

6.2 Data protection audit

6.2.1 Purpose of an audit

6.2.1.1 Adequacy audit

6.2.1.2 Compliance audit

6.2.2 Contents of an audit plan

7 Processing and the online world

7.1 The use of personal data in marketing

7.1.1 Cookies – the technical view. 7.1.1.1 What is a cookie?

7.1.1.2 Session cookies

7.1.1.3 Persistent cookies

7.1.2 Cookies - the privacy perspective

7.1.3 The price of “free” services

7.1.3.1 Tracking cookies

7.1.4 Profiling

7.1.5 Automated decision-making

Legal effects

Similarly significant

7.1.5.1 Exceptions

7.1.5.2 Safeguards

Children

7.2 Big data, artificial intelligence and machine learning

7.2.1 The concept of big data

7.2.1.1 Artificial intelligence (AI)

7.2.1.2 Machine learning

7.2.2 AI challenges regarding GDPR compliance

7.2.2.1 Lawfulness, transparency and fairness. Lawfulness

Transparency

Fairness

7.2.2.2 Purpose limitation, data minimization and storage limitation

7.2.2.3 Accuracy

Hidden bias

7.2.3 Anonymization

7.3 Interplay between GDPR and ePrivacy Directive

PART III | International data transfers

8 Cross-border transfers within the EEA

8.1 The concept of data transfer

8.2 Multinational cases. 8.2.1 Identifying the lead supervisory authority

8.2.2 Processing across different jurisdictions

8.2.2.1 Age

8.2.2.2 National law

9 Cross-border transfers outside the EEA

9.1 Transfers on the basis of an adequacy decision

9.2 Transfers subject to appropriate safeguards

Appropriate safeguards

9.3 Binding corporate rules (BCR)

9.4 Standard Contractual Clauses (SCCs)

9.5 Transfers or disclosures not authorized by Union law

9.6 Derogations

PART IV | Risk assessment and mitigation

10 Data Protection Impact Assessment (DPIA) and prior consultation

10.1 Objectives of a DPIA

10.2 Topics of a DPIA report

10.2.1 Publishing the DPIA report

10.3 Executing a DPIA

10.4 List of criteria for a mandatory DPIA

10.5 Prior consultation

11 Personal data breaches and related procedures

11.1 The concept of data breach

11.1.1 Security considerations

11.1.1.1 Vulnerability

11.1.1.2 Threat

11.1.1.3 Security goals

Confidentiality

Integrity

Availability

11.1.1.4 Security incident

11.1.1.5 Data breach

11.1.1.6 Personal data breach

11.2 How to monitor and prevent a personal data breach

11.3 What to do when a personal data breach occurs

Step 1 - Investigate

Step 2 – Mitigate the breach

11.4 Notification obligations in relation to personal data breaches

Step 3 – Notification. Controller

Processor

Information to provide to the DPA

High-risk

11.5 Types and categories of personal data breaches

PART V | The supervisory authorities

12 Data Protection Authority (DPA)

12.1 Independence

12.2 Competences, tasks and powers of a Supervisory Authority

12.2.1 To monitor and enforce the application of the Regulation

12.2.2 To advise and promote awareness

12.2.3 To administrate personal data breaches and other infringements

12.2.4 To set standards

Processing requiring DPIA

Codes of conduct and certification

Standard contractual clauses and binding corporate rules

12.3 Roles and responsibilities related to personal data breaches

12.4 Powers of the supervisory authority in enforcing the GDPR

12.4.1 Investigative powers of the supervisory authority

12.4.2 Corrective powers of the supervisory authority

12.4.3 General conditions for imposing administrative fines

Proportionate

Dissuasive

12.5 The consistency mechanism

12.5.1 Role of the European Data Protection Supervisor (EDPS)

12.5.2 Role of the European Data Protection Board (EDPB)

12.6 Remedies

Appendix A Sources

Appendix B European Data Protection Board (EDPB) Publications

Index

Отрывок из книги

PRIVACY AND DATA PROTECTION BASED ON THE GDPR

within four domains:

.....

5.9.1 Representation

6 Data governance

.....

Добавление нового отзыва

Комментарий Поле, отмеченное звёздочкой  — обязательно к заполнению

Отзывы и комментарии читателей

Нет рецензий. Будьте первым, кто напишет рецензию на книгу Privacy and Data Protection based on the GDPR
Подняться наверх