After PRISM : 181 ONGs ask for less surveillance and improved data protection standards..new global standards…

International Principles on the Application of Human Rights to Communications Surveillance

THE ORIGINAL CALL IS  PUBLISHED HERE : https://en.necessaryandproportionate.org/text

Final version 10 July 2013

As technologies that facilitate State surveillance of communications advance, States are failing to ensure that laws and regulations related to communications surveillance adhere to international human rights and adequately protect the rights to privacy and freedom of expression. This document attempts to explain how international human rights law applies in the current digital environment, particularly in light of the increase in and changes to communications surveillance technologies and techniques. These principles can provide civil society groups, industry, States and others with a framework to evaluate whether current or proposed surveillance laws and practices are consistent with human rights.

These principles are the outcome of a global consultation with civil society groups, industry and international experts in communications surveillance law, policy and technology.

Preamble

Privacy is a fundamental human right, and is central to the maintenance of democratic societies. It is essential to human dignity and it reinforces other rights, such as freedom of expression and information, and freedom of association, and is recognised under international human rights law.[1] Activities that restrict the right to privacy, including communications surveillance, can only be justified when they are prescribed by law, they are necessary to achieve a legitimate aim, and are proportionate to the aim pursued.[2]

Before public adoption of the Internet, well-established legal principles and logistical burdens inherent in monitoring communications created limits to State communications surveillance. In recent decades, those logistical barriers to surveillance have decreased and the application of legal principles in new technological contexts has become unclear. The explosion of digital communications content and information about communications, or “communications metadata” — information about an individual’s communications or use of electronic devices — the falling cost of storing and mining large sets of data, and the provision of personal content through third party service providers make State surveillance possible at an unprecedented scale.[3]

Meanwhile, conceptualisations of existing human rights law have not kept up with the modern and changing communications surveillance capabilities of the State, the ability of the State to combine and organize information gained from different surveillance techniques, or the increased sensitivity of the information available to be accessed.

The frequency with which States are seeking access to both communications content and communications metadata is rising dramatically, without adequate scrutiny.[4]

When accessed and analysed, communications metadata may create a profile of an individual’s life, including medical conditions, political and religious viewpoints, associations, interactions and interests, disclosing as much detail as, or even greater detail than would be discernible from the content of communications.[5] Despite the vast potential for intrusion into an individual’s life and the chilling effect on political and other associations, legislative and policy instruments often afford communications metadata a lower level of protection and do not place sufficient restrictions on how they can be subsequently used by agencies, including how they are data-mined, shared, and retained.

In order for States to actually meet their international human rights obligations in relation to communications surveillance, they must comply with the principles set out below. These principles apply to surveillance conducted within a State or extraterritorially.

The principles also apply regardless of the purpose for the surveillance — law enforcement, national security or any other regulatory purpose. They also apply both to the State’s obligation to respect and fulfil individuals’ rights, and also to the obligation to protect individuals’ rights from abuse by non-State actors, including corporate entities.[6] The private sector bears equal responsibility for respecting human rights, particularly given the key role it plays in designing, developing and disseminating technologies; enabling and providing communications; and – where required – cooperating with State surveillance activities. Nevertheless, the scope of the present Principles is limited to the obligations of the State.

Changing technology and definitions

“Communications surveillance” in the modern environment encompasses the monitoring, interception, collection, analysis, use, preservation and retention of, interference with, or access to information that includes, reflects, arises from or is about a person’s communications in the past, present or future. “Communications” include activities, interactions and transactions transmitted through electronic mediums, such as content of communications, the identity of the parties to the communications, location-tracking information including IP addresses, the time and duration of communications, and identifiers of communication equipment used in communications.

Traditionally, the invasiveness of communications surveillance has been evaluated on the basis of artificial and formalistic categories. Existing legal frameworks distinguish between “content” or “non-content,” “subscriber information” or “metadata,” stored data or in transit data, data held in the home or in the possession of a third party service provider.[7]

However, these distinctions are no longer appropriate for measuring the degree of the intrusion that communications surveillance makes into individuals’ private lives and associations. While it has long been agreed that communications content deserves significant protection in law because of its capability to reveal sensitive information, it is now clear that other information arising from communications – metadata and other forms of non-content data – may reveal even more about an individual than the content itself, and thus deserves equivalent protection. Today, each of these types of information might, taken alone or analysed collectively, reveal a person’s identity, behaviour, associations, physical or medical conditions, race, color, sexual orientation, national origins, or viewpoints; or enable the mapping of the person’s location, movements or interactions over time,[8] or of all people in a given location, including around a public demonstration or other political event. As a result, all information that includes, reflects, arises from or is about a person’s communications and that is not readily available and easily accessible to the general public, should be considered to be “protected information”, and should accordingly be given the highest protection in law.

In evaluating the invasiveness of State communications surveillance, it is necessary to consider both the potential of the surveillance to reveal protected information, as well as the purpose for which the information is sought by the State. Communications surveillance that will likely lead to the revelation of protected information that may place a person at risk of investigation, discrimination or violation of human rights will constitute a serious infringement on an individual’s right to privacy, and will also undermine the enjoyment of other fundamental rights, including the right to free expression, association, and political participation. This is because these rights require people to be able to communicate free from the chilling effect of government surveillance. A determination of both the character and potential uses of the information sought will thus be necessary in each specific case.

When adopting a new communications surveillance technique or expanding the scope of an existing technique, the State should ascertain whether the information likely to be procured falls within the ambit of “protected information” before seeking it, and should submit to the scrutiny of the judiciary or other democratic oversight mechanism. In considering whether information obtained through communications surveillance rises to the level of “protected information”, the form as well as the scope and duration of the surveillance are relevant factors. Because pervasive or systematic monitoring has the capacity to reveal private information far in excess of its constituent parts, it can elevate surveillance of non-protected information to a level of invasiveness that demands strong protection.[9]

The determination of whether the State may conduct communications surveillance that interferes with protected information must be consistent with the following principles.

The Principles

Legality: Any limitation to the right to privacy must be prescribed by law. The State must not adopt or implement a measure that interferes with the right to privacy in the absence of an existing publicly available legislative act, which meets a standard of clarity and precision that is sufficient to ensure that individuals have advance notice of and can foresee its application. Given the rate of technological changes, laws that limit the right to privacy should be subject to periodic review by means of a participatory legislative or regulatory process.

Legitimate Aim: Laws should only permit communications surveillance by specified State authorities to achieve a legitimate aim that corresponds to a predominantly important legal interest that is necessary in a democratic society. Any measure must not be applied in a manner which discriminates on the basis of race, colour, sex, language, religion, political or other opinion, national or social origin, property, birth or other status.

Necessity: Laws permitting communications surveillance by the State must limit surveillance to that which is strictly and demonstrably necessary to achieve a legitimate aim. Communications surveillance must only be conducted when it is the only means of achieving a legitimate aim, or, when there are multiple means, it is the means least likely to infringe upon human rights. The onus of establishing this justification, in judicial as well as in legislative processes, is on the State.

Adequacy: Any instance of communications surveillance authorised by law must be appropriate to fulfil the specific legitimate aim identified.

Proportionality: Communications surveillance should be regarded as a highly intrusive act that interferes with the rights to privacy and freedom of opinion and expression, threatening the foundations of a democratic society. Decisions about communications surveillance must be made by weighing the benefit sought to be achieved against the harm that would be caused to the individual’s rights and to other competing interests, and should involve a consideration of the sensitivity of the information and the severity of the infringement on the right to privacy.

Specifically, this requires that, if a State seeks access to or use of protected information obtained through communications surveillance in the context of a criminal investigation, it must establish to the competent, independent, and impartial judicial authority that:

  1. there is a high degree of probability that a serious crime has been or will be committed;
  2. evidence of such a crime would be obtained by accessing the protected information sought;
  3. other available less invasive investigative techniques have been exhausted;
  4. information accessed will be confined to that reasonably relevant to the crime alleged and any excess information collected will be promptly destroyed or returned; and
  5. information is accessed only by the specified authority and used for the purpose for which authorisation was given.

If the State seeks access to protected information through communication surveillance for a purpose that will not place a person at risk of criminal prosecution, investigation, discrimination or infringement of human rights, the State must establish to an independent, impartial, and competent authority:

  1. other available less invasive investigative techniques have been considered;
  2. information accessed will be confined to what is reasonably relevant and any excess information collected will be promptly destroyed or returned to the impacted individual; and
  3. information is accessed only by the specified authority and used for the purpose for which was authorisation was given.

Competent Judicial Authority: Determinations related to communications surveillance must be made by a competent judicial authority that is impartial and independent. The authority must be:

  1. separate from the authorities conducting communications surveillance;
  2. conversant in issues related to and competent to make judicial decisions about the legality of communications surveillance, the technologies used and human rights; and
  3. have adequate resources in exercising the functions assigned to them.

Due process: Due process requires that States respect and guarantee individuals’ human rights by ensuring that lawful procedures that govern any interference with human rights are properly enumerated in law, consistently practiced, and available to the general public. Specifically, in the determination on his or her human rights, everyone is entitled to a fair and public hearing within a reasonable time by an independent, competent and impartial tribunal established by law,[10] except in cases of emergency when there is imminent risk of danger to human life. In such instances, retroactive authorisation must be sought within a reasonably practicable time period. Mere risk of flight or destruction of evidence shall never be considered as sufficient to justify retroactive authorisation.

User notification: Individuals should be notified of a decision authorising communications surveillance with enough time and information to enable them to appeal the decision, and should have access to the materials presented in support of the application for authorisation. Delay in notification is only justified in the following circumstances:

  1. Notification would seriously jeopardize the purpose for which the surveillance is authorised, or there is an imminent risk of danger to human life; or
  2. Authorisation to delay notification is granted by the competent judicial authority at the time that authorisation for surveillance is granted; and
  3. The individual affected is notified as soon as the risk is lifted or within a reasonably practicable time period, whichever is sooner, and in any event by the time the communications surveillance has been completed. The obligation to give notice rests with the State, but in the event the State fails to give notice, communications service providers shall be free to notify individuals of the communications surveillance, voluntarily or upon request.

Transparency: States should be transparent about the use and scope of communications surveillance techniques and powers. They should publish, at a minimum, aggregate information on the number of requests approved and rejected, a disaggregation of the requests by service provider and by investigation type and purpose. States should provide individuals with sufficient information to enable them to fully comprehend the scope, nature and application of the laws permitting communications surveillance. States should enable service providers to publish the procedures they apply when dealing with State communications surveillance, adhere to those procedures, and publish records of State communications surveillance.

Public oversight: States should establish independent oversight mechanisms to ensure transparency and accountability of communications surveillance.[11] Oversight mechanisms should have the authority to access all potentially relevant information about State actions, including, where appropriate, access to secret or classified information; to assess whether the State is making legitimate use of its lawful capabilities; to evaluate whether the State has been transparently and accurately publishing information about the use and scope of communications surveillance techniques and powers; and to publish periodic reports and other information relevant to communications surveillance. Independent oversight mechanisms should be established in addition to any oversight already provided through another branch of government.

Integrity of communications and systems: In order to ensure the integrity, security and privacy of communications systems, and in recognition of the fact that compromising security for State purposes almost always compromises security more generally, States should not compel service providers or hardware or software vendors to build surveillance or monitoring capability into their systems, or to collect or retain particular information purely for State surveillance purposes. A priori data retention or collection should never be required of service providers. Individuals have the right to express themselves anonymously; States should therefore refrain from compelling the identification of users as a precondition for service provision.[12]

Safeguards for international cooperation: In response to changes in the flows of information, and in communications technologies and services, States may need to seek assistance from a foreign service provider. Accordingly, the mutual legal assistance treaties (MLATs) and other agreements entered into by States should ensure that, where the laws of more than one state could apply to communications surveillance, the available standard with the higher level of protection for individuals is applied. Where States seek assistance for law enforcement purposes, the principle of dual criminality should be applied. States may not use mutual legal assistance processes and foreign requests for protected information to circumvent domestic legal restrictions on communications surveillance. Mutual legal assistance processes and other agreements should be clearly documented, publicly available, and subject to guarantees of procedural fairness.

Safeguards against illegitimate access: States should enact legislation criminalising illegal communications surveillance by public or private actors. The law should provide sufficient and significant civil and criminal penalties, protections for whistle blowers, and avenues for redress by affected individuals. Laws should stipulate that any information obtained in a manner that is inconsistent with these principles is inadmissible as evidence in any proceeding, as is any evidence derivative of such information. States should also enact laws providing that, after material obtained through communications surveillance has been used for the purpose for which information was given, the material must be destroyed or returned to the individual.

Signatories

  1. 7iber (Amman, Jordan)
  2. Access(International)
  3. Acción EsLaRed(Venezuela)
  4. ActiveWatch – – Media Monitoring Agency (Romania)
  5. Africa Platform for Social Protection – APSP (Africa)
  6. AGEIA Densi (Argentina)
  7. Agentura.ru (Russia)
  8. Aktion Freiheit statt Angst(Germany)
  9. Alfa-Redi  (LAC)
  10. All India Peoples Science Network (India)
  11. Alternatif Bilişim Derneği (Alternatif Bilişim) – Turkey(Turkey)
  12. Alternative Law Forum (India)
  13. Arab Digital Expression Foundation(Egypt)
  14. Article 19 (International)
  15. ASL19 (Canada/Iran)
  16. Asociación Civil por la Igualdad y la Justicia – ACIJ (Argentina)
  17. Asociación Colombiana de Usuarios de Internet  (Colombia)
  18. Asociación de Internautas Spain (Spain)
  19. Asociación Paraguaya De Derecho Informático Y Tecnológico – APADIT (Paraguay)
  20. Asociación por los Derechos Civiles – ADC (Argentina)
  21. Aspiration (United States)
  22. Associação Brasileira de Centros de inclusão Digital – ABCID(Brasil)
  23. Associació Pangea Coordinadora Comunicació per a la Cooperació (Spain)
  24. Association for Freedom of Thought and Expression – AFTE (Egypt)
  25. Association for Progressive Communications – APC (International)
  26. Association for Proper Internet Governance (Switzerland)
  27. Association for Technology and Internet – APTI(Romania)
  28. Association of Community Internet Center – APWKomitel(Indonesia)
  29. Australia Privacy Foundation – APF (Australia)
  30. Bahrain Center for Human Rights (Bahrain)
  31. Bangladesh NGOs Network for Radio and Communication – BNNRC (Bangladesh)
  32. BC Freedom of Information & Privacy Association (BC FIPA) (Canada)
  33. Benetech (USA/Global)
  34. Berlin Forum on Global Politics (BFoGP)(Germany)
  35. Big Brother Watch (United Kingdom)
  36. Bits of Freedom (Netherlands)
  37. Bolo Bhi (Pakistan)
  38. Brasilian Institute for Consumer Defense – IDEC(Brasil)
  39. British Columbia Civil Liberties Association – BCCLA (Canada)
  40. Bytes for All (Pakistan)
  41. Cairo Institute for Human Rights Studies(Egypt)
  42. Casa de Derechos de Quilmes (Argentina)
  43. Center for Digital Democracy (United States)
  44. Center for Internet & Society India (India)
  45. Center of Media Justice (United States)
  46. Centre for Community Informatics Research, Development and Training(Canada)
  47. Centro de Estudios en Libertad de Expresión y Acceso a la Información – CELE(Argentina)
  48. Centro de Tecnologia e Sociedade (CTS) da FGV  (Brasil)
  49. Centrum Cyfrowe Projekt: Polska (Poland)
  50. Citizen Lab (Canada)
  51. Citizens Network Watchdog Poland (Poland)
  52. ClubComputer.at (Austria)
  53. Collaboration on International ICT Policy in total East and South Africa (CIPESA) (Uganda / Africa )
  54. Colnodo(Colombia)
  55. Comisión Colombiana de Juristas(Colombia)
  56. Comité Cerezo México (México)
  57. Consumer Korea (South Korea)
  58. Consumers International(International)
  59. ContingenteMx  (México)
  60. datapanik.org (Belgium)
  61. DAWN Network  (International)
  62. DEJUSTICIA (Colombia/International)
  63. Delhi Science Forum (India)
  64. Digital Courage (Germany)
  65. Digital Rights Foundation  (Pakistan)
  66. Digitterra (International)
  67. DiploFoundation(International)
  68. Electronic Frontier Finland – EFFI (Finland)
  69. Electronic Frontier Foundation – EFF (International)
  70. Electronic Frontiers Australia – EFA  (Australia)
  71. Electronic Frontiers Italy – ALCEI  (Italy – Europe)
  72. Electronic Privacy Information Center – EPIC  (United States)
  73. European Digital Rights – EDRI  (Europe)
  74. European Information Society Institute – EISi(Slovakia)
  75. Fight for the Future  (United States)
  76. Foro Ciudadano de Participación por la Justicia y los Derechos Humanos – FOCO (Argentina)
  77. Foundation for Community Educational Media – FCEM (Thailand)
  78. Foundation for Information Policy Research – FIPR (United Kingdom)
  79. Free Network Foundation  (United States)
  80. Free Press (United States)
  81. Free Press Unlimited(Netherlands)
  82. Free Software Foundation Europe(Europe)
  83. Free Software Movement of India  (India)
  84. Freedom Against Censorship Thailand (FACT) (Thailand )
  85. Freedom of the Press Foundation (United States)
  86. Fundación Ambio (Costa Rica)
  87. Fundación Andina para la Observación y el Estudio de Medios  (Ecuador)
  88. Fundación Karisma (Colombia)
  89. Fundación Redes y Desarrollo – FUNREDES (República Dominicana – El Caribe)
  90. Fundación Vía Libre (Argentina)
  91. Global Voices Advocacy(International)
  92. Grupo de Software Libre de Cúcuta(Cúcuta, Norte de Santander, Colombia)
  93. Gulf Center for Human Rights  (Arab Gulf region)
  94. Hackerspace Rancho Electrónico (Mexico)
  95. Helsinki Foundation for Human Rights, Warsaw – HFHR (Poland)
  96. Hiperderecho (Peru)
  97. Human Rights Data Analysis Group(International)
  98. Human Rights Watch – HRW  (International)
  99. ICT Consumers Association of Kenya – ICAK(Kenya)
  100. Independent Journalism Center from Moldova(Republic of Moldova)
  101. Index on Censorship  (United Kingdom)
  102. Initiative for Freedom of Expression(Turkey)
  103. Initiative für Netzfreiheit  (Austria)
  104. Institute des Technologies de l’Information et de la Communication Pour le Developpement – INTIC4DEV (Africa)
  105. Instituto Baiano de Direito Processual Penal – IBADPP (Brasil/Bahia)
  106. Instituto Bem Estar Brasil (Brasil)
  107. Instituto NUPEF (Brasil)
  108. International Civil Liberties Monitoring Group(Canada)
  109. International Media Support – IMS  (International)
  110. International Modern Media Institute  (Iceland / International)
  111. Internet Governance Project, Syracuse University School of Information Studies (United States)
  112. Internet Society Palestine (Palestine)
  113. InternetNZ (New Zealand)
  114. Internews  (United States)
  115. IP Justice  (United States)
  116. Iraqi Network for Social Media (Iraq)
  117. Iriarte & Asociados  (Peru)
  118. ISOC Board of Trustees(International)
  119. IT for Change  (India)
  120. Iuridicum Remedium, o.s.(Czech Republic)
  121. Jonction (Mauritania, Senegal, Tanzania)
  122. Jordan Open Source Association(Jordan)
  123. Journaliste en danger (JED)  (Démocratique du Congo / Africa)
  124. Kenya ICT Action Network – KICTANet (Kenya)
  125. Kenyan Ethical and Legal Issues Network  (Kenya)
  126. La Quadrature du Net  (France/Europe)
  127. Latin American Network of Surveillance, Technology and Society Studies – LAVITS  (Latin America)
  128. Liberty  (United Kingdom)
  129. Liga Uruguaya de Defensa del Consumidor(Uruguay)
  130. Liga voor Mensenrechten vzw  (Belgium)
  131. May First / People Link  (United States/international)
  132. Media Action Grassroots Network – MAG-Net  (United States)
  133. Media Rights Agenda – MRA  (Ikeja, Lagos)
  134. MOGiS e.V. – A Voice for Victims (Germany)
  135. Movimento Mega (Brasil)
  136. Nawaat  (Tunisia)
  137. New York Chapter of the Internet Society(United States)
  138. Oneworld: Platform for Southeast Europe – OWPSEE  (Western Balkans)
  139. Open Internet Tools Project – Open ITP  (United States)
  140. Open Knowledge Foundation  (United Kingdom)
  141. Open Media and Information Companies Initiative – Open MIC  (United States)
  142. Open Net Korea (South Korea)
  143. Open Rights Group  (United Kingdom)
  144. Openmedia.ca  (Canada)
  145. Pacific Freedom Forum (Pacific Region)
  146. Pakistan Press Foundation – PPF (Pakistan)
  147. Palestinian Center for Development & Media Freedoms – MADA (Palestine)
  148. Panoptykon Foundation (Poland)
  149. Partners for Democratic Change Serbia(Serbia)
  150. People Who  (International)
  151. Privacy & Access Council of Canada(Canada)
  152. Privacy Activism  (United States)
  153. Privacy International (International)
  154. PROTEGE QV (Cameroon/ Africa)
  155. Public Association “Journalists” (Kyrgyzstan)
  156. RedPaTodos  (Colombia)
  157. Reporters Without Borders – RSF  (International)
  158. Samuelson-Glushko Canadian Internet Policy and Public Interest Clinic – CIPPIC (Canada)
  159. SHARE Conference | SHARE Defense  (Balkan Region)
  160. Social Media Exchange  (Lebanon)
  161. Society for Knowledge Commons(India)
  162. Software Freedom Law Centre  (India)
  163. Southeast Asian Press Alliance (South East Asia)
  164. Statewatch  (United Kingdom)
  165. Sulá Batsú  (Costa Rica)
  166. Surveillance Studies Centre(Ontario, Canada)
  167. Surveillance Studies Network  (International)
  168. TagMeNot  Taiwan Association for Human Rights(Taiwan)
  169. TechLiberty (New Zealand)
  170. TEDIC  (Paraguay)
  171. Thai Netizen Network(Thailand)
  172. The New Renaissance Network(Sweden)
  173. TransMediar-Pimentalab [at] Universidade Federal de São Paulo  (Brazil)
  174. University of Campinas – Research Group CTeMe (Knowledge, Technology and Market) (Brasil)
  175. University of São Paulo’s Research Group on Access to Information Policies (GPoPAI-USP) (Brasil)
  176. Ushahidi  (International)
  177. VIBE!AT  (Austria)
  178. Voices for Interactive Choice and Empowerment(Bangladesh)
  179. West African Journalists Association (West Africa)
  180. WITNESS  (International)
  181. Zwiebelfreunde e.V.  (Germany)

[1]Universal Declaration of Human Rights Article 12, United Nations Convention on Migrant Workers Article 14, UN Convention of the Protection of the Child Article 16, International Covenant on Civil and Political Rights, International Covenant on Civil and Political Rights Article 17; regional conventions including Article 10 of the African Charter on the Rights and Welfare of the Child, Article 11 of the American Convention on Human Rights, Article 4 of the African Union Principles on Freedom of Expression, Article 5 of the American Declaration of the Rights and Duties of Man, Article 21 of the Arab Charter on Human Rights, and Article 8 of the European Convention for the Protection of Human Rights and Fundamental Freedoms; Johannesburg Principles on National Security, Free Expression and Access to Information, Camden Principles on Freedom of Expression and Equality.

[2]Universal Declaration of Human Rights Article 29; General Comment No. 27, Adopted by The Human Rights Committee Under Article 40, Paragraph 4, Of The International Covenant On Civil And Political Rights, CCPR/C/21/Rev.1/Add.9, November 2, 1999; see also Martin Scheinin, “Report of the Special Rapporteur on the promotion and protection of human rights and fundamental freedoms while countering terrorism,” 2009, A/HRC/17/34.

[3]Communications metadata may include information about our identities (subscriber information, device information), interactions (origins and destinations of communications, especially those showing websites visited, books and other materials read, people interacted with, friends, family, acquaintances, searches conducted, resources used), and location (places and times, proximities to others); in sum, metadata provides a window into nearly every action in modern life, our mental states, interests, intentions, and our innermost thoughts.

[4]For example, in the United Kingdom alone, there are now approximately 500,000 requests for communications metadata every year, currently under a self-authorising regime for law enforcement agencies who are able to authorise their own requests for access to information held by service providers. Meanwhile, data provided by Google’s Transparency reports shows that requests for user data from the U.S. alone rose from 8888 in 2010 to 12,271 in 2011. In Korea, there were about 6 million subscriber/poster information requests every year and about 30 million requests for other forms of communications metadata every year in 2011-2012, almost of all of which were granted and executed. 2012 data available at http://www.kcc.go.kr/user.do?mode=view&page=A02060400&dc=K02060400&boardId=1030&cp=1&boardSeq=35586

[5]See as examples, a review of Sandy Petland’s work, ‘Reality Mining’, in MIT’s Technology Review, 2008, available at http://www2.technologyreview.com/article/409598/tr10-reality-mining/ and also see Alberto Escudero-Pascual and Gus Hosein, ‘Questioning lawful access to traffic data’, Communications of the ACM, Volume 47 Issue 3, March 2004, pages 77 – 82.

[6]Report of the UN Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression, Frank La Rue, May 16 2011, available at http://www2.ohchr.org/english/bodies/hrcouncil/docs/17session/a.hrc.17.27_en.pdf

[7]“People disclose the phone numbers that they dial or text to their cellular providers, the URLS that they visit and the e-mail addresses with which they correspond to their Internet service providers, and the books, groceries and medications they purchase to online retailers . . . I would not assume that all information voluntarily disclosed to some member of the public for a limited purpose is, for that reason alone, disentitled to Fourth Amendment protection.” United States v. Jones, 565 U.S. ___, 132 S. Ct. 945, 957 (2012) (Sotomayor, J., concurring).

[8]“Short-term monitoring of a person’s movements on public streets accords with expectations of privacy” but “the use of longer term GPS monitoring in investigations of most offenses impinges on expectations of privacy.” United States v. Jones, 565 U.S., 132 S. Ct. 945, 964 (2012) (Alito, J. concurring).

[9]“Prolonged surveillance reveals types of information not revealed by short-term surveillance, such as what a person does repeatedly, what he does not do, and what he does ensemble. These types of information can each reveal more about a person than does any individual trip viewed in isolation. Repeated visits to a church, a gym, a bar, or a bookie tell a story not told by any single visit, as does one’s not visiting any of these places over the course of a month. The sequence of a person’s movements can reveal still more; a single trip to a gynecologist’s office tells little about a woman, but that trip followed a few weeks later by a visit to a baby supply store tells a different story.* A person who knows all of another’s travels can deduce whether he is a weekly church goer, a heavy drinker, a regular at the gym, an unfaithful husband, an outpatient receiving medical treatment, an associate of particular individuals or political groups – and not just one such fact about a person, but all such facts.” U.S. v. Maynard, 615 F.3d 544 (U.S., D.C. Circ., C.A.)p. 562; U.S. v. Jones, 565 U.S. __, (2012), Alito, J., concurring. “Moreover, public information can fall within the scope of private life where it is systematically collected and stored in files held by the authorities. That is all the truer where such information concerns a person’s distant past…In the Court’s opinion, such information, when systematically collected and stored in a file held by agents of the State, falls within the scope of ‘private life’ for the purposes of Article 8(1) of the Convention.” (Rotaru v. Romania, [2000] ECHR 28341/95, paras. 43-44.

[10]The term “due process” can be used interchangeably with “procedural fairness” and “natural justice”, and is well articulated in the European Convention for Human Rights Article 6(1) and Article 8 of the American Convention on Human Rights.

[11]The UK Interception of Communications Commissioner is an example of such an independent oversight mechanism. The ICO publishes a report that includes some aggregate data but it does not provide sufficient data to scrutinise the types of requests, the extent of each access request, the purpose of the requests, and the scrutiny applied to them. See http://www.iocco-uk.info/sections.asp?sectionID=2&type=top.

[12]Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression, Frank La Rue, 16 May 2011, A/HRC/17/27, para 84.

NEW!! : subscribe to the first summer school on the EAFSJ…

 

LogoSummerSchool2013Rome

Roma, 8-11 July
Sala conferenze Fondazione Basso – via della Dogana Vecchia, 5 – Roma

The European Area of Freedom Security and Justice (EAFSJ): scope, objectives, actors and dynamics.

Night view of Europe

Aim: to take stock of the current state of EAFSJ and of its foreseeable evolution within the next multiannual program 2015-2019 (to be adopted under Italian Presidency at the beginning of the next legislature).
Lenght: 4 one day modules
Subscriptions: on line on the Fondazione Basso internet site : http://www.fondazionebasso.it
Participation fees:

Euro 480,00 (ORDINARY FEE).
Euro 200,00 (FOR STUDENTS / RESEARCHERS) .
(Bank Account of Fondazione Lelio e Lisli Basso – Banca Nazionale del Lavoro Ag. Senato Palazzo Madama: IBAN IT18I0100503373000000002777 ).
Subscriptions should be submitted before June 15th.The Summer School will take place only if a minimum number of subscribers is reached !For further information : tel. 0039.06.6879953 – basso@fondazionebasso.it
Languages: lessons will be mainly in Italian (some lessons will be in English and French), teaching material will be in Italian and/or English, French.
English/Italian translation will be available.
The programme is on the web-site of Fondazione Basso (www.fondazionebasso.it -Tel. 06.6879953 – email: basso@fondazionebasso.it)

July 8th
A Constitutional and Institutional perspective
09h00 am – 06h30 pm

Opening speeches:
Valerio Onida: Freedom, Security and Justice related policies from a constitutional perspective and in relation with international and supranational dimensions
Stefano Manservisi: After the Stockholm Programme : how to preserve the specificity of the European Area of freedom security and Justice related policies by integrating them in the general EU governance and legal framework?

Debate

Freedom Security and Justice as the core of the common constitutional european heritage
Protecting fundamental rights: the impact of the accession of the EU to the ECHR. A common European Constitutional Heritage arising from the Council of Europe and European Union European Courts. What can be expected from the Strasbourg Human Rights Court in areas related to the FSJ?.

Speaker: Giuseppe Cataldi

Freedom Security and Justice as the core of the common constitutional european heritage
Promoting fundamental rights: the European Charter and its impact on EU policies. Even if the Charter does not extend the EU competencies it is now a constitutional parameter to be taken in account not only by the European judges but also by the EU legislature, even for policies designed with a more limited scope.

Speaker:Ezio Perillo

Debate

Evolution and transformation of the principle of Primacy of EU law. Dialogue and mutual influence of European and national Constitutional Courts.
Fifty years after the landmark case of Van Gend en Loos and four years after the Lissabon-Urteil (Bundesverfassungsgericht judgment of 30.6.2009), the tensions between EU “limits” and national “counter-limits” could arise again notably in the EAFSJ area.

Speaker: Oreste Pollicino

The EAFSJ a cross road of European and national founding values (art. 2), as well as for fundamental and European citizenship rights. How manage the indivisibility of rights and a Member States differentiated integration ?
(Opt-in Opt-out Countries). How far can the EU impact on Member States internal legislation (Towards a “reverse Solange” mechanism)? How the EU and Council of Europe can influence national fundamental rights related policies

Speaker: Nicoletta Parisi

The EAFSJ as supranational constitutional area of democracy. From National State to the European Union: what kind of relation between national and european legal orders ?
Sixty years of EU integration have changed the concept of democracy and sovereignty. There is a metamorphosis in National State’ s traditional role and its constitutional elements such as territory, citizenship and sovereign power. The Kantian vision of a peaceful cosmopolitan project mirrors the category of EU citizenship arising in the EAFSJ. Today Habermas developed the concept of “Constitutional patriottism”, underlying a “constitutionalisation” of the European supranational area. What are the pro and cons of this EU perspective ? The post-Lisbon Treaty stressed that the EAFSJ is becoming the embryo of a European public sphere as well as of a first example of supranational democracy.

Speaker: Francesca Ferraro

Debate

July 9th
Institutional dynamics and EU practices
09h30 am – 06h30 pm

The EAFSJ before Lisbon. The intergovernmental cooperation. From “TREVI” via “Schengen” to Amsterdam. The first phase.
How formerly excluded EAFSJ related policies have been integrated into the EU framework. TREVI cooperation, the Schengen agreement (1985) and its 1990 Implementing Convention as well as the Dublin Convention on Asylum.
The emerging notion of supranational space in the Single European Act (1986). The mutual recognition principle in the Internal Market and in EAFSJ-related policies. The Schengen Acquis in the EU legal framework from Amsterdam to Lisbon. Opt-in and Opt-out Countries: the impact of differentiated integration. Schengen relevance and ECJ jurisprudence on the preservation of the Schengen system consistency. From cooperation to integration.

Speaker: Dino Rinoldi

Debate

The EAFSJ after Lisbon (1). How the EAFSJ specificity has been preserved by progressively integrating it in the ordinary EU (communitarized) legal institutional framework. The impact on the EU institutions and on the MS.
Dynamics and the role of the Institutions in promoting, negotiating and implementing the EAFSJ-related policies. European Council, European Parliament, Council of the European Union, Commission and Court of Justice interplaying in the EAFSJ. The preparatory work conducted behind the scene by the Commission Directorates General, the Council working bodies – COREPER, CATS, COSI – and the EP parliamentary committees

Speaker: Antonio Caiola

The EAFSJ after Lisbon (2) How democratic principles are fulfilled in the EAFSJ. The impact of the EP on legislative procedures.
The interparliamentary dialogue and the way how the EP and national parliaments play their role when verifying the subsidiarity and proportionality principles in the EAFSJ policies. The emerging role at EU level of “political families” represented at national European and international level (European political parties, EP political groups, national parties).

Speaker: Emilio De Capitani

Debate

The EAFSJ after Lisbon (3). How EU policies are framed and implemented at national level. How cooperation, mutual recognition and harmonisation are implemented
How EAFSJ policies are implemented at national level. Problems and opportunities arising notably when implementing the mutual recognition of other EU countries’ measures. How intertwined are the EU and national administration in the EAFSJ related policies. Is there complementarity between EU and National strategies? The EU financial levy as a facilitator of mutual EU-national coordination. The emerging role of EU Authorities and Agencies as a support and meeting space also for national administrations (Ombudsman, FRA, EDPS, FRONTEX, EASO, EMCDDA, EUROPOL, OLAF, CEPOL, EUROJUST, …).

Speaker: Lorenzo Salazar

Debate

July 10th
An European space of freedom and rights
09h30 am- 06h30 pm

The EAFSJ after Lisbon (4) Placing the individuale at the heart of EU activities
How EU legislation implements the principles of equality and non-discrimination. The ECJ jurisprudence and the phenomenon of reverse discrimination. EU citizenship-related jurisprudence. Judicial action at national and European level founded on the EU Charter. Infringement of EU founding values and fundamental rights as possible exceptions to the mutual recognition obligations? Fundamental Rights Agency.

Speaker: Valentina Bazzocchi

The EU evolving framework of Transparency, access to documents, principle of good administration, and of classified information
After Lisbon a more transparent independent and efficient EU administration can be founded on Arts 15 and 298 of the TFEU as well as Arts 41 and 42 of the European Charter. However the close intertwining of the EU and the Member States has created a hybrid system of European Classified Information (EUCI), which is particularly relevant in the EAFSJ policies. How do European and national institutions implement the EU principles? How is the principle of good administration secured? What role should the EU Ombudsman play?

Speaker: Deirdre Curtin

Protection of Personal Data. The EU reform.
After the Lisbon Treaty and the merger of the so-called first and third pillars, protection of personal data can be framed in a globally consistent manner. Informational self determination, protection against possible abuses by the private sector as well as by public sector (law enforcement authorities) can now be framed at European level by taking stock of the lessons learned at national and international level (Council of Europe, OECD). How to preserve the role of national authorities and of the new coordinating body.

Speaker: Vanna Palumbo

Freedom of movement border integrated management
Freedom of movement of European citizens as well as of third country nationals in the EU remains a central and controversial issue. The integrated external border management is progressively framed at legislative level (borders, visas..) and implemented at operational level also thanks to the emerging role of Frontex and of the new European networks (SIS II – VIS). New opportunities as well as risks emerge in the definition of the EU-Member State management of internal and external borders

Speaker: Luisa Marin

Debate

European Migratory policies
Objectives, legal framework and operational setting of the EU-Member State policies. Five years after the European Pact on Asylum and Migration (2008), what lessons can be drawn for the next (2015-2019) multiannual programme? What improvements can be foreseen for the EU migration governance at central and national level? How are the Member States implementing the EU legislation? What are the main external aspects of the EU migration policy?

Speaker: Henry Labayle

The European common asylum system (and of EASO and EURODAC)
After the first generation of EU “minimum” rules the EU has now established the Common European Asylum System foreseen by Art. 18 of the Charter and Art 78 of the TFEU by taking account of the jurisprudence of the Luxembourg and Strasbourg Courts. At national level high standards should be granted to avoid the problems found for instance with Greece when implementing the Dublin system. The principle of solidarity still seems to be underexploited. Attention should be paid to the new role of EASO (Reg. (EU) No 439/2010) as well as to the implementation of the EURODAC system.

Speaker: Patricia Van de Peer

Debate

July 11
An European space of security and justice
09h30 am -06h30 pm

Judicial cooperation in civil matters; complement of the freedom of movement?
Judicial cooperation in civil matters has been one of the most dynamic domains after the entry into force of the Lisbon Treaty. Enhanced cooperation took place in matrimonial matters and intellectual property. Special attention will be reserved for the recently revised Brussels I Regulation (which abolished the “exequatur” procedure) as well as for the new Regulations on succession and wills and on mutual recognition of protection measures in civil matters.

Speaker: Filomena Albano

Internal security strategy: crisis prevention and management.
Special attention will be paid to the implementation of the 2010 European Internal Security Strategy and its impact on the cooperation between the EU institutions and agencies as framed by the “Policy Cycle” for the 2013-2017 period. There will also be a presentation of the implementation of PRUM cooperation and of the “availability principle” as well as the way how security- and intelligence-related information is exchanged notably within the framework of the so-called “Swedish Initiative”. The role played by COSI, Europol and of the internal security fund will be presented and debated together with the impact of the up-coming “Lisbonisation” of EU measures adopted before the entry into force of the Lisbon Treaty

Speaker: Sandro Menichelli

Debate

Judicial Cooperation in criminal matters
How judicial cooperation in criminal matters has been developed between countries of different legal traditions (civil and common law). Problems and opportunities arising at each level of cross-border cooperation (open coordination, mutual recognition, legislative harmonisation). The European jurisprudence (Strasbourg and Luxembourg Courts) as well as the impact of the EU Charter. The implementation of the first post-Lisbon measures and impact of the Lisbonisation of former third pillar measures in this domain. Preserving the independence of the judiciary: towards European-wide judiciary quality evaluation systems.

Speaker: Luca De Matteis

The European Public Prosecutor: a pattern also for Member States?
The OLAF Reform and the Eurojust “Lisbonisation” are intermediate phases towards the creation of the European Public Prosecutor’s office (EPPO) (Art. 86 TFEU). The latter will be empowered to bring action also before national courts. The European legislation will determine the general rules applicable to the European Public Prosecutor’s Office, the conditions governing the performance of its functions, the rules of procedure applicable to its activities, as well as those governing the admissibility of evidence, and the rules applicable to the judicial review of procedural measures taken by it in the performance of its functions. What will be the impact, the risks and opportunities arising from the creation of this new European Institution?

Speaker: Claudia Gualtieri

How to empower the EU citizens when EAFSJ are shaped and implemented ?
Round Table with the Intervention of Paul Nemitz, Antonie Cahen, Robert Bray Tony Bunyan

Final Debate

PRESENTATION OF THE COURSE

The Treaty of Lisbon and the Charter of Fundamental Rights of the European Union, which entered into force on 1 December 2009, constituted an important step both at the legal level and at the political level in the evolution of the European Union. The aim of the EU now is not only “… to promote peace, its values and the well-being of its peoples”, having presided over, since the end of the Second World War, the longest ever period of peace between European States, but also to achieve “… an area of freedom, security and justice with respect for fundamental rights and the different legal systems and traditions of the Member States.”

After the Treaty of Lisbon, the policies already provided for in the Maastricht Treaty within the framework of the so-called “third pillar” and originally focused mainly on intergovernmental cooperation and cooperation between administrations, are now to evolve into European “common policies” directly towards the interests of the individual, who is placed “at the heart of European integration.”

It is a Copernican revolution in so far as the Union is called not only to offer “… its citizens an area of freedom, security and justice without internal frontiers, in which the free movement of persons is ensured in conjunction with appropriate measures with respect to external border controls, asylum, immigration and the prevention and combating of crime” (Art. 3 TEU and Title V TFEU) but also to promote (and not only protect) fundamental rights and prevent all forms of discrimination (Art. 10 TFEU) and strengthen EU citizenship (Arts 18-25 TFEU) and with it the democratic principles on which it is based (Title II TEU).

The fact that the competences related to the ASFJ are now “shared” with the Member States (Art. 4 TEU) and are to be focused on the rights of the person brings about a daily interaction between the national and the European level, bringing into play national and European values, rights and objectives.

The process of reciprocal hybridization between the nascent European model and traditional national models is anything but politically painless, as the experience of almost thirty years of Schengen cooperation shows.

The aim of this Summer School is to assess the progress and difficulties encountered by the European institutions and the Member States in implementing the Charter of Fundamental Rights and the objectives set by the European Council in the “Stockholm Programme” of 10 December 2009.

Based on this evaluation, we intend to shed light on the possible priority bearing in mind that:
– it will be necessary to adjust the secondary legislation of the European Union in the light of the values and principles which are now enshrined in the Lisbon Treaty and the Charter of Fundamental Rights (“Lisbonisation”);
– we shall be in the final phase of the accession of the EU to the European Convention on Human Rights;
– at the beginning of the next legislature, we will be entering into a new phase in the European judicial area with the negotiations on the establishment of the European Public Prosecutor and the transition to the ordinary legislative procedure with regard to measures of police and judicial cooperation in criminal matters adopted before the entry into force of the Treaty (the transitional arrangements end on 1 December 2014);
– Member States which have hitherto enjoyed special treatment (Ireland, Denmark and the United Kingdom in particular) should have clarified their position with respect to the new phase of the ASFJ and the Schengen cooperation.

In the course of the next legislature it will also be necessary to promote greater consistency between European and national strategies related to the European area of freedom, security and justice. Just as in the economic sphere, the divergence of national public policies has put at risk the credibility of the common currency, the diversity of standards for the protection of the rights in Member States is straining mutual trust, the application of the principle of mutual recognition and the very credibility of the nascent “European model”. The strengthening of the operational solidarity between Member States’ administrations – which is being developed for example within the framework of Schengen cooperation – must be accompanied by legislative, operational and financial measures that implement solidarity between European citizens and third-country nationals on the territory of the Union.

In this perspective, Italy may play an important role as the new multi-annual programme for 2015-2019 is to be adopted by the second half of 2014 under the Italian Presidency.

Speakers:

Academics:
Valerio Onida, Former President of the Italian Constitutional Court
Giuseppe Cataldi, Pro-rettore Università L’Orientale (Napoli)
Oreste Pollicino, Public comparative law Professor  (Università Bocconi – Milano)
Nicoletta Parisi, EU Law Professor  (Università Catania)
Francesca Ferraro, Visiting Professor (Università L’Orientale – Napoli)
Dino Rinoldi, International Law Professor  (Università Cattolica – Piacenza)
Valentina Bazzocchi, PHD EU Law (Alma Mater Università Bologna)
Deirdre Curtin, Professor of European Law (University of Amsterdam – NL),
Luisa Marin, Assistant Professor of European Law (University of Twente – NL)
Henri Labayle, Professeur de Droit international et européen (Université de Pau et des
pays de l’Adour – France)

Representatives and officials of European and national administrations:
Ezio Perillo (European Civil Service Tribunal)
Stefano Manservisi DG of the Commission DG Home
Paul Nemitz Director at the Commission DG Justice
Antoine Cahen, Patricia Van Den Peer, Claudia Gualtieri (European Parliament)
Filomena Albano, Luca De Matteis, Lorenzo Salazar (Italian Justice Ministery)
Sandro Menichelli (UE Italian Permanent Representation )
Vanna Palumbo (Garante Privacy IT)

Representatives of Civil Society:
Tony Bunyan, Director of Statewatch,Emilio De Capitani, FREE Group Secretary and Visiting Professor (Università L’Orientale – Napoli)

BuonGoverno

Terrorism and “Intelligence-led policing”: the German Constitutional Court draws its “red lines”..

On April 23rd, shortly after the European Union started working on the new Europol legal framework which is deemed to align the main intelligence led policy Agency with the Lisbon Treaty and with the European Charter the German Constitutional Court (BVG) decided to impose a strict separation between the work of the police and intelligence services. As in several other cases where the BVG jurisprudence has influenced also the European legislature this ruling will be probably thouroughly analysed also in Brussels even if the BVG maintain that the issue falls under the national exclusive competence. Therefore it will be more than likely that the principles outlined in this ruling would be taken in account in the EU draft legislation on data protection when these data are collected for security purposes.

According to the BVG press release  (emphasis added) “…For the Karlsruhe based court, the exchange of data between the Federal Office for the Protection of the Constitution, intelligence services, military counter-intelligence and the police amounts to — a severe infringement of the rights of those concerned, which is why it can only be allowed in exceptional cases. The judges did, however, authorise an “anti-terrorist” listing, while declaring another “secret service contact” listing unconstitutional. Initiated in 2006, the second database contains information on 18,000 potential terrorists, supplied by 38 intelligence services.
The counter-terrorism database is in its fundamental structures compatible with the Basic Law. However, it does not meet the constitutional requirements regarding specific aspects of its design.
This is what the First Senate of the Federal Constitutional Court decided in a judgment that was issued on April 23. Under certain conditions, the unconstitutional provisions can continue to be applied until new regulation has been enacted, but no later than until 31 December 2014.

The Decision is Essentially Based on the Following Considerations: Continue reading “Terrorism and “Intelligence-led policing”: the German Constitutional Court draws its “red lines”..”

The EP Committee rejects the proposal for an european passenger name record system (PNR)

written by Marine MARX

Wednesday the 24th of April, the EP Civil Liberties committee rejected the Commission Proposal for on the use of Passenger Name Record data (EU PNR). This proposal aimed at allowing the transfer of air passengers’ data for security purposes inside the EU territory.

Indeed, air carriers should collect PNR data from passengers during reservation and check-in procedures for flights entering or leaving the EU. PNR includes notably the passenger’s name, address, phone number, credit card details as well as “free text” linked with the management of the travel contract. Following an already settled US and Canada and Australia practices[1], the Commission proposed in February 2011 to oblige air carriers to provide EU countries with the data of passengers entering or leaving the EU, for use in preventing, detecting, investigating and prosecuting serious crime and terrorist offences.

The result of the vote led the Civil Liberties committee to a heated debate between the ones in favor of an EU PNR Scheme and the ones who voted against it (30 against, 25 in favour).  This division has come without surprise on this issue as the PNR saga dates back to an EP resolution in March 2003[2] and has always been a divisive topic.

Continue reading “The EP Committee rejects the proposal for an european passenger name record system (PNR)”

European Data Protection : legislative negotiations soon to be started …

Three years after the entry into force of the Lisbon treaty the long awaited legislative negotiations on the future European Union legal framework on data protection will now start between the European Parliament and the Council of the European Union. The competent parliamentary Committee LIBE will now debate two reports dealing respectively with
– a first report on the draft EU regulation covering the cases where possible the private sector is involved
– a second report on the draft EU Directive covering the cases where public authorities are involved.

The procedure

On the procedural side the two reports will in the coming months be debated and amendments will soon be submitted by all the political groups so that everyone will have the chance to take position on the main aspects of the proposed EU legislation. A first “orientation” vote will then take place and a majority will arise inside the parliamentary commitee and this majoritarian position will be the basis for the dialogue with the Council. The latter will also try to build its own majority between the national delegations. If successful a “general approach” will be endorsed by the Committee of Permanent Representatives (COREPER) and by the Council and this will be the Council alternative text to the parliamentary Committee “orientation”. The dialogue between the two institutions will then take place with the aim to reach a possible compromise.
If a compromise is reached it will be voted by the parliamentary committee and then by the plenary. The same will happen on the Council side and the procedure could then be considered closed (according to the practice of the so called “first reading agreement” an interinstitutional practice which has become the rule in the legislative negotiations at European Union level).

Will this procedure be successful for the data protection “package” ?

It is still possible but not granted as the issue of data protection is extremely sensitive and impact on fundamental interests in the public and private sphere. The end of the legislature is not so far (mid-2014) and there is not much time to close the negotiations in time if no “first reading” agreement is out of view in the coming months.
The pressure exist on both sides as Ireland, which is now chairing the Council Presidency, is the country where giants like GOOGLE and Facebook have their european seat, and is interested more than others in clarifying the new legal framework to avoid all the possible problems which could arise from a still unclear legal situation.
On the other side also the European Parliament is strongly committed in reaching an agreement because data protection has been at the centre of a more then a decade long “saga” with the other institutions (suffice to remember the controversial Plenary votes on the international agreements with the USA on Safe Harbor, PNR, SWIFT, and enquiry on the ECHELON system..).

However because of this pressure on both side the risk of stalemate could not also be excluded.

The evolution of the EU constitutional framework

On the Content side there are several new elements to be taken in account.
First of all since the entry into force of the Treaty of Lisbon the constitutional framework for data protection is radically changed.

Before this Treaty Protection of personal data was not an autonomous EU objective but a condition to be fulfilled as a corollary of other public objectives such as sharing data in the framework of the single market or collecting data to prevent transnational crime and terrorism. The legal basis for legislating in this domain where the articles of the treaties empowering the EU institutions for building the internal market (art.95 of the European Community Treaty) or to grant an hig level of security (art.29 of the Treaty of the European Union).

It is worth recalling that notwhitstanding its original focus on internal market the Community draft legislation (Com (90)0314 – C3-0323/Syn 287; OJ No. C277, 5.1.1990, p3) became the most advanced standard setting legal text on Data protection principles taking stock of the previous works in international fora such as the Council of Europe (Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data, adopted on 28 January 1981) and in the OECD (OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal data, adopted on 23 September 1980). The legal framework for data protection by law enforcement authorities were before Lisbon much more sparse, confuse and vague because at that time protection of public security at EU level was dealt at intergovernamental level and there was no real will to harmonize the existing national (diverging) standards.
Only because of the pressure of the European Parliament and after the signature of the Lisbon Treaty (!) an intergovenramental Framework Decision on the protection of personal data processed in the framework of police and judicial cooperation in criminal matters has been published on 30 December 2008. However the Framework Decision which is still into force cover only transnational transfert of data so that it does not establish a common level of privacy protection nor cover the EU institutions and agencies (Schengen information system included) which continue even today to consider as reference the Council of Europe Convention of …1981 and a Recommendation of 1987 .

The lack of a legal general framework for data protection together with a lack of Member States political will have probably been the main cause of the interinstitutional conflicts of the last fifteen years as well as of the growing tensions with the USA. As it happens often in case of interinstitutional stalemate the only progresses made came from the jurisprudence of national and european judges.()

After the entry into force of the Treaty of Lisbon everything is changed because data protection has been recognised as a fundamental right as well as a self standing objective of the European Union.

On the first aspect the art. 8 of the EU Charter is crystal clear:
“(1) Everyone has the right to the protection of personal data concerning him or her.
(2) Such data must be processed fairly for specified purposes and on the basis of the consent of the person concerned or some other legitimate basis laid down by law. Everyone has the right of access to data which has been collected concerning him or her, and the right to have it rectified.
(3) Compliance with these rules shall be subject to control by an independent authority.

In short, protecting personal data is like protecting not only the image of an individual but also his ability to act in a given society without external public and private interference (the so-called right to “self-determination” which has been shaped already in 1983 by the jurisprudence of the German Constitutional Court. According to the “Census” judgment:“A social and legal order in which the citizen can no longer know who knows what when about him and in which situation, is incompatible with the right to informational self-determination. A person who wonders whether unusual behaviour is noted each time and thereafter always kept on record, used or disseminated, will try not to come to attention in this way. A person who assumes, for instance, that participation in a meeting or citizen initiative is officially recorded, and may create risks for him, may well decide not to use the relevant fundamental rights ([as guaranteed in] Articles 8 and 9 of the Constitution). This would not only limit the possibilities for personal development of the individual, but also the common good, because self-determination is an essential prerequisite for a free and democratic society that is based on the capacity and solidarity of its citizens”.
To protect personal data amounts not only to protect the liberty of the individual and, his dignity but even a more general good of the democratic society itself.

However such beautiful principles would be meaningless if not reflected in a binding legislation and in the daily life. To reach this objective art. 16 of the Treaty on Functioning of the European Union (TFEU) makes clear that personal data should be protected by “Union institutions, bodies, offices and agencies, and by the Member States when carrying out activities which fall within the scope of Union law, and the rules relating to the free movement of such data.”

This will not be an easy task because EU law cover now all the main aspects of a person’s daily life in a global world where personal data have become the blood of the information society.
Massive data collection, on-line tracking and profiling not only by private companies but also by public authorities have become so widespread that many people consider that the protection of personal data itself do not exist any more. It seems that it has been killed
– by widespread invasive relatively low-cost technology
– by individual’s naïve behaviour in the social network
– by big private societies which are making an incredible amount of money from on-line advertising built on the exploitation of personal data (obtained for free)
– and last but not least by public authorities which, in a borderless world, having the facto lost the control of their territories try to prevent crime and terrorism by profiling potential dangerous people and collect everywhere massive amounts of personal data.

The post-Lisbon legislative data protection package

Confronted with the challenge of defining the new post-Lisbon data protection framework the Commission after thorough comparative studies has decided to maintain a twin track approach by submitting a Draft Regulation for protecting personal data in the civil domain and a Draft Directive adressed to public authorities when collecting personal data for security purposes. This choice has not been appreciated by the data protection authorities and by the European Parliament not only for the risk of inconsistencies but also for the risk of grey areas for activities which can fall in between.

EU Internal Security strategy: towards a EU-USA common path?

The traditional meeting between the justice and home affairs ministerial representatives of the United States of America (USA) and of the European Union (EU) took place the 8th and 9th December 2010. Ms Janet Napolitano, from the Department of Homeland Security and Mr Eric Holder, General Attorney of the Department of Justice have discussed with the European Union presidency and the Commissioners Ms Cecilia Malmström and Ms Viviane Reding the transatlantic initiatives, both planned and underway- aimed at preventing and combating terrorism and organised crime.

The meeting confirmed the hegemonic and inspiring role that the American administration has towards the European Union when it comes to defining and implementing the European Internal Security Strategy (ISS).

This is true when it come to the synchronisation of the EU’ activities, since the Justice and Home Affairs Council which took place in Toledo in February 2010 adopted the strategy while the US administration approved the Fourth revision of its own internal security strategy.

It is also true in relation to the increasing concurrence of the objectives underpinning it. After all this is not so surprising for two allies which cooperate on a daily basis in all different domains, going from intelligence, money laundering, to the fight against drugs.

Therefore, the European ISS includes the fight against cyber crime, measures aimed at the protection of commercial flights and cargo safety, use of financial personal data and airplanes passengers. These objectives have been recalled by the Commission in its recent Communication entitled “The EU Internal Security Strategy in Action: Five steps towards a more secure Europe”.

The crucial element here is that while these objectives correspond to what the Congress requested, this is not the case for the European Union, where the position of the European Parliament – which should ensure the legislative transposition of some of these objectives- is much more cautious than the one of the Congress. This is even more striking  if one take into consideration the fact that the Congress is considered even more demanding than both the Bush and Obama Administration, for instance, concerning borders control with the creation of an entry-exit system and limits to visa liberalisation.

The opposition of the Strasbourg Assembly to the indiscriminate collection and systematic storage of personal data of millions of air passengers (PNR) for several years is renowned. Especially, because these data includes also those of individuals which are not wanted nor suspects and that, even after the controls, are not considered a danger for the flights safety.

That is why the Council of the European Union adopted the 3rd December 2010 a negotiation mandate to the Commission which should allow revising in a more restrictive manner the data protection provisions which are provisionally applied on the basis of the EU-USA agreement, since 2007.

It goes without saying that it would be rather naïve to expect the American Administration to welcome such a measure, especially because the new Republican majority in the Congress would interpret it as a lowering down of the guard. Nevertheless, it is also self-evident that the current agreement risks to be rejected by the European Parliament at any moment and this possibility would open a dangerous vacuum, also for the aviation companies.[1]

Rather, it is reasonable to expect a greater willingness from the European Parliament’s side to adopt measures concerning the fight against cyber-crime, one of the USA priority for a long time and recently recalled by the Obama Administration during the last EU-USA summit of 20th November 2010 in the Joint EU-US Statement. The summit promoted a EU-USA working group in the field of cyber security and cyber criminality, which within a year will present a report on a series of initiatives, such as those discussed in the recent EU-US-NATO summit of the 24th November. These measures includes among others,

–       the creation of Computer Emergency Response Team (CERTs) in each European country, along the lines of the corresponding American centres, with the support of the European Agency responsible for network security (ENISA)

–       – the implementation of an emergency network

–       The creation of a sort of control room at the European level, as indicated by the Commission in its proposal for an internal security strategy.

These measures should be complemented by legislative measures such as the Proposal for a Directive on attacks against information systems, currently under review by the European Parliament. This measure will probably get inspiration from the Convention on Cyber crime of the Council of Europe, ratified by the United States itself.

However, all these measures, as well as the last ministerial meeting, all share the same unresolved problem related to the different data protection standards existing in the two sides of the Atlantic, namely in relation to public security. On the one hand, in the United States the protection of privacy and personal data is not considered a fundamental right (at most a penumbral right, subordinated to the safeguard of the right of expression foreseen by the first amendment and to the right of residence foreseen by the fourth amendment). On the other hand, in the EU, these rights are recognised as fundamental by art. 8 of the European Convention on Human Rights as well articles 7 and 8 of the Charter of Fundamental Rights.

Indeed, the European Parliament has requested, especially after 9/11 a transatlantic binding agreement in this field. This could eventually take place on the basis of negotiation mandate which the Council conferred to the Commission on the 3rd December and that Vice-President Reding has already presented to the Parliament.

Theoretically, the US authorities should not oppose it given that the mandate recalls the recommendations made by a common working group which has elaborated a series of common principles. However, the American authorities fear that the new agreement will make more difficult the transfer of data that is already taking place under the EU-USA agreement in the field of judicial cooperation in criminal matters, the agreements with Europol and Eurojust and more importantly the various bilateral agreements negotiated in the last decades between the USA and the EU Member States, in the field of security and fight against crime.[2]

The next months look quite challenging and it will be interesting to follow not only the negotiations but also the tone of the dialogue that will be established between the Congress and the European Parliament, i.e. whether  they will be able to share to a greater extent the perception of a threat and therefore the need to a common answer.

If this will take place, it could be possible to open the way to a Transatlantic Schengen-like space which ahs already been announced in the  EU-US Joint Statement on “Enhancing transatlantic cooperation in the area of Justice, Freedom and Security”

EDC


[1] The same issue is true for those measures which are considered too invasive for the individual privacy, such as the installation of body scanners (1300 are foreseen to be installed in the USA and a few tens in the European Union). It remains to be seen what the European Union will do to implement the new international strategy in the field of aviation security adopted by the 37th ICAO Assembly which took place on 8th October 2010 (Comprehensive Aviation Security Strategy) (ICASS).

[2] See Prüm-like agreements on the basis of which the EU Member States committed themselves to transfer information, , to the United States. These transfer include sensitive information, such as DNA codes, in exchange of looser conditions to obtain visa for their citizens.

 

SWIFT II: bridging the gap or limiting the damage?

A few months after the rejection by the European Parliament of the Interim Agreement on TFTP between the European Union and the United States of America, a new agreement is under way, after it was signed on 28 June 2010 and will most probably be voted during the plenary in July (5-8).

The new text addresses some of the concerns of the European Parliament. In particular:

  • It provides higher data protection standards: right to access to data; exclusion of SEPA data; rectification; erasure; administrative and judicial redress, link to the negotiations with the US on general transatlantic data protection framework
  • It clarify the definition of terrorism: Article 2 of the proposal builds on the definition of terrorism on the approach of Article 1 of Council Framework Decision 2002/475/JHA
  • It progresses on limitation in the transfer of bulk data: criteria for requesting and providing data.
  • It narrows down the procedures for onward transfers of personal data to third countries: prior consent of the Member State (of the nationality of the data subject) will be required, except for emergency situations
  • It foresees the possibility to look again the retention period for transferred but non extracted data: 5 years but after 3 years the issue will be looked at again to look for a shorter period
  • It introduces a statement on the right to redress: statement to ensure that any redress does not discriminate between EU and US citizens.
  • It foresees the possibility to develop an EU TFTP
  • It establishes a review mechanism: 6 months after entry into force, then every year there will be ad hoc reviews, reports to Council and European Parliament. The agreement will already contain list of subjects including data protection for the review; review team will include experts on security and data protection.
  • It foresees the possibility to suspend the agreement: it kept a clause for suspension of the agreement if breach happens. No reason is required if a 6 months notice is made in advance.
  • It introduces the examination of US subpoena: examination of the proportionality of the US Subpoena will be done by Europol
  • It also clarifies the territorial application.

Despite these improvements, the agreement keeps a series of contested aspects (see Working Party 29EDPS opinion, EDRI article), mainly derived from the social and cultural differences between Europe and the USA in their approach to privacy.

From a European perspective, the Treaty of Lisbon and the European secondary legislation establish stringent safeguards in regard to the rights of data subjects. Although according to the European legislation it is possible to use data initially collected for commercial aims for law enforcement purposes, a series of principles such as purpose limitation should be respected. Purpose limitation is interlinked with the principle of adequacy, which is put into charge by independent authorities responsible to ensure the respect of such principles.

At the European level, data protection against public authorities aims at guaranteeing the freedom of the individual in absolute terms, with justified exceptions. On the contrary, in the United States, this level of freedom does not apply in relation to the public authorities since what the US law establishes is that privacy should be reasonably protected but not in absolute terms.

Specifically, when it comes to the exchange of data for law enforcement purposes, such freedom is limited due to the very nature of TFTP, dominated by its national security component. Indeed, the TFTP builds upon three legislations: the Executive Order 13224, the International Emergency Economic Powers Act and the Patriot Act. It mainly serves the interest of intelligence agencies (CIA) and remains based on the principle of exceptionality where the fight against terrorism prevails over the rights of individuals.

The European Parliament clearly saw this risk and in its resolution it introduced a series of data protection safeguards clearly re-stating the necessity to respect the principles of purpose limitation, effective supervision and redress mechanisms.

Taking into account these criteria, the new TFTP agreement introduces the monitoring and oversight by independent overseers (Article 12).

It has to be reminded that the USA do not have any supervisory authority for enforcing data protection in US territory. However, the American administration had to come to a compromise with the Europeans in this respect, also in relation to the future general EU-US agreement, which will set forth general principles valid for all specific transfer agreements.

This represents the most important novelty of the second TFTP. It is a first brick necessary to build a bridge between the EU and the US models. Indeed, the introduction of independent authorities will contribute to the establishment of a legally binding and enforceable personal data protection standards that will ensure the protection of individuals’ fundamental rights and freedoms in a EU-US framework.

Under the Commission’ proposal the transfer or processing of personal data by EU or US authorities would only be permitted for specified, explicit, legitimate purposes in the framework of the fight against terrorism and will include the right to redress, to correct or erase inaccurate data.

Keeping these elements in mind,  which model prevails?

At first sight, the American one. Indeed, the US privacy act does not apply to the TFTP agreement. Furthermore, the US Privacy Act court clauses only apply to US citizens and residents. Therefore  no right of judicial review for foreign citizens and residents apply under the US law.

However, the agreement contains some interesting elements which represent a step forward compared to the previous system. For example it puts into place an independent data protection authority to guarantee the enforcement of the necessary safeguards to ensure an effective data protection.

Furthermore, the discussions over the general EU-USA data protection agreement provide the opportunity to:

– include in all future agreements a reference to authorities competent for the data protection enforcement;

– introduce mechanisms for an effective right to redress;

– introduce a mechanism to ensure compliance with the principles established.

It remains to be seen whether such progresses will then lead to a change in the US approach to individuals’ rights, now limited by the fact that all individuals are considered alleged suspects. Although ambitious, this is a necessary step to bridge the two different EU-US data protection and privacy systems. Otherwise, it may well represents only an attempt to limit the damage.

Leda Bargiotti

SWIFT and PNR resolutions adopted by the European Parliament

The European Parliament adopted on the 5th May 2010 the two resolutions on SWIFT and PNR:

European Parliament resolution of 5 May 2010 on the Recommendation from the Commission to the Council to authorise the opening of negotiations for an agreement between the European Union and the United States of America to make available to the United States Treasury Department financial messaging data to prevent and combat terrorism and terrorist financing

European Parliament resolutionof 5 May 2010 on the launch of negotiations for Passenger Name Record (PNR) agreements with the United States, Australia and Canada

The European Parliament to vote on PNR

The European Parliament will vote the resolution on the PNR agreement during the mini-plenary that will take place in Brussels on Thursday 6 May 2010.

This after the LIBE Committee announced in April the intention to postpone the vote on the EU-USA PNR agreement, calling the Commission to put forward a more comprehensive measure defining common data protection terms.

The European Commission is therefore going to put forward a more coherent “package” which will include:

a) a Communication listing general standards that should apply to any PNR agreement (regulate external aspects)

b) a PNR directive which will be a “lisbonisation” of the current agreement and

c) a recommendation for a negotiating mandate with the USA, CANADA and Australia on PNR.

There are several loopholes that have been identified by experts, academics as well as Members of the Parliament which refer to other on-going negotiations as well, namely the so-called SWIFT Agreement and the Framework Agreement on data protection and data sharing.

Different understanding of privacy and data protection

Privacy and data protection are two different albeit interlinked principles and this distinction needs to be applied in the internal and external dimension of the EU.

The right to privacy is not absolute. In fact most of the emphasis is on the conditions under which restriction could be imposed. The right to data protection always applies when personal data are processed. Indeed, the European Court of Human Rights has emphasised that in applying data protection principles also article 8 of the European Convention on Human Rights must be respected.

This interlink becomes increasingly important in relation with data sharing measures and even more when they entails international agreements with third countries, such as in the case of Passenger Name Record (PNR).

In the transatlantic arena, for example, the different understanding of data protection and privacy further complicate the issue, since the U.S. approach to privacy protection relies on industry-specific legislation, regulation and self-regulation whereas the European Union relies on a comprehensive privacy legislation.

Negotiators need to bridge these two approaches ensuring general adequate principles, which can then be applied to all specific agreements.

However, the transfer of personal data is already taking place without the existence of such an overarching agreement via the agreement provisionally implemented on PNR.

This approach is highly objectionable.  It is necessary to make sure that the broad agreement is compatible with the EU-US general agreement on data protection and not the other way around, as highlighted by the European Data Protection Supervisor. Otherwise the risk of inconsistency between the general principles and their application to specific agreements becomes more than likely.

This risk is already a reality with the PNR Agreement, which currently entails a series of measures at risk of violation of human rights as enshrined in the European legislation and case law:

Computerised Reservation Systems (CRS) as the “brokers” between the airlines the customers and the security authorities

As Mr Edward Hasbrouck explained, PNR data are entered by travel agencies, travel websites and tour operators in a third-party “Computerised Reservation System” (CSR.

The CSR then send the PNR data to the Department of Homeland Security (DHS) and since three out of four servers are based in the USA (including an office of the major EU sever), DHS and others in the USA can have access to EU data, even when they refer to intra-Europe flights.

The current PNR agreement covers transfers of PNR data from the EU to the DHS, it does not cover DHS relations with CSR. Hence, as Mr Hasbrouck correctly pointed out, standard airlines business completely overpass EU-US PNR agreement.

As far as the CRS are concerned the legal situation in the EU has been recently updated (February 4th, 2009) by Regulation (EC) No 80/2009 of the European Parliament and of the Council of 14 January 2009 on a Code of Conduct for computerised reservation systems and repealing Council Regulation (EEC) No 2299/89.

Art. 11 to which recital 21 refers states:

1. Personal data collected in the course of the activities of a CRS for the purpose of making reservations or issuing tickets for transport products shall only be processed in a way compatible with these purposes. With regard to the processing of such data, a system vendor shall be considered as a data controller in accordance with Article 2(d) of Directive 95/46/EC.

2. Personal data shall only be processed in so far as processing is necessary for the performance of a contract to which the data subject is party or in order to take steps at the request of the data subject prior to entering into a contract.

3. Where special categories of data referred to under Article 8 of Directive 95/46/EC are involved, such data shall only be processed where the data subject has given his or her explicit consent to the processing of those data on an informed basis.

4. Information under the control of the system vendor concerning identifiable individual bookings shall be stored offline within seventy-two hours of the completion of the last element in the individual booking and destroyed within three years. Access to such data shall be allowed only for billing-dispute reasons.

5. Marketing, booking and sales data made available by a system vendor shall include no identification, either directly or indirectly, of natural persons or, where applicable, of the organisations or companies on whose behalf they are acting.

6. Upon request, a subscriber shall inform the consumer of the name and address of the system vendor, the purposes of the processing, the duration of the retention of personal data and the means available to the data subject of exercising his or her access rights.

7. A data subject shall be entitled to have access free of charge to data relating to him or her regardless of whether the data are stored by the system vendor or by the subscriber.

8. The rights recognised in this Article are complementary to and shall exist in addition to the data subject rights laid down by Directive 95/46/EC, by the national provisions adopted pursuant thereto and by the provisions of international agreements to which the Community is party.

9. The provisions of this Regulation particularise and complement Directive 95/46/EC for the purposes mentioned in Article 1.Save as otherwise provided, the definitions in that Directive shall apply. Where the specific provisions with regard to the processing of personal data in the context of the activities of a CRS laid down in this Article do not apply, this Regulation shall be without prejudice to the provisions of that Directive, the national provisions adopted pursuant thereto and the provisions of international agreements to which the Community is party.

10. Where a system vendor operates databases in different capacities such as, as a CRS, or as a host for airlines, technical and organisational measures shall be taken to prevent the circumvention of data protection rules through the interconnection between the databases, and to ensure that personal data are only accessible for the specific purpose for which they were collected.”

It is worth noting that according to art. 14 of the Regulation the activity of the CRS on the EU territory falls under the European Commission oversight and the Commission has the appropriate powers of control and will accept appeals against any infringement of the code of conduct:

“In order to carry out the duties assigned to it by this Regulation, the

Commission may, by simple request or decision, require undertakings or associations of undertakings to provide all necessary information, including the provision of specific audits notably on issues covered by Articles 4, 7, 10 and 11.”

But the extent to which this oversight power can actually be enforced is questionable. This is because the Directorate General (DG) of the European Commission in charge of the CRS is DG Transport (DG TRAN) whereas the DG responsible for PNR is Justice, Liberty and Security (DG JLS). Hence, if the two DG do not coordinate effectively, it is very difficult for the Commission to carry on the investigative tasks mentioned in article 14 and ensure that no infringement of the code of conduct takes place.

The proportionality principle governing the processing of personal data

According to Directive 95/46, Member States must respect the following principles in the processing of personal data: the purpose limitation, the data quality and proportionality principle, and the transparency principle.

Hence, proportionality is also one the criteria that allows for limitation of privacy. In order to deliver proportionality in practice it is necessary to provide answers to the following questions:

–       What does “narrowly tailored request” mean?

–       What does “case by case request” means?

–       Does case refer to a specific individual or more, or rather any data of all individual falling under a specific criteria?

The proportionality principle may only function against evidence. However, the evidence of the necessity of such measure has not been demonstrated yet. On the contrary, using the words of the Director General of DG JLS, Jonathan Faull, during the LIBE Committee on 24 March 2010, any evidence must remain secret as a matter of national security.

The balance between the limitation of privacy and data protection rights and the implementation of security measures can be reached only if such measures are assessed against the actual and not the perceived or presumed impact that they have on security. Otherwise, the very principle of proportionality fails and with it the respect of individuals’ fundamental rights.

The purpose limitation and the question of re-use

The question of proportionality is directly linked to the purpose of data sharing. The recital of the 2004 Agreement states that its purpose is “to prevent and combat terrorism and transnational crime”. Hence, it is necessary to guarantee that when investigations demonstrate that someone is not a terrorist but has committed other unlawful acts, (such as overstay or copyrights infringement) the data collected will not be used to trigger another procedure.

However, as Dr Patrick Breyer pointed out, the High Level Contact Group (HLGC) report of May 2008 “does not provide for restrictive and specific purpose limitation in that sense and thus fails to satisfy human rights requirements to the disclosure of personal information to foreign agents and states”.

Exchange of data between private and public sectors

Furthermore, by allowing the exchange of data between the private and public sectors the risk of breaching the purpose limitation is a given and extra specific legitimacy -in addition to that already required- should be provided in order to guarantee the full respect of data protection and privacy.

In addition to this, another issues related to the private/public transfer of data entails the question of profiling.

Profiling

Currently, no common definition of profiling exists mainly because there are many profiling activities (In this regard, the Council of Europe is preparing a report which, according to Ms Vassiliadou, will provide the guiding principle for the Commission’s future work).

Data profiling consists in using key words to generate new data so as to progress in data analysis. Hence, by using normal data there is the risk of generating sensitive data.

This “practice” has become increasingly popular among private companies in order to create a more tailored service to their clients. Indeed, this commercial purpose may meet the interest of an individual, especially if the result is a better service provided. However, if these profiles are used for law enforcement purposes by public authorities, the same individual may be against it.

That is why, according to Prof. Paul de Hert the principles of data minimisation and purpose limitations should be included when dealing with data protection and privacy legislation.

However, this might not be enough especially when faced with the risks represented by the automated machine data selection, although the European Commission reassured the audience stating that there should always be a person to take the final decision rather then a machine and this should avoid that profiling will lead to a direct effect to a person

Purpose limitation and profiling are even more delicate aspects once analysed together with the right to redress foreseen in the PNR agreement as well as in the work of the HLCG.

Right to redress and effective remedy

Everyone whose right to data protection and privacy have been violated must have the right to an effective remedy before and independent tribunal as guaranteed in Article 13 ECHR and Art. 47 of the Charter of Fundamental Rights of the European Union.

However, the judicial system of the United States does not provide effective remedy and the Annex to the HLCG report of October 2009 only provides for administrative redress which cannot be defined an effective remedy.

Despite these unresolved issued, the Commission and the Council of the EU are determined to carry on negotiations concerning the SWIFT agreement as well as the PNR agreement.

Undisclosed sources referred that during the EU-US JHA meeting which took place at Ministerial level on 8-9 April 2010 in Madrid, the European Commission is looking for solutions on the aspects where divergences between the EU and the USA exist such as the bulk data transfer, redress principle, purpose limitation and push/pull techniques.

It is regrettable that despite all the aforementioned loopholes, to use an euphemism, the Commission did not supported the approach by which first a general framework agreement on data protection and data sharing with the USA should be concluded and only afterwards – if considered necessary on the basis of evidence- specific agreements such as PNR and SWIFT should be negotiated. Even though the current proposal for a general agreement falls way short of being acceptable.

The European Commission argued that it considers that the SWIFT agreement will be reinforced by the conclusion of the EU US data protection agreement.

During the meeting, the USA not only denied the existence of differences on the understanding of principles related to data protection and privacy on the basis of the OECD guidelines (which the EU thinks is not the right basis), but also considered that the issues raised by the European side in relation to the SWIFT agreement are based on pure misconceptions on how the system works.

If the European Parliament will back up such an agreement it will cover only a minimal part of the exchange of information, since it has no power o regulate the flows of data, for example between the US and third countries. The only aspect that the European Parliament can try to regulate, a fundamental aspect, is the flows of information between the federal and the national authorities in the United States.  On the 6 May will see if at least this aspect will be covered.

LB

Action Plan on the Stockholm Programme released by Statewatch

European Commission: Stockholm Programme: Statewatch Analysis: Action Plan on the Stockholm Programme: A bit more freedom and justice and a lot more security (pdf) by Tony Bunyan: “The “harnessing of the digital tsunami” as advocated by the EU Future Group and the surveillance society, spelt out in Statewatch’s “The Shape of Things to Come” is embedded in the Commission’s Action Plan as it is in the Stockholm Programme….There is no mention of the European Security Research Programme (ESRP). Much of the technological development is being funded under the 1.4 billion euro security research programme. See: Statewatch/TNI report: Neoconopticon: EU security-industrial complex.

Statewatch Briefing: European Commission: Action Plan on the Stockholm Programme (pdf) Comments by Professor Steve Peers, University of Essex – Full-text: Communication from the Commission: Delivering an area of freedom, security and justice for Europe’s citizens Action Plan Implementing the Stockholm Programme (COM 171/2010, pdf)

http://www.statewatch.org/