Protection of Personal Data (Both Automated and Conventional)

Total Page:16

File Type:pdf, Size:1020Kb

Protection of Personal Data (Both Automated and Conventional) THIRTY YEARS AFTER THE OECD PRIVACY GUIDELINES 2011 ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT The OECD is a unique forum where governments work together to address the economic, social and environmental challenges of globalisation. The OECD is also at the forefront of efforts to understand and to help governments respond to new developments and concerns, such as corporate governance, the information economy and the challenges of an ageing population. The Organisation provides a setting where governments can compare policy experiences, seek answers to common problems, identify good practice and work to co-ordinate domestic and international policies. The OECD member countries are: Australia, Austria, Belgium, Canada, Chile, the Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Israel, Italy, Japan, Korea, Luxembourg, Mexico, the Netherlands, New Zealand, Norway, Poland, Portugal, the Slovak Republic, Slovenia, Spain, Sweden, Switzerland, Turkey, the United Kingdom and the United States. The Commission of the European Communities takes part in the work of the OECD. © OECD 2011 Cover image: © kentoh – Fotolia.com No reproduction, copy, transmission or translation of this document may be made without written permission. Applications should be sent to OECD Publishing: [email protected] FOREWORD – 3 Foreword The OECD has played major role in shaping and defining how privacy is protected around the globe. The OECD Guidelines Governing the Protection of Privacy and Transborder Flows of Data were the first inter- nationally agreed-upon set of privacy principles. Canada participated in the Expert Group which produced the Guidelines under the wise leadership of the Honourable Michael Kirby of Australia. The Guidelines have been extremely influential in Canada, where, with minor changes, they were incorporated into the Personal Information Protec- tion and Electronic Documents Act, Canada’s private-sector privacy law. The Guidelines were a response to two interrelated trends: a recognition of the importance of information – including personal information – in the global economy; and emerging concerns about the possible impact on the rights of individuals resulting from the automated processing of personal information made possible by the first generation of computer technology. Principle-based and technology-neutral, the Guidelines have served as an important guide and reference point for governments and policy makers. However, the world has changed dramatically in the 30-plus years since they were adopted, prompting the OECD to launch a review to assess their continued effectiveness in the new environment. Many of the changes we’ve experienced are summarised in Chapter 2 of this booklet, entitled “The Evolving Privacy Landscape: 30 Years after the OECD Privacy Guidelines”. The stand-alone technologies of the 1970s have become a ubiquitous, integrated global infrastructure. Occasional global data flows have given way to a “continuous, multipoint global flow,” highlighting the need for privacy enforcement authorities around the world to work together to develop globally effective approaches to protecting privacy. Advances in analytics and the monetisation of our digital footprints raise challenging questions about the concept of personal information and the appropriate scope for the application of privacy protections. THIRTY YEARS AFTER THE OECD PRIVACY GUIDELINES © OECD 2011 4 – FOREWORD I first became involved with the Working Party on Information Security and Privacy (WPISP) in 2005, when I was asked to head a Volunteer Group to work on cross-border privacy law enforcement co-operation. This has been a rewarding experience for me and my Office. I have been impressed by the dedication of the OECD staff members and by the depth and breadth of the expertise of the delegates who attend the WPISP meetings and of the members of the Volunteer Group that I have the honour to chair. I applaud the OECD for its leadership role in the global dialogue on the protection of privacy and I look forward to participating in the review of the Guidelines. Commissioner Jennifer Stoddart Privacy Commissioner of Canada Chair of the WPISP Privacy Volunteer Group THIRTY YEARS AFTER THE OECD PRIVACY GUIDELINES © OECD 2011 TABLE OF CONTENTS – 5 Table of contents Preface. ............................................................................................................ 6 Chapter 1. Remarks from Hon. Michael Kirby on the 30th anniversary of the OECD Privacy Guidelines ................. 7 Chapter 2. The evolving privacy landscape: 30 years after the OECD Privacy Guidelines ....................................................... 10 2.1. Main points ............................................................................................. 11 2.2. The development and influence of the OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data .................. 14 2.3. Current trends in the processing of personal data ................................... 28 2.4. Privacy risks in the evolving environment ............................................. 37 2.5. Considerations and challenges to existing privacy approaches .............. 43 2.6. Evolution and innovation in privacy governance ................................... 49 2.7. Conclusion .............................................................................................. 61 Chapter 3. Implementation of the 2007 OECD Recommendation on Privacy Law Enforcement Co-operation ................................ 74 3.1. Main points ............................................................................................. 74 3.2. Background............................................................................................. 76 3.3. Implementation activities supported by OECD ...................................... 78 3.4. Improving domestic measures to enable co-operation ........................... 81 3.5. Examples of cross-border co-operation .................................................. 84 3.6. Other international initiatives ................................................................. 86 3.7. Conclusion .............................................................................................. 89 Chapter 4. Terms of Reference for the review of the OECD Guidelines Governing the Protection of Privacy and Transborder Data Flows of Personal Data ............................. 93 Annex A. Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data ............................................. 99 Annex B. OECD Recommendation on Cross-border Co-operation in the Enforcement of Laws Protecting Privacy .............................. 105 THIRTY YEARS AFTER THE OECD PRIVACY GUIDELINES © OECD 2011 6 – PREFACE Preface In 2010 the OECD celebrated the 30th anniversary of its ‘Guidelines governing the Protection of Privacy and Transborder Flows of Personal Data’ (‘OECD Guidelines’) through a series of events and papers, available at www.oecd.org/sti/privacyanniversary. This material is now serving as input for a review of the Guidelines which is currently underway in the OECD and provides the content for this book. Jennifer Stoddart, Privacy Commissioner of Canada, has served as chair of a OECD volunteer group of privacy experts since 2005. In her Foreword, Commissioner Stoddart shares her perspective on the Guidelines and the role of the OECD in this area. The Honourable Michael Kirby, now retired from the Australian High Court, chaired the expert group that developed the OECD Guidelines in the late 1970s. In Chapter 1, Justice Kirby reflects on both the origins and legacy of the Guidelines. In the 30 years since the birth of the Privacy Guidelines the privacy landscape has undergone tremendous changes, which are the subject of the OECD report that serves as Chapter 2. The 1980 Guidelines are well known for their principles for the collection and handling of personal data, but they also call for co-operation in enforcement-related matters. In 2007 the OECD Council adopted a Recommendation on Cross-border Co-operation in the Enforcement of Laws Protecting Privacy. Chapter 3 of this publication is the OECD report on the implementation of this Recommendation, three years after its adoption. Chapter 4 concerns the review of the Privacy Guidelines now underway at the OECD. The “Terms of Reference” memorialise the results of the review thus far, and provide orientation to the OECD Working Party on Information Security and Privacy as it takes this work forward. The two OECD instruments discussed in this publication are reproduced as annexes: the Privacy Guidelines as Annex A and the Recommendation on Cross-border Co-operation in the Enforcement of Laws Protecting Privacy as Annex B. THIRTY YEARS AFTER THE OECD PRIVACY GUIDELINES © OECD 2011 1. THE 30TH ANNIVERSARY OF THE OECD PRIVACY GUIDELINES – 7 Chapter 1 Remarks from Hon. Michael Kirby on the 30th anniversary of the OECD Privacy Guidelines∗ One does not normally think of the Organisation for Economic Co- operation and Development (OECD) as a major player in the global elaboration of human rights. Yet, between 1978 and 1980, the Organisation established and supported an expert group, tasked with the function of preparing international guidelines on the protection of privacy. That value is recognised in many international statements of human rights, notably in the Universal Declaration of Human Rights (Art.12) and the International Covenant
Recommended publications
  • Google Privacy Policy: Main Findings and Recommendations
    APPENDIX GOOGLE PRIVACY POLICY: MAIN FINDINGS AND RECOMMENDATIONS OUTLINE I. Main findings .............................................................................................................................................................. 2 1) Legal Framework ................................................................................................................................................. 2 2) Information ............................................................................................................................................................ 2 3) Combination of data across services ........................................................................................................... 3 4) Retention period .................................................................................................................................................. 5 II. Recommendations ................................................................................................................................................... 5 1) Information ............................................................................................................................................................ 5 i. Particular case of mobile users ................................................................................................................. 6 ii. Particular case of passive users ................................................................................................................ 7 2)
    [Show full text]
  • An Analysis of Google's Privacy Policy and Related
    1 AN ANALYSIS OF GOOGLE’S PRIVACY POLICY AND RELATED FAQs A DATA PROTECTION ANALYSIS FROM AMBERHAWK TRAINING LTD DR. C. N. M. POUNDER, MARCH 2012 An analysis of Google’s Privacy Policy (March 2012) ©Amberhawk Training Limited 2 AN ANALYSIS OF GOOGLE’S PRIVACY POLICY AND RELATED FAQs MANAGEMENT SUMMARY Google’s new combined Privacy Policy (March 2012) has been widely criticised by privacy professionals and Data Protection Authorities (in particular the CNIL – the French Data Protection Authority). However the reasons for this criticism have been made in general terms; my analysis provides a detailed explanation. The analysis shows that Google’s Privacy Policy is incoherent because it uses overlapping terms. This makes the Policy difficult to follow and to understand what type of information the Policy is claiming to protect. It cannot be fair to users if they cannot understand what the Policy means for them. The Policy is also unfair in conventional terms as it does not, in many instances, fully describe the purposes of the processing. Secondly, my analysis also confirms the claim of the CNIL that the Privacy Policy is in breach of the Data Protection Directive. However, I also show that it is in breach of the USA’s Safe Harbor Principles. As the Privacy Policy states that “Google complies with the US-EU Safe Harbour Framework”, I show that this claim cannot be substantiated if Google’s new Privacy Policy is implemented. Contradictory and confusing? The Privacy Policy uses a wide range of similar terms in different circumstances which I think are contradictory.
    [Show full text]
  • Spying on Students: School Issued Devices and Student Privacy (EFF)
    Spying on Students SCHOOL-ISSUED DEVICES AND STUDENT PRIVACY Frida Alim, Bridge Fellow Na e Cardo!o, Se"ior Sta## A or"e$ %e""ie Ge&'art, Re(ear)'er *are" Gullo, Media Relatio"( Anal$( Amul Kalia, Anal$( A-ril 1/, 21.2 ELECTRONIC FRONTIER FOUNDATION EFF3OR% 1 Authors: Frida Alim, Nate Cardozo, Gennie Gebhart, Karen Gullo, Amul Kalia With assistance from: Sophia Cope, Hugh D’Andrade, Jeremy Gillula, Rainey Reitman A publication of the Electronic Frontier Foundation, 2017. “Spying on Students: School-Issued Devices and Student Privacy” is released under a Creative Commons Attribution 4.0 International License (CC BY 4.0). ELECTRONIC FRONTIER FOUNDATION EFF3OR% 2 Table of Contents Executive Summary..................................................................................................................................................... 5 Introduction.................................................................................................................................................................. 7 Part 1: Survey Results................................................................................................................................................. 8 Methods..................................................................................................................................................................... 9 Respondents and Overall Trends....................................................................................................................10 Findings..................................................................................................................................................................
    [Show full text]
  • Privacy Policy
    Privacy Policy IDI, LLC and its affiliate, ICS Inventory, LLC (“We,” “Our,” or “Us”) respects the privacy and security of your personal information. The following describes how we collect, use and disclose information and what rights you have to it. This Privacy Policy describes our practices in connection with information that we collect from you through our software applications, services, websites and mobile applications from our public facing side of our services and products and from our private access products and services that require registration before use (“Services”) and from sources other than our Services including, but not limited to, the telephone, mail and trade shows. This Privacy Policy also applies to any information that you may provide to us via an IDI Qualified Administrator’s (“IDIQA”) credential, website and/or other access method that enables you to use our Services. By providing information to us and/or using our Services, you acknowledge and agree to the terms and conditions of this Privacy Policy. If you do not agree to these terms and conditions, please do not use our Services. Information Collection We gather various types of information from you including personal information and personal data Personal information or personal data refers to any data or information which relates to an identified or identifiable natural person, and are the subject to applicable data protection laws, such as the EU General Data Protection Regulation 2016/679 (“GDPR”), and/or the California Consumer Privacy Act (Assembly Bill 375) (“CCPA”) including, but not limited to, your name, postal addresses (including billing and shipping addresses), telephone numbers, and email addresses, and Sensitive Information (as defined below).
    [Show full text]
  • PRIVACY POLICY Institute for Economics and Peace 1. We Respect Your Privacy
    PRIVACY POLICY Institute for Economics and Peace 1. We respect your privacy a. Institute for Economics and Peace respects your right to privacy and is committed to safeguarding the privacy of our customers and website visitors. This policy sets out how we collect and treat your personal information. b. We adhere to the Australian Privacy Principles contained in the Privacy Act 1988 (Cth) and to the extent applicable, the EU General Data Protection Regulation (GDPR). c. "Personal information" is information we hold which is identifiable as being about you. This includes information such as your name, email address, identification number, or any other type of information that can reasonably identify an individual, either directly or indirectly. d. You may contact us in writing at PO Box 42 St Leonards , Sydney , New South Wales, 1590 for further information about this Privacy Policy. 2. What personal information is collected a. Institute for Economics and Peace will, from time to time, receive and store personal information you submit to our website, provided to us directly or given to us in other forms. b. You may provide basic information such as your name, phone number, address and email address to enable us to send you information, provide updates and process your product or service order. c. We may collect additional information at other times, including but not limited to, when you provide feedback, when you provide information about your personal or business affairs, change your content or email preference, respond to surveys and/or promotions, provide financial or credit card information, or communicate with our customer support.
    [Show full text]
  • Privacy Policy
    Privacy Policy Human Rights Watch Privacy Statement This website together with any non-English language versions (the Human Rights Watch websites) are provided by Human Rights Watch, Inc. ("Human Rights Watch" or "HRW") and hosted in the United States. Human Rights Watch is a non-profit, non-governmental organization that investigates and exposes abuses around the world and advocates for the protection of human rights and human dignity around the globe. We are committed to protecting your right to privacy. What is this Privacy Statement? This Privacy Statement sets out our information processing practices in relation to you and your personal data. These principles apply when we collect personal data from you through any channel. It explains Human Rights Watch’s information processing practices and applies to any personal information you provide to Human Rights Watch and any personal information we collect from other sources. This Privacy Statement is a description of our practices and of your rights regarding your personal information, but it is not a contract and it does not create any new rights or obligations beyond what the law already provides. This Privacy Statement does not apply to your use of a third-party site linked to on this website. Please refer to the privacy statement of that third-party site to understand how they handle your personal information. Who is responsible for your information? Throughout this Statement, "Human Rights Watch" or "HRW" refers to Human Rights Watch, Inc., and its various parts around the world, including its affiliated charities, branch offices and other registered entities (also referred to as "we", "us", or "our").
    [Show full text]
  • Online Service Providers' Privacy and Transparency Practices Regarding
    THE ELECTRONIC FRONTIER FOUNDATION'S SEVENTH ANNUAL REPORT ON Online Service Providers’ Privacy and Transparency Practices Regarding Government Access to User Data Nate Cardozo, Senior Staff Attorney Andrew Crocker, Staff Attorney Jennifer Lynch, Senior Staff Attorney Kurt Opsahl, Deputy Executive Director and General Counsel Rainey Reitman, Activism Director July 2017 ELECTRONIC FRONTIER FOUNDATION EFF.ORG 1 Authors: Nate Cardozo, Andrew Crocker, Jennifer Lynch, Kurt Opsahl, Rainey Reitman With assistance from: Hugh D’Andrade, Gennie Gebhart A publication of the Electronic Frontier Foundation, 2017 “Who Has Your Back? 2017” is released under a Creative Commons Attribution 4.0 International License (CC BY 4.0). ELECTRONIC FRONTIER FOUNDATION EFF.ORG 2 Table of Contents Executive Summary.....................................................................................................................4 2017 Results Table...................................................................................................................5 Major Findings and Trends.................................................................................................................................5 Overview of Criteria...............................................................................................................7 Deep Dive and Analysis of Select Corporate Policies..............................................................................10 Follows Industry-Wide Best Practices................................................................................10
    [Show full text]
  • An Analysis of P3P-Enabled Web Sites Among Top-20 Search Results
    An Analysis of P3P-Enabled Web Sites among Top-20 Search Results Serge Egelman Lorrie Faith Cranor Abdur Chowdhury Carnegie Mellon University Carnegie Mellon University America Online, Inc. 5000 Forbes Avenue 5000 Forbes Avenue 22000 AOL Way Pittsburgh, PA 15213 Pittsburgh, PA 15213 Dulles, VA 20166 [email protected] [email protected] [email protected] ABSTRACT Keywords Search engines play an important role in helping users find P3P, Privacy Policies, Search Engines, E-Commerce desired content. With the increasing deployment of computer- readable privacy policies encoded using the standard W3C Platform for Privacy Preferences (P3P) format, search en- 1. INTRODUCTION gines also have the potential to help users identify web sites According to a 2005 poll conducted by CBS News and the that will respect their privacy needs. We conducted a study New York Times, 82% of respondents believed that the right of the quantity and quality of P3P-encoded privacy poli- to privacy in the U.S. is either under serious threat or is al- cies associated with top-20 search results from three popular ready lost. This same poll also found that 83% believe that search engines. We built a P3P-enabled search engine and companies could potentially share their personal information used it to gather statistics on P3P adoption as well as the inappropriately [7]. These responses are similar to a 2000 privacy landscape of the Internet as a whole. This search en- survey conducted by The Pew Internet & American Life gine makes use of a privacy policy cache that we designed to Project, where 86% of respondents said that they wanted facilitate fast searches.
    [Show full text]
  • The Privacy Problem a Broader View of Information Privacy and the Costs and Consequences of Protecting It
    F IRST R EPORTS VOL. 4, NO. 1 MARCH 2003 The Privacy Problem A broader view of information privacy and the costs and consequences of protecting it BY FRED H. CATE A FIRST AMENDMENT CENTER PUBLICATION Fred H. Cate is a distinguished professor, Ira C. Batman Faculty fellow and director of the Center for Applied Cybersecurity Research at the Indiana University School of Law-Bloomington. He specializes in privacy and other information-law issues and appears regularly before Congress, state legislatures and professional and industry groups on these matters. He has directed the Electronic Information Privacy and Commerce Study for the Brookings Institution and has served as a member of the Federal Trade Commission’s Advisory Committee on Online Access and Security. He is a visiting scholar at the American Enterprise Institute and a senior policy adviser at the Hunton & Williams Center for Information Policy Leadership. Cate is the author of many articles and books concerning privacy and information law, including Privacy in Perspective (AEI Press), Privacy in the Information Age (Brookings Institution Press) and The Internet and the First Amendment (Phi Delta Kappa). He is the co-author (with Marc Franklin and David Anderson) of the sixth edition of the best-selling Mass Media Law (Foundation Press). A graduate of Stanford University and Stanford Law School, Cate is a member of the Phi Beta Kappa Senate and of the board of directors of the Phi Beta Kappa Fellows, and is listed in Who’s Who in America and Who’s Who in American Law. F FIRSTIRST RR EPORTSEPORTS The Privacy Problem A broader view of information privacy and the costs and consequences of protecting it BY FRED H.
    [Show full text]
  • New Rules for Personal Data Protection and Media: Why Reconcile Privacy Policies and Media Business Models in the Digital Environment?
    New rules for personal data protection and media: Why reconcile privacy policies and media business models in the digital environment? Summary Media companies in Serbia are not sufficiently aware of the importance of personal data protection, nor are there developed procedures regarding the fulfilment of standards in line with new rules for personal data protection. Taking into account media business models in a digital environment, which are substantially based on collecting data of visitors and users of websites, it is necessary to advance their practices and internal policies. This is necessary so that they can use the potentials of digital economy and respect the privacy of their audiences in accordance with the new legislation. Introduction All around the world, 25 May 2018 will be remembered as a turning point in the protection of privacy of citizens and as the beginning of a new age of the personal data protection. This was the day when the General Data Protection Regulation (GDPR) ,a new legislative framework which is considered to be the highest standard of the privacy protection, entered into force. The GDPR introduced additional obligations to all those processing personal data, including media and journalists. The regulation covers media policies in terms of controlling data of users, which is a key resource for media business models in a digital environment. In addition, Article 85 of the GDPR places an obligation on the EU member states for ’reconciling’ the freedom of expression and information, and personal data protection in their laws. Thus they are required to establish the balance between these two rights, which also includes processing data for journalistic purposes (European Union, 2016).
    [Show full text]
  • Privacy Policy Template for Facebook App
    Privacy Policy Template For Facebook App Improperly undeclining, Victor suborn thiocarbamide and emphasising armadas. Whit usually donning jerry-buildingseasonally or herrequoting rightist boiling exchangeably, when bionic immoderate Rodolphe and caroling dying. certes and disjunctively. Edwin The us and marketing activities, financial and auditing related procedures to protect users should publish the template privacy for facebook app must notify you are a website and other information collected may be gathered PC or Mac computers, smartphones, tablets, or entity other device that is used to access or interact under the Service. Ftc has been designed for app policies and policy template allows customers. Sign in with Apple. Conditions document for your website. No catches like search terms generators. Notwithstanding the foregoing, we sniff the i to screen, remove, edit, my block any User Content we lend in violation of best Terms or local we find, not our own discretion to tank otherwise objectionable, at our own discretion. Any point we will find this data collection, or other service providers in a malicious activity or app must request through app privacy policies in your android phone number. Likewise, profit is no guarantee that our physical, technical, or organizational security measures are foolproof. You provide some of this data directly, and we get some of it by collecting data about your interactions, use, and experiences with our products. For privacy policy for some user data to assert copyright symbol of privacy. In some cases, we simply request further information in launch to commemorate your identity. This privacy and search engines, and subsequently established for case, access this includes analyzing data for app.
    [Show full text]
  • The European Union Privacy Directive and Its Impact on the US
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Northwestern University Illinois, School of Law: Scholarly Commons Northwestern Journal of Technology and Intellectual Property Volume 2 Article 5 Issue 1 Fall Fall 2003 The urE opean Union Privacy Directive and Its Impact on the U.S. Privacy Protection Policy: A Year 2003 Perspective Chuan Sun Recommended Citation Chuan Sun, The European Union Privacy Directive and Its Impact on the U.S. Privacy Protection Policy: A Year 2003 Perspective, 2 Nw. J. Tech. & Intell. Prop. 99 (2003). https://scholarlycommons.law.northwestern.edu/njtip/vol2/iss1/5 This Perspective is brought to you for free and open access by Northwestern Pritzker School of Law Scholarly Commons. It has been accepted for inclusion in Northwestern Journal of Technology and Intellectual Property by an authorized editor of Northwestern Pritzker School of Law Scholarly Commons. Copyright 2003 by Northwestern University School of Law Volume 2, Number 1 (Fall 2003) Northwestern Journal of Technology and Intellectual Property The European Union Privacy Directive and Its Impact on the U.S. Privacy Protection Policy: A Year 2003 Perspective Chuan Sun* I. INTRODUCTION ¶1 The Internet, with the speed of its dramatic growth, is considered “an explosive economic growth opportunity that will redefine global commerce in the information age.”1 This revolutionary technology presents consumers with an “extraordinary new means to purchase both innovative and traditional goods and services, to communicate more effectively, and to tap into rich sources of information that previously were difficult to access and that now can be used to make better-informed decisions.”2 Today, millions of people access the Internet daily and many have purchased products, services, or information online.
    [Show full text]