My firm is acting for the students, and there’s a link to the detailed grounds in this explanatory piece.
Category Archives: Data Protection
(NON-)UPDATE 17.02.21: a couple of people have asked me what the ICO’s response to this was. Good question – and I haven’t had one yet. I had an email at the start of January apologising for the delay in replying, but nothing since then. I’ve chased. END UPDATE
For some time now I’ve wondered how the Information Commissioner’s Office (ICO) complies with data protection law when operating its Facebook page. It’s not a challenge unique to ICO – anyone running a corporate page is likely to be faced with similar challenges. However, as the UK’s supervisory authority under Article 51 of the GDPR (or, from 1 January 2021, under Article 51 of the UK GDPR, the person responsible for monitoring the application of the UK GDPR), the ICO should, understandably, be looked to as an exemplar.
With this in mind, I have raised an enquiry/complaint with the ICO, and will, of course, update this blog when I get a response.
I wish to raise an issue with you regarding your compliance with, at least, Articles 5(1)(a)(b)(c) and (f) of the GDPR.
I note that you operate a Facebook organisation page: https://www.facebook.com/ICOnews (the “ICO Facebook Page”), on which you invite and respond to comments. Following the findings of the Court of Justice of the European Union (CJEU) in Unabhängiges Landeszentrum für Datenschutz Schleswig-Holstein v Wirtschaftsakademie Schleswig-Holstein GmbH (Case C‑210/16), you are a joint controller with Facebook for the purposes of the processing of – at least – the personal data of those who comment on the ICO Facebook Page (the “Facebook data”). I am one of those.
I also note that in your “ICO Privacy Notice“, you do not state, in respect of your processing of the Facebook data, that you are a controller, although you do, rather cryptically, say “We see all this information [sent to us via social media] and decide how we manage it”, but you otherwise appear to disavow controller status when you say “When contacting the ICO through a social media platform, we suggest you also familiarise yourself with the privacy information of that platform.” This is, I would suggest, an abrogation of your obligations under Article 13 GDPR.
Following the findings of the CJEU in Wirtschaftsakademie it can be said that the creation of an organisation page on Facebook involves the definition of parameters by the administrator which has an influence on the processing of personal data for the purpose of, at least, permitting visitor comments or visitor interactions, such as clicking “like” buttons. Consequently, the administrator of a Facebook organisation page such as the ICO Facebook Page contributes to the processing of the personal data of visitors to its page.
I assert that you process, as a controller, my personal data as a person who has commented on the ICO Facebook Page. I also believe that, as a controller, you are involved in the transfer of the Facebook data, which must be taken to include my personal data, to a third country, namely, the United States (Facebook itself says that information controlled by Facebook Ireland (which it sees as the primary controller for the processing of personal data on UK Facebook pages) will be transferred or transmitted to, or stored and processed in, the United States). Facebook appears to effect such transfers by means of standard data protection clauses approved by the European Commission (https://www.facebook.com/help/566994660333381).
Please could you inform me whether:
1) you agree that you are controller (jointly or severally) with Facebook for the processing of my personal data when I comment on your Facebook page?
2) you take the view more generally that you are controller (jointly or severally) with Facebook for the processing of my personal data when I visit your Facebook page (for instance for the processing involved in the placing of cookies and similar technologies)?
3) as a controller (assuming you accept that you are one) you are transferring my personal data out of the EEA?
4) if the answer to 3) is “yes”, how you are complying with conditions laid down in Chapter 5 of GDPR?
I appreciate this might appear to be a flippant or mischievous matter, but I assure you of my good faith and keen interest. I appreciate that ICO has a general task to promote public awareness and understanding of the risks, rules, safeguards and rights in relation to processing. It would be helpful, when answering this enquiry, if you could say whether you take the view that you cannot adequately perform this task without using Facebook to do so.
The views in this post (and indeed most posts on this blog) are my personal ones, and do not represent the views of any organisation I am involved with.
No one sensible professes that data protection practice is always easy, and discussions around whether the UK will, come 1 January 2021, have or be close to having, an adequacy decision from the European Commission are complex and highly political. However, I hadn’t, until today, encountered the argument that GDPR itself was a barrier to, er, attaining adequacy status.
But that is the remarkable assertion in this recent Diginomica piece:
GDPR Is a European data protection success story, yes? Well, yes…but it could also be a complicating factor in trying to secure a post-Brexit data adequacy deal between the UK and the EU.
It is a complicating factor, I suppose, in the same way that, say, a speed limit is for those who drive too fast.
The reason that an “adequacy deal” is being sought is because GDPR itself says, in Article 45, that the Commission may decide, after taking into account a number of factors, that a third country (such as the UK will become) offers an adequate level of protection for personal data. In the absence of an adequacy decision, GDPR imposes restrictions on the transfer of data to third countries.
GDPR is the reason we are seeking an adequacy deal, not the barrier to it.
I’m not a lawyer, yet alone a Scottish lawyer, but a recent judgment, on data protection matters, from Sheriff A Cubie in the Glasgow and Strathkelvin Sheriffdom has significance beyond Scotland (and, of course, data protection law – by which we mean the General Data Protection Regulation (GDPR), or from 1 January 2021, the UK GDPR, and the Data Protection Act 2018 (DPA) – apply across the UK).
The issue before the court was whether data protection obligations, which might in general militate against disclosure of personal data, override disclosure obligations in general court proceedings. The basic answer, and one that most data protection practitioners and lawyers understand, is that they don’t. Article 6(1)(c) of the GDPR makes clear that processing is lawful if it is necessary for compliance with a legal obligation to which a controller is subject. More specifically, paragraph 5 of Schedule Two to the DPA says that the bulk of the GDPR provisions conferring rights on data subjects and obligations on controllers simply “do not apply to personal data where disclosure of the data is required by an enactment, a rule of law or an order of a court or tribunal, to the extent that the application of those provisions would prevent the controller from making the disclosure.”
The Sheriff was faced with a situation [which sounds like a line from a Western] of possible contempt of court by an unnamed Scottish Council in social work referral proceedings concerning children. Upon receipt of an application (in Scottish law, a “motion for specification of documents”), which it had not opposed, the Council had disclosed social work records to solicitors for the mother in the proceedings, but subjected the records (apparently having received internal legal advice) to substantial redaction of personal data, of the sort which would have taken place if the records had been required to be disclosed under an Article 15 subject access request.
The Sheriff “invited” a senior Council officer and someone from its legal department to answer his enquiries as to how the redactions came to be made. At that hearing, it transpired that the disclosure exercise had been passed to the Council’s Data Protection Officer to deal with – that officer had sought advice from the Council’s legal department, which advised that the exercise should be treated as if it was redaction for the purposes of a subject access request. Before the court, the Council apologised unreservedly, and announced that it had begun an internal investigation into how it had happened.
Nothing earth-shattering, and this post is not to suggest that sometimes it might be necessary to redact personal data during litigation disclosure, but an interesting observation about the risks of confusing or conflating disclosure regimes.
And I end by noting that the Sheriff himself fell into error: he cites at several points, subject access provisions from part 3 of the DPA. Part 3 deals with law enforcement processing under Directive 2016/680, and has no relevance here. The subject access right emanates from, and is full described in, Article 15 GDPR.
I’ve written a piece for OpenDemocracy questioning the legality of the government’s practice of circulating some FOI requesters’ names across all departments.
A new piece by me and a colleague on the Mishcon de Reya website, about the ICO’s new SAR guidance https://www.mishcon.com/news/ico-guidance-on-subject-access-requests
A couple of NB points where this guidance differs from the draft version:
ICO suggests one of the factors to take into account when deciding whether a request is excessive is “Whether refusing to provide the information or even acknowledging it is held may cause substantive damage to the individual”. To me, this is pretty extraordinary, and might have the effect of putting the requester to proof as to damage caused by non-compliance.
ICO also has shifted its position, and suggest that staff time perse (rather than disbursements) might be charged for in the event of excessive or manifestly unfounded requests.
I have my own views on whether these propositions are positive or negative. I suspect though that we will see challenges.
*UPDATE, 17.11.20: ICO has now “reissued” its FOI response, saying that there was an error in the original, and that section 31 (dealing, broadly, with prejudice to regulatory functions), rather than section 30, of FOIA applies. If this was a plain example of a typo, I would not have drawn attention, but the original response specifically showed that the author thought that criminality would arise in a case of DPO conflict of interest.
I would add two things. First, the exemption is still questionable in my view – I can’t see how disclosing whether organisations have been investigated regarding DPO conflicts (and if so, the numbers involved) could conceivably cause or be likely to cause prejudice to ICO’s regulatory functions. Second, I raised this, as NADPO chair, as a matter of concern with ICO, but, despite the withdrawal of the offending response, I have heard nothing yet. END UPDATE*
As chair of NADPO* (the National Association of Data Protection and Freedom of Information Officers) I’m understandably interested in information and news about data protection officers (DPOs). In particular, what the Information Commissioner’s Office (ICO) (as the regulatory body most DPOs will interact with) says on this subject will be especially notable.
When I saw that someone had made a Freedom of Information (FOI) request to the ICO about whether the latter had investigated or taken enforcement action against any controllers for reasons relating to potential conflict of interest regarding DPO positions, I was intrigued to see what the response would be (I knew no fines had been issued, but I wanted to know how many investigations might have taken place – indeed, I had blogged about the ICO’s own DPO role a few months previously).
However, the ICO’s response to the FOI request is, let’s say, odd. They have refused to disclose (in fact, have refused even to confirm or deny whether they hold) the requested information, citing the FOI exemption that applies to information held for the purposes of investigations into whether someone should be charged with a criminal offence: remarkably, the ICO seems to think that a conflict of interest such as envisaged by Article 38(6) of the General Data Protection Regulation (GDPR) would amount to a criminal offence – “it is likely that, if proven, an offence under the DPA [Data Protection Act 2018] may have been committed”. This cannot be the case though – there are no offence provisions under the DPA which come close to criminalising a potential conflict of interest regarding a DPO role, and it would be extraordinary if parliament had decided to make it an offence.
Why the ICO should suggest that there are such provisions is not at all clear, and – if it is not just a stray error – might indicate a rather worrying lack of understanding of both data protection and FOI law.
One final point to note – even the part of the FOI response which didn’t mistakenly assume criminal law provisions were engaged, said, in respect of the part of the request which asked for any information the ICO holds “to assist public authorities protect [sic] against a conflict of interest with the role of the DPO”, that staff at the ICO had been consulted and “there is no information held”. However, on the ICO’s website, in plain view, is guidance on the subject (admittedly not in any detail, but clearly in scope of this request).
The views in this post (and indeed most posts on this blog) are my personal ones, and do not represent the views of any organisation I am involved with.
*I notice that the cookie notice on the NADPO site has somehow slipped into error – I am on the blower to our webdev as we speak.
By me, on the Mishcon de Reya website.
…a recent request to the ICO under the Freedom of Information Act 2000 (FOIA) has revealed that, from the available data, of the 21705 personal data breaches notified to the ICO since May 2018, 14,365 were notified within 72 hours, and 7340 were not – meaning that approximately one third of personal data breaches are reported later than within 72 hours
When data protection law (e.g. Chapter V of the General Data Protection Regulation (GDPR) and Article 25 of the prior Data Protection Directive) talks about a “transfer” of personal data to a third country, no one quite knows what it means: “transfer” is not defined. There’s been a fair bit of legal and academic discussion about this.
But, as far back as 2002 it has been established law that, if I upload personal data onto an internet page, so that that data becomes accessible to people outside the EU, this does not constitute a transfer of data to a third country. The Court of Justice of the European Union held so, in the case of Lindqvist (C-101/01), pointing out that, if that were the case
every time that personal data are loaded onto an internet page, that transfer would necessarily be a transfer to all the third countries where there are the technical means needed to access the internet
with the result that, if even one third country in the world did not ensure adequate protection of personal data, EU Member States – following, as they must, EU data protection law – would be obliged to prevent any personal data being placed on the internet. As a matter of public policy, and indeed of common sense, that could not have been the intention of the legislator.
But notably (and oddly, given its generally relaxed approach to international transfer issues) the Information Commissioner’s Office (ICO), eighteen years on from Lindqvist appears to take an opposing view, saying
Putting personal data on to a website will often result in a restricted transfer. The restricted transfer takes place when someone outside the EEA accesses that personal data via the website…If you load personal data onto a UK server which is then available through a website, and you plan or anticipate that the website may be accessed from outside the EEA, you should treat this as a restricted transfer.
Which is all well and good, but, if that is indeed the case, then how does ICO find a basis in Chapter V of GDPR for its transfer of my personal data (and others’) to, say, Syria, or South Sudan, or Cambodia, or anywhere else in the world? There is no adequacy decision in place, (presumably) no standard contractual clauses or other appropriate safeguards, and no apparent Article 49 derogation. Is this, then, an unlawful transfer?
I’m just mightily relieved we haven’t got some bizarre constitutional crisis on the immediate horizon, under which these issue are going to get even more complex.
A guest post by Danny Budzak.
Danny is the Senior Information Manager at the London Legacy Development Corporation and is involved in data protection and information security. He regularly delivers training and learns as much, if not more, than he might teach. He has also worked with Silver Surfers, helping older people to get online. What he has learned makes him amazed and concerned in equal measure at the whole issue of ‘password management’.
In days gone by, confessions could be described as the aural equivalent of click-bait. Everyone wants to listen. I will start with mine. On a recent holiday, I found that space where work and the office and projects and PowerPoint presentations seemed far away. And at that point I realised I had forgotten my network password. I was convinced such a thing could never happen. I used it at least ten times a day to log on, unlock the screen, to log on, to unlock the screen. During lock-down I was probably using it more than in the office. But it had gone. Where that password should have been in my brain was nothing but a blank space. Being in the office would have mitigated the problem. It can be reset remotely. But it doesn’t work like that for many people when working remotely.
I do a lot of information security training and password training is a key part of this. I was used to watching people counting on their fingers how many characters their password had (usually eight), or counting on one hand the number of “different” passwords they use. Some could this with one finger. One password to rule them all.
Then I introduced a new exercise by asking people how many online accounts they had. Some said “about twenty…or maybe thirty”, others admitted, “I don’t have a clue”, two people with password managers knew exactly; 189, 233. Research shows that most people think they have around 20 – 30 online accounts, but they are more likely to have 120 – 130 accounts. Sit down and make a list. And that will just be the ones you can remember. What about that website where you bought tickets for an event ten years ago? It’s still there, even if you have forgotten. Just remember, the internet has a much better and far more comprehensive memory than you do.
And then the story goes like this. So if you have 120 – 130 accounts, how do you manage the passwords? “One key password with variations”, “the browser remembers them”, “I just re-set them each time”, “a small number which I swop and vary”. Why not write them down with invisible ink on a sheet of A4 and store the paper in the third book of the fourth shelf in the kitchen?
After a couple of years I was puzzled why no-one ever asked me how I managed passwords. So I started telling them.
For my most important accounts – bank, email, social media, consumer sites – I write them down. In a book. These are long passwords – 25-30 characters long. But I write them down in such a way as they don’t look like passwords. Paradoxically, if you have a password of 1*EKLP&!!mm…!()??.< and write it down, it’s obvious it’s a password. But if you do have a password like that, you will never remember it.
For what I consider low-risk work applications (appraisal system, annual leave, bike shed booking) all the passwords are in a spreadsheet, that’s in a part of the network drive that only I can access, that is among 10,000 other files. That spreadsheet has a password on it. What could possibly go wrong?
And then the passwords for my social life – art galleries, books, music, exploring. These generally require accounts because it helps them sell to advertisers and they can do more fancy analysis of what you look at. Somewhere in the universe a database exists which shows I like the art of the Northern Renaissance, German electronic music and Italian food. It’s all a bit creepy that companies want to know this but I don’t care two hoots where that “web page usage” data goes and what Facebook or anyone else does with it. Good luck with anyone who manages to sell me anything based on that. An original Jan Van Eyck perhaps? But where there is a problem is if you use the same password for everything; because you are then at the mercy of the weakest system in which you have data. Does it matter if your password is the same for an obscure fan site of CAN as your social media account? Well yes, actually it does.
But there are already three systems here. Four if you include “saving passwords in the browser”. Five, if I have to accept that I get in a muddle with passwords sometimes and need to re-set them, or log in from a different machine. And yet the password is the key security element which we all hold and control.
I still had a vague sense that I was doing something wrong so I thought it might be worth asking my peers. I sent a very short questionnaire to two online communities which I thought might be interested. The Data Protection forum and Records Management forum on JISCmail. Nothing could have prepared me for what happened next.
This is not a scientific study, it was almost a bit of light-hearted fun. Some of the responses certainly made me laugh out loud, but for all the wrong reasons. There are no percentages or totals here, but I got the feeling that the 50 or so people who responded were a fairly representative sample. The responses very much reflected the sort of responses I have been getting in training for the past five years. “I have one password and no one will ever guess it.” Actually, it doesn’t really work like that. “I use 3 instead of E”. Wow! Don’t tell the hackers they would never think of such things. “All my passwords are in French.” That’s great. No hacking problems in France. “I use the same one but change the number at the end.” “I have a few which I interchange.” One person’s reply was so baroque that one felt like asking if they had taken part in the Napoleonic wars where cyphers and skull-duggery became ever more elaborate: “I use the names of the first team squad of my favourite football team but I remove all the letters a and e”. This is fantastic, but it only provides 25 passwords. What about the 100 others?
Other responses made me gasp and some were so shocking that if I revealed the methods it would only help the bad people. I suspect the people who use Password1, TopCat2, OpenSesame and others kept their guilty heads down. So the problem is almost certainly worse than the responses received.
The other thing I noticed was that very few people displayed much confidence in their “methods” (although in many instances that is stretching the meaning of the word). The small minority who did display a certainty about what they did were those who were convinced that one password is enough, and those who use a password manager. And that got me thinking.
At a recent training session I started to go through password management. The different types of passwords for different types of systems; using reminders such as salsa sauce recipes (1 handful of basil, 2 tbsp lemon juice, a lot of parsley – they are actually good passwords); writing them down but also having a couple of characters which only you know; using the third page of a book. And half way through I stopped.
“This is madness”, I said, “get a password manager”.
I don’t know if they are the best way to do it, but it has got to be better than the Heath Robinson approach which so many people have.
As well as managing passwords, it will also help you understand how many accounts you have online. And if you don’t know that – which most people don’t – then how can you be in control of your own personal data?