Artic­le 29 Working Par­ty: Defi­ni­ti­ve Ver­si­on of the Gui­de­lines on Data Breach Notification

The Art. 29 Data Pro­tec­tion Working Par­ty has final ver­si­on dated Febru­ary 6, 2018. of the “Gui­de­lines on Per­so­nal data breach noti­fi­ca­ti­on under Regu­la­ti­on 2016/679” published. The devia­ti­ons from the Draft from Octo­ber 3, 2017 can be seen in this com­pa­ri­son docu­ment: Link (PDF).

Among other things, the­re are new expl­ana­ti­ons regar­ding data pro­tec­tion vio­la­ti­ons that do not have a EU estab­lished respon­si­ble per­sons con­cern:

Whe­re a con­trol­ler not estab­lished in the EU is sub­ject to Artic­le 3(2) or Artic­le 3(3) and expe­ri­en­ces a breach, it is the­r­e­fo­re still bound by the noti­fi­ca­ti­on obli­ga­ti­ons under Artic­les 33 and 34. Artic­le 27 requi­res a con­trol­ler (and pro­ces­sor) to desi­gna­te a repre­sen­ta­ti­ve in the EU whe­re Artic­le 3(2) applies. In such cases, WP29 recom­mends that noti­fi­ca­ti­on should be made to the super­vi­so­ry aut­ho­ri­ty in the Mem­ber Sta­te whe­re the controller’s repre­sen­ta­ti­ve in the EU is estab­lished. Simi­lar­ly, whe­re a pro­ces­sor is sub­ject to Artic­le 3(2), it will be bound by the obli­ga­ti­ons on pro­ces­sors, of par­ti­cu­lar rele­van­ce here, the duty to noti­fy a breach to the con­trol­ler under Artic­le 33(2).

Com­pa­nies are free to deter­mi­ne the loca­ti­on of the EU repre­sen­ta­ti­ve to a cer­tain ext­ent accor­ding to Art. 27 para. 3 in con­junc­tion with Art. Art. 3 (2) GDPR, com­pa­nies are free to a cer­tain ext­ent to deter­mi­ne the loca­ti­on of the EU repre­sen­ta­ti­ve. If the approach of the Art. 29 Working Par­ty is fol­lo­wed, this results in a cer­tain free­dom of design also for the addres­see of inf­rin­ge­ment notifications.

Among other things, the final ver­si­on con­ta­ins cla­ri­fi­ca­ti­ons as follows:

  • Cla­ri­fi­ca­ti­ons on the appli­ca­bi­li­ty of the pro­vi­si­ons on data pro­tec­tion brea­ches in the case of tem­po­ra­ry unavai­la­bi­li­ty From data
  • the fol­lo­wing cla­ri­fi­ca­ti­on in con­nec­tion with the que­sti­on at what point a vio­la­ti­on “.beca­me known” (Art. 33 para. 1 GDPR):

    Howe­ver, as indi­ca­ted ear­lier, the GDPR requi­res the con­trol­ler to imple­ment all appro­pria­te tech­ni­cal pro­tec­tion and orga­ni­sa­tio­nal mea­su­res to estab­lish imme­dia­te­ly whe­ther a breach has taken place and to prompt­ly inform the super­vi­so­ry aut­ho­ri­ty and the data sub­jects. It also sta­tes that the fact that the noti­fi­ca­ti­on was made wit­hout undue delay should be estab­lished taking into account in par­ti­cu­lar the natu­re and gra­vi­ty of the breach and its con­se­quen­ces and adver­se effects for the data sub­ject. This puts an obli­ga­ti­on on the con­trol­ler to ensu­re that they will be “awa­re” of any brea­ches in a time­ly man­ner so that they can take appro­pria­te action.

  • the fol­lo­wing spe­ci­fi­ca­ti­on to joint­ly respon­si­ble:

    Artic­le 26 con­cerns joint con­trol­lers and spe­ci­fi­es that joint con­trol­lers shall deter­mi­ne their respec­ti­ve respon­si­bi­li­ties for com­pli­ance with the GDPR25. This will include deter­mi­ning which par­ty will have respon­si­bi­li­ty for com­ply­ing with the obli­ga­ti­ons under Artic­les 33 and 34. WP29 recom­mends that the con­trac­tu­al arran­ge­ments bet­ween joint con­trol­lers include pro­vi­si­ons that deter­mi­ne which con­trol­ler will take the lead on, or be respon­si­ble for, com­pli­ance with the GDPR’s breach noti­fi­ca­ti­on obligations.

  • the spe­ci­fi­ca­ti­on that Pro­ces­sor have to noti­fy the data con­trol­ler of data brea­ches wit­hout first car­ry­ing out a risk assess­ment; this is the task of the data con­trol­ler (wher­eby this task, taking into account Art. 28 (3) lit. f GDPR may well be dele­ga­ted to the processor).
  • the spe­ci­fi­ca­ti­on that data pro­tec­tion vio­la­ti­ons in the case of cross-bor­der pro­ce­s­sing (within the mea­ning of Art. 4 No. 23 GDPR(which requi­res at least one estab­lish­ment in a Mem­ber Sta­te) must be noti­fi­ed to the lead aut­ho­ri­ty in each case.
  • a cla­ri­fi­ca­ti­on on noti­fi­ca­ti­ons to data sub­jects, inclu­ding on the lan­guage to be used
  • a cla­ri­fi­ca­ti­on that toke­nizati­on is equi­va­lent to encryp­ti­on when asses­sing risks (this applies to elec­tro­nic payment systems, for example)
  • a wool­ly exe­cu­ti­on on the dura­ti­on of data breach records retention

Aut­ho­ri­ty

Area

Topics

Rela­ted articles

Sub­scri­be