SlideShare a Scribd company logo
1 of 10
Article 13
Exemptions and Restrictions
GROUP7
Article 13.1 Exemptions and Restrictions
1. Member States may adopt legislative measures to restrict the
scope of the obligations and rights provided for in Articles 6(1), 10,
11(1), 12 and 21 when such a restriction constitutes a necessary
measure to safeguard:
(a) national security;
(b) defence;
(c) public security;
(d) the prevention, investigation, detection and prosecution of
criminal offences, or of breaches of ethics for regulated professions;
Article 13.1 Exemptions and Restrictions
(e) an important economic or financial interest of a Member State
or of the European Union, including monetary, budgetary and
taxation matters;
(f) a monitoring, inspection or regulatory function connected, even
occasionally, with the exercise of official authority in cases referred
to in (c), (d) and (e);
(g) the protection of the data subject or of the rights and freedoms
of others.
Example: LOI INFORMATIQUE ET LIBERTES
CHAPTER IV SECTION 2: AUTHORISATION
Article 26(I. 1°&2°)
I. – An order of the competent Minister or Ministers shall authorise,
after a reasoned and published opinion of the CNIL , the processing
of personal data carried out on behalf of the State and:
1° which involves State security, defence or public safety; or
2° whose purpose is the prevention, investigation, or proof of
criminal offences, the prosecution of offenders or the execution of
criminal sentences or security measures.
Example: LOI INFORMATIQUE ET LIBERTES
CHAPTER V SECTION 1: OBLIGATIONS INCUMBENT UPON DATA
CONTROLLERS
Article 32(I & III ) EU Article 10 & 11
Article 32(V) – The provisions of Section I shall not apply to data
obtained under the conditions provided for in Section III when
processing is carried out on behalf of the State and relating to State
security, defence, or public safety, to the extent that such limitation
is necessary for the observance of the purposes pursued by the
processing.
Example: LOI INFORMATIQUE ET LIBERTES
CHAPTER V SECTION 2: RIGHTS OF INDIVIDUALS IN RESPECT TO THE
PROCESSING OF PERSONAL DATA
Article 41 As a derogation from Articles 39 (right of access) and 40
(right of rectification), where processing involves State security, defence
or public safety, the right of access shall be exercised in accordance with
the conditions provided for by this Article in respect of all the
information contained in that processing.
request → investigation and modification → verification
with the agreement of the data controller, that the disclosure of the
data does not undermine its purposes, State security, the defence or
public safety, these data may be disclosed to the applicant.
Example: LOI INFORMATIQUE ET LIBERTES
CHAPTER VI: SUPERVISION OF THE IMPLEMENTATION OF DATA
PROCESSING
Article 44(IV) EU Article 21 Publicizing of processing
operations
IV. – For processing operations that affect State security and that is
exempted from the publication of the regulatory ruling that
authorises it by virtue of Section III of Article 26, the decree taken
upon a prior opinion of the “Conseil d’Etat” which provides for such
exemption may also stipulate that the processing shall not be subject
to the provisions of this Article.
Article 13.2 Exemptions and Restrictions
Data are processed
Purpose of scientific research
Keep in personal form for
a period for the sole
purpose of creating
statistics
Member states may
restrict the data
subjects’ rights of
access of data if
Subject to adequate legal safeguards, in particular that the data are not used for taking
measures or decisions regarding any particular individual, Member States may, where
there is clearly no risk of breaching the privacy of the data subject, restrict by a
legislative measure the rights provided for in Article 12 when data are processed solely
for purposes of scientific research or are kept in personal form for a period which does
not exceed the period necessary for the sole purpose of creating statistics.
Example: LOI INFORMATIQUE ET LIBERTES
As regards to Article 13(2), the Loi Informatique et Libertes gives
specific exemptions on the data subject’s right of access in Article
6(I.2°), 32(III), 36, and 39(II), to make sure the accuracy and purity
of historical and scientific researches.
Some Improvements to 13.2
The exemption is broad because it does not enumerate the types
of “research purposes” to which it applies
Member States should create clear and strict limits on the ability to
use research data.
Members states should define or provide guidelines for
determining what constitutes “adequate safeguards” and “measures
or decisions”

More Related Content

Similar to Article 13 三三四四琐琐碎碎

Managing Data Protection guide powerpoint presentation
Managing Data Protection guide powerpoint presentationManaging Data Protection guide powerpoint presentation
Managing Data Protection guide powerpoint presentation
silvereyez11
 
Factsheet data protection_en
Factsheet data protection_enFactsheet data protection_en
Factsheet data protection_en
Greg Sterling
 
Notification By Data Controllers Under The Data Protection Act, 1998 (Uk)
Notification By Data Controllers Under The Data Protection Act, 1998 (Uk)Notification By Data Controllers Under The Data Protection Act, 1998 (Uk)
Notification By Data Controllers Under The Data Protection Act, 1998 (Uk)
Vishnu Kesarwani
 

Similar to Article 13 三三四四琐琐碎碎 (20)

Jamaica's Data Protection Act: Compliance required from the business community
Jamaica's Data Protection Act: Compliance required from the business communityJamaica's Data Protection Act: Compliance required from the business community
Jamaica's Data Protection Act: Compliance required from the business community
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developments
 
Managing Data Protection guide powerpoint presentation
Managing Data Protection guide powerpoint presentationManaging Data Protection guide powerpoint presentation
Managing Data Protection guide powerpoint presentation
 
Transatlantic Data Privacy - From Safe Harbor to Privacy Sheidl
Transatlantic Data Privacy - From Safe Harbor to Privacy SheidlTransatlantic Data Privacy - From Safe Harbor to Privacy Sheidl
Transatlantic Data Privacy - From Safe Harbor to Privacy Sheidl
 
Feedback on Draft Personal Data Protection Bill 2018 submitted to MEITY
Feedback  on Draft Personal Data Protection Bill 2018 submitted to MEITYFeedback  on Draft Personal Data Protection Bill 2018 submitted to MEITY
Feedback on Draft Personal Data Protection Bill 2018 submitted to MEITY
 
Commercial Privacy Bill of Rights PDF
Commercial Privacy Bill of Rights PDFCommercial Privacy Bill of Rights PDF
Commercial Privacy Bill of Rights PDF
 
GDPR and Analytics
GDPR and AnalyticsGDPR and Analytics
GDPR and Analytics
 
EU General Data Protection Regulation - Update 2017
EU General Data Protection Regulation - Update 2017EU General Data Protection Regulation - Update 2017
EU General Data Protection Regulation - Update 2017
 
Data Privacy - Security of Personal Information
Data Privacy - Security of Personal InformationData Privacy - Security of Personal Information
Data Privacy - Security of Personal Information
 
Factsheet on the "Right to be Forgotten" ruling
Factsheet on the "Right to be Forgotten" rulingFactsheet on the "Right to be Forgotten" ruling
Factsheet on the "Right to be Forgotten" ruling
 
Factsheet data protection_en
Factsheet data protection_enFactsheet data protection_en
Factsheet data protection_en
 
250220 blockchain gdpr_blockchain_hillemann_presentation
250220 blockchain gdpr_blockchain_hillemann_presentation250220 blockchain gdpr_blockchain_hillemann_presentation
250220 blockchain gdpr_blockchain_hillemann_presentation
 
THE BRAZILIAN LAW ON PERSONAL DATA PROTECTION
THE BRAZILIAN LAW ON PERSONAL DATA PROTECTIONTHE BRAZILIAN LAW ON PERSONAL DATA PROTECTION
THE BRAZILIAN LAW ON PERSONAL DATA PROTECTION
 
Notification By Data Controllers Under The Data Protection Act, 1998 (Uk)
Notification By Data Controllers Under The Data Protection Act, 1998 (Uk)Notification By Data Controllers Under The Data Protection Act, 1998 (Uk)
Notification By Data Controllers Under The Data Protection Act, 1998 (Uk)
 
The GDPR, Brexit, the UK and adequacy
The GDPR, Brexit, the UK and adequacyThe GDPR, Brexit, the UK and adequacy
The GDPR, Brexit, the UK and adequacy
 
Overview of the Digital Personal Data Protection DPDP Bill 2023.pdf
Overview of the Digital Personal Data Protection DPDP Bill 2023.pdfOverview of the Digital Personal Data Protection DPDP Bill 2023.pdf
Overview of the Digital Personal Data Protection DPDP Bill 2023.pdf
 
Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)
 
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdfAll_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
 
GDPR Overview
GDPR OverviewGDPR Overview
GDPR Overview
 
General Data Protection Regulation (GDPR) | Privacy Law in India |
General Data Protection Regulation (GDPR) | Privacy Law in India |General Data Protection Regulation (GDPR) | Privacy Law in India |
General Data Protection Regulation (GDPR) | Privacy Law in India |
 

Recently uploaded

Termination of Employees under the Labor Code.pptx
Termination of Employees under the Labor Code.pptxTermination of Employees under the Labor Code.pptx
Termination of Employees under the Labor Code.pptx
BrV
 
一比一原版(UOL毕业证书)利物浦大学毕业证成绩单原件一模一样
一比一原版(UOL毕业证书)利物浦大学毕业证成绩单原件一模一样一比一原版(UOL毕业证书)利物浦大学毕业证成绩单原件一模一样
一比一原版(UOL毕业证书)利物浦大学毕业证成绩单原件一模一样
mefyqyn
 
一比一原版(Indiana State毕业证书)印第安纳州立大学毕业证成绩单原件一模一样
一比一原版(Indiana State毕业证书)印第安纳州立大学毕业证成绩单原件一模一样一比一原版(Indiana State毕业证书)印第安纳州立大学毕业证成绩单原件一模一样
一比一原版(Indiana State毕业证书)印第安纳州立大学毕业证成绩单原件一模一样
mefyqyn
 
一比一原版(MSU毕业证书)密苏里州立大学毕业证成绩单原件一模一样
一比一原版(MSU毕业证书)密苏里州立大学毕业证成绩单原件一模一样一比一原版(MSU毕业证书)密苏里州立大学毕业证成绩单原件一模一样
一比一原版(MSU毕业证书)密苏里州立大学毕业证成绩单原件一模一样
mefyqyn
 

Recently uploaded (20)

Comprehensive Guide on Drafting Directors' Report and its ROC Compliances und...
Comprehensive Guide on Drafting Directors' Report and its ROC Compliances und...Comprehensive Guide on Drafting Directors' Report and its ROC Compliances und...
Comprehensive Guide on Drafting Directors' Report and its ROC Compliances und...
 
Embed-1-1.pdfohediooieoiehohoiefoloeohefoi
Embed-1-1.pdfohediooieoiehohoiefoloeohefoiEmbed-1-1.pdfohediooieoiehohoiefoloeohefoi
Embed-1-1.pdfohediooieoiehohoiefoloeohefoi
 
(Hamad khadam ) ENGLISH LEGAL 2.0.docx
(Hamad khadam )   ENGLISH LEGAL 2.0.docx(Hamad khadam )   ENGLISH LEGAL 2.0.docx
(Hamad khadam ) ENGLISH LEGAL 2.0.docx
 
Trending Topics in ITC Litigation with Knobbe Martens
Trending Topics in ITC Litigation with Knobbe MartensTrending Topics in ITC Litigation with Knobbe Martens
Trending Topics in ITC Litigation with Knobbe Martens
 
Dabholkar-matter-Judgement-1.pdfrefp;sdPp;
Dabholkar-matter-Judgement-1.pdfrefp;sdPp;Dabholkar-matter-Judgement-1.pdfrefp;sdPp;
Dabholkar-matter-Judgement-1.pdfrefp;sdPp;
 
Does Apple Neurotechnology Patents Go To Far?
Does Apple  Neurotechnology Patents Go To Far?Does Apple  Neurotechnology Patents Go To Far?
Does Apple Neurotechnology Patents Go To Far?
 
Embed-2-2.pdf[[app[r[prf[-rk;lme;[ed[prp[
Embed-2-2.pdf[[app[r[prf[-rk;lme;[ed[prp[Embed-2-2.pdf[[app[r[prf[-rk;lme;[ed[prp[
Embed-2-2.pdf[[app[r[prf[-rk;lme;[ed[prp[
 
File Taxes Online Simple Steps for Efficient Filing.pdf
File Taxes Online Simple Steps for Efficient Filing.pdfFile Taxes Online Simple Steps for Efficient Filing.pdf
File Taxes Online Simple Steps for Efficient Filing.pdf
 
CASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptx
CASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptxCASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptx
CASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptx
 
Termination of Employees under the Labor Code.pptx
Termination of Employees under the Labor Code.pptxTermination of Employees under the Labor Code.pptx
Termination of Employees under the Labor Code.pptx
 
How Can an Attorney Help With My Car Accident Claim?
How Can an Attorney Help With My Car Accident Claim?How Can an Attorney Help With My Car Accident Claim?
How Can an Attorney Help With My Car Accident Claim?
 
一比一原版(UOL毕业证书)利物浦大学毕业证成绩单原件一模一样
一比一原版(UOL毕业证书)利物浦大学毕业证成绩单原件一模一样一比一原版(UOL毕业证书)利物浦大学毕业证成绩单原件一模一样
一比一原版(UOL毕业证书)利物浦大学毕业证成绩单原件一模一样
 
Respondent Moot Memorial including Charges and Argument Advanced.docx
Respondent Moot Memorial including Charges and Argument Advanced.docxRespondent Moot Memorial including Charges and Argument Advanced.docx
Respondent Moot Memorial including Charges and Argument Advanced.docx
 
Law of succession-Notes for students studying law
Law of succession-Notes for students studying lawLaw of succession-Notes for students studying law
Law of succession-Notes for students studying law
 
Essential Components of an Effective HIPAA Safeguard Program
Essential Components of an Effective HIPAA Safeguard ProgramEssential Components of an Effective HIPAA Safeguard Program
Essential Components of an Effective HIPAA Safeguard Program
 
TTD - PPT on social stock exchange.pptx Presentation
TTD - PPT on social stock exchange.pptx PresentationTTD - PPT on social stock exchange.pptx Presentation
TTD - PPT on social stock exchange.pptx Presentation
 
HOW LAW FIRMS CAN SUPPORT MILITARY DIVORCE CASES
HOW LAW FIRMS CAN SUPPORT MILITARY DIVORCE CASESHOW LAW FIRMS CAN SUPPORT MILITARY DIVORCE CASES
HOW LAW FIRMS CAN SUPPORT MILITARY DIVORCE CASES
 
Bad Spaniel's Consumer Survey on the Use of Disclaimers
Bad Spaniel's Consumer Survey on the Use of DisclaimersBad Spaniel's Consumer Survey on the Use of Disclaimers
Bad Spaniel's Consumer Survey on the Use of Disclaimers
 
一比一原版(Indiana State毕业证书)印第安纳州立大学毕业证成绩单原件一模一样
一比一原版(Indiana State毕业证书)印第安纳州立大学毕业证成绩单原件一模一样一比一原版(Indiana State毕业证书)印第安纳州立大学毕业证成绩单原件一模一样
一比一原版(Indiana State毕业证书)印第安纳州立大学毕业证成绩单原件一模一样
 
一比一原版(MSU毕业证书)密苏里州立大学毕业证成绩单原件一模一样
一比一原版(MSU毕业证书)密苏里州立大学毕业证成绩单原件一模一样一比一原版(MSU毕业证书)密苏里州立大学毕业证成绩单原件一模一样
一比一原版(MSU毕业证书)密苏里州立大学毕业证成绩单原件一模一样
 

Article 13 三三四四琐琐碎碎

  • 1. Article 13 Exemptions and Restrictions GROUP7
  • 2. Article 13.1 Exemptions and Restrictions 1. Member States may adopt legislative measures to restrict the scope of the obligations and rights provided for in Articles 6(1), 10, 11(1), 12 and 21 when such a restriction constitutes a necessary measure to safeguard: (a) national security; (b) defence; (c) public security; (d) the prevention, investigation, detection and prosecution of criminal offences, or of breaches of ethics for regulated professions;
  • 3. Article 13.1 Exemptions and Restrictions (e) an important economic or financial interest of a Member State or of the European Union, including monetary, budgetary and taxation matters; (f) a monitoring, inspection or regulatory function connected, even occasionally, with the exercise of official authority in cases referred to in (c), (d) and (e); (g) the protection of the data subject or of the rights and freedoms of others.
  • 4. Example: LOI INFORMATIQUE ET LIBERTES CHAPTER IV SECTION 2: AUTHORISATION Article 26(I. 1°&2°) I. – An order of the competent Minister or Ministers shall authorise, after a reasoned and published opinion of the CNIL , the processing of personal data carried out on behalf of the State and: 1° which involves State security, defence or public safety; or 2° whose purpose is the prevention, investigation, or proof of criminal offences, the prosecution of offenders or the execution of criminal sentences or security measures.
  • 5. Example: LOI INFORMATIQUE ET LIBERTES CHAPTER V SECTION 1: OBLIGATIONS INCUMBENT UPON DATA CONTROLLERS Article 32(I & III ) EU Article 10 & 11 Article 32(V) – The provisions of Section I shall not apply to data obtained under the conditions provided for in Section III when processing is carried out on behalf of the State and relating to State security, defence, or public safety, to the extent that such limitation is necessary for the observance of the purposes pursued by the processing.
  • 6. Example: LOI INFORMATIQUE ET LIBERTES CHAPTER V SECTION 2: RIGHTS OF INDIVIDUALS IN RESPECT TO THE PROCESSING OF PERSONAL DATA Article 41 As a derogation from Articles 39 (right of access) and 40 (right of rectification), where processing involves State security, defence or public safety, the right of access shall be exercised in accordance with the conditions provided for by this Article in respect of all the information contained in that processing. request → investigation and modification → verification with the agreement of the data controller, that the disclosure of the data does not undermine its purposes, State security, the defence or public safety, these data may be disclosed to the applicant.
  • 7. Example: LOI INFORMATIQUE ET LIBERTES CHAPTER VI: SUPERVISION OF THE IMPLEMENTATION OF DATA PROCESSING Article 44(IV) EU Article 21 Publicizing of processing operations IV. – For processing operations that affect State security and that is exempted from the publication of the regulatory ruling that authorises it by virtue of Section III of Article 26, the decree taken upon a prior opinion of the “Conseil d’Etat” which provides for such exemption may also stipulate that the processing shall not be subject to the provisions of this Article.
  • 8. Article 13.2 Exemptions and Restrictions Data are processed Purpose of scientific research Keep in personal form for a period for the sole purpose of creating statistics Member states may restrict the data subjects’ rights of access of data if Subject to adequate legal safeguards, in particular that the data are not used for taking measures or decisions regarding any particular individual, Member States may, where there is clearly no risk of breaching the privacy of the data subject, restrict by a legislative measure the rights provided for in Article 12 when data are processed solely for purposes of scientific research or are kept in personal form for a period which does not exceed the period necessary for the sole purpose of creating statistics.
  • 9. Example: LOI INFORMATIQUE ET LIBERTES As regards to Article 13(2), the Loi Informatique et Libertes gives specific exemptions on the data subject’s right of access in Article 6(I.2°), 32(III), 36, and 39(II), to make sure the accuracy and purity of historical and scientific researches.
  • 10. Some Improvements to 13.2 The exemption is broad because it does not enumerate the types of “research purposes” to which it applies Member States should create clear and strict limits on the ability to use research data. Members states should define or provide guidelines for determining what constitutes “adequate safeguards” and “measures or decisions”