Successfully reported this slideshow.



Published on

Data protection, actors (data subject, data controller, data processor, data exporter, data importer)

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this


  1. 1. PERSONAL DATA PROTECTION Actors Processing personal data Finality Legitimacy Transparency Organisation Proportional End-to-end
  2. 2. <ul><li>First set of actors: the protagonists </li></ul>
  3. 3. <ul><li>Identified or identifiable natural person to whom information relates </li></ul><ul><li>Data sets </li></ul><ul><li>Different data subject is always different data sets . </li></ul><ul><li>Several data sets per data subject possible, e.g. based on different purpose or different capacity. </li></ul><ul><li>Capacity is irrelevant: customer, staff member, representative of a legal person, … </li></ul>
  4. 4. <ul><li>Second set of actors: the antagonists </li></ul>
  5. 5. <ul><li>The body that determines the purpose(s) and means of the data processing operation. </li></ul><ul><li>Main addressee of legal provisions. </li></ul><ul><li>Joint or collective controllership possible, but not often “used” as concept. Concept of lead-controller seems to be used more often. </li></ul>
  6. 6. <ul><li>Third set of actors: the side kicks (outsourcing) </li></ul>
  7. 7. <ul><li>The body which processes personal data on behalf of the controller. </li></ul><ul><li>Specific focus on this aspect in the block organisation , more particularly security and confidentiality . </li></ul><ul><li>Not : staff members of the controller. </li></ul><ul><li>Common reference: </li></ul><ul><ul><li>Procurement </li></ul></ul><ul><ul><li>Outsourcing </li></ul></ul>
  8. 8. <ul><li>Different perspective : focus on transfer </li></ul>
  9. 9. <ul><li>Data exporter </li></ul><ul><li>Different capacities possible: controller or processor. </li></ul><ul><li>Data importer </li></ul><ul><li>Different capacities possible: controller or (sub-)processor. </li></ul>So: Controller Controller Processor Controller Processor Adde the geographic aspect (see security and confidentiality)