SlideShare a Scribd company logo
Navigating the Privacy Sea
Christian M. Runte, CMS Hasche Sigle




IFCLA – Helsinki, 10 June 2010
1. The Privacy Sea

                             2. How to Navigate it




2   Christian Runte | Navigating the Privacy Sea | IFCLA – Helsinki, 10 June 2010
3   Christian Runte | Navigating the Privacy Sea | IFCLA – Helsinki, 10 June 2010
4   Christian Runte | Navigating the Privacy Sea | IFCLA – Helsinki, 10 June 2010
Why the Sea Got Rough


    Advanced technology (internet, increased storage capability), and
    increased relevance of data processing
    Online transactions rapidly replacing "anonymous" real transactions;
    online transactions require identification and thus personal data
    Changes in legislation (data breach notification etc.)
    Aftermath of 9/11, online surveillance
    Media coverage of data breaches and other privacy issues in the public
    sector (UK CD-ROMs, German tax data) and in the private sector
    (Facebook, Google, in Germany: Lidl, Deutsche Telekom etc.)




5    Christian Runte | Navigating the Privacy Sea | IFCLA – Helsinki, 10 June 2010
How Fragmented is Privacy Law?


    EU level
          One general directive (95/46/EC) but numerous other regulations,
          directives and decisions which also contain data protection
          provisions
          Some better known: 2002/58/EC etc.
          Some more hidden: Regulation 80/2009 etc.
    Consultation process for new general directive 95/46/EC
    "Harmonized diversity"
          Implementation in member states differs, sometimes significantly
          Differences in processes, formalities and bureaucracy
    No single authority for the EU or even within some member states




6    Christian Runte | Navigating the Privacy Sea | IFCLA – Helsinki, 10 June 2010
Regulatory Authorities Dealing with Data
Protection Aspects: Germany

    Federal Level: 1 (+1)
    Länder Level: 25
                                                                               1
    Further Authorities for Churches,                                                      1
    Public Broadcasting, Public                                                1
                                                                       1
    Healthcare etc.                                                                3       1
                                                                           1                       2
    Art. 28 [1] Directive 95/46/EC:                            1           2 3
                                                                                               1
    "authorities shall act with complete
    independence in exercising the                                 1
                                                              2            2
    functions…"
                                                                                       2
    ECJ, 9 March 2010: Germany system
    in violation of Art. 28 [1]




7     Christian Runte | Navigating the Privacy Sea | IFCLA – Helsinki, 10 June 2010
Everything Converging in the Cloud?


    "Everything is content"
          Convergence of technology and media delivery
    Convergence of substantial law?
          Possible but likely to be very slow
          Overhaul of General Directive 95/46 (e.g. data breach)
    Geographical convergence?
          Which jurisdiction applies?
          More jurisdictions will apply
          Technical innovations (in particular cloud computing) will make it
          more complicated to be compliant in all relevant jurisdictions




8     Christian Runte | Navigating the Privacy Sea | IFCLA – Helsinki, 10 June 2010
Navigating it




9   Christian Runte | Navigating the Privacy Sea | IFCLA – Helsinki, 10 June 2010
Challenges


     More cases will require advice for more than one jurisdiction
           Knowledge of the local law
           Contact to relevant authorities
     The challenge is the number of countries and authorities involved and the
     number of local advisor you may need
           Cost
           Consistent advice
     Requires management of
           the client
           and local advisors




10    Christian Runte | Navigating the Privacy Sea | IFCLA – Helsinki, 10 June 2010
A Possible Approach


     Prepare your (local) memo first
     Managing multiple jurisdictions
           Do some local reconnaissance
             • General ressources
             • Websites
             • Online Materials
           Prepare questionnaire
             • Clearly defined questions
             • Provide your local answers as well
           Budget, no quote
           Direct contact between client and local counsel



11    Christian Runte | Navigating the Privacy Sea | IFCLA – Helsinki, 10 June 2010
Après Nous le Déluge


     Public perception of data protection and privacy will not vanish, media
     will drive the process
     Overhaul of Directive 95/46, consultation process
     More convergence?
     It's not a breach, it's a service




12     Christian Runte | Navigating the Privacy Sea | IFCLA – Helsinki, 10 June 2010
Last page




13   Data Breach Laws | ICAF – Berlin, 25 February 2010

More Related Content

Viewers also liked

Viewers also liked (10)

Multi channel digital distribution - jp virtanen
Multi channel digital distribution - jp virtanenMulti channel digital distribution - jp virtanen
Multi channel digital distribution - jp virtanen
 
Software development contractual issues susan atkinson
Software development contractual issues   susan atkinsonSoftware development contractual issues   susan atkinson
Software development contractual issues susan atkinson
 
Challenges and opportunities in achieving digital single european market su...
Challenges and opportunities in achieving digital single european market   su...Challenges and opportunities in achieving digital single european market   su...
Challenges and opportunities in achieving digital single european market su...
 
Service provider view how to cope with content diversity - kaisa olkkonen
Service provider view   how to cope with content diversity - kaisa olkkonenService provider view   how to cope with content diversity - kaisa olkkonen
Service provider view how to cope with content diversity - kaisa olkkonen
 
Whose content? whose revenue? who should be liable for a user's content? jo...
Whose content? whose revenue? who should be liable for a user's content?   jo...Whose content? whose revenue? who should be liable for a user's content?   jo...
Whose content? whose revenue? who should be liable for a user's content? jo...
 
It outsourcing enters new decade claudio da rold
It outsourcing enters new decade   claudio da roldIt outsourcing enters new decade   claudio da rold
It outsourcing enters new decade claudio da rold
 
Navigating the regulatory sea graham smith
Navigating the regulatory sea   graham smithNavigating the regulatory sea   graham smith
Navigating the regulatory sea graham smith
 
Exiting and replacement suppliers managing transition risk - clive davies
Exiting and replacement suppliers  managing transition risk - clive daviesExiting and replacement suppliers  managing transition risk - clive davies
Exiting and replacement suppliers managing transition risk - clive davies
 
Legal issues in the cloud renzo marchini & gene landy
Legal issues in the cloud   renzo marchini & gene landyLegal issues in the cloud   renzo marchini & gene landy
Legal issues in the cloud renzo marchini & gene landy
 
Carlsberg lessons learned from re-tendering an international infrastructure ...
Carlsberg  lessons learned from re-tendering an international infrastructure ...Carlsberg  lessons learned from re-tendering an international infrastructure ...
Carlsberg lessons learned from re-tendering an international infrastructure ...
 

Similar to Navigating the privacy sea christian runte

Doc Management European Commission
Doc Management European CommissionDoc Management European Commission
Doc Management European Commission
Eric Ketelaar
 
Marsden net neutrality in the European Parliament
Marsden net neutrality in the European ParliamentMarsden net neutrality in the European Parliament
Marsden net neutrality in the European ParliamentChris Marsden
 
#Openlaws #Bileta15
#Openlaws #Bileta15#Openlaws #Bileta15
#Openlaws #Bileta15
Chris Marsden
 
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
FIA2010
 
20150630_D6 1_Legal and EthicalFrameworkand Privacy and Security Principles
20150630_D6 1_Legal and EthicalFrameworkand Privacy and Security Principles20150630_D6 1_Legal and EthicalFrameworkand Privacy and Security Principles
20150630_D6 1_Legal and EthicalFrameworkand Privacy and Security PrinciplesLisa Catanzaro
 
Monitoring and controlling the Internet
Monitoring and controlling the InternetMonitoring and controlling the Internet
Monitoring and controlling the Internet
blogzilla
 
Draft data protection regn 2012
Draft data protection regn 2012Draft data protection regn 2012
Draft data protection regn 2012
lilianedwards
 
EU Competencies in Respect of Media Pluralism and Media Freedom: Legal Overview
EU Competencies in Respect of Media Pluralism and Media Freedom: Legal OverviewEU Competencies in Respect of Media Pluralism and Media Freedom: Legal Overview
EU Competencies in Respect of Media Pluralism and Media Freedom: Legal Overview
Centre for Media Pluralism and Media Freedom
 
Tunisia Internet Governance
Tunisia Internet GovernanceTunisia Internet Governance
Tunisia Internet Governancerafikd
 
Internet freedom: a comparative assessment
Internet freedom: a comparative assessmentInternet freedom: a comparative assessment
Internet freedom: a comparative assessment
blogzilla
 
Policy Brief on Europe's "Right to be Forgotten"
Policy Brief on Europe's "Right to be Forgotten"Policy Brief on Europe's "Right to be Forgotten"
Policy Brief on Europe's "Right to be Forgotten"
William Nyikuli
 
IALS Freedom of Expression and the Internet
IALS Freedom of Expression and the Internet IALS Freedom of Expression and the Internet
IALS Freedom of Expression and the Internet
Emily Allbon
 
110 koenig
110 koenig110 koenig
110 koenig
Thierry Gaudin
 
Aie presentation
Aie presentation Aie presentation
Aie presentation
The Environmental Pillar
 
[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...
[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...
[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...
CODE BLUE
 
Privacy impact assessment
Privacy impact assessmentPrivacy impact assessment
Privacy impact assessmentSpringer
 
Governing Communications Online - German Perspective
Governing Communications Online - German PerspectiveGoverning Communications Online - German Perspective
Governing Communications Online - German Perspective
Centre for Media Pluralism and Media Freedom
 
What is opendata
What is opendata What is opendata
What is opendata
Lorenzo Benussi
 

Similar to Navigating the privacy sea christian runte (20)

Doc Management European Commission
Doc Management European CommissionDoc Management European Commission
Doc Management European Commission
 
Marsden net neutrality in the European Parliament
Marsden net neutrality in the European ParliamentMarsden net neutrality in the European Parliament
Marsden net neutrality in the European Parliament
 
Data protection
Data protectionData protection
Data protection
 
#Openlaws #Bileta15
#Openlaws #Bileta15#Openlaws #Bileta15
#Openlaws #Bileta15
 
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
 
20150630_D6 1_Legal and EthicalFrameworkand Privacy and Security Principles
20150630_D6 1_Legal and EthicalFrameworkand Privacy and Security Principles20150630_D6 1_Legal and EthicalFrameworkand Privacy and Security Principles
20150630_D6 1_Legal and EthicalFrameworkand Privacy and Security Principles
 
Monitoring and controlling the Internet
Monitoring and controlling the InternetMonitoring and controlling the Internet
Monitoring and controlling the Internet
 
Draft data protection regn 2012
Draft data protection regn 2012Draft data protection regn 2012
Draft data protection regn 2012
 
EU Competencies in Respect of Media Pluralism and Media Freedom: Legal Overview
EU Competencies in Respect of Media Pluralism and Media Freedom: Legal OverviewEU Competencies in Respect of Media Pluralism and Media Freedom: Legal Overview
EU Competencies in Respect of Media Pluralism and Media Freedom: Legal Overview
 
Tunisia Internet Governance
Tunisia Internet GovernanceTunisia Internet Governance
Tunisia Internet Governance
 
Internet freedom: a comparative assessment
Internet freedom: a comparative assessmentInternet freedom: a comparative assessment
Internet freedom: a comparative assessment
 
1st draft
1st draft1st draft
1st draft
 
Policy Brief on Europe's "Right to be Forgotten"
Policy Brief on Europe's "Right to be Forgotten"Policy Brief on Europe's "Right to be Forgotten"
Policy Brief on Europe's "Right to be Forgotten"
 
IALS Freedom of Expression and the Internet
IALS Freedom of Expression and the Internet IALS Freedom of Expression and the Internet
IALS Freedom of Expression and the Internet
 
110 koenig
110 koenig110 koenig
110 koenig
 
Aie presentation
Aie presentation Aie presentation
Aie presentation
 
[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...
[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...
[CB20] Law Enforcement Access to Transborder Data: Global Reach of the Propos...
 
Privacy impact assessment
Privacy impact assessmentPrivacy impact assessment
Privacy impact assessment
 
Governing Communications Online - German Perspective
Governing Communications Online - German PerspectiveGoverning Communications Online - German Perspective
Governing Communications Online - German Perspective
 
What is opendata
What is opendata What is opendata
What is opendata
 

More from IFCLA - International Federation of Computer Law Associations (6)

Agile project case study by a satisfied customer jora gill
Agile project case study by a satisfied customer   jora gillAgile project case study by a satisfied customer   jora gill
Agile project case study by a satisfied customer jora gill
 
Transfer of employees in secondary outsourcing timo karsten
Transfer of employees in secondary outsourcing   timo karstenTransfer of employees in secondary outsourcing   timo karsten
Transfer of employees in secondary outsourcing timo karsten
 
Managing risks when offshoring services including a practical indian experie...
Managing risks when offshoring services  including a practical indian experie...Managing risks when offshoring services  including a practical indian experie...
Managing risks when offshoring services including a practical indian experie...
 
Benchmark and exit clauses how to knock down the exit barriers - ulrich bäumer
Benchmark and exit clauses  how to knock down the exit barriers - ulrich bäumerBenchmark and exit clauses  how to knock down the exit barriers - ulrich bäumer
Benchmark and exit clauses how to knock down the exit barriers - ulrich bäumer
 
Legal and ip trends in standardisation marcus glader
Legal and ip trends in standardisation   marcus gladerLegal and ip trends in standardisation   marcus glader
Legal and ip trends in standardisation marcus glader
 
Software platform for converging devices dietmar tallroth
Software platform for converging devices   dietmar tallrothSoftware platform for converging devices   dietmar tallroth
Software platform for converging devices dietmar tallroth
 

Recently uploaded

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 

Recently uploaded (20)

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 

Navigating the privacy sea christian runte

  • 1. Navigating the Privacy Sea Christian M. Runte, CMS Hasche Sigle IFCLA – Helsinki, 10 June 2010
  • 2. 1. The Privacy Sea 2. How to Navigate it 2 Christian Runte | Navigating the Privacy Sea | IFCLA – Helsinki, 10 June 2010
  • 3. 3 Christian Runte | Navigating the Privacy Sea | IFCLA – Helsinki, 10 June 2010
  • 4. 4 Christian Runte | Navigating the Privacy Sea | IFCLA – Helsinki, 10 June 2010
  • 5. Why the Sea Got Rough Advanced technology (internet, increased storage capability), and increased relevance of data processing Online transactions rapidly replacing "anonymous" real transactions; online transactions require identification and thus personal data Changes in legislation (data breach notification etc.) Aftermath of 9/11, online surveillance Media coverage of data breaches and other privacy issues in the public sector (UK CD-ROMs, German tax data) and in the private sector (Facebook, Google, in Germany: Lidl, Deutsche Telekom etc.) 5 Christian Runte | Navigating the Privacy Sea | IFCLA – Helsinki, 10 June 2010
  • 6. How Fragmented is Privacy Law? EU level One general directive (95/46/EC) but numerous other regulations, directives and decisions which also contain data protection provisions Some better known: 2002/58/EC etc. Some more hidden: Regulation 80/2009 etc. Consultation process for new general directive 95/46/EC "Harmonized diversity" Implementation in member states differs, sometimes significantly Differences in processes, formalities and bureaucracy No single authority for the EU or even within some member states 6 Christian Runte | Navigating the Privacy Sea | IFCLA – Helsinki, 10 June 2010
  • 7. Regulatory Authorities Dealing with Data Protection Aspects: Germany Federal Level: 1 (+1) Länder Level: 25 1 Further Authorities for Churches, 1 Public Broadcasting, Public 1 1 Healthcare etc. 3 1 1 2 Art. 28 [1] Directive 95/46/EC: 1 2 3 1 "authorities shall act with complete independence in exercising the 1 2 2 functions…" 2 ECJ, 9 March 2010: Germany system in violation of Art. 28 [1] 7 Christian Runte | Navigating the Privacy Sea | IFCLA – Helsinki, 10 June 2010
  • 8. Everything Converging in the Cloud? "Everything is content" Convergence of technology and media delivery Convergence of substantial law? Possible but likely to be very slow Overhaul of General Directive 95/46 (e.g. data breach) Geographical convergence? Which jurisdiction applies? More jurisdictions will apply Technical innovations (in particular cloud computing) will make it more complicated to be compliant in all relevant jurisdictions 8 Christian Runte | Navigating the Privacy Sea | IFCLA – Helsinki, 10 June 2010
  • 9. Navigating it 9 Christian Runte | Navigating the Privacy Sea | IFCLA – Helsinki, 10 June 2010
  • 10. Challenges More cases will require advice for more than one jurisdiction Knowledge of the local law Contact to relevant authorities The challenge is the number of countries and authorities involved and the number of local advisor you may need Cost Consistent advice Requires management of the client and local advisors 10 Christian Runte | Navigating the Privacy Sea | IFCLA – Helsinki, 10 June 2010
  • 11. A Possible Approach Prepare your (local) memo first Managing multiple jurisdictions Do some local reconnaissance • General ressources • Websites • Online Materials Prepare questionnaire • Clearly defined questions • Provide your local answers as well Budget, no quote Direct contact between client and local counsel 11 Christian Runte | Navigating the Privacy Sea | IFCLA – Helsinki, 10 June 2010
  • 12. Après Nous le Déluge Public perception of data protection and privacy will not vanish, media will drive the process Overhaul of Directive 95/46, consultation process More convergence? It's not a breach, it's a service 12 Christian Runte | Navigating the Privacy Sea | IFCLA – Helsinki, 10 June 2010
  • 13. Last page 13 Data Breach Laws | ICAF – Berlin, 25 February 2010