SlideShare a Scribd company logo
Professional Training in Milan (Italy)
4 June 2014
Workplace Privacy (excerpt)
Dr. Andrea Maggipinto, ICT Lawyer
Bar Association of Milan
Employer’s Control
Avv. Andrea Maggipinto
Employees are entitled to a reasonable protection of their
privacy in personal and professional relationships alike
(see Italian Constitution, and the Italian Data
Protection Code: the so called “Privacy Code” - D.Lgs.
169/2003)
ensuring that data subjects' rights, fundamental
freedoms and dignity are protected also in the
workplace
limitations under local laws (Italy)
Binding principles
Avv. Andrea Maggipinto
The processing must be compliant with data protection
safeguards in pursuance of the following binding
principles:
(i) necessity: information systems and software must be
configured by minimizing use of personal and/or
identification data in view of the purposes to be achieved
(article 3 of the Privacy Code);
(ii) fairness: the fundamental features of the processing
must be disclosed to employees (article 11 of the Privacy
Code), so they can be aware and fully informed thereof;
(iii) the processing must be carried out for specific, explicit
and legitimate purposes in compliance with relevance
and non-excessiveness principles (article 11 of the Privacy
Code).
Employer is required to
Avv. Andrea Maggipinto
always provide clear-cut, detailed information on the
appropriate mechanisms of use applying to the
equipment that is made available as well as on whether,
to what extent, and how controls are carried out (it is
appropriate to issue internal guidelines);
always inform employees in advance and
unambiguously about any processing operations that
may concern them in connection with possible controls,
according to article 13 of the Privacy Code (the so
called “Information Notice”).
Hardware and Software
Avv. Andrea Maggipinto
It is not permitted to process data by means
of hardware and software systems that are
intended to carry out distance controls (at
times in a very detailed manner) in order to
keep track of employees' activities.
Compliance
Employers may lawfully avail themselves of systems that
allow distance controls to be carried out indirectly (so
called “unintentional controls”) in compliance with article
4 of the Act no. 300/1970 (so called “Workers' Statute”).
In fact, data protection Italian legislation must be applied
jointly with sector-related rules concerning labor law (in
particular, article 4 of the Workers' Statute regarding the
so called “distance monitoring”).
Avv. Andrea Maggipinto
Distance monitoring
The Italian Data Protection Authority established that
equipment intended for distance monitoring is
forbidden, for instance:
the systematic scanning and recording of email
messages and/or the respective external data apart from
what is technically necessary to provide email services;
the reproduction and systematic storage of the web
pages visited by employees;
keystroke pattern analysis and recording devices;
the hidden monitoring/analysis of laptops entrusted to
individual employees. Avv. Andrea Maggipinto
Unintentional control
The employer must respect his employees' dignity and
freedom with particular regard to the prohibition
against deploying "equipment for the purpose of controlling
employees' activities from a distance" – which
unquestionably includes hardware and software
equipment intended to control the users of electronic
communications systems.
However, if potential criminal activities were detected
through indirect and “unintentional controls”, this
information could be used against the employee
according to local laws.
Avv. Andrea Maggipinto
Lawfully Data Processing
Employers may lawfully process personal, non-sensitive
data if the following applies:
(i) if the circumstances are such as to warrant the
legitimate establishment of a judicial claim;
(ii) if the data subject has given his/her free consent
thereto in a valid manner;
(iii) without the data subject's consent only in pursuance
of a decision that establishes a legitimate interest in
processing the data in question as per the legislation
concerning the so-called balancing of interests (see
article 24).
Avv. Andrea Maggipinto
Employees’ e-mail
There are restrictions for the Company viewing and
accessing of employee email.
As regards the use of emails in the employment context
and by having regard to the outward appearance of
email addresses in the individual cases, in the absence of
specific policies, the employee may legitimately expect
certain types of communication to be kept confidential.
So it is strongly recommended to establish company
policy and procedure to control employee emails.
Avv. Andrea Maggipinto
Dr. Andrea Maggipinto, ICT Lawyer
andrea.maggipinto@gmail.com
W W W . M A G G I P I N T O . O R G
Via Caradosso n. 7
20123 Milan (Italy)
T: +39 02 48102313
F: +39 02 48102321
it.linkedin.com/in/
andreamaggipinto
@amaggipinto

More Related Content

What's hot

Intersection of video analytics and EU legislation - Ida Koskinen
Intersection of video analytics and EU legislation - Ida KoskinenIntersection of video analytics and EU legislation - Ida Koskinen
Intersection of video analytics and EU legislation - Ida Koskinen
Mindtrek
 
Star II sme hotline 21.01.20
Star II sme hotline 21.01.20Star II sme hotline 21.01.20
Star II sme hotline 21.01.20
Trilateral Research
 
Personal Data Protection Bill 2018
Personal Data Protection Bill 2018Personal Data Protection Bill 2018
Personal Data Protection Bill 2018
Nanda Mohan Shenoy
 
Cyber Law
Cyber LawCyber Law
Cyber Law
Sushma Habib
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
Extentia Information Technology
 
Data Protection & GDPR Health Check Service Overview
Data Protection & GDPR Health Check Service OverviewData Protection & GDPR Health Check Service Overview
Data Protection & GDPR Health Check Service Overview
DVV Solutions Third Party Risk Management
 
HOW TO PROCESS DATA IN VARIOUS GEO'S A COMPARATIVE ANALYSIS BY SANJEEV SINGH...
HOW TO PROCESS DATA IN VARIOUS GEO'S A  COMPARATIVE ANALYSIS BY SANJEEV SINGH...HOW TO PROCESS DATA IN VARIOUS GEO'S A  COMPARATIVE ANALYSIS BY SANJEEV SINGH...
HOW TO PROCESS DATA IN VARIOUS GEO'S A COMPARATIVE ANALYSIS BY SANJEEV SINGH...
Sanjeev Bharwan
 

What's hot (8)

Intersection of video analytics and EU legislation - Ida Koskinen
Intersection of video analytics and EU legislation - Ida KoskinenIntersection of video analytics and EU legislation - Ida Koskinen
Intersection of video analytics and EU legislation - Ida Koskinen
 
Star II sme hotline 21.01.20
Star II sme hotline 21.01.20Star II sme hotline 21.01.20
Star II sme hotline 21.01.20
 
Personal Data Protection Bill 2018
Personal Data Protection Bill 2018Personal Data Protection Bill 2018
Personal Data Protection Bill 2018
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Data Protection & GDPR Health Check Service Overview
Data Protection & GDPR Health Check Service OverviewData Protection & GDPR Health Check Service Overview
Data Protection & GDPR Health Check Service Overview
 
HOW TO PROCESS DATA IN VARIOUS GEO'S A COMPARATIVE ANALYSIS BY SANJEEV SINGH...
HOW TO PROCESS DATA IN VARIOUS GEO'S A  COMPARATIVE ANALYSIS BY SANJEEV SINGH...HOW TO PROCESS DATA IN VARIOUS GEO'S A  COMPARATIVE ANALYSIS BY SANJEEV SINGH...
HOW TO PROCESS DATA IN VARIOUS GEO'S A COMPARATIVE ANALYSIS BY SANJEEV SINGH...
 

Similar to Workplace Privacy (excerpt)

Employee Monitoring and Privacy.pdf
Employee Monitoring and Privacy.pdfEmployee Monitoring and Privacy.pdf
Employee Monitoring and Privacy.pdf
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
 
The Privacy Advantage 2016 - Wojciech Wiewiorowski
The Privacy Advantage 2016 - Wojciech WiewiorowskiThe Privacy Advantage 2016 - Wojciech Wiewiorowski
The Privacy Advantage 2016 - Wojciech Wiewiorowski
Krowdthink
 
General data protection regulation - European union
General data protection regulation  - European unionGeneral data protection regulation  - European union
General data protection regulation - European union
Rohana K Amarakoon
 
General Data Protection Regulations (GDPR) Summary
General Data Protection Regulations (GDPR) Summary General Data Protection Regulations (GDPR) Summary
General Data Protection Regulations (GDPR) Summary
Compliance3
 
THE BRAZILIAN LAW ON PERSONAL DATA PROTECTION
THE BRAZILIAN LAW ON PERSONAL DATA PROTECTIONTHE BRAZILIAN LAW ON PERSONAL DATA PROTECTION
THE BRAZILIAN LAW ON PERSONAL DATA PROTECTION
IJNSA Journal
 
AI&IP CEIPI Training, Module 9
AI&IP CEIPI Training, Module 9AI&IP CEIPI Training, Module 9
AI&IP CEIPI Training, Module 9
Giancarlo F. Frosio
 
3.6 legislation and regulations
3.6 legislation and regulations3.6 legislation and regulations
3.6 legislation and regulationsmrmwood
 
Principles of mobile privacy
Principles of mobile privacyPrinciples of mobile privacy
Principles of mobile privacy
Euphodia Maluleke
 
Data Protection Guide – What are your rights as a citizen?
Data Protection Guide – What are your rights as a citizen?Data Protection Guide – What are your rights as a citizen?
Data Protection Guide – What are your rights as a citizen?
Edouard Nguyen
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_indiaAltacit Global
 
Digital evidence
Digital evidenceDigital evidence
Digital evidence
yourlegalconsultants
 
Quick guide gdpr
Quick guide gdprQuick guide gdpr
Quick guide gdpr
Miguel Mello
 
An Indian Outline on Database Protection
An Indian Outline on Database ProtectionAn Indian Outline on Database Protection
An Indian Outline on Database Protection
Singhania2015
 
Privacy by design for peerlyst meetup
Privacy by design for peerlyst meetupPrivacy by design for peerlyst meetup
Privacy by design for peerlyst meetup
Ishay Tentser
 
"Legal tips and compliance requirements" - Anastasia Botsi, ICT Legal
"Legal tips and compliance requirements" - Anastasia Botsi, ICT Legal"Legal tips and compliance requirements" - Anastasia Botsi, ICT Legal
"Legal tips and compliance requirements" - Anastasia Botsi, ICT Legal
Cyber Watching
 
Curia case c‑131-12 gonzalez versus google
Curia   case c‑131-12 gonzalez versus googleCuria   case c‑131-12 gonzalez versus google
Curia case c‑131-12 gonzalez versus googleJan Husar
 
EU General Data Protection Regulation (GDPR)
EU General Data Protection Regulation (GDPR)EU General Data Protection Regulation (GDPR)
EU General Data Protection Regulation (GDPR)
Enrico Gianluca Caiani
 
Data Security Law and Management.pdf
Data Security Law and Management.pdfData Security Law and Management.pdf
Data Security Law and Management.pdf
MeshalALshammari12
 
Startups - data protection
Startups  - data protectionStartups  - data protection
Startups - data protection
Mathew Chacko
 

Similar to Workplace Privacy (excerpt) (20)

Employee Monitoring and Privacy.pdf
Employee Monitoring and Privacy.pdfEmployee Monitoring and Privacy.pdf
Employee Monitoring and Privacy.pdf
 
The Privacy Advantage 2016 - Wojciech Wiewiorowski
The Privacy Advantage 2016 - Wojciech WiewiorowskiThe Privacy Advantage 2016 - Wojciech Wiewiorowski
The Privacy Advantage 2016 - Wojciech Wiewiorowski
 
General data protection regulation - European union
General data protection regulation  - European unionGeneral data protection regulation  - European union
General data protection regulation - European union
 
General Data Protection Regulations (GDPR) Summary
General Data Protection Regulations (GDPR) Summary General Data Protection Regulations (GDPR) Summary
General Data Protection Regulations (GDPR) Summary
 
THE BRAZILIAN LAW ON PERSONAL DATA PROTECTION
THE BRAZILIAN LAW ON PERSONAL DATA PROTECTIONTHE BRAZILIAN LAW ON PERSONAL DATA PROTECTION
THE BRAZILIAN LAW ON PERSONAL DATA PROTECTION
 
AI&IP CEIPI Training, Module 9
AI&IP CEIPI Training, Module 9AI&IP CEIPI Training, Module 9
AI&IP CEIPI Training, Module 9
 
3.6 legislation and regulations
3.6 legislation and regulations3.6 legislation and regulations
3.6 legislation and regulations
 
Principles of mobile privacy
Principles of mobile privacyPrinciples of mobile privacy
Principles of mobile privacy
 
Data Protection Guide – What are your rights as a citizen?
Data Protection Guide – What are your rights as a citizen?Data Protection Guide – What are your rights as a citizen?
Data Protection Guide – What are your rights as a citizen?
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_india
 
Digital evidence
Digital evidenceDigital evidence
Digital evidence
 
Quick guide gdpr
Quick guide gdprQuick guide gdpr
Quick guide gdpr
 
An Indian Outline on Database Protection
An Indian Outline on Database ProtectionAn Indian Outline on Database Protection
An Indian Outline on Database Protection
 
Privacy by design for peerlyst meetup
Privacy by design for peerlyst meetupPrivacy by design for peerlyst meetup
Privacy by design for peerlyst meetup
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
"Legal tips and compliance requirements" - Anastasia Botsi, ICT Legal
"Legal tips and compliance requirements" - Anastasia Botsi, ICT Legal"Legal tips and compliance requirements" - Anastasia Botsi, ICT Legal
"Legal tips and compliance requirements" - Anastasia Botsi, ICT Legal
 
Curia case c‑131-12 gonzalez versus google
Curia   case c‑131-12 gonzalez versus googleCuria   case c‑131-12 gonzalez versus google
Curia case c‑131-12 gonzalez versus google
 
EU General Data Protection Regulation (GDPR)
EU General Data Protection Regulation (GDPR)EU General Data Protection Regulation (GDPR)
EU General Data Protection Regulation (GDPR)
 
Data Security Law and Management.pdf
Data Security Law and Management.pdfData Security Law and Management.pdf
Data Security Law and Management.pdf
 
Startups - data protection
Startups  - data protectionStartups  - data protection
Startups - data protection
 

More from Andrea Maggipinto [+1k]

Cyber security ai tempi delle reti OT: dalla data protection alla data defence.
Cyber security ai tempi delle reti OT: dalla data protection alla data defence.Cyber security ai tempi delle reti OT: dalla data protection alla data defence.
Cyber security ai tempi delle reti OT: dalla data protection alla data defence.
Andrea Maggipinto [+1k]
 
GDPR: scenari attuali e futuribili
GDPR: scenari attuali e futuribiliGDPR: scenari attuali e futuribili
GDPR: scenari attuali e futuribili
Andrea Maggipinto [+1k]
 
Tutela e sicurezza digitale delle aziende ai tempi del GDPR (avv. Maggipinto)
Tutela e sicurezza digitale delle aziende ai tempi del GDPR (avv. Maggipinto)Tutela e sicurezza digitale delle aziende ai tempi del GDPR (avv. Maggipinto)
Tutela e sicurezza digitale delle aziende ai tempi del GDPR (avv. Maggipinto)
Andrea Maggipinto [+1k]
 
L'industria nell'occhio del ciclone (digitale), tra attacchi cyber ed esigenz...
L'industria nell'occhio del ciclone (digitale), tra attacchi cyber ed esigenz...L'industria nell'occhio del ciclone (digitale), tra attacchi cyber ed esigenz...
L'industria nell'occhio del ciclone (digitale), tra attacchi cyber ed esigenz...
Andrea Maggipinto [+1k]
 
intervento CONFAPI 27.10.2016 - Avv.Maggipinto (estratto)
intervento CONFAPI 27.10.2016 - Avv.Maggipinto (estratto)intervento CONFAPI 27.10.2016 - Avv.Maggipinto (estratto)
intervento CONFAPI 27.10.2016 - Avv.Maggipinto (estratto)
Andrea Maggipinto [+1k]
 
Proteggere il business nell'era digitale
Proteggere il business nell'era digitaleProteggere il business nell'era digitale
Proteggere il business nell'era digitale
Andrea Maggipinto [+1k]
 
Slide seminario avvocato Maggipinto (privacy by design) estratto 10.3.2016
Slide seminario avvocato Maggipinto (privacy by design) estratto 10.3.2016Slide seminario avvocato Maggipinto (privacy by design) estratto 10.3.2016
Slide seminario avvocato Maggipinto (privacy by design) estratto 10.3.2016
Andrea Maggipinto [+1k]
 
Tecnologia e Diritto nella Sharing Economy (avv. Maggipinto)
Tecnologia e Diritto nella Sharing Economy (avv. Maggipinto)Tecnologia e Diritto nella Sharing Economy (avv. Maggipinto)
Tecnologia e Diritto nella Sharing Economy (avv. Maggipinto)
Andrea Maggipinto [+1k]
 
Protezione asset aziendali (Avv. Maggipinto) (estratto prima parte)
Protezione asset aziendali (Avv. Maggipinto) (estratto prima parte)Protezione asset aziendali (Avv. Maggipinto) (estratto prima parte)
Protezione asset aziendali (Avv. Maggipinto) (estratto prima parte)
Andrea Maggipinto [+1k]
 
Opere dell’architettura e progetti di ingegneria
Opere dell’architettura e progetti di ingegneriaOpere dell’architettura e progetti di ingegneria
Opere dell’architettura e progetti di ingegneria
Andrea Maggipinto [+1k]
 
Negoziare diritti e responsabilità nei contratti di sviluppo e fornitura di p...
Negoziare diritti e responsabilità nei contratti di sviluppo e fornitura di p...Negoziare diritti e responsabilità nei contratti di sviluppo e fornitura di p...
Negoziare diritti e responsabilità nei contratti di sviluppo e fornitura di p...
Andrea Maggipinto [+1k]
 
EU Trademarks (excerpt)
EU Trademarks (excerpt)EU Trademarks (excerpt)
EU Trademarks (excerpt)
Andrea Maggipinto [+1k]
 
Privacy e riservatezza nella consulenza tecnica (estratto)
Privacy e riservatezza nella consulenza tecnica (estratto)Privacy e riservatezza nella consulenza tecnica (estratto)
Privacy e riservatezza nella consulenza tecnica (estratto)
Andrea Maggipinto [+1k]
 
L'innovazione nei territori. Tecnologie per il cambiamento.
L'innovazione nei territori. Tecnologie per il cambiamento.L'innovazione nei territori. Tecnologie per il cambiamento.
L'innovazione nei territori. Tecnologie per il cambiamento.
Andrea Maggipinto [+1k]
 
Privacy e volontariato: confini normativi e opportunità
Privacy e volontariato: confini normativi e opportunitàPrivacy e volontariato: confini normativi e opportunità
Privacy e volontariato: confini normativi e opportunità
Andrea Maggipinto [+1k]
 
CSIG protezione delle informazioni aziendali [I parte]
CSIG protezione delle informazioni aziendali [I parte]CSIG protezione delle informazioni aziendali [I parte]
CSIG protezione delle informazioni aziendali [I parte]
Andrea Maggipinto [+1k]
 
CSIG commercio elettronico [I parte]
CSIG commercio elettronico [I parte]CSIG commercio elettronico [I parte]
CSIG commercio elettronico [I parte]
Andrea Maggipinto [+1k]
 
La responsabilità delle imprese e degli enti per violazione della privacy e d...
La responsabilità delle imprese e degli enti per violazione della privacy e d...La responsabilità delle imprese e degli enti per violazione della privacy e d...
La responsabilità delle imprese e degli enti per violazione della privacy e d...
Andrea Maggipinto [+1k]
 
Privacy by design: le nuove norme europee che rivoluzioneranno (anche in Ital...
Privacy by design: le nuove norme europee che rivoluzioneranno (anche in Ital...Privacy by design: le nuove norme europee che rivoluzioneranno (anche in Ital...
Privacy by design: le nuove norme europee che rivoluzioneranno (anche in Ital...
Andrea Maggipinto [+1k]
 

More from Andrea Maggipinto [+1k] (19)

Cyber security ai tempi delle reti OT: dalla data protection alla data defence.
Cyber security ai tempi delle reti OT: dalla data protection alla data defence.Cyber security ai tempi delle reti OT: dalla data protection alla data defence.
Cyber security ai tempi delle reti OT: dalla data protection alla data defence.
 
GDPR: scenari attuali e futuribili
GDPR: scenari attuali e futuribiliGDPR: scenari attuali e futuribili
GDPR: scenari attuali e futuribili
 
Tutela e sicurezza digitale delle aziende ai tempi del GDPR (avv. Maggipinto)
Tutela e sicurezza digitale delle aziende ai tempi del GDPR (avv. Maggipinto)Tutela e sicurezza digitale delle aziende ai tempi del GDPR (avv. Maggipinto)
Tutela e sicurezza digitale delle aziende ai tempi del GDPR (avv. Maggipinto)
 
L'industria nell'occhio del ciclone (digitale), tra attacchi cyber ed esigenz...
L'industria nell'occhio del ciclone (digitale), tra attacchi cyber ed esigenz...L'industria nell'occhio del ciclone (digitale), tra attacchi cyber ed esigenz...
L'industria nell'occhio del ciclone (digitale), tra attacchi cyber ed esigenz...
 
intervento CONFAPI 27.10.2016 - Avv.Maggipinto (estratto)
intervento CONFAPI 27.10.2016 - Avv.Maggipinto (estratto)intervento CONFAPI 27.10.2016 - Avv.Maggipinto (estratto)
intervento CONFAPI 27.10.2016 - Avv.Maggipinto (estratto)
 
Proteggere il business nell'era digitale
Proteggere il business nell'era digitaleProteggere il business nell'era digitale
Proteggere il business nell'era digitale
 
Slide seminario avvocato Maggipinto (privacy by design) estratto 10.3.2016
Slide seminario avvocato Maggipinto (privacy by design) estratto 10.3.2016Slide seminario avvocato Maggipinto (privacy by design) estratto 10.3.2016
Slide seminario avvocato Maggipinto (privacy by design) estratto 10.3.2016
 
Tecnologia e Diritto nella Sharing Economy (avv. Maggipinto)
Tecnologia e Diritto nella Sharing Economy (avv. Maggipinto)Tecnologia e Diritto nella Sharing Economy (avv. Maggipinto)
Tecnologia e Diritto nella Sharing Economy (avv. Maggipinto)
 
Protezione asset aziendali (Avv. Maggipinto) (estratto prima parte)
Protezione asset aziendali (Avv. Maggipinto) (estratto prima parte)Protezione asset aziendali (Avv. Maggipinto) (estratto prima parte)
Protezione asset aziendali (Avv. Maggipinto) (estratto prima parte)
 
Opere dell’architettura e progetti di ingegneria
Opere dell’architettura e progetti di ingegneriaOpere dell’architettura e progetti di ingegneria
Opere dell’architettura e progetti di ingegneria
 
Negoziare diritti e responsabilità nei contratti di sviluppo e fornitura di p...
Negoziare diritti e responsabilità nei contratti di sviluppo e fornitura di p...Negoziare diritti e responsabilità nei contratti di sviluppo e fornitura di p...
Negoziare diritti e responsabilità nei contratti di sviluppo e fornitura di p...
 
EU Trademarks (excerpt)
EU Trademarks (excerpt)EU Trademarks (excerpt)
EU Trademarks (excerpt)
 
Privacy e riservatezza nella consulenza tecnica (estratto)
Privacy e riservatezza nella consulenza tecnica (estratto)Privacy e riservatezza nella consulenza tecnica (estratto)
Privacy e riservatezza nella consulenza tecnica (estratto)
 
L'innovazione nei territori. Tecnologie per il cambiamento.
L'innovazione nei territori. Tecnologie per il cambiamento.L'innovazione nei territori. Tecnologie per il cambiamento.
L'innovazione nei territori. Tecnologie per il cambiamento.
 
Privacy e volontariato: confini normativi e opportunità
Privacy e volontariato: confini normativi e opportunitàPrivacy e volontariato: confini normativi e opportunità
Privacy e volontariato: confini normativi e opportunità
 
CSIG protezione delle informazioni aziendali [I parte]
CSIG protezione delle informazioni aziendali [I parte]CSIG protezione delle informazioni aziendali [I parte]
CSIG protezione delle informazioni aziendali [I parte]
 
CSIG commercio elettronico [I parte]
CSIG commercio elettronico [I parte]CSIG commercio elettronico [I parte]
CSIG commercio elettronico [I parte]
 
La responsabilità delle imprese e degli enti per violazione della privacy e d...
La responsabilità delle imprese e degli enti per violazione della privacy e d...La responsabilità delle imprese e degli enti per violazione della privacy e d...
La responsabilità delle imprese e degli enti per violazione della privacy e d...
 
Privacy by design: le nuove norme europee che rivoluzioneranno (anche in Ital...
Privacy by design: le nuove norme europee che rivoluzioneranno (anche in Ital...Privacy by design: le nuove norme europee che rivoluzioneranno (anche in Ital...
Privacy by design: le nuove norme europee che rivoluzioneranno (anche in Ital...
 

Recently uploaded

XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
bhavenpr
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
9ib5wiwt
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
ShivkumarIyer18
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
9ib5wiwt
 
new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.
niputusriwidiasih
 
Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
Finlaw Consultancy Pvt Ltd
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
Abdul-Hakim Shabazz
 
WINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of DissolutionWINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of Dissolution
KHURRAMWALI
 
ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
46adnanshahzad
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
BridgeWest.eu
 
Roles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John CavittRoles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John Cavitt
johncavitthouston
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
anjalidixit21
 
Agrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quizAgrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quiz
gaelcabigunda
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
Daffodil International University
 
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselMilitary Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Thomas (Tom) Jasper
 
The Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptxThe Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptx
nehatalele22st
 
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
Dr. Oliver Massmann
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
Trademark Quick
 
Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
ssuser0576e4
 
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
o6ov5dqmf
 

Recently uploaded (20)

XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
 
new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.
 
Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
 
WINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of DissolutionWINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of Dissolution
 
ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
 
Roles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John CavittRoles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John Cavitt
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
 
Agrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quizAgrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quiz
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
 
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselMilitary Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
 
The Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptxThe Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptx
 
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
 
Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
 
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
 

Workplace Privacy (excerpt)

  • 1. Professional Training in Milan (Italy) 4 June 2014 Workplace Privacy (excerpt) Dr. Andrea Maggipinto, ICT Lawyer Bar Association of Milan
  • 2. Employer’s Control Avv. Andrea Maggipinto Employees are entitled to a reasonable protection of their privacy in personal and professional relationships alike (see Italian Constitution, and the Italian Data Protection Code: the so called “Privacy Code” - D.Lgs. 169/2003) ensuring that data subjects' rights, fundamental freedoms and dignity are protected also in the workplace limitations under local laws (Italy)
  • 3. Binding principles Avv. Andrea Maggipinto The processing must be compliant with data protection safeguards in pursuance of the following binding principles: (i) necessity: information systems and software must be configured by minimizing use of personal and/or identification data in view of the purposes to be achieved (article 3 of the Privacy Code); (ii) fairness: the fundamental features of the processing must be disclosed to employees (article 11 of the Privacy Code), so they can be aware and fully informed thereof; (iii) the processing must be carried out for specific, explicit and legitimate purposes in compliance with relevance and non-excessiveness principles (article 11 of the Privacy Code).
  • 4. Employer is required to Avv. Andrea Maggipinto always provide clear-cut, detailed information on the appropriate mechanisms of use applying to the equipment that is made available as well as on whether, to what extent, and how controls are carried out (it is appropriate to issue internal guidelines); always inform employees in advance and unambiguously about any processing operations that may concern them in connection with possible controls, according to article 13 of the Privacy Code (the so called “Information Notice”).
  • 5. Hardware and Software Avv. Andrea Maggipinto It is not permitted to process data by means of hardware and software systems that are intended to carry out distance controls (at times in a very detailed manner) in order to keep track of employees' activities.
  • 6. Compliance Employers may lawfully avail themselves of systems that allow distance controls to be carried out indirectly (so called “unintentional controls”) in compliance with article 4 of the Act no. 300/1970 (so called “Workers' Statute”). In fact, data protection Italian legislation must be applied jointly with sector-related rules concerning labor law (in particular, article 4 of the Workers' Statute regarding the so called “distance monitoring”). Avv. Andrea Maggipinto
  • 7. Distance monitoring The Italian Data Protection Authority established that equipment intended for distance monitoring is forbidden, for instance: the systematic scanning and recording of email messages and/or the respective external data apart from what is technically necessary to provide email services; the reproduction and systematic storage of the web pages visited by employees; keystroke pattern analysis and recording devices; the hidden monitoring/analysis of laptops entrusted to individual employees. Avv. Andrea Maggipinto
  • 8. Unintentional control The employer must respect his employees' dignity and freedom with particular regard to the prohibition against deploying "equipment for the purpose of controlling employees' activities from a distance" – which unquestionably includes hardware and software equipment intended to control the users of electronic communications systems. However, if potential criminal activities were detected through indirect and “unintentional controls”, this information could be used against the employee according to local laws. Avv. Andrea Maggipinto
  • 9. Lawfully Data Processing Employers may lawfully process personal, non-sensitive data if the following applies: (i) if the circumstances are such as to warrant the legitimate establishment of a judicial claim; (ii) if the data subject has given his/her free consent thereto in a valid manner; (iii) without the data subject's consent only in pursuance of a decision that establishes a legitimate interest in processing the data in question as per the legislation concerning the so-called balancing of interests (see article 24). Avv. Andrea Maggipinto
  • 10. Employees’ e-mail There are restrictions for the Company viewing and accessing of employee email. As regards the use of emails in the employment context and by having regard to the outward appearance of email addresses in the individual cases, in the absence of specific policies, the employee may legitimately expect certain types of communication to be kept confidential. So it is strongly recommended to establish company policy and procedure to control employee emails. Avv. Andrea Maggipinto
  • 11. Dr. Andrea Maggipinto, ICT Lawyer andrea.maggipinto@gmail.com W W W . M A G G I P I N T O . O R G Via Caradosso n. 7 20123 Milan (Italy) T: +39 02 48102313 F: +39 02 48102321 it.linkedin.com/in/ andreamaggipinto @amaggipinto