Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
On Feb. 2, 2016, the U.S. Department of Commerce and European Commission unveiled a new framework for personal data transfers from European Union (EU) Member States to the U.S. The new framework ' dubbed the EU-U.S. Privacy Shield ' will replace the EU-U.S. Safe Harbor program, which was invalidated by the European Court of Justice (ECJ) in 2015. The Commission and Department of Commerce have agreed to terms in principle, but the particulars of the new framework remain under development by officials on both sides of the Atlantic and will require formal approval by the European Commission.
To be sure, the raising of the Privacy Shield will be no small feat, but it does hold the promise of providing legal certainty for companies engaged in transatlantic data transfers.
Background
The EU Data Protection Directive prohibits transfers of personal data from the EU to a non-EU country, unless the receiving country can assure an adequate level of protection of the data under domestic law or through international commitments. The determination of an “adequate level” is the crux of the issue. Given that data protection laws (and cultural expectations) have developed in differing ways in the EU and U.S., the Department of Commerce, in consultation with the Commission, developed the Safe Harbor as a framework for assuring adequacy. In July 2000, the Commission deemed the Safe Harbor to provide adequate protections to support the transfer of personal data of EU citizens to the U.S. Over the course of time, more than 4,000 companies self-certified to compliance with the Safe Harbor requirements.
On Oct. 6, 2015, the EU high court invalidated the Commission's adequacy decision in support of the Safe Harbor. See, Maximillian Schrems v. Data Prot. Comm'r, ECLI:EU:C:2015:650, CJEU 6 Oct. 2015, Case C-362/14. The court's decision has meant that data transfers from the EU to the U.S. are prohibited if based on the Safe Harbor. Given the widespread reliance on the Safe Harbor, the EU Data Protection Authorities (DPAs) agreed to a three-month grace period from enforcement, which ended Jan. 31, 2016, to allow policymakers time to agree on a replacement. See, “Statement of the Article 29 Working Party,” on the implementation of the judgment of the Court of Justice of the European Union of Oct. 6, 2015 in the Maximilian Schrems v Data Protection Commissioner case (C-362-14) (Oct. 16, 2015).
EU-U.S. Privacy Shield Framework
On February 2, just two days after the grace period ended, the Commission and Department of Commerce announced their agreement on the new Privacy Shield. See, Press Release, “European Comm'n, EU Commission and United States agree on new framework for transatlantic data flows: EU-US Privacy Shield” (Feb. 2, 2016); “ Statement from U.S. Secretary of Commerce Penny Pritzker on EU-U.S. Privacy Shield” (Feb. 2, 2016). The agreement is based on the following key principles:
European Commission Adequacy Decision Process
The Commission is in the process of preparing an adequacy decision in support of the Privacy Shield. There is, however, much work to be completed between now and the Commission's adoption of the decision. The adequacy decision will presumably be informed by requirements and processes being developed by the U.S. as part of its commitments to the Privacy Shield.
On the EU side, final adoption of Commission adequacy decisions must pass through several levels of approval. Of particular importance to this process is receipt of a favorable opinion from the Commission's independent advisory group, the Article 29 Working Party (WP29), which is comprised of Member State DPA representatives and the European Data Protection Supervisor.
The WP29 has asked to receive the proposed adequacy decision by the end of February. See, “Statement of the Article 29 Working Party on the Consequences of the Schrems Judgment,” (Feb. 3, 2016). The group has stated that it will review the adequacy of the Privacy Shield in light of ongoing concerns relating U.S. intelligence activities. These activities have been the cause of significant concern and consternation on the part of the European community and, therefore, have been at the forefront of the negotiations. The WP29 has expressly indicated that it will assess the Privacy Shield framework against the following four fundamental guarantees regarding intelligence surveillance:
A favorable review by the WP29 would be significant and set the stage for Member State endorsement. Notwithstanding an approval by the WP29, or even adoption by the Commission, the European Parliament and Council could request that the Commission amend or withdraw its adequacy decision. Additionally, commentators have speculated as to the likelihood of legal challenge through the European courts regarding the adequacy of the Privacy Shield.
What To Do While We Wait
Now that agreement has been reached on the Privacy Shield, stakeholders are eagerly awaiting the details on how it will be implemented. While the particulars are being finalized, companies should consider engaging in advance work to prepare for next steps. For instance, companies should use this time to:
Last, but not least, companies should stay tuned as details emerge regarding the more “robust obligations” that will be required of them to certify compliance with the new Privacy Shield and to developments from the Commission's approval process for the adequacy decision.
Alisa L. Chestler, CIPP-US, is a shareholder and Certified Information Privacy Professional (CIPP) with Baker Donelson's Washington, DC, office, and chair of the firm's Privacy and Information Security Team. She regularly assists clients in identifying, evaluating and managing risks associated with privacy and information security practices, and has significant experience working with companies to develop comprehensive programs for these areas. She may be reached at 202-508-3475 or'[email protected].'Tracy E. Weir'is a shareholder with Baker Donelson in Washington, DC, where she counsels clients on data privacy and security matters that arise from federal and state laws. She has experience analyzing transactions and business relationships, developing policies and procedures, and advising clients on data breaches and notification. She may be reached at 202-508-3481 or'[email protected].
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN ENTERTAINMENT LAW.
Already a have an account? Sign In Now Log In Now
For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473
During the COVID-19 pandemic, some tenants were able to negotiate termination agreements with their landlords. But even though a landlord may agree to terminate a lease to regain control of a defaulting tenant's space without costly and lengthy litigation, typically a defaulting tenant that otherwise has no contractual right to terminate its lease will be in a much weaker bargaining position with respect to the conditions for termination.
What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.
The International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.
As the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.
Practical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.