Back

 

Print


DATA PROTECTION AND THE INTERNET


The information contained in this article is only intended to be a synopsis and relates to the legal position in the United Kingdom as at June 2001. Detailed professional advice should be taken before it is acted upon.


 

PART I

THE DATA PROTECTION ACT (THE 'DPA')

 

PART II

WEBSITES - THE NEED FOR A PRIVACY POLICY

PART III

NOTIFICATION UNDER THE DPA

PART IV

PENALTIES FOR NON COMPLIANCE WITH THE DPA

PART V

THE US AND SAFE HARBOR RULE

PART VI

SECURITY - BRITISH STANDARD ON INFORMATION SECURITY
MANAGEMENT (BS 7799)



 

PART I - THE DATA PROTECTION DPA 1998

Back

The DPA came into force in the UK on 1 March 2000 and supersedes previous legislation. The main aim of the DPA is to protect the privacy of individuals in relation to the 'processing' of their 'personal data'. Organisations must notify the Information Commissioner at the Department of Trade and Industry ("DTI"), if they are processing personal data in the capacity of a Data Controller. (See Notification below)

What is Personal Data?

The DPA defines 'personal data' as data or information relating to identifiable living individuals (including sole traders and partnerships), in or likely to come into the possession of the Data Controller. This could include any of the following: an individuals name, email or postal address, NI Number.

The DPA does not apply to details of companies although it may apply to the personal data of a contact within a company. It does apply to the personal data of employees.

If email is used as a contact facility, the data contained in the email (such as an individual's home or email address) will be caught by the DPA even if data is not 'used'. Individuals have the right to know what personal information is being collected and processed and why it is taking place.

What is Processing?

Processing is widely defined under the DPA and covers almost every activity that relates to personal data. The types of activity include, but are not limited to: obtaining, recording, holding and retrieving data. The DPA applies to data in a manual filing system in addition to computer databases.

What are Data Controllers?

Data Controller(s) is a 'person' (individual company or organisation) who determines the purposes for which and the manner in which any personal data are, or are to be processed.

The 8 key principles under the DPA

When processing personal data, the Data Controller(s) must comply with the 8 key
principles set out in the DPA. They can be summarised as follows:

1) Fairness - personal data must be processed fairly and lawfully. A key point is that the individual must have given his consent to the data being processed. In the absence of consent, data processing will only be permitted if it falls within the other restricted circumstances as provided for under the DPA;

2) Purpose - personal data must be processed only for the purpose(s) for which the data was obtained. It shall not be further processed in any way that is incompatible with that purpose;

3) Relevance - personal data must be adequate, relevant and not excessive in relation to the purpose for which they are processed;

4) Accuracy - personal data must be accurate and up to date;

5) Preservation - personal data must be held only for as long is necessary to complete the purpose for which they are processed;

6) Rights of individuals - personal data shall be processed only in accordance with the rights of the individual;

7) Security - appropriate measures must be taken to keep the personal data secure to prevent unauthorised or unlawful processing or access of personal data and to prevent damage or accidental loss (See BS 7799 below); and

8) Transfer of personal data - personal data shall not be transferred to a country or territory outside the European Economic Area ('EEA') unless that country ensures an adequate level of protection for the processing of personal data. (See the US and the Safe Harbor Rule below).

PART II WEBSITES - THE NEED FOR A PRIVACY POLICY

Back

To comply with the DPA, all websites that collect personal data about individuals should have a privacy policy. This is a policy that sets out such issues as:

- What will be done with the personal data;
- Who is collecting the personal data;
- What personal data is being collected;
- Whether the personal data will be transferred out of the EEA; and
- The identity of third parties to whom personal data may be disclosed.

The privacy policy, to be effective, must be brought to the attention of the user. It is generally thought that the safest route is to include a scroll down window containing the privacy policy or at the very least a hyperlink to the privacy policy before the individual submits their personal data. By clicking the 'submit' button, the user confirms expressly that the privacy policy has been read and that the terms of the privacy policy are accepted. The privacy policy should form part of the terms and conditions for use of the website.

In accepting the terms of the privacy policy, the user acknowledges the data controller will collect and use their personal information in the ways set out in the privacy policy. This could include transferring the information to 'trusted' third parties or outside the EEA and the use of 'cookies.' Cookies are used to track information about the user by sending to the user's computer a string of coded characters, which are then stored on the user's hard drive.

'Opting out'

The privacy policy must provide the individual with the option to 'opt out' of the processing of his personal data (for example, from direct marketing or having personal data transferred to a third party or outside the EEA).

However, it should be noted that under forthcoming European e-commerce directives, it may be a requirement to allow individuals to 'opt in' to having their
personal data processed, rather than having them opt out.

PART III NOTIFICATION UNDER THE DPA

Back

If personal data is being processed it is necessary, subject to certain exemptions, to notify the Information Commissioner at the DTI (a list of the exemptions can be found at www.dpr.gov.uk)

The information that must be notified can be summarised as follows:

1) Data Controller's name and address;
2) Purposes for which data are being held or processed;
3) Whether data are to be disclosed and if so to whom;
4) The countries outside the EEA to which data may be transferred; and
5) Information on how the data controller will keep the data secure.

The cost of notification is £35.00 per year and can be submitted at www.dpr.gov.uk
using the online form.

If the Data Controller is already registered with the DTI, it is not necessary to notify under the new system until the expiry of the Data Controller's current registration or 24 October 2001, whichever is the earlier.

PART IV PENALTIES FOR NON COMPLIANCE WITH THE DPA

Back

Offences for failing to comply with the DPA include:

Notification offences

It is a criminal offence for a Data Controller not to register with the Information Commissioner, unless covered by one of the exemptions. Fines may be imposed on offenders of up to £5,000 in the magistrates court and may be unlimited in the crown court.

Procuring and selling offences


It is a criminal offence to obtain, disclose, sell or advertise for sale, or bring about the disclosure of personal data or to disclose it without the permission of the relevant Data Controller. This includes unauthorised access to personal data. (There are exceptions to this).

Personal Liability


The DPA provides that where an offence has been committed by a company and has been committed with the consent or is attributable to any neglect on the part of an officer of the company, the officer as well as the company may be prosecuted.


For more information on the DPA please visit www.dataprotection.gov.uk.

PART V THE US AND SAFE HARBOR RULE

Back

What is 'Safe Harbor'?

'Safe Harbor' is a framework that provides businesses with a basis for compliance with the European Union's ('EU') Data Protection Directive. In the UK, this means compliance with the DPA. It provides that personal data can only be transferred to countries outside the EEA if 'that country ensures an adequate level of protection for the rights and freedoms of a data subject.'

Prior to 'safe harbor', there was fear that data transfers to the United States ('US') might be prevented by the implementation of the EU's Directive on Data Protection. However, the European Commission ('EC') adopted a 'Decision' accepting 'safe harbor' as offering 'adequate protection for personal data transferred from the EU'.

How does it work?

The US Department of Commerce ('DOC') has established a set of data protection principles, which the EC considers to offer adequate protection for data transfer. The 'safe harbor' arrangement allows US companies to pledge themselves to these principles. Although membership of this scheme is voluntary, the rules are binding on the US companies who participate. US organisations that commit to the 'safe harbor' principles will appear on a public list.

Who regulates the scheme?

The Federal Trade Commission ('FTC') and the Department of Transportation ('DTC') act as law enforcement powers. US organisations will only appear on the list if they are under the authority of FTC and DTC.

(For more details on Safe Harbor :
europa.eu.int/comm/internal_market/en/media/dataprot/news/safeharbor.htm)

PART VI SECURITY - BRITISH STANDARD ON INFORMATION SECURITY MANAGEMENT (BS 7799)

Back

What is it?

The British Standard for Information Security Management (BS 7799 Part 1 and 2) is a set of non-technical protocols for ensuring safe transmission of information. This framework is intended to be a point of reference for initiating, implementing, maintaining and documenting information security within an organisation.

It was introduced in 1995 and effective from October 1998. BS 7799 was last published in May 1999.

In December of 2000 BS 7799 was adopted by the International Standards Organisation. A revised version of BS 7799 was drafted and renamed ISO 17799. It is expected that it will become the international reference document to ensure secure and trustworthy e-commerce. ISO 17799 can be found at www.iso.ch/iso/en/ISOOnline.


What is the purpose of the ISO 17799

It enables organisations to mitigate threats resulting from physical disaster, fraud, and industrial espionage. It allows enterprises to manage security in an open computing environment, particularly where business is transacted electronically. The use of ISO 17799 could be considered as a means to achieving the security principles outlined in the DPA. However, adopting ISO 17799 cannot make your organisation immune from security breaches. Nevertheless it should reduce the risk, consequential cost and disruption if they do occur.


For further advice or assistance, please contact Richard Stanton-Reid on (020) 7539 7081 at Kerman & Co LLP.