Avoiding data protection pitfalls: Spotlight on cross-border investigations - January 2016

Weil, Gotshal & Manges
Total Views  :   703
Total Likes  :  
Total Shares  :  0
Total Comments :  0
Total Downloads :  0

Description

GIR Global Investigations Review Global Investigations Review The law and practice of international investigations Avoiding data protection pitfalls: Spotlight on cross-border investigations Global Investigations Review GIR The law and practice of international investigations investigations 7 January 2016 Credit: Thijs ter Haar on Flickr ( CC BY 2.0) The EU’s recent decision to abandon its 15-year-old Safe Harbour rules covering data transfers to the US is likely to cause major headaches for lawyers carrying out internal investigations. Toby Duthie at Forensic Risk Alliance and Simon Taylor at Weil Gotshal & Manges explain why. On 6 October, 2015, the European Court of Justice (ECJ) issued a game-changing and non-appealable ruling in Schrems v Data Protection Commissioner invalidating the European Commission’s decision, which had stood since 2000, that the data privacy principles of US-EU Safe Harbour provide an adequate level of protection for the data of EU citizens. Safe-Harbour principles can no longer be relied on and the data protection commissioner (or equivalent) in each EU member state can now question whether transfers of personal data to the US comply with EU data protection law and to suspend such transfers if EU privacy obligations are not met. The impact is potentially enormous for the thousands of US multinational companies that operate under Safe Harbour (as well as for the thousands of European businesses that have their data hosted in the US by these US companies). While the European Commission has indicated that it is committed to finding a “safer” safe harbour, so that the transfer of transatlantic data can continue, this is likely to take some time. For now, companies that rely on the US-EU Safe Harbour agreement must review their current practices and consider alternatives. This article considers the specific implications of this decision on corporate internal investigations and offers practical suggestions as to what companies should be doing to operate within the law on data privacy as it currently stands. First published on the Global Investigations Review website, 7 January 2016 globalinvestigationsreview.com .

GIR Global Investigations Review Global Investigations Review TheContext: Snowden’s whistleblowinginvestigations PRISM programme law and practice of international and the NSA’s Maximilian Schrems is an Austrian national residing in Austria. He was a Facebook user. From 2008 he had a subscriber agreement with Facebook Ireland Ltd. Facebook Ireland kept its subscribers’ personal data on servers located in the US. In the light of the revelations made by Edward Snowden (from May 2013) that, under a programme known Global Investigations Review as PRISM, the US National Security Agency (NSA) obtained unrestricted and undifferentiated access to mass The law and practice of international investigations investigations data stored on servers in the US owned or controlled by a number of companies active in the internet and technology sector, Schrems made a complaint that the US-EU Safe Harbour principles did not, in fact, contain adequate safeguards for EU citizens under EU data privacy laws. The Irish data protection commissioner refused to investigate his complaint on the grounds that it was unsustainable in law.

When Schrems sought a judicial review of that decision, the High Court referred the question to the Court of Justice of the European Union (CJEU) for a ruling. On 23 September, 2015 Advocate-General Bot ruled in favour of Schrems and, just two weeks later, the full CJEU confirmed it. GIR What is personal data? To understand the impact of this decision upon corporate internal investigations, it is important to be clear on what amounts to “personal data” for the purposes of the protections provided by EU law. EU directive 95/46 defines personal data as any information relating to an identified or identifiable natural person.

An identifiable natural person includes one who can be identified directly or indirectly. This includes identification by reference to specific physical, physiological, mental, economic, cultural or social factors. It is, by any measure, a broad and embracing concept intended to extend well beyond what would be regarded as personal information in an everyday context.

The courts have attempted, on a number of occasions, to give guidance on the application of the test in the directive. At the EU level, in criminal proceedings against Bodil Lindqvist, the CJEU stated the term “personal data” covers information relating to an identified or identifiable natural person. The term undoubtedly covers the name of a person in conjunction with his telephone co-ordinates or information about his working condition or hobbies. In Commission v Bavarian Lager, the court stated that the definition of the concept of single personal data correctly held that surnames and forenames may be regarded as personal data. In the UK there have been a string of cases from 2003 refining the approach.

Most recently, Lord Justice Moses in Efifiom Edem v Information Commissioner and Financial Services Authority gave the following guidance: “It is important to remember that it is not always necessary to consider ‘biographical significance’ to determine whether data is personal data. In many cases data may be personal data simply because its content is such that it is ‘obviously about’ an individual. Alternatively, data may be personal data because it is clearly ‘linked to’ an individual because it is about his activities and is processed for the purpose of determining or influencing the way in which that person is treated.

You need to consider ‘biographical significance’ only where information is not ‘obviously about’ an individual or clearly ‘linked to’ him.” What is ‘Safe Harbour’? European data privacy law prohibits the transfer of personal data to a country outside the European Economic Area unless that country ensures an adequate level of protection for individuals’ personal data. The Safe Harbour programme was established in 2000 to enable US organisations to comply with European law. The US Department of Commerce worked with the European Commission to develop a “Safe Harbour” framework, which allowed US organisations that self-certified compliance with the Safe Harbour principles (which are similar to EU data protection principles) to transfer data concerning EU citizens. First published on the Global Investigations Review website, 7 January 2016 globalinvestigationsreview.com .

GIR Global Investigations Review Global Investigations Review TheWhat and practice offor internal investigations? law does this mean international investigations The recent memo from US Deputy Attorney General Sally Yates (the Yates Memo) is a stark reminder to corporates that, if they wish to achieve full credit for cooperation, internal investigations must be conducted thoroughly into suspected wrongdoing and must focus from the outset on the conduct of individuals. The first step in any internal investigation is fact gathering. This will always involve the collection, transfer and Global Investigations Review processing of data about the conduct of individuals in the organisation. This necessarily involves manipulating, The law and investigations analysing and moving vastpractice of international investigations businesses with operations in the EU this will inquantities of personal data. For any evitably put that process in conflict with EU privacy laws.

The end of Safe Harbour will pose very real difficulties for corporates to remain within the boundaries of EU law. Previously, under the Safe Harbour framework, US companies frequently either self-certified compliance or used third-party forensic data vendors, lawyers or accountants with Safe Harbour certification to enable data to be transferred to the US for processing and analysis. Even under the now-defunct Safe Harbour regime many advisers and firms were still concerned that this was not sufficiently robust due to the very nature of any selfcertification process and because certain EU national statutes, such as the French Blocking Statute, in a potential litigation context conflict with any Safe Harbour provisions. However, in reality, many did rely on Safe Harbour nonetheless.

This is no longer an option (however misguided it may have been). Building on the Yates Memo, in November 2015, Assistant Attorney General Leslie Caldwell took the opportunity to emphasise that companies will be expected to demonstrate that they “acted promptly” to deal with an FCPA violation and conducted “thorough and tailored” internal investigations. It is clearly important that companies quickly develop practical solutions to the obstacle created by the Schrems decision. Earlier, in May 2015, Caldwell made the following remarks about companies that rely on foreign data privacy laws: “We recognize that some foreign data privacy laws may limit or prohibit the disclosure of certain types of data or information.

Over the years, the criminal division has developed an understanding of certain oft-cited data privacy laws, and we will challenge what we perceive to be unfounded reliance on these laws to justify withholding requested information.” It will clearly not be open to companies to use Schrems as an excuse for being unable to conduct effective investigations or to withhold documents from the Department of Justice. GIR What are the post-Schrems options? There are a limited number of short-term options, most of which come with disadvantages and cost implications. 1)  orporates that are affected need to restructure data storage architecture to ensure that European data remains C in Europe. This will add significant costs and may also affect corporate structure. This does, however, ensure that no breaches of EU privacy laws occur in the normal trading activity. 2)  or the transfer of data during an investigation, the obtaining of specific informed consent from the indiF vidual is theoretically possible, but undesirable.

True informed consent is difficult to justify ex post facto to a data commissioner, particularly when US corporates are now on notice, post-Yates Memo, to target culpable individuals. Equally, tipping an employee off as to the existence and scope of an investigation may be counterproductive in the early phases of an investigation. 3)  dopting binding corporate rules (BCRs), which are internal rules adopted by multinational groups of compaA nies and approved by the EU. BCRs can be costly and time consuming to develop and implement, but would provide a US company with essentially the same capacity to transfer data as it enjoyed under the Safe Harbour agreement. 4)  Adopting the pro forma model contractual clauses approved by the European Commission.

This may not be effective on a retrospective basis and therefore may not cover historic data that could be needed for investigatory purposes. First published on the Global Investigations Review website, 7 January 2016 globalinvestigationsreview.com . GIR Global Investigations Review Global Investigations Review E The5)  nsure that data is collected, processed and analysed in Europe and not transferred to the US. Clearly, this will law and practice of international investigations provide peace of mind but will involve additional costs to ensure that the teams of forensic and legal specialists can be available in the relevant jurisdiction. Further considerations will also come into play in the event that the company wishes to self-report to the DoJ or provide documents containing personal data to the DoJ. It may be that the exception to the normal prohibition can be employed in these circumstances, allowing a company to Global Investigations to defend or establish its legal rights. transfer data where it is necessary Review 6)  onduct vendorlaw and practice of international investigations C The due diligence to avoid vicarious third-party liability. In many cases, companies being fined are investigations often at fault for the actions of their vendors – it is therefore important to employ vendors that comply with any relevant legislation, and have the capabilities to implement robust and secure in-country solutions.

Experienced vendors will work at the outset with the company’s legal team to adopt the most appropriate approach to data transfers. 7)  ne increasingly popular solution is to employ a vendor with the ability to deploy a mobile processing and O hosting solution. In situations where there are regulatory or commercial sensitivities (eg, the data cannot leave the specific jurisdiction, or even the client’s premises), a mobile solution can work to satisfy any such restrictions. In most cases, vendors that offer such unique products will be able to tailor the solution to the client’s circumstances and requirements – the amount of data that needs to be processed, the accessibility options, the IT infrastructure, and any forensics work that needs to be carried out.

The mobile solution can be in the form of a laptop, desktop or a server, and will be pre-loaded with customised hardware and software to handle the data and the investigation requirements, as well as will come with specific access limitations (eg, it will be limited to the IP address of the reviewer, and all other connections will be blocked). Further, the reviewer will only be allowed to carry out tasks that are pre-agreed, and any other work, such as managing software or hardware, will be dealt with by the vendor’s engineers on the client’s premises. 8)  f in doubt, it is prudent to seek advice from the European data protection legal specialists. The EU regulators I have said that they will not take coordinated action until the end of January 2016, which gives the companies time to seek expert advice.

The risks at stake are high - those in violation of the current data protection regime companies stand to face regulatory enforcement, as well as potential legal action by both their customers and employees. EU data specialists will be able to advise companies on their data movement strategies, as well as conduct expert risk assessments of such issues as data being transferred through third parties, leaving the company liable in the eyes of the law. 9)   tay patient and vigilant. Safe Harbour 2.0 has been promised by the European Commission.

However, the S reasons underpinning its revocation were largely political rather than technical. Structuring Safe Harbour 2.0 is therefore likely to take time and, until it is agreed and introduced, companies will largely have to deal with the European data protection agencies. It is thus crucial to stay vigilant as to the applicable rules in each jurisdiction.

In reality, however, will Safe Harbour 2.0 ever fully address contentious situations, especially those in which corporate and individual interests may sharply diverge? It is important to consider that Safe Harbour was only ever intended to assist companies manage data in their everyday business. It is also interesting that Microsoft recently announced that it will be opening Germany-based data centres that will be run by Deutsche Telekom as “trustees”. This speaks volumes as to the challenges that Safe Harbour 2.0 negotiators face and to which businesses will very likely respond in the near term by building decentralised non-US IT infrastructure.

This may, perhaps paradoxically, undermine the need for a treaty. 10)  onduct an assessment of the company’s readiness for the EU Data Protection reform, a deal which was C struck on 15 December 2015. The reform aims to give customers increased control over their data, its usage and retention, and will be implemented by all 28 member states passing uniform national legislation. It is important for companies to conduct self-assessments and to understand the potential implications, as the new rules will save compliant companies an estimated €2.3 billion per year – as well as impose fines of 4 per cent of global revenues for non-compliance. GIR First published on the Global Investigations Review website, 7 January 2016 globalinvestigationsreview.com .

GIR Global Investigations Review Global Investigations Review  and practice noting that post-Snowden concerns are not The law Finally, it’s worth of international investigations unique to the EU. A huge number of other countries including Brazil, Russia, China and Indonesia have introduced and enhanced data protection legislation. It seems clear that the legislative data protection-related tensions between jurisdictions – notably with the US on one end of the spectrum and the EU on the other – is only likely to grow. Data protection has morphed in the past couple of years into a major issue that requires consideration in the investigative context from the outset.

Further, there is clearly political will to enforce breaches and EU penalty levels could potenGlobal Investigations Review tially compete withand practice of international investigations of, for example, antitrust, sanctions and FCPA. The law those seen in the contextinvestigations GIR First published on the Global Investigations Review website, 7 January 2016 globalinvestigationsreview.com .

< 300 characters or less

Sign up to contact