ebook img

Information Sharing and Data Protection in the Area of Freedom, Security and Justice: Towards Harmonised Data Protection Principles for Information Exchange at EU-level PDF

480 Pages·2012·2.3 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Information Sharing and Data Protection in the Area of Freedom, Security and Justice: Towards Harmonised Data Protection Principles for Information Exchange at EU-level

Information Sharing and Data Protection in the Area of Freedom, Security and Justice . Franziska Boehm Information Sharing and Data Protection in the Area of Freedom, Security and Justice Towards Harmonised Data Protection Principles for Information Exchange at EU-level Dr.FranziskaBoehm UniversityofLuxembourg InterdisciplinaryCentreforSecurity,ReliabilityandTrust(SnT) 6,rueRichardCoudenhoveKalergi 1359Luxembourg Luxembourg [email protected] [email protected] PrintedwiththesupportoftheFNRLuxembourg ISBN978-3-642-22391-4 e-ISBN978-3-642-22392-1 DOI10.1007/978-3-642-22392-1 SpringerHeidelbergDordrechtLondonNewYork LibraryofCongressControlNumber:2011941399 #Springer-VerlagBerlinHeidelberg2012 Thisworkissubjecttocopyright.Allrightsarereserved,whetherthewholeorpartofthematerialis concerned,specificallytherightsoftranslation,reprinting,reuseofillustrations,recitation,broadcasting, reproductiononmicrofilmorinanyotherway,andstorageindatabanks.Duplicationofthispublication orpartsthereofispermittedonlyundertheprovisionsoftheGermanCopyrightLawofSeptember9, 1965,initscurrentversion,andpermissionforusemustalwaysbeobtainedfromSpringer.Violations areliabletoprosecutionundertheGermanCopyrightLaw. Theuseofgeneraldescriptivenames,registerednames,trademarks,etc.inthispublicationdoesnotimply, evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevantprotective lawsandregulationsandthereforefreeforgeneraluse. Printedonacid-freepaper SpringerispartofSpringerScience+BusinessMedia(www.springer.com) Acknowledgements Thisthesisistheresultofmyworkasaresearchassistantfrom2007to2011under the guidance of Professor Herwig Hofmann at the University of Luxembourg. ItwasdefendedinApril2011. First and foremost, I wish to express my gratitude to my supervisor, Professor HerwigHofmann.Hissupportandguidanceduringtheyearsofmyresearchhave madeitpossibleformetowriteandfinishthisthesis.Myprofoundthanksgotohim forhisconfidenceinmywork.Itwasalsoanextraordinaryprivilegetohavebeen guidedbyProfessorSpirosSimitiswhonotonlytookpartinmyjury,butwhowas alwaysavailablefordiscussionsoverthelastfewyearswhenIneededhisadvice. He and his publications have been a constant inspiration and an important guide during the research. I would like to express my deepest appreciation and I pro- foundlythankhimforhisencouragementandhisindispensableadvice.Iwouldalso liketothankMarkCole,AssociateProfessorattheUniversityofLuxembourg,for hisinvaluablecommentsandhiscontinualacademicsupportoverthelastyears.He alwayshadthetimetodiscussandwasopentomyideas.Thethesiswouldlookfar lesscompletewithouthiscontributions. TheideafortheresearchdatesbacktomyyearsattheUniversityofGießenwhere Iwrotemymasterthesisonadataprotectionrelatedtopicunderthesupervisionof Professor Thilo Marauhn, who continuously supported my scientific interest and whomIthankforhissupportalsointheframeworkofmythesis.HielkeHijmans fromtheEuropeanDataProtectionSupervisorandProfessorStefanBraum,atthe University of Luxembourg, took part in my Jury and gave tips and advice along theway.IamlikewiseindebtedtoGarthHallandLawrenceSirywhoimprovedthe legibilityofthemanuscript.Theirannotationshavebeenalwaysveryhelpful. VerywarmthanksgotomycolleaguesattheUniversityofLuxembourg.Ihave madegoodfriendsinthisfacultyandIamdeeplygratefulforthemomentsIhave sharedwithyou,beitforachatorascientificdiscussion.Itisdifficulttomention names, some are Dr. Florence Giorgi, Sandra Schmitz, Lawrence Siry, Miroslava Borissova, Jenny Metzdorf, Dr. Roger Tafoti, Mariana Ignatescu and Dr. Isabelle v vi Acknowledgements Ruedabuttherearemanymore,andIwouldliketothankallofthemfortheirhelp, time and encouragement, especially during the final stage of the PhD. Of course, friends from outside the University, especially from Berlin and Gießen deserve a special mention as well. Without their moral, emotional and social support, this thesis would never have been written. Ida Danke, Julia Horla¨nder, Johanna Schmidt, Maike Gappa, Christin Noak, Lars Hoffmann, and Ole Westphal are onlyafewBerlinfriendsofsomanyothers.ThorstenDreimann,MarkusBerliner, InesHeylmann,Dr.KaiPurnhagenandTilKappenaswellasJuliaHeieis,Andrea Kristekova,Jan Lizak,Jo¨rgPiper,Anja Pavlenko,MartinFaix andSoniaKienitz, allofwhomImetinGießen,supportedmeineveryimaginableway.Ialsowould like to thank my family, especially my parents, Evelyne and Clemens, and my sisters,AnninaandNina,fortheirconstantandunconditionalsupport.Ioweallof youmorethanjustthementioninginthethesis. Mostofall,IamparticularlythankfultoDr.TobiasLochen,whostoodalways bymethroughthelastyearsandwastherewhenIneededhissupport.Hespentso manyhoursreadingthemanuscriptandencouragingmeindifficultmoments.Iam morethangratefulforhiscompanionshipandhisbeliefinme. Finally,withouttheindestructiblebeliefinmyabilitiesshowntomebymydear grandparents,GertrudandGeorgLibor,Iwouldhaveneverhadthestrengthtostart (andtofinish)thePhDproject.Theirconstantsupportandencouragementhasled metothisresult.Thisbookisthereforededicatedtothem. Luxembourg FranziskaBoehm Contents Introduction .................................................................. 1 I.BriefBackgroundonDataProtectioninEULaw ....................... 3 II.WhatistheAreaofFreedom,SecurityandJustice? .................... 6 III.ResearchTopic:InformationSharingintheAFSJ andDataProtectionRights .............................................. 8 IV.Terminology ............................................................ 12 V.LimitationsoftheResearch ............................................ 15 VI.Sources ................................................................. 16 VII.OutlineoftheResearch ................................................ 16 A DataProtectionStandardintheAFSJ ................................. 19 I. BriefHistoricalReviewandReasonsforDataProtection ......... 19 II. CouncilofEurope:Art.8ECHR,ConventionNo.108 andRecommendationR(87)15 .................................... 22 1. DataProtectionGuaranteesofArticle8ECHR .................. 25 2. DataProtectionElementsandRestrictionswith RegardtoArticles5,6,10and13ECHR ........................ 84 3. ConventionNo.108fortheProtectionofIndividuals withRegardtoAutomaticProcessingofPersonalData ......... 92 4. RecommendationNo.R(87)15Regulating theUseofPersonalDatainthePoliceSector ................... 96 5. Conclusion:TowardsBasicECHRPrinciples forSecurity-RelatedDataProcessing .......................... 103 III. EuropeanUnionStandards ......................................... 106 1. MainDataProtectionInstrumentsintheAFSJ andTheirScope ................................................. 107 2. EUDataProtectionPrinciplesintheAFSJ .................... 127 3. Conclusion:DataProtectionRulesintheAFSJ areStillaPatchwork ............................................ 171 vii viii Contents B AFSJActorsintheLightoftheEuropeanData ProtectionStandard ..................................................... 175 I BriefBackgroundInformation ...................................... 176 II EuropeanAgenciesandOLAF ..................................... 177 1. Europol ........................................................... 177 2. Eurojust .......................................................... 214 3. OLAF ............................................................ 226 4. Frontex ........................................................... 246 5. JointSituationCentreoftheCouncil ............................ 253 6. EuropeanJudicialNetwork ...................................... 254 7. Conclusion:FragmentedDataProtectionFramework VersusIncreasingPowersoftheAFSJAgencies andOLAF ........................................................ 256 III DataProcessinginEuropeanInformationExchangeSystems ..... 259 1. TheSchengenInformationSystem .............................. 260 2. TheVisaInformationSystem ................................... 280 3. TheCustomsInformationSystem ............................... 292 4. Eurodac .......................................................... 304 5. ProposalforanAgencyManagingLargeITSystems (SISII,VISandEurodac)fromaDataProtection PointofView .................................................... 314 6. Conclusion:StagnatingDataProtectionFramework inContrasttoIncreasingFunctionalitiesofthe EUInformationSystems ......................................... 318 C CooperationandDataExchangeoftheAFSJActors andTheirCompliancewiththeEuropeanData ProtectionStandard ..................................................... 321 I Inter-AgencyDataExchangeandOLAF ........................... 322 1. Europol-Eurojust ................................................ 322 2. Europol-OLAF .................................................. 330 3. Europol-Frontex ................................................ 333 4. Eurojust-OLAF ................................................. 338 5. Eurojust-Frontex ................................................ 342 6. Conclusion:UnsatisfactoryDataProtection FrameworkinAFSJInter-AgencyInformation-Sharing ....... 342 II DataExchangeBetweenAFSJAgenciesand Europe’sInformationSystems:SIS,CIS,VISandEurodac ....... 344 1. Europol-SISIIAccess .......................................... 344 2. Europol-VISAccess ............................................ 348 3. Europol-CISAccess ............................................ 357 4. Europol-EurodacAccess ........................................ 360 5. Eurojust-SISIIAccess .......................................... 366 Contents ix 6. Eurojust-CISAccess ............................................ 368 7. Conclusion:UnbalancedInterests–LawEnforcement AccessandRespectofDataProtectionPrinciples ............. 368 D PerspectivesandSuggestionsforImprovement ....................... 371 I. KeyFindings ....................................................... 372 II. LawfulnessoftheExpandingAFSJFunctionalities ............... 379 III. LimitsofPreemptiveStoringandLawEnforcement AccesstoDatabasesofaNonLawEnforcementNature .......... 381 1. Pre-EmptiveStoringinViewoftheCase-Law ................ 382 2. NoCoherentSolutionbytheEuropeanCourtofJustice forLawEnforcementAccess ................................... 389 IV. ReformingtheSupervisoryStructureandCreatingaGeneral NotificationDuty ................................................... 393 1. TheNeedforaCentralSupervisoryAuthority ................ 394 2. UpgradingtheRightsoftheSupervisoryBody toGuaranteeEffectiveProtection .............................. 396 3. TowardsaGeneralNotificationDuty .......................... 398 V. AligningtheDataProcessingFrameworkintheAFSJ: ImprovementSuggestions .......................................... 398 1. ProceduralRequirementsandLegalBasis ..................... 400 2. CatalogueofStoredData ....................................... 400 3. AvoidingUnclearTermsandHarmonisingKeyTerms ....... 401 4. FramingtheAccessConditions ................................ 401 5. ImprovingtheProtectionofVictims,Witnesses andPersonsWhoseDataarePre-EmptivelyEntered inSecurityRelatedDatabases .................................. 402 6. IndividualRights ................................................ 404 7. Notification ..................................................... 405 8. ControlofDataRecordingandBindingSecurityRules ....... 406 9. ImprovingtheProtectionandtheTransparency ofInformationOriginatingfromPrivateParties orThirdStates .................................................. 407 10. CommonRulesontheRelationstoThirdParties .............. 407 11. ManagingtheTime-Limits ..................................... 408 12. DualControl:IntroducinganInternalDPO .................... 409 13. ImprovingtheDecisionMakingandIntroducing SunsetandReviewProvisions .................................. 409 VI. TowardsHarmonisedDataProtectionPrinciplesforIntra-AFSJ InformationExchange ............................................. 410 1. RestrictingthePurposeofTransfer ............................ 411 2. DefiningUnclearLegalTerms ................................. 411 3. DesignatingtheAccessingActorsandAuthorities ............ 413 4. HarmonisingtheAccessProcedure ............................ 413

Description:
Privacy and data protection in police work and law enforcement cooperation has always been a challenging issue. Current developments in EU internal security policy, such as increased information sharing (which includes the exchange of personal data between European law enforcement agencies and judic
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.