|
|
xv | |
|
|
xvii | |
|
Table of UK Secondary Legislation |
|
|
xxv | |
|
Table of European and International Legislation |
|
|
xxxiii | |
Contributing Authors' Biographies |
|
xlv | |
|
|
xlvii | |
Introduction to the Sixth Edition |
|
xlix | |
|
1 Historical Perspective, Territorial Scope, and Terminology |
|
|
1 | (37) |
|
|
|
Introduction and Historical Perspective |
|
|
1 | (5) |
|
Data Protection, Privacy and Electronic Communications (Amendments etc) (EU Exit) Regulations 2019 |
|
|
6 | (1) |
|
|
6 | (3) |
|
Introduction to Terminology |
|
|
9 | (1) |
|
|
10 | (7) |
|
|
17 | (1) |
|
|
18 | (2) |
|
|
20 | (2) |
|
|
22 | (1) |
|
Special Categories of Personal Data |
|
|
22 | (2) |
|
|
24 | (1) |
|
|
24 | (1) |
|
|
25 | (1) |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
27 | (1) |
|
The Data Subject's Consent |
|
|
28 | (1) |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
29 | (1) |
|
|
30 | (1) |
|
Data Protection by Design |
|
|
30 | (1) |
|
Data Protection by Default |
|
|
30 | (1) |
|
|
31 | (1) |
|
|
32 | (1) |
|
European Data Protection Board |
|
|
32 | (1) |
|
|
32 | (1) |
|
|
33 | (1) |
|
|
34 | (1) |
|
Directive on Security of Network and Information Systems |
|
|
34 | (2) |
|
Directive on Personal Data Processed for Criminal Law Enforcement |
|
|
36 | (2) |
|
2 Data Protection Principles |
|
|
38 | (11) |
|
|
|
38 | (1) |
|
Lawfulness, Fairness, and Transparency |
|
|
39 | (1) |
|
|
40 | (1) |
|
|
41 | (2) |
|
|
43 | (1) |
|
|
44 | (2) |
|
Integrity, Confidentiality, and Security |
|
|
46 | (1) |
|
|
46 | (1) |
|
|
47 | (1) |
|
Data Protection by Design and by Default |
|
|
47 | (1) |
|
|
47 | (2) |
|
3 Fair, Lawful, and Transparent Processing |
|
|
49 | (27) |
|
|
|
49 | (1) |
|
Obtaining Data---Duty Not to Mislead |
|
|
50 | (1) |
|
Obtaining Data in a Transparent Manner---Information to Be Supplied to the Data Subject |
|
|
50 | (7) |
|
|
57 | (1) |
|
The Lawfulness Conditions |
|
|
57 | (11) |
|
Other Unlawful Processing |
|
|
68 | (1) |
|
|
69 | (5) |
|
Monetary Penalties of Significance |
|
|
74 | (1) |
|
|
74 | (2) |
|
4 Special Categories of Data |
|
|
76 | (21) |
|
|
|
76 | (3) |
|
The Conditions for Processing |
|
|
79 | (12) |
|
Personal Data Relating to Criminal Convictions and Offences |
|
|
91 | (3) |
|
Advice on Processing Special Category Personal Data |
|
|
94 | (3) |
|
5 Data Security and Breach Notifications |
|
|
97 | (22) |
|
|
|
|
97 | (5) |
|
Obligations of the Controller and Processor |
|
|
102 | (4) |
|
Data Protection by Design and by Default |
|
|
106 | (2) |
|
Pseudonymization and Encryption |
|
|
108 | (1) |
|
Privacy Enhancing Technologies |
|
|
108 | (1) |
|
ISO 27001, 27002, and 27701 |
|
|
109 | (1) |
|
|
110 | (1) |
|
|
111 | (1) |
|
|
112 | (1) |
|
Notifying Security Breaches |
|
|
112 | (5) |
|
Advice on Breach Notification |
|
|
117 | (1) |
|
|
118 | (1) |
|
6 International Data Transfers |
|
|
119 | (20) |
|
|
|
119 | (2) |
|
Examples of International Transfers |
|
|
121 | (1) |
|
|
122 | (1) |
|
Adequate Level of Protection |
|
|
122 | (3) |
|
Transfers to the United States---Privacy Shield |
|
|
125 | (3) |
|
Providing Adequacy Safeguards |
|
|
128 | (1) |
|
|
129 | (3) |
|
Codes of Conduct and Certification Mechanisms |
|
|
132 | (1) |
|
|
132 | (3) |
|
|
135 | (2) |
|
|
137 | (1) |
|
|
138 | (1) |
|
7 The Rights of Individuals |
|
|
139 | (40) |
|
|
|
|
139 | (1) |
|
Responding to Individuals |
|
|
140 | (4) |
|
|
144 | (1) |
|
|
144 | (13) |
|
|
157 | (3) |
|
|
160 | (1) |
|
|
161 | (1) |
|
The Right to Object to Direct Marketing |
|
|
161 | (3) |
|
|
164 | (5) |
|
Right to Restriction of Processing |
|
|
169 | (1) |
|
Automated Decision-taking |
|
|
170 | (3) |
|
|
173 | (3) |
|
Right to a Judicial Remedy |
|
|
176 | (1) |
|
Complaints to the Commissioner |
|
|
176 | (2) |
|
|
178 | (1) |
|
8 Enforcement and the Role of the Regulator |
|
|
179 | (22) |
|
|
|
|
179 | (1) |
|
Supervisory Authority Enforcement Role |
|
|
180 | (6) |
|
|
186 | (1) |
|
|
186 | (1) |
|
Cross-border Processing and Appointing a Lead Authority |
|
|
187 | (3) |
|
UK Enforcement Action After Brexit |
|
|
190 | (1) |
|
UK Enforcement Procedures |
|
|
191 | (1) |
|
|
192 | (2) |
|
|
194 | (1) |
|
|
195 | (1) |
|
|
196 | (2) |
|
|
198 | (1) |
|
Powers of Entry and Inspection |
|
|
199 | (2) |
|
9 Outsourcing Personal Data Processing |
|
|
201 | (10) |
|
|
|
|
201 | (2) |
|
The Nature of a Processor |
|
|
203 | (1) |
|
Obligations on Processors |
|
|
204 | (1) |
|
|
204 | (2) |
|
|
206 | (1) |
|
|
206 | (2) |
|
|
208 | (1) |
|
|
208 | (1) |
|
|
209 | (1) |
|
|
210 | (1) |
|
|
210 | (1) |
|
10 Electronic Communications |
|
|
211 | (24) |
|
|
|
Introduction and Historical Background |
|
|
211 | (3) |
|
|
214 | (3) |
|
|
217 | (6) |
|
|
223 | (1) |
|
|
223 | (2) |
|
|
225 | (1) |
|
|
225 | (2) |
|
Cookies and Similar Devices |
|
|
227 | (2) |
|
Limitations on Processing of Traffic Data |
|
|
229 | (1) |
|
Calling and Connected Line Identification |
|
|
230 | (1) |
|
|
231 | (1) |
|
|
232 | (1) |
|
Termination of Unwanted Call Forwarding |
|
|
232 | (1) |
|
|
232 | (1) |
|
|
232 | (1) |
|
|
233 | (1) |
|
|
233 | (2) |
|
11 Data Protection Impact Assessments |
|
|
235 | (23) |
|
|
|
235 | (1) |
|
DPIA Guidance and Templates |
|
|
236 | (1) |
|
|
237 | (1) |
|
|
238 | (5) |
|
Identifying Whether a DPIA Is Required |
|
|
243 | (1) |
|
Who Should Carry Out a DPIA |
|
|
244 | (1) |
|
|
245 | (11) |
|
Reporting and Publication of the DPIA |
|
|
256 | (1) |
|
|
257 | (1) |
|
12 Role of the Data Protection Officer |
|
|
258 | (18) |
|
|
|
258 | (1) |
|
The Accountability Requirement |
|
|
258 | (3) |
|
|
261 | (1) |
|
|
261 | (5) |
|
|
266 | (2) |
|
Expertise and Skill of the DPO |
|
|
268 | (2) |
|
|
270 | (1) |
|
|
271 | (1) |
|
|
271 | (1) |
|
|
272 | (1) |
|
|
273 | (1) |
|
Data Protection Impact Assessments |
|
|
274 | (1) |
|
|
274 | (1) |
|
|
275 | (1) |
|
|
275 | (1) |
|
13 Creating a Data Protection Compliance Programme |
|
|
276 | (13) |
|
|
|
276 | (2) |
|
Stage 1 Assessing Data Processing Activities |
|
|
278 | (1) |
|
Stage 2 Creating Data Protection Policies |
|
|
279 | (2) |
|
Stage 3 Data Protection Training and Raising Awareness |
|
|
281 | (2) |
|
Stage 4 Implementing Controls to Reduce and Monitor Risk |
|
|
283 | (2) |
|
Stage 5 Monitoring Compliance |
|
|
285 | (1) |
|
|
286 | (1) |
|
Stage 7 Annual Review Process |
|
|
286 | (3) |
Appendix 1 Regulation (EU) 2016/679 of the European Parliament and of the Council |
|
289 | (98) |
Appendix 2 Data Protection Act 2018 |
|
387 | (280) |
Appendix 3 Addresses and Websites |
|
667 | (4) |
Index |
|
671 | |