09-12-2016 deliverable dna3.5: recommendations and template … · 2017. 7. 14. · 09-12-2016...

28
09-12-2016 Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal Data Deliverable DNA3.5 Contractual Date: 31-10-2016 Actual Date: 09-12-2016 Grant Agreement No.: 653965 Work Package: NA3 Task Item: T5 Lead Partner: KIT Document Code: DNA3.5 Authors: Uros Stevanovic (KIT), Peter Gietz (DAASI), David Groep (FOM-NIKHEF), Marcus Hardt (KIT), David Kelsey (STFC), Mikael Linden (CSC), Ian Neilson (STFC), Stefan Paetow (Jisc), Hannah Short (CERN), Gerben Venekamp (SURFsara), Rob van der Wal (SURFsara) © GÉANT on behalf of the AARC project. The research leading to these results has received funding from the European Community’s Horizon2020 Programme under Grant Agreement No. 653965 (AARC). Abstract Collaboration among scientists across different administrative domains and across borders in Europe and beyond needs to address the management of personal information. In the majority of use cases, and for all cross-domain resource providers and e-infrastructures, providers will process personal data in order to provide services. The main objective of NA3 T5 is to provide templates for policies that operators of different components in the infrastructures can use. This document provides updates about the legal context and, in its recommendations, identifies the minimal set of information needed by the participants in the prevalent use cases and those foreseen for the proof-of-concepts in AARC SA1. A policy template, on the processing of personal data, including an example of a privacy policy, is provided in the appendix.

Upload: others

Post on 02-Oct-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 09-12-2016 Deliverable DNA3.5: Recommendations and Template … · 2017. 7. 14. · 09-12-2016 Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal

09-12-2016

DeliverableDNA3.5:RecommendationsandTemplatePoliciesfortheProcessingofPersonalData

Deliverable DNA3.5

Contractual Date: 31-10-2016 Actual Date: 09-12-2016 Grant Agreement No.: 653965 Work Package: NA3 Task Item: T5 Lead Partner: KIT Document Code: DNA3.5 Authors: UrosStevanovic(KIT),PeterGietz(DAASI),DavidGroep(FOM-NIKHEF),MarcusHardt(KIT),DavidKelsey

(STFC),MikaelLinden(CSC),IanNeilson(STFC),StefanPaetow(Jisc),HannahShort(CERN),GerbenVenekamp(SURFsara),RobvanderWal(SURFsara)

© GÉANT on behalf of the AARC project. The research leading to these results has received funding from the European Community’s Horizon2020 Programme under Grant Agreement No. 653965 (AARC).

Abstract

Collaboration among scientists across different administrative domains and across borders in Europe and beyond needs to address the management of personal information. In the majority of use cases, and for all cross-domain resource providers and e-infrastructures, providers will process personal data in order to provide services. The main objective of NA3 T5 is to provide templates for policies that operators of different components in the infrastructures can use. This document provides updates about the legal context and, in its recommendations, identifies the minimal set of information needed by the participants in the prevalent use cases and those foreseen for the proof-of-concepts in AARC SA1. A policy template, on the processing of personal data, including an example of a privacy policy, is provided in the appendix.

Page 2: 09-12-2016 Deliverable DNA3.5: Recommendations and Template … · 2017. 7. 14. · 09-12-2016 Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal

Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal Data Document Code: DNA3.5

ii

TableofContents

ExecutiveSummary 1

1 Introduction 2

2 Scope 4

3 BackgroundandRecentDevelopments 53.1 UmbrellaID 53.2 CloudComputing 63.3 ChangestoEUDataProtectionRulesandtheNewRegulation 7

4 InterpretationoftheRegulationintheContextofSharedInfrastructures 84.1 PersonalDataandProcessing 84.2 DataControllersandDataProcessors 8

4.2.1 Examples 94.3 PurposeofProcessing 104.4 LegalGroundsforDataProcessing 104.5 ReleaseofPersonalDatatoThirdParties,DataSubjectRightsandRetention 114.6 ReleaseofPersonalDataOutsidetheEuropeanUnion 12

5 Recommendations 145.1 StandardDataProtectionClauses(ModelContracts) 145.2 BindingCorporateRules 15

5.2.1 AdoptingBindingCorporateRules 155.3 ConclusionandRecommendation 17

TemplatePolicyontheProcessingofPersonalData 18

References 23

Glossary 25

Page 3: 09-12-2016 Deliverable DNA3.5: Recommendations and Template … · 2017. 7. 14. · 09-12-2016 Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal

Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal Data Document Code: DNA3.5

1

Executive Summary

Collaborations between scientists spanning administrative domains and borders in Europe and beyond areservedbycomputeandstorageservicesofferedwithinresearchande-infrastructures.Asaresult,bothmuststore and process the personal information of their users. In themajority of use cases, and for all cross-domain resource providers and e-infrastructures, providerswill process personal data in order tomeasureusage and allocation of resources. To preserve the privacy of the individuals involved, this personal dataneedstobesuitablyprotected,whilst,atthesametime,beingmadeavailabletothosewhoneeditinorderto be able to offer a service. Consequently, in designing or managing services, operators of theseinfrastructures must take decisions that may have legal implications with which they are not necessarilyfamiliar,potentiallymakingscientificcooperationmoredifficultandtherebylessattractive.

The overall goal of Networking Activity 3 Policy Harmonisation, Task 5 Accounting and Processing of Data(NA3T5)istoprovidetemplatesforpoliciesthatoperatorsofdifferentcomponentsintheinfrastructurescanuse. This Task startedwith the collection of use case studies of the processing of personal data fromusercommunities and infrastructures (as suppliers or associations) in its Month 7 milestone documentRequirementsondatatoprotectfromAAI,community,resourceprovidersande-infrastructure[MNA3.2].Thisdeliverableextends thatwork,andprovidesupdatesabout the legalcontextaswellasproposing templatepoliciesfortheinfrastructurecomponentsdefinedintheBlueprintArchitecturesinJointResearchActivity1Architectures(JRA1)[MJRA1.4].(Policiesforattributereleasebyidentityproviders(IdPs)toserviceproviders(SPs)ortheprocessingofuser-provideddata,whichmaycontainpersonal identifiable information(PII),arenotcovered.Thesearecomplex issuesbeyond thescopeof thiswork.)Recommendationsareprovided forpoliciesthatcanbeappliedacrossanentire infrastructure–keeping inmindthecurrentstateofEuropeanlegislation,specificallythenewGeneralDataProtectionRegulation(GDPR)[GDPR]anditsimplementationinthe Member States. The recommendations focus on two frameworks: standard data protection clauses(model contracts) and binding corporate rules. The document identifies the minimal set of informationneededbytheparticipantsintheprevalentusecasesandthoseforeseenfortheproof-of-conceptsinAARCServiceActivity1Pilots(SA1).Apolicytemplate,ontheprocessingofpersonaldata,includinganexampleofaprivacypolicy,isalsoprovided.

Page 4: 09-12-2016 Deliverable DNA3.5: Recommendations and Template … · 2017. 7. 14. · 09-12-2016 Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal

Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal Data Document Code: DNA3.5

2

1 Introduction

Thehighlycollaborativenatureoftoday’sresearchhasresultedintheestablishmentofbothdomain-specificresearchinfrastructures(RIs)andmoregenerice-infrastructuresthatservemultipleresearchdomains.Bothofthese infrastructuretypes(hereaftercommonlyreferredtoas infrastructures),bytheirverynature,spanmultiple organisations (i.e. administrative domains) and are often transnational in character. Many haveglobalscope, incorporatingresearchersandservicesfromaroundtheworld. Infrastructuresactasprovidersofcoherentlyorganisedservices,providedbyandundertheauthorityoftheindependentorganisationsthatjointly make up the infrastructure. Yet, these independent organisations must work together to providecollectiveservices,offeredtotheircommonusersasiftheywereasingleservice.Moreover,inmanycases,individualinfrastructuresworktogetherandhavetoexchangedatabetweenthemselves.

Inordertoprovidetheirservices, infrastructuresneedtoexchangepersonaldata, forexample, tomeasureactual service use versus allocated resources; to satisfy regulatory requirements demanded by fundingagenciesor EuropeanCommission grant agreement rules [EC-ModelAgree]; to complywith export controls[Wassenaar]; or to distribute resources fairly amongst their users. Because of the inherently distributednature of infrastructure authentication and authorisation infrastructures (AAIs), the data collected byinfrastructures includes information from multiple sources, data that may contain personally identifiableinformation(PII)abouttheuser.Thisdataneedstobesharedbetweentheensembleofserviceprovidersintheinfrastructurespanningadministrativedomains,acrossbordersinEurope,andbeyond,atthegloballevel.Topreserve the rightsof theuserof the infrastructure (the researcher), andensure that theorganisationsprovidingthe infrastructurecomplywithapplicablenationalandEUregulatoryrequirements, thecollectionandsharingofPIImustbemanaged.

Thepurposeofthisdocumentistoproviderecommendationsandtemplatepoliciestoresourceprovidersanduser communities that establish and operate infrastructures. These recommendations are intended tofacilitate the ability to collect, transfer, provide access to, and/or publish data related to the accounting,monitoring,logging,oranykindofprocessingofpersonaluserdataneededfortheoperationoftheservicesprovidedbytheresourceproviders.

Thisdocumentcoversthefollowing:

• Section 2 Scope (e.g. categories of data, reasons for data processing), listing the relevant datacollectedbytheinfrastructure,toassistinidentifyingtheapplicableregulatoryandlegalframeworksonwhichdecisionsonhowtohandlethisdatashouldbebased.

• Section 3 Background and Recent Developments, comprising a review of the relevant elements ofexisting legal privacy frameworks, primarily fromEuropean and, if applicable, fromnational bodies,withspecificregardtothechangesresultingfromtheadoptionofthenewEUGeneralDataProtectionRegulation(GDPR)inApril2016.

Page 5: 09-12-2016 Deliverable DNA3.5: Recommendations and Template … · 2017. 7. 14. · 09-12-2016 Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal

Introduction

Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal Data Document Code: DNA3.5

3

• Section4InterpretationoftheRegulationintheContextofSharedInfrastructures,adiscussionofthepoliciesofcommunitiesand infrastructureproviders regardingcollectionandprocessingofpersonaldatathatprovidepotentialmodelsfordatasharing.

• Section5Recommendations,givingspecificrecommendationsandsuggestionsonhowtoleverageapolicyframeworktopermitsharingofpersonaldatawithinacoherentlyorganisedinfrastructure.

Inaddition,apolicytemplate,ontheprocessingofpersonaldata,includinganexampleofaprivacypolicy,isprovidedinAppendixA.

The work described here builds upon results previously presented in the AARC milestone documentRequirements on data to protect from AAI, community, resource providers and e-infrastructure [MNA3.2].Newusecasesidentifiedsincethatdocumentwaswritten, includingthoseidentifiedthroughtheAARCSA1pilots,havebeenaddedasbackgroundinformation.

AlthoughrecommendationsinthecurrentdocumentareintendedtoalignwithapplicableEUdirectivesandregulations,andtheconceptualframeworkpresentedherehasbeendiscussedwithexpertsinthefield,thespecific recommendationsandargumentsgiven in thisdocumentmustnotbeconsideredas legaladvice inanyparticularjurisdiction.

Page 6: 09-12-2016 Deliverable DNA3.5: Recommendations and Template … · 2017. 7. 14. · 09-12-2016 Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal

Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal Data Document Code: DNA3.5

4

2 Scope

Usercommunities,resourceproviders,researchcommunities,researchinfrastructures(RIs),e-infrastructures,as well as specialised services (e.g. IdP-SP proxies [SAMLIdPProxy]) need to collect and process personallyidentifiable information. Such personal data is any kind of information that can be used to identify anindividual.

Indiscussingtheprocessingofthepersonaldata,thisdocumentfocusesonthefollowingpoints:

• CollectionofusagedatainRIande-infrastructures.

• Correlatingresourceusagetopeopleandgroups.

• Accumulationofusagedataacrosscountries(andcontinents).

• Collectionandprocessingofpersonaldataforincidentresponse.

Thescopeofthedocumentrelatestothepersonaldataprocessingnecessaryforaccounting,monitoringandcollaboration. ThedocumentdoesNOTprovide informationor policies covering theusage andhandlingofresearchdatasets thatmaycontainpersonal information (e.g.medicaldata).Furthermore, thequestionofuser attribute release (e.g. an identity provider (IdP) providing data to a service provider (SP)) in researchcommunitiesandfederatedenvironmentsisalsooutsidethescopeofthisdocument.Policiesandproceduresrelating to attribute release by an attribute authority (e.g. the GÉANT Data Protection Code of Conduct[GNDPCoCo]asmanagedbyREFEDS[REFEDS])dependontheoutcomeofother,ongoing,relatedarchitecturework,andsuch issueswillhavetobeaddressedbyfuturework–atthetimeofwritingforeseenfor2017–2018.However, ifattributeslabelledaspersonal identifiableinformationareusedforthesamepurposesasthosewithinthescopeofthisdocument(namely,accounting,monitoringandcollaboration),thenthesamepoliciesforprocessingshouldbeappliedasforotherpersonaldatadiscussedhere.

In addition, the document assumes that all activities undertaken on the infrastructures are “professional”work,andanyone interactingwiththe infrastructuresdoessowhileappropriatelyendorsedbyareal“legalentity”, e.g. a researcher is employed by an organisation (university, research laboratory, etc.) and thus(maybeimplicitly)alsobindstheorganisationinanythingsheorhedoes.Thisisparticularlyrelevantforusercommunityadministratorswhohaveaccesstousagedataandsimilarhandlingofusers’data.

Primarily, the document focuses on the requirements for research conducted within the Europeancommunities.However, asmuchof the researchhasa substantial international element,whenmaking therecommendationsthepracticeandpoliciesfortheaccountingofpersonaldatathatexistsoutsideofEuropearetakenintoaccount.

Page 7: 09-12-2016 Deliverable DNA3.5: Recommendations and Template … · 2017. 7. 14. · 09-12-2016 Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal

Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal Data Document Code: DNA3.5

5

3 Background and Recent Developments

IntheAARCmilestonereportRequirementsondatatoprotectfromAAI,community,resourceprovidersande-infrastructure [MNA3.2], a representative selection of infrastructures was analysed and the roles of thevarious participants in the infrastructure assessed with regard to national and European regulatoryinformation. That work serves as the starting point for the current document, bearing in mind thatRequirementswaspublishedbeforethenewGeneralDataProtectionRegulation(GDPR)hadbeenadopted,and thus reflects mainly the then current Data Protection Directive 94/46/EC [Dir95/46/EC] and itsimplementationinnationallawwithintheEU.AlthoughtheGDPRdiffersfromtheearlierDirective,itretainsthe same elements as the basis for protecting personal data and, as such, the requirements identified inMNA3.2needonlytobere-assessed.

MNA3.2 provides an overview of the (representative) sample of existing communities and infrastructureprovider policies regarding the processing of personal data, and discusses infrastructures such as EGI andPRACE. Community requirements on accounting data have common, well-established policy sets, evolvedover the last decade or more. As such, participants in these infrastructures, including both providers andconsumersofcompute,storageorotherservices,arerequiredtocomplywiththerulesandprocedureslaidoutintherelevantpolicies.ThisincludesnotonlythehandlingofaccountingdatadiscussedinRequirements,butalsootheroperationalandsecurityareassuchas theregistrationofusers, theirexperimentaffiliations,retention of service logs and security incident response data. All of these are necessary for the efficientoperation andmanagementof an infrastructure, andmany require the storage andprocessingof personaldata.Naturally,notallcommunitiesandresourceproviderswereconsidered.However,aneffortwasmadetoreview a sufficient number of policies to draw valid, general conclusions. Two cases, based on the pilotsconductedintheAARCSA1Activity,havebeenaddedatthisstageastheyincludenewelements–UmbrellaID,devolvingalldataprocessingresponsibilitiestoitsconstituentorganisations,andthegenericcaseofcloudservicesproposingacodeofconductapproach.

Inaddition to theabove, infrastructures commonly serve communities thatare truly global in theirextent,andassuchmust,inthewaytheystoreandprocesspersonaldata,takethisglobalscopeintoaccount.Boththe EC Directive and the new GDPR allow such international transfers under a limited number ofcircumstances(derogationsorexemptions).Theirmostrelevantdataprotectionaspectsarediscussedinthefollowingsections.

3.1 Umbrella ID

UmbrellaID[UmbrellaID]isanidentitysystemdesignedbytheEuropeanphotonandneutronsourcefacilities(PaNs).Itaimstomakelifeeasierandsciencemoreproductiveforboththefacilitiesandtheirusers.UmbrellaprovidesanyPaN-user(and,effectively,anyoneinterestedinscientificdiscovery)withauniqueidentity,theUmbrellaID.EquippedwithsuchanIDausercanvirtuallyaccessparticipatingfacilitieswithasinglesign-on.

Page 8: 09-12-2016 Deliverable DNA3.5: Recommendations and Template … · 2017. 7. 14. · 09-12-2016 Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal

Background and Recent Developments

Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal Data Document Code: DNA3.5

6

Sincethesameidentityisknownateachofthefacilities,ausercanmoresimplyaccessorsharedata,manageadministrativeprocessesormakeuseofservicesandinfrastructuresprovidedbythePaNs.UmbrellaisajointprojectofthePaNsandotherfacilitieswithsimilarneedsforanidentitymanagementsystem,andcurrentlyoperatesunderamemorandumofunderstanding(MoU)signedbyallparticipantsinthecollaboration.

CurrentlytheMoUstatesthefollowinginrespecttoaccountingandprocessingofpersonaldata:

“5.6APartyprovidingaservicehastheresponsibilityandrightsforthatservice.Allservicesshallbemade available to all users, but are subject to authorisation by the Party offering the service. Forexample,anyusermay implicitlybeauthorisedonanopenaccess scientificdatabaseora softwarecatalogue.Ontheotherhand,theWUOswillalwaysdemandalocalregistrationand,insomecases,certaindocumentslikeapassportbeforegrantingaccesstobeamlinesorfacilities.”

Therefore,theonusonprocessingandhandlingofpersonaldatafallstothelocaluseroffice(WUO),e.g.thefacility,andfacilitieshaveamendedtheirtermsandconditionsofuseaccordingly.TheonlyattributessharedbetweentheUmbrella IDsystemandany local facilityareauser ID(theUmbrella ID itself)andtwouniquebutnon-personallyidentifiableUUIDstrings.

Developments by theUmbrella collaboration in thenear future include an attribute authority to allow thestorageof additional attributes to be released to non-Umbrella collaboration services. In this instance, thecollaboration expects to adhere to the existing GÉANT Data Protection Code of Conduct for self-assertedattributeswithsupportforthestandardShibboleth3attributereleaseinterstitialflowduringlogin.

3.2 Cloud Computing

Inrecentyears,therehasbeenwidespreadadoptionofthecloudcomputing[CloudComputing]modelfortheprovision of commercial compute services. Similarly, there are a number of projects trialling its use in theresearch sector. For example, Helix Nebula [HelixNebula], “Europe’s Leading Public-Private Partnership forCloud”andtheIndigoDataCloud[Indigo]aimedat“developingadataandcomputingplatform…provisionedoverhybrid(privateorpublic)e-infrastructures”.

Formanyyears, researchcommunitieshavemadeuseofresourcesdistributedacrossthe Internet (e.g. theWorldwideLargeHadronColliderComputingGrid(WLCG)[WLCG]and,whilstthetechnologyandmodelarechanging, many of the concerns relating to the protection of users’ privacy, arising from the exchange ofoperational data across the infrastructure, remain the same.Whether the cloud-based resources used (forcompute or data storage) are located within a “private cloud” (resources dedicated to a single client[PrivateCloud]) or “public cloud” (resources shared in a dynamic fashion bymultiple clients [PublicCloud]),responsibility, and subsequent liability, for ensuring that the cloud provider fulfils the necessary legalobligationsremainswiththeclient,justasintraditional“outsourcing”models.Whatdoeschangeisthelevelofdifficultyinensuringcompliance.Thisisparticularlysoinpresentcommercialsettingswheretheremaybemultiple layers of dynamic service provision, involving several providers. For example, a provider forweb-basedemailmayprovisionallorpartoftheirserviceononeormorevirtualisedcloudinfrastructures,whichmaybetransparently (fromthepointofviewofbothserviceuserandprovider)distributedacrossmultipledatacentresinmultiplecountriesorcontinents.Theresearchsectorisnotatthislevelofcloudadoptionyet,

Page 9: 09-12-2016 Deliverable DNA3.5: Recommendations and Template … · 2017. 7. 14. · 09-12-2016 Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal

Background and Recent Developments

Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal Data Document Code: DNA3.5

7

butthedifficultyoftheclientorganisation(as“datacontroller”inEUterminology)inapplyingduediligencemay be a significant obstacle to adoption in the future (see [Millard] for a full discussion). Initiatives,encouraged in the General Data Protection Regulation, for the drawing up of a code of conduct for cloudserviceproviders[DPCoCoCSP]areintendedtohelpboththecloudproviders(processors)andtheirclientsinthis process but remain a significant “work-in-progress”. For the time being, existing policies adopted byresearch infrastructuresmaybe sufficient to coverproposedcloudusage.However, cloudusage is anareathatwillneedfurtherconsiderationasadoptionandcomplexityoftheresultinginfrastructuresincrease.

3.3 Changes to EU Data Protection Rules and the New Regulation

On8thApril2016,theEuropeanCounciladoptedtheRegulation2016/679,alsoknownastheGeneralDataProtection Regulation (GDPR). Directive (2016/680), related to the prevention, investigation, detection orprosecutionofcriminaloffenceswithregardtotheprocessingofpersonaldata,wasalsoadopted.However,withinthescopeof thisdocumenttheGDPR isofmoreconsequence.ThisEuropeanRegulationestablishesthelegalframeworkfortheprotectionofnaturalpersonswithregardtotheprocessingofpersonaldataandforthefreemovementofsuchdata,anditreplacestheDirective95/46/ECthatiscurrentlyvalid.Itwentintoforceonthe24thMay2016,butitwillapplyfromthe25thMay2018[DPReform],whenthecurrentDirectivewillberepealed.BeingaRegulation,theGDPRislegallybindingforallMemberStates,withouttheneedtoberatified by Member State parliaments. It is a key document used as a basis for the discussions andrecommendationsinthisdeliverable.

Page 10: 09-12-2016 Deliverable DNA3.5: Recommendations and Template … · 2017. 7. 14. · 09-12-2016 Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal

Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal Data Document Code: DNA3.5

8

4 Interpretation of the Regulation in the Context of Shared Infrastructures

AstheGeneralDataProtectionRegulation(GDPR)comesintoeffect,itisimportanttoaddressthedefinitionsandmainpointsitintroduces.Thissectioncoversthosepoints,andexplainstheminsimplerterms.

4.1 Personal Data and Processing

This section discusses how the GDPR defines personal data, and what it means to process personal data.ThesedefinitionsarequotedfromtheGDPR,andexplained,sincetheyareusedthroughoutthisdocument.

Personaldata(Article4(1)):

“anyinformationrelatingtoanidentifiedoridentifiablenaturalperson(‘datasubject’);anidentifiablenatural person is onewho can be identified, directly or indirectly, in particular by reference to anidentifier such as a name, an identification number, location data, an online identifier or to oneormore factors specific to the physical, physiological, genetic, mental, economic, cultural or socialidentityofthatnaturalperson”

Inotherwords,personaldataisanydatasetthatcanbetakenfromorcombinedwithanysourcethatcanbeusedtodetermineinformationaboutanaturalperson.

Processing(Article4(2)):

“anyoperationorsetofoperationswhichisperformedonpersonaldataoronsetsofpersonaldata,whetherornotbyautomatedmeans,suchascollection,recording,organisation,structuring,storage,adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination orotherwisemakingavailable,alignmentorcombination,restriction,erasureordestruction”

In summary, any operation on personal data is considered to be processing, and, as such, needs to bemanaged(e.g.bypolicies).

4.2 Data Controllers and Data Processors

Article4(7)oftheGDPRdefinestheroleofdatacontrollerasaperson(anaturaloralegalperson)orentity(publicauthority,agencyorotherbody)whodecidesforwhatpurposesandinwhichwayspersonaldatawill

Page 11: 09-12-2016 Deliverable DNA3.5: Recommendations and Template … · 2017. 7. 14. · 09-12-2016 Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal

Interpretation of the Regulation in the Context of Shared Infrastructures

Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal Data Document Code: DNA3.5

9

beprocessed.Article4(8)of theGDPRdefines theprocessor as aperson (again, either anaturalor a legalperson)orentity (again,apublicauthority,agencyorotherbody)whoprocesses thedataonbehalfof thedatacontroller.

TousetheexplanationgivenbytheInformationCommissioner’sOffice[ICO-DPA-Def],adatacontrolleris“apersonwho(eitheraloneorjointlyorincommonwithotherpersons)determinesthepurposesforwhichandthemannerinwhichanypersonaldataare,oraretobe,processed”.AdatacontrolleristheresponsiblepartythatmustensurethatallprocessingofpersonaldatacomplieswiththeGDPR.Failuretodosomayresultinlegalrepercussions.Dataprocessors,ontheotherhand,processpersonaldatasolelyunderthedirectionofadatacontroller,whodecideswhatpersonalinformationwillbekeptandtowhatusesitmaybeput.

Thereareeightdataprotectionrulesthateachdatacontrollermustensurearefollowed[EC-DC-Oblig]:

• Personaldatamustbeprocessedlegallyandfairly.

• Itmustbecollectedforexplicitandlegitimatepurposesandusedaccordingly.

• Itmustbeadequate, relevantandnotexcessive in relation to thepurposes forwhich it is collectedand/orfurtherprocessed.

• Itmustbeaccurate,andupdatedwherenecessary.

• Data controllers must ensure that data subjects can rectify, remove or block incorrect data aboutthemselves.

• Datathatidentifiesindividuals(personaldata)mustnotbekeptanylongerthanstrictlynecessary.

• Datacontrollersmustprotectpersonaldataagainstaccidentalorunlawfuldestruction,loss,alterationand disclosure, particularly when processing involves data transmission over networks. They shallimplementtheappropriatesecuritymeasures.

• Theseprotectionmeasuresmustensurealevelofprotectionappropriatetothedata.

Intheusecasesconsidered,wherethecollaborationconsistsofindependentcooperatingorganisations,datacontroller is the role encounteredmost often. Thedata processor role is separate from the controller, yetencountered in only a few situations in Infrastructures. Furthermore, it is also common to have jointcontrollerswithintheusecasesbeingconsidered,describedinGDPRArticle26(1)asfollows:“Wheretwoormorecontrollersjointlydeterminethepurposesandmeansofprocessing,theyshallbejointcontrollers.”Inthiscase,theyshoulddefinetheirrespective legalresponsibilities,andusershavetherighttoaddresstheirrightswitheachofthecontrollers.

4.2.1 Examples

Asshownabove,theGDPRgivesthedefinitionsofdatacontroller,dataprocessor,etc.Whatdoesthismeaninreallife?WhichoftherolesstatedintheGDPRmightoneactuallyencounter?Togiveanexample,avirtualorganisation (VO) manager decides which people have access rights to the VO he/she manages (for thedefinitionofaVO,see[OSC-VO]).Theydosobasedonidentities,whichmakestheorganisationtowhichtheVOmanager belongs a data controller. A VOmanager could appoint (or actually designate, since the VO

Page 12: 09-12-2016 Deliverable DNA3.5: Recommendations and Template … · 2017. 7. 14. · 09-12-2016 Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal

Interpretation of the Regulation in the Context of Shared Infrastructures

Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal Data Document Code: DNA3.5

10

usuallyhasnolegalorganisationalstructure)oneormorepersons(naturalorlegal)toactontheirbehalf,i.e.decidehowandwhichdataisprocessed.ThosepersonsarethereforejointcontrollersaccordingtotheGDPR,i.e.theyjointlydecidehowandforwhichreasonsthedataisprocessed.

To give another example: identity providers (IdPs), in the formof authorisation attributes, provide identityinformation to service providers (SPs). This means that the organisation to which the IdP belongs isresponsibleforassembling/definingpersonaldataand isthereforethedatacontroller. If the IdPbelongstomorethanoneorganisation,thoseorganisationsarejointcontrollers.It/theymustensurethattheprocessingactivitiesarecompliantwithEUdataprotectionlaw.Incollaborativeresearchscenarios,inmostcasestheSPsarealsodatacontrollers.InrarecasestheSPsmaybedataprocessorsonbehalfoftheIdP–forexample,iftheSPisanInfrastructureasaService(IaaS)provider.

Identity federations come in two flavours: hub-and-spoke and mesh. In mesh federations, there is nointermediarybetweenanIdPandSP.Withhub-and-spokefederations,thereisanextraentitybetweenanIdPandSP.ThisentityactsasaproxyforthefederationandisthereforebothanIdPandanSP,andactsasadatacontroller(ifitstoresandaugmentsinformation)anddataprocessor.

4.3 Purpose of Processing

Thecontrollerdefinesthepurposeofprocessingofpersonaldata(Article5(b)).Thepurposecaninclude:

• Ensuringtheintegrity,availabilityandconfidentialityoftheinfrastructure(i.e.informationsecurity).

• Monitoringtheresourceconsumptionand,ifnecessary,invoicing.

• Capacityplanning.

Forexample,initsacceptableusepolicy(AUP)EGIdefinesthepurposeofprocessingasfollows:“Youagreethatloggedinformation,includingpersonaldataprovidedbyyouforregistrationpurposes,maybeusedforadministrative, operational, accounting, monitoring and security purposes. You agree that this loggedinformationmay be disclosed to other authorised participants via securedmechanisms, only for the samepurposesandonlyasfarasnecessarytoprovidetheservices.”[EGI-AUP]

One reason for processing and collecting personal data for security purposes would be security incidentresponse.Asmentionedpreviously,theusershouldbeinformedofallthedataprocessingusecasesforwhichtheirdataisused.

4.4 Legal Grounds for Data Processing

The Regulation, as with the Directive before it, recognises six distinct legitimate grounds for processingpersonal data (Article 6). Of these, two are by nature not applicable to the infrastructure research andcollaborativeusecasesconsidered:toprotectthevitalinterestsofthedatasubject(6.1(d))(sincethereisnolife-threateningsituation),andtoperformataskcarriedoutinthepublicinterestorintheexerciseofofficial

Page 13: 09-12-2016 Deliverable DNA3.5: Recommendations and Template … · 2017. 7. 14. · 09-12-2016 Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal

Interpretation of the Regulation in the Context of Shared Infrastructures

Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal Data Document Code: DNA3.5

11

authority (6.1(e)) (sinceeithershouldbebestoweduponthecontrollerbyEUorMemberState law).Therearealso fewreasonswhyprocessingbasedon legalobligations (6.1(c)) is relevant,withtheonly likelycasebeingtherecordingofnationalityforcompliancewiththeWassenaarArrangements.Thenatureofresearchcollaboration,forallpracticalpurposes,precludes“performanceofacontract”(6.1(b))asasuitablebasisforprocessing,leavingonlyuserconsent(6.1(a))andlegitimateinterests(6.1(f))asapplicableprocessinggrounds.

However,theGDPRplacesstringentrequirementsonuserconsent.Theconsenthastobegivenclearlyandfreely, for a stated purpose only, and can be revoked at any time. Users must agree to abide by theappropriate infrastructurepolicies (e.g.AUP)and, indoingso,are informedthat theirpersonaldatawillbeshared within the infrastructure for stated, limited purposes. Such acceptance by the user might beconsideredasconsentingto thetransferofdata.However,a researcherwill, inmanycases,berequiredtogainaccesstotheservicestheinfrastructureoffersasaprerequisitetoperformingdataanalysisthatiscriticalto theiremploymentasa researcher; in thesecases, suchconsentcouldpotentiallybeseenasnotbeinga“freelygiven,specific,informedandunambiguousindicationofthedatasubject’swishes”(Article4(11)).

Inaddition,asstatedbyArticle25(dataprotectionbydesignandbydefault),dataprocessingmust includecertainprinciples(suchasdataminimisation)beforeaskingforuserconsent.Otherwise,theconsentmaynotbelegallybinding.Forexample,thecourtdecisiondescribedin[DP-Court-Decision]mentionsthesepoints(inGerman);thedecisionisalsosummarisedin[DP-Court-Summary](again,inGerman).

Previouswork[Cormack-1]conductedinthecontextoffederatedattributerelease,whichisrelevantalsotothisdiscussion,indicatesthatthepursuitofthe“legitimateinterests”ofthecontrollercontinuestobeavalidbasisforprocessingpersonaldataintheinfrastructure.Furthermore,Article49oftheGDPRmakesthesamepoint.

4.5 Release of Personal Data to Third Parties, Data Subject Rights and Retention

Thepursuitofthelegitimateinterestsofthedatacontrollerasabasisforprocessingandthestructureoftheinfrastructuremakealmostallentities(includingserviceproviders)acontroller intheRegulationsense.Anysharing of data within the infrastructure – log files, accounting records, inferred community membershipinformation – must be considered “release” of personal data to a third party. Similarly, sharing suchinformation with the users’ home organisation (research institute, university), or with the people in thecommunity who are responsible for resource allocation and fair use of the shared resources in theinfrastructure,constitutesreleasetoathirdparty.

Disclosuretothirdpartiesispermittedwhencertainsafeguardsandcontrolsareinplace.Theindividualmustbe informed of the fact that sharing will take place for such legitimate interests; Opinion 06/2014 of theArticle 29 Data Protection Working Party (WP29) [Opinion-06-2014] provides the criteria that make suchprocessinglegitimate.AlthoughtheOpinionisbasedontheDirective,sincethedifferencesbetweenthe“old”Article7(f)andthe“new”GDPRArticle6.1(f)areminimal,itispresumedthattheOpinionisstillvalid.IntheOpinion,itisstatedthatArticle7(f)/6.1(f)shouldnotbetreatedaslastresort,norbeautomaticallyapplied.Rather,theArticleprovidesa“balancingtest”,which,inshort,considersboththelegitimateinterestsofthe

Page 14: 09-12-2016 Deliverable DNA3.5: Recommendations and Template … · 2017. 7. 14. · 09-12-2016 Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal

Interpretation of the Regulation in the Context of Shared Infrastructures

Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal Data Document Code: DNA3.5

12

datacontrollerandtheinterestsofthedatasubject:thestrongerthelegitimateinterestbeingpursuedbythedata controller and the lessharm theprocessingdoes to the interestsof thedata subject, the greater thelikelihoodthattheactivitywillbelawful[Cormack-2].Forexample,informationdisclosureaboutauserbytheidentityprovidershasapositiveratherthannegativeimpactontheuser,inlinewiththeuser’sexpectation.However,onecanarguethatitisalegitimateinterestoftheserviceproviderstohaveinformationabouttheusers, in case of security incidents. Data minimisation and privacy enhancing technologies should beemployed.

Theuserhasaright(Articles12–15)tobeinformedaboutthepurposeofdatacollectionandprocessing.Theinformationshouldbeprovidedclearly,andatthetimesuchdataiscollected(e.g.whentheuserstartsusingthe infrastructure). It should inform the userwho the data controller is, themeans of contacting the datacontroller, and, also, how the usermay request that incorrect data be rectified (Article 16). One point tomentioninparticularisArticle21(1),whichconcernstheuser’srighttoobjecttoprocessingofpersonaldata.Inthiseventuality,thecontrollercanstillcontinuetheprocessingofdataifheorshecanshow“compellinglegitimategrounds”fordoingso(e.g.storinglogdatamaybealegitimateinterestwhichoverridestheuser’srequest for user data not to be stored in log files). The duration of storing personal data is not explicitlydefined in the GDPR, other than it should not be kept for longer than needed, e.g. for invoicing, legalcompliance,incidentresponse,etc.purposes.Inaddition,appropriatetechnicalsecuritymeasuresshouldbeemployedtokeeptheusers’personaldatasafe(Articles24,25,and32).

4.6 Release of Personal Data Outside the European Union

Almostallinfrastructuresareglobalinnature,orattheveryleastinvolveparticipants(usersaswellasserviceproviders)outsidetheEuropeanUnion.ReleaseofpersonaldatatoindependentdatacontrollersoutsideEUjurisdictionrequiresthedataexportertoensuretheadequacyofprotection.

Under the Directive, the European Commission has so far recognised just a few countries – Andorra,Argentina, Canada (commercial organisations), Faroe Islands, Guernsey, Israel, Isle of Man, Jersey, NewZealand,SwitzerlandandUruguay– thataredeemed toprovideadequateprotection. Inaddition, thenewRegulation explicitly mentions release to international organisations; as a consequence, any suchorganisationsparticipatingintheinfrastructureneedtobeassessedaswell.Sincequiteafewinfrastructuresinclude organisations that have been established by treaty (e.g.many of the EIROforummembers such asCERN,EMBL),theyalsorequirenon-EUtreatmentuntiltheirdataprotectioncapabilityhasbeenassessedbytheCommission–untilnowtheseorganisationshaveprovidedanopenplacetoexchangepersonaldataandservetheusersandindividualswithoutsuchconsiderations.

For transfer of personal data internationally, a number of conditions (appropriate safeguards) are defined,permitting such transfer to take place, and the user must be informed of these safeguards. Apart fromexplicitlyobtainingapprovalforeachexchangemodelbyadataprotectionauthority–which,giventhescaleof researchcollaboration, isnotaviableproposition–onlya fewviablemechanisms toprovidesafeguardsremain: “binding corporate rules”, “standard data protection clauses”, and “approved codes of conduct”.Explicit user consent is always an option, yet the requirements on user consent (as discussed also for theintra-European case) do notmake it a suitable ground for processing within the infrastructures. Codes ofconductneedtobeveryspecific inorder tobeapproved– this is theconclusion fromthediscussionswith

Page 15: 09-12-2016 Deliverable DNA3.5: Recommendations and Template … · 2017. 7. 14. · 09-12-2016 Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal

Interpretation of the Regulation in the Context of Shared Infrastructures

Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal Data Document Code: DNA3.5

13

membersofWP29[REFEDSDPCoCo]followingtheongoingworkoncodesofconductinthecontextofREFEDSand GÉANT. Significant effort in the area of Codes of Conduct is needed to align it with the collaborativenatureoftheinfrastructures.

For a long time, additionalmechanisms have been in place to permit the exchange of personal datawithorganisations based in the United States of America. Initially permission was through the “Safe Harbour”model(foundinvalidbytheEuropeanCourtofJusticein2015),andcurrentlythroughthenewEU-USPrivacyShield [EC-EUUSPrivacy],administered in theUSby theDepartmentofCommerce [WP29-EUUSPrivacy]andadoptedbytheEuropeanCommission.Thearrangementincludes:

• StrongdataprotectionobligationsoncompaniesreceivingpersonaldatafromtheEU.

• SafeguardsonUSgovernmentaccesstodata.

• Effectiveprotectionandredressforindividuals.

• Annualjointreviewtomonitortheimplementation.

NeitherSafeHarbournortheEU-USPrivacyShieldisofanyusetotheinfrastructures,sinceeachisexclusivelylimited to commercial entities. As such, they are too limited in scope to be applicable to the generalinfrastructurecase,wherecollaborationismostlybetweenresearchlabsanduniversities.

In practice, the Regulation framework and the necessity to exchange personal data globally in theinfrastructuresleaveonlythestandarddataprotectionclauses(alsoknownasmodelcontracts)andbindingcorporaterules(BCR)asviableoptionsonwhichtobasepersonaldatasharingintheinfrastructures.However,BCRhave tobeapprovedbyacompetentsupervisoryauthorityandmustbe legallybinding,bothofwhichprerequisitesareimpracticalfortheusecasesconsideredhere.

Evenso,themethodologybehindtheBCRgivespracticalguidancethat,inviewoftheriskexposure,couldbeconsideredasuitableoperatingmodel.Thisisparticularlytruesincetheriskofharmtotheuserbyexposureoftheirdatais judgedtobeverylow.TheaccountingdataisalreadyopentoconsultationwithintheEUbypersons (organisations) that can demonstrate a legitimate interest – and the same conditions imposed onthesepersonswithin theEUare also imposedon thoseoutside theUnion (following the reasoningbehindArticle49.1(g)). The policy set of the infrastructure in both cases provides the “balancing test” necessarybetweenlegitimateinterestandtherightsandfreedomsofthedatasubject.

Page 16: 09-12-2016 Deliverable DNA3.5: Recommendations and Template … · 2017. 7. 14. · 09-12-2016 Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal

Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal Data Document Code: DNA3.5

14

5 Recommendations

ThenewGeneralDataProtectionRegulation introduces theheadline-grabbing changeof greatly increasingthemaximumpenaltiesfornon-compliance–20millioneurosor4%ofworldwideturnover.Inincreasingtherisktobusinessoffailingtoensureappropriatemeasuresareinplacetoprotectcitizens’privacy,thischangemayalsohavetheeffectofstiflingthewillingnessofresearchorganisationstocollaborate,duetobothfearoftheconsequencesof(accidental)non-compliance,andthestringencyandlengthoftheprocessthatmustbegone through to comply. In practice,with regard to the requirements on cross-border transfers, there aresignificantchangestothedetailofthelegislation,suchasrequirementsondataprotectionofficers,buttheoverall framework remains.Bothstandarddataprotectionclauses (model contracts)andbindingcorporaterules(BCR)benefitfromchangesrelatingtoconsistentapplicationacrosstheMemberStates.

OnesignificantadditiontotheGDPRrelatingtointernationaltransferistheallowancethatsuchtransferswillbeabletooccurwhereanapprovedcodeofconductisinplace.Suchcodesofconductareintendedtotargetorganisationsengagedincommonindustrysectorswhereadherencetothecodemaybetakenasevidenceofcompliance toGDPR.One example of such a prototype code of conduct is that being developed for cloudservice providers by the Cloud Select Industry Group (C-SIG) [EC-CSIG]. One could envisage that a code ofconductforresearchinfrastructureservicesmightbeconsideredinthefutureasastandardcomponentofaninfrastructurepolicyset.

Basedon thediscussionof theRegulationand theglobalnatureof infrastructures,only twoviablemodelsremain,i.e.modelcontractsandbindingcorporaterules.Eachoftheseisreviewedforsuitabilitybelow.

5.1 Standard Data Protection Clauses (Model Contracts)

Twostandard formsof contract, referred toasmodel contracts (MC) [EC-MC],havebeen issuedby theECcoveringthecross-border,controller-to-controllerorcontroller-to-processortransferofpersonaldata.Whereeachpartytoatransferisabletosignsuchanagreement,thecontrollerorprocessorlocatedoutsideoftheEU/EEAisdeemedtoofferadequateprotectiontousers’personaldataasadestinationforatransfer.

However,themodelclausesmustbepartofacontractualagreement,whichpresumessuchacontract is inplacebetweenthepartiestransferringpersonaldata.Theinfrastructures,beingcomposedofalargenumberof independent organisations, are not usually based on contracts, andmost certainly do not use bilateralcontractsbetweenallparticipants–thecombinatoricsdonotpermitthattohappen.Moreover,casestudiesindicate that, unless a specific agreement is in place, contracts “by proxy” (one organisation including themodel clauses in a contract, and any organisation loosely affiliated with the signing organisation beingcoveredimplicitly)arealsonotacceptableasaformallegalbasisfordatatransfer.

Page 17: 09-12-2016 Deliverable DNA3.5: Recommendations and Template … · 2017. 7. 14. · 09-12-2016 Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal

Recommendations

Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal Data Document Code: DNA3.5

15

Evenso,modelclausesinspecificcontextsareasuitablemechanism:theirapplicabilitytotheprocurementofcommercial cloud services has been demonstrated (as part of the GÉANT project as well as in specific“normative reference frameworks” that havebeen adoptedbynational researchnetworkorganisations onbehalfoftheirconstituentsin“jointprocurements”).

Wherethestructureandpre-existing legalframeworkexists,modelclausescouldbeaworkablesolutiontothedatatransferproblem–theiruseisstandardandtheirapplicationneednotbefurtherelaboratedhere.Forresearchandcollaborativeinfrastructureswithaglobalspan,however,theyarenotuseful.

5.2 Binding Corporate Rules

Whereasmodelcontracts,mentionedabove,arefixedtexts,bindingcorporaterules(BCR)aredraftedbytheorganisation itselfand,assuch,canbewordedaccordingtothecontextandenvironmentwithinwhichtheorganisationoperates.Onceapprovedbytheappropriatedataprotectionauthority,BCRpermitlegaltransferof data, internationally, within the body bound by the BCR. The EC has a short overview on BCR and theaccompanyingprocedures[EC-BCR],andWP29has issueddetailedguidanceonthecreationofBCR[WP29-BCR].

Bindingcorporaterulesareusedtoprovidesufficientinsurancefortheprotectionofprivacyofindividuals,asmentionedinArticle47GDPR,foralltransfersofpersonaldataprotectedunderaEuropeanlaw.Thepurposeof BCR is to ensure that personal information transfers are adequately protected, thereby negating thenecessity to sign individual contracts between parties within the group. BCR are especially useful for theinfrastructure caseswhere thepersonal information is transferredoutsideof the European EconomicAreaandtolocationswherethedataprotectionisnotsufficientaccordingtoEUlaw.

BCRscontainatleastthefollowingelements:

• Privacyprinciplesincludingtransparency,dataquality,securityofthedata,etc.

• Toolstomeasuretheeffectiveness,forexample,audits,training,complainthandling,etc.

• ClearstatementthattheBCRarebinding.

5.2.1 Adopting Binding Corporate Rules

In order to adopt BCR, a formal procedure needs to be followed, involving the national data protectionauthorities(DPAs).ThevariouselementsoftheBCRneedtobereviewedbythenationalDPAstoensurethattheymeetthecriteriaassetoutbytheArticle29WorkingParty.Theprocedurerecognisesoneleadauthority,which speaks on behalf of all the individual DPAs. This means that the organisation drafting the BCR canconduct the communications with the lead authority only, and does not have to approach each DPAseparately.Inadditiontotheleadauthoritythereisthemutualrecognitiongroup.Thisgroupexiststospeedup the EU cooperation procedure: once the lead authority considers that the BCR meet the criteria, themembers of the mutual recognition group accept this opinion as sufficient basis for providing their ownnational permit or authorisation for the BCR, or for giving positive advice to the body that provides that

Page 18: 09-12-2016 Deliverable DNA3.5: Recommendations and Template … · 2017. 7. 14. · 09-12-2016 Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal

Recommendations

Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal Data Document Code: DNA3.5

16

authorisation.SomeDPAsaremembersofthisgroup.CurrentlytheseareAustria,Belgium,Bulgaria,Cyprus,Czech Republic, Estonia, France, Germany, Iceland, Ireland, Italy, Latvia, Liechtenstein, Luxembourg,Malta,theNetherlands,Norway,Slovakia,Slovenia,Spain,andtheUnitedKingdom.

InordertoobtainapprovalfortheBCR,thefollowingfivestepsmustbetaken:

1. The organisation determines and assigns the lead authority that will handle the EU cooperationprocedureamongsttheotherEuropeanDPAs.

2. The organisation drafts the BCR and therein addresses Article 29 Working Party criteria. The leadauthorityreadsandcommentsontheBCRdocumenttoensurethedocumentmeetstherequirementsidentifiedinWP29WorkingPaper153[WP29-WP153].

3. TheleadauthorityconsultswiththerelevantDPAsandtherebystartstheEUcooperationprocedure.The relevant DPAs are those of the countries from where personal information is exported tocountriesthatdonothavesufficientdataprotection.

4. TheEUcooperationprocedurecloses.Thishappenswhen:a. TheDPAsinthecountriesinthemutualrecognitiongroupacknowledgethereceiptoftheBCR.b. TheDPAsnotinthemutualrecognitiongroupverifythattheBCRdocumentisinaccordancewith

therequirementsassetoutbytheArticle29WorkingParty.TheDPAs’responsesneedtobesentwithinonemonth.

5. Once the BCR have been considered as final by all DPA, the organisation requests authorisation oftransfersbasedontheBCRwhichisadoptedbyeachnationalDPA.

TheapproachcurrentlyinprocessofadoptionbytheEGIandWLCGinfrastructuresfollowsthemodelofandguidanceconcerningbindingcorporaterulesinthecontextofane-infrastructureboundbyanexistingpolicyset. The infrastructure requires all participants1to adhere to an eight-point policy for the processing ofpersonal data that aims to follow theWP29guidancementionedabove. This provides a framework that isrelatively lightweight, a characteristic that is seen as assisting its adoption by service providers and usercommunities. Of course, the participants in the infrastructure do not form a legal corporation and, as aconsequence,thisapproachcouldbeseenasinapplicable,notleastbecausetheassignmentofriskbetweentheparticipantsisnotgovernedbylegallyenforceableagreements.However,inmitigationofthis,theriskofharmtotheuserbyexposureoftheirdataincontraventionoftheRegulationisconsideredverylow,duetoboththe lackofsensitivityof thedatabeingprocessedandthefactthat inmanycircumstancesthedata isalreadyavailablefromothersourcessuchasresearchpublications,etc.

1Asalreadydescribedinthescopeofthisdocument,individualswhoareparticipantsintheInfrastructurearealways(atleastofficially)actingonbehalfoftheirorganisation–andthisdoesnotincludepeopleactingonapurelypersonalbasis.

Page 19: 09-12-2016 Deliverable DNA3.5: Recommendations and Template … · 2017. 7. 14. · 09-12-2016 Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal

Recommendations

Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal Data Document Code: DNA3.5

17

5.3 Conclusion and Recommendation

Under current legislation,onlymodel contractsandbinding corporate rulesappear tooffer the frameworkrequiredtotransferpersonaldatawithintrans-nationalsciencee-infrastructures.

Withhundredsof resourceproviders anduser communitiespotentially exchangingdata, it is impossible toconceiveofeachpartyexecutingaseparatelegalagreementwithallotherpartiesasmightberequiredbythestandard use of model contracts. One possible solution is for each party to sign an adherence formacknowledgingcompliancewithacodeofconduct(asreferredtoinGDPRArticle46.2(e)).Thesignedformisthenlodgedwiththeidentityfederation.Thisapproach,stillawork-in-progress,remainsarelativelycomplex,somewhatlengthylegaldocument,whichmayhinderadoption.

In practice, the authentication and authorisation infrastructure architecture proposed by the AARC projectcould in fact utilise both MC and BCR. The use of a proxy identity provider, which acts in relation toinfrastructureservicesbothasasinglesourceofidentityinformation,fromusers’homeorganisations,andasanaggregatorofusers’experimentorresearchaffiliations,typicallytheirVOmembershipandroles,mayactasapivotpointbetweenthetwodomains.Ononeside,theproxyIdPparticipatesasaservicetousers’homeIdPs,cachingtheresultingattributesandexecutingthenecessaryfederationagreements,possiblybasedontheMCs. On the other side, the proxy IdP participates in the infrastructure, bound by the BCR-like policyframework,actingasasourceofidentityinformationtoinfrastructureservices.

The BCR-inspired model as presented above is proposed as a suitable basis for distributed collaborativeinfrastructures where many independent organisations (with the user communities and their membersrepresented in theirprofessional capacityby theirhomeorganisations) collaboratewithinawell-controlledpolicyframework–whichisacharacteristicofmostofthecross-nationalinfrastructuresandAARC’sselectedusecases.Forreference,thepolicytemplatePolicyontheProcessingofPersonalData,developedjointlywithEGI,WLCG,andGridPP,isprovidedinAppendixAofthisdocument.

Page 20: 09-12-2016 Deliverable DNA3.5: Recommendations and Template … · 2017. 7. 14. · 09-12-2016 Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal

Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal Data Document Code: DNA3.5

18

Template Policy on the Processing of Personal Data

ThefollowingistherelevanttextofthePolicyontheProcessingofPersonalData,developedjointlywithEGI,WLCG,andtheUKGridPPproject.Beingbasedontheprinciplesofbindingcorporaterules,itimplementstheguidanceoutlinedinthisdocument.

A.1 Introduction

This policy ensures that data collected as a result of the use of the Infrastructure is processed fairly andlawfully by Infrastructure participants. Some of this data, for example that relating to user registration,monitoring and accounting contains “personal data” as defined by the EuropeanUnion (EU) [A.6 R1]. Thecollection and processing of personal data is subject to restrictions aimed at protecting the privacy ofindividuals.

A.2 Definitions

Infrastructure. The bounded collection of universities, laboratories, institutions or similar entities, whichadheretoacommonsetofpolicies[A.6R2]andtogetherofferdataprocessinganddatastorageservicestoEndUsers.

Participant.Anyentityproviding,managing,operating,supportingorcoordinatingoneormoreInfrastructureservice(s).

PersonalData.Anyinformationrelatingtoanidentifiedoridentifiablenaturalperson[A.6R1].

Processing (Processed). Any operation or set of operations, including collection and storage, which isperformeduponPersonalData[A.6R1].

EndUser.AnindividualwhobyvirtueoftheirmembershipofarecognisedresearchcommunityisauthorisedtouseInfrastructureservices.

Page 21: 09-12-2016 Deliverable DNA3.5: Recommendations and Template … · 2017. 7. 14. · 09-12-2016 Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal

Appendix A Template Policy on the Processing of Personal Data

Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal Data Document Code: DNA3.5

19

A.3 Scope

ThispolicycoversPersonalDatathatisProcessedasaprerequisitefororasaresultofanEndUser’suseofInfrastructureservices.ExamplesofsuchPersonalDataincluderegistrationinformation,credentialidentifiersandusage,accounting,securityandmonitoringrecords.

ThispolicydoesnotcoverPersonalData relating to thirdparties included indatasetsprovidedby theEndUserortheresearchcommunitytowhichtheybelongaspartoftheirresearchactivity.ExamplesofsuchdataaremedicaldatasetsthatmaycontainPersonalData.

A.4 Policy

BytheiractivityintheInfrastructure,Participants:

a) Declarethattheyhaveread,understoodandwillabidebythePrinciplesofPersonalDataProcessingassetoutbelow.

b) DeclaretheiracknowledgementthatfailuretoabidebythesePrinciplesmayresultinexclusionfromtheInfrastructure,andthatifsuchfailureisthoughttobetheresultofanunlawfulactorresults inunlawfulinformationdisclosure;theymaybereportedtotherelevantlegalauthorities.

A.5 Principles of Personal Data Processing

1. The End User whose Personal Data is being Processed shall be treated fairly and in an open andtransparentmanner.

2. Personal Data of End Users (hereinafter “Personal Data”) shall be Processed only for thoseadministrative,operational,accounting,monitoringandsecuritypurposesthatarenecessaryforthesafeandreliableoperationofInfrastructureservices,withoutprejudicetotheEndUsers’rightsundertherelevantlaws.

3. ProcessingofPersonalDatashallbeadequate,relevantandnotexcessiveinrelationtothepurposesforwhichtheyareProcessed.

4. Personal Data shall be accurate and, where necessary, kept up to date. Where Personal Data arefound tobe inaccurateor incomplete,having regard to thepurposes forwhich theyareProcessed,theyshallberectifiedorpurged.

5. PersonalDataProcessedforthepurposeslistedunderparagraph2aboveshallnotbekeptforlongerthantheperioddefinedinarelevantInfrastructureservicepolicygoverningthetypeofPersonalDatarecord being Processed (e.g. registration, monitoring or accounting) and by default shall beanonymisedorpurgedafteraperiodof18months.

6. AppropriatetechnicalandorganisationalmeasuresshallbetakenagainstunauthoriseddisclosureorProcessingofPersonalDataandagainstaccidentallossordestructionof,ordamageto,PersonalData.Asaminimum,InfrastructureParticipantsshall:a. RestrictaccesstostoredPersonalDataundertheircontroltoappropriateauthorisedindividuals.

Page 22: 09-12-2016 Deliverable DNA3.5: Recommendations and Template … · 2017. 7. 14. · 09-12-2016 Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal

Appendix A Template Policy on the Processing of Personal Data

Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal Data Document Code: DNA3.5

20

b. Transmit Personal Data by network or other means in a manner to prevent disclosure tounauthorisedindividuals.

c. NotdisclosePersonalDataunlessinaccordancewiththesePrinciplesofPersonalDataProcessing.d. Appoint at least oneDataProtectionOfficer (DPO)with appropriate training andpublish to the

Infrastructure a single contact point for the DPO to which End Users or other InfrastructureParticipantscanreportsuspectedbreachesofthispolicy.

e. Respond to suspectedbreachesof thisPolicypromptlyandeffectivelyand take theappropriateactionwhereabreachisfoundtohaveoccurred.

f. PerformperiodicauditsofcompliancetothisPolicyandmakeavailabletheresultsofsuchauditstootherInfrastructureParticipantsupontheirrequest.

7. Each Infrastructure service interface provided for the End User must provide, in a visible andaccessibleway, a Privacy Policy (see example policy in Section A.7 below) containing the followingelements:a. NameandcontactdetailsoftheParticipantProcessingPersonalData.b. DescriptionofPersonalDatabeingProcessed.c. PurposeorpurposesofProcessingofPersonalData.d. ExplanationoftherightsoftheEndUserto:

i. ObtainacopyoftheirPersonalDatabeingstoredbytheParticipantwithoutunduedelay.ii. Request that any Personal Data relating to them which is shown to be incomplete or

inaccurateberectified.iii. RequestthatoncompellinglegitimategroundsProcessingoftheirPersonalDatashouldcease.

e. The contact details of the Participant’s DPO to which the End User should direct requests inrelationtotheirrightsabove.

f. RetentionperiodofthePersonalDataProcessed.g. ReferencetothisPolicy.

8. PersonalDatamayonlybetransferredtoorotherwisesharedwithindividualsororganisationswheretherecipient:a. HasagreedtobeboundbythisPolicyandthesetofcommonInfrastructurepolicies,orb. Ispartofa recognisedComputer IncidentResponseTeamframeworkandaspartofan incident

investigationtopreventactiveorsuspectedmisuseofInfrastructureservices,orc. Presentsanappropriatelyenforcedlegalrequest.

A.6 References

R1 Directive95/46/ECoftheEuropeanParliamentandoftheCouncilof24October1995ontheprotectionofindividualswithregardtotheprocessingofpersonaldataandonthefreemovementofsuchdata

Page 23: 09-12-2016 Deliverable DNA3.5: Recommendations and Template … · 2017. 7. 14. · 09-12-2016 Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal

Appendix A Template Policy on the Processing of Personal Data

Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal Data Document Code: DNA3.5

21

http://eur-lex.europa.eu/legal-content/en/ALL/?uri=CELEX:31995L0046

R2 ApprovedEGISecurityPolicies

https://wiki.egi.eu/wiki/SPG:Documents

A.7 Infrastructure Participant Example Privacy Policy

ThisSectionprovidesanexampleofaprivacypolicyasrequiredbytheSectionA.57above.ItdoesnotformpartofthePolicyontheProcessingofPersonalData.

Privacy Policy

ThisPrivacyPolicyexplainshowwe, [insertParticipantnamehere] (“We”), treatdatabywhichyoucanbepersonally identified (“Personal Data”) as a result of your registration for and use of [insert Infrastructurenamehere](“Infrastructure”).

WecollectthefollowingPersonalDatatoidentifyyoutoenableustograntyouaccesstotheInfrastructureandtheservicessuchascompute,storageandnetworkthatitsparticipantsoffer:

• Name.

• Emailaddress.

• Affiliation(e.g.VO).

• CertificateDistinguishedName(DN).

• [Addorremovedataasappropriate].

To enable the Infrastructure to be safe and reliable for your use and to preserve your rights as a userweadheretoThePolicyontheProcessingofPersonalData(“ThePolicy”)availablehere:[inserturltoPPPDhere].

YourPersonalDatawillbesharedbutonlywhere:

1. TherecipienthasagreedtoabidebyThePolicy,or2. DoingsoislikelytoassistintheinvestigationofsuspectedmisuseofInfrastructureresources.

YourusageoftheInfrastructurewillbemonitored.Recordsofthisuse,containingyourPersonalData,maybeshared as described above for operational, security and accounting purposes only. These records will bepurgedoranonymisedafter,atlatest,18months.

Page 24: 09-12-2016 Deliverable DNA3.5: Recommendations and Template … · 2017. 7. 14. · 09-12-2016 Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal

Appendix A Template Policy on the Processing of Personal Data

Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal Data Document Code: DNA3.5

22

YoucancontactourDataProtectionOfficer ([insertcontactdetailshere]) toobtainacopyofyourPersonalData,requestthatit iscorrectedincaseoffactualerrororifyoususpectthatithasbeenmisused.YoucanalsorequestthatwestopusingyourPersonalDatabutthiswillaffectyouraccesstotheInfrastructure.

This Policy should be read with reference to the Policy on the Processing of Personal Data and otherInfrastructurepoliciesavailableat[insertlinktoInfrastructurePolicieshere].

[Insert Name and Contact Details of Infrastructure Participant]

Page 25: 09-12-2016 Deliverable DNA3.5: Recommendations and Template … · 2017. 7. 14. · 09-12-2016 Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal

Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal Data Document Code: DNA3.5

23

References

[CloudComputing] https://en.wikipedia.org/wiki/Cloud_computing[Cormack-1] Cormack,A.,FederatedAccessManagementandtheGDPR,4February2016,

https://community.jisc.ac.uk/blogs/regulatory-developments/article/federated-access-management-and-gdpr,visitedOctober2016

[Cormack-2] https://community.jisc.ac.uk/blogs/regulatory-developments/article/legitimate-interests-and-federated-access-management

[DP-Court-Decision] https://www.ldi.nrw.de/mainmenu_Service/submenu_Entschliessungsarchiv/Inhalt/Beschluesse_Duesseldorfer_Kreis/Inhalt/2016/Fortgeltung_bisher_erteilter_Einwilligungen_unter_der_Datenschutz-_Grundverordnung/Fortgeltung_bisher_erteilter_Einwilligungen_unter_der_Datenschutz-_Grundverordnung1.pdf

[DP-Court-Summary] https://www.heise.de/newsticker/meldung/Datenschutzexperten-kritisieren-Ansichten-der-Datenschutz-Aufsicht-zur-Einwilligung-3329888.html

[Dir95/46/EC] http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:en:HTML[DPCoCoCSP] https://ec.europa.eu/digital-single-market/en/news/data-protection-code-conduct-

cloud-service-providers[DPReform] http://ec.europa.eu/justice/data-protection/reform/index_en.htm[EC-BCR] http://ec.europa.eu/justice/data-protection/international-transfers/binding-

corporate-rules/index_en.htm[EC-DC-Oblig] http://ec.europa.eu/justice/data-protection/data-

collection/obligations/index_en.htm[EC-EUUSPrivacy] http://ec.europa.eu/justice/data-protection/international-transfers/eu-us-privacy-

shield/index_en.htm[EC-MC] http://ec.europa.eu/justice/data-protection/international-

transfers/transfer/index_en.htm[EC-ModelAgree] http://ec.europa.eu/research/participants/portal4/desktop/en/funding/reference_

docs.html#h2020-mga-gga[Thehashsigninthelinkmaypreventitfromworking.Ifso,copyandpastethelinkintotheaddressfieldofyourbrowser.]

[EC-CSIG] https://ec.europa.eu/digital-single-market/en/cloud-select-industry-group-code-conduct

[EGI-AUP] https://wiki.egi.eu/wiki/SPG:Drafts:Acceptable_Use_Policy_March_2015[GDPR] http://eur-lex.europa.eu/legal-

content/EN/TXT/?uri=uriserv:OJ.L_.2016.119.01.0001.01.ENG&toc=OJ:L:2016:119:TOC

[GNDPCoCo] http://geant3plus.archive.geant.net/uri/dataprotection-code-of-conduct/v1/Pages/default.aspx

[HelixNebula] http://www.helix-nebula.eu/[ICO-DPA-Def] https://ico.org.uk/for-organisations/guide-to-data-protection/key-definitions/

Page 26: 09-12-2016 Deliverable DNA3.5: Recommendations and Template … · 2017. 7. 14. · 09-12-2016 Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal

References

Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal Data Document Code: DNA3.5

24

[Indigo] https://www.indigo-datacloud.eu/[Millard] C.Millard,ed.,CloudComputingLaw(OUP,2013)[MJRA1.4] https://aarc-project.eu/wp-content/uploads/2016/08/MJRA1.4-First-Draft-of-the-

Blueprint-Architecture.pdf[MNA3.2] https://aarc-project.eu/wp-content/uploads/2015/11/MNA3.2-AccountingDataProt-

20151130.pdf[Opinion-06-2014] http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-

recommendation/files/2014/wp217_en.pdf[OSC-VO] https://www.opensciencegrid.org/about/organization/[PrivateCloud] https://en.wikipedia.org/wiki/Cloud_computing#Private_cloud[PublicCloud] https://en.wikipedia.org/wiki/Cloud_computing#Public_cloud[REFEDS] https://refeds.org/[REFEDSDPCoCo] https://wiki.refeds.org/display/CODE/Data+Protection+Code+of+Conduct+Home[SAMLIdPProxy] https://spaces.internet2.edu/display/GS/SAMLIdPProxy[UmbrellaID] https://www.umbrellaid.org/[Wassenaar] http://www.wassenaar.org/[WLCG] http://wlcg.web.cern.ch/[WP29-EUUSPrivacy] http://ec.europa.eu/justice/data-protection/article-29/press-material/press-

release/art29_press_material/2016/20160726_wp29_wp_statement_eu_us_privacy_shield_en.pdf

[WP29-BCR] http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2015/wp204.rev_en.pdf

[WP29-WP153] http://ec.europa.eu/justice/policies/privacy/docs/wpdocs/2008/wp153_en.pdf

Page 27: 09-12-2016 Deliverable DNA3.5: Recommendations and Template … · 2017. 7. 14. · 09-12-2016 Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal

Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal Data Document Code: DNA3.5

25

Glossary

AA AttributeAuthority.Aninstancewhereattributescanbestoredandretrievedbasedonasuppliedidentity.Theseattributescanbeusedwithotherinformationandanidentitytomakeanauthorisationdecisionforthatidentity.

AAI AuthenticationandAuthorisationInfrastructureAUP AcceptableUsePolicyBCR BindingCorporateRulesCERN EuropeanOrganisationforNuclearResearchC-SIG CloudSelectIndustryGroupDN DistinguishedNameDPCoCo DataProtectionCodeofConduct.Aformalagreementamongstpartners.DPA DataProtectionAuthorityDPO DataProtectionOfficerEIROforum EuropeanIntergovernmentalResearchOrganisationsforumEGI EuropeanGridInfrastructrueEMBL EuropeanMolecularBiologyLaboratoryEU EuropeanUnionGDPR GeneralDataProtectionRegulation.ARegulationbywhichtheEuropeanCommissionintends

tostrengthenandunifydataprotectionforindividualswithintheEuropeanUnion.IaaS InfrastructureasaServiceID IdentityIdP IdentityProvider.Apartythatmanagesidentitiesandprovidesaninterfacetothoseidentities.JRA1 JointResearchActivity1ArchitecturesMC ModelContractsMoU MemorandumofUnderstandingNA3 NetworkingActivity3PolicyHarmonisationPaN PhotonandNeutronSourceFacilityPII PersonalIdentifiableInformation.Informationthatcanbeusedorcombinedwithotherdata

sourcestoleadtopersonalinformationlikename,sex,religion,address,etc.PRACE PartnershipforAdvancedComputinginEuropeREFEDS TheResearchandEducationFEDerationsgroup,whichtriestoarticulatethemutualneedsof

researchandeducationidentityfederationsworldwide.RI ResearchInfrastructureSA1 ServiceActivity1PilotsSP ServiceProvider.Apartyofferingoneormoreservicestoexternalusers.Forexample,

computeservices.T5 Task5AccountingandProcessingofDataUUID UniqueUserIdentifierVO VirtualOrganisationWLCG WorldwideLargeHadronColliderComputingGrid

Page 28: 09-12-2016 Deliverable DNA3.5: Recommendations and Template … · 2017. 7. 14. · 09-12-2016 Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal

Glossary

Deliverable DNA3.5: Recommendations and Template Policies for the Processing of Personal Data Document Code: DNA3.5

26

WP29 Article29DataProtectionWorkingPartyWUO Web-basedUserOffice