Sunteți pe pagina 1din 4

Influence of the Internet of Things on Legislation Regarding the Protection of Individual Privacy

Jean-Franois Henrotte
Partner in the elegis law firm and Director of the Revue du Droit des Technologies de lInformation www.elegis.eu www.rdti.be jf.henrotte@elegis.be

Abstract
The Internet of Things, considering its characteristics, calls for developing third-generation data protection with a new field of application and greater use of the technology itself for resolving the problems it poses.

todays societal challenges4, more and more authors are also pointing out that it calls into question our concept of private life and its protection. The right to protect private life has evolved gradually over the years, mirroring technological progress5. Firstgeneration laws on the protection of individual privacy were founded on Article 8 of the European Convention for the Protection of Human Rights6. This first-generation basically grants a right to be left alone 7. Protection is understood as a prohibition on processing certain sensitive 2006; Poullet, Y., "La protection des donnes: un nouveau droit constitutionnel. Pour une troisime gnration de rglementations de protection des donnes" 297 and Rouvroy, A., "Privacy, Data Protection, and the Unprecedented Challenges of Ambient Intelligence", Studies in Ethics, Law, and Technology, 2008, available at the address: http://works.bepress.com/antoinette_rouvroy/2; 4 See the Communication from the Commission to the European Parliament, the Council, the European Social and Economic Committee and the Committee of the Regions "The Internet of Things - an action plan for Europe" COM(2009) 278 Final, 2. 5 Poullet, Y., " La protection des donnes: un nouveau droit constitutionnel. Pour une troisime gnration de rglementations de protection des donnes", www.crid.be/pdf/public/5188.pdf. 6 The European Convention for the Protection of Human Rights of 4 November 1950, conventions.coe.int/Treaty/EN/Treaties/Html/005.htm 7 The famous "Right to be left alone" defended by Warren, S., and Brandeis, L., in their article: "The right to privacy", 4, Harvard Law Rev., 193 (1890), groups.csail. mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_ warr2.html.

Introduction
Network technology as we know it, with the Internet centre-stage, is on the dawn of another quantum leap. Progress on miniaturization and wireless communications presage the imminent interconnection of the things surrounding us, to form a vast network: "the Internet of Things"1. In this scenario, seriously envisaged by several governments worldwide2, things used in daily life will communicate with each other or to other entities (people or machines) information they have collected on their environment, using their various sensors. Although this permanent interconnection, this ambient intelligence 3, is expected to contribute to addressing

See the 2005 report of UIT www.itu.int/dms_pub/itus/opb/pol/S-POL-IR.IT-2005-SUM-PDF-E.pdf; or the 2001 report of ISTAG ftp://ftp.cordis.europa.eu/pub.ist/ docs/istagscenarios2010.pdf. 2 See the Communication from the Commission to the European Parliament, the Council, the European Social and Economic Committee and the Committee of the Regions "The Internet of Things - an action plan for Europe" COM(2009) 278 Final or the NIC report: "Global trends 2025: the national intelligence council's 2025 project", www.dni.gov/nic/NIC_2025_project.html. 3 Greenfield, A., "Everyware: the dawning age of ubiquitous computing", New York, New riders publishing,

86

data and protecting various spheres, both physical and communications-related. In recent years, technological progress led to secondgeneration laws on the protection of individual privacy (Convention no. 108 of the Council of Europe8, Directive 95/469 or Article 8 of the European Charter of Human Rights10) which while remaining concerned with data and its nature, focus on data processing. The processing of personal data gives rise to a disparity of information between the party processing the data and the person to whom that data relates. The disparity results in an imbalance of power to the detriment of the person whose data is being processed. The emphasis is now on rules governing data processing and the need for transparency, in order to restore the balance and guarantee an informational right of self-determination for all11.

Calling key concepts into question


Life-changing technology
The Internet of Things is based on technology with acronyms like RFID (for Radio Frequency Identification) chips, geo-location via GPS (for Global Positioning System) or NFC (Near Field Communication) etc. This ambient intelligence" technology creates a new type of data or even a new generation of data. The data is linked to possession of an object belonging to a person.
8

The data no longer directly concerns the actual person - but an object belonging to them. 12. This allows monitoring indirectly but with certainty, the behavior of the objects owner and even predicting future behavior through an analysis of the latters habits. The example of the RFID chip speaks volumes in this regard. The route taken by anyone carrying a card fitted with this type of chip can be tracked easily. All they need to do is walk in front of terminals fitted with the same technology. The technology records habits without any visible physical contact between the reader and the tag; the card-holder may remain blissfully unaware of this happening. Notably, this allows creating made-to-measure advertising and knowing where and when to display it. In fact, imagine the owner of an RFID card bought a large number of books of the same genre at a bookshop. On walking past an RFID terminal at a bookshop in the same chain the card-holder is struck by an advertising message recommending them to purchase a particular book in the same genre! Better still, a discount voucher could be displayed for an item not usually purchased by the card holder, in order to optimize the marketing budgets: why grant a reduction for an item the card-holder will to all intents and purposes, purchase? The technology can thus anticipate and create expectations in the consumer.

revolutionizing the law!


The law must in turn adapt to the new technological developments. At present, the second-generation of data protection regulations appears powerless to regulate the "Internet of Things". The protection of individual privacy will henceforth be achieved through the protection of objects-related data. Those responsible for processing data are no longer concerned as to the identity of the subject (if they were in fact, ever so concerned), for the technology now allows achieving far more efficient results without the unique identifier of personal identity. Without "identifiability" at the centre of the definition of personal data13, the second-generation of laws are not applicable. The issue of the subjects consent is also central to the "Internet of Things". In fact, with the arrival of personal data protection consent to process personal data was obtained from the subject, prior to collection of the data. With the emergence of ambient intelligence, consent is no longer sought systematically for each processing event on the pretext of increased convenience. In fact, compiling data is performed more insidiously - without consulting the subject. The data is gathered from an object owned by them. Thanks to this technology, the data processer can
12

The Convention of 28 January 1981 on protection from the automated processing of personal data conventions.coe.int/Treaty/EN/Treaties/Html/108.htm. 9 Directive 95/46/EC of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, OJEC L 281, 23 November 1995, 3150 ; www.eur-lex.europa.eu. 10 Charter of Fundamental Rights of the European Union, OJEC C 303, 14 December 2007; www.eur-lex.europa.eu. 11 Right enshrined by the Karlsruhe Federal Constitutional Court 15 Dec.1983, EuGRZ, 1983, 588 and f. On this decision, see Riedl, E.H., "New bearings in German Data Protection", Human Rights Law Journal, 1984, Vol. 5, no.1, 67 and s; Brouwer, E., Digital Borders and Real Rights, Nijmegen, Wolf Legal Pub, 2007. On 27 February the German Federal Constitutional Court recalled this decision and on the basis of the same reasoning, proclaimed a new constitutional right: "the right to guaranteed confidentiality and integrity of information systems" (Das Recht auf gewhrleistung der vertraulichkheit und integritt informationtechnischer Systeme) MMR, 2008, 303 with a critical note from Hoeren, T., (MMR, 2008, 366); RDTI, 2009/34, http://www.rdti.be with a note from De Hert, P., de Vries, K., and Gutwirth, S.

In fact, in the Internet of Things, the data collected are not personal except by a consequential effect. The data refers to an object, itself linked to the person possessing it. 13 Article 2, a) of Directive 95/46.

87

today dispense with the consent of the subject to the collection of data and the latter thus forfeits control over the information14 they wish to provide. Again, the case of the RFID chip15 illustrates the argument very well. The technology is already widely installed, facilitating an analysis of its impact in the legal context. Consider, for example RFID chips incorporated in the satchels of children attending school nurseries in order to monitor their attendance and then bill the parents accordingly. Another example which comes to mind is the Mobib travel card issued by the Brussels public transport company, also fitted with a RFID chip to speed up and facilitate the throughput of passengers and payments for tickets. In both cases, what consent does the subject give? Is it really informed? Even leaving out the issue of the position of the children involved 16, the parents do not really have many options other than to accept the chip, unless they send their child to another nursery. The same situation applies to the commuter. Consent, given once for the insertion of the chip in casu, is not subsequently repeated. As a result, the incorporation of new technology in daily life becomes ever more commonplace, in the name of increased convenience.17. Confronted by the changes, the concept of consent - central to the right to privacy in personal life - must be reviewed as part of the process. What solutions should we commit to? Should we envisage a technical solution to this technical problem18, a third generation of legislation as advocated by Yves Poullet?

The European Commissions action plan as a premise of additional protection for individual privacy
The European Commission considers that RFID technology and the Internet of Things are factors promoting growth and employment, capable of improving the quality of life and improving efficiency. Notably in the fight against counterfeiting, the management of electronic waste and hazardous substances. Yet the Commission has not closed its eyes to the collateral damage the arrival of this technology could cause. Its ambition is thus to control the emergence of the phenomenon so the ethical aspects are taken into consideration, ensuring the Internet of Things is an Internet of Things for Individuals. In a communication dated 15 March 200719 the Commission stated further details and information would be provided on the issues of data protection and individual privacy raised by RFID applications. This was accomplished by the recommendation of 12 May 2009 on implementing the principles of respect for individual privacy and data protection in radiofrequency-based identification applications.20. On 18 June 2009 the Commission also adopted a communication entitled The Internet of Things an action plan for Europe21, which seeks to address all the consequences of the emergence of the Internet of Things. In 2010 the Commission intends to publish a broader Communication on privacy and trust in the ubiquitous information society22. Recommendation 2009/387/EC is of interest insofar as it is one of the first European documents 23 which, without

In this connection: Rouvroy, A., and Poullet, Y., "The right to informational self-determination and the value of self-development. Reassessing the importance of privacy for democracy", Reinventing Data Protection, Netherlands, Springer, 2009, 45 and f. 15 DUMORTIER, F., "Lutilisation de la biomtrie et des RFIDs dans le cadre de lespace europen de libert, de scurit et de justice : une affaire de balance ou une question de dignit ?", ERA Forum 9.4 (2009). 16 On this topic see: Opinion of the Article 29 Group 2/2009 on the protection of personal data regarding children General principles and the special case of schools), WP 160 of 11 February 2009, ec.europa.eu/justice_home/fsj/privacy/docs/wpdocs/2009/ wp160_fr.pdf. 17 Dumortier, F., Moiny, J.-Ph., Van Gyseghem, J.-M., Venet, O., Hertmans, O., and Laurent, M., "Un badge l'cole, la puce l'oreille !", Le Soir, 25/09/2008, www.lesoir.be. 18 Poullet, Y., " La protection des donnes: un nouveau droit constitutionnel. Pour une troisime gnration de rglementations de protection des donnes", 357. Yves Poullet quotes Clarke, C., "The answer to the machine is in the machine", in The future of Copyright in a digital

14

environment, Hugenholtz, B., (ed. Kluwer), 1996, 139 and f. 19 "Identification by radiofrequency (RFID) in Europe: towards a political framework", COM(2007) 96 final, www.eur-lex.europa.eu. 20 Recommendation 2009/387/CE, OJEC L 122 of 16 May 2009, www.eur-lex.europa.eu. 21 COM/2009/0278 final, www.eur-lex.europa.eu. 22 COM/2009/0278 final, 6, www.eur-lex.europa.eu. 23 Yves Poullet see already in Directive 2002/58 of 12 July 2002 on the processing of personal data and the protection of individual privacy in the electronics communications sector, the forging of the third generation (Poullet, Y., collaboration Henrotte, J.-F., "La protection des donnes ( caractre personnel) lheure de lInternet" in Protection du consommateur, pratiques commerciales et Technologies de lInformation et des Communications, CUP, LouvainLa-Neuve, Anthemis, March 2009, vol. 109, 231 and f.

88

being mandatory, is clearly moving towards a third generation of data protection for the retail trade. Retailers must conduct an assessment of the implications of the application implementation for the protection of personal data and privacy, including whether the application could be used to monitor an individual24. Whether or not there is a likely threat to privacy or to the protection of personal data, operators should inform individuals of the presence of tags that are placed on or embedded in products using a common European sign, developed by European standardisation organisations, with the support of concerned stakeholders25. The Commission then details implementing consumers right to the silence of the chips26 . If the privacy and data protection impact assessment concludes that tags that are used in a retail application and would remain operational after the point of sale represent a likely threat to privacy or the protection of personal data, retailers are obliged to deactivate or remove the tags at the point of sale, immediately and free of charge for the consumer, unless consumers, after being informed of the policy, give their consent to keep tags operational. The deactivating of tags shall not require the active involvement of the consumer27. Even if the privacy and data protection impact assessment concludes that tags that would remain operational after the point of sale do not represent a likely threat to privacy or the protection of personal data, retailers 28 should make available free of charge an easy means to,

immediately or at a later stage, deactivate or remove these tags29. Deactivation or removal of tags should not entail any reduction or termination of the legal obligations of the retailer or manufacturer towards the consumer. This represents substantial progress, since unlike Directive 2002/5830 and its Article 5.3, the recommendation provides that consumers mindful of the need to protect their privacy, should not be penalized.

Conclusions
Most players and authors concur in acknowledging that the Internet of Things poses a threat to individual privacy and the right to informational self-determination and that the present protection measures cannot remedy the situation given, inter alia, their restricted scope of application. The technology itself may afford a partial solution to the difficulties and threats it poses (for example, through the option of deactivating the chips) but it must be controlled (if the faculty exists, it must be clearly notified and not seek refuge behind non-use of the faculty). For the moment, no doubt in response to constant complaints about over-regulation, the European Commission is not legislating, but restricting itself to issuing recommendations to Member States and companies. Why not? The Commission will reassess the recommendations impact in three years time. Whether by self-regulation or legislation, the new practices created by this increasingly omnipresent technology must be controlled. The third generation of data protection (no longer exclusively for personal data) will not replace earlier ones but supplement them and adapt the law to changing technological practices 31.

Para. 5 of the recommendation. Para. 9 of the recommendation. Para. 7 of the recommendation, more ambiguous, since it provides this obligation "without prejudice to the obligations of data controllers, in accordance with Directives 95/46/EC and 2002/58/EC", presages the policy of a concise, accurate and easy to understand information policy to operators indicating the data that may be processed using the application, in particular if personal data will be processed and whether the location of the tags will be monitored, indicating that the information policy would apply even if there is no processing of data of a personal nature. 26 Expression borrowed from the communication "The Internet of Things - an action plan for Europe", COM/2009/0278 final, 6, www.eur-lex.europa.eu. 27 Para. 11 of the recommendation. 28 Only retailers processing data are covered by this provisions pursuant to para. 14 of the recommendation. Under the terms of para. 3.e) operator means the natural or legal person, public authority, agency, or any other body, which, alone or jointly with others, determines the purposes and means of operating an application, including controllers of personal data using an RFID application.
25

24

Acknowledgments
The author is especially grateful to Fanny Cotton, Jessica Dallapicolla and Alexandre Cassart for their collaboration for this paper.

Para. 12 of the recommendation. Directive 2002/58 of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector, OJEC L201, 31 July 2002, 37-47 ; eur-lex.europa.eu. 31 Poullet, Y., "La protection des donnes: un nouveau droit constitutionnel. Pour une troisime gnration de rglementations de protection des donnes", 356.
30

29

89

S-ar putea să vă placă și