I have been involved in drawing up or reviewing numerous Data Processor
contracts and Data Sharing agreements between joint Data Controllers. In
every case I have recommended a clause specifying that the Data Processor
cannot subcontract anything without prior agreement of the Data Controller
(not to be unreasonably withheld) and no joint Data Controller can
subcontract anything without agreement from the other(s). Obviously - to my
mind - if someone agrees to any sub-contracting arrangement they accept
their share of the responsibility for it.
Best wishes,
Paul
Paul Ticher
0116 273 8191
www.paulticher.com
22 Stoughton Drive North, Leicester LE5 5UB
For continuous priority support on Data Protection, sign up to my support
service:
www.paulticher.com/data-protection-services
----- Original Message -----
From: "Lawrence Serewicz" <[log in to unmask]>
To: <[log in to unmask]>
Sent: Friday, October 04, 2013 11:45 AM
Subject: Re: WP29 Opinion on data processors (who faces the music?)
> Dear All
>
>
>
> Following on from this issue, with the Scottish Borders Breach issue in
> the background, we can say the following based on my reading of the ICO
> guidance.
>
>
>
> In any contract, there is a data controller (DC) and a data processor (DP)
> or a joint data controller (DC and DC).
>
>
>
> If you have the DC to DP contract, the DC needs to ensure that the DP meet
> duties of principle 7 and other issue associated with their role as DP ie
> instructions from the DC.
>
>
>
> If you have the DC to DC contract, then you need to negotiate who is doing
> what in regard to the PD ie who handles SARs and who handles security.
>
>
>
> However, where I start to get fuzzy (it being Friday) is where the
> relationship is DC to DC and the other DC sub contracts, ie obtains a DP
> for the work. I can see a situation where an organisation wants to
> deliver a service, it commissions someone to do it, the other data
> controller. The second data controller, in turn, subcontract it to a DP
> to do the work.
>
>
>
> In that scenario is the first organisation, the one that commissioned the
> work still a joint data controller for that Data Processor? By that, does
> the Data protection responsibilities passport through? If so, is that to
> be negotiated between the DCs? I think so, but I wanted to check what
> others view.
>
>
>
> A related scenario is that the first DC contracts with another DC to
> deliver a service. The second data controller does all of the work
> dealing with the clients, collecting their data, processing it, and
> storing it to deliver the service.
>
>
>
> If something goes wrong, is the original DC still responsible for the
> breach (assuming the contract does not make it clear about DP
> responsibilities)?
>
>
>
> I would say yes, *unless* it is clear in the contract between the DCs that
> the second DC, who suffered the breach, is responsible for the security of
> the data. If that is not in the contract, then the two DCs act as joint
> data controllers full stop for everything as they have not made it clear
> in the contract who is responsible for what.
>
>
>
> I would be interested in your thoughts on these scenarios.
>
>
>
> The lesson would be that if you are a DP and your DC does not spell out
> the DPA requirements they can get away with a lot because it is the DC who
> is on the hook to the ICO re DPA breaches.
>
>
>
> Best,
>
>
>
> Lawrence
>
>
>
>
>
> -----Original Message-----
> From: This list is for those interested in Data Protection issues
> [mailto:[log in to unmask]] On Behalf Of Andrew Cormack
> Sent: 02 October 2013 08:35
> To: [log in to unmask]<mailto:[log in to unmask]>
> Subject: Re: [data-protection] WP29 Opinion on data processors
>
>
>
> Worth making sure that your contractor knows that having signed a contract
> as Data Processor they *can't* then independently determine purposes and
> means. I've come across too many situations where a contractor asserted
> they were a data processor, but nonetheless went off and did their own
> thing with the data or refused to follow the Data Controller's
> instructions in other ways :(
>
>
>
> Andrew
>
>
>
> --
>
> Andrew Cormack
>
> Chief Regulatory Adviser, Janet
>
> t: +44 1235 822302
>
> b: https://community.ja.net/blogs/regulatory-developments
>
> Janet(UK) is a trading name of Jisc Collections and Janet Limited, a
> not-for-profit company which is registered in England under No.2881024 and
> whose Registered Office is at Lumen House, Library Avenue, Harwell Oxford,
> Didcot, Oxfordshire, OX11 0SG. VAT No. 614944238
>
> ________________________________
>
>
> Help protect our environment by only printing this email if absolutely
> necessary. The information it contains and any files transmitted with it
> are confidential and are only intended for the person or organisation to
> whom it is addressed. It may be unlawful for you to use, share or copy the
> information, if you are not authorised to do so. If you receive this email
> by mistake, please inform the person who sent it at the above address and
> then delete the email from your system. Durham County Council takes
> reasonable precautions to ensure that its emails are virus free. However,
> we do not accept responsibility for any losses incurred as a result of
> viruses we might transmit and recommend that you should use your own virus
> checking procedures.
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> All archives of messages are stored permanently and are
> available to the world wide web community at large at
> http://www.jiscmail.ac.uk/lists/data-protection.html
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask]
> All user commands can be found at
> http://www.jiscmail.ac.uk/help/commandref.htm
> Any queries about sending or receiving messages please send to the list
> owner
> [log in to unmask]
> Full help Desk - please email [log in to unmask] describing your
> needs
> To receive these emails in HTML format send the command:
> SET data-protection HTML to [log in to unmask]
> (all commands go to [log in to unmask] not the list please)
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>
>
>
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving messages please send to the list owner
[log in to unmask]
Full help Desk - please email [log in to unmask] describing your needs
To receive these emails in HTML format send the command:
SET data-protection HTML to [log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|