norwegian research center for computers and law · • annex 17: • the foundations of an...

56
Norwegian Research Center for Computers and Law Privacy and Data Protection: Data protection in a particular context: Civil aviation Olga Mironenko Enerstvedt 13 th March 2012

Upload: others

Post on 14-May-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

Norwegian Research Center for Computers and Law

Privacy and Data Protection: Data protection in a particular context: Civil aviation Olga Mironenko Enerstvedt 13th March 2012

Page 2: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

Disposition

• Development of anti-terror security measures • Regulatory framework • Personal data transfer • Body scanners

Page 3: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

Background • The right to privacy and data protection are

fundamental human rights. • Effective security must be ensured in the civil

aviation sector. Security measures are intended to keep a high level of security and protect our lives.

• Some security measures have a serious impact on privacy and data protection.

↓ A conflict arises between the use of these security

measures and the protection of these rights.

Page 4: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

History

• First flight - 17 December 1903, USA • The first recorded aircraft hijacking - 1930, Peru • First act of air sabotage:

• 10 October 1933, USA • Nitroglycerin bomb • 4 passengers and 3 crew members crashed near Chesterton, Indiana.

Page 5: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

Terror against aviation: three phases 1. 1948 - 1968 “Escape from persecutors” 2. 1968 - 2001 “Political phase” 3. Aftermath of 9/11 and recent developments

Page 6: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

Apart from terrorist threat:

• serious crime • attacks on the data integrity of

communications networks • attacks on the information and personnel

management systems • chemical, biological, radiological, and

explosive threats, etc.

Page 7: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

International regulation overview • Chicago Convention (1944) – establishment of the ICAO • Tokyo Convention (1963) • Hague Convention - “Hijacking Convention” (1970) • Montreal Convention - “Sabotage Convention” (1971) • Chicago Convention, Annex 17 – Security (1974) • Bonn Declaration (1978) • Montreal Supplementary Protocol (1988) • Convention on the Marking of Explosives (1991) • Beijing Convention 2010 (transport of biological, chemical,

and nuclear weapons)

Page 8: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

ICAO • established by Chicago Convention (1944) • a specialized agency of the UN charged with

coordinating and regulating international air travel • consists of government representatives of member

states (190) In the security field:

• policy initiatives • audits of its member states • assistance to states that are unable to address

serious security deficiencies highlighted by audits

Page 9: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

ICAO • Annex 17:

• the foundations of an international aviation security program and minimum aviation security standards

• each state must have a civil aviation security organization

• each airport and airline must have a security program • ICAO Doc 8973 - the Security Manual for Safeguarding

Civil Aviation Against Acts of Unlawful Interference (Supplementing Annex 17 )

• Legal and technical regulations and procedures to prevent and suppress acts of unlawful interference

• Standards and Recommended Practices (SARPs)

Page 10: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

ICAO’s regulations, guidelines and Standards and Recommended Practices (SARPs)

• According to the text they are mandatory for contracting states

• the states are obliged to report about deviations

• BUT there are no enforcement mechanisms ↓

Endeavors to make global standard approaches are facing major challenges

Page 11: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

EU Regulation • First common rules in the field of civil aviation

security (Regulation (EC) No 2320/2002) - Now Regulation (EC) No 300/2008

• Regulation (EC) No 272/2009 supplementing the common basic standards on civil aviation security laid down in the Annex to Regulation (EC) No 300/2008

• Regulation (EC) No 185/2010 laying down measures for the implementation of the common basic standards on aviation security

Page 12: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

National regulation • UK (EU member): Aviation Security Act (1982),

Airports Act (1986), Aviation and Maritime Security Act (1990), Terrorism Act (2000), Aviation (Offences) Act (2003), etc.

• Norway (EEA member): Aviation Legal Act (1993), Regulation on Security in Aviation (2004)

• USA: The US Aviation and Transportation Security Act (2001), US Homeland Security Act (2002), etc.

Page 13: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

International organizations – European Civil Aviation Conference (ECAC) – International Air Transport Association (IATA) – International Air Carrier Association (IACA) – Association of European Airlines (AEA) – European Regions Airlines Association (ERA) – Airports Council International (ACI) – Aviation Security Services Association – International

(ASSA-I) – European Organization for Security (EOS) – Security Industry Association (SIA) – etc.

Page 15: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

(2)

• 2001 - “shoe bomber” • 2004 - Madrid train bombings – API in the EU • 2006 - liquid explosives • 2007 - car-bomb attacks in Glasgow and

London – Plan of European PNR system • 2009 - “underwear bomber”

Page 16: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

Security measures

• Metal detectors • Hand search • Camera surveillance and CCTV • Transfer of data • Profiling • Biometrics • Scanners • ???

Page 17: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

Impact on human rights

• Privacy • Personal dignity • Data protection • Freedoms of thought, conscience and religion • Non-discrimination • The rights of child • Impact on health • etc.

Page 18: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

Dilemma:

? BALANCE?

?

rights to life and safe travelling

rights to privacy and data protection

need for security privacy-related interests

Page 19: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

The solution

• Security measures must be accompanied by strong and adequate safeguards which satisfy and ensure the human rights requirements.

• All aviation security measures should respect the principle of proportionality as justified and necessary in a democratic society.

• In addition to legal norms, the means for ensuring their effective application should be established as well. It is important that all actors implement the regulations, practices and measures.

Page 20: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

Personal data transfer • The initial purpose of collecting passenger data by the

airlines is to document commercial air transportation. • 1944 - Chicago Convention. Art.29 requires every

aircraft to carry certain documents, including, for passengers, “a list of their names and places of embarkation and destination”.

• 1990s - Computer Assisted Passenger Prescreening System (CAPPS) in the USA

• 2001- The US Aviation and Transportation Security Act - the Passenger Name Records (PNR) system. All international airlines had to provide the USA with electronic access to data on all travelers registered in the airline's computer system.

Page 21: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

(2) • 2003 - CAPPS II • 2004 - Secure Flight • 2004, 2006, 2007 - agreements on PNR transfer

between the EU and the USA • 2004 - API in the EU (Council Directive 2004/82/EC of

29 April 2004) • 2006 - PNR agreement between the EU and Canada, • 2008 - PNR agreement between the EU and Australia • Some countries are also using PNR data (the UK, New

Zealand, South Korea, Japan) • Many European states have enacted primary legislation

on PNR or are testing using PNR data, and other countries are considering the use of PNR

• 2007 - Proposal of the European PNR system

Page 22: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

Advanced Passenger Information (API)

Passenger Name Record (PNR)

API Guidelines by WCO, IATA and ICAO (2003)

PNR Data Guidelines by ICAO (2005)

Collected on behalf of governments Airlines collect PNR for their own needs Serve border control and

immigration purposes Initially served commercial purposes

Derive from travel documents information (machine readable zone

of a passport)

All the data that the passenger submits to the reservation system (up to 60 fields). May include

sensitive data. Data cannot be deleted, even if cancelled. The system is not restricted to a

specific flight. Include data on other customers. Contain only validated biographical

data Completeness or accuracy not guaranteed. May not be fully updated on the date of departure.

The data is captured by the carrier prior to the departure

PNR may be created in a reservation system up to 360 days in advance

API records are created for each passenger

May include multiple passengers within the same record; data on several people: traveler,

agent, staff, person paying for the ticket...

Page 23: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

PNR transfer between the EU and the USA

• Problems: • The data controller can process personal data only if

processing is compatible with the original purposes of data collection (DPD Article 6)

• The transfer of personal data from the EU/EEA to the countries lacking adequate level of protection is prohibited (DPD Article 25).

Page 24: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

Protection afforded by the USA • The USA is not legally bound by any of the international

data protection instruments. • In the USA the right to privacy is protected by common

law mechanisms. • Privacy Act of 1974 protects personal information only

when it is processed by the federal government. • The USA has no general law protecting the privacy of

“commercial” data. • The airlines could allow the US government agencies to

look at the data without the knowledge or consent of the data subjects.

• The USA cannot be considered as a country with adequate level of data protection.

Page 25: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

As the result: After the introduction of the new security measures

in the USA, the European airlines found themselves in a difficult situation:

,.

to fly from the EU to the US

refuse to transmit the data, thereby becoming

subject to US authorities’ sanctions

deliver the data in violation of the EU law

?

Page 26: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

Solution

• The problem of the lack of adequate level of protection in the USA could be resolved by concluding an agreement, where adequate safeguards could be provided.

• For a contractual provision to provide adequate safeguards, it must satisfactorily compensate for the absence of a general level of adequate protection by including the essential elements of protection which are missing in the particular situation (Article 29 Working Party Opinion 12/98 of 24.07.1998).

Page 27: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

PNR Agreement between EU and USA (2004, 2006 and 2007)

• The negotiations were pushy on the US side of the table. • Despite the parties tried to provide “safeguards”, the agreement

failed to offer an adequate level of data protection and left many problems open.

• The agreement was needed ASAP to avoid legal uncertainties for the EU member states, passengers and carriers, thus it was preferable to have an agreement with weaknesses and shortcomings, rather than not to have one at all.

• The agreement was more a political solution than a legal instrument. • The deal provoked widespread privacy and security concerns. • US is still trying to dictate tougher restrictions and get additional data

from EU member states individually.

Page 28: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

The weakest points of the Agreement: • legal force and effect • inadequate data protection standards • scope of the agreement uncertainty • lack of purpose limitation • “pull”/”push” system issues • unclear joint review procedure • extended retention period • enlarged list of data fields (19) • sensitive data issues • no clear list of US authorities entitled to access PNR • problem of enforcement of rights by the EU citizens • dependence on change in the US legislation, etc.

Page 29: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

Proposed European PNR System • Proposal for Directive on use of PNR data for purposes of

combating terrorism (Brussels, 2.2.2011, COM(2011) 32 final) - First Proposal in 2007, second in 2009. • Decentralized system of data collection • Passenger Information Unit (PIU) as recipient of the data in

each member state • 19 PNR data elements • flights to/from the EU, excluding intra-EU and domestic flights • two data transmissions: one 48 hours before the flight takeoff

and one when the flight has completed boarding • It is not mentioned but EU-USA PNR scheme is used as a

model

Page 30: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

Proposed European PNR System (2) • The Proposal fails to demonstrate the necessity and the proportionality

of a system (?) The efficiency of the measures? • Unclear relationship with other measures, such as Electronic System

for Travel Authorization (ESTA), biometrics in passports, Schengen Information System (SIS), Visa Information System (VIS), national border protection schemes.

• The scope of application: “terrorist offences and serious crime”. • PIU can use the data for profiling purposes, may compare PNR data

against “relevant databases”, share with other PIU and agencies. • 30 days of retention, with an additional period of five years in archive • a certain amount of data is “masked out” after 30 days (data is not

anonymised; access to the full PNR data is always available to the Head of the PIU)

• sensitive data issues

Page 31: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

Real-world experiences • The request to the US Department for Homeland

Security from a member of European Parliament Sophia In 't Veld to receive PNR information pertaining to her (2007).

• The request to KLM Airlines from an American privacy advocate Edward Hasbrouck to see the records of his trip from the US to the EU and back (2007).

Page 32: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

In summary • Air passenger data have already become one of the most

important sources for surveillance in the air traffic. • There are doubts about whether the collection of data is

necessary and adds value to the fight against terrorism/serious crime.

• ICAO’s Guidelines are not binding and they deal insufficiently with data protection issues.

• Even if some protection to human rights is given, it is not necessary effective.

• Political issues and policies which effect the security and privacy regimes greatly. A lot of the decisions and rules are based on political approaches and are therefore more political solutions rather than legal instruments.

Page 33: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

BODY SCANNERS • 1992 - The first body scanner was created by

Dr. Steven Smith in the USA - a technology that is capable of detecting objects carried under clothes.

• 2006 - The first airport with body scanners –Schiphol in the Netherlands.

• 25 December 2009 - “underwear bomber”. • The list of airports currently deploying

scanners is constantly growing and includes airports in the USA, the UK, Russia, etc.

• deemed to be one of the technical solutions required to keep a high level of security.

• impact on privacy and data protection as well as other fundamental rights and health.

Page 34: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

Technologies: X-ray backscatter Active millimeter wave

Terahertz waves X-ray transmission scanners

Page 35: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

Emerging technologies • a millimeter-wave system that would take up less space

and would not require passengers to stop and stand still • integrating the scans devices into airport building

structures, different objects of the checkpoints, etc. • Flight Assistance Security Trolley • 21 feet long “smart tunnel” combining all existing and

imminent security technology, including body scanners and liquid detectors in one place

BUT • over reliance on technology may have a negative effect • technology can never be the “sole solution”, but only a

means of reacting • 100% security can never be achieved

Page 36: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

Regulation

• The ICAO does not give any guidance on scanners.

• No common definition of a “body scanner”. • Various terms are in use, such as “security

scanner”, “whole-body scanning”, “advanced imaging technology”, “naked scanners”, “digital strip searchers”, etc.

Page 37: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

The USA

• The Transportation Security Administration (TSA) began deploying advanced imaging technology in 2007.

• There are currently 540 imaging technology units at 100 airports.

• By 2014 the USA plans to deploy 1800 scanners in order to gradually introduce them as a primary screening method

• There are several locations already where the scanners are used for primary screening

Page 38: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

(2) • 22 April 2009 - the US House of Reps passed “Aircraft

Passenger Whole-Body Limitations Act of 2009”. • A bill introduced in the US Senate in 2010 - Securing

Aircraft From Explosives Responsibly: Advanced Imaging Recognition Act (S.A.F.E.R. A.I.R. Act) makes scanners the primary screening technology by 2013.

• In 2010, the TSA began testing the new software for millimeter wave body scanners

• Opinions of opponents (for ex., the incident in San Diego on 13.11.2010, “Ban the Scan” rally in New York 2011).

Page 39: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

EPIC v. DHS • In 2009 and 2010 EPIC filed lawsuits seeking information pertaining

to the TSA body scanner program and to suspend the deployment of body scanners at US airports)

• On 15 July 2011 the appeals court upheld the use of body scanners to screen air travelers in the case EPIC v. DHS (N 10-1157).

• the Video Voyeurism Prevention Act does not apply to any “lawful law enforcement, correctional or intelligence activity”

• No violation of Privacy Act, because the TSA does not maintain data from AIT scanners in any system of records linked to names or any other identifier, nor had EPIC offered any reason to believe that the TSA had attempted to identify the images from any other sources.

• No violation of the Fourth Amendment which guards against unreasonable searches and seizures

• the TSA violated federal law when it installed body scanners in airports without first soliciting public comment (without conducting a “notice-and-comment rulemaking” procedure).

Page 40: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

The EU • Commission Regulation (EU) No 1141/2011 of 10

November 2011 allows the use of scanners which do not use ionising radiation

• Before, member states could introduce the use of the scanners either by exercising their right to apply security measures that are more stringent than existing EU requirements (Article 6 of Regulation (EC) 300/2008) or by exercising their right to conduct trials of new technical processes or methods for a maximum period of 30 months (Chapter 12.8 of the annex to Commission Regulation (EU) No 185/2010)

• Formal trials of scanners were undertaken in Finland, the UK, the Netherlands, France, Italy and Germany

Page 41: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

(2) • 5 September 2008 the European Commission proposed a

draft regulation including basic screening requirements to be further developed in legislation

• 23 October 2008 – Resolution of the EP requesting the Commission to carry out an impact assessment

• 15 June 2010 - the Commission’s Report which assesses the current situation with regard to the use of security scanning technology in terms of detection capacity, and compliance with fundamental rights and health protection regulations

• 6 July 2011 - EP resolution on aviation security, with a special focus on security scanners (2010/2154(INI)) to allow the full use of body scanners in the EU airports.

Page 42: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

Right to privacy European Convention on Human Rights Article 8: • “1. Everyone has the right to respect for his private

and family life, his home and his correspondence • 2. There shall be no interference by a public

authority with the exercise of this right except such as is in accordance with the law and is necessary in a democratic society in the interests of national security, public safety or the economic well-being of the country, for the prevention of disorder or crime, for the protection of health or morals, or for the protection of the rights and freedoms of others”

Page 43: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

Privacy

Applicability of ECHR Art. 8 (1): • The European Court of Human Rights has given ECHR

Article 8 a very broad interpretation. • The concept of private life includes elements relating to a

person's right to their image. • The mere storing of data relating to the private life of an

individual amounts to an interference.

Page 44: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

Safeguards for privacy Con arguments black and white silhouettes with blurred faces and other areas of the body

reveal very sensitive areas of private life and conditions, such as prostheses, breast implants, diapers, menstrual pads…

analysts are in separate rooms abuses

analyst of the same gender

automatic threat recognition can an algorithm replace a human being?

alternative screening methods not all airports have capacity and staff, a full hand search may cause more irritation and is more likely to be rejected

exemptions for the vulnerable groups risks

the image would not be saved and would be destroyed

the breach of privacy is constituted by first the production and then the analysis of the image

the right to privacy can be considered as waived by the passengers since the travelers make agreements with airlines which include security requirements

not all such waivers are automatically effective (ECtHR case law: a waiver, to be successful, must be unequivocal and attended by minimum standards)

Page 45: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

Applicability of ECHR Art. 8 (2):

Given applicability of Article 8 (1), it is important to indicate:

• whether the interference is in accordance with the law.

• if the scans satisfy to the legitimate aim, proportionality and necessity principals.

Page 46: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

In accordance with the law? • Commission Regulation No 1141/2011 allows the use of scanners

which do not use ionising radiation, but does it have the quality of law? • Gillan and Quinton v. UK (2010): the discretionary powers of stop and

search in the UK Terrorism Act 2000 to be a breach of Article 8, notwithstanding that it was provided for by a statutory measure.

• ECJ in Yassin Abdullah Kadi and Al Barakaat International Foundation v Council and Commission (2008): even provisions with an ostensible basis in European law may yet lack the qualities of law by contravening common European human rights standards and thereby may be contrary to common European law.

• The introduction of body scanners may be regarded as not being “in accordance with the law” if the regime fails to contain sufficient safeguards to protect fundamental rights from arbitrary interference (?).

Page 47: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

Legitimate aim, proportionality and necessity? Pro arguments: • The use of the machines is justified and necessary in order

to heighten security measures at airports and better protect the traveling public.

• They are more effective than metal detectors as they are capable of identifying both metallic and non-metallic objects, including plastic and liquid items.

• They are supposed to improve passenger flow. In contrast to manual searches requiring 2–3 minutes, the machines take only seconds to produce and interpret passenger data.

• The use of scanners are thought to be less invasive than manual searches.

Page 48: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

Contra arguments: • are not universally deployed in all member states, but

unilaterally in some of them, only at some airports and according to different rules and procedures

• are primarily taken on a preventive basis towards innocent persons

• it has to be demonstrated that other less intrusive methods were not available (see ECJ C-92/09 Volker and Markus Schecke GbR v. Land Hessen and C-93/09 Eifert v. Land Hessen and Bundesansalt für Landwirtschaft und Ernährung, 9.11.2010).

• if there is at least one type of body scanners which is less intrusive, why are the scanners providing a “naked” image of the body still in operation?

Page 49: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

(2) • Cannot detect explosives carried inside the body. • May not be able to distinguish foreign objects such as

prosthetics and weapons. The percentage of false positives is high and it may increase the need for manual searches.

• An extremely finite period of time means evidence might be missed. Moreover, the operators may not have the required technical expertise to intercept the data.

False alarms Missing objects

Page 50: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

(3)

• Price: EUR 100 000 - 200 000 per item, excluding training, installation, and maintenance costs.

• The scanners are being implemented as a reaction to past situations. According to many security experts, such an approach will fail to anticipate the next bomber.

• Measures taken to address privacy concerns over the use of the scanners may dampen the machines' effectiveness in locating arms and explosives.

Page 51: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

Right to data protection Do the images constitute personal data? • It is stated that the image shall not be linked to any data concerning

the screened person and his/her identity shall be kept anonymous BUT • the image provided by the scanner will still allow for the indirect, if

not direct, identification of the data subject • identification is possible since the image will be used to decide

whether the passenger can access security restricted areas • the image itself might still be indirectly related to the data subject,

especially if the screener cannot determine whether or not the passenger is carrying prohibited articles or if the passenger is not cleared

• the images may include sensitive data, because they consist of data revealing the data subject’s racial or ethnic origin, religious beliefs, and data concerning health and sex life

Page 52: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

Does the use of body scanner constitute the processing of personal data?

• the DPD defines “processing” as any operation performed upon personal data

• the use of the data, even if it is not recorded, falls within the definition of “processing”

Page 53: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

The storage and retrieval of images • “the images cannot be stored, transferred, copied, or printed, and

are permanently removed” BUT • Lack of complete, comprehensive and reliable information • The agencies need to retain the images as evidence, for testing and

training purposes, or for later inspection to find out what went wrong with the scans if there were a successful terrorist attack.

• The TSA's Procurement Specs require that the machines have the ability to record and transmit images;

• TSA confirmed it possesses about 2000 scanner photos from devices that the TSA said earlier “could not store or record images”.

• The experts admit that the images are still being captured and stored by these “changed” devices.

• Lack of special legal provisions to regulate and limit storage (retention period)

Page 54: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

Information to passengers

• According to the transparency and data subject participation principle, data subjects should be informed of the data processed, purposes of such processing and the identity of who is collecting their data.

• The US S.A.F.E.R. A.I.R. Act: passengers shall be provided with (i) information about the images; (ii) information regarding the privacy protections; (iii) sufficiently detailed notice and an explanation of the alternative option for primary screening.

• The EU Commission proposes that appropriate, comprehensive and clear information on all aspects of scanner usage should be provided to the public at airports, before travelling.

• These proposals do not give sufficient details about how appropriate, comprehensive and clear information can be provided to the passengers in reality, before travelling and before purchasing the tickets, and who will be responsible for the information provision.

Page 55: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

In summary

• It can be concluded that deployment of scanners

cannot be currently regarded as in compliance with all the established data protection requirements and privacy standards.

Page 56: Norwegian Research Center for Computers and Law · • Annex 17: • the foundations of an international aviation security program and minimum aviation security standards • each

Thank you for your attention!

Comments? Questions?