GDPR Fun Fact #17: He Who Shall Not Be Named
There is a scary beast under every privacy attorney's bed. We try not even to look vaguely into its direction, let alone poke it, lest we wake it up. Please meet: Joint Controllership.
No organisation is fond of the notion of tying its fortunes – and liabilities – to the deeds and misdeeds of another. So understandably, in most cases where two organisations engage in a commercial relationship involving the processing of personal data by both of them, they will endeavour to disclaim any joint controllership under GDPR Article 26:
1. Where two or more controllers jointly determine the purposes and means of processing, they shall be joint controllers. They shall in a transparent manner determine their respective responsibilities for compliance with the obligations under this Regulation (...).
2. The arrangement referred to in paragraph 1 shall duly reflect the respective roles and relationships of the joint controllers vis-à-vis the data subjects. (...)
In most cases, one organisation will be positioned as the data controller and the other as the data processor. Sometimes the roles can be interchanged for some parts of the processing operations. And in many other instances, parties will consider themselves and each other as independent data controllers acting each for their own purposes in their own remits. This is especially common in the area of employee benefits procured by an employer for their workforce and delivered by a third-party service provider.
For the rest, it is rare for two organisations to agree that anything they do outside of one executing the data processing instructions of the other constitutes joint controllership. Even where a commonality of purpose exists in the commercial relationship, it is customary to stipulate that each party acts as an independent controller, solely responsible for its own compliance with applicable data protection rules. One area where this practice is definitely prevalent is the provision of cybersecurity technology. But how defensible is that approach in reality?
Cybersecurity technology comes in many forms: It can be shipped in hardware appliances, licensed as on-prem software, provided as cloud offerings, delivered as managed services, or packaged in any and all hybrid combinations of these. Regardless of the deployment model though, as discussed in several previous articles of this series, a common requirement for the technology to remain effective in the face of ever changing threats is the uninterrupted reliance on the most recent threat intelligence and the permanent availability of the latest defense capabilities. Cybersecurity vendors acquire threat knowledge, distil it into threat intelligence, and derive and deploy the corresponding countermeasures on the job and on the fly, as an integral part of delivering their technology to their customers.
So what? Well, it can of course be argued that in the context of providing cybersecurity to its customers, the cybersecurity vendor is solely acting as a data processor to each of its customers when processing personal data in their respective environments, for the purpose of securing the networks and information of each customer independently.
Meanwhile, in the context of aggregating threat knowledge, deriving threat intelligence and developing countermeasures based on all the threats observed across its customer base and in the wider ecosystem, it can also be argued that the cybersecurity vendor acts as a distinct data controller, independent from each and all of its customers.
However, the reality is that there are way too many commonalities between the cybersecurity vendor and its customers to disclaim any notion of joint controllership with absolute certainty:
So I leave it up to everyone to think it through, and to find their own honest answer to this question: Given how cybersecurity technology works, where one business provides such technology to another, how likely is it that the purposes and the means of processing are actually determined – at least in part – jointly? What matters is not what the contract says, it is what happens in reality. And if a supervisory authority or a court were to find that the reality contradicts what the contract says, then the requirements of Article 26 would kick in, no matter how hard the parties have tried to contract them away. And this conundrum will only get worse as more AI gets thrown into the mix.
What a nice cliffhanger to end this series upon! Thanks to all for reading, and wishing everyone a lovely summer recess.
CIPP/E, CIPM, CIPT, FIP, IAPP European Advisory Board Member; Privacy Professional, Cyber enthusiast
8 个月Zoltan Precsenyi great insight!
VP Government Affairs and Public Policy @Criteo
8 个月Thanks a lot Zoltan Precsenyi ! Cybersecurity is an interesting use case, but your analysis is transposable to so many other use cases. When I first read GDPR I thought that article 26 would only apply to very limited cases such as joint ventures or cooperation agreements … obviously this has not been the analysis of DPAs …
Managing Director, Europe - IAPP
8 个月Cristina Costache it feels like we were jsut talking about this!