You are on page 1of 13

POSITION STATEMENT

Regulation on the Respect for Private Life and the Protection of Personal
Data in Electronic Communications (EPrivacy)

In summary

FSB welcomes the intention to harmonise the data protection and privacy
rules across Europe, but questions the need for a Regulation at this time
given the provisions of the General Data Protection Regulation (GDPR).
FSB calls for a thorough impact assessment on how the proposed rules will
affect the online visibility of SMEs and on those business models that use
third-party cookies, including the actual costs for implementing those rules.
FSB calls for greater recognition of the cumulative legislative burden faced
by small businesses and for a 2-year transitional compliance period to
enable the smallest businesses to adapt to the proposed rules.
To avoid duplications and creating additional burdens for SMEs, the
proposed regulation and all its provisions, from consent to legal bases,
should be in full alignment with the GDPR.
A privacy-by-default approach to third party communications will
disproportionately impact SMEs and endanger those free service business
models.
Direct marketing is a cost-effective tool for SMEs to promote their products
and establish relationships with potential clients in a targeted and less
intrusive way. Article 16 clearly deviates from the legal bases in the GDPR
for that activity, in particular the legitimate interest. Thus, Article 16 if
adopted in its current form will disproportionately affect SMEs.

Background

The proposal for a Regulation on the respect for private life and the protection of
personal data in electronic communications (ePrivacy regulation) aims to ensure
consistency with the General Data Protection Regulation (GDPR), which will come into
force in May 2018.

The proposal also aims to update the 2002 e-privacy directive to address
technological developments that are currently not covered by legislation and provide
more clarity on original provisions in the 2002 e-privacy directive.

The proposed regulation covers all matters concerning the processing of personal
data not specifically addressed by the GDPR and will broadly apply to businesses that

1
provide any type of online communication service, use online tracking technologies
or electronic direct marketing.

This means over the top communications services such as voice over internet,
instant messaging and web-based e-email services - will be brought into scope of
this legislation and so subject to the same rules as traditional electronic
communications services.

General Considerations

The Federation of Small Business (FSB) strongly supports efforts to make the digital
single market a reality. Whilst FSB welcomes the general aim and background of the
ePrivacy proposal, FSB questions the need for the regulation given the provisions of
the General Data Protection Regulation (GDPR).

The proposal in its current form will only lead to increased uncertainty for small
businesses due to the lack of clarity in elements of the text and creates legal
uncertainty regarding its interplay and compatibility with existing EU instruments and
the General Data Protection Regulation (GDPR), which must be implemented in May
2018.

Moreover, the obligations set out in the proposal do not take into consideration that
SMEs have limited human, financial, and technical resources at their disposal. FSB
believes the provisions of the (GDPR) should be given time to be fully implemented
and assessed rather than rushing to implement this regulation at the same time as
the GDPR in May 2018.

Comments

Timeline

FSB remains concerned with the proposed date of application set by the European
Commission of the 25 May 2018, and calls for the European Institutions to carefully
review the current timeline and not rush to meet the desired date at any cost.
Council delegates have also recognised that as the choice of legal instrument is a
regulation, which requires a higher level of precision and clarity than a Directive, the
proposed date of application is considered unrealistic1. Small businesses are already
concerned with the implementation of the GDPR, especially as the guidance on how
to comply with the Regulation has yet to be completed by the Article 29 Working
Party. Thus, implementing an additional set of rules, without guidance and clarity on
the interplay between the proposed draft e-privacy regulation and the GDPR, will
create significant uncertainty for small businesses. FSB therefore calls for a 2-year
transitional compliance period to give the smallest businesses the time to adapt to

1
http://www.euractiv.com/wp-content/uploads/sites/2/2017/05/0108_001.pdf

2
the proposed rules. This will not only assist the smallest businesses transition to the
new rules, but it will also enable policy-makers to assess the impact and
consequences of the GDPR.

Article 8 (Processing of Terminal Equipment Data)

Article 8 prohibits the use of processing and storage capabilities of terminal


equipment and the collection of information from end-users terminal equipment,
unless specific conditions are fulfilled, such as by obtaining consent from the end-
user (or in the rapporteurs case specific consent). Thus, the draft proposal is far
more restrictive than the GDPR, which has additional legal grounds for processing
data, such as through a contractual relationship between both parties. FSB calls on
the European Parliament to align this Article with the legal grounds for processing
contained in the GDPR. Moreover, inserting processing on the basis of a legitimate
interest, as defined in Article 6 of the GDPR, as well as an article limiting processing
to pseudonymised data will balance both the interests of companies and data
subjects.

Article 10 (Software Placed on the Market)

Article 10 prescribes that software placed on the market permitting electronic


communications, including the retrieval and presentation of information on the
internet, shall offer the option to prevent third parties from storing information on
terminal equipment of an end-user or processing information already stored on that
equipment. If adopted, this article will require all software on an end-user device,
from mobile applications to browsers, to provide options that may block all third-
party communications. The rapporteur has gone even further by amending the article
to include a privacy-by-default approach. Third party communications and the traffic
generated by these operators is vital for small businesses, which rely on these
operators to increase their online visibility and drive consumers to their website. If a
blanket approach which restricts third party communications is applied, either by
default or manually via browser settings, this will disproportionately impact SMEs and
those businesses that have developed privacy settings tailored to their users, as well
as jeopardise those business models that are able to offer free services in exchange
for advertisements. The GDPR already contains provisions designed to tackle the
collection and use of data, as a result of using software, on lawful processing etc.

Article 16 (Unsolicited Communications)

Article 16 of the draft regulation provides that a natural or legal person may use
electronic communication services for the purposes of sending direct marketing
communications to end-users who are natural persons that have given their consent.
This regulation appears to contradict the provisions contained in the GDPR. For
example, the GDPR has several legal bases for the same activity, including legitimate

3
interests. The GDPR also provides that direct marketing can be an example of a
practice which could be regarded as a legitimate interest, thereby not requiring
consent, or prior consent as the rapporteur advocates. For those companies that have
limited financial, technical and human resources at their disposal, direct marketing
offers a viable tool for SMEs to promote their products and establish relationships
with potential clients in a cost-efficient way and in targeted and less intrusive manner.
Moreover, it is important to recognise that SMEs do not have the marketing budget
available to compete with larger companies that use more traditional channels,
therefore restrictions on direct marketing will disproportionately impact SMEs.

Impact Assessment

FSB calls upon the European Parliament to conduct a thorough impact assessment of
the e-privacy proposal, including the stricter provisions made by the rapporteur in
her draft report. This impact assessment should assess how the above will affect
small enterprises and the self-employed in terms of online visibility, how the proposed
rules will affect those business models using third-party cookies, on business-to-
business data, the actual costs of implementing these rules, and provide a detailed
analysis regarding the possible overlaps, duplications or contradictions with other
legislation (GDPR & ECC), as advocated in the Council progress report of the 15 May
20172. Conducting such an assessment would be in line with the principles of better
regulation, which calls for policy measures to be evidence-based, well-designed and
deliver tangible and sustainable benefits for citizens, business and society as a
whole3.

2
http://www.euractiv.com/wp-content/uploads/sites/2/2017/05/0108_001.pdf
3
http://ec.europa.eu/smart-regulation/better_regulation/documents/com_2015_215_en.pdf

4
Amendments

European Commission European Parliament (LIBE) FSB Proposed


Draft Report Amendments
Recital 17a Recital 17a

This Regulation broadens the This Regulation broadens the


possibilities for providers of possibilities for providers of
electronic communications electronic communications
services to process electronic services to process electronic
communications metadata communications metadata
based on users' informed based on a legitimate
consent. However, users attach legal ground. Therefore,
great importance to the this Regulation should
confidentiality of their require providers of
communications, including their electronic communications
online activities, and they want services to obtain users'
to control the use of their consent or to ensure that in
electronic communications data order to process electronic
for purposes other than communications metadata,
conveying the communication. which should include data on
Therefore, this Regulation the location of the device
should require providers of generated for the purposes
electronic communications of granting and maintaining
services to obtain users' access and connection to the
consent to process electronic service, users have been
communications metadata, duly informed of the legal
which should include data on ground on which the
the location of the device processing is based. For
generated for the purposes of the purposes of this
granting and maintaining Regulation, the consent of an
access and connection to the end-user, regardless of
service. For the purposes of whether the latter is a
this Regulation, the consent of natural or legal person,
an end-user, regardless of should have the same
whether the latter is a natural meaning and be subject to
or legal person, should have the same conditions as the
the same meaning and be consent of the data subject
subject to the same conditions under Regulation (EU)
as the consent of the data 2016/679.
subject under Regulation (EU)
2016/679. The end-users
should have the right to
withdraw their consent from an
additional service without
breaching the contract for the
basic service. Consent for

5
processing data from internet
or voice communications usage
should not be valid if the user
has no genuine and free choice,
or is unable to refuse or
withdraw consent without
detriment.
Recital 20 Recital 20 Recital 20

Terminal equipment of end- Terminal equipment of users of Terminal equipment of end-


users of electronic electronic communications users of electronic
communications networks and networks and any information communications networks
any information relating to relating to the usage of such and any personally
the usage of such terminal terminal equipment, whether in attributable information
equipment, whether in particular is stored in or relating to the usage of such
particular is stored in or emitted by such equipment, terminal equipment, whether
emitted by such equipment, requested from or processed in in particular is stored in or
requested from or processed order to enable it to connect to emitted by such equipment,
in order to enable it to another device and or network requested from or processed
connect to another device and equipment, are part of the in order to enable it to
or network equipment, are private sphere of the users connect to another device
part of the private sphere of requiring protection under the and or network equipment,
the end-users requiring Charter of Fundamental Rights are part of the private sphere
protection under the Charter of the European Union and the of the end-users requiring
of Fundamental Rights of the European Convention for the protection under the Charter
European Union and the Protection of Human Rights and of Fundamental Rights of the
European Convention for the Fundamental Freedoms. Given European Union and the
Protection of Human Rights that such equipment contains European Convention for the
and Fundamental Freedoms. or processes very sensitive data Protection of Human Rights
Given that such equipment that may reveal details of the and Fundamental Freedoms.
contains or processes behaviour, psychological Given that such equipment
information that may reveal features, emotional condition contains or processes
details of an individual's and political and social information that, unless
emotional, political, social preferences of an individual, pseudonymized or
complexities, including the including the content of anonymized, may reveal
content of communications, communications, pictures, the details of an individual's
pictures, the location of location of individuals by emotional, political, social
individuals by accessing the accessing the GPS capabilities complexities, including the
devices GPS capabilities, of their device, contact lists, content of communications,
contact lists, and other and other information already pictures, the precise location
information already stored in stored in the device, the of individuals by accessing
the device, the information information related to such the devices GPS capabilities,
related to such equipment equipment requires enhanced contact lists, and other
requires enhanced privacy privacy protection. Information information already stored in
protection. Furthermore, the related to the users device the device, the information
so-called spyware, web bugs, may also be collected remotely related to such equipment

6
hidden identifiers, tracking for the purpose of identification requires enhanced privacy
cookies and other similar and tracking, using techniques protection. Furthermore, the
unwanted tracking tools can such as the so-called device so-called spyware, web bugs,
enter end-user's terminal fingerprinting, often without hidden personal identifiers,
equipment without their the knowledge of the user, and tracking cookies and other
knowledge in order to gain may seriously intrude upon the similar personal tracking
access to information, to store privacy of these users. tools can enter end-user's
hidden information and to Furthermore, so-called terminal equipment without
trace the activities. spyware, web bugs, hidden their knowledge in order to
Information related to the identifiers and unwanted gain access to personal
end-users device may also be tracking tools can enter users' information, to store hidden
collected remotely for the terminal equipment without personal information and to
purpose of identification and their knowledge in order to gain trace the personal activities.
tracking, using techniques access to information or to Personal Information related
such as the so-called device store hidden information. to the end-users device may
fingerprinting, often without Techniques that surreptitiously also be collected remotely for
the knowledge of the end- monitor the actions of users, the purpose of identification
user, and may seriously for example by tracking their and tracking, using
intrude upon the privacy of activities online or the location techniques such as the so-
these end-users. Techniques of their terminal equipment, or called device fingerprinting,
that surreptitiously monitor subvert the operation of the often without the knowledge
the actions of end-users, for users terminal equipment pose of the end-user, and may
example by tracking their a serious threat to the privacy seriously intrude upon the
activities online or the of users. Therefore, any such privacy of these end-users.
location of their terminal interference with the user's Techniques that
equipment, or subvert the terminal equipment should be surreptitiously monitor the
operation of the end-users allowed only with the user's actions of end-users, for
terminal equipment pose a consent and for specific and example by tracking their
serious threat to the privacy transparent purposes. Users activities online or the
of end-users. Therefore, any should receive all relevant location of their terminal
such interference with the information about the intended equipment, or subvert the
end-user's terminal processing in clear and easily operation of the end-users
equipment should be allowed understandable language. Such terminal equipment pose a
only with the end-user's information should be provided serious threat to the privacy
consent and for specific and separately from the terms and of end-users. Therefore, any
transparent purposes. conditions of the service. such interference with the
end-user's terminal
equipment should be allowed
only with the end-user's
consent and for specific and
transparent purposes.
Where pseudonymous or
anonymous data is used
in accordance with
Regulation (EU)
2016/679 and its privacy-

7
by-design principles, such
use shall not qualify as
such interference with the
end-user's terminal
equipment.

Recital 21 Recital 21 Recital 21

Exceptions to the obligation to Exceptions to the obligation to Exceptions to the obligation


obtain consent to make use of obtain consent to make use of to obtain consent to store
the processing and storage the processing and storage information in terminal
capabilities of terminal capabilities of terminal equipment or to access
equipment or to access equipment or to access information stored in
information stored in terminal information stored in terminal terminal equipment should
equipment should be limited equipment should be limited to be limited to situations that
to situations that involve no, situations that involve no, or comply with all obligations
or only very limited, intrusion only very limited, intrusion of pursuant to Regulation (EU)
of privacy. For instance, privacy. For instance, consent 2016/679. For instance,
consent should not be should not be requested for the technical storage or
requested for authorizing the authorizing the technical access which is
technical storage or access storage or access which is proportionate; essential
which is strictly necessary and strictly necessary and and necessary for the
proportionate for the proportionate for the legitimate function and performance
legitimate purpose of enabling purpose of enabling the use of of the website with the
the use of a specific service a specific service explicitly legitimate purpose of
explicitly requested by the requested by the user. This enabling the use of a
end-user. This may include may include the storing of service that is beneficial
the storing of cookies for the information (such as cookies to the end-user; or that
duration of a single and identifiers) for the duration provides increased user-
established session on a of a single established session friendliness for the end-
website to keep track of the on a website to keep track of user. Such information
end-users input when filling the users input when filling in could e.g. be necessary to
in online forms over several online forms over several make the website function
pages. Cookies can also be a pages. Tracking techniques, if properly; enable website
legitimate and useful tool, for implemented with appropriate improvement based on
example, in measuring web privacy safeguards, can also be end-user interaction; or
traffic to a website. a legitimate and useful tool, for enable adaptation of
Information society providers example, in measuring web website according to an
that engage in configuration traffic to a website. Information end-users individual
checking to provide the society providers could engage preferences. This may
service in compliance with the in configuration checking in include the storing of cookies
end-user's settings and the order to provide the service in on a website to keep track of
mere logging of the fact that compliance with the user's the end-users input when
the end-users device is settings and the mere logging filling in online forms over
unable to receive content revealing the fact that the several pages or enabling
requested by the end-user users device is unable to other adaptation to individual

8
should not constitute access receive content requested by preferences. Cookies can also
to such a device or use of the the user, should not constitute be a legitimate and useful
device processing capabilities. illegitimate access. tool to improve the
performance of a website, for
example, in measuring web
traffic to a website or identify
if end-users get error
messages from certain pages
on a website. Similarly,
providers of terminal
equipment and the
software needed to
operate such equipment
regularly need access to
configuration and other
device information and
the processing and
storage capabilities to
maintain the equipment,
prevent security
vulnerabilities and correct
problems related to the
equipments operation.
Information society
providers and electronic
communications service
providers that engage in
configuration checking to
provide the service in
compliance with the end-
users settings and the
mere logging of the fact
that the end-users device
is unable to receive
content requested by the
end-user should not
constitute access to such
a device or use of the
device processing
capabilities.

Recital 29 Recital 29 Recital 29

Technology exists that Technology exists that enables Technology exists that
enables providers of providers of electronic enables providers of
electronic communications communications services to electronic

9
services to limit the reception limit the reception of unwanted communications services
of unwanted calls by end- calls by end-users in different to limit the reception of
users in different ways, ways, including blocking silent unwanted calls by end-
including blocking silent calls calls, other fraudulent and users in different ways,
and other fraudulent and nuisance calls or marketing including blocking silent
nuisance calls. Providers of calls with a specific code or calls, other fraudulent and
publicly available number- prefix. Providers of publicly nuisance calls. Providers of
based interpersonal available number-based publicly available number-
communications services interpersonal communications based interpersonal
should deploy this technology services should deploy this communications services
and protect end-users against technology and protect end- should deploy this
nuisance calls and free of users against nuisance calls technology and protect
charge. Providers should and should do so free of end-users against
ensure that end-users are charge. Providers should ensure nuisance calls. Providers
aware of the existence of such that end-users are aware of the should ensure that end-users
functionalities, for instance, existence of such are aware of the existence of
by publicising the fact on their functionalities, for instance, by such functionalities, for
webpage. publicising the fact on their instance, by publicising the
webpage. fact on their webpage.

Article 8 (Paragraph 1) Article 8 (Paragraph 1) Article 8 (Paragraph 1)

The use of processing and The use of processing and The use of processing and
storage capabilities of storage capabilities of terminal storage capabilities of
terminal equipment and the equipment and the collection of terminal equipment and the
collection of information from information from users collection of personal data
end-users terminal terminal equipment, or making from end-users terminal
equipment, including about its information available through equipment, other than by the
software and hardware, other the terminal equipment, end-user concerned shall be
than by the end-user including information about or prohibited, except on the
concerned shall be prohibited, generated by its software and following grounds:
except on the following hardware, other than by the
grounds: user concerned shall be (a) it is necessary for the
prohibited, except on the sole purpose of carrying out
(a) it is necessary for the sole following grounds: the transmission of an
purpose of carrying out the electronic communication
transmission of an electronic (a) it is strictly technically over an electronic
communication over an necessary for the sole purpose communications network; or
electronic communications of carrying out the transmission
network; or of an electronic communication (b) the end-user has given his
over an electronic or her consent; or
(b) the end-user has given his communications network; or
or her consent; or (c) pseudonymous data
that is used for purposes

10
(c) it is necessary for (b) the user has given his or justified pursuant to
providing an information her specific consent, which shall Regulation (EU)
society service requested by not be mandatory to access the 2016/679; or
the end-user; or service; or
(d) if it is necessary for web
(d) if it is necessary for web (c) it is strictly technically audience measuring,
audience measuring, provided necessary for providing an provided that such
that such measurement is information society service measurement is carried out
carried out by the provider of requested by the user; or either by the provider of the
the information society information society service
service requested by the end- (d) if it is technically necessary requested by the end-user or
user. for web audience measuring of using anonymous or
the information society service pseudonymous data.
requested by the user, provided
that such measurement is
carried out by the provider, or
on behalf of the provider, or by
an independent web analytics
agency acting in the public
interest or for scientific
purpose; and further provided
that no personal data is made
accessible to any other party
and that such web audience
measurement does not
adversely affect the
fundamental rights of the user;

Article 10 (Paragraph 1) Article 10 (Paragraph 1) Deleted

Software placed on the Software placed on the market Justification:


market permitting electronic permitting electronic
communications, including the communications, including the Article 25 of Regulation (EU)
retrieval and presentation of retrieval and presentation of 2016/679 governs data
information on the internet, information on the internet, protection by design and by
shall offer the option to shall: default. Article 10 of the
prevent third parties from proposal for a regulation
storing information on the (a) (new) by default, offer only undermines Article
terminal equipment of an privacy protective settings to 25 of Regulation (EU)
end-user or processing prevent other parties from 2016/679 and would
information already stored on storing information on the hamper most business
that equipment. terminal equipment of a user models.
and from processing information
already stored on that
equipment;

11
(b) upon installation, inform and
offer the user the possibility to
change or confirm the privacy
settings options defined in point
(a) by requiring the user's
consent to a setting;

(c) make the setting defined in


points (a) and (b) easily
accessible during the use of the
software; and

(d) offer the user the possibility


to express specific consent
through the settings after the
installation of the software.

Article 16 Para (i) Article 16 Para (i) Deleted

Natural or legal persons may The use by natural or legal Justification:


use electronic persons of electronic Article 16 of the proposal
communications services for communications services, for a regulation deals with
the purposes of sending direct including voice-to-voice calls, direct marketing aspects
marketing communications to automated calling and without making
end-users who are natural communications systems, any direct link to
persons that have given their including semi-automated communications data or
consent. systems that connect the call end-user terminal
person to an individual, faxes, equipment. This provision
e-mail or other use of electronic is concerned with the law
communications services for on advertising and
the purposes of presenting consumer protection,
unsolicited or direct marketing matters which should be
communications to end-users, governed by a
shall be allowed only in respect substantively appropriate
of end-users who have given EU legal instrument.
their prior consent. Directive 2005/29/EC
(Directive on unfair business
practices) would be a more
appropriate legal instrument
here.
Article 27 (Paragraph 1) Article 27 (Paragraph 1) Article 27 (Paragraph 1)

Directive 2002/58/EC is No changes from Commission Directive 2002/58/EC is


repealed with effect from 25 text. repealed with effect from 25
May 2018 May 2020

12
Article 29 (Paragraph 2) Article 29 (Paragraph 2) Article 29 (Paragraph 2)

It shall apply from 25 May No changes from Commission It shall apply from 25 May
2018 text. 2020

13

You might also like