Processing Personal Data on EU Cross-Border Movements to Fight Terrorism*

Author(s):  
Rosario Serra Cristóbal
Keyword(s):  
IEEE Access ◽  
2021 ◽  
Vol 9 ◽  
pp. 15961-15982
Author(s):  
Danny S. Guaman ◽  
Jose M. Del Alamo ◽  
Julio C. Caiza

Author(s):  
Luca Tosoni

Article 4(16) (Definition of ‘main establishment’) (see too recital 36); Article 4(22) (Definition of ‘supervisory authority concerned’) (see also recital 36); Article 4(23) (Definition of ‘cross-border processing’); Article 4(24) (Definition of ‘relevant and reasoned objection’) (see too recital 124); Article 50 (International cooperation for the protection of personal data) (see too recitals 102 and 116); Article 55 (Competence of the supervisory authorities) (see too recitals 122 and 128); Article 56 (Competence of the lead supervisory authority) (see also recitals 124–128); Article 57(1)(g) (Supervisory authorities’ task to cooperate with other supervisory authorities) (see too recitals 123 and 133); Article 58 (Powers of supervisory authorities) (see too recitals 122 and 129); Article 61 (Mutual assistance) (see too recitals 123 and 133); Article 62 (Joint operations of supervisory authorities) (see too recital 134); Article 63 (Consistency mechanism) (see too recitals 13, 136 and 138); Article 64 (Opinion of the Board) (see also recitals 135–136); Article 65 (Dispute resolution by the Board) (see too recitals 136 and 143); and Article 66 (Urgency procedure) (see too recitals 137–138).


2018 ◽  
Vol 1 (102) ◽  
pp. 305
Author(s):  
Rosario Serra Cristóbal

Resumen:La gestión coordinada de las fronteras y el funcionamiento eficaz de los sistemas de tratamiento de datos de circulación de personas pueden servir como mecanismo de alerta temprana frente al riesgo de ataques terroristas. Puede fortalecer la capacidad colectiva de los Estados para detectar, prevenir y combatir el terrorismo al facilitar el intercambio oportuno de información, permitiendo así adoptar de forma responsable decisiones cruciales.Este trabajo analiza los concretos instrumentos de gestión de datos en fronteras que pueden ser útiles en la lucha antiterrorista, porque el primer paso en inteligencia reside en la obtención de información, que luego será analizada y tratada para convertir esa información en conocimiento. Como tendremos oportunidad de comprobar, muchas de las bases de datos en fronteras se crearon para controlar la entrada de inmigrantes en las fronteras europeas, pero la información que ofrecen dichos sistemas puede servir también para luchar contra ese reto que nos amenaza, el del terrorismo yihadista. No obstante, este trabajo subraya que se trata de fenómenos distintos.Es cierto que la nueva oleada de ataques yihadistas ha coincidido, en el mismo espacio temporal, con la mayor crisis migratoria a la que se ha tenido que enfrentar Europa debido a crisis humanitarias y posteriormente a la guerra de Siria u otros conflictos. Pero, no son lo mismo. El terrorismo yihadista y la inmigración poco o nada tienen que ver, por mucho que se hayan querido vincular o se hayan pretendido justificar determinadas políticas contra la inmigración como algo necesario para luchar contra el terrorismo yihadista, con el fácil argumento de que frenando la inmigración se evita la entrada de potenciales terroristas en Europa.El trabajo advierte del riesgo de que la lucha contra el terrorismo sea utilizada para reforzar los controles de personas en las fronteras con el verdadero objetivo de frenar los flujos migratorios. Al tiempo, subraya la necesidad de que en dichos controles se sigan directrices y prácticas claras y se respeten plenamente las obligaciones que los Estados tienen de conformidad con el Derecho internacional, tal como ha recordado el Tribunal Europeo de Derechos Humanos y el Tribunal de Justicia de la Unión Europea. De hecho, no son pocos los casos en los que estos Tribunales han subrayado la relevancia indubitada de principios como la reserva de ley, la necesidad o la proporcionalidad como sustrato de la licitud de muchas medidas que incluyen el tratamiento de datos personales.Summary:1. Jihadist terrorism as a cross-border phenomenon. 2. The benefit of data exchange on crossing-borders in the Schengen area. 3. New guidelines on data processing and the safeguard of national security. 4. The register of passengers (The Personal Name Record or PNR). 5. When the data cross the external borders. The exchange of data with third countries. 5.1. The failed PNR Agreement with Canada and the EU Court of Justice’s standards regarding the transfer of passengers’ data. 5.2. The exchange of data with the United States. The EU-US Umbrella Agreement and the Privacy Shield. 6. The use of profiles and blacklists of alleged terrorists in cross-bording. 7. ConclusionsAbstract:EU Coordinated border management and effective functioning of data processing systems related to the movement of persons may serve as an early warning mechanism against the risk of terrorist attacks. It can strengthen the collective capacity of States to detect, prevent and combat terrorism by facilitating the timely exchange of information, thereby enabling crucial decisions to be adopted in a responsible manner.This paper analyzes the concrete border data management tools that can be useful in the fight against terrorism. The first step in intelligence lies in obtaining information, which will then be analyzed and treated to turn that information into useful knowledge. As we will have an opportunity to verify, numerous border databases were created to control the entry of immigrants into European borders, but the information offered by these systems can also serve to fight against this challenge that threatens us, that of jihadist terrorism.Nevertheless, we emphasize that terrorism and immigration are different phenomena. The truth is that the new wave of Jihadist attacks took place along the largest migratory crisis that Europe faced due to different humanitarian crises and to the war in Syria and other conflicts. But they represent different realities. Jihadist terrorism and immigration have little or nothing in common. In spite of this, many wish to link both with a view to justify certain anti-immigration policies as necessary actions for coping with Jihadist terrorism. This has been done based on a simple narrative: holding back immigration prevents the entry of potential terrorists in Europe.This paper shows that the risk that the fight against terrorism will be used as a basis to reinforce people controls at the borders, while the true objective of these measures is to curb migratory flows. At the same time, it underlines the need for clear guidelines and practices to be followed when implementing such controls. It also vindicates the need for States to observe their obligations laid down by international law, as recalled by the European Court of Human Rights and the EU Court of the Justice. In fact, in many cases, these jurisdictions highlighted the undoubted relevance of the statutory reserve principle, the principle of necessity or the principle of proportionality, as legal basis for the adoption of measures that include personal data processing.


Significance Once finalised and promulgated, probably sometime in late 2021 or 2022, it will be China’s first comprehensive piece of legislation to govern the collection, processing and use of personal data. There are significant ramifications for domestic and foreign businesses. Impacts Security inspection requirements for cross-border transfers of personal data could have considerable importance for foreign firms. The law may be used to sanction foreign firms or retaliate against foreign governments. The law aims to settle a long-running turf war between regulators, to eliminate duplicate licensing, enforcement and inspection regimes.


2019 ◽  
Vol 8 (2) ◽  
pp. 184 ◽  
Author(s):  
Jesús López Belmonte ◽  
Santiago Pozo Sánchez ◽  
María José Del Pino Espejo

Technological impact and immigration have resulted in ICT playing a significant role in educational adaptation to multicultural environments. This study focuses on flipped learning as an innovative teaching method. The overall objectives of this research are, on the one hand, to carry out a review of the scientific literature about flipped learning, and, on the other hand, to know the extent of its scope amongst teaching staff in cross-border regions. To achieve these objectives, a quantitative method has been developed through a descriptive model. 316 teachers from different educational centres of the Spanish Autonomous City of Ceuta (Spain) were selected as a sample, and an ad hoc questionnaire was used as an instrument for collecting personal data. Statistical procedures were performed through SPSS software, using location and scattering parameters (median and standard deviation), measurements (Pearson’s asymmetry coefficient and Fisher’s pointing coefficient) and association tasks between variables. The results show that teachers claim to have the necessary knowledge to implement flipped learning in their programmes, but they still have certain deficiencies in their specific training. A significant number of these teachers do not use it because they lack training and digital assets, and also because of a certain apprehension towards innovative practices. The main benefits include the improvement in the student’s autonomy, their participation, interaction and motivation, as well as the teachers’ satisfaction. Regarding the teachers’ perception, it therefore follows that flipped learning contributes to the attention towards diversity created by the multicultural environments, which in this case is a result of the migration phenomenon.


Sign in / Sign up

Export Citation Format

Share Document