Commission Recommendation of 26 March 2009 on data protection guidelines for the ... (32009H0329)
INHALT
Commission Recommendation of 26 March 2009 on data protection guidelines for the Internal Market Information System (IMI) (notified under document number C(2009) 2041) (Text with EEA relevance)
- COMMISSION RECOMMENDATION
- of 26 March 2009
- on data protection guidelines for the Internal Market Information System (IMI)
- (notified under document number C(2009) 2041)
- (Text with EEA relevance)
- (2009/329/EC)
- ANNEX
- GUIDELINES FOR THE IMPLEMENTATION OF DATA PROTECTION RULES IN IMI
- 1. IMI - A TOOL FOR ADMINISTRATIVE COOPERATION
- IMI login page
- Example of the view of the application concerning competent authorities dealing with professional qualifications
- A couple of examples
- Screenshots showing questions in the languages of two competent authorities involved in an information exchange
- 2. SCOPE AND OBJECTIVE OF THESE GUIDELINES
- 3. A DATA PROTECTION FRIENDLY ENVIRONMENT
- Example of the view of a request before acceptance by the recipient
- 4. WHO IS WHO IN IMI? THE ISSUE OF JOINT CONTROLLERSHIP
- 5. ACTORS AND USERS IN IMI
- 6. LEGAL GROUNDS FOR THE EXCHANGES OF PERSONAL INFORMATION IN IMI
- I) Compliance with a legal obligation (Article 7 (c))
- II) The performance of a task carried out in the public interest or in the exercise of official authority vested in the controller (Article 7 (e)).
- 7. THE ISSUE OF THE APPLICABLE LAW AND THE APPROPRIATE SUPERVISION
- 8. DATA PROTECTION PRINCIPLES APPLICABLE TO EXCHANGES OF INFORMATION
- What is sensitive data
- (8)
- ?
- The issue of further processing and storage outside IMI
- 9. THE PROVISION OF INFORMATION TO DATA SUBJECTS
- The provision of information in the Data Protection Directive
- EUROPEAN COMMISSION PRIVACY STATEMENT
- Internal Market Information System - IMI
- 1.
- Aim and actors of IMI
- 2.
- What is the applicable law?
- 3.
- Which data are processed by the Commission in IMI?
- 4.
- What is the purpose of processing data in IMI?
- 5.
- Who has access to the data?
- 6.
- How long will your data be stored?
- 7.
- Which security measures are in place against unauthorised access?
- 8.
- Access to your personal data
- 9.
- Additional information
- 10.
- Contact
- 10. RIGHT OF ACCESS AND RECTIFICATION
- 11. DATA SECURITY
- 12. RETENTION PERIOD
- Screenshot of a competent authority requesting an early removal of personal data
- Screenshot of a competent authority being consulted on early removal of personal data
- 13. COOPERATION WITH NATIONAL DATA PROTECTION AUTHORITIES AND THE EDPS
- Work in progress
- 14. REVIEW CLAUSE
Feedback