Feeds

EU Commission proposes new directive on storing air passenger details

EU destination countries will get passenger lists, but can't keep them

High performance access to file storage

Details of passengers on every flight within the European Union will be passed to destination countries under European Commission proposals published today.

The Commission has proposed a Passenger Name Record (PNR) Directive ordering airlines to send the information it holds on its passengers to authorities in the destination country as a matter of course.

The US, Canada and Australia already require PNR data to be sent to them before planes can land, but the Directive would for the first time force the sending of data for every internal EU flight.

EU law enforcement authorities do sometimes collect PNR information for particular flights but the Commission's plan would result in those demands being made for every flight.

The European Parliament and privacy watchdogs have expressed concern in the past about the US's demands for PNR data and have urged the European Commission to limit the amount of data per passenger that is transferred to US authorities.

The information that is transferred under PNR arrangements is data that is collected by airlines in the booking process and includes names of travellers and fellow travellers; dates of travel and of booking travel; all available contact details; baggage information; and travel itineraries.

The European Parliament has questioned the need for PNR arrangements with the US in the past and has blocked deals with US authorities.

EU privacy watchdog the European Data Protection Supervisor (EDPS), who is responsible for EU governing bodies' privacy law compliance, said last year that new rules for the transfer of PNR data to countries outside the EU did not protect individuals' privacy enough.

"The EDPS considers that the bulk transfer of data about innocent people for risk assessment purposes raises serious proportionality issues," said an opinion (nine-page/60KB PDF) published last year. "The EDPS questions in particular the proactive use of PNR data. While 're-active' use of data does not raise major concerns, as far as it is part of an investigation of a crime already committed, real time and proactive use lead to a more critical assessment."

The Commission said in a statement that the data would be useful to law enforcement agencies. "Member states will analyse and retain the data for the purpose of preventing, detecting, investigating and prosecuting serious crime and terrorist offences," it said.

The Commission said that the data transfer process did include privacy safeguards. "PNR data may not be used for any purpose except fighting serious crime and terrorist offences," said the statement. "Law enforcement authorities in member states must make the data anonymous one month after the flight, and data must not be retained for more than five years in total.

"Sensitive data that could reveal racial or ethnic origin, political opinions, or religious beliefs may never be transferred by air carriers to, or in any way used by, the member states," it said. "Member states must set up dedicated units to handle the data and keep it secure and ensure those units are monitored by an independent supervisory (data protection) authority.

"Clear rules on passengers' right to accurate information about the collection of PNR data are also introduced, as well as rules giving passengers the right to access, rectify, and delete their data, and to compensation and judicial remedies," it said.

"This proposal for an EU PNR Directive is an important part of EU security policy," said Cecilia Malmström, European Commissioner for Home Affairs. "Common EU rules are necessary to fight serious crime such as drug-smuggling and people trafficking as well as terrorism, and to ensure that passengers' privacy is respected and their rights fully protected in all Member States. The proposal requires member states to anonymise all PNR data that is collected."

Copyright © 2011, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Big Content goes after Kim Dotcom
Six studios sling sueballs at dead download destination
Alphadex fires back at British Gas with overcharging allegation
Brit colo outfit says it paid for 347KVA, has been charged for 1940KVA
Jack the RIPA: Blighty cops ignore law, retain innocents' comms data
Prime minister: Nothing to see here, go about your business
Singapore decides 'three strikes' laws are too intrusive
When even a prurient island nation thinks an idea is dodgy it has problems
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Banks slap Olympus with £160 MEEELLION lawsuit
Scandal hit camera maker just can't shake off its past
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.