1.
A leading case ^
September 2017 the Finnish media were abuzz with the breaking news that the National Institute for Health and Welfare placed the health data of over 6'000 people on an information network, the Internet. The leak was not discovered by the Institute; they found out about it from the national Data Protection Ombudsman. One citizen had alarmed his office to the breach.
Sadly this incident reveals the vulnerability of our society more generally, dependent as it is on information systems and information networks. Unintentional and deliberate violations of information security, as well as various leaks, now occur routinely, almost daily. It was with this in mind that the new European General Data Protection Regulation (GDPR) took as one point of departure that data breaches must be reported immediately, within 72 hours. But a lot can happen in 72 hours, far too much.
2.
Forward- and backward-looking sciences ^
We have become accustomed to thinking that the discipline of law – one of the skill sets that have become a science – is counted among the humanities rather than the (hard) sciences. It is quite distant from the technical sciences. It is so far removed from them in fact that communication between the technical and legal professions is sometimes quite difficult indeed.2 This is a classic case that, like many others, bears out the first part of Wiio’s Law, coined by Finnish professor Osmo A. Wiio: «Communication generally fails; when it succeeds, this is usually by accident.»3
3.
Data protection in legal perspective ^
The 1995 European Personal Data Directive has been the cornerstone of data protection in Europe for a good two decades. Its twenty years of application have changed the legal landscape in our field quite a bit. We now also see a greatly changed society and state – and use different language for talking about them.
From the legal point of view the drafting of the European Charter of Fundamental Rights ushered in a new era. The Charter sets out the fundamental rights approved by the European Union. They represent crucial elements in the development of the modern European constitutional state. Adding to their weight is the Charters strongly binding prohibition on the abuse of rights, embodied in its Article 54, a provision designed to avoid incorrect interpretations of the law. The Charter separates privacy and the protection of personal data. They are distinct fundamental rights. The protection of personal data – unlike in the Anglo-Saxon conceptual world – is no longer merely a facet of privacy. It is nothing less than a fundamental right in and of itself.
4.
Information systems in Society ^
We are making – or actually have largely completed – the transition into the Network Society, a society where we live and work in a digital environment that is dependent on information systems and networks. Our society today works and communicates quite differently than the one we lived in before the transition.7
Information systems play a crucial role in this new society. Where development in days past was assessed by measuring the degree to which various operations were computerized, today the focus is on how well information systems function – or how badly, as the case may be. The key questions here are quality and permissible ways of using the systems. The old excuses – that there are no bug-free programs or that delays are no surprise when running new software – no longer fly well in the constitutional state. Information systems and their use must be designed such that our rights are realized as quickly, unequivocally and comprehensively as possible. In the same vein, where malfunctions occur – and they do – systems must have rapid and effective technical and legal resilience; that is, it is essential to ensure that they recover from malfunctions robustly.8
What this means on the ground, for the profession, is that working as we do – and must – in the digital environment of the Network Society has rendered us legal cyborgs. We are utterly reliant on information systems and information networks. The design and use of such systems, especially those containing critical legal and administrative information, must be legally sound.9 It is with this in mind that in the literature I have spoken of digital lawyers in the constitutional state. Good lawyers today are necessarily digital lawyers. There are no two ways about this in the modern constitutional state.10
5.
Legal systematics and the protection of personal data ^
Systematics plays a key role in legal life. It opens and closes the eyes; lawyers eyes. The general taxonomic location of a law in the legal system, along with the legal principles, theories and concepts that inform the law, tell us what is right in any given situation. As professor Aulis Aarnio, one of my teachers aptly wrote: «If systematic boundaries are violated, the decision made does not comply with valid law.»11
«Article 86 Processing and public access to official documents
Personal data in official documents held by a public authority or a public body or a private body for the performance of a task carried out in the public interest may be disclosed by the authority or body in accordance with Union or Member State law to which the public authority or body is subject in order to reconcile public access to official documents with the right to the protection of personal data pursuant to this Regulation.»
6.
Conclusion ^
But legal informatics is more, much more than a narrow specialization.13 It is far from any narrow specilization. The discipline, if any, is a modern social science where the path information takes from creation to archiving or erasure is paved, as it were, with fundamental rights. The information infrastructure is a crucial societal framework for digital operations, one whose legal regulation is a challenging task indeed,14 All of that is extremely important from a social point of view.
Lastly, I would like to note that old-fashioned information technology and old-fashioned lawyers without methodological skills are a very bad combination where the rights of the individual are concerned. This is worth bearing in mind in any course of education or training, whether its focus is law, government and information technology.16 In the next corner the scarcity of justice may be waiting for you.
- 1 The Finnish Act on Openness in Government Activities obligates those operating in the public sector to train users of information systems to give due consideration to the principle of openness and its limits. Unfortunately, in many places, this requirement is no more than a dead letter.
- 2 See for example BUDD Research in the Two Cultures: The Nature of Scholarship in the Humanities pp 1–21 in Collection Management 1989.
- 3 Professor Wiio (1918–2013) was internationally one of those few researchers who understood that we were taking the first steps toward the Network Society already at the beginning of the 1970s.
- 4 The author is vice chair of Finland’s highest data protection authority, the Data Protection Board. The present two-tier system of oversight will be discontinued when the Regulation comes into force. Finland will establish a Data Protection Authority, to be led by the Data Protection Ombudsman.
- 5 I am not referring here to what is known as proactive law, which is a narrow interest of its own in the discipline.
- 6 In this connection, it merits mention that the German state of Hesse had already enacted its own state-specific Data Protection Act and that this matter was discussed elsewhere as well. Accordingly, in Finland, drafting that had already begun was discontinued in 1974 due to political differences. The political Right wanted relatively minimal protection for people’s right of self-determination; the Left sought more extensive regulation of society’s information flows.
- 7 See more for example Saarenpää, Introduction, in Saarenpää / Wiatrowski (eds.), Society Trapped in the Network – Does it have a Future? (2016), pp. 15.
- 8 About resilience see more for example Lucini, What is Resilience? The State of the Art, in Lucini (ed.), Disaster Recilience from a Sociological Perspective (2014), pp. 31–53.
- 9 «Data protection by design» used in the GDPR is a relatively new term but an old idea. It is one of the underpinnings of the modern history of regulation on personal data protection. Authors do not seem to remain aware of this when they milk the term for all it is worth in the literature.
- 10 See Saarenpää, The Digital Lawyer. What skills are required of the lawyer in the Network Society?, in Schweighofer/Kummer/Hötzendorfer (eds.), Kooperation / Co-operation, Tagungsband des 18. Internationalen Rechtsinformatik Symposions IRIS 2015 (2015), pp 73–85.
- 11 Aarnio, Essays on the Doctrinal Study of Law. Springer. New York 2011 pp. 179.
- 12 This perceptive expression was developed by Kauko Wikström, a Finnish professor. It refers to practicing lawyers whose information retrieval skills are essentially limited to consulting collections of statutes.
- 13 Saarenpää, Legal informatics today – the view from the university of Lapland, in Saarenpää/Sztobryn (eds.), Lawyers in the Media Society (2016), pp. 10–16.
- 14 Bob Frankston has observed aptly: «An interface is best when it disappears and the user can focus on the problem at hand. In the same way, infrastructure is best when it can be assumed and becomes invisible». It is essential to add that in the Network Society the legal framework for the information infrastructure must not remain invisible or fall outide the realm of societal discussion. See Frankston, Preface, in Belli (ed.), Community connectivity: building the Internet from scratch (2016), p. 9.
- 15 See for example the interesting and important Information society books of David Lyon and Frank Webster.
- 16 See Saarenpää, Does Legal Informatics have a method in the new Network Society, in Saarenpää/Wiatrowski (eds., Society Trapped in the Network – Does it have a Future? (2016), pp. 51–75.