Introduction
New technologies “are extending capabilities beyond the immediate functionality of being able to transmit, store, and process exponentially greater amounts of data”.Footnote 1 One may speak of a paradigm shift in this regard when the audiovisual surveillance recordings of yesterday are compared with the capabilities of today's technology.Footnote 2 Indeed, with the sheer amount of “big data” which can now be quickly processed, data no longer “needs to be ‘personalized’ in order to identify specific individuals”.Footnote 3 Throughout the present article, the individual to which the collected or processed data relates will henceforth be referred to as the “data subject”, while the data that enables the identification of the individual will be termed “subject data”. By definition, such subject data constitutes sensitive data.Footnote 4 When compiled and processed en masse, such data creates new value.Footnote 5 But “value” must here be understood in a broad sense, beyond monetary revenues – it could encompass “means of state control, cultural production, civil empowerment”Footnote 6 or actionable intelligence for law enforcement operations or military interventions.Footnote 7
In “an economy driven by the processing of personal data, privacy is related to the control of personal data”Footnote 8 – and the increased attention on data protection over the last couple of years has also brought data protection issues to the forefront in the military context, where they constitute fairly new challenges to address.Footnote 9 Although the operational implications of data protection primarily pertain to external exposure of combatants’ data,Footnote 10 this article is focused on the protection of those who are not, or are no longer, taking part in hostilities, and their subject data. For instance, as pointed out by Crawford, there is a considerable amount of subject data that may be collected from prisoners of war (PoWs). Such subject data consists of sensitive dataFootnote 11 as well as non-sensitive data.Footnote 12
The complexity around the handling of sensitive data seemingly increases exponentially in situations that Lattimer and Sands refer to as “the grey zone”, situated between the traditional fields of application of international human rights law (IHRL) and the law of armed conflict (LOAC).Footnote 13 Although it has long been firmly accepted in doctrineFootnote 14 that many international obligations (such as IHRL) continue to apply in armed conflict, questions of how different regimes should be co-applied continue to arise. Co-application may carry practical challenges – and challenges for practitioners. Furthermore, co-application of IHRL and the LOAC in particular prepares the ground for “the potential availability of the jurisdiction of IHRL monitoring bodies”Footnote 15 also during armed conflict, which may be perceived as challenging. It goes without saying that any co-application of international legal regimes risks creating a norm conflict. It is therefore worth recalling that a norm conflict only exists when a party to “two treaties cannot simultaneously comply with its obligations under both treaties”.Footnote 16 However, since IHRL and the LOAC “share a common value of protecting human life and dignity”,Footnote 17 it is here submitted that when it comes to the right to digital privacy/private life, there is no categorical norm conflict between IHRL and the LOAC. Furthermore, concerning the legal protection of subject data, the legal regimes reinforce each other. As this article will illustrate, the complementary differences are found in the level of the standard, in certain procedural aspects, and in relation to contextual circumstances, but not in relation to the protected values as such.Footnote 18 This view aligns with the efforts to counter fragmentation in international law through systemic integration, as indicated in Article 31(3)(c) of the Vienna Convention on the Law of Treaties.Footnote 19 For these reasons, the issue of the interaction between IHRL and the LOAC is not further discussed in this article.
This brings us to the primary question addressed by this paper: what do militaries need to know about data protection and the right to digital privacy/private life?Footnote 20 The article first considers what distinguishes general data protection from the right to digital privacy/private life.Footnote 21 Next, the scope of the human right to digital privacy/private life is outlined. The relevant provisions under the LOAC are then discussed, and matters that militaries need to be observant about concerning data protection and the right to privacy/private life are raised. Lastly, some conclusions are drawn.
Data protection and protection of digital privacy/private life
In contemporary socio-technical developments, “the very same characteristics of technology that present the greatest opportunities also create the greatest risks”.Footnote 22 There could be high stakes at play, due to heightened interests in using data in “the commercial/domestic security context”.Footnote 23 A first matter to consider in terms of the relevant legal regimes in this regard is to distinguish between data protection and the protection of digital privacy/private life as a human right. Therefore, this section first provides a brief overview of existing data protection regimes. Next, the relevant legal provisions of the International Covenant on Civil and Political Rights (ICCPR)Footnote 24 and the European Convention on Human Rights (ECHR)Footnote 25 are outlined, with a note on derogations. Lastly, similarities and dissimilarities between the respective features of data protection and protection of digital privacy/private life are discussed.
An intricate web of data protection
At the global level, rapid technical development has sparked several initiatives in response to what in essence is modern and intrusive technology. A case in point of such general data protection is the Organisation for Economic Co-operation and Development (OECD) Privacy Framework.Footnote 26 But even before the OECD created this framework, the Council of Europe (CoE) had put in place the origins of what is today referred to as Convention 108+.Footnote 27
With a sector-specific approach, the CoE has also regulated the use of personal data in the police sector, pointing out that
[t]he collection of personal data for police purposes should be limited to such as is necessary for the prevention of a real danger or the suppression of a specific criminal offence. Any exception to this provision should be the subject of specific national legislation.Footnote 28
Additionally, in 2021, the CoE issued guidelines concerning the use of facial recognition technology (FRT).Footnote 29 They stipulate that processing of biometric data requires an appropriate legal basis, including safeguards rooted in domestic law.Footnote 30
In the European Union (EU), the General Data Protection Regulation (GDPR)Footnote 31 and EU Directive 2016/680 provide general data protection.Footnote 32 The authoritative definitions of these documents have a reach beyond themselves.Footnote 33 Article 4(1) of the GDPR defines the data subject as a natural person, either identified or identifiable.Footnote 34 As per Directive 2016/680, domestic legislation must operationalize the safeguards stipulated by the GDPR.Footnote 35 The same definition of who is a data subject appears in the regulation that applies to EU institutional organs.Footnote 36 However, Article 2(2)(d) of the GDPR explicitly excludes the area of law enforcement. Instead, the relevant framework for data processing in the realm of law enforcement is the Law Enforcement DirectiveFootnote 37 developed alongside the GDPR.
The right to data protection requires the military to create a basic framework which enables concrete accountability for any data processing that is undertaken, be it of sensitive or non-sensitive data. Furthermore, the ambition of the EU data protection law, to harmonize the data protection rules, ought to make data transfers among members of military coalitions easier.Footnote 38 Data vulnerabilities which give rise to operational implications ought to be minimized, most notably with regard to “external exposure of combatants’ personal data”.Footnote 39 As for civilians, the GDPR's all-encompassing approach to data should, at least in theory, also cast a regulatory net over non-personalized data, which may still function as an identifier.Footnote 40
Turning to human rights protection, the European Charter of Fundamental RightsFootnote 41 has two provisions relevant to digital privacy/private life. Article 7 protects the right to respect for private life, and Article 8(1) separately provides for protection of personal data. This underlines the fact that the right to data protection is distinctive from the right to privacy/private life, and that these two rights should be treated separately, thus distinguishing the European Charter from the general IHRL approach of constructing data protection as a subset of the right to privacy/private life.Footnote 42
A fundamental human right to digital privacy/private life
At the heart of all human rights instruments is the protection of the individual data subject.Footnote 43 The Universal Declaration of Human Rights (UDHR)Footnote 44 safeguards the right to privacy in Article 12,Footnote 45 a provision made enforceable by Article 17 of the ICCPR.Footnote 46 Examining digital privacy under this provision, Lubin discerns five governing principles: (1) The principle of legality, (2) the principle of necessity, (3) the principle of proportionality, (4) the principle of adequate safeguarding, and (5) the principle of access to remedy.Footnote 47 These principles can be seen to provide a general framework for what constitutes lawful processing of personal data.
Notably, IHRL has a double focus of protecting the data subject, because it shields the individual both from actual harm and also from the risk of harm that may foreseeably arise from the processing of subject data. In other words, the focus is on the purpose of data processing.Footnote 48 This will inevitably entail different kinds of obligations, such as obligations of result (to prevent harm) and obligations of conduct (specified actions to be undertaken in the face of foreseeable risk).Footnote 49 The ICCPR protects the right to privacy by shielding the individual from arbitrary or unlawful interference. No specific test is enshrined in the right to privacy under the ICCPR, as is the case with the ECHR, to which we now turn.
The ECHR does not provide an autonomous right to data protection;Footnote 50 instead, data protection is addressed as a subset of the right to private life under Article 8.Footnote 51 Therefore, despite the increasing scope of what falls under the notion of digital private life, all contemporary processing and handling of subject data will not automatically or categorically come within the ambit of Article 8 or otherwise avail itself of protection by the ECHRFootnote 52 – a nexus to at least one of the substantial ECHR rights must be established. On the other hand, when digital private life falls within the ambit of the ECHR, the data subject will be protected from harm and from the risk of harm throughout the full data life cycle of collection, retention and disclosure of the subject data by State authorities as well as by private actors. Nor is other dataFootnote 53 unprotected: if other data makes a person identifiable, there is a reasonable expectation of privacy that should be protected.Footnote 54 This means that the European Court of Human Rights (ECtHR) may in hindsight scrutinize each phase of the data life cycle by the three-pronged cumulative test to establish if any interference with digital private life (1) was in accordance with the law, (2) was done in pursuance of any of the permissible aims listed, and (3) was necessary in a democratic society.Footnote 55 The listed grounds for limitations are national security, public safety, the economic well-being of the country, the prevention of disorder or crime, the protection of health or morals, and the protection of the rights and freedoms of others.Footnote 56 For more than forty-five years, the ECtHR has upheld that there is simply “no room for the concept of implied limitations”.Footnote 57 Furthermore, in the ECtHR's view, the same standard applies when the management or processing of subject data involves several States. So-called end-to-end protection first requires an assessment of the necessity and proportionality of the data disclosure. Second, from the outset, any bulk interception should be subject to independent authorization.Footnote 58 Third, the operation should be subject to supervision and ex post facto review.Footnote 59 The end-to-end requirement includes clear rules on destruction of incepted data even if no sensitive subject data is present.Footnote 60 Pertaining to military operations, “data should be deleted at the latest when the military operation in which the data has been collected ends”.Footnote 61 There can be no doubt about the ECtHR's position that a State which has the capacity to employ modern technology must accompany such usage with “a simultaneous development of legal safeguards securing respect for citizens’ Convention rights”.Footnote 62 Engaging in subject data processing using modern technology without relevant national legislation is simply not an option for a democratic society.
The ECtHR has recently started to grapple with data collection that takes place in real time. In the case of Glukhin v. Russia,Footnote 63 the applicant complained that there was a violation of his right to private life under Article 8, “following the processing of his personal data in the framework of administrative offence proceedings, including the use of facial recognition technology”.Footnote 64 The ECtHR held that there had been a violation of the right to private life due to (a) the use of FRT to identify a person conducting a merely administrative offence and (b) the application of FRT in real time to locate and arrest him.Footnote 65
IHRL, unlike the LOAC, permits States to derogate from some rights in specific circumstances.Footnote 66 Derogations from human rights treaties primarily remain a domestic matter.Footnote 67 Derogations can be used to justify that national legislation is not complied with in full for a specific period of time; in an emergency that “threatens the life of the nation”, a State bound by the ECHR could have a legitimate ground to derogate from Article 8. One needs to distinguish, however, between the listed legitimate grounds that already permit interference with the right to digital private life and any measures that are applied following a derogation. A derogation might, at least theoretically, broaden the permissible grounds for interference beyond those explicitly listed as legitimate reasons to infringe on the rights protected by Article 8. Although it is difficult to imagine additional grounds for interference beyond the inherent grounds for limitations (most notably threats to the nation and the protection of public safety and public order), one could assume that a detailed piece of legislation (as required with regard to the collection, retention and disclosure of subject data) might be derogated from when it comes to duration and procedural requirements. As with any derogation, the ensuing interference with the right to digital privacy/private life cannot be entirely unrestricted; it will have to remain in accordance with international law, and any derogation will be subject to legal review under IHRL.
Seeking to disentangle the protective web
Under the GDPR, here seen as a leading regulation for data protection, the subject data is objectified and carries features of commodity,Footnote 68 or property.Footnote 69 This implies that what is protected is “the process of and efforts to secure and safeguard such digital property from loss, corruption, or compromise, whether inadvertent or due to the nefarious actions of other actors”.Footnote 70 In addition to finding the balance between data protection and the interests of the free market, the GDPR sets out to ensure that “uniform data protection rules apply in all areas of EU law”.Footnote 71 With an explicit focus on data, the right to data protection serves to give “individuals more control over more data”Footnote 72 compared to what is feasible under the right to privacy/private life. Several differences between data protection and the right to privacy/private life can be discerned. In addition to the obvious differences in application, the object and purpose of these rights are distinctively different. Data protection is primarily concerned with the subject data and seeks to provide the same protective standard to the same kind of subject data across the EU member States. Approaching subject data as an objectified commodity seemingly takes on the character of an obligation of conduct and establishes a framework that theoretically can not only protect subject data from today's processing but also, at least in part, provide protection from socio-technical processing made possible in the future.Footnote 73
By contrast, IHRL maintains a focus on (a) the actual harm and (b) the risk of harm that sensitive data may pose to the data subject. Protecting the data subject from harm is essentially an obligation of result, leaving room for the State to find and apply the most appropriate means and methods. Furthermore, the right to digital privacy/private life within the human rights framework can, if needed, be considered together with additional rights such as freedom of assembly, freedom of movement or the right to life. Additional differences are found in aspects of accountability measures, where the GDPR for instance requires data protection officers.Footnote 74 Such structures are designed to provide a remedy for aggrieved individuals. Nevertheless, it can be challenging for the data subject to prove non-material harm like distress under these regulations.Footnote 75 Thus, claiming a violation of the right to digital privacy/private life under IHRL constitutes an additional possible remedy, after domestic remedies have been exhausted.
Turning to the LOAC, two interesting aspects will be revealed. First, provisions relevant for data processing can be noted in the LOAC. Second, and perhaps more interestingly, the distinction between data protection and the right to digital privacy/private life is also noticeable in this legal regime.
LOAC provisions applicable to data protection and digital privacy/private life
Militaries will be well aware of the fact that in an international armed conflict (IAC), the LOAC – consisting of the Hague Regulations,Footnote 76 the four Geneva ConventionsFootnote 77 and, in the case of IAC, Additional Protocol I (AP I)Footnote 78 – provides protection of subject data in a manner which must be described as topical. LOAC rules about subject data are predominantly found in provisions that relate to those who are not or are no longer taking part in active hostilities. In other words, rules that explicitly deal with data processing are not first and foremost associated with active hostilities. At the outset, it is essential to note a decisive difference in the geneses of IHRL and the LOAC: human rights treaties are designed to protect the rights of individuals within the jurisdiction of the State Party from arbitrary interference by the State, while the LOAC is, in IAC, designed to protect groups of persons.
International armed conflict and the protection of digital privacy/private life of civilians
In the following paragraphs, two examples of data processing and privacy protection under the LOAC will be presented that arguably mirror data protection and the protection of digital privacy/private life discussed above.
A focus on the processing of sensitive data can be found in Article 34 of Geneva Convention II (GC II).Footnote 79 This provision, pertaining to hospital ships, underlines that the mere possession of equipment for communication has not been taken as a contravention of the said Article. What matters is what the equipment is used for: “the equipment shall not be used in any circumstances to transmit intelligence data nor in any other way to acquire any military advantage”.Footnote 80 It is accepted that “due to developments in communication technology, most prominently the use of satellites, encryption is now so common that it is unavoidable as an available technology”.Footnote 81 With reference to the OECD Privacy Framework,Footnote 82 the Commentary on GC II reminds us that due to the right to privacy/private life, all data that is transmitted from hospital ships “must be afforded a reasonable level of security, or a level of security that is commensurate with the sensitivity of such data and the risks involved in their processing”.Footnote 83 This underlines that data collected from data subjects on hospital ships may only be used for non-hostile purposes. The provision establishes the permissive processing of subject data in a manner that is akin to the data protection laws discussed above.
The other example, pertaining to digital privacy/private life, can be found in Geneva Convention IV (GC IV),Footnote 84 which protects civilians who find themselves in the hands of a party to the conflict or Occupying Power of which they are not nationals. The general provision for their protection is found in Article 27, and it ensures the fundamental rights and freedoms of this protected group. The balancing against other interests that may be present in the context appear in the last paragraph of Article 27, which allows States to “take such measures of control and security in regard to protected persons as may be necessary as a result of the war”.Footnote 85 The balancing here makes no mention of military advantage and clearly concerns protected civilians. Despite the wide discretion afforded to the State in taking measures, such measures “should not affect the fundamental rights of the persons concerned”;Footnote 86 in other words, the obligation is one of result. The provision explicitly points out that the most severe permissive interference is internment and assigned residence.Footnote 87 Therefore, there can be no doubt that anything leading to physical harm of the data subject is prohibited, with no exceptions.Footnote 88 Furthermore, the explicit prohibition against murdering civilians (and those hors de combat) is established as a norm under customary international law in IAC as well as non-international armed conflict (NIAC).Footnote 89 This underlines the conclusion that Article 27 of GC IV implicitly presumes the protection of the right to life of the protected persons in question. Without the right to life, there would simply not be any other fundamental rights (including digital privacy/private life) to be concerned about. This customary presumption of protecting the right to life arguably becomes even more important in the context of NIAC.
A note on NIAC, data protection and the protection of digital privacy/private life
It is well known that the rules pertaining to NIACs remain rudimentary. Additional Protocol II (AP II)Footnote 90 and Article 3 common to the four Geneva Conventions are the parts of the LOAC that cover NIAC, in addition to those rules that have attained customary law status in NIAC. The problem of a higher threshold for violence that attaches to AP II is well known, as is the fact that AP II, even if ratified by a State, still does not apply to fighting which occurs between armed groups without the involvement of the State, and nor does it apply to State B if it intervenes to support a fight against an armed group (or groups) on the territory of State A.Footnote 91
Additional complications surrounding the applicable LOAC during NIAC relate to the fact that in NIAC there is no equivalent to the combatant status of IAC;Footnote 92 the terminology used for those fighting alongside an armed group varies.Footnote 93 Nevertheless, a distinction between those fighting and civilians is essential in order to provide civilians with the protection to which they are entitled.Footnote 94 This lack of a formal recognition of a group of persons that essentially take active part in NIAC hostilities makes it notoriously difficult to identify members of such groups.Footnote 95 If the processing of subject data contributes to or in any other way furthers a status-based labelling, it must be rejected.Footnote 96 It is at this point worth recalling that the LOAC rules which “[address] direct participation in hostilities are the same in IACs and NIACs. Civilians have legal protection against the effects of hostilities ‘unless and for such time as they take a direct part in hostilities.’”Footnote 97 As Hampson underlines, for a person to become targetable, s/he has to be doing something – it is the behaviour that is the determining element, not a status-based labelling, with or without the support of processed subject data.Footnote 98 This is not the place to engage in the debates on the scope of direct participation in hostilities and targeting in NIAC, but what can be concluded is that with an emphasis on behaviour, no identification based on the processing of subject data is sufficient to establish that the data subject is a lawful target in NIAC.
Matters to be observant about concerning data protection and the right to digital privacy/private life in operational practice
Although the standard of what data processing of subject data is acceptable will differ between data protection regulations, IHRL and the LOAC, it is essential to remain cognizant of the purpose for which the data processing (collection, retention and disclosure) of the subject data is undertaken. Regarding the obligation to only process data for the purpose for which it was originally collected, all the discussed legal regimes converge. As already discussed, the obligation will consist in preventing actual harm as well as foreseeable risk of harm. In the following sections, the two aspects of the purpose of subject data processing and the foreseeable risk in relation to subject data processing are discussed in turn.
Subject data processing for intended purpose only
Data protection laws, IHRL and the LOAC converge with regard to the requirement that subject data can only permissively be used for the purpose for which it was originally intended. Failure to meet this requirement would constitute arbitrariness. Processing of civilians’ subject data may under no conditions lead to intentional physical or mental harm to the data subject. The LOAC is firm on this;Footnote 99 IHRL, on the other hand, may at first glance appear more flexible in that the right to digital privacy/private life is non-absolute. However, under the ECHR, a detailed three-pronged test is established. Although there is also the possibility (at least in theory) of derogation, it is less clear what additional manoeuvre space a State can gain if it chooses to derogate, given the already inherent and permissible limitations to this right.
The foreseeability of subject data processing causing either harm or risk of harm to the data subject must be considerably higher in the context of armed conflict compared to non-armed conflict situations. At the same time, a higher acceptance of risk is already enshrined in the LOAC, given that it is designed especially for armed conflict, with no additional scope for derogations.
Properly addressing foreseeable risk beforehand
Foreseeable risk means that the State has to take sufficient action beforehand. The actual harm is not part of the assessment.Footnote 100 When determining if sufficient preventive action has been taken in light of foreseeable risk, three threshold factors have been proposed: (1) the level of harm that may be expected, (2) the likelihood that it will occur, and (3) the level of diligence that is required from the State beforehand.Footnote 101 It may well be that this inevitably creates predominantly obligations of conduct. Additionally, since what is examined is the foreseeable risk (rather than the actual harm), the threshold for triggering the preventive obligation is lower, because the task is to anticipate risk.Footnote 102 Preventive activities normally include (but are not limited to) ensuring that appropriate legislation and administrative procedures are in place, covering all stages of the full data life cycle, proper planning of any intervention to actively minimize foreseeable risk, ensuring that appropriate equipment is used, and ensuring that adequate training is given beforehand.
In the military context, “responsibility for the intent and the decision rests solely with the commander” in any operation.Footnote 103 Data protection rules can of course provide support in decision-making, with the ambition of harmonizing data processing and creating a framework that establishes generic and appropriate procedures and institutions for data handling. Perhaps even more important in relation to foreseeable harm, and the risk thereof, is the notion that a commander's judgemental skill is a learned ability,Footnote 104 and that it therefore can – and must – be trained.
To conclude
The three legal regimes discussed in this article give rise to distinctive and overlapping obligations when it comes to the processing of sensitive subject data. The issue concerns two separate rights and, generally speaking, two kinds of obligations – that is to say, the obligation of result and the obligation of conduct. In this article it has been demonstrated that militaries need to be cognizant of the fact that data protection and the right to digital privacy/private life both merit separate treatment, even though they at times overlap. Furthermore, both rights are protected in non-armed conflict situations and both remain protected should armed conflict erupt. It has been illustrated that also in the LOAC, the right to data protection and a general right to privacy/private life are separately represented. In other words, there is a solid legal framework in place which stipulates that subject data may only be used for the intended purpose. At no stage in the data life cycle (collection, retention and disclosure) is arbitrariness permissible. Using data for aims that deviate from the purpose for which the subject data was collected would constitute such prohibited arbitrariness.
With the common purpose of preventing harm to the data subject, data protection laws, IHRL and the LOAC to varying degrees also address the foreseeable risk of harm by data processing at any stage in the data life cycle. It has been outlined that due to IHRL's underpinning purpose of shielding people from State intrusion, claiming a violation of the right to digital privacy/private life under, for instance, the ECHR can constitute an additional possible remedy when domestic remedies have been exhausted. It can therefore be concluded that data protection laws, IHRL and the LOAC reinforce each other when it comes to data protection and the protection of digital privacy/private life.
In navigating this complex and intricate web of data protection rules and the right to privacy/private life, it is essential that militaries hold high standards with regard to planning, preparation, selection of equipment and prior training when processing sensitive subject data. Ultimately, this is about the obligation to prevent harm, and additionally to anticipate foreseeable risks attached to any processing of subject data.