Leiden University. The university to discover. BRAVE NEW BORDERS Lecture 3: “Smart” Borders Jorrit RijpmaEUI Summer Academy 2013.

Slides:



Advertisements
Similar presentations
Ministry of Interior of Montenegro,,The Fight against corruption and organized crime in Montenegro Ministry of Interior of Montenegro,,The Fight against.
Advertisements

Introduction to basic principles of Regulation (EC) 45/2001 Sophie Louveaux María Verónica Pérez Asinari.
The Area of Liberty, Security and Justice. Objectives Free movement for EU citizens Security and safety in a Europe without borders Figth against international.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
"RPAS potential for European border surveillance"
Health and Consumers Health and Consumers 1 Commission’s expectations to MS’ structures of enforcement Enforcement of European Animal Welfare related legislation.
An Ocean of Opportunity: An integrated maritime policy for the EU 1 Places of refuge: General legal framework and developments within IMO and the EU Alexandros.
Europol’s tailor-made data protection framework
EU: Bilateral Agreements of Member States
Privacy and security: Is Europe going banana? Jean-Marc Van Gyseghem Head of Unit « Liberties in the information society » CRID – University.
EU: Bilateral Agreements of Member States. Formerly concluded international agreements of Member States with third countries Article 351 TFEU The rights.
In-depth look at ISACS Border controls and law enforcement cooperation.
1 Ann-Charlotte Nygård, Programme Manager, FRA Roundtable: Possibilities for cooperation on consular and visa issues in the Danube Region.
BY IVAN ZELIĆ Visa Information System EU Migration Law and Policy Jean Monnet Modul prof. dr. sc. Iris Goldner Lang.
A project implemented by the HTSPE consortium This project is funded by the European Union SUSTAINABLE GROWTH LIFE
A Common Immigration Policy for Europe Principles, actions and tools June 2008.
Migration Law Schengen Information System by Konrad Wilk.
Regional Conference Intellectual Property Crime Bahrain April 2008.
1 Photo PAMECA IV TEAM Design of PAMECA IV PAMECA IV started in July 2013 and is scheduled to run until October Its overall objective.
Oliver SEIFFARTH DG Home Affairs European Commission
Programming of International Development Assistance Donor Sectoral Meeting Ministry of Interior September 17, 2007.
A project implemented by the HTSPE consortium This project is funded by the European Union SECURITY AND CITIZENSHIP JUSTICE
4 Rules;  Enter into state without legal documents  Overstaying  Having a job without work permit  Violating both work and residence permits.
Moving Forward With the African Dialogue Cross-Border Principles By Mary Gurure Manager, Legal Services and Compliance COMESA Competition Commission Lilongwe,
Europol Police Directorate International Operational Police Cooperation Department INTERPOL EUROPOL SELEC THURSDAY 12 DECEMBER 2013.
1 BORDER SECURITY AND MANAGEMENT Intra-service co-operation Inter-agency co-operation Presented by: Visiting expert Goran Krsteski Geneva.
EU Funding opportunities : Rights, Equality and Citizenship Programme Justice Programme Jose Ortega European Commission DG Justice.
1 Building the Privacy culture, starts with the youngsters and their education 20 th and 21 st June 2013 Zagreb, Croatia.
EUNetPaS is a project supported by a grant from the EAHC. The sole responsibility for the content of this presentation lies with the author(s). The EAHC.
Piemonte Workshop 1 11 September 2006 Paolo Salieri European Commission DG ENTR-H4 Security research in FP7.
Fight against terrorism. EU institutional/legal framework A bit of history 1957: European Communities are born.
| 1 European Maritime Day 2010 Gijon Workshop 2.9 Shipping in the Common European Maritime Space Gijón, 21 May 2010 European maritime transport space without.
1 Eurostat’s grant policy for 2010 Luxembourg, 23/03/2010 Unit A4 – Financial Management Section 3 – Grant procedures and agreements.
A project implemented by the HTSPE consortium This project is funded by the European Union SECURITY AND CITIZENSHIP RIGHT AND CITIZENSHIP
EN Regional Policy EUROPEAN COMMISSION Information and Publicity SFIT meeting, 12 December 2005 Barbara Piotrowska, DG REGIO
REGIONAL POLICY EUROPEAN COMMISSION The contribution of EU Regional/Cohesion programmes Corinne Hermant-de Callataÿ European Commission,
CRIMINAL LAW OF THE EUROPEAN UNION 1 April 2015 THE LISBON TREATY AND CRIMINAL LAW Dr. sc. Zoran Burić Department of Criminal Procedural Law University.
SOFIA: A SUCCESS STORY IN THE OPEN CITIES PROJECT Lyubena Asenova PETROVA City of Sofia OPEN DAYS 2008 Workshop Brussels, October.
The 7th Framework Programme for Research: Strategy of international cooperation activities Robert Burmanjer Head of Unit, “International Scientific Cooperation.
1 M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 9 – Financial Services Bilateral.
Workshop on Implementation of the Schengen Action Plan in the area of border management and personal data protection INTEGRATED BORDER MANAGEMENT Skopje,
Week 12. Lecture 2. Health Law & the EU Cross-border healthcare: patients’ rights.
Workshop on Implementation of the Schengen Action Plan in the area of border management and personal data protection EXTERNAL BORDERS Skopje, 12 May -
Example of the Polish Border Guard The 12th of May 2011 May Sławomir Markowski.
0 Project Conference – Friday 8 February DEVELOPING THE NATIONAL CAPABILITY FOR INTEGRATED BORDER MANAGEMENT (IBM) IN LEBANON Project Funded by the European.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 31 – Common Foreign and Security Policy.
Borders Aïda Martinez Paula Marsal Rubén Martin Vicenç Verge.
František Nonnemann Skopje, 10th October 2012 JHA Data protection and re-use of PSI as a tool for public control–CZ approach.
Developing National Capability for Integrated Border Management (IBM) in Lebanon Project Funded by the European Union Implemented by the International.
Macedonia-Skopje, 13. May 2011 Security of data and data protection in relation to visa issuance Tanja Slak.
Maritime Security as an Integral Part of an
The Tripartite Working Arrangement (TWA) of EFCA, EMSA and Frontex
European Union Agency for Fundamental Rights
The 3rd package for the internal energy market
THE NEW GENERAL DATA PROTECTION REGULATION: A EUROPEAN OR A GLOBAL STANDARD? Bart van der Sloot Senior Researcher Tilburg Institute for Law, Technology,
General Data Protection Regulation
Recent Problems of Border Control Management of the European Union
Debate Session II – 10 October 2013
Managing the migration crisis How statistics can help
The role of the ECCP (1) The involvement of all relevant stakeholders – public authorities, economic and social partners and civil society bodies – at.
The activity of Art. 29. Working Party György Halmos
Culture Statistics: policy needs
European response to Human trafficking
European Labour Law Jean Monnet Chair of EU Labour Law Academic Year Silvia Borelli:
Juan Gonzalez eGovernment & CIP operations
Noor Vergeer, Wojtek Kalocinski Border management and Schengen
Advancing LGBTI equality in the European Union
Advancing LGBTI equality in the European Union
Advancing LGBTI equality in the European Union
National action plans to combat forced labour and trafficking:
Presentation transcript:

Leiden University. The university to discover. BRAVE NEW BORDERS Lecture 3: “Smart” Borders Jorrit RijpmaEUI Summer Academy 2013

Leiden University. The university to discover. 1)EUROSUR: surveilling the external borders 2)The entry-exit system 3)The Registered Traveller Programme

Leiden University. The university to discover.

1.EUROSUR: surveilling the external borders Article 12 SBC on surveillance 4. Surveillance shall be carried out by stationary or mobile units which perform their duties by patrolling or stationing themselves at places known or perceived to be sensitive, the aim of such surveillance being to apprehend individuals crossing the border illegally. Surveillance may also be carried out by technical means, including electronic means.

Leiden University. The university to discover. Schengen Borders Code Parliament v. Council (C-355/10) ECJ does not define “surveillance”, but seems to implicitly agree with AG Mengozzi: surveillance authorises interventions which go beyond simply monitoring the border. Including preventive or deterrent measures (para. 58)

Leiden University. The university to discover. Frontex Article 7(1) of Regulation 2007/2004: The Agency may acquire, itself or in co-ownership with a Member State, or lease technical equipment for external border control to be deployed during joint operations, pilot projects, rapid interventions, joint return operations or technical assistance projects in accordance with the financial rules applicable to the Agency

Leiden University. The university to discover. EUROSUR Feasibility studies by Council (2003) and Frontex: MEDSEA (2006) and BORTEC (2007) Frontex’s European Patrol’s Network EUROSUR Roadmap: COM(2008) 68 final Legislative Proposal:COM(2012) 873 final Agreement in First Reading: Council doc /13, 13 June

Leiden University. The university to discover. EUROSUR Roadmap PHASE 1: Upgrade and extend national border surveillance systems and interlinking national infrastructures PHASE 2: Develop and implement common tools and applications for border surveillance at EU level (including “examination of the need for legislation”) PHASE 3: Create a common monitoring and information sharing environment for the EU maritime domain

Leiden University. The university to discover. EUROSUR proposal Article 1: Subject- matter This Regulation establishes a common framework for the exchange of information and cooperation between Member States and the Agency in order to improve the situational awareness and to increase the reaction capability at the external borders of the Member States of the European Union, hereinafter referred to as "EUROSUR", for the purpose of detecting, preventing and combating illegal immigration and cross- border crime and contributing to ensuring the protection and saving the lives of migrants.

Leiden University. The university to discover. EUROSUR proposal Article 5: National Coordination Centre 1.Each Member State shall designate, operate and maintain a national coordination centre, which shall coordinate and exchange information between all authorities with a responsibility for external border surveillance at national level as well as with the other national coordination centres and the Agency. (…) Technical Regulation with enormous transformative potential.

Leiden University. The university to discover. EUROSUR proposal Article 12:Common application of surveillance tools 1.The Agency shall coordinate the common application of surveillance tools (…) to supply the [NCC] surveillance information on the external borders and on the pre- frontier area (…)

Leiden University. The university to discover. EUROSUR proposal 3.The Agency shall provide the information referred to in paragraph 1 by combining and analysing data which may be collected from the following systems, sensors and platforms: a)ship reporting systems in accordance with their respective legal bases; b)satellite imagery; c)sensors mounted on any vehicles, vessels or other craft (EARLIER VERSION: c) sensors mounted on any platforms, including manned and unmanned aerial vehicles)

Leiden University. The university to discover. EUROSUR Proposal Article 10Situational pictures consist of 3 layers: 1)Events 2)Operational 3)Analysis Article 9:National Situational Picture Article 10: European Situational Picture Article 11: Common Pre-Frontier Intelligence Picture

Leiden University. The university to discover. ECHR on Surveillance Peck v the United Kingdom “the monitoring of the actions of an individual in a public place by the use of photographic equipment which does not record the visual data does not, as such, give rise to an interference with the individual’s private life” (para. 132)

Leiden University. The university to discover. Common Pre-Frontier Intelligence Picture

Leiden University. The university to discover. Frontex Regulation: data processing Recital 19 and Article 11a: Regulation (EC) No 45/2001 applies Art. 11bLimited power to collect and process personal data for joint return operations Art. 11cLimited power to collect personal data during joint operations: Persons suspected of cross border crime, including human trafficking and smuggling Risk analysis and onward transmission to Europol and other EU law enforcement agencies

Leiden University. The university to discover. EUROSUR Proposal Recital 7 Directive 95/46/EC, Regulation (EC) No 45/2001 and FD 2008/977/JHA apply, in case more specific instruments such as Regulation (EC) No 2007/2004 do not provide for a full data protection regime

Leiden University. The university to discover. Cooperation with neighbouring countries Art. 18 -Exchange of information on the basis of bilateral or multilateral agreements is allowed on the condition of: a)Compliance with fundamental rights b)Purpose limitation + compliance with EU data protection rules -Information that can be used to identify TCN in need of international protection shall not be exchanged -Onward transmission of the information is prohibited

Leiden University. The university to discover. Cooperation with Third Countries Art. 14 Frontex Regulation Cooperation with third countries Cooperation shall serve to promote European border management standards, including respect for fundamental rights Agency may launch and finance technical assistance projects in third countries Art. 11c (6): onward transmission to third countries or third parties prohibited

Leiden University. The university to discover. 2.Entry-Exit System EUROSUR part of the “EU border package” (COM(2008) final) COM(2008) 69 final: “Preparing the next steps” 1)Entry-exit system 2)Registered Traveler Programme 3)European ESTA (Electronic System for Travel Authorisation) COM(2013) 295 final

Leiden University. The university to discover. 2.Entry-Exit System According to the European Commission, yearly 109 million TCN without a visa and 73 million TCNs with a visa cross the EU borders. At the same time this is only a small percentage of the overall flow across borders (consisting mainly of EU citizens) Costs of the Smart Borders proposals estimated by the Commission at 1.1. billion euro

Leiden University. The university to discover. Article 4: Purpose Improving external border management by providing information on entry and exit of TCNs -enhance checks and combat irregular immigration; -calculate and monitor duration of authorised stay; -assist in the identification of any person who do not fulfill conditions for entry and stay; -identify overstayers and take appropriate measures; -gather statistics.

Leiden University. The university to discover. Article 11 and 12: Data collected 1)Name 2)Date of birth, place of birth, country of birth, nationality or nationalities and sex; 3)Data relating to travel document(s); 4)Visa sticker number and data relating to visa 5)at the first entry on the basis of the visa, the number of entries and the authorised period of stay as indicated on the visa sticker; 6)RTP status 7)10 fingerprints (if over 12yo)

Leiden University. The university to discover. Article 11 and 12: Data collected Upon entry: 1)date and time of the entry; 2)MS of entry, border crossing point and authority that authorised the entry; 3)the calculation of the number of days of the authorised stay(s) and the date of the last day of authorised stay Upon exit: 1)date and time of the exit; 2)MS and the border crossing point of the exit

Leiden University. The university to discover. Individual Rights and Supervision Article 21:Deletion of data in case of an “unforeseeable and serious event” Article 29:Liability for unlawful processing Article 30:Keeping of records of access Article 32:Penalties for misuse

Leiden University. The university to discover. Individual Rights and Supervision: Chapter VI Very similar to the other data bases we have seen: Article 33:Right of Information Article 34:Right of access, correction and deletion Article 35:Assistance by DPA Article 36:Judicial Review Articles 37-39: Joint supervision by DPA and EDPS

Leiden University. The university to discover. Article 46(5): Access to Law Enforcement Staff The first evaluation shall specifically examine the contribution the entry-exit system could make in the fight against terrorist offences and other serious criminal offences and will deal with the issue of access for law enforcement purposes to the information stored in the system, whether, and if so, under which conditions such access could be allowed, whether the data retention period shall be modified and whether access to authorities of third countries shall be granted, taking into account the operation of the EES and the results of the implementation of the VIS.

Leiden University. The university to discover. Impact assessment Civil society (academia, think tanks and NGOs) and the private sector participated actively in the debate and organised several relevant conferences. Civil society provided input in various conferences and academic papers published on the subject. Most were critical of the setting up of an EES, considered that the added value was not proven and that it would not be proportionate to collect such amounts of personal data in relation to the aims pursued.

Leiden University. The university to discover. Criticism 1)Costs and technical feasibility (Cf. US Entry-Exit System) 2)Necessity and proportionality -No clear figures on the extent of the problem to be solved -Only identifies overstayers as such: limited contribution to return policy -Mere statistical purpose alone cannot justify EES -Assessment should be made as regards the purpose of border management, not law enforcement.

Leiden University. The university to discover. Criticism 3)Relation with other legislation insufficiently clear: -Other data bases (SISII, VIS) -Return Directive -Visa Regulation -Schengen Borders Code -EU free movement rights 4)First wait for overhaul of data protection legislation 5)Concerns as regards the capacity of the DPAs and EDPS 6)First wait for evaluation of exiting systems 7)Reliability of the data

Leiden University. The university to discover. Criticism 8)Specific concerns as regards the data protection rights Article 20:Retention period of 181 days (entry-exit record), 91 days after last exit if no entry for 90 days (individual file) or 5 years in case of overstay Article 21:Right to have data corrected and/or deleted Article 27:Transfer of data to third countries Practical possibilities to enforce rights when no longer on EU territory, remedies left to national law

Leiden University. The university to discover. Registered Traveler Programme COM(2013) 97 final Fee based RTP for pre-vetted and prescreened frequent TCN with the data (biometrics, alphanumeric data and unique identifier number) stored in a Central Repository and the unique identifier (application number) stored in a token Token in the form of a machine-readable card containing only a unique identifier (i.e. application number), which is swiped on arrival and departure at the border using an automated gate.

Leiden University. The university to discover. 3.Registered Traveler Programme 1)Consequences of refusal of RTP status 2)De facto discrimination on the basis of wealth or origin 3)Biometric data (defined as “fingerprints”) 4)Questionable whether capable of off- setting the delays caused by the entry- exit system 5)Interest of private security industry

Leiden University. The university to discover. Final Remarks 1)Integrated border management and the e- border create a multi-level entry system; 2)Migration and security issues are conflated at the border and lead to a risk-based, automated approach towards travelers; 3)There is a hunger for (biometric) data and a firm belief in the possibilities of new technologies; 4)New technologies tested on a group that is often more vulnerable and has less easy access to legal remedies; 5)Technical solutions are not as a-political as sometimes represented; 6)Lack of clear legal drafting and consist rule- making.

Leiden University. The university to discover. Thank you for your participation and… Good luck to those taking the exam!