Thoughts on the use of personal data in the fight against coronavirus

Viewpoints
March 9, 2020
1 minutes

The rapid spread of the coronavirus is causing alarm around the world.  This almost unprecedented global event is leading to various unforeseen consequences, including the collection, use and sharing of personal data of affected individuals - and, in some cases, persons connected to them - in ways not envisaged only a few weeks ago.  As this article illustrates, the processing of personal data of this nature can potentially have serious, albeit sometimes unintended, consequences.

Organisations that are subject to the General Data Protection Regulation (GDPR), which are collecting and/or using data in connection with the coronavirus outbreak should bear in mind a number of data protection issues. If organisations are collecting and using data about identifiable individuals, such data processing will be subject to the GDPR.  If, as is likely, some of such information is health related, it will be deemed to fall within the 'special categories of personal data', to which more stringent requirements apply. 

Among other things, organisations should consider what data they are collecting, who such data relates to, what they are using it for and who they are sharing it with.  They should consider whether their existing privacy notices adequately cover the collection and use of such data in a transparent and justifiable way; what legal basis they have for processing such personal data and whether any use and sharing of such data is proportionate and carried out in accordance with appropriate data-sharing agreements.

Organisations should also consider the security of any such personal data and ensure that appropriate technical and organisational measures are in place to adequately protect it. Depending on measures taken by organisations to combat coronavirus, unusual security issues could become relevant to all of the organisation's data. For example, if an organisation’s employees are all required to work remotely, consideration should be given to whether this may increase security vulnerabilities within an organisation’s IT systems.