Accessibility Tools

- T -


TFTP

The Terrorist Finance Tracking Program (TFTP) is a United States government program to access the SWIFT transaction database, revealed by The New York Times in June 2006. Based in Belgium, SWIFT (Society for Worldwide Interbank Financial Telecommunication) establishes common standards for financial transactions worldwide. The Terrorist Finance Tracking Program is viewed as a tool in the "Global War on Terrorism". It is said to allow additional scrutiny that could prove instrumental in tracking transactions between terrorist cells. Concerns have been raised that this classified program might be a violation of U.S. and European financial privacy laws, because individual search warrants to access financial data were not obtained in advance.

In February 2010, on the basis of these privacy concerns, the European Parliament rejected the conclusion of an agreement allowing US authorities access to European financial transactions data. In May 2010, the Commission started negotiating a new agreement, with the aim of ensuring better data protection safeguards.

The EDPS adopted an opinion on the European Commission's draft agreement in June 2010 in which he called for further data protection improvements. In July 2010, the European Parliament gave its approval to the conclusion of a revised agreement.

Third country 

A third country is a country which has not adopted a national law for the implementation of Directive 95/46/EC - as opposed to the 27 Member States of the EU and the three European Economic Area (EEA) countries Norway, Liechtenstein and Iceland.

Third countries need to ensure an adequate level of protection for personal data in order to enable transfers of personal data from the EU and EEA Member States to them.

The Commission has so far recognized Switzerland, Canada, Argentina, Guernsey, Isle of Man, Jersey and the US Department of Commerce's Safe Harbor Privacy Principles, as providing adequate protection.

The effect of such a decision is that personal data can flow from the EU and EEA Member States to that third country (within the limit of the material scope as described by each Decision) without any further safeguards.

See also: Q&A on Transfer of personal data

Third party 

According to Article 2 (f) of Regulation (EC) No 45/2001, third party shall mean "a natural or legal person, public authority, agency or body, other than the data subject, the controller, the processor and the persons who, under the direct authority of the controller or the processor are authorised to process the data."

In the context of the EU institutions and bodies, a third party may be a public authority or private party which temporarily needs to process the personal data of an official. This may be the case, for instance, if an official, who moves to his workplace to start work and who is temporarily entitled to VAT-exemption, buys a car. In that case, the car company, the insurance company, the Ministry of Finance and the authority responsible for the car register would be third parties.

Traffic data 

Traffic data are data processed for the purpose of the conveyance of a communication on an electronic communications network.

According to the means of communication used, the data needed to convey the communication will vary, but may typically include contact details, time and location data.

Although such traffic data are to be distinguished from content data, both are quite sensitive as they give insight in confidential communications. These data therefore enjoy special protection in Articles 5 and 6 of the E-privacy Directive 2009/136/EC and Articles 36 and 37 of Regulation (EC) No 45/2001.

Transfer 

See: Data transfer

  • 05 February 2016

    Opening address given by Giovanni Buttarelli, EDPS, at the Fifth Workshop on Data Protection in International Organisations

  • 03 February 2016

    On 2 and 3 February 2016, the Article 29 Working Party (WP29) met to discuss the consequences of the CJEU judgment in the Schrems case for international transfers. Read the statement on the introduction of a "EU-US Privacy Shield".

  • 02 February 2016

    On 5 February 2016, the EDPS and the International Committee of the Red Cross will host a workshop on data protection within international organisations, which will take place in Geneva. For more information see the EDPS Events page.

  • 28 January 2016

    EDPS starts work on a New Digital Ethics. Read the press release.

  • 28 January 2016

    The EDPS is celebrating 10 years of Data Protection Day! Watch our video, follow our events live and get involved in the debate on Twitter #DataProtectionDay. Information on all our events can be found on the EDPS Events page.

  • 05 February 2016

    Data Protection Within International Organisations, Geneva, Switzerland, Giovanni Buttarelli chairs the morning session and speaks at the workshop

  • 29 January 2016

    9th International CPDP Conference, Brussels, Belgium, concluding remarks by Giovanni Buttarelli

  • 28 January 2016

    9th International CPDP Conference, Brussels, Belgium, Giovanni Buttarelli moderates panel on Transatlantic Discussions: Developing a Sustainable 'Big Data' Ecosystem - Diverse Approaches to the ...

  • 28 January 2016

    9th International CPDP Conference, Brussels, Belgium, Giovanni Buttarelli chairs panel on Data, Dignity and Technology - Exploring Digital Ethics

  • 28 January 2016

    Smart Sharing, Data Protection Day conference for trainees at the EU institutions, Brussels, Belgium, Giovanni Buttarelli and Wojciech Wiewiórowski speak at the conference

  • 28 January 2016

    GDPR: A new chapter for EU data protection - how the new Regulation will empower you to take control of your personal information, Data Protection Day conference for EU officials, ...

  • 27 January 2016

    9th International CPDP Conference, Brussels, Belgium, Wojciech Wiewiórowski moderates panel on The Data Protection Reform: The Reform in Perspective

  • 08 December 2015
    The Industrial Internet Era, Brussels, Belgium, Wojciech Wiewiórowski takes part in panel Cybersecurity, Privacy and the Industrial IoT