{"id":18617,"date":"2014-08-01T14:34:29","date_gmt":"2014-08-01T12:34:29","guid":{"rendered":"https:\/\/www.hiig.de\/?p=18617"},"modified":"2018-07-09T13:19:40","modified_gmt":"2018-07-09T11:19:40","slug":"ecj-and-data-retention-emergence-of-a-right-to-security","status":"publish","type":"post","link":"https:\/\/www.hiig.de\/en\/ecj-and-data-retention-emergence-of-a-right-to-security\/","title":{"rendered":"ECJ and Data Retention: Emergence of a Right to Security?"},"content":{"rendered":"<p>In its judgment on the data retention directive (C\u2011293\/12 and C\u2011594\/12), the ECJ caught the spirit of the age.<\/p>\n<p>The storage of all communication data is disproportionate to the objectives of the directive, which include, apart from the completion of the internal market, \u00a0\u201cthe fight against international terrorism in order to maintain international peace and security\u201d as well as \u201cthe fight against serious crime in order to ensure public security\u201d (recital 42).<\/p>\n<p>Thereafter, the ECJ refers \u201cfurthermore\u201d to Art. 6 of the Charter of fundamental rights of the EU, \u00a0according to which \u201dthe right of any person <i>not only<\/i> to liberty, <i>but also<\/i> to security\u201d is provided. This finding is remarkable, as the prevalent opinion in literature so far agreed on the physical freedom of movement being the sole legally protected good of the provision. The concept of freedom defined the protected good, the mention of \u201csecurity\u201d had no separate significance besides that. Rather, it was supposed to only clarify the purpose of the provision \u2013 the protection against arbitrary arrest. Accordingly, security was practically understood as a mere appendix to the concept of freedom.<\/p>\n<p>This reading is based on the circumstance that Art. 6 of the Charter is patterned exactly on Art. 5 ECHR. What\u2019s more, it is again emphasized in the explanations of the Charter, which have to be taken due account of according to Art. 52 (7) of the Charter and Art. 6 (1), 3. TFEU.<\/p>\n<p>Systematically, the limiting provision of Art. 5 ECHR is repeated there, too. Up to now, the ECtHR only deduced from Art 5 ECHR a right to protection of the freedom of movement and did not attach independent significance. In line with Art 52 (3) of the Charter, the rights of the Charter have the same scope and meaning as the corresponding rights of the ECHR.<\/p>\n<p>By mentioning now a right of any person <i>not only<\/i> to liberty, <i>but also<\/i> to security, the ECJ makes an explicit distinction between the two concepts. Can this wording not clearly be understood as the establishment of separate right to security?<\/p>\n<p>But if the wording was taken seriously, it would be possible \u00a0to rely on this fundamental right to security in future proceedings. What would that mean? Firstly, security measures interfering with fundamental rights could be justified easier with regard to the proportionality principle as security would now be understood as a competing fundamental right. The limitation of a colliding fundamental liberty right would at the same time be a measure to bring the right to security into effect. Secondly, looking even further, would individuals even have the right to demand for security measures to be taken by the European Union? Did the ECJ even lay the foundation for possible positive obligations, which can be deduced from the individual fundamental right acknowledged here, assumed that the EU has a competence to act and that the member states would not be able to protect fundamental rights efficiently? Or, alternatively, does it constitute at least an objective duty of the EU, which was nevertheless still explicitly based on fundamental rights? Would it even be conceivable to justify the creation of a new directive on data retention sufficient to the conditions laid down by the ECJ with regard to fundamental rights?<\/p>\n<p>Remarkably, the Court mentions the right only together with the legitimate aims of the fight against terrorism and crime. It does not discuss a possible conflict of between Art. 7 and 8 and Art. 6 of the Charter in particular, although, with regard to the proportionality of the measure in question, this would be the place where the fundamental right to security would have a significant impact on the outcome of the proceedings. That is why the passage mentioned above has to be treated with caution. Maybe the Court was just thoughtless in this case. However, if it did want introduce a fundamental right to security indeed, this would have a remarkable impact on the future fundamental rights protection system in Europe. With regard to the upcoming accession of the EU to the European Fundamental Rights Convention and having in mind the divergent jurisdiction of the ECHR tthis would be of specific importance.<\/p>\n<h4>This post is part of a weekly series of articles by <a title=\"Doctoral Programme\" href=\"https:\/\/www.hiig.de\/en\/doctoral-programme\/\">doctoral candidates<\/a> of the Alexander von Humboldt Institute for Internet and Society. It does not necessarily represent the view of the Institute itself. For more information about the topics of these articles and associated research projects, please contact <a href=\"mailto:presse@hiig.de\">presse@hiig.de<\/a>.<\/h4>\n<div class=\"shariff shariff-align-flex-start shariff-widget-align-flex-start\"><ul class=\"shariff-buttons theme-round orientation-horizontal buttonsize-medium\"><li class=\"shariff-button linkedin shariff-nocustomcolor\" style=\"background-color:#1488bf\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fwww.hiig.de%2Fen%2Fecj-and-data-retention-emergence-of-a-right-to-security%2F\" title=\"Share on LinkedIn\" aria-label=\"Share on LinkedIn\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0077b5; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 27 32\"><path fill=\"#0077b5\" d=\"M6.2 11.2v17.7h-5.9v-17.7h5.9zM6.6 5.7q0 1.3-0.9 2.2t-2.4 0.9h0q-1.5 0-2.4-0.9t-0.9-2.2 0.9-2.2 2.4-0.9 2.4 0.9 0.9 2.2zM27.4 18.7v10.1h-5.9v-9.5q0-1.9-0.7-2.9t-2.3-1.1q-1.1 0-1.9 0.6t-1.2 1.5q-0.2 0.5-0.2 1.4v9.9h-5.9q0-7.1 0-11.6t0-5.3l0-0.9h5.9v2.6h0q0.4-0.6 0.7-1t1-0.9 1.6-0.8 2-0.3q3 0 4.9 2t1.9 6z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button bluesky shariff-nocustomcolor\" style=\"background-color:#84c4ff\"><a href=\"https:\/\/bsky.app\/intent\/compose?text=ECJ%20and%20Data%20Retention%3A%20Emergence%20of%20a%20Right%20to%20Security%3F https%3A%2F%2Fwww.hiig.de%2Fen%2Fecj-and-data-retention-emergence-of-a-right-to-security%2F  via @hiigberlin.bsky.social\" title=\"Share on Bluesky\" aria-label=\"Share on Bluesky\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0085ff; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"20\" height=\"20\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 20 20\"><path class=\"st0\" d=\"M4.89,3.12c2.07,1.55,4.3,4.71,5.11,6.4.82-1.69,3.04-4.84,5.11-6.4,1.49-1.12,3.91-1.99,3.91.77,0,.55-.32,4.63-.5,5.3-.64,2.3-2.99,2.89-5.08,2.54,3.65.62,4.58,2.68,2.57,4.74-3.81,3.91-5.48-.98-5.9-2.23-.08-.23-.11-.34-.12-.25,0-.09-.04.02-.12.25-.43,1.25-2.09,6.14-5.9,2.23-2.01-2.06-1.08-4.12,2.57-4.74-2.09.36-4.44-.23-5.08-2.54-.19-.66-.5-4.74-.5-5.3,0-2.76,2.42-1.89,3.91-.77h0Z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button mailto shariff-nocustomcolor\" style=\"background-color:#a8a8a8\"><a href=\"mailto:?body=https%3A%2F%2Fwww.hiig.de%2Fen%2Fecj-and-data-retention-emergence-of-a-right-to-security%2F&subject=ECJ%20and%20Data%20Retention%3A%20Emergence%20of%20a%20Right%20to%20Security%3F\" title=\"Send by email\" aria-label=\"Send by email\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#999; color:#fff\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path fill=\"#999\" d=\"M32 12.7v14.2q0 1.2-0.8 2t-2 0.9h-26.3q-1.2 0-2-0.9t-0.8-2v-14.2q0.8 0.9 1.8 1.6 6.5 4.4 8.9 6.1 1 0.8 1.6 1.2t1.7 0.9 2 0.4h0.1q0.9 0 2-0.4t1.7-0.9 1.6-1.2q3-2.2 8.9-6.1 1-0.7 1.8-1.6zM32 7.4q0 1.4-0.9 2.7t-2.2 2.2q-6.7 4.7-8.4 5.8-0.2 0.1-0.7 0.5t-1 0.7-0.9 0.6-1.1 0.5-0.9 0.2h-0.1q-0.4 0-0.9-0.2t-1.1-0.5-0.9-0.6-1-0.7-0.7-0.5q-1.6-1.1-4.7-3.2t-3.6-2.6q-1.1-0.7-2.1-2t-1-2.5q0-1.4 0.7-2.3t2.1-0.9h26.3q1.2 0 2 0.8t0.9 2z\"\/><\/svg><\/span><\/a><\/li><\/ul><\/div>","protected":false},"excerpt":{"rendered":"<p>In its judgment on the data retention directive (C\u2011293\/12 and C\u2011594\/12), the ECJ caught the spirit of the age. The storage of all communication data is disproportionate to the objectives of the directive, which include, apart from the completion of the internal market, \u00a0\u201cthe fight against international terrorism in order to maintain international peace and&hellip;<\/p>\n","protected":false},"author":54,"featured_media":18619,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[224],"tags":[],"class_list":["post-18617","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-policy-and-law"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>ECJ and Data Retention: Emergence of a Right to Security? &#8211; Digital Society Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hiig.de\/en\/ecj-and-data-retention-emergence-of-a-right-to-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ECJ and Data Retention: Emergence of a Right to Security? &#8211; Digital Society Blog\" \/>\n<meta property=\"og:description\" content=\"In its judgment on the data retention directive (C\u2011293\/12 and C\u2011594\/12), the ECJ caught the spirit of the age. The storage of all communication data is disproportionate to the objectives of the directive, which include, apart from the completion of the internal market, \u00a0\u201cthe fight against international terrorism in order to maintain international peace and&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hiig.de\/en\/ecj-and-data-retention-emergence-of-a-right-to-security\/\" \/>\n<meta property=\"og:site_name\" content=\"HIIG\" \/>\n<meta property=\"article:published_time\" content=\"2014-08-01T12:34:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-07-09T11:19:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2014\/08\/EN_GloCo-GlobalPrivacy.png\" \/>\n\t<meta property=\"og:image:width\" content=\"706\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Sebastian Leuschner\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sebastian Leuschner\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ECJ and Data Retention: Emergence of a Right to Security? &#8211; Digital Society Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hiig.de\/en\/ecj-and-data-retention-emergence-of-a-right-to-security\/","og_locale":"en_US","og_type":"article","og_title":"ECJ and Data Retention: Emergence of a Right to Security? &#8211; Digital Society Blog","og_description":"In its judgment on the data retention directive (C\u2011293\/12 and C\u2011594\/12), the ECJ caught the spirit of the age. The storage of all communication data is disproportionate to the objectives of the directive, which include, apart from the completion of the internal market, \u00a0\u201cthe fight against international terrorism in order to maintain international peace and&hellip;","og_url":"https:\/\/www.hiig.de\/en\/ecj-and-data-retention-emergence-of-a-right-to-security\/","og_site_name":"HIIG","article_published_time":"2014-08-01T12:34:29+00:00","article_modified_time":"2018-07-09T11:19:40+00:00","og_image":[{"width":706,"height":400,"url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2014\/08\/EN_GloCo-GlobalPrivacy.png","type":"image\/png"}],"author":"Sebastian Leuschner","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sebastian Leuschner","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hiig.de\/en\/ecj-and-data-retention-emergence-of-a-right-to-security\/#article","isPartOf":{"@id":"https:\/\/www.hiig.de\/en\/ecj-and-data-retention-emergence-of-a-right-to-security\/"},"author":{"name":"Sebastian Leuschner","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/5dbbe6c1cc616b3703a3ec45ee84ee7a"},"headline":"ECJ and Data Retention: Emergence of a Right to Security?","datePublished":"2014-08-01T12:34:29+00:00","dateModified":"2018-07-09T11:19:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hiig.de\/en\/ecj-and-data-retention-emergence-of-a-right-to-security\/"},"wordCount":741,"commentCount":0,"publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"image":{"@id":"https:\/\/www.hiig.de\/en\/ecj-and-data-retention-emergence-of-a-right-to-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","articleSection":["Policy and Law"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hiig.de\/en\/ecj-and-data-retention-emergence-of-a-right-to-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hiig.de\/en\/ecj-and-data-retention-emergence-of-a-right-to-security\/","url":"https:\/\/www.hiig.de\/en\/ecj-and-data-retention-emergence-of-a-right-to-security\/","name":"ECJ and Data Retention: Emergence of a Right to Security? &#8211; Digital Society Blog","isPartOf":{"@id":"https:\/\/www.hiig.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hiig.de\/en\/ecj-and-data-retention-emergence-of-a-right-to-security\/#primaryimage"},"image":{"@id":"https:\/\/www.hiig.de\/en\/ecj-and-data-retention-emergence-of-a-right-to-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","datePublished":"2014-08-01T12:34:29+00:00","dateModified":"2018-07-09T11:19:40+00:00","breadcrumb":{"@id":"https:\/\/www.hiig.de\/en\/ecj-and-data-retention-emergence-of-a-right-to-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hiig.de\/en\/ecj-and-data-retention-emergence-of-a-right-to-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/en\/ecj-and-data-retention-emergence-of-a-right-to-security\/#primaryimage","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","width":706,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/www.hiig.de\/en\/ecj-and-data-retention-emergence-of-a-right-to-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hiig.de\/en\/"},{"@type":"ListItem","position":2,"name":"ECJ and Data Retention: Emergence of a Right to Security?"}]},{"@type":"WebSite","@id":"https:\/\/www.hiig.de\/#website","url":"https:\/\/www.hiig.de\/","name":"HIIG","description":"Alexander von Humboldt Institute for Internet and Society","publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hiig.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hiig.de\/#organization","name":"HIIG","url":"https:\/\/www.hiig.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","width":320,"height":80,"caption":"HIIG"},"image":{"@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/5dbbe6c1cc616b3703a3ec45ee84ee7a","name":"Sebastian Leuschner"}]}},"_links":{"self":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/18617","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/comments?post=18617"}],"version-history":[{"count":1,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/18617\/revisions"}],"predecessor-version":[{"id":18618,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/18617\/revisions\/18618"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media\/18619"}],"wp:attachment":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media?parent=18617"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/categories?post=18617"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/tags?post=18617"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}