Veeam Completes Acquisition of Securiti AI to Create the Industry’s First Trusted Data Platform for Accelerating Safe AI at Scale

View

EDPB Guidelines on Targeting of Social Media Users

Published July 9, 2021
Author

Maria Khan

Data Privacy Legal Manager at Securiti

FIP, CIPT, CIPM, CIPP/E

Listen to the content

In today’s online world, social media providers offer targeting services making it possible for individuals and businesses to communicate specific messages to social media users in order to advance their commercial, political, or other interests. Such targeting may impact social media users and impose several privacy risks to them. To address the risks posed by targeting social media users and protect their rights and freedoms, the European Data Protection Board released its updated guidelines (Guidelines) on 13 April 2021.

This article provides an overview of the Guidelines that can help social media providers and targeters to comply with data protection requirements.

First of all, let’s look into various types of risks posed to social media users in the context of targeting.

Risks to social media users:

The EDPB points out that risks to social media users can be of the following four types:

  1. Risk of data being used beyond the reasonable expectations of users and its intended purposes.
  2. The possibility of discrimination and exclusion against certain individuals.
  3. The possibility of manipulation of users so as to undermine individual autonomy and freedom.
  4. The potential adverse impacts to vulnerable categories of users such as children.

Targeting Mechanisms:

Now, let’s look into three different targeting mechanisms explained by the EDPB.

  1. Targeting on the basis of provided data:
    Provided data refers to information actively provided by the social media user to the social media provider and/or the targeter. Social media users actively disclose information about themselves when opening a social media account or profile. Such information may include name, date of birth, gender, place of residence, language, relationship status, interests, and even current employment. This information is then used by the social media provider to develop parameters or criteria, which enable the targeter to address specific messages to the specific set of social media users. Targeter can be any natural or legal person that can direct specific messages to a set of social media users on the basis of specific parameters or criteria. List-based targeting is one example where a targeter uploads pre-existing lists of personal data (such as email addresses or phone numbers) for the social media provider to match against the information on the platform.
    As joint controllers, both the social media provider and the targeter must be able to demonstrate the existence of a legal basis to justify the processing of personal data. The two legal bases which could justify the processing that supports the targeting of social media users are the data subject’s consent and legitimate interests of the controller.
  2. Targeting on the basis of observed data:
    Observed data refers to data provided by the social media user by using a service or device. Social media providers may be able to observe the behaviour of social media users via pixel-based targeting, geo-targeting, and similar techniques. Pixel-based targeting, for example, occurs when an online retailer places a tracking pixel on its website so it can retarget social media visitors who have not made a purchase. Geotargeting, on the other hand, occurs when a social media network collects the GPS (location) from its users on an ongoing basis which the social media network uses to help advertisers better target advertising.
    Since such targeting normally involves the use of cookies, data controllers must obtain users’ consent. The EDPB reminds organizations of their obligation under Article 5(3) of the ePrivacy Directive that requires users to provide clear and comprehensive information about the purposes of the processing prior to obtaining users’ consent. Such consent needs to be freely given, specific, informed and unambiguous. The EDPB emphasizes that both the website operator for the transmission of personal data triggered by its website and the social media provider should obtain consent as they both act as joint controllers as far as targeting on the basis of observed data is concerned.
  3. Targeting on the basis of inferred data:
    Inferred data (derived data) is the data created by the data controller on the basis of the data provided by the social media user, regardless of whether these data were observed or actively provided by the user, or a combination thereof. Inferences about social media users can be made both by the social media provider and the targeter.
    The targeting of social media users on the basis of inferred data typically involves profiling - automated processing of personal data which aims at evaluating personal aspects, in particular, to analyse or make predictions about individuals. Where the profiling is likely to have a similarly significant effect on a user, Article 22 of the GDPR will be applicable. Accordingly, data controllers will have to ensure the following:

    • Case-by-case assessment as to whether targeting will similarly significantly affect social media users in each instance concerning the specific facts of the targeting.
    • Principles of fairness, necessity, proportionality and data quality.
    • Explicit consent of the user in the case of the use of tracking techniques or targeting of vulnerable categories of persons having the potential to significantly and adversely affect them.

Data Protection Principles:

Now, let’s look into data protection principles emphasized by the EDPB in its Guidelines, that are relevant in the context of targeting:

  1. Transparency:
    The EDPB recalls that the mere use of the word “advertising” would not be enough to inform the users that their activity is being monitored for targeted advertising. In fact, it should be made clear to users what types of processing activities are carried out and what this means in practice.
  2. Data subjects’ right to access:
    As joint controllers, the social media provider and targeter can designate a single point of contact for users to exercise their rights. However, this will not exclude the possibility for users to exercise their rights against each data controller.
  3. Data protection impact assessments:
    A DPIA is necessary if targeting is likely to result in a high risk to users. If a DPIA is necessary, the joint arrangement/agreement between the social media provider and targeter should address the question of how the controllers should carry it.
  4. Special categories of data:
    The processing of special categories of data can take place only if it meets one of the conditions set out in Article 9(2) of the GDPR, such as having obtained the user’s explicit consent or the data have been manifestly made public by the social media user.

Takeaways:

To summarize, here are the key takeaways of EDPB’s Guidelines on targeting of social media users:

  • Targeting of social media users presents many risks to users and such targeting can be via provided data, observed data and inferred data. There are various scenarios and techniques through which targeting of social media users is done.
  • Targeters and social media providers act as joint controllers where they both determine the means and purposes of data collection. This happens when a social media service provider or targeter identifies the audience to be targeted, sets the targeting criteria, and shows advertisements to the targeted audience.
  • As joint controllers, targeters and social media providers must determine their respective data processing operations via joint agreement. The agreement must cover details of all processing operations for which both parties are jointly responsible.
  • Both joint controllers must have a legal basis to process personal data. For most targeting of social media users, the likely legal bases to apply are data subjects’ consent and the legitimate interests of the controller or a third-party.
  • For consent to be valid, it must be freely given, specific, informed, and unambiguous. Moreover, social media users should be allowed to withdraw their consent at any time without any detriment.
  • To rely on legitimate interest as a legal basis to process personal data, three cumulative conditions must be met:<
    1. Necessity test: the pursuit of a legitimate interest by the data controller or by the third party to whom the data are disclosed,
    2. Purpose test: the need to process personal data for the legitimate interests pursued, and
    3. Balancing test: the legitimate interest of the controller or third-party must be balanced against the fundamental rights and freedoms of the data subject.
  • In addition to having a legal basis for data processing, controllers must comply with data protection principles, in particular the principles of transparency, necessity, proportionality, and data quality. Moreover, they must adequately respond to data subject’s access requests.

Businesses are now required to assess their roles as social media providers or targeters and determine their respective data protection obligations via joint agreement. They must ensure the processing of personal data only on lawful grounds. As pointed out by the EDPB, those legal bases may be the data subject’s consent or legitimate interests of the data controller or third-party.

Securiti offers automated data mapping, DSR rights fulfillment, and consent management to help you comply with the applicable legal requirements. Ask for a DEMO today to understand how Securiti can help you comply with GDPR, EDPB Guidelines, and global data privacy laws and regulations with ease.

Your Data+AI Command Center

Enable Safe Use of Data and AI

Analyze this article with AI

Prompts open in third-party AI tools.
Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share

More Stories that May Interest You
Videos
View More
Mitigating OWASP Top 10 for LLM Applications 2025
Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...
View More
Top 6 DSPM Use Cases
With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...
View More
Colorado Privacy Act (CPA)
What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...
View More
Securiti for Copilot in SaaS
Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...
View More
Top 10 Considerations for Safely Using Unstructured Data with GenAI
A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....
View More
Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes
As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...
View More
Navigating CPRA: Key Insights for Businesses
What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...
View More
Navigating the Shift: Transitioning to PCI DSS v4.0
What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...
View More
Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)
AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...
AWS Startup Showcase Cybersecurity Governance With Generative AI View More
AWS Startup Showcase Cybersecurity Governance With Generative AI
Balancing Innovation and Governance with Generative AI Generative AI has the potential to disrupt all aspects of business, with powerful new capabilities. However, with...

Spotlight Talks

Spotlight 50:52
From Data to Deployment: Safeguarding Enterprise AI with Security and Governance
Watch Now View
Spotlight 11:29
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Watch Now View
Spotlight 11:18
Rewiring Real Estate Finance — How Walker & Dunlop Is Giving Its $135B Portfolio a Data-First Refresh
Watch Now View
Spotlight 13:38
Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines
Sanofi Thumbnail
Watch Now View
Spotlight 10:35
There’s Been a Material Shift in the Data Center of Gravity
Watch Now View
Spotlight 14:21
AI Governance Is Much More than Technology Risk Mitigation
AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3
You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge
Watch Now View
Spotlight 47:42
Cybersecurity – Where Leaders are Buying, Building, and Partnering
Rehan Jalil
Watch Now View
Spotlight 27:29
Building Safe AI with Databricks and Gencore
Rehan Jalil
Watch Now View
Spotlight 46:02
Building Safe Enterprise AI: A Practical Roadmap
Watch Now View
Latest
View More
DataAI Security: Why Healthcare Organizations Choose Securiti
Discover why healthcare organizations trust Securiti for Data & AI Security. Learn key blockers, five proven advantages, and what safe data innovation makes possible.
View More
The Anthropic Exploit: Welcome to the Era of AI Agent Attacks
Explore the first AI agent attack, why it changes everything, and how DataAI Security pillars like Intelligence, CommandGraph, and Firewalls protect sensitive data.
Network Security: Definition, Challenges, & Best Practices View More
Network Security: Definition, Challenges, & Best Practices
Discover what network security is, how it works, types, benefits, and best practices. Learn why network security is core to having a strong data...
View More
What is Cybersecurity Management?
Discover what cybersecurity management is, its importance, the CISO’s role, types, and best practices for effective cybersecurity management. Learn more.
Montana Privacy Amendment on Notices: What to Change by Oct 1 View More
Montana Privacy Amendment on Notices: What to Change by Oct 1
Download the whitepaper to learn about the Montana Privacy Amendment on Notices and what to change by Oct 1. Learn how Securiti helps.
2026 Privacy Law Updates: Key Developments You Need to Know View More
2026 Privacy Law Updates: Key Developments You Need to Know
Access the whitepaper to learn about key privacy law updates in 2026. Discover key developments you need to know. Learn how Securiti can help.
View More
The Future of Privacy: Top Emerging Privacy Trends in 2026
Access the infographic to discover the top emerging privacy trends in 2026. Learn what organizations must do to thrive in 2026 and beyond.
India’s DPDPA Rules View More
India’s DPDPA Rules
Access the infographic to learn about India’s DPDPA 2025 basics. Discover phased timelines, what the rules require, when they apply, key obligations, and much...
View More
Navigating HITRUST: A Guide to Certification
Securiti's eBook is a practical guide to HITRUST certification, covering everything from choosing i1 vs r2 and scope systems to managing CAPs & planning...
The DSPM Architect’s Handbook View More
The DSPM Architect’s Handbook: Building an Enterprise-Ready Data+AI Security Program
Get certified in DSPM. Learn to architect a DSPM solution, operationalize data and AI security, apply enterprise best practices, and enable secure AI adoption...
What's
New