Veeam Completes Acquisition of Securiti AI to Create the Industry’s First Trusted Data Platform for Accelerating Safe AI at Scale

View

CJEU Ruling: Collection of Gendered Titles Violates the Principles of GDPR

Author

Syed Tatheer Kazmi

Data Privacy Analyst

CIPP/Europe

Published January 24, 2025

Listen to the content

Introduction

The Court of Justice of the European Union (CJEU) recently delivered an important judgment regarding SNCF Connect’s (the company selling rail travel documents, including train tickets) practice of mandating customers to select a title (“Monsieur” or “Madame”) during online ticket purchases. This case, brought by the association Mousse, scrutinized the necessity and lawfulness of collecting gender-related data under the General Data Protection Regulation (GDPR). The decision emphasizes key GDPR principles, particularly lawful processing Article 6(1)(b), the necessity for contractual performance, and Article 6(1)(f), legitimate interests, and data minimization.

The CJEU examined the following issues:

  1. Does the collection of customers’ gendered titles for personalized commercial communication comply with the GDPR principles of data minimization (Article 5(1)(c)) and lawful processing? Specifically, is it necessary for the performance of a contract (Article 6(1)(b)) or legitimate interests (Article 6(1)(f))?
  2. Should the existence of a data subject’s right to object under Article 21 influence the necessity assessment under Article 6(1)(f)?

Reasoning of the Court

The GDPR mandates that personal data processing be “limited to what is necessary” for the intended purpose. The Court analyzed whether SNCF Connect’s practice met this standard in relation to the legal bases of contractual performance and legitimate interest.

A. Performance of a Contract

The Court ruled that requiring gendered titles is not indispensable for fulfilling a rail transport contract. The primary purpose of the contract is to provide transport services, which can be accomplished without collecting personal data like titles. Instead, generic and inclusive communication methods, such as neutral language, could achieve the same outcome while respecting the customer’s privacy.

SNCF Connect argued that collecting titles was relevant for adapting services, such as assigning gender-specific accommodations on night trains or assisting passengers with disabilities. However, the Court deemed this reasoning insufficient. Systematically collecting such data was disproportionate, as these scenarios involve specific groups and could be addressed through less intrusive methods.

B. Legitimate Interests

To justify processing under this provision, businesses must:

  1. Demonstrate a clear and legitimate interest.
  2. Prove the strict necessity of processing to achieve that interest.
  3. Show that data subjects’ rights do not override these interests.

While the Court acknowledged that personalized communication could constitute a legitimate interest, SNCF Connect’s approach failed to meet the required conditions. Customers were not explicitly informed of the legitimate interest, breaching transparency obligations. The processing was also unnecessary because less intrusive alternatives, such as generic communication, could achieve the same objectives. Simply relying on common practices or social conventions does not justify unnecessary data collection.

Moreover, the risk of discrimination, particularly against non-binary individuals, further invalidated claims of legitimate interest. This is particularly important considering Directive 2004/113, which prohibits discrimination based on gender, including gender identity, in accessing and supplying goods and services.

Right to Object

The CJEU, in response to the question from the French court, examined whether the existence of the right to object under Article 21 of the GDPR could influence the assessment of ‘necessity’ when processing data based on legitimate interest.

The CJEU unequivocally clarified that the right to object is not a factor in determining the initial lawfulness of data processing. This right only becomes applicable if the processing is already considered lawful. It cannot be used retroactively to justify data processing that doesn't meet the ‘strict necessity’ requirement outlined in Article 6(1)(f) of the GDPR.

The Court emphasized these critical points:

  • Data processing must independently satisfy the conditions for lawfulness, which include demonstrating that it is strictly necessary to achieve the stated legitimate interest.
  • Organizations cannot rely on the right to object as a substitute for fulfilling the ‘necessity’ requirement.

Allowing such a practice would weaken the GDPR's protective framework by shifting the burden of ensuring data protection from data controllers to data subjects. The judgment reinforces the principle that the right to object is an additional layer of protection for individuals; it cannot be exploited to excuse or compensate for unlawful data collection practices. Organizations must prioritize compliance with data minimization principles from the outset of any data processing activity.

Conclusion and Implications for Organizations

This landmark ruling highlights the necessity of aligning data collection practices with GDPR principles. Organizations must critically evaluate whether collecting specific data is essential for their operations. They should:

  • Adopt inclusive and non-discriminatory practices, particularly for personal data collection.
  • Ensure transparency by clearly communicating the purpose and legitimate interest behind data collection.
  • Regularly assess whether less intrusive alternatives can achieve the same objectives.
  • Understand that the right to object under Article 21 of the GDPR is a safeguard for lawful processing, it cannot retroactively justify or compensate for data collection that fails the necessity requirement under Article 6(1)(f).

The judgment reinforces that data processing must be “adequate, relevant, and limited to what is necessary” while avoiding risks to fundamental rights, such as discrimination. By prioritizing these factors, organizations can ensure lawful and ethical data practices and build trust and respect for their customers' privacy.

Analyze this article with AI

Prompts open in third-party AI tools.
Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox



More Stories that May Interest You
Videos
View More
Mitigating OWASP Top 10 for LLM Applications 2025
Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...
View More
Top 6 DSPM Use Cases
With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...
View More
Colorado Privacy Act (CPA)
What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...
View More
Securiti for Copilot in SaaS
Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...
View More
Top 10 Considerations for Safely Using Unstructured Data with GenAI
A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....
View More
Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes
As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...
View More
Navigating CPRA: Key Insights for Businesses
What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...
View More
Navigating the Shift: Transitioning to PCI DSS v4.0
What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...
View More
Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)
AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...
AWS Startup Showcase Cybersecurity Governance With Generative AI View More
AWS Startup Showcase Cybersecurity Governance With Generative AI
Balancing Innovation and Governance with Generative AI Generative AI has the potential to disrupt all aspects of business, with powerful new capabilities. However, with...

Spotlight Talks

Spotlight 50:52
From Data to Deployment: Safeguarding Enterprise AI with Security and Governance
Watch Now View
Spotlight 11:29
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Watch Now View
Spotlight 11:18
Rewiring Real Estate Finance — How Walker & Dunlop Is Giving Its $135B Portfolio a Data-First Refresh
Watch Now View
Spotlight 13:38
Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines
Sanofi Thumbnail
Watch Now View
Spotlight 10:35
There’s Been a Material Shift in the Data Center of Gravity
Watch Now View
Spotlight 14:21
AI Governance Is Much More than Technology Risk Mitigation
AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3
You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge
Watch Now View
Spotlight 47:42
Cybersecurity – Where Leaders are Buying, Building, and Partnering
Rehan Jalil
Watch Now View
Spotlight 27:29
Building Safe AI with Databricks and Gencore
Rehan Jalil
Watch Now View
Spotlight 46:02
Building Safe Enterprise AI: A Practical Roadmap
Watch Now View
Latest
View More
DataAI Security: Why Healthcare Organizations Choose Securiti
Discover why healthcare organizations trust Securiti for Data & AI Security. Learn key blockers, five proven advantages, and what safe data innovation makes possible.
View More
The Anthropic Exploit: Welcome to the Era of AI Agent Attacks
Explore the first AI agent attack, why it changes everything, and how DataAI Security pillars like Intelligence, CommandGraph, and Firewalls protect sensitive data.
View More
Aligning Your AI Systems With GDPR: What You Need to Know
Securiti’s latest blog walks you through all the important information and guidance you need to ensure your AI systems are compliant with GDPR requirements.
Network Security: Definition, Challenges, & Best Practices View More
Network Security: Definition, Challenges, & Best Practices
Discover what network security is, how it works, types, benefits, and best practices. Learn why network security is core to having a strong data...
Australia Privacy Act Reform – Tranche 2 View More
Australia Privacy Act Reform – Tranche 2
Access the whitepaper to gain an overview of Tranche 2, its strategic intent, core reforms expected, business impact, and executive checklist to ensure swift...
View More
Data & AI Security Challenges in the Credit Reporting Industry
Explore key data and AI security challenges facing credit bureaus—PII exposure, model risk, data accuracy, access governance, AI bias, and compliance with FCRA, GDPR,...
View More
Solution Brief: Microsoft Purview + Securiti
Extend Microsoft Purview with Securiti to discover, classify, and reduce data & AI risk across hybrid environments with continuous monitoring and automated remediation. Learn...
Top 7 Data & AI Security Trends 2026 View More
Top 7 Data & AI Security Trends 2026
Discover the top 7 Data & AI security trends for 2026. Learn how to secure AI agents, govern data, manage risk, and scale AI...
View More
Navigating HITRUST: A Guide to Certification
Securiti's eBook is a practical guide to HITRUST certification, covering everything from choosing i1 vs r2 and scope systems to managing CAPs & planning...
The DSPM Architect’s Handbook View More
The DSPM Architect’s Handbook: Building an Enterprise-Ready Data+AI Security Program
Get certified in DSPM. Learn to architect a DSPM solution, operationalize data and AI security, apply enterprise best practices, and enable secure AI adoption...
What's
New