Securiti leads GigaOm's DSPM Vendor Evaluation with top ratings across technical capabilities & business value.

View

CJEU Ruling: Collection of Gendered Titles Violates the Principles of GDPR

Published January 24, 2025
Author

Syed Tatheer Kazmi

Associate Data Privacy Analyst, Securiti

CIPP/Europe

Listen to the content

Introduction

The Court of Justice of the European Union (CJEU) recently delivered an important judgment regarding SNCF Connect’s (the company selling rail travel documents, including train tickets) practice of mandating customers to select a title (“Monsieur” or “Madame”) during online ticket purchases. This case, brought by the association Mousse, scrutinized the necessity and lawfulness of collecting gender-related data under the General Data Protection Regulation (GDPR). The decision emphasizes key GDPR principles, particularly lawful processing Article 6(1)(b), the necessity for contractual performance, and Article 6(1)(f), legitimate interests, and data minimization.

The CJEU examined the following issues:

  1. Does the collection of customers’ gendered titles for personalized commercial communication comply with the GDPR principles of data minimization (Article 5(1)(c)) and lawful processing? Specifically, is it necessary for the performance of a contract (Article 6(1)(b)) or legitimate interests (Article 6(1)(f))?
  2. Should the existence of a data subject’s right to object under Article 21 influence the necessity assessment under Article 6(1)(f)?

Reasoning of the Court

The GDPR mandates that personal data processing be “limited to what is necessary” for the intended purpose. The Court analyzed whether SNCF Connect’s practice met this standard in relation to the legal bases of contractual performance and legitimate interest.

A. Performance of a Contract

The Court ruled that requiring gendered titles is not indispensable for fulfilling a rail transport contract. The primary purpose of the contract is to provide transport services, which can be accomplished without collecting personal data like titles. Instead, generic and inclusive communication methods, such as neutral language, could achieve the same outcome while respecting the customer’s privacy.

SNCF Connect argued that collecting titles was relevant for adapting services, such as assigning gender-specific accommodations on night trains or assisting passengers with disabilities. However, the Court deemed this reasoning insufficient. Systematically collecting such data was disproportionate, as these scenarios involve specific groups and could be addressed through less intrusive methods.

B. Legitimate Interests

To justify processing under this provision, businesses must:

  1. Demonstrate a clear and legitimate interest.
  2. Prove the strict necessity of processing to achieve that interest.
  3. Show that data subjects’ rights do not override these interests.

While the Court acknowledged that personalized communication could constitute a legitimate interest, SNCF Connect’s approach failed to meet the required conditions. Customers were not explicitly informed of the legitimate interest, breaching transparency obligations. The processing was also unnecessary because less intrusive alternatives, such as generic communication, could achieve the same objectives. Simply relying on common practices or social conventions does not justify unnecessary data collection.

Moreover, the risk of discrimination, particularly against non-binary individuals, further invalidated claims of legitimate interest. This is particularly important considering Directive 2004/113, which prohibits discrimination based on gender, including gender identity, in accessing and supplying goods and services.

Right to Object

The CJEU, in response to the question from the French court, examined whether the existence of the right to object under Article 21 of the GDPR could influence the assessment of ‘necessity’ when processing data based on legitimate interest.

The CJEU unequivocally clarified that the right to object is not a factor in determining the initial lawfulness of data processing. This right only becomes applicable if the processing is already considered lawful. It cannot be used retroactively to justify data processing that doesn't meet the ‘strict necessity’ requirement outlined in Article 6(1)(f) of the GDPR.

The Court emphasized these critical points:

  • Data processing must independently satisfy the conditions for lawfulness, which include demonstrating that it is strictly necessary to achieve the stated legitimate interest.
  • Organizations cannot rely on the right to object as a substitute for fulfilling the ‘necessity’ requirement.

Allowing such a practice would weaken the GDPR's protective framework by shifting the burden of ensuring data protection from data controllers to data subjects. The judgment reinforces the principle that the right to object is an additional layer of protection for individuals; it cannot be exploited to excuse or compensate for unlawful data collection practices. Organizations must prioritize compliance with data minimization principles from the outset of any data processing activity.

Conclusion and Implications for Organizations

This landmark ruling highlights the necessity of aligning data collection practices with GDPR principles. Organizations must critically evaluate whether collecting specific data is essential for their operations. They should:

  • Adopt inclusive and non-discriminatory practices, particularly for personal data collection.
  • Ensure transparency by clearly communicating the purpose and legitimate interest behind data collection.
  • Regularly assess whether less intrusive alternatives can achieve the same objectives.
  • Understand that the right to object under Article 21 of the GDPR is a safeguard for lawful processing, it cannot retroactively justify or compensate for data collection that fails the necessity requirement under Article 6(1)(f).

The judgment reinforces that data processing must be “adequate, relevant, and limited to what is necessary” while avoiding risks to fundamental rights, such as discrimination. By prioritizing these factors, organizations can ensure lawful and ethical data practices and build trust and respect for their customers' privacy.

Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share


More Stories that May Interest You

Videos

View More

Mitigating OWASP Top 10 for LLM Applications 2025

Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...

View More

DSPM vs. CSPM – What’s the Difference?

While the cloud has offered the world immense growth opportunities, it has also introduced unprecedented challenges and risks. Solutions like Cloud Security Posture Management...

View More

Top 6 DSPM Use Cases

With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...

View More

Colorado Privacy Act (CPA)

What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...

View More

Securiti for Copilot in SaaS

Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...

View More

Top 10 Considerations for Safely Using Unstructured Data with GenAI

A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....

View More

Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes

As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...

View More

Navigating CPRA: Key Insights for Businesses

What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...

View More

Navigating the Shift: Transitioning to PCI DSS v4.0

What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...

View More

Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)

AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight 13:38

Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines

Sanofi Thumbnail
Watch Now View
Spotlight 10:35

There’s Been a Material Shift in the Data Center of Gravity

Watch Now View
Spotlight 14:21

AI Governance Is Much More than Technology Risk Mitigation

AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3

You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge

Watch Now View
Spotlight 47:42

Cybersecurity – Where Leaders are Buying, Building, and Partnering

Rehan Jalil
Watch Now View
Spotlight 27:29

Building Safe AI with Databricks and Gencore

Rehan Jalil
Watch Now View
Spotlight 46:02

Building Safe Enterprise AI: A Practical Roadmap

Watch Now View
Spotlight 13:32

Ensuring Solid Governance Is Like Squeezing Jello

Watch Now View
Spotlight 40:46

Securing Embedded AI: Accelerate SaaS AI Copilot Adoption Safely

Watch Now View
Spotlight 10:05

Unstructured Data: Analytics Goldmine or a Governance Minefield?

Viral Kamdar
Watch Now View

Latest

View More

Securiti Powers Sovereign AI in the EU with NVIDIA

Discover how Securiti and NVIDIA empower AI Sovereignty in the EU with full-stack, secure, and compliant AI solutions. Ensure data privacy, governance, and safe...

5 Ways to Accelerate Unstructured Data Cleansing for AI with Securiti and DataBricks View More

5 Ways to Accelerate Unstructured Data Cleansing for AI with Securiti and DataBricks

The Unstructured Data Challenge LLMs has created an opportunity for organizations to extract tremendous value from their unstructured data. However, CDAOs are all too...

Data Classification: A Core Component of DSPM View More

Data Classification: A Core Component of DSPM

Data classification is a core component of DSPM, enabling teams to categorize data based on sensitivity and allocate resources accordingly to prioritize security, governance,...

9 Key Components of a Strong Data Security Strategy View More

9 Key Components of a Strong Data Security Strategy

Securiti’s latest blog breaks down the 9 key components of a robust data security strategy and explains how it helps protect your business, ensure...

Beyond DLP: Guide to Modern Data Protection with DSPM View More

Beyond DLP: Guide to Modern Data Protection with DSPM

Learn why traditional data security tools fall short in the cloud and AI era. Learn how DSPM helps secure sensitive data and ensure compliance.

Mastering Cookie Consent: Global Compliance & Customer Trust View More

Mastering Cookie Consent: Global Compliance & Customer Trust

Discover how to master cookie consent with strategies for global compliance and building customer trust while aligning with key data privacy regulations.

From AI Risk to AI Readiness: Why Enterprises Need DSPM Now View More

From AI Risk to AI Readiness: Why Enterprises Need DSPM Now

Discover why shifting focus from AI risk to AI readiness is critical for enterprises. Learn how Data Security Posture Management (DSPM) empowers organizations to...

The European Health Data Space Regulation View More

The European Health Data Space Regulation: A Legislative Timeline and Implementation Roadmap

Download the infographic on the European Health Data Space Regulation, which features a clear timeline and roadmap highlighting key legislative milestones, implementation phases, and...

Gencore AI and Amazon Bedrock View More

Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock

Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...

DSPM Vendor Due Diligence View More

DSPM Vendor Due Diligence

DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...

What's
New