<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach &#8211; GDPR Register | Compliance tool for privacy experts</title>
	<atom:link href="https://www.gdprregister.eu/news-category/data-breach/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.gdprregister.eu</link>
	<description>GDPR Register ✅- Cost-effective solution for complying with the GDPR. Regulator Ready reporting available in all EU languages. Sign up for 14-day trial!</description>
	<lastBuildDate>Fri, 18 Dec 2020 09:00:54 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.2.3</generator>

<image>
	<url>https://www.gdprregister.eu/wp-content/uploads/2018/04/favicon-96x96.png</url>
	<title>Data Breach &#8211; GDPR Register | Compliance tool for privacy experts</title>
	<link>https://www.gdprregister.eu</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>SolarWinds hackers breach US nuclear weapons agency</title>
		<link>https://www.gdprregister.eu/news/solarwinds-nuclear-breach/</link>
				<comments>https://www.gdprregister.eu/news/solarwinds-nuclear-breach/#respond</comments>
				<pubDate>Fri, 18 Dec 2020 09:00:54 +0000</pubDate>
		<dc:creator><![CDATA[Aleksander Uibo]]></dc:creator>
		
		<guid isPermaLink="false">https://www.gdprregister.eu/?post_type=news&#038;p=11189</guid>
				<description><![CDATA[<p>Hackers accessed systems at the National Nuclear Security Administration, which maintains the U.S. nuclear weapons stockpile. The Energy Department and National Nuclear Security Administration, which maintains the U.S. nuclear weapons stockpile, have evidence that hackers accessed their networks as part of an extensive espionage operation that has affected at least half a dozen federal agencies, [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.gdprregister.eu/news/solarwinds-nuclear-breach/">SolarWinds hackers breach US nuclear weapons agency</a> appeared first on <a rel="nofollow" href="https://www.gdprregister.eu">GDPR Register | Compliance tool for privacy experts</a>.</p>
]]></description>
								<content:encoded><![CDATA[<section class="page-content__row page-content__row--story">
<div class="container container--story story-layout--fluid-fixed">
<div class="container__column container__column--story summary-middle">
<div class="container__row container__row--story story-layout--fixed-fluid">
<div class="container__column container__column--story">
<section class="media-item media-item--story media-item--story-lead">
<div class="media-item__summary size--medium">
<h1 class="dek">Hackers accessed systems at the National Nuclear Security Administration, which maintains the U.S. nuclear weapons stockpile.</h1>
</div>
</section>
</div>
</div>
<div class="container__row container__row--story story-layout--fixed-fluid">
<div class="container__column container__column--story center-horizontally">
<div class="story-text">
<p class=" story-text__paragraph">The Energy Department and National Nuclear Security Administration, which maintains the U.S. nuclear weapons stockpile, have evidence that hackers accessed their networks as part of an extensive espionage operation that has affected at least half a dozen federal agencies, officials directly familiar with the matter said.</p>
<p class=" story-text__paragraph">On Thursday, DOE and NNSA officials began coordinating notifications about the breach to their congressional oversight bodies after being briefed by Rocky Campione, the chief information officer at DOE.</p>
<p class=" story-text__paragraph">They found suspicious activity in networks belonging to the Federal Energy Regulatory Commission (FERC), Sandia and Los Alamos national laboratories in New Mexico and Washington, the Office of Secure Transportation at NNSA, and the Richland Field Office of the DOE.</p>
</div>
</div>
</div>
</div>
</div>
</section>
<section class="page-content__row page-content__row--story main-section" data-content-section="5">
<div class="container container--story story-layout--fixed-fluid">
<div class="container__column container__column--story">
<div class="container__row container__row--story story-layout--fluid-fixed">
<div class="container__column container__column--story center-horizontally">
<div class="story-text">
<p class=" story-text__paragraph" data-content-child-index="0-0">The hackers have been able to do more damage at FERC than the other agencies, and officials there have evidence of highly malicious activity, the officials said, but did not elaborate.</p>
<p class=" story-text__paragraph" data-content-child-index="0-1">The officials said that the Cybersecurity and Infrastructure Security Agency, which has been helping to manage the federal response to the broad hacking campaign, indicated to FERC this week that CISA was overwhelmed and might not be able to allocate the necessary resources to respond. DOE will therefore be allocating extra resources to FERC to help investigate the hack, even though FERC is a semi-autonomous agency, the officials said.</p>
<p class=" story-text__paragraph" data-content-child-index="0-2">Several top officials from CISA, including its former director Christopher Krebs, have either been pushed out by the Trump administration or resigned in recent weeks.</p>
<p class=" story-text__paragraph" data-content-child-index="0-3">Federal investigators have been combing through networks in recent days to determine what hackers had been able to access and/or steal, and officials at DOE still don’t know whether the attackers were able to access anything, the people said, noting that the investigation is ongoing and they may not know the full extent of the damage “for weeks.”</p>
<p class=" story-text__paragraph" data-content-child-index="0-3">Shaylyn Hynes, a DOE spokesperson, said that an ongoing investigation into the hack has found that the perpetrators did not get into critical defense systems.</p>
<p class=" story-text__paragraph" data-content-child-index="0-5">&#8220;At this point, the investigation has found that the malware has been isolated to business networks only, and has not impacted the mission essential national security functions of the department, including the National Nuclear Security Administration,&#8221; Hynes said in a statement. &#8220;When DOE identified vulnerable software, immediate action was taken to mitigate the risk, and all software identified as being vulnerable to this attack was disconnected from the DOE network.”</p>
</div>
</div>
<div class="container__column container__column--story center-vertically right-zone hide-under-small" aria-hidden="true">
<div id="aside-0" class="story-enhancement" data-aside-index="0">
<div class="ad is-loaded" aria-label="Advertisement">
<div id="pol-04-medium-101" class="ad-slot" aria-hidden="true" data-google-query-id="CMTuvYCS1-0CFQeGGAodixIBVw">
<div id="google_ads_iframe_/6326/politico/policy-cybersecurity_9__container__">The attack on DOE is the clearest sign yet that the hackers were able to access the networks belonging to a core part of the U.S. national security enterprise. The hackers are believed to have gained access to the federal agencies’ networks by compromising the software company SolarWinds, which sells IT management products to hundreds of government and private-sector clients.</div>
<div></div>
<div>Read more: <a href="https://www.politico.com/news/2020/12/17/nuclear-agency-hacked-officials-inform-congress-447855">Politico</a></div>
<div></div>
<div>Photo by Markus Spiske on Unsplash</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</section>
<p>The post <a rel="nofollow" href="https://www.gdprregister.eu/news/solarwinds-nuclear-breach/">SolarWinds hackers breach US nuclear weapons agency</a> appeared first on <a rel="nofollow" href="https://www.gdprregister.eu">GDPR Register | Compliance tool for privacy experts</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://www.gdprregister.eu/news/solarwinds-nuclear-breach/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							</item>
		<item>
		<title>Irish Data Protection Commission to announce Twitter fine on December 17th</title>
		<link>https://www.gdprregister.eu/news/twitter-fine-ireland/</link>
				<comments>https://www.gdprregister.eu/news/twitter-fine-ireland/#respond</comments>
				<pubDate>Mon, 14 Dec 2020 10:11:37 +0000</pubDate>
		<dc:creator><![CDATA[Aleksander Uibo]]></dc:creator>
		
		<guid isPermaLink="false">https://www.gdprregister.eu/?post_type=news&#038;p=11156</guid>
				<description><![CDATA[<p>Commissioner Helen Dixon will have an active week with her office’s first potential big tech fine under GDPR and a showdown against Facebook in the High Court. Ireland’s data protection regulator is set to announce this week whether Twitter will receive a hefty fine for making some users’ private tweets public. The result of its [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.gdprregister.eu/news/twitter-fine-ireland/">Irish Data Protection Commission to announce Twitter fine on December 17th</a> appeared first on <a rel="nofollow" href="https://www.gdprregister.eu">GDPR Register | Compliance tool for privacy experts</a>.</p>
]]></description>
								<content:encoded><![CDATA[<h1>Commissioner Helen Dixon will have an active week with her office’s first potential big tech fine under GDPR and a showdown against Facebook in the High Court.</h1>
<p><a href="https://www.dataprotection.ie/">Ireland’s data protection regulator</a> is set to announce this week whether Twitter will receive a hefty fine for making some users’ private tweets public.</p>
<p>The result of its investigation into the data breach, which happened two years ago, is to be unveiled by Wednesday, December 17th at the latest.</p>
<p>It comes a week after Facebook said that it has put aside €302m for potential regulatory fines in Europe, arising mostly from investigations by Helen Dixon’s office.</p>
<p>Under <a href="https://www.gdprregister.eu/gdpr/gdpr-fines/">GDPR rules</a>, European data regulators can fine companies up to 4% of their annual turnover which, for large tech firms, extends to billions of euros.</p>
<p>However, experts say that is unlikely this Twitter decision will result in a massive fine, given its nature and the company&#8217;s voluntary admission of its fault.</p>
<p>Nevertheless, if a fine is announced, it will be the first from the Irish regulator against a big tech company under European GDPR rules.</p>
<p>The Irish Commissioner, Helen Dixon, is Twitter’s lead supervisory authority in the EU. Her office circulated a draft decision to other European data protection authorities in May, but some countries weren’t happy with it. The issue was referred as a “dispute resolution procedure” to the European Data Protection Board. On November 10th, that body said it had made its own determination and that the Irish DPC had a month to finalise and announce the decision.</p>
<p>The move comes ahead of the DPC’s legal showdown against Facebook in the High Court next week. In August, the social media giant took judicial review proceedings against the regulator. Facebook is hoping to quash both an inquiry and a preliminary decision from Helen Dixon’s office on the issue of personal transfers from the EU to the US. The preliminary decision would put a halt to Facebook’s transfers of the personal data of millions of EU users to the US.</p>
<p>Source: <a href="https://www.independent.ie/news/dpc-to-announce-twitter-fine-as-facebook-high-court-data-case-looms-39858253.html">Independent.ie</a></p>
<p>Photo by Brett Jordan on Unsplash</p>
<p>The post <a rel="nofollow" href="https://www.gdprregister.eu/news/twitter-fine-ireland/">Irish Data Protection Commission to announce Twitter fine on December 17th</a> appeared first on <a rel="nofollow" href="https://www.gdprregister.eu">GDPR Register | Compliance tool for privacy experts</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://www.gdprregister.eu/news/twitter-fine-ireland/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							</item>
		<item>
		<title>Survey result: 45% of businesses faced a data breach in last 12 months</title>
		<link>https://www.gdprregister.eu/news/data-breach-2020/</link>
				<comments>https://www.gdprregister.eu/news/data-breach-2020/#respond</comments>
				<pubDate>Wed, 11 Nov 2020 08:03:01 +0000</pubDate>
		<dc:creator><![CDATA[Aleksander Uibo]]></dc:creator>
		
		<guid isPermaLink="false">https://www.gdprregister.eu/?post_type=news&#038;p=11024</guid>
				<description><![CDATA[<p>The data breach report is based on a survey conducted by Kaspersky and B2B International on September 30, 2020. Researchers interviewed 4,179 businesses globally, with 50 and up to 4,999 employees. Surveyed companies are from the following 5 industries: financial services, government, manufacturing, IT and telecommunications, retail and wholesale. Analysis reveals that out of the [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.gdprregister.eu/news/data-breach-2020/">Survey result: 45% of businesses faced a data breach in last 12 months</a> appeared first on <a rel="nofollow" href="https://www.gdprregister.eu">GDPR Register | Compliance tool for privacy experts</a>.</p>
]]></description>
								<content:encoded><![CDATA[<p>The data breach report is based on a survey conducted by Kaspersky and B2B International on September 30, 2020. Researchers interviewed 4,179 businesses globally, with 50 and up to 4,999 employees. Surveyed companies are from the following 5 industries: financial services, government, manufacturing, IT and telecommunications, retail and wholesale.</p>
<p>Analysis reveals that out of the 4,179 businesses, 45% lost data to hackers in the past 12 months. IT and telecommunication companies saw breaches most often, with 53% of companies losing data. IT and telecommunication businesses often have customers&#8217; financial information, in addition to other sensitive data, such as private conversations, social security numbers, and addresses.</p>
<p>Next up is the retail and wholesale industry, in which 52% of businesses experienced a data breach in the last year. Such cybersecurity incidents in retail businesses can damage the brand’s reputation, which leads to losing numerous customers, especially those who are privacy-conscious.</p>
<p>Third on the list is financial services, where exactly half of the respondents stated that their business lost sensitive data to fraudsters. Breaches in the financial industry are a huge concern since an unnoticed leak allows cybercriminals to drain the victims&#8217; bank accounts.</p>
<p>Companies in the government sector are not an exception to the rule, as 46% of them had a data leak in the last 12 months. Attacks aimed at the government are more often than not supported by foreign authorities, whose aim is to obtain political and military information.</p>
<p>Finally, manufacturing and industrial companies experienced data breaches least often, but still a significant amount, at 43%. The danger is mostly to the businesses themselves, as competitors hire hackers to steal inside data which would destroy the competitive advantage the victim company had.</p>
<h2>Most common threats overall</h2>
<p>Shockingly, as many as 78% of surveyed businesses reported some kind of a cyber threat in their systems last year. On average, a cyber incident caused $312,117 in damages.</p>
<p>Besides data breaches, <strong>viruses and malware</strong> are the most common threats detected. Over 43% of companies experienced viruses and malware in their internal network in the last 12 months.</p>
<p>There is a wide variety of viruses and malware created by hackers. Nonetheless, the overwhelming majority of them are created to make money illegally.</p>
<p>Also, 39% of companies reported that <strong>bring-your-own-devices (BYOD)</strong> had been infected by malware as well. Some companies provide all the needed equipment for work, while others require employees to bring their own computers and mobile devices. Company-owned equipment usually has at-least some security measures in place as soon as the employee gets the device. However, that is not the case with BYOD equipment. There is no guarantee that employees update their computer software, which leaves vulnerabilities that hackers can abuse.</p>
<p>The fourth most common cyber threat in businesses globally is <strong>crypto-malware and <a href="https://www.gdprregister.eu/gdpr/ransomware-gdpr/">ransomware</a></strong>. Crypto-malware is a type of ransomware that encrypts a user&#8217;s files and demands a ransom. Fraudsters can also steal the data, delete it from the company’s database, and request a ransom (usually in Bitcoin) to get back the data. Unfortunately, companies often choose to pay the ransom to avoid damaging their public reputation, hence further encouraging such attacks.</p>
<p><strong>DDoS attacks</strong> are one of the most known types of cyberattacks, which affected 34% of companies globally in the last 12 months. DDoS is short for Distributed Denial of Service, and it is an attack used to crash a service or a website, making it temporarily inaccessible to its users. Although individuals suffering from DDoS attacks, typically, cybercriminals target services instead. They often attack services hosted on high-profile web servers, like banks or credit card payment gateways. Revenge, blackmail, and activism are the most common reasons behind the performed attacks.</p>
<p>Source: <a href="https://atlasvpn.com/blog/45-of-businesses-faced-a-data-breach-in-last-12-months">atlasvpn</a></p>
<p>Photo by Kevin Ku on Unsplash</p>
<p>The post <a rel="nofollow" href="https://www.gdprregister.eu/news/data-breach-2020/">Survey result: 45% of businesses faced a data breach in last 12 months</a> appeared first on <a rel="nofollow" href="https://www.gdprregister.eu">GDPR Register | Compliance tool for privacy experts</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://www.gdprregister.eu/news/data-breach-2020/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							</item>
		<item>
		<title>Cork hospital fined €65k after patients&#8217; personal data found in public recycling facility</title>
		<link>https://www.gdprregister.eu/news/cork-hospita-fine-for-incorrect-disposal-of-personal-data/</link>
				<comments>https://www.gdprregister.eu/news/cork-hospita-fine-for-incorrect-disposal-of-personal-data/#respond</comments>
				<pubDate>Thu, 05 Nov 2020 08:44:12 +0000</pubDate>
		<dc:creator><![CDATA[Aleksander Uibo]]></dc:creator>
		
		<guid isPermaLink="false">https://www.gdprregister.eu/?post_type=news&#038;p=10954</guid>
				<description><![CDATA[<p>Cork hospital fined €65k after patients&#8217; personal data found in public recycling facility The Data Protection Commission (DPC) has handed down a €65,000 fine to Cork University Maternity Hospital (CUMH) after the personal data of 78 of its patients was discovered disposed of in a public recycling facility elsewhere in the county. The complaint was [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.gdprregister.eu/news/cork-hospita-fine-for-incorrect-disposal-of-personal-data/">Cork hospital fined €65k after patients&#8217; personal data found in public recycling facility</a> appeared first on <a rel="nofollow" href="https://www.gdprregister.eu">GDPR Register | Compliance tool for privacy experts</a>.</p>
]]></description>
								<content:encoded><![CDATA[<h1>Cork hospital fined €65k after patients&#8217; personal data found in public recycling facility</h1>
<p dir="ltr">The Data Protection Commission (DPC) has handed down a €65,000 fine to Cork University Maternity Hospital (CUMH) after the personal data of 78 of its patients was discovered disposed of in a public recycling facility elsewhere in the county.</p>
<p dir="ltr">The complaint was first raised with the DPC in June 2019 after a member of the public, who had discovered the documents, brought the matter to the HSE’s attention.</p>
<p dir="ltr">The executive then reported the data breach to the DPC.</p>
<p dir="ltr">The breach, an infraction of the hospital’s responsibilities under the EU’s General Data Protection Regulation (GDPR) which is understood to have consisted of a large number of documents, equated to the personal data of 78 people and the special category personal data of six of them.</p>
<p dir="ltr">Special category data under GDPR is the information of a particularly sensitive nature, the exposure of which could be expected to significantly impact the rights and freedoms of data subjects or could be potentially used against them in a discriminatory fashion.</p>
<p dir="ltr">It includes information regarding individuals’ race or ethnicity, religious beliefs, political opinions, biometric (identifiable) data, sexual orientation, and health data.</p>
<p dir="ltr">The breach at CUMH is believed to have comprised sensitive health data of patients, including medical histories and future planned programmes of care.</p>
<p dir="ltr">In its decision, handed down on August 18, the DPC said that the HSE had infringed Articles 5 and 32 of the GDPR by failing to “implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk presented by its use and disposal of hardcopy documents containing patients’ personal data”.</p>
<p dir="ltr"><span class="contextmenu Quotation">It is unknown whether or not any individual or individuals were held accountable for the breach, or how the documents came to be disposed of in the manner in which they were.</span></p>
<p dir="ltr">Regardless of what individual disposed of the documents, the hospital, as data controller, would have been deemed responsible.</p>
<p dir="ltr">The DPC said it had applied an administrative fine of €65,000 on the HSE for its infringements. The ruling has not been appealed.</p>
<p dir="ltr"><span class="contextmenu Quotation">“Cork University Maternity Hospital accepts the findings of the report of the Data Protection Commission in full and are working to implement all recommendations in the report,” said a spokesperson for the hospital.</span></p>
<p dir="ltr">They said that all patients affected by the breach had been notified of it.</p>
<p dir="ltr">“The HSE takes all breaches of data protection seriously and all such cases are fully investigated to establish how they occurred and preventative measures are put in place to reduce the risk of such breaches happening again,” they said.</p>
<p dir="ltr">“This is in addition to a comprehensive training and development programme for staff in GDPR as well as a range of policies and procedures designed to protect personal data.”</p>
<p dir="ltr">The DPC also ordered the HSE to bring its systems for <a href="https://www.gdprregister.eu/gdpr/processing-activities-records/">processing</a> and disposing of patients’ information “into compliance” with GDPR standards and issued the executive with a formal reprimand regarding same.</p>
<p dir="ltr">The decision is just the fifth fine handed down by the DPC since GDPR came into force in May 2018. The other four were delivered to child and family agency Tusla.</p>
<p>Source: <a href="https://www.irishexaminer.com/news/arid-40075673.html">Irish Examiner</a></p>
<p>Photo by Steve Johnson on Unsplash</p>
<p>The post <a rel="nofollow" href="https://www.gdprregister.eu/news/cork-hospita-fine-for-incorrect-disposal-of-personal-data/">Cork hospital fined €65k after patients&#8217; personal data found in public recycling facility</a> appeared first on <a rel="nofollow" href="https://www.gdprregister.eu">GDPR Register | Compliance tool for privacy experts</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://www.gdprregister.eu/news/cork-hospita-fine-for-incorrect-disposal-of-personal-data/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							</item>
		<item>
		<title>ICO fines Marriott International Inc £18.4million for failing to keep customers’ personal data secure</title>
		<link>https://www.gdprregister.eu/news/ico-fine-marriot/</link>
				<comments>https://www.gdprregister.eu/news/ico-fine-marriot/#respond</comments>
				<pubDate>Mon, 02 Nov 2020 09:24:33 +0000</pubDate>
		<dc:creator><![CDATA[Aleksander Uibo]]></dc:creator>
		
		<guid isPermaLink="false">https://www.gdprregister.eu/?post_type=news&#038;p=10926</guid>
				<description><![CDATA[<p>The ICO has fined Marriott International Inc £18.4million for failing to keep millions of customers’ personal data secure. Marriott estimates that 339 million guest records worldwide were affected following a cyber-attack in 2014 on Starwood Hotels and Resorts Worldwide Inc. The attack, from an unknown source, remained undetected until September 2018, by which time the company [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.gdprregister.eu/news/ico-fine-marriot/">ICO fines Marriott International Inc £18.4million for failing to keep customers’ personal data secure</a> appeared first on <a rel="nofollow" href="https://www.gdprregister.eu">GDPR Register | Compliance tool for privacy experts</a>.</p>
]]></description>
								<content:encoded><![CDATA[<h1>The ICO has <a title="Marriott International Inc" href="https://ico.org.uk/action-weve-taken/enforcement/marriott-international-inc/" data-id="44220">fined Marriott International Inc £18.4million for failing to keep millions of customers’ personal data secure</a>.</h1>
<p>Marriott estimates that 339 million guest records worldwide were affected following a cyber-attack in 2014 on Starwood Hotels and Resorts Worldwide Inc. The attack, from an unknown source, remained undetected until September 2018, by which time the company had been acquired by Marriott.</p>
<p>The personal data involved differed between individuals but may have included names, email addresses, phone numbers, unencrypted passport numbers, arrival/departure information, guests’ VIP status and loyalty programme membership number.</p>
<p>The precise number of people affected is unclear as there may have been multiple records for an individual guest. Seven million guest records related to people in the UK.</p>
<p>The ICO’s investigation found that there were failures by Marriott to put appropriate technical or organisational measures in place to protect the personal data being processed on its systems, as required by the General Data Protection Regulation (GDPR).</p>
<p>Information Commissioner, Elizabeth Denham, said:</p>
<blockquote><p>”Personal data is precious and businesses have to look after it. Millions of people’s data was affected by Marriott’s failure; thousands contacted a helpline and others may have had to take action to protect their personal data because the company they trusted it with had not.</p>
<p>“When a business fails to look after customers’ data, the impact is not just a possible fine, what matters most is the public whose data they had a duty to protect.”</p></blockquote>
<p>The ICO’s investigation traced the cyber-attack back to 2014, but the penalty only relates to the breach from 25 May 2018, when new rules under the GDPR came into effect.</p>
<p>Because the breach happened before the UK left the EU, the ICO investigated on behalf of all EU authorities as lead supervisory authority under the GDPR. The penalty and action have been approved by the other <a href="https://www.gdprregister.eu/gdpr/dpa-gdpr/">EU DPAs</a> through the GDPR’s cooperation process.</p>
<p>In July 2019, the ICO issued Marriott with a notice of intent to fine. As part of the regulatory process, the ICO considered representations from Marriott, the steps Marriott took to mitigate the effects of the incident and the economic impact of COVID-19 on their business before setting a final penalty.</p>
<h3>Details of the cyber attack</h3>
<p>In 2014, an unknown attacker installed a piece of code known as a `web shell’ onto a device in the Starwood system giving them the ability to access and edit the contents of this device remotely.</p>
<p>This access was exploited in order to install malware, enabling the attacker to have remote access to the system as a privileged user. As a result, the attacker would have had unrestricted access to the relevant device, and other devices on the network to which that account would have had access.</p>
<p>Further tools were installed by the attacker to gather login credentials for additional users within the Starwood network. With these credentials, the database storing reservation data for Starwood customers was accessed and exported by the attacker.</p>
<p>The ICO acknowledges that Marriott acted promptly to contact customers and the ICO. It also acted quickly to mitigate the risk of damage suffered by customers, and has since instigated a number of measures to improve the security of its systems.</p>
<p>Source: ICO</p>
<p>Photo by ActionVance on Unsplash</p>
<p>The post <a rel="nofollow" href="https://www.gdprregister.eu/news/ico-fine-marriot/">ICO fines Marriott International Inc £18.4million for failing to keep customers’ personal data secure</a> appeared first on <a rel="nofollow" href="https://www.gdprregister.eu">GDPR Register | Compliance tool for privacy experts</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://www.gdprregister.eu/news/ico-fine-marriot/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							</item>
		<item>
		<title>Wizz Air: €1 for a flight, €35 for your GDPR right</title>
		<link>https://www.gdprregister.eu/news/wizz-air-failed-to-provide-right-to-rectification/</link>
				<comments>https://www.gdprregister.eu/news/wizz-air-failed-to-provide-right-to-rectification/#respond</comments>
				<pubDate>Mon, 26 Oct 2020 09:52:32 +0000</pubDate>
		<dc:creator><![CDATA[Aleksander Uibo]]></dc:creator>
		
		<guid isPermaLink="false">https://www.gdprregister.eu/?post_type=news&#038;p=10913</guid>
				<description><![CDATA[<p>Despite the free right to rectification under the GDPR, the airline charged € 35 in phone charges to update a surname. Updating name allegedly only possible in case of marriage. After changing her surname and consequently her email address, an Austrian passenger of Wizz Air needed to update her data stored with the company using [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.gdprregister.eu/news/wizz-air-failed-to-provide-right-to-rectification/">Wizz Air: €1 for a flight, €35 for your GDPR right</a> appeared first on <a rel="nofollow" href="https://www.gdprregister.eu">GDPR Register | Compliance tool for privacy experts</a>.</p>
]]></description>
								<content:encoded><![CDATA[<h1><strong><span lang="EN-GB" xml:lang="EN-GB">Despite the free right to rectification under the GDPR, the airline charged € 35 in phone charges to update a surname.</span></strong></h1>
<h2><strong>Updating name allegedly only possible in case of marriage</strong>.</h2>
<p><span lang="EN-GB" xml:lang="EN-GB">After changing her surname and consequently her email address, an Austrian passenger of Wizz Air needed to update her data stored with the company using her right to rectification provided by GDPR. As the passenger couldn’t do this herself, she filed a “rectification request” for her surname and email address with Wizz Air’s Data Protection Officer (DPO).</span></p>
<p><span lang="EN-GB" xml:lang="EN-GB">Three months later, the data subject still had not received any response. She submitted a new request to change her surname using the company’s contact form. Customer Service told her that she could not change her surname online except in case of marriage. In her case, she would need to call the Wizz Air Call Center, which costs of more than 1 Euro per minute.</span></p>
<h2><strong><span lang="EN-GB" xml:lang="EN-GB">35,67 Euros later – a partial success. </span></strong></h2>
<p><span lang="EN-GB" xml:lang="EN-GB">Only after being on the phone for about 32 minutes did Wizz Air change the passenger&#8217;s surname, however, </span>they still did not change her email address. Even minor inaccurate data often has real life consequences: Information about a cancelled flight was sent to the passenger’s former email address. As a result, the passenger only coincidentally learned about the cancelled flight in the last minute, as the notification was sent to the passenger’s former email address.</p>
<p>&#8220;<em>Wizz Air requires passengers to</em> <em>keep their account data accurate. By law, updating your data must be free, so low costs airlines can’t make compliance with the GDPR another one of their hidden fees.” – </em>Ala Krinickytė, data protection lawyer at <a href="https://noyb.eu/"><em>noyb</em></a></p>
<p>The GDPR gives customers the right to correct their information free of charge (Article 12(5) GDPR). By forcing customers to call their expensive hotlines for changes, Wizz Air fails to let customers exercise this “right to rectification”. The case of the passenger is not an isolated one. Other Wizz Air customers have complained about similar issues too (for example <a href="https://twitter.com/wizzair/status/1013792025022431232?lang=en">here</a>).</p>
<p><em>&#8220;The GDPR states <a href="https://www.gdprregister.eu/gdpr/gdpr-basics-controller-vs-processor/">controllers</a> should take ‘every reasonable step’ to ensure that data is accurate. In this case, it feels like Wizz Air failed to take any steps at all. The request for rectification is probably the least contentious data protection request a data subject can submit to the controller. Especially with airlines, it is of great importance that their passenger lists matches the passports. They make things more complicated and costly than necessary.&#8221;</em> – Ala Krinickytė, data protection lawyer at <em>noyb</em></p>
<h2><strong>Complaint filed, with a potential fine of up to €97 million</strong>.</h2>
<p>Due to the fact that Wizz Air has shown a systematic failure to deal with the right to correct personal data without undue delay and free of charge, <em>noyb</em> has filed a complaint with the Austrian <a href="https://www.gdprregister.eu/gdpr/dpa-gdpr/">data protection authority</a>.</p>
<p><em>&#8220;According to Forbes, Wizz Air is now ‘</em><a href="https://www.forbes.com/sites/cathybuyck/2020/04/15/corona-pandemic-propels-hungarys-wizz-air-to-europes-largest-airline-oag-data-reveals/"><em>Europe’s largest airline</em></a><em>’, which makes it all the more important for them to adjust their practices and ensure their customers’ GDPR rights. Given that this is a larger problem at Wizz Air, the data protection authority should impose an effective and dissuasive fine. Companies need to understand that they can’t simply ignore their passengers’ data protection rights.&#8221;</em> &#8211; Ala Krinickytė, data protection lawyer at <em>noyb</em></p>
<p>Original article: <a href="https://noyb.eu/en/wizz-air-eu1-flight-eu35-your-gdpr-right">NOYB</a></p>
<p>Photo by Markus Winkler on Unsplash.</p>
<p>The post <a rel="nofollow" href="https://www.gdprregister.eu/news/wizz-air-failed-to-provide-right-to-rectification/">Wizz Air: €1 for a flight, €35 for your GDPR right</a> appeared first on <a rel="nofollow" href="https://www.gdprregister.eu">GDPR Register | Compliance tool for privacy experts</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://www.gdprregister.eu/news/wizz-air-failed-to-provide-right-to-rectification/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							</item>
		<item>
		<title>IAB Europe’s ad tracking consent framework found to fail GDPR standard</title>
		<link>https://www.gdprregister.eu/news/tcf-found-to-fail-gdpr-standard/</link>
				<comments>https://www.gdprregister.eu/news/tcf-found-to-fail-gdpr-standard/#respond</comments>
				<pubDate>Tue, 20 Oct 2020 10:24:49 +0000</pubDate>
		<dc:creator><![CDATA[Aleksander Uibo]]></dc:creator>
		
		<guid isPermaLink="false">https://www.gdprregister.eu/?post_type=news&#038;p=10806</guid>
				<description><![CDATA[<p>IAB Europe’s ad tracking consent framework found to fail GDPR standard A flagship framework for gathering Internet users’ consent for targeting with behavioral ads — which is designed by ad industry body, the IAB Europe — fails to meet the required legal standards of data protection, according to findings by its EU data supervisor. The [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.gdprregister.eu/news/tcf-found-to-fail-gdpr-standard/">IAB Europe’s ad tracking consent framework found to fail GDPR standard</a> appeared first on <a rel="nofollow" href="https://www.gdprregister.eu">GDPR Register | Compliance tool for privacy experts</a>.</p>
]]></description>
								<content:encoded><![CDATA[<div class="article__content-wrap">
<header class="article__header">
<div class="article__title-wrapper">
<h1 class="article__title">IAB Europe’s ad tracking consent framework found to fail GDPR standard</h1>
</div>
</header>
</div>
<div class="article__content-wrap">
<div class="article-content">
<p id="speakable-summary">A flagship framework for gathering Internet users’ consent for targeting with behavioral ads — which is designed by ad industry body, the <a href="https://iabeurope.eu/">IAB Europe</a> — fails to meet the required legal standards of data protection, according to findings by its EU data supervisor.</p>
<p>The Belgian DPA’s investigation follows complaints against the use of personal data in the real-time bidding (RTB) component of programmatic advertising which contend that a system of high velocity personal data trading is inherently incompatible with data security requirements baked into EU law.</p>
<p>The IAB Europe’s Transparency and Consent Framework (TCF) can be seen popping up all over the regional web, asking users to accept (or reject) ad trackers — with the stated aim of helping publishers comply with the EU’s data protection rules.</p>
<p>It was the ad industry standard’s body’s response to a major update to the bloc’s data protection rules, after the General Data Protection Regulation (GDPR) came into application in May 2018 — tightening standards around consent to process personal data and introducing supersized penalties for non-compliance — thereby cranking up the legal risk for the ad tracking industry.</p>
<p>The IAB Europe introduced the TCF in <a href="https://iabeurope.eu/knowledgehub/policy/introducing-for-public-comment-transparency-and-consent-framework-tcf-version-2-0/#:~:text=IAB%20Europe%20launched%20its%20Transparency,the%20GDPR%20and%20ePrivacy%20Directive.">April 2018</a>, saying at the time that it would “help the digital advertising ecosystem comply with obligations under the GDPR and ePrivacy Directive”.</p>
<p>The framework has been widely adopted, including by adtech giant, Google — which integrated it this August.</p>
<p>Beyond Europe, the IAB has also recently been pushing for a version of the same tool to be used for ‘compliance’ with <a href="https://techcrunch.com/2020/01/01/the-california-consumer-privacy-act-officially-takes-effect-today/">California’s Consumer Privacy Act</a>.</p>
<p>However the findings by the investigatory division of the Belgian data protection agency cast doubt on all that adoption — suggesting the framework is not fit for purpose.</p>
<p>The inspection service of the Belgium DPA makes a number of findings in a report reviewed by TechCrunch — including that the TCF fails to comply with GDPR principles of transparency, fairness and accountability, and also the lawfulness of processing.</p>
<p>It also finds that the TCF does not provide adequate rules for the processing of special category data (e.g. health information, political affiliation, sexual orientation etc) — yet <em>does</em> process that data.</p>
<p>There are further highly embarrassing findings for the IAB Europe, which the inspectorate found not to have appointed a <a href="https://www.gdprregister.eu/gdpr/data-protection-officer/">Data Protection Officer</a>, nor to have a <a href="https://www.gdprregister.eu/gdpr/processing-activities-records/">register of its own internal data processing activities</a>.</p>
<p>Its own <a href="https://iabeurope.eu/privacy-policy/">privacy policy</a> was also found wanting.</p>
<p>We’ve reached out to the IAB Europe for comment on the inspectorate’s findings. <strong>Update: </strong>See the base of this article for a first response. <strong>Update 2:</strong> The ad standards body has now published a statement <a href="https://iabeurope.eu/news-blog/iab-europe-comments-on-belgian-dpa-report/">here</a> in which it describes the TCF as a “voluntary standard” that contains “a minimal set of best practices”. It also says it “respectfully disagree[s] with the [Belgian DPA]’s apparent interpretation of the law, pursuant to which IAB Europe is a data controller in the context of publishers’ implementation of the TCF”, adding: “If upheld, the [Belgian DPA]’s interpretation would have a chilling effect on the development of open-source compliance standards that serve to support industry players and protect consumers.”</p>
<p><a href="https://techcrunch.com/2019/05/20/gdpr-adtech-complaints-keep-stacking-up-in-europe/">A series of complaints against RTB have been filed across Europe</a> over the past two years, starting in the UK and Ireland.</p>
<p>Dr Johnny Ryan, who filed the original RTB complaints — and is now a senior fellow at the <a href="https://www.iccl.ie/news/gdpr-watchdogs-investigation-finds-that-tracking-and-consent-pop-ups-used-by-google-and-other-major-websites-and-apps-are-unlawful/">Irish Council for Civil Liberties</a> — told TechCrunch: “The TCF was an attempt by the tracking industry to put a veneer or quasi-legality over the massive data breach at the heart of the behavioral advertising and tracking industry and the Belgian DPA is now peeling that veneer off and exposing the illegality.”</p>
<p>Ryan has previously described the RTB issues as “the greatest data breach ever recorded”.</p>
<p>Last month he published another <a href="https://techcrunch.com/2020/09/21/irelands-data-watchdog-slammed-for-letting-adtech-carry-on-biggest-breach-of-all-time/">hair-raising dossier of evidence</a> on how extensively and troublingly RTB leaks personal data — with findings including that a data broker used RTB to profile people with the aim of influencing the 2019 Polish Parliamentary Election by targeting LGBTQ+ people. Another data broker was found to be profiling and targeting Internet users in Ireland under categories including “Substance abuse”, “Diabetes,” “Chronic Pain” and “Sleep Disorders”.</p>
<p>Following the filing of RTB complaints, the UK’s data watchdog, the ICO, issued a warning about behavioural advertising in <a href="https://techcrunch.com/2019/06/20/behavioural-advertising-is-out-of-control-warns-uk-watchdog/">June 2019</a> — urging the industry to take note of the need to comply with data protection standards.</p>
<p>However the regulator has failed to follow up with any enforcement action — unless you count multiple <a href="https://techcrunch.com/2020/01/17/privacy-experts-slam-uks-disastrous-failure-to-tackle-unlawful-adtech/">mildly worded blog posts</a>. Most recently it <a href="https://techcrunch.com/2020/05/07/adtech-scores-a-pandemic-pause-from-uk-privacy-oversight/">paused its (still ongoing) investigation into the issue</a> because of the pandemic.</p>
<p>In another development last year, Ireland’s DPC <a href="https://techcrunch.com/2019/05/22/googles-lead-eu-regulator-opens-formal-privacy-probe-of-its-adtech/">opened an investigation</a> into Google’s online Ad Exchange — looking into the lawful basis for its processing of personal data. But that investigation is one of <a href="https://techcrunch.com/2020/02/19/lack-of-big-tech-gdpr-decisions-looms-large-in-eu-watchdogs-annual-report/">scores that remain open on its desk</a>. And the Irish regulator continues to <a href="https://twitter.com/maxschrems/status/1317137890330202112">face criticism</a> over the length of time it’s taking to issue decisions on major cross-border GDPR cases pertaining to big tech.</p>
<p>There are still several steps to go before the Belgian DPA takes (any) action on the substance of its inspectorate’s report — with a number of steps outstanding in the regulatory process.</p>
<p>But, per the complainants, the inspectorate’s findings have been forwarded to the Litigation Chamber, and action is expected in early 2021. Which suggests privacy watchers in the EU might finally get to uphold their rights against the ad tracking industry/<a href="https://techcrunch.com/2019/11/19/a-10-point-plan-to-reboot-the-data-industrial-complex-for-the-common-good/">data industrial complex</a> in the near future.</p>
<p>For publishers the message is a need to change <em>how</em> they monetize their content: Rights-respecting alternatives to creepy ads are possible (e.g. contextual ad targeting which does not use personal data). <a href="https://techcrunch.com/2020/07/24/data-from-dutch-public-broadcaster-shows-the-value-of-ditching-creepy-ads/">Some publishers</a> have already found the switch to contextual ads to be a good news story for their revenues. Subscription business models are also available (even if <a href="https://twitter.com/roelofbotha/status/1316578275360083969">not all VCs are fans</a>).</p>
</div>
<p>Original article: TechCrunch</p>
<p>Photo by Guillaume Périgois on Unsplash</p>
</div>
<p>The post <a rel="nofollow" href="https://www.gdprregister.eu/news/tcf-found-to-fail-gdpr-standard/">IAB Europe’s ad tracking consent framework found to fail GDPR standard</a> appeared first on <a rel="nofollow" href="https://www.gdprregister.eu">GDPR Register | Compliance tool for privacy experts</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://www.gdprregister.eu/news/tcf-found-to-fail-gdpr-standard/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							</item>
		<item>
		<title>ICO fines British Airways £20m for data breach affecting more than 400,000 customers</title>
		<link>https://www.gdprregister.eu/news/british-airways-fine/</link>
				<comments>https://www.gdprregister.eu/news/british-airways-fine/#respond</comments>
				<pubDate>Fri, 16 Oct 2020 11:14:12 +0000</pubDate>
		<dc:creator><![CDATA[Aleksander Uibo]]></dc:creator>
		
		<guid isPermaLink="false">https://www.gdprregister.eu/?post_type=news&#038;p=10782</guid>
				<description><![CDATA[<p>The Information Commissioner’s Office (ICO) has fined British Airways (BA) £20m for failing to protect the personal and financial details of more than 400,000 of its customers. An ICO investigation found the airline was processing a significant amount of personal data without adequate security measures in place. This failure broke data protection law and, subsequently, [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.gdprregister.eu/news/british-airways-fine/">ICO fines British Airways £20m for data breach affecting more than 400,000 customers</a> appeared first on <a rel="nofollow" href="https://www.gdprregister.eu">GDPR Register | Compliance tool for privacy experts</a>.</p>
]]></description>
								<content:encoded><![CDATA[<h1>The Information Commissioner’s Office (ICO) has <a href="https://ico.org.uk/action-weve-taken/enforcement/british-airways/" title="British Airways" data-id="44044">fined British Airways (BA) £20m for failing to protect the personal and financial details of more than 400,000 of its customers</a>.</h1>
<p>An ICO investigation found the airline was processing a significant amount of personal data without adequate security measures in place. This failure broke data protection law and, subsequently, BA was the subject of a cyber-attack during 2018, which it did not detect for more than two months.</p>
<p>ICO investigators found BA ought to have identified weaknesses in its security and resolved them with security measures that were available at the time.</p>
<p>Addressing these security issues would have prevented the 2018 cyber-attack being carried out in this way, investigators concluded.</p>
<p>Information Commissioner Elizabeth Denham said: “People entrusted their personal details to BA and BA failed to take adequate measures to keep those details secure.</p>
<p>“Their failure to act was unacceptable and affected hundreds of thousands of people, which may have caused some anxiety and distress as a result. That’s why we have issued BA with a £20m fine – our biggest to date.</p>
<p>“When organisations take poor decisions around people’s personal data, that can have a real impact on people’s lives. The law now gives us the tools to encourage businesses to make better decisions about data, including investing in up-to-date security.”</p>
<p>Because the BA breach happened in June 2018, before the UK left the EU, the ICO investigated on behalf of all EU authorities as lead supervisory authority under the GDPR. The penalty and action have been approved by the other EU DPAs through the GDPR’s cooperation process.</p>
<p>In June 2019 the ICO issued BA with a notice of intent to fine. As part of the regulatory process the ICO considered both representations from BA and the economic impact of COVID-19 on their business before setting a final penalty.</p>
<h3>Details of the cyber attack</h3>
<p>The attacker is believed to have potentially accessed the personal data of approximately 429,612 customers and staff. This included names, addresses, payment card numbers and CVV numbers of 244,000 BA customers.</p>
<p>Other details thought to have been accessed include the combined card and CVV numbers of 77,000 customers and card numbers only for 108,000 customers.</p>
<p>Usernames and passwords of BA employee and administrator accounts as well as usernames and PINs of up to 612 BA Executive Club accounts were also potentially accessed.</p>
<h3>Failure to prevent the attack</h3>
<p>There were numerous measures BA could have used to mitigate or prevent the risk of an attacker being able to access the BA network. These include:</p>
<ul>
<li>limiting access to applications, data and tools to only that which are required to fulfil a user’s role</li>
<li>undertaking rigorous testing, in the form of simulating a cyber-attack, on the business’ systems;</li>
<li>protecting employee and third party accounts with multi-factor authentication.</li>
</ul>
<p>Additional mitigating measures BA could have used are <a href="https://ico.org.uk/action-weve-taken/enforcement/british-airways/" title="British Airways" data-id="44044">listed in the penalty notice</a>.</p>
<p>None of these measures would have entailed excessive cost or technical barriers, with some available through the Microsoft Operating System used by BA.</p>
<p>Since the attack, BA has made considerable improvements to its IT security.</p>
<h3>Lack of awareness of the attack</h3>
<p>ICO investigators found that BA did not detect the attack on 22 June 2018 themselves but were alerted by a third party more than two months afterwards on 5 September. Once they became aware BA acted promptly and notified the ICO.</p>
<p>It is not clear whether or when BA would have identified the attack themselves. This was considered to be a severe failing because of the number of people affected and because any potential financial harm could have been more significant.</p>
<p>Original article: <a href="https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2020/10/ico-fines-british-airways-20m-for-data-breach-affecting-more-than-400-000-customers/">ICO</a></p>
<p>The post <a rel="nofollow" href="https://www.gdprregister.eu/news/british-airways-fine/">ICO fines British Airways £20m for data breach affecting more than 400,000 customers</a> appeared first on <a rel="nofollow" href="https://www.gdprregister.eu">GDPR Register | Compliance tool for privacy experts</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://www.gdprregister.eu/news/british-airways-fine/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							</item>
		<item>
		<title>GDPR fines for unlawful marketing messages</title>
		<link>https://www.gdprregister.eu/news/gdpr-fines-unlawful-marketing-messages/</link>
				<comments>https://www.gdprregister.eu/news/gdpr-fines-unlawful-marketing-messages/#respond</comments>
				<pubDate>Tue, 19 Feb 2019 15:30:45 +0000</pubDate>
		<dc:creator><![CDATA[Sara Laine]]></dc:creator>
		
		<guid isPermaLink="false">https://www.gdprregister.eu/?post_type=news&#038;p=7592</guid>
				<description><![CDATA[<p>The referendum campaign Leave.EU and Eldon Insurance Group were announced to receive GDPR fines for a total of £120,000. This decision was presented by ICO due to unlawful electronic marketing actions. Furthermore, companies are being investigated on complying with other laws on data protection. Mentioned organizations worked closely together and failed to separate the personal data of political [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.gdprregister.eu/news/gdpr-fines-unlawful-marketing-messages/">GDPR fines for unlawful marketing messages</a> appeared first on <a rel="nofollow" href="https://www.gdprregister.eu">GDPR Register | Compliance tool for privacy experts</a>.</p>
]]></description>
								<content:encoded><![CDATA[<p>The referendum campaign Leave.EU and Eldon Insurance Group were announced to receive GDPR fines for a total of £120,000. This decision was presented by <a href="https://ico.org.uk">ICO</a> due to unlawful electronic marketing actions. Furthermore, companies are being investigated<span style="font-weight: 400;"> on complying with other laws on data protection.</span></p>
<p><span style="font-weight: 400;">Mentioned organizations worked closely together and failed to separate the personal data of political subscribers and insurance customers. Leave.EU sent 300,000 political messages to Eldon Insurance customers. Meanwhile, Eldon Insurance sent emails to more than 1 million of Leave.EU subscribers through two illegal marketing campaigns. </span></p>
<p><span style="font-weight: 400;">ICO will review data protection practices and data processing activities of both companies. Also, the</span><span style="font-weight: 400;"> policies and procedures that are in place regarding staff training. Employees and DPOs of both companies will be interviewed. </span></p>
<blockquote><p><span style="font-weight: 400;"><strong>Learning TIP:</strong> <a href="https://www.gdprregister.eu/gdpr/processing-activities-records/">GDPR requires companies to keep the records of data processing activities</a>. It is crucial when providing evidence, that adequate data protection practices are followed. Regular trainings should take place regularly to inform employees about data protection regulations and requirements. </span></p></blockquote>
<p><a href="https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2019/02/ico-to-audit-data-protection-practices-at-leaveeu-and-eldon-insurance-after-fining-both-companies-for-unlawful-marketing-messages/">Read the full article on ICO page.</a></p>
<p>The post <a rel="nofollow" href="https://www.gdprregister.eu/news/gdpr-fines-unlawful-marketing-messages/">GDPR fines for unlawful marketing messages</a> appeared first on <a rel="nofollow" href="https://www.gdprregister.eu">GDPR Register | Compliance tool for privacy experts</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://www.gdprregister.eu/news/gdpr-fines-unlawful-marketing-messages/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							</item>
		<item>
		<title>NASA Suffers Another Data Breach</title>
		<link>https://www.gdprregister.eu/news/nasa-data-breach-gdpr/</link>
				<comments>https://www.gdprregister.eu/news/nasa-data-breach-gdpr/#respond</comments>
				<pubDate>Tue, 15 Jan 2019 08:47:18 +0000</pubDate>
		<dc:creator><![CDATA[Sarune Zybartaite]]></dc:creator>
		
		<guid isPermaLink="false">https://www.gdprregister.eu/?post_type=news&#038;p=7519</guid>
				<description><![CDATA[<p>You would think that of all the companies and organizations, NASA &#8211; an independent agency, responsible for the civilian space program, as well as aeronautics and aerospace research – would have implemented the highest data protection security measures. However, a data breach occurred, and personal data of agency’s employees were exposed (names, email addresses, their roles on assigned projects, information about [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.gdprregister.eu/news/nasa-data-breach-gdpr/">NASA Suffers Another Data Breach</a> appeared first on <a rel="nofollow" href="https://www.gdprregister.eu">GDPR Register | Compliance tool for privacy experts</a>.</p>
]]></description>
								<content:encoded><![CDATA[<p>You would think that of all the companies and organizations, NASA &#8211; <a href="https://www.nasa.gov/">an independent agency, responsible for the civilian space program, as well as aeronautics and aerospace research</a> – would have implemented the highest data protection security measures. However, a data breach occurred, and personal data of agency’s employees were exposed (names, email addresses, their roles on assigned projects, information about current NASA projects and upcoming tasks). This happened due to possible misinterpretation of the definition “all users” when assigning permissions to newly-created dashboards within the web app. Allegedly, system administrator provided the access to “everyone” (<a href="https://www.gdprregister.eu/gdpr/six-months-gdpr/">human error results around 88% of the reported breaches</a>).  This allowed public to see the full list of NASA employees, get to know the categorization of projects and tasks for at least 3 weeks.</p>
<p>Moreover, this is not the only data breach that NASA suffers. Back in October 2018, hackers accessed one of NASA servers which contained personally identifiable information (PII), which housed social security numbers and other sensitive data.</p>
<blockquote><p><strong>LEARNING TIP:</strong>  <em>Human error causes 4 out of 5 </em><em>data breaches (in UK). Lack of training,  unclear responsibilities or imprudence, can give rise to error (c</em>onfidential data emailed to the incorrect recipient, loss or theft of paperwork, data left in an insecure location and others). In order to avoid possible human errors, clear directions should be given to each employee about their responsibilities. Also, training should take a place after adapting new technical or organizational security measure. Employees must be well informed on how to recognize a threat and what to do in case of an accident.<br />
Also, decent technical and operational security measures should be implemented. This should be done in order to protect the data from cyber attacks and other possible threats.</p></blockquote>
<p>The post <a rel="nofollow" href="https://www.gdprregister.eu/news/nasa-data-breach-gdpr/">NASA Suffers Another Data Breach</a> appeared first on <a rel="nofollow" href="https://www.gdprregister.eu">GDPR Register | Compliance tool for privacy experts</a>.</p>
]]></content:encoded>
							<wfw:commentRss>https://www.gdprregister.eu/news/nasa-data-breach-gdpr/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							</item>
	</channel>
</rss>
