Search results
Results from the WOW.Com Content Network
Violating Articles 5(1)(c) and 13 GDPR in relation to a video surveillance system in an apartment building. [58] 2021-04-15 Vodafone Espana, S.A.U. €150,000 (reduced to €90,000) Spain Violation of Article 6(1)(a) GDPR by processing personal data without consent or any other legal basis. When imposing the fine, the AEPD took into account:
In summer 2018, a data breach affected almost 400,000 customers of British Airways, of which almost 250,000 had their names, addresses, credit card numbers and CVV codes stolen. The attack gained access to British Airways systems via the account of a compromised third party and escalated their account privileges after finding an unsecured ...
EasyJet publicly revealed the attack in May 2020. [1] They told the BBC that they were only able to notify customers whose details (credit card or email addresses) were stolen in April 2020. [1] EasyJet told BBC "This was a highly sophisticated attacker. It took time to understand the scope of the attack and to identify who had been impacted". [1]
British technology services provider Probrand said it surveyed 1,002 full- or part-time U.K. employees, 64 percent of whom fessed up to forwarding a customer email to their personal accounts in ...
New York-based IAB Tech Labs, a standards body for the digital advertising industry, is being taken to court in Germany by the Irish Council for Civil Liberties (ICCL) in a piece of privacy ...
The Act has seven parts. These are outlined in Section 1: [5] This Act makes provision about the processing of personal data. Most processing of personal data is subject to GDPR. Part 2 supplements the GDPR (see Chapter 2) and applies a broadly equivalent regime to certain types of processing to which the GDPR does not apply (see Chapter 3).
A data breach, also known as data leakage, is "the unauthorized exposure, disclosure, or loss of personal information". [1] Attackers have a variety of motives, from financial gain to political activism, political repression, and espionage.
This is a list of reports about data breaches, using data compiled from various sources, including press reports, government news releases, and mainstream news articles. The list includes those involving the theft or compromise of 30,000 or more records, although many smaller breaches occur continually.