Lee & White

Dedicated to Excellence

  • Home
  • About Us
  • Services
  • Blog
  • Press
  • Publications
  • News
Home > Blog
Go Back
  • Toothless lion grows teeth

    Thursday, October 24, 2013

    Sleeping LionIt has finally happened.

    The Belgian Privacy Commission was once regarded as a toothless lion where its role was mainly passive in nature - giving advice and recommendations. Although it had the power to send warnings and denounce violations to the public prosecutor (only if a complaint first reaches the Commission), it was unable to sanction or do much else. This has resulted in violations of the Data Protection Law nationwide where companies and organisations fearlessly processed personal data according to their whims and fancies. The Privacy Commission has finally realised its inability to bite and is doing something about it.

    On October 21, 2013, the Belgian Privacy Commission announced in De Standaard, its intention to set up a special investigation team which would actively seek out breaches of privacy. The Commission wants to play a more active role in checking whether companies or organisations are breaching privacy. By policing, it would be able to better protect the privacy of the individual and maintain law and order.

    The initiative is said to have stemmed from recent data breaches:
    • The National Railway Company of Belgium (NMBS/SNCB) stored personal data of 1.46 million customers  on a non-secure server which resulted in the leak of these data (which included first and last names, gender, date of birth, email addresses, phone numbers, and in some cases home addresses) whereby there was possible access by a mere online search engine query.
    • Belgacom's (Belgium's largest telecoms company) internal IT systems had been breached and compromised with malware by a third party which enabled hackers to access telephone and online information.
    Although this realisation has come in much later than preferred in comparison with the ICO, its UK counterpart, it is a move that must be applauded.

    The gravity of the current situation where the protection of personal data is currently in shambles has reached its limit, and more than ever, the Privacy Commission needs stronger powers to tackle these breaches and safeguard the privacy of the individual. The Commission stated that the investigation team will in the first instance, look into companies and organisations which handle sensitive personal data such as insurance companies and hospitals and focus on a particular sector each year.

    The Commission is also seeking to obtain the power to sanction non-compliant companies and organisations as the current situation is such that the Commission can refer violations to the courts, but this is regarded as an overkill. With such a power, the Commission would be able to make decisions such as to no longer allow an offender access to a particular database to render their operations and business more difficult or to revoke permission to build a database.

    With this development, companies and organisations which are still relaxed in their attitude towards the protection of personal data and regard such protection as non-profitable, should re-think the business case of protecting personal data and have it as priority in their next budget before it is too late.

    Read the Full Story

    Posted by: Lee & White

    Category:

    Tags Data Breach Personal Data Government Organisations

  • Shadow Profiles

    Monday, July 8, 2013

    Facebook, as mentioned in detail in the news, was exposed for keeping shadow profiles on users and non-users.

    Through an incident (which should have been classified as a bug as it had been available for months) it was revealed that Facebook is keeping so-called shadow profiles of its users as well as data subjects who do not use their services.

    A shadow profile is information about a certain data subject which the data subject in question did not give to the data processor. This profile is created without consent of the data subject and possibly without his knowledge. This means the data processor gathered this information through or by combining other sources, either through other data subjects or from other sources such as other web sites, chat sessions, search history, phone conversations…

    European Data Protection law forbids this kind of ‘data brokerage’, gathering, combining and reprocessing data from different sources to build a file with personal data for these reasons:
    • Data processors can only process your data with your explicit consent.
    • Data processors can only process such personal data which is relevant to their services to you.
    Your personal data has become a commodity which they use for their own profit and without a relationship with you, the data subject. Quite a number of companies, small and large, have made it their business to gather everybody’s personal data and sell it on to the highest bidder. Recent times have made it very easy for such companies to gather all information in an automated way and from the comfort of their own office. They are also not bothered by the fact that they are serving stale information which is no longer or never was correct, but can have very deep implications on your personal life.

    European Data Protection Law has several safeguards:
    • If a data subject suspects a data processor has such a shadow profile, the law provides a means to officially request a complete list of data kept by the data processor concerning the data subject.
    • If a data subject objects to the data processor’s use of the data subject’s data, the data subject can submit a request to cease processing such data.
    • The new EU Data Protection proposal mentions the right to be forgotten, but lobbying by major data processors is probably going to water this down.
    The lessons for our clients are clear:
    • Be transparent, only gather personal data from your data subjects through informed and explicit consent.
    • Do not process other information than that given by the data subject and only if it is relevant to the purpose of your relationship with the data subject.
    • Keep it alive, keep data up to date and do not keep data of data subjects beyond the duration of the relationship with your data subject.
    • Protect the personal data entrusted to you.

    Read the Full Story

    Posted by: Lee & White

    Category:

    Tags Best Practices EU Data Breach Private Persons Personal Data Organisations Internet

  • EU Data Protection Law getting more bite

    Tuesday, January 24, 2012

    EU LawIt is looking good for Data Protection in Belgium and the EU as Ms. Viviane Reding, Vice-President of the European Commission and EU Commissioner for Justice, Fundamental Rights and Citizenship, announced groundbreaking changes to EU Data Laws to be introduced in a Bill to the EU Parliament this week.

    Speaking at the “Digital, Life, Design” conference in Munich on January 22nd, 2012, she confirmed that personal data is indeed an asset, a  message which has already begun passing around since the UK Information Commissioner commissioned a report on privacy by design to help articulate the business case for proactive protection of privacy in 2008 and which we believe and preach with conviction. “Personal Data is the currency of today’s digital market, and like any currency, it needs stability and trust. Only if consumers can ‘trust’ that their data is well protected, will they continue to entrust businesses and authorities with it, buy online, and accept new services.”, she stated. And the amount of data, including Personal Data, is growing by a whopping 40% a year worldwide.

    Given the fact that 72% of European Citizens said in a recent poll that they are concerned about how their personal data is used by companies, and given that businesses are concerned too, how can they keep control over data which races around the globe in a virtual cloud?

    “Trust has to prevail”, states Ms. Reding. Rightly so. If the population is to give the current growth continued support, they need to have a good understanding of the issues and be able to trust that their data is not being abused. They entrust the EU with the task to draw up the rules and follow up on their correct implementation and execution. Trust is the key to any relationship - and how much more in the business world?

    We have a unified currency in the EU, but Data Protection law is fragmented into 27 different, and sometimes conflicting, regulations. Whilst some member states are top of the class, others have watered the 1995 EU Directive down so much that it is no more than a sign on the wall showing how bad things are. A lot of burden has been added, sometimes in the form or red tape and lengthy cumbersome administrative procedures. As such, it has all been a futile exercise as it missed its economic goal.

    Ms. Reding states “Privacy concerns are one of the most frequent reasons why people don’t buy goods and services online.”. She is adamant about the way forward: “This needs to be changed.”

    Two legislative texts will be proposed:

    “First, a Regulation to enhance opportunities for companies that want to do business in the EU's internal market, while ensuring a high level of data protection for individuals.

    Second, a Directive to ensure a smoother exchange of information between Member States' police and judicial authorities in the fight against serious crime while at the same time protecting people’s fundamental right to data protection.”


    The first point, legal certainty, will be achieved by one Data Protection Law in the form of a directly applicable Regulation which will apply to all Member States in the European Union, and to all organisations offering their goods and services to consumers in the EU – even if their servers are based outside the EU.

    This new Regulation will unleash the potential of the Digital Single Market, and will save businesses around 2.3 billion Euros per year, removing barriers to market entry, which were especially affecting our clients, the small and medium-sized enterprises. It will simplify the regulatory environment and drastically cut red tape. Current notification requirements are replaced by a duty for companies to be responsible and accountable for the protection of Personal Data in their business field. Each company will have to appoint a Data Protection Officer.

    There will be one law, applicable to all member states, and companies will only have to deal with a single Data Protection Authority linked to the country of its main establishment.

    All Data Protection Authorities will have the same adequate tools and powers to enforce the EU Law.

    They will:
    • Deal with complaints
    • Carry out investigations
    • Take binding decisions
    • Impose effective and dissuasive sanctions.
    The rules for international data transfers will be strengthened and simplified - a necessary step in a world where data travels freely around the world and major companies have made it their specialty to circumvent the more ‘difficult’ countries by operating in or via countries with weaker Data Protection legislation.

    Trust from the individuals will be earned through a few key principles, boiling down to one point: Transparency.
    • Informed
      • People need to be informed in simple, clear, and unambiguous language.
    • Consent
      • People need to freely give their specific and informed consent.
    • Control
      • People need to have control over their own data at all time. Aside from the control we know already, it will also include portability, the possibility to take one’s data and easily move it from one provider to another, and the right, not the option, to be forgotten.
    • Alert
      • Individuals need to be swiftly informed, within 24 hours, when any of their personal data is lost or stolen.
      • Companies suffering such a breach need to notify their Data Protection Authority without undue delay, i.e. ‘within 24 hours’.

    Ms. Reding concludes:

    "We will get a strong, consistent and future-proof framework for data protection, applied consistently across all Member States and across all European Union policies. We will make our data protection legislation fit for the digital age so it encourages innovation and development of new technologies and services.

    We will adjust the rules to the reality of multinational businesses. And will adjust the rules to the reality of people's lives. Europeans live, work, shop and travel freely in the EU, so their data must travel freely as well: Freely and safely. The reform will become a golden opportunity for business: complying with the EU’s laws on data protection will lead to a competitive advantage. European data protection rules will become a trademark people recognise and trust worldwide. I would welcome if everyone here put these new rules to life."


    Well said. Data Protection without a doubt enables businesses to make more and better business, leading to a competitive advantage over competitors, having a solid and healthy relationship with loyal customers. Any organisation would pay good money for this.

    You can read the full text of Ms. Reding's speech here

    It will take some time to bring the new law into practice, but organisations should be aware and prepared, making the necessary changes sooner rather than later.

    If you need to assess your current status with relation to the new Data Protection Law or need advice on implementing or improving compliance with current or the next legislation, review our services and contact us.

    Read the Full Story

    Posted by: Lee & White

    Category:

    Tags Best Practices EU Data Protection Officer Data Breach Personal Data Government Organisations Internet IT

  • The Year of Privacy: 2013

    Wednesday, January 4, 2012

    2013Is this a typo? No, it isn't, the outlook for data protection is bleak, and no immediate improvement is to be expected.

    First of all, the team at Lee & White would like to wish you a Happy New Year.

    Happy because you chose to come here on your own accord and happy that we did not spam you with - probably sincere but spam wishes all the same and which are likely to be loaded with the inevitable commercial 'opportunities'.

    As the new year has just started, we are hopeful that protection of personal data and control over use of your own personal data will improve significantly.

    But looking back, what happened in 2011?

    • A year of major privacy incidents that made it harder - but still normal to many- to ignore the importance of such incidents.
    • The rise of moguls that devour personal data and any other data they can 'find', who make it difficult for you to control who is (ab)using your data, and even make you want and think it is normal to share your most personal of data with the world, but mainly the moguls themselves.
    • Personal data collection devices with functions such as recording, tracking, spying, eavesdropping, ... commonly known as smartphones.
    • ...

    2012 will be the year of
    • Street View becoming even more commonplace, exposing your most private locations.
    • Spies recording your every move and thought using their personal data collection device.
    • Full commercial exploitation of our most personal data of all... our face.
    • Automatic identification and tracking through techniques such NFC, RFID, Bluetooth, GSM, Wifi, face and car registration recognition.
    • Economic crisis... if privacy does not obviously have a positive business case (despite the fact that it actually does), then it gets deferred or cancelled.
    • Basically, no place to hide or control who processes your personal data.
    • ...
    Technology is moving very fast, lawgivers are trying to keep up, priorities are economic and profit rules.

    Well, I'm sure privacy will be top of the agenda in 2013.

    Read the Full Story

    Posted by: Lee & White

    Category:

    Tags Data Breach Private Persons Personal Data Spam Government Organisations Internet IT

  • Protecting Them is protecting You

    Wednesday, June 15, 2011

    Despite many obvious reasons for ensuring both technical and organisational security measures within a company, many companies (don't be surprised) are yet to implement these.

    Unrestricted access to server rooms (for purposes which will set you on the floor laughing, but sadly true), sharing of passwords between colleagues, unlocked cabinets, messy desks with confidential information displayed for all eyes, non-secure company websites collecting personal data, and so on. If you're nodding to all these as you read, then you've got a company who is in breach of the Data Protection Law.

    Now, last week on the news, Sony Pictures was humiliated when hacking group LulzSec claimed it had accessed unencrypted personal data of SonyPictures.com and Sony BMG's Websites in Belgium and the Netherlands. According to the group, getting the information was not that complex - gaining access to SonyPictures.com with a single SQL injection.

    "What's worse is that every bit of data we took wasn't encrypted. Sony stored over 1,000,000 passwords of its customers in plaintext, which means it's just a matter of taking it," they claimed. "This is disgraceful and insecure: they were asking for it."

    According to Beth Givens, director of Privacy Rights Clearinghouse, the attacks on Sony would seem to indicate lax practices on Sony's part. "These repeated Sony attacks are an object lesson for all companies," she said. "Sony has reported that it uses industry standards for security. If that's true, then perhaps it is time to re-evaluate and even go beyond such standards." (Read more: cnetNews)

    It is clearly another lesson to be learnt. But, are companies learning or ignoring this important legal and moral duty to its customers? How many companies will take the appropriate security measures now, or will it depend on the budget and short term profit?

    Read the Full Story

    Posted by: Lee & White

    Category:

    Tags Best Practices Data Breach Personal Data Organisations IT

  • The Grand Data Heist - Millions Affected

    Monday, April 4, 2011

    Epsilon, the largest global online marketing company that manages communications for a number of the biggest international firms in the world, announced that it has suffered a breach in their e-mail system on March 30th, resulting in the theft of millions of customer data. It is said to be the largest data theft in history.

    "On March 30th, an incident was detected where a subset of Epsilon clients' customer data were exposed by an unauthorized entry into Epsilon's email system," Epsilon said.

    Epsilon sends out an estimated 40 billion permission based emails yearly on behalf of their 2,500 clients and brands which include some prominent names such as Citi, JPMorgan Chase, Capital One, Mariott Rewards, TiVO, Walgreens, McKinsey, and Kroger. It was initially believed that the breach had only affected customers of Kroger but it is likely that more companies are affected as more companies confirm that they have their data stolen as well. Clients of Epsilon have already begun to take steps to protect their customers by warning them of potential fraudulent emails.

    "The information that was obtained was limited to email addresses and/or customer names only," claims Epsilon, and though this may be true, it is all the information needed for a hacker to gain more sensitive information by sending out phishing emails to subcsribed customers. Scams such as this have high success rates as they prey on gullible and uninformed users.

    How does it work? Simple.

    Take this scenario as an example. SJ, a customer of company XYZ subscribes to receive email notifications of their promotions. She receives an email with the latest products available, and clicks on a link assuming it would take her to the information page for a product she is interested in. What she is unaware of is this - it is a fraudulent email and clicking on that email takes her to a hoax page where she is prompted to enter her personal information. As she is oblivious to this deception, she submits her details, falling into the scammer's trap.

    There are other simpler ways too. Such emails could be embedded with a virus that affects a user's computer by simply opening the email.

    It is highly important that you are cautious and wary of whom, and to where you give your personal information; how your personal information is handled; and what security is in place to protect your information. A reputable company, and one that values its customers' privacy will inform on their data processing practices. It is their legal duty. You will find this in their Privacy Statement - if they do not have one, be wary. You are, by law, empowered to query such companies, and their third parties on the type and purpose of information kept about you. You have the right to access your information, and to request that this information be deleted where necessary.

    Read the Full Story

    Posted by: Lee & White

    Category:

    Tags Data Breach Personal Data Organisations

  • Protecting People's Data

    Friday, August 29, 2008

    Confidential Data TheftOne of the duties of being a data controller is to adequately protect the personal data entrusted to you by your data subjects. The law remains pretty vague and does not specify how much 'adequately' is.

    Amongst others it means that you need to implement adequate technical means to protect the data, and put the necessary security measures in place.

    Another point tells you to limit who has access to that data, ensuring that data is accessed only on a need-to-know basis. For example, the receptionist needs to know the name and company of customers who will visit the company today, but does not need to have access to their credit card data. The IT technician needs to know names and user access rights to perform his duties, but not confidential financial data.

    Speaking of which, most companies' IT departments are a serious risk to security. Developers need to be able to develop their software and to do so, need access to code and data. Often this means that they have not only access to test data on test servers but also to real data on production servers.

    They implement easy to remember user accounts - so called super users - which give them access to every part of the applications and databases, even the most confidential. These are rarely changed and are accessible to the complete development team, not to a specific developer. This also means that when a developer or IT consultant leaves the company, the password is not changed, and possibly the developer would still have access to sensitive personal data entrusted to the company.

    According to Cyber-Ark, 9 out of 10 disgruntled IT staff would steal confidential or proprietary data from their former employer. The article on Contractor UK further states that one third of leavers would take lists with 'super user' passwords, giving them access to all kinds of sensitive company and personal data. Only 12% would be honest and leave empty handed, leaving all company confidential data behind.

    Companies are required to ensure that the personal data entrusted to them is adequately protected, so this is certainly an issue they need to address. Do take note that implementing high security measures to secure personal and sensitive data is not sufficient as grudging staff will find a way to bypass these security measures.

    Read the Full Story

    Posted by: Lee & White

    Category:

    Tags Data Breach Personal Data Organisations IT

  • What's the big deal anyway?

    Thursday, May 1, 2008

    "What's the big deal anyway?". A remark we hear very often when discussing personal data issues."Nothing to be concerned about, who would be interested in my personal data, and what can they do with it anyway?"

    Everyone agrees that a credit card number or bank account number is not something you should share (even Jeremy Clarkson eventually). But what can people do with my name and address, social security number or date of birth?

    Personal data can be used for identity theft - impersonating someone by using as much as you know about that person to get financial or other benefit in that person's name. For example you could go to a bank and request - and receive - a new credit card in the name of the person you are impersonating, with the bills of course being sent to the original person.

    How do criminals get their hands on your data? Everybody knows about skimming - a technique where a debit or credit card gets copied by attaching a small device onto an ATM machine. Another well known technique is to steal files from people's computers, by hacking them or by installing viruses or Trojan horses. And of course there is social hacking, asking seemingly harmless questions to a person online or in person, and using that information to build a complete profile.

    And criminals move with the times. A BBC team exposed, in a proof of concept, how easy it is to socially hack Facebook and harvest information on other users, including names, passwords and other information.

    How do criminals use this data? It seems that data thieves set up data supermarkets to sell stolen personal data to whomever might be interested. Yes, you can get a working credit card number for a few euro, or even buy complete corporate log files (containing names and passwords, server locations, numbers and confidential information) for as little as 200 euro. When closed down, they just reopen on another location.

    Stuff to think about. Perhaps you will consider this the next time before revealing some of your personal data to anyone.

    Read the Full Story

    Posted by: Lee & White

    Category:

    Tags Data Breach Private Persons Personal Data Organisations Internet IT

Archive

  • 2014
    • March 2014
  • 2013
    • October 2013
    • July 2013
    • May 2013
  • 2012
    • March 2012
    • February 2012
    • January 2012
  • 2011
    • December 2011
    • July 2011
    • June 2011
    • May 2011
    • April 2011
    • February 2011
  • 2010
    • December 2010
    • September 2010
    • June 2010
    • May 2010
    • April 2010
    • February 2010
  • 2009
    • October 2009
    • August 2009
    • June 2009
    • April 2009
  • 2008
    • November 2008
    • October 2008
    • August 2008
    • July 2008
    • June 2008
    • May 2008
    • April 2008
    • March 2008
    • February 2008
    • January 2008
  • 2007
    • December 2007
    • November 2007



Tags

  • Best Practices (11)
  • Business Incentive (1)
  • Data Breach (8)
  • Data Handling Manual (5)
  • Data Protection Officer (1)
  • EU (4)
  • FSA (1)
  • Government (13)
  • Human Rights (6)
  • Internet (21)
  • IT (21)
  • Organisations (40)
  • Personal Data (48)
  • Private Persons (30)
  • Spam (4)

 

Copyright © 2003-2025 Lee & White®. All rights reserved.

Legal Notice  -  Privacy Policy  -  Contact