Bankernes EDB Central (BEC) – Violation Found (Denmark, 2020)

Violation Found
Datatilsynet (Denmark)26 February 2020Denmark
final
Violation Found

General GDPR enforcement action

This case relates to broader data protection obligations, not specifically to cookie or consent banner compliance. It is not included in cookie statistics or the Risk Calculator.

A Danish company, BEC, was found to have exposed personal addresses during bank payment transfers due to a system error. This matters because it shows the importance of having strong security measures to protect personal data. Companies should ensure their systems are updated and secure to prevent unauthorized data exposure.

What happened

BEC's system error led to the unauthorized disclosure of personal addresses during bank payment transfers.

Who was affected

Over 20,000 bank customers whose personal addresses were accidentally disclosed during payment transfers.

What the authority found

The Danish DPA determined that BEC did not implement adequate security measures to prevent unauthorized disclosure of personal data.

Why this matters

This case underscores the critical need for robust security measures in handling personal data, especially in financial transactions. It serves as a reminder for companies to regularly update their systems to prevent data breaches and protect customer information.

GDPR Articles Cited

Art. 5(1)(f) GDPR
Art. 32(1) GDPR
Full Legal Summary
Detailed

The Danish Data Protection Authority has received a number of reported data breaches from more than twenty Danish banks in accordance with Article 33 GDPR. The reported data breaches concern the accidental disclosure of personal addresses in connection with automated payment transfers between banks. Automated payment transfers between the 25. May 2018 and the 22. August 2019 were affected. It is estimated that more than 20,000 customers have been affected by the error. The Danish company Bankernes EDB Central (BEC) supplies software to banks and financial institutions. Payment transfers from BEC are usually accompanied by address information so the payee can identify the payer. BEC has access to personal addresses in the Danish Central Person Register (CPR). The CPR contains the possibility to protect personal addresses from disclosure. An error in the system operated by BEC led to the disclosure of personal addresses, regardless of a requested non-disclosure of addresses in the CPR. The question for the Danish DPA to decide was whether the BEC as the data processor implemented appropriate technical and organisational measures to ensure a level of security appropriate to the risk pursuant to Article 32 GDPR. The Danish DPA decided that BEC did not implement appropriate technical and organisational measures to protect personal data from unauthorized disclosure. Subject to the critics is the fact that BEC initially used an older IT solution without the implementation of address protection. After the shift to a new system, errors occurred in connection with the marking of the protection of the addresses resulting in an unauthorized disclosure. The Danish DPA emphasized that BEC has in response to the discovery of the unauthorized disclosures quickly and effectively made some changes to the patches in the IT-system which ended the breach. Further, adequate deletion measures have been taken.

Outcome

Violation Found

The DPA found a violation but did not impose a fine.

Related Enforcement Actions (0)

No other enforcement actions found for Bankernes EDB Central (BEC) in DK

This is the only recorded action for this entity in this jurisdiction.

Details

Decision Date

26 February 2020

Authority

Datatilsynet (Denmark)

GDPRhub ID

gdprhub-2172

About this data

Data: GDPRhub (noyb.eu)
Licensed under CC BY-NC-SA 4.0
AI-verified and classified

Cite as: Cookie Fines. Bankernes EDB Central (BEC) - Denmark (2020). Retrieved from cookiefines.eu

Report Inaccuracy

Last updated: