Dantherm A/S โ€“ Violation Found (Denmark, 2021)

Violation Found
Datatilsynet (Denmark)13 October 2021Denmark
final
Violation Found

General GDPR enforcement action

This case relates to broader data protection obligations, not specifically to cookie or consent banner compliance. It is not included in cookie statistics or the Risk Calculator.

Dantherm A/S faced criticism from the Danish DPA after a ransomware attack exposed employee data on the dark web. The company failed to secure its systems properly, allowing attackers to access data through an unused admin account. This highlights the importance of managing admin rights and securing log files to prevent data breaches.

What happened

Employee data was exposed on the dark web after a ransomware attack on Dantherm A/S.

Who was affected

Employees of Dantherm A/S whose personal data was leaked.

What the authority found

The Danish DPA found that Dantherm A/S did not have adequate security measures in place, violating GDPR's requirements for protecting personal data.

Why this matters

This case underscores the need for companies to regularly review and update their security practices, especially concerning admin account management and log file protection. It serves as a reminder that failing to demonstrate proper security measures can lead to regulatory criticism.

GDPR Articles Cited

Art. 24(1) GDPR
Art. 32(1) GDPR
Full Legal Summary
Detailed

Personal data about a company's employees was spread on the dark web following a ransomware attack. The attackers had most likely gained access through an administrator account that was no longer in use. However, it was difficult to exactly determine the dynamic of the attack since the attackers had deleted relevant log files. The controller reported the breach to the Danish DPA. The Danish DPA found that the controller had failed to implement appropriate technical and organisational security measures in light of the risks for the rights and freedoms of natural persons per Article 32(1) GDPR. The DPA highlighted that administrator rights should only be given to employees in need of such rights. The rights should be given on a temporary basis and should be revoked when the need is no longer present. Furthermore, log files should be hidden from all accounts, including those with administrator rights. Users with administrator rights should not be able to delete or alternate the log files. The DPA also held that the controller had breached Article 24(1) GDPR by not being able to demonstrate the implementation of appropriate measures. Because the log files had been deleted, the controller could not demonstrate how the attackers had gained access or when the suspected administrator account had been active. As a consequence, the Danish DPA decided to issue criticism of the controllers processing of personal data.

Outcome

Violation Found

The DPA found a violation but did not impose a fine.

Related Enforcement Actions (0)

No other enforcement actions found for Dantherm A/S in DK

This is the only recorded action for this entity in this jurisdiction.

Details

Decision Date

13 October 2021

Authority

Datatilsynet (Denmark)

GDPRhub ID

gdprhub-4244

About this data

Data: GDPRhub (noyb.eu)
Licensed under CC BY-NC-SA 4.0
AI-verified and classified

Cite as: Cookie Fines. Dantherm A/S - Denmark (2021). Retrieved from cookiefines.eu

Report Inaccuracy

Last updated: