Dantherm A/S โ Violation Found (Denmark, 2021)
General GDPR enforcement action
This case relates to broader data protection obligations, not specifically to cookie or consent banner compliance. It is not included in cookie statistics or the Risk Calculator.
Dantherm A/S faced criticism from the Danish DPA after a ransomware attack exposed employee data on the dark web. The company failed to secure its systems properly, allowing attackers to access data through an unused admin account. This highlights the importance of managing admin rights and securing log files to prevent data breaches.
What happened
Employee data was exposed on the dark web after a ransomware attack on Dantherm A/S.
Who was affected
Employees of Dantherm A/S whose personal data was leaked.
What the authority found
The Danish DPA found that Dantherm A/S did not have adequate security measures in place, violating GDPR's requirements for protecting personal data.
Why this matters
This case underscores the need for companies to regularly review and update their security practices, especially concerning admin account management and log file protection. It serves as a reminder that failing to demonstrate proper security measures can lead to regulatory criticism.
GDPR Articles Cited
Personal data about a company's employees was spread on the dark web following a ransomware attack. The attackers had most likely gained access through an administrator account that was no longer in use. However, it was difficult to exactly determine the dynamic of the attack since the attackers had deleted relevant log files. The controller reported the breach to the Danish DPA. The Danish DPA found that the controller had failed to implement appropriate technical and organisational security measures in light of the risks for the rights and freedoms of natural persons per Article 32(1) GDPR. The DPA highlighted that administrator rights should only be given to employees in need of such rights. The rights should be given on a temporary basis and should be revoked when the need is no longer present. Furthermore, log files should be hidden from all accounts, including those with administrator rights. Users with administrator rights should not be able to delete or alternate the log files. The DPA also held that the controller had breached Article 24(1) GDPR by not being able to demonstrate the implementation of appropriate measures. Because the log files had been deleted, the controller could not demonstrate how the attackers had gained access or when the suspected administrator account had been active. As a consequence, the Danish DPA decided to issue criticism of the controllers processing of personal data.
Outcome
Violation Found
The DPA found a violation but did not impose a fine.
Related Enforcement Actions (0)
No other enforcement actions found for Dantherm A/S in DK
This is the only recorded action for this entity in this jurisdiction.
Details
About this data
Cite as: Cookie Fines. Dantherm A/S - Denmark (2021). Retrieved from cookiefines.eu
Last updated: