Silkeborg Municipality – Complaint Upheld (Denmark, 2021)
General GDPR enforcement action
This case relates to broader data protection obligations, not specifically to cookie or consent banner compliance. It is not included in cookie statistics or the Risk Calculator.
A Danish municipality sent sensitive information about nearly 13,000 schoolchildren to a consulting agency without proper encryption. The Danish DPA found that the security measures were not enough to protect the data, emphasizing the need for stronger encryption.
What happened
The municipality sent a list containing sensitive data of 12,916 children to a consulting agency without adequate encryption.
Who was affected
Schoolchildren whose personal information, including national identity numbers, was shared without proper security.
What the authority found
The Danish DPA concluded that the municipality did not use sufficient security measures, such as end-to-end encryption, to protect the sensitive data.
Why this matters
This decision highlights the importance of using strong encryption when handling sensitive data, especially in public sector communications. It serves as a warning to organizations to review and upgrade their data security practices.
GDPR Articles Cited
Due to a human error, a Danish municipality had sent a list of information regarding 12 916 children in public school to a consulting agency without properly encrypting the content. The information included the children's national identity numbers, school names and school codes. When the error was discovered, the municipality notified the Danish DPA of the incident. The municipality reported that the content of the email had possibly been encrypted on the transportation layer using TLS 1.1, however end-to-end encryption had not been implemented. The Danish DPA did not have enough evidence to conclude that TLS 1.1 had been used on the transportation layer when this specific email was sent. Moreover, the DPA held that encryption on the transportation layer is insufficient if the email contains personal data of a sensitive nature or personal data that deserve a high level of protection. In such instances, end-to-end encryption is a more adequate security measure. Furthermore, the DPA highlighted the fact that TLS 1.1 suffers from well known security issues, and that the protocol is therefore not suitable for encryption on the transportation layer. The DPA therefore concluded that the controller had not fulfilled its obligation to implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk under Article 32(1) GDPR.
Outcome
Complaint Upheld
A data subject complaint that was upheld by the DPA.
Related Enforcement Actions (0)
No other enforcement actions found for Silkeborg Municipality in DK
This is the only recorded action for this entity in this jurisdiction.
Details
About this data
Cite as: Cookie Fines. Silkeborg Municipality - Denmark (2021). Retrieved from cookiefines.eu
Last updated: