Salling Group – Violation Found (Denmark, 2022)
General GDPR enforcement action
This case relates to broader data protection obligations, not specifically to cookie or consent banner compliance. It is not included in cookie statistics or the Risk Calculator.
Norway's data protection authority found that Salling Group stored customer passwords in plain text, risking unauthorized access. This matters because it highlights the need for businesses to securely encrypt sensitive customer data to prevent breaches.
What happened
Salling Group stored customer usernames and passwords in plain text in a log file, which could be accessed by 146 employees.
Who was affected
The affected individuals were customers of Salling Group's websites, including Føtex, Bilka, Netto, Salling, and Carl Junior.
What the authority found
The DPA found that storing passwords in plain text violated GDPR's security requirements, specifically Article 32(1), and ordered Salling Group to notify affected customers.
Why this matters
This case underscores the importance of encrypting passwords to protect customer data and prevent unauthorized access. Businesses should ensure they meet high security standards to avoid similar violations.
GDPR Articles Cited
Salling Group (the controller) is Denmark's largest retail group which serves 11 million customers per week. In 2021, they implemented a system allowing customers to shop on its websites (namely Føtex, Bilka, Netto, Salling and Carl Junior) using the same username and password (Salling Group profile). The controller also established a monitoring tool to record incidents and events about customers' access to the websites. However, in May 2022, the controller found that the monitoring system's log file stored customers' usernames and unencrypted passwords for the website "hjem.foetex.dk" by mistake. As a result, 146 people employed by the controller had technical access to the data. If an unauthorised person used the login credentials, they could access the customer's name, address, email address, telephone number, masked card information and purchase history. The controller reported the breach to the DPA. The DPA held that in systems with confidential information about a large number of users, higher requirements must be placed on the controller to prevent unauthorised access to the data. In particular, the controller must store passwords in irreversible encrypted form at all times and in a way that ensures that they are not immediately readable and that it is not possible to recreate the password in a readable format. The DPA also emphasised that storing passwords in plain text poses a high risk to data subjects because they can be misused internally and because shopping platforms are known to be a common target of cyberattacks. Therefore, storing passwords in a readable format in a log file violates Article 32(1) GDPR. Consequently, the DPA reprimanded the Salling Group for the violation and ordered it to notify affected data subjects about the breach by 1 August 2022.
Outcome
Violation Found
The DPA found a violation but did not impose a fine.
Related Enforcement Actions (0)
No other enforcement actions found for Salling Group in DK
This is the only recorded action for this entity in this jurisdiction.
Details
About this data
Cite as: Cookie Fines. Salling Group - Denmark (2022). Retrieved from cookiefines.eu
Last updated: