Salling Group – Violation Found (Denmark, 2022)

Violation Found
Datatilsynet (Norway)15 July 2022Denmark
final
Violation Found

General GDPR enforcement action

This case relates to broader data protection obligations, not specifically to cookie or consent banner compliance. It is not included in cookie statistics or the Risk Calculator.

Norway's data protection authority found that Salling Group stored customer passwords in plain text, risking unauthorized access. This matters because it highlights the need for businesses to securely encrypt sensitive customer data to prevent breaches.

What happened

Salling Group stored customer usernames and passwords in plain text in a log file, which could be accessed by 146 employees.

Who was affected

The affected individuals were customers of Salling Group's websites, including Føtex, Bilka, Netto, Salling, and Carl Junior.

What the authority found

The DPA found that storing passwords in plain text violated GDPR's security requirements, specifically Article 32(1), and ordered Salling Group to notify affected customers.

Why this matters

This case underscores the importance of encrypting passwords to protect customer data and prevent unauthorized access. Businesses should ensure they meet high security standards to avoid similar violations.

GDPR Articles Cited

Art. 32(1) GDPR
Full Legal Summary
Detailed

Salling Group (the controller) is Denmark's largest retail group which serves 11 million customers per week. In 2021, they implemented a system allowing customers to shop on its websites (namely Føtex, Bilka, Netto, Salling and Carl Junior) using the same username and password (Salling Group profile). The controller also established a monitoring tool to record incidents and events about customers' access to the websites. However, in May 2022, the controller found that the monitoring system's log file stored customers' usernames and unencrypted passwords for the website "hjem.foetex.dk" by mistake. As a result, 146 people employed by the controller had technical access to the data. If an unauthorised person used the login credentials, they could access the customer's name, address, email address, telephone number, masked card information and purchase history. The controller reported the breach to the DPA. The DPA held that in systems with confidential information about a large number of users, higher requirements must be placed on the controller to prevent unauthorised access to the data. In particular, the controller must store passwords in irreversible encrypted form at all times and in a way that ensures that they are not immediately readable and that it is not possible to recreate the password in a readable format. The DPA also emphasised that storing passwords in plain text poses a high risk to data subjects because they can be misused internally and because shopping platforms are known to be a common target of cyberattacks. Therefore, storing passwords in a readable format in a log file violates Article 32(1) GDPR. Consequently, the DPA reprimanded the Salling Group for the violation and ordered it to notify affected data subjects about the breach by 1 August 2022.

Outcome

Violation Found

The DPA found a violation but did not impose a fine.

Related Enforcement Actions (0)

No other enforcement actions found for Salling Group in DK

This is the only recorded action for this entity in this jurisdiction.

Details

Decision Date

15 July 2022

Authority

Datatilsynet (Norway)

GDPRhub ID

gdprhub-5220

About this data

Data: GDPRhub (noyb.eu)
Licensed under CC BY-NC-SA 4.0
AI-verified and classified

Cite as: Cookie Fines. Salling Group - Denmark (2022). Retrieved from cookiefines.eu

Report Inaccuracy

Last updated: