Gyldendal A/S – Violation Found (Denmark, 2023)

Violation Found
Datatilsynet (Norway)13 April 2023Denmark
final
Violation Found

General GDPR enforcement action

This case relates to broader data protection obligations, not specifically to cookie or consent banner compliance. It is not included in cookie statistics or the Risk Calculator.

Norway's Datatilsynet found that Gyldendal A/S had a security flaw in their test service for schools, allowing unauthorized access to student data. This happened because the URLs for accessing tests were too short and easy to guess. The decision highlights the importance of strong security measures to protect personal data.

What happened

Gyldendal A/S used short URLs for student tests, leading to unauthorized access to personal data.

Who was affected

Students whose test results, names, and emails were accessed by unauthorized teachers.

What the authority found

The authority found that Gyldendal A/S did not ensure adequate security measures, violating GDPR's requirement for data protection.

Why this matters

This case emphasizes the need for companies to implement robust security measures, especially when handling sensitive personal data. It serves as a reminder that technical limitations should not compromise data protection.

GDPR Articles Cited

Art. 32(1) GDPR
Full Legal Summary
Detailed

The Danish publishing house Gyldendal A/S (the processor) offered a service to secondary education institutions. The service was used by teachers to create tests to screen students for their academic skill strengths and weaknesses. The tests were accessed with URLs and completed in a browser. The URLs providing access to the tests consisted of 8 characters in total of which 2 characters were randomised. In practice, this meant that a student – knowingly or unknowingly (e.g. as a result of mistyping the URL) – could complete a test set up by a teacher from another school. In this case, the teacher from another school would gain unauthorised access to the student's personal data (name, email and test results). The shortened URLs (with 8 characters) were specifically requested by the secondary education institutions (the controllers) whose IT systems did not allow longer URLs. It was assumed by the DPA, that teachers from other schools have indeed gained unauthorised access to students' test results, including the students' names and e-mails. As a result, the DPA found that a data breach pursuant to Article 4(12) GDPR had occured. It follows from Article 32(1) GDPR, that the processor must take appropriate technical and organisational measures to ensure a level of security appropriate to the risks included in the processor's processing activities. The DPA emphasised that access through URLs must take place in a way that ensures the confidentiality of personal data. The DPA viewed that a service clearly aiming to process and evaluate personal data about professional ability places great demands on the processor's design of their technical solution. URL manipulation was also considered a type of error source which is common knowledge and should be easily countered. Additionally, the DPA did not consider that technical limitations in a controller's IT setup could justify inadequate protection of the data subjects' rights. The DPA held that the publishing house violate

Outcome

Violation Found

The DPA found a violation but did not impose a fine.

Details

Decision Date

13 April 2023

Authority

Datatilsynet (Norway)

GDPRhub ID

gdprhub-5939

About this data

Data: GDPRhub (noyb.eu)
Licensed under CC BY-NC-SA 4.0
AI-verified and classified

Cite as: Cookie Fines. Gyldendal A/S - Denmark (2023). Retrieved from cookiefines.eu

Report Inaccuracy

Last updated: