#Privacy: One of India’s largest social security programme exposes millions of personal details

An unprotected database has led to the exposure of individual identification numbers of millions of families from India.  In a blog post, security researcher Bob Diachenko explained that the misconfigured Elasticsearch server contained the private information of families registered under Mukhya Mantri Parivar Samridhi Yojana (MMPSY), one of India’s largest social security program. Exposed data […]

Data overload

James Ashton, online affiliate expert and head of content at FindMyUKCasino.com, asks if the data gathered and held by online organisations is excessive.  Data is one of the most valuable commodities in the world and this is certainly the case for online gambling operators. These organisations gather, analyse, act upon and store huge volumes of […]

#Privacy: Finnish DPA imposes GDPR fines on three companies

Finland’s Office of the Data Protection Ombudsman has disclosed that it has imposed administrative fines on three companies for data protection violations.  The first company, Posti Oy, the leading postal service operator in Finland was fined EUR 100,000 following an investigation into customers receiving communications and direct marketing from multiple companies despite making change-of-address notifications […]

A tale of two countries: how India and Argentina are dealing with privacy during the Covid-19 crisis.

In India, says Tripti Dhar, Partner, Reina Legal, “India does not have a specific data protection legislation.” In Argentina, it is about as different from that as you can imagine. As Mariano Peruzzotti, Senior Associate, Marval O’​ Farrell & Mairal  said: “We have a very strict data protection law in Argentina, covering a lot of […]

The Crucial Security Gap Within Software Applications

A key aspect of modern software inhibits traditional data protection efforts In many organisations, it is all too easy for the technical implementation of data protection to fall through the cracks. In concept, many different functional areas have a vested interest in this: compliance officers, cybersecurity teams, the CTO’s organization, business units, and more. In […]