DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Is your firm violating the Data Protection Act or begging for a hack of its Twitter account? (updated)

Posted on August 20, 2014 by Dissent

ThreeUK, who claim to have a 45% share of all mobile traffic in the UK, has a social media presence on Facebook and Twitter. They also have a dangerous practice of requesting customers provide personal details such as full name, phone number, postcode, and date of birth via direct messages (DM) to their support team, e.g., this tweet to a customer:

@ThreeUK Is it taken directly from your bank account? Can you DM over the name, number, DOB, postcode for the account so I can check this. B

— ThreeUKSupport (@ThreeUKSupport) August 19, 2014

Yesterday, Quentyn Taylor tried to educate them that this practice was risky and might even violate Principle 7 of the UK’s Data Protection Act. Principle 7 states:

Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.

The UK’s Information Commissioner’s Office explains what that means in a guidance on their site.  Given how often we have seen corporate Twitter accounts hacked, can ThreeUK or any other corporate Twitter account really provide adequate security for personal information provided by DMs?  Or as Quentyn notes, is ThreeUK inviting problems with its practice: 

If you request your customers send you pii / passwords via twitter DM you had better hope your acct doesn’t get hacked… #databreach — Quentyn Taylor (@quentynblog) August 19, 2014

and:

In fact I would be surprised if #badguys aren’t looking for corp twitter accts that have requested pii from customers as takeover targets. — Quentyn Taylor (@quentynblog) August 19, 2014

I wouldn’t be surprised, either.

When neither @ThreeUK nor @ThreeUKSupport responded to Quentyn’s tweets, I tweeted:

@ThreeUKSupport I report on breaches. Please let me know when you’re hacked so I can report on stupidity of requesting #PII by DM. @ICOnews

— Dissent Doe (@PogoWasRight) August 19, 2014

So far, though, nothing’s changed, as this tweet to a customer from this morning illustrates:

@AndrewAyr …However if you DM your name, number, DOB and postcode – we can change this for you. >AM — ThreeUKSupport (@ThreeUKSupport) August 20, 2014

Obviously, I’m no expert on the UK’s Data Protection Act, but I do hope the ICO offers some comments on this issue – and that American corporations with Twitter social media teams also think long and hard about the risks here.

Thanks to Quentyn for making me aware of this matter.

UPDATE:  @ThreeUKSupport did answer Quentyn later today:

@quentynblog Hi Quentyn – We’ve been assured this is acceptable by our DPA team. Please let us know if you’ve any more questions. >RW

— ThreeUKSupport (@ThreeUKSupport) August 20, 2014

I wonder if the DPA team consulted with the ICO. In any event, even if it is legal (and I’m still not sure it is),  it’s a risky behavior that I would recommend avoiding.


Related:

  • Paying cyberattackers is wrong, right? Should Taos County's incident be an exception?
  • Legal Silence and Chilling Effects: Injunctions Against the Press in Cybersecurity
  • North Country Healthcare responds to Stormous's claims of a breach
  • Gladney Adoption Center had serious data exposures in the past few months. What will they do to prevent more?
  • 70% of healthcare cyberattacks result in delayed patient care, report finds
  • Hackers Can Remotely Trigger the Brakes on American Trains and the Problem Has Been Ignored for Years
Category: Commentaries and Analyses

Post navigation

← FTC Settlement Requires Fandango and Credit Karma to Establish Comprehensive Security Programs to Protect Consumers’ Sensitive Personal Information
Patient's Snooping Claim Amounts to Defamation →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher
  • Two Data Breaches in Three Years: McKenzie Health
  • Scattered Spider is running a VMware ESXi hacking spree
  • BreachForums — the one that went offline in April — reappears with a new founder/owner
  • Fans React After NASCAR Confirms Ransomware Breach
  • Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack (1)
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • White House ordered to restore Medicaid funding to Planned Parenthood clinics
  • California Attorney General Announces $1.55M CCPA Settlement with Healthline.com
  • Canada’s Bill C-2 Opens the Floodgates to U.S. Surveillance
  • Wiretap Suits Pit Old Privacy Laws Against New AI Technology
  • Action against tiny Scottish charity sparks huge ICO row
  • Congress tries to outlaw AI that jacks up prices based on what it knows about you
  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.