DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

French watchdog fines Bouygues 250,000 euros for data security breach

Posted on December 27, 2018 by Dissent

Reuters reports that the CNIL has fined the Parisian telecom, but they don’t provide any real details as to what happened. But here’s a translation, via Google, of the CNIL’s press release:

In March 2018, the CNIL received a report informing it of the existence of a security incident which led to making freely accessible the personal data of customers of the B & You brand, held by BOUYGUES TELECOM. In the following days, the latter notified the data breach to the CNIL.

A check was made in the premises of the operator. This check confirmed the existence of a vulnerability allowing access to contracts and invoices of B & You customers by simply modifying a URL address on the BOUYGUES TELECOM website. This security flaw has impacted the data of more than two million B & You customers for more than two years. 

After being informed, the operator quickly corrected the vulnerability and the personal data of the customers were no longer freely accessible.
The restricted training of the CNIL imposed a financial penalty of 250 000 euros, considering that the company had breached its obligation to ensure the security of the personal data of users of its site, in accordance with Article 34 of the the law Informatique et Libertés .


Restricted training found that the security defect originated in the failure to reactivate on the site, after a test phase, the authentication function in the customer area which had been deactivated for the sole purpose of these tests . However, it considered that it was up to the company to be particularly vigilant as to the effectiveness of its authentication mechanism, given its choice not to put in place additional security measures.


The restricted training took into account the high reactivity of the operator in the resolution of the security incident as well as the numerous measures put in place by the company to limit its consequences.


The sanction imposed by the restricted training concerns facts that took place entirely before the entry into force of the European regulation on the protection of personal data.


Related:

  • BREAKING: Dos-Op exposes the Nova RaaS gang
  • 'Trickery and f...ery': Agency under fire over senior manager's 'serious' privacy breach
  • Software companies must be held liable for British economic security, say MPs
  • Russia arrests young cybersecurity entrepreneur on treason charges
  • UK privacy regulator has seen ‘collapse in enforcement activity,’ rights coalition says
  • SEC Voluntarily Dismisses SolarWinds Litigation
Category: Business SectorCommentaries and AnalysesNon-U.S.Of Note

Post navigation

← Four months after disclosing breach, Adams County, Wisconsin notifies HHS
BevMo notifying thousands of customers after malware compromise of ecommerce site →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ex-teen hackers warn parents are clueless as children steal ‘millions’
  • UK Government Considers Computer Misuse Act Revision
  • Japan issues arrest warrant against teen suspected of cyberattack using AI
  • How old is the average hacker? What does a new research report suggest? (1)
  • Marquis data breach impacts over 74 US banks, credit unions
  • Virginia Twins Arrested for Conspiring to Destroy Government Databases
  • Cyberattack on Puerto Rico IT vendor Truenorth hits 3 agencies
  • Easy Question, Complicated Answer: What Does It Take to Stop Workers From Snooping?
  • Update on Dos-OP’s report on Nova RaaS
  • KR: Privacy Commissioner’s Office Urges the Public to Beware of Fraudsters Exploiting the Tai Po Fire Disaster

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • PRIVACY—S.D. Cal.: Employee did not waive privacy right in personal email data on company provided laptop, (Dec 5, 2025)
  • EU justice chief draws red line on privacy reforms
  • Kaiser Permanente to Pay Up to $47.5M in Web Tracker Lawsuit
  • How Palantir shifted course to play key role in ICE deportations
  • U.S. Judge Blocks Trump From Cutting Medicaid Funding For Planned Parenthood In 22 States

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: Dissent.73
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.