Parts of GDPR suspended in Hungary due to “state of emergency”

Parts of GDPR suspended in Hungary due to “state of emergency”

Hungary has suspended some elements of GDPR as part of its strategy for dealing with the Covid-19 pandemic. Having declared a state of emergency on 11th March, the authorities have been able to do this because they can govern by decree.

The decree suspending parts of GDPR was issued on 4th May, and also applies to Hungary’s own data protection laws.

Privacy News Online reports that specifically, authorities don’t need to provide notice about the gathering and storage of information if they are acting for the purposes of “coronavirus case prevention, recognition, exploration, as well as prevention of further spreading.”

Furthermore, citizens “no longer have the right to request access or erasure of their personal information and the government has given itself longer to respond to freedom of information requests.”

Lexology reports in greater detail that:

The government decree stipulates that data controllers’ measures under articles 15 to 22 of the GDPR as pertaining to personal data processed for the purpose of preventing, recognising and investigating the COVID-19 disease and stopping its spread are suspended until the termination of the state of emergency.

This is a concerning turn of events considering that the state of emergency has been made indefinite. Usually, a state of emergency would only last for fifteen days in Hungary and would need to be renewed by Parliament.

However, it was extended on 31st March and there is now no set end to it, allowing Hungarian Prime Minister, Viktor Orbán, to rule entirely by decree.

Suspending parts of GDPR in Hungary is therefore worrying to see. The law is relatively young and was viewed as a major step forward in protecting the rights and freedoms of EU citizens, but Hungary is already attempting to step back from it.

How Hungary’s relationship with GDPR will evolve after the pandemic has passed remains to be seen – but even then, there’s no guarantee that the declared state of emergency will come to an end.

Do you want to find out more about GDPR and your obligations under the law? Click here to contact us and discover how we can help you improve your compliance.

Covid-19 tracking app requires “greater justification”

Covid-19 tracking app requires “greater justification”

A Covid-19 tracking app might be a key part of halting the spread of the pandemic, but  there remain privacy concerns about the project.

A new legal report has stated that any centralised system for contact tracing would lead to “significantly greater interference with users’ privacy and require greater justification”, although a decentralised system – while potentially less effective – would be more proportionate and lawful.

According to The Guardian:

It is not yet known whether use of the app would be mandatory or voluntary. “A mandatory smartphone app would be a significant measure, both legally and culturally,” the lawyers said. “Our view is that there would need to be a clear and detailed legal basis for a mandatory system, set out in specific legislation.”


Sharing data held by healthcare organisations and private companies to assist in combating the Covid-19 pandemic may create “a number of legal problems… resulting in potential illegality”, the legal opinion says.


“Given the nature of the data likely to be shared, the government will need to undertake a data protection impact assessment (DPIA) prior to the processing of any personal data,” it adds. “The results of that DPIA should be made public. Those steps may be in progress, but we are not aware of them having been completed thus far.”


On plans for immunity certificates, the report adds: “Such a step would engage a number of fundamental rights under [human rights] and EU/UK legislation concerning the right to privacy and protection of personal data. Any proposals would require very substantial evidential justification to show that they are necessary and proportionate. We are unsure if such evidence could be provided.”

You can read the full article from The Guardian by clicking here.

The issue with making the Covid-19 tracking app voluntary, however, is that it may also render it ineffective. A study has found that 56% of the UK population, amounting to approximately 80% of all smartphone users, must use it if the virus is to suppressed.

This could be problematic. When a similar Covid-19 tracking app was introduced in Singapore, only 12% of the population made use of it, leading to another lockdown on 7th April after another spike in cases.

Carrying out a DPIA is a requirement for any new system, and the government should be open and honest about how it intends to store and process the data which is collected.

With the app due to be trialled this week on the Isle of Wight, it’s clear that there are still many privacy concerns surrounding it which need to be addressed. But with the Welsh chief medical officer recently stating that people would be willing to give up some of their freedoms to tackle the pandemic, it remains to be seen whether these concerns will be addressed.

Aptoide App Store Breached

Aptoide App Store Breached

The popular Android app store Aptoide has apparently been breached, with millions of users having their data stolen by a hacker.

Aptoide is a third-party app store, meaning it isn’t operated by Google or provided by a smartphone manufacturer, and claims to have over 150 million users, 7 billion downloads, and 1 million apps.

However, its popularity has now made it a target for a hacker, who has seemingly stolen the details of 39 million users and published 20 million of those online.

According to ZDNet:

The leaked information, which ZDNet obtained a copy with the help of data breach monitoring service Under the Breach, contains information on users who registered or used the Aptoide app store app between July 21, 2016, and January 28, 2018.


Data leaked today that can be classified as “personal identifable information” includes details such as the user’s email address, hashed password, real name, sign-up date, sign-up IP address, device details, and date of birth (if provided).


Other details also include technical information such as account status, sign-up tokens, developer tokens, if the account was a super admin, or referral origin.

You can read the full article at ZDNet here.

Aptoide has subsequently taken steps to improve its security systems, and in a statement on their website stated:

We are working tirelessly to understand how this happened and already have a few leads. We feel deeply ashamed and would like to apologize sincerely. The security of our users is a priority for us, and we have always tried to implement policies that make Aptoide a safe environment.


Besides continuous training, we have hired external companies to audit our infra-structure and perform penetration testing. It was not enough, though. We have failed to keep some of the user data safe.


Besides providing updated information as we have it, we will also have an internal discussion on how to better store and protect user data moving forward.

Read the statement in full here.

While you should always be careful about using third party apps, Aptoide has generally been considered one of the more secure and it’s clear that they are taking positive steps in the wake of this breach to protect users and learn from the experience.

However, this also demonstrates the importance of not reusing usernames and passwords across multiple platforms. Any users doing so whose data was stolen will now find themselves at risk if they used the same credentials elsewhere.

If you’re concerned about how your organisation should respond to a data breach of this sort, contact us today to get our expert advice.

Data Protection and Coronavirus – ICO Guidance

Data Protection and Coronavirus – ICO Guidance

The Information Commissioner’s Office (ICO) has issued guidance around data protection and coronavirus, recognising the “unprecedented challenges” we face during the pandemic.

On the whole, the ICO is taking a commonsense approach. They state that measures taken should be proportionate: “if something feels excessive from the public’s point of view, then it probably is.”

Here’s a short summary of the guidance provided by the ICO on data protection and coronavirus:

  • The ICO understands that data protection standards may not be as high during this time because resources are being diverted away from compliance work. Organisations won’t be penalised if they need to adapt their usual practices.
  • Data protection laws do not prevent people working from home, which many will do during the pandemic. The same security measures should be considered for homeworking as at the workplace.
  • Staff should be informed about cases of coronavirus at your organisation. Individuals do not need to be named, however; provide no more information than is necessary.
  • There’s no need to collect significantly more health data about your employees. While you have an obligation to protect their health, you should not collect more information than you need and can take a commonsense approach to this.
  • Rather than attempting to handle things internally, a better approach may be to ask people to consider and follow government advice – for example, calling the NHS on 111 if they have visited a badly affected country or are showing symptoms of the virus.
  • It’s fine to share employee health data with the authorities if necessary – although it’s unlikely you’ll need to do so.

You can read the full guidance from the ICO here.

This is certainly a difficult time for people and organisations, but on the matter of data protection and coronavirus, it’s important to be sensible. Don’t take unnecessary measures; make sure that your response is proportionate.

If you have any more questions about this or any other subject relating to data protection, get in touch with us today and our consultants will provide all the advice you need.

Details of 900,000 people leaked in Virgin Media data breach

Details of 900,000 people leaked in Virgin Media data breach

900,000 people have been hit by a Virgin Media data breach in which a database containing personal details was accessible over the internet for 10 months.

The database contained details including email addresses, home addresses, and phone numbers, which were being stored for marketing purposes.

Virgin Media have stated that the breach took place due to the database being “incorrectly configured” by a member of staff. There was no hacking or malicious intent behind the breach, although it was also apparently accessed “on at least one occasion” by an unknown and unidentified user.

Zoe Kleinman, Technology Reporter at BBC News, stated that:

The fact that Virgin Media’s database hasn’t been actively hacked is reassuring for customers, but while the details are light, it sounds like human error is to blame and that is rather embarrassing for a tech firm.


Ten months is a long time for all that data to have just been sitting there, waiting to be found.


And while no passwords or bank details were among it, there’s an awful lot of contact information for a cyber-criminal to work with. Phishing expeditions – when someone tries to get financial information out of a victim by pretending to be a company with a legitimate reason for contact – are not particularly sophisticated, but they are effective for those caught off-guard, and can be a lucrative source of income.


It’s unclear whether this was yet another case of unsecured data being stored on a cloud service that’s easily searchable if you know how. There have been dozens of examples of this lately, including just this week a database of the personal details of people using train station wi-fi around the UK.


Virgin Media has apologised and really, there’s very little practical advice to offer in the light of this kind of breach, beyond the usual protocol of staying alert to any messages requesting personal information or access to any kind of finance.

You can read the full article on this story from the BBC, with Kleinman’s commentary, by clicking here.

This Virgin Media data breach is the latest in a series, from various organisations, which have seen databases left unsecured online. For example, a Microsoft database containing 250 million details was left exposed in December, as we reported here.

This is a worrying trend, and shows that these databases should be configured carefully by people who know the proper procedures and are fully trained and knowledgeable about cybersecurity.

Virgin Media has taken steps to close access the database, contact the ICO, and notify those affected by the breach, with advice about how to protect themselves from potential repercussions. While these are all positive steps, there’s no doubt that significant errors have been made and this breach could easily have been avoided.

If you want advice on how to protect user data, get in contact with our GDPR consultants today for invaluable, expert advice.