The Personal Data Protection Authority (#KVKK) fined social media platform X (formerly #Twitter) 1 million 470 thousand liras for data security breaches. According to Anadolu Agency, KVKK initiated an ex officio investigation following X's statement that ‘contact information collected for security purposes was mistakenly used for #advertising purposes’ and related news. Considering the high number of users in Turkey and the risk of third parties obtaining the information, KVKK has determined that the use of personal data requested for security in advertising activities is contrary to the principles of ‘compliance with the law and good faith’ and ‘being connected, limited and proportionate to the purpose for which they are processed’ in the law, which is contrary to the Personal Data Protection Law No. 6698. #DataSecurity #PersonalData #AdvertisingSecurity #X You can reach the details from the link below: https://lnkd.in/dQNe2ZGR
Köksal & Partners Attorney Partnership’s Post
More Relevant Posts
-
📣 The Turkish Personal Data Protection Authority has imposed administrative fines on the social media platforms X and Twitch as part of its ex officio investigations. Although the decisions have not yet been published by the Authority, according to reports by Anadolu Agency, the reasons for the fines are as follows: 📍 Following an investigation into alleged data breaches on Twitch: 🔎 It was found that the data controller failed to exercise due care when implementing the necessary configurations to eliminate system issues, 🔎 Security measures that should have been taken before the breach were implemented only after the incident, 🔎 The data controller was inadequate in identifying risks and threats, 🔎 The breach affected 35,274 individuals residing in Türkiye. In this context, the Authority imposed an administrative fine of 1,750,000 TRY for violations of data security provisions under the Personal Data Protection Law and an additional fine of 250,000 TRY for failing to notify the Authority of the data breach. 📍 Following an investigation into X (formerly Twitter) based on the platform’s statement published on its website, which disclosed that “email addresses or phone numbers provided by users for security and safety purposes were mistakenly used for advertising purposes”: 🔎 It was determined that the platform has a high number of users in Türkiye, and the data may have been accessed by third parties, 🔎 The processing of personal data collected for security purposes for advertising activities violated the principles of "lawfulness and fairness" and "being relevant, limited, and proportionate to the purposes for which they are processed." In this context, an administrative fine of 1,470,000 TRY was imposed for unlawful data processing and violations of data security provisions under the Personal Data Protection Law. Sources 👇 https://lnkd.in/dUTgJ-E8 https://lnkd.in/g4rPJ7x3 #X #Twitter #Twitch #DataProtection #DataSecurity
To view or add a comment, sign in
-
Fake accounts are a huge problem on all of the social media sites. It's astonishing that most are fairly easy to spot, if you're vigilant, but they seem really hard to get rid of. Just reporting them doesn't seem to do the trick. I'm curious if my IT Security contacts can offer any insight into why the major social networks struggle so much with managing this issue. #bots #fakeaccounts #ITSecurity https://lnkd.in/e-AR46-2
To view or add a comment, sign in
-
#CybersecurityAwareness #CybersecurityAwarenessMonth Day 17 Spam is unwanted, unsolicited digital communication that gets sent out in bulk. Spam is often associated with email, but can also be sent through text messages, social media or phone calls. Spam is usually associated with mass marketing campaigns selling goods and services, but can also be a scam, some type of fraud or sometimes malicious. Anti-spam laws exists in many countries around the world to combat spam. When sending emails, make sure you follow the respect laws in your country. These can include: whether you have consent or implied consent, whether the receiver can opt out of communications, and more.
To view or add a comment, sign in
-
Understanding how social media hackers operate and learning how to protect your accounts is critical in today’s digital age.
Social Media Hackers: How They Operate and How to Protect Yourself
davinciforensics.co.za
To view or add a comment, sign in
-
🌞Telegram to Share User Data with Authorities for Criminal Investigations🌞 Telegram has announced that it will begin sharing users’ IP addresses and phone numbers with authorities in response to valid legal requests as part of efforts to combat criminal activity. Previously, the platform only disclosed data for cases involving terror suspects. The policy change is a significant shift for Telegram, which has long resisted such cooperation, and includes updates to its privacy policy, search features, and reporting mechanisms to address illegal content on the platform. You can read more here https://lnkd.in/ecMhr8tt
Telegram Agrees to Share User Data With Authorities for Criminal Investigations
thehackernews.com
To view or add a comment, sign in
-
Have you ever been inundated with unsolicited political party SMS messages and wondered how they obtained your phone number? I recently had this experience. Although it's simple to point the finger at the mobile service provider, third-party vendors and data brokers who gather and distribute personal data without authorization are frequently the true offenders. In my latest article, I delve into: ⭕ The sources of your data and how it might be getting shared ⭕ Legal and regulatory context surrounding data protection ⭕ Practical steps you can take to stop these unwanted messages ⭕ How to protect your personal information going forward Check out the full article https://lnkd.in/gZPw6dFc and take control of your inbox! 💬 #DataPrivacy #SMSspam #NetworkSecurity #Mobile
Protecting Your Data Privacy: Dealing with Unwanted SMS on Your Mobile Connection
link.medium.com
To view or add a comment, sign in
-
Do you know that your personal information can be used against you? Let's discuss Data privacy and ethics across industries The best part 🌟 You could be one of the 4 lucky winners to win a raffle draw at the end of the space How to participate: 1. Join our Twitter Space 2. Stay until the end 3. Enter the raffle for a chance to WIN: 🎁 Free VPN access (1 winner) 🎁 5GB Data (3 winners) 🎁 Free Data Privacy Manual for everyone Mark your calendars bit.ly/DataXspace Invite your colleagues Invite your friends This is one conversation you don’t want to miss!
To view or add a comment, sign in
-
As our online activities increase, so does the challenge of maintaining privacy. Every click, search, and interaction leaves a digital footprint that can be tracked, stored, and potentially misused. Here are some key points to consider regarding online privacy and data protection: 1. Use Strong, Unique Passwords. 2. Be Cautious with Personal Information. 3. Avoid sharing sensitive information unless absolutely necessary. 4. Limit the amount of personal data you share on social media. 5. Use Privacy-Focused Tools. #BeOnline #DigitalRightsTz #KeepItOn
To view or add a comment, sign in
-
What is your business’ written policy, specifically your: Social Media Policy? Does your business have a written document detailing: • what are the acceptable uses of Social Media; • what are the approved Social Media platforms; • who is authorized to post on Social Media on behalf of the business; • what are the guidelines on acceptable, and un-acceptable, content? It is essential that every individual understand their personal responsibility when using Social Media! Un-acceptable messages posted on Social Media result in job losses way too often! A Written Data Security Plan is one of the 19 Essential Elements in True Small Business Data Security™ that Data Security & Privacy Laws require your business to have to be in compliance, by law. This month we are sharing with you the importance of Data Security Policies for your business. Feel free to Follow us and Like us, and even share us with others! #protectingyoutogrow #truesmallbusinessdatasecurity #19essentialelements #writtendatasecurityplan #dataprivacypolicy #yourdatamatters
To view or add a comment, sign in
10,983 followers