Skip to content

News

Current events, updates, and developments in data protection law

140 Posts
12 Topics
Feb 23 Latest

Bucharest bets on nuclear to shore up energy security on EU’s eastern flank

When adjusted for purchasing power, Romanian consumers grapple with some of the highest electricity costs worldwide

Distribution grids at the heart of Europe’s energy resilience [Promoted Content]

Distribution System Operators (DSOs) are emerging as key resilience actors. By integrating renewables, strengthening cybersecurity, adapting to climate risks and enabling anticipatory investment, DSOs are essential to building a secure and future-proof European energy system.

Why Europe won’t confront Trump on trade – even when the courts do

A judicial rebuke in Washington altered the legal landscape, but not Europe’s political calculus, where security dependence on the US outweighs economic self-interest

Europe’s fragmented rearmament undermines its own security

Europe risks falling into a dangerous rhetoric-reality gap; it cannot claim unity while pursuing contradictory national policies

Artificial Insecurity: access and availability in the age of AI

In the third part of our blog series on the dodgy digital security practices underlying advanced AI tools, we look at how the availability of systems is impacted by the proliferation of large language models. The post Artificial Insecurity: access and availability in the age of AI appeared first on Access Now.

EFF to Wisconsin Legislature: VPN Bans Are Still a Terrible Idea

Wisconsin’s S.B. 130 / A.B. 105 is a spectacularly bad idea. It’s an age-verification bill that effectively bans VPN access to certain websites for Wisconsinites and censors lawful speech. We wrote about it last November in our blog ā€œLawmakers Want to Ban VPNs—And They Have No Idea What They're Doing,ā€ but since then, the bill has passed the State Assembly and is scheduled for a vote in the State Senate tomorrow. In light of this, EFF sent a letter to the entire Wisconsin Legislature urging

Security-Update: Europas nukleare Abschreckung – mit Claudia Major

PRƄSENTIERT VON AMAZON.

APD/GBA (Belgium) - 25/2026

}}}} The DPA issued a warning to the Federal Public Service for Finances to ensure compliance with security of personal data processing after an employee accessed the address of an individual and visited her at her home.The DPA issued a warning to the Federal Public Service for Finances after an employee unlawfully accessed the address of an individual in the controller’s database and visited her at her home. == English Summary ==== English Summary ==

Carney lobbies Starmer over defense bank

Canadian leader pitched British counterpart on nascent Defense Security and Resilience Bank, as industry and backbench calls mount for the U.K. to take part.

Russia poses ā€˜serious and concrete’ threat to Sweden’s security, Stockholm warns

ā€œWhat protects us is the strength of the alliance," a senior NATO official says.

HARVEST: Rethinking food and security

In today's edition: Mercosur, CBAM, state aid

INTERVIEW: Southeastern Europe is the ‘nervous system’ of Europe’s security

Albania's defence minister argues his country is key for EU security

Parliament blocks AI features on MEPs’ tablets over security fears

An email sent to lawmakers, seen by Euractiv, shows the Parliament worried about how much data goes to AI companies

Garante per la protezione dei dati personali (Italy) - 10214411

Facts: typo The Local Territorial Agency for Residential Housing (Azienda territoriale per l’edilizia residenziale) submitted a complaint to the DPA regarding the installation of security cameras by the business ā€œMacelleria La Costata s.r.l.s.ā€, a local butcher . The Local Territorial Agency for Residential Housing (Azienda territoriale per l’edilizia residenziale) submitted a complaint to the DPA regarding the installation of security cameras by the business ā€œMacelleria La Costata s.r.l.s.ā€, a

THE HACK: Lawmakers still stuck on AI ‘pornification’ ban

In today's edition: EU Five Eyes, Dutch AI agnt warning, far-right vs EU space security, UK fines Kick

Munich Security Conference opens with a focus on destruction

The elephant in the room was the growing rift between Washington and the world

Electricity firms eye share of increased NATO spending

Eurelectric suggested a "financial support system" to help utilities' play their critical role in national security

Artificial Insecurity: threats to information integrity

In the second part of our series on the dodgy digital security practices underlying advanced AI tools, we examine how LLMs threaten information integrity. The post Artificial Insecurity: threats to information integrity appeared first on Access Now.

AP waarschuwt voor grote beveiligingsrisico’s bij AI-agents zoals OpenClaw

De Autoriteit Persoonsgegevens (AP) waarschuwt gebruikers en organisaties voor het gebruik van OpenClaw en soortgelijke experimentele systemen. De aanleiding is de hoge snelheid waarmee OpenClaw populair is geworden. Dit soort open source-systemen voldoen al snel niet aan basisveiligheidseisen. Het gebruik van dergelijke experimentele AI-agents brengt grote risico’s met zich mee, zoals datalekken en accountovernames.

šŸ—£ Homeland Security Wants Names | EFFector 38.3

Criticize the government online? The Department of Homeland Security (DHS) might ask Google to cough up your name. By abusing an investigative tool called "administrative subpoenas," DHS has been demanding that tech companies hand over users' names, locations, and more. We're explaining how companies can stand up for users—and covering the latest news in the fight for privacy and free speech online—with our EFFector newsletter. For over 35 years, EFFector has been your guide to underst

UODO (Poland) - DKN.5131.4.2025

English Summary }}}} The DPA fined the Polish national postal operator €232k for a DPO conflict of interest. The DPO concurrently served as a Security Director and company proxy, effectively monitoring their own decisions regarding the means of data processing.The DPA fined the national postal operator €232,000 for appointing a DPO with a conflict of interest. The DPO concurrently served as a Security Director and representative of the controller, effectively monitoring their own decisions regar

Open Letter to Tech Companies: Protect Your Users From Lawless DHS Subpoenas

We are calling on technology companies like Meta and Google to stand up for their users by resisting the Department of Homeland Security's (DHS) lawless administrative subpoenas for user data. In the past year, DHS has consistently targeted people engaged in First Amendment activity. Among other things, the agency has issued subpoenas to technology companies to unmask or locate people who have documented ICE's activities in their community, criticized the government, or attended protes

Artificial Insecurity: how AI tools compromise confidentiality

In the first part of our blog series on the dodgy digital security practices underlying advanced AI tools, we unpack how LLMs can jeopardize the confidentiality of people’s data. The post Artificial Insecurity: how AI tools compromise confidentiality appeared first on Access Now.

Introducing Encrypt It Already

Today, we’re launching Encrypt It Already, our push to get companies to offer stronger privacy protections to our data and communications by implementing end-to-end encryption. If that name sounds a little familiar, it’s because this is a spiritual successor to our 2019 campaign, Fix It Already, a campaign where we pushed companies to fix longstanding issues. End-to-end encryption is the best way we have to protect our conversations and data. It ensures the company that provides a service cannot

Beware: Government Using Image Manipulation for Propaganda

U.S. Homeland Security Secretary Kristi Noem last week posted a photo of the arrest of Nekima Levy Armstrong, one of three activists who had entered a St. Paul, Minn. church to confront a pastor who also serves as acting field director of the St Paul Immigration and Customs Enforcement (ICE) office. A short while later, the White House posted the same photo – except that version had been digitally altered to darken Armstrong’s skin and rearrange her facial features to make it appear she was sobb

EFF Statement on ICE and CBP Violence

Dangerously unchecked surveillance and rights violations have been a throughline of the Department of Homeland Security since the agency’s creation in the wake of the September 11th attacks. In particular, Immigration and Customs Enforcement (ICE) and Customs and Border Protection (CBP) have been responsible for countless civil liberties and digital rights violations since that time. In the past year, however, ICE and CBP have descended into utter lawlessness, repeatedly refusing to exercise or

šŸ’¾ The Worst Data Breaches of 2025—And What You Can Do | EFFector 38.1

So many data breaches happen throughout the year that it can be pretty easy to gloss over not just if, but how many different breaches compromised your data. We're diving into these data breaches and more with our latest EFFector newsletter. Since 1990, EFFector has been your guide to understanding the intersection of technology, civil liberties, and the law. This latest issue tracks U.S. Immigration and Customs Enforcement's (ICE) surveillance spending spree, explains how hackers are

Report: "Information Security within Digital Voting Support Tools."

Government.

Report: "Information Security within Digital Voting Assistance Tools," attached as an appendix to the evaluation of the Dutch Lower House elections of October 29, 2025.

Rapport 'Informatiebeveiliging binnen digitale stembureauhulpmiddelen'

Government

Rapport 'Informatiebeveiliging binnen digitale stembureauhulpmiddelen', als bijlage bij de evaluatie Tweede Kamerverkiezingen 29 oktober 2025

CNIL (Frankrijk) - SAN-2025-015

=== Verwerking ====== Verwerking === Het geschil betrof de verantwoordelijkheid van de verwerker voor het implementeren van adequate beveiligingsmaatregelen, zoals vereist volgens artikel 32 van de AVG. Het geschil betrof de verantwoordelijkheid van de verwerker voor het implementeren van adequate beveiligingsmaatregelen, zoals vereist volgens artikel 32 van de AVG. "Over de eerlijkheid van de procedure:" "Over de eerlijkheid van de procedure:" "Over verantwoordelijkheden:" "Over verantwoordelijkheden:"

CNIL (France) - SAN-2025-015

=== Holding ====== Holding === The dispute related to the processor’s responsibility for implementing adequate security measures, under article 32 GDPR. The dispute related to the processor’s responsibility for implementing adequate security measures, under Article 32 GDPR. '''On the fairness of the procedure:''' '''On the fairness of the procedure:''' '''About responsibilities:''' '''About r

AEPD (Spain) - EXP202500113

Facts }}}} The DPA fined a bank €500,000 after it lost a customer’s documents sent through a courier. The authority held that the bank failed to ensure adequate security and proper supervision of its processor under [[Article 32 GDPR|Article 32 GDPR]].The DPA fined a bank €500,000 for losing a customer’s documents when transporting them via a courier. The DPA held that the bank failed to ensure adequate security and proper supervision of its processor under [[Article 32 GDPR]]. == English Summar

AEPD (Spain) - EXP202500113

Facts: The data protection authority (DPA) has fined a bank €500,000 after documents belonging to a customer were lost during delivery by a courier service. The authority ruled that the bank had not ensured adequate security measures and proper oversight of the service provider, in accordance with Article 32 of the GDPR. The DPA imposed a fine of €500,000 on a bank because customer documents were lost during transport via a courier service. The DPA determined that the bank had not provided sufficient security and adequate oversight of the service provider, in accordance with Article 32 of the GDPR. Summary in English: A bank was fined €500,000 by the data protection authority because customer documents were lost during delivery by a courier service. The authority found that the bank had failed to implement adequate security measures and proper oversight of the service provider, violating Article 32 of the GDPR.

AEPD (Spanje) - EXP202500113

Feiten: De gegevensbeschermingsautoriteit (DPA) heeft een bank een boete van 500.000 euro opgelegd nadat documenten van een klant, verzonden via een koerier, verloren waren gegaan. De autoriteit oordeelde dat de bank er niet voor had gezorgd dat er voldoende beveiliging was en dat er een goede controle was op de dienstverlener, in overeenstemming met artikel 32 van de AVG. De DPA heeft een bank een boete van 500.000 euro opgelegd omdat documenten van een klant verloren waren gegaan tijdens het transport via een koerier. De DPA oordeelde dat de bank niet had gezorgd voor voldoende beveiliging en een goede controle op de dienstverlener, in overeenstemming met artikel 32 van de AVG. == Samenvatting in het Engels

CNIL (France) - SAN-2025-015

=== Processing ====== Processing === The dispute concerned the processor's responsibility for implementing adequate security measures, as required by Article 32 of the GDPR. The dispute concerned the processor's responsibility for implementing adequate security measures, as required by Article 32 of the GDPR. "Regarding the fairness of the procedure:" "Regarding the fairness of the procedure:" "Regarding responsibilities:" "Regarding responsibilities:"

CNIL (France) - SAN-2025-015

}}}} The DPA imposed a 1 700 000 € fine under [[Article 32 GDPR|Article 32 GDPR]] to a processor who had incorrectly configured a software that processed files relating to persons with disabilities, leading to a massive data breach.The DPA imposed a €1,700,000 fine to a processor who had incorrectly configured a software that processed files relating to persons with disabilities, leading to a massive data breach. == English Summary ==== English Summary == === Facts ====== Facts === A software co

How hackers are resisting ICE (Immigration and Customs Enforcement).

Learn more about how ICE (Immigration and Customs Enforcement) has spent hundreds of millions of dollars on surveillance technology to spy on everyone – and potentially the entire population – in the United States, and how you can track the spending of the Department of Homeland Security. ICE has been conducting raids in American cities, targeting, observing, intimidating, mistreating, arresting, and torturing people who are living in the country illegally. They have also been targeting people with work permits, asylum seekers, permanent residents (people with a "green card"), and naturalized citizens.

How Hackers Are Fighting Back Against ICE

Read more about how ICE has spent hundreds of millions of dollars on surveillance technology to spy on anyone—and potentially everyone—in the United States, and how to follow the Homeland Security Spending Trail.. ICE has been invading U.S. cities, targeting, surveilling, harassing, assaulting, detaining, and torturing people who are undocumented immigrants. They also have targeted people with work permits, asylum seekers, permanent residents (people holding ā€œgreen cardsā€), naturalized citizens,

ICE Is Going on a Surveillance Shopping Spree

Read more about how enterprising hackers have started projects to do counter surveillance against ICE, and learn how to follow the Homeland Security spending trail. U.S. Immigration and Customs Enforcement (ICE) has a new budget under the current administration, and they are going on a surveillance tech shopping spree. Standing at $28.7 billion dollars for the year 2025 (nearly triple their 2024 budget) and at least another $56.25 billion over the next three years, ICE's budget would be the

ICE gaat een grootschalig surveillanceprogramma opzetten.

Lees meer over hoe ondernemende hackers projecten zijn gestart om toezicht te houden op de activiteiten van ICE en leer hoe u de bestedingen van het Ministerie van Binnenlandse Veiligheid kunt volgen. De Amerikaanse Immigratie- en Douanehandhaving (ICE) heeft een nieuw budget onder de huidige regering, en ze zijn bezig met een grootschalige aanschaf van surveillanceapparatuur. Met een budget van 28,7 miljard dollar voor 2025 (bijna drie keer zoveel als hun budget voor 2024) en minstens nog eens 56,25 miljard dollar over de komende drie jaar, zou het budget van ICE het...

ICE (U.S. Immigration and Customs Enforcement) is planning to implement a large-scale surveillance program.

Learn more about how activist hackers have launched projects to monitor the activities of ICE, and discover how you can track the spending of the Department of Homeland Security. The U.S. Immigration and Customs Enforcement (ICE) has a new budget under the current administration, and they are in the process of acquiring a large amount of surveillance equipment. With a budget of $28.7 billion for 2025 (nearly three times the amount allocated for 2024), and at least an additional $56.25 billion over the next three years, ICE's budget represents...

The Homeland Security Spending Trail: How to Follow the Money Through U.S. Government Databases

This guide was co-written by Andrew Zuker with support from the Heinrich Boell Foundation. The U.S. government publishes volumes of detailed data on the money it spends, but searching through it and finding information can be challenging. Complex search functions and poor user interfaces on government reporting sites can hamper an investigation, as can inconsistent company profiles and complex corporate ownership structures. This week, EFF and the Heinrich Boell Foundation released an update to

Expenditures of the Department of Homeland Security: How to track the flow of funds through U.S. government databases.

This guide was written by Andrew Zuker, with support from the Heinrich Boell Foundation. The U.S. government publishes vast amounts of detailed data on spending, but searching through this data and finding relevant information can be challenging. Complex search functions and poorly designed user interfaces on government websites can hinder research, as can inconsistent company profiles and complex corporate structures. This week, EFF and the Heinrich Boell Foundation released an updated version of...

The year when states prioritized surveillance over security: a look back at 2025.

2025 was the year when age verification transitioned from a niche experiment to a widespread reality in the United States. Currently, half of the U.S. states require age verification for access to adult content or social media platforms. Nine states alone enacted laws this year, and more are expected in 2026. The good news is that courts have blocked many of the laws intended to mandate age verification on social media, primarily for the same reasons that the Electronic Frontier Foundation (EFF) opposes these efforts. Age verification...

Surveillance and self-defense: A review of the year 2025.

Our guides on privacy protection and self-defense (Surveillance Self-Defense, SSD), which offer practical tips and explanations on how to deal with government and corporate surveillance, have had a successful year. We have published several important updates to existing guides and released three completely new guides. Given the frequent and large-scale protests in the United States, our guide on participating in a protest remained one of the most popular of the year, so we made sure our translations were up-to-date. (Re)learn everything you need to know about encryption. We've started...

The Year States Chose Surveillance Over Safety: 2025 in Review

2025 was the year age verification went from a fringe policy experiment to a sweeping reality across the United States. Half of the U.S. now mandates age verification for accessing adult content or social media platforms. Nine states saw their laws take effect this year alone, with more coming in 2026. The good news is that courts have blocked many of the laws seeking to impose age-verification gates on social media, largely for the same reasons that EFF opposes these efforts. Age-verification m

Surveillance Self-Defense: 2025 Year in Review

Our Surveillance Self-Defense (SSD) guides, which provide practical advice and explainers for how to deal with government and corporate surveillance, had a big year. We published several large updates to existing guides and released three all new guides. And with frequent massive protests across the U.S., our guide to attending a protest remained one of the most popular guides of the year, so we made sure our translations were up to date. (Re)learn All You Need to Know About Encryption We starte

Surveillance en zelfverdediging: Terugblik op het jaar 2025.

Onze handleidingen over privacybescherming en zelfverdediging (Surveillance Self-Defense, SSD), die praktische tips en uitleg bieden over hoe u om moet gaan met overheids- en bedrijfsbewaking, hebben een succesvol jaar gehad. We hebben verschillende belangrijke updates gepubliceerd voor bestaande handleidingen en drie volledig nieuwe handleidingen uitgebracht. Gezien de frequente en grootschalige protesten in de Verenigde Staten, bleef onze handleiding over het deelnemen aan een protest een van de populairste van het jaar, dus we hebben ervoor gezorgd dat onze vertalingen up-to-date waren. (Her)leer alles wat u moet weten over encryptie. We zijn begonnen...

States attempted to censor the online activities of children. Courts and the Electronic Frontier Foundation (EFF) largely managed to prevent this: a look back at 2025.

In at least a dozen states, lawmakers believe they can pass laws that prohibit young people from accessing social media, or that require them to obtain parental consent before logging in. Fortunately, almost all courts that have reviewed these laws have ruled that they violate the constitution. It's not just the courts telling these lawmakers they are wrong. The Electronic Frontier Foundation (EFF) has filed briefs with courts across the country over the past year, explaining how these laws violate the freedom of speech of young people, as protected by the First Amendment.

States Tried to Censor Kids Online. Courts, and EFF, Mostly Stopped Them: 2025 in Review

Lawmakers in at least a dozen states believe that they can pass laws blocking young people from social media or require them to get their parents’ permission before logging on. Fortunately, nearly every trial court to review these laws has ruled that they are unconstitutional. It’s not just courts telling these lawmakers they are wrong. EFF has spent the past year filing friend-of-the-court briefs in courts across the country explaining how these laws violate young people’s First Amendment right