2016
DOI: 10.21552/edpl/2016/1/5
|View full text |Cite
|
Sign up to set email alerts
|

Is the Subject Access Right Now Too Great a Threat to Privacy?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…Herrmann and Lindemann [27] observed that businesses were more likely to respond to data deletion requests than subject access requests, and identified websites that adopted SAR mechanisms that made them vulnerable to revealing their users' data in their responses to adversarial data access requests. In a number of other studies, researchers further examined how businesses' SAR mechanisms can be used by adversaries to extract subjects' personal data through social engineering attacks (e.g., impersonation) [7,12,15,18,19,48]. Di Martino et al [19] showed how these types of attacks can be mounted against a number of organizations by relying on information that is available to the public.…”
Section: Efficacy Of Subject Access Requestsmentioning
confidence: 99%
See 1 more Smart Citation
“…Herrmann and Lindemann [27] observed that businesses were more likely to respond to data deletion requests than subject access requests, and identified websites that adopted SAR mechanisms that made them vulnerable to revealing their users' data in their responses to adversarial data access requests. In a number of other studies, researchers further examined how businesses' SAR mechanisms can be used by adversaries to extract subjects' personal data through social engineering attacks (e.g., impersonation) [7,12,15,18,19,48]. Di Martino et al [19] showed how these types of attacks can be mounted against a number of organizations by relying on information that is available to the public.…”
Section: Efficacy Of Subject Access Requestsmentioning
confidence: 99%
“…App developers also requested specific pieces of personal information to match against their records, either as part of the initial VCR submission process or by following up with us after we submitted our requests. Most often, developers asked us to provide some basic information about ourselves, including, our email address (36 instances), full name (26), state (21), and country of residence (15). Developers also requested technical information that is not always easily accessible for smartphone users.…”
Section: Access Requestsmentioning
confidence: 99%
“…More specifically, Herrmann and Lindemann [11] have analyzed the data responses from 150 popular websites and smartphone apps when exercising the 'Right of Access' under the now obsolete Directive 95/46/EC, demonstrating excessive carelessness of DCs when handling those requests as well as incidentally revealing possibilities of criminal abuse. Following the adoption of the GDPR in 2016, Cormack [6] argued that the additional provisions related to the 'Right of Access' (now Article 15 GDPR) may increase the hypothetical risk of leaking personal information to unauthorized third-parties when those parties attempt to impersonate real data subjects. To better conceptualize these risks, Boniface et al [2] examined potential authentication issues of various popular websites and third-party trackers more in-depth and compared the recommendations of European Data Protection Authorities (DPAs) concerning the transmission of sensitive information such as passports and national ID cards.…”
Section: Related Workmentioning
confidence: 99%