Securiti leads GigaOm's DSPM Vendor Evaluation with top ratings across technical capabilities & business value.

View

Uber’s $324 Million Problem: Lessons In Data Protection For Businesses In The EU

Contributors

Anas Baig

Product Marketing Manager at Securiti

Maria Khan

Data Privacy Legal Manager at Securiti

FIP, CIPT, CIPM, CIPP/E

Syed Tatheer Kazmi

Associate Data Privacy Analyst, Securiti

CIPP/Europe

Published October 23, 2024

Listen to the content

On August 26, 2024, the Autoriteit Persoonsgegevens, also known as the Dutch Data Protection Agency (DPA), announced an unprecedented €290 million ($324 million) fine against the ride-hailing service Uber for transferring data containing personal information and other sensitive details of its EU-based drivers to its servers in the United States without adequate protection from August 6, 2021, to November 27, 2023.

The fine is among the highest ever levied by the Dutch DPA and the biggest issued against Uber globally.

The Dutch DPA chairman, Aleid Wolfsen, issued a statement, “...Think of governments that can tap data on a large scale. That is why businesses are usually obliged to take additional measures if they store the personal data of Europeans outside the European Union. Uber did not meet the requirements of the GDPR to ensure the level of protection to the data with regard to transfers to the US…”

Uber’s spokesperson has since called the decision flawed and unjustified and has expressed its intention to appeal.

While more details will surely follow, this particular episode contains several lessons that can prove critical for other businesses and organizations processing data of EU citizens. Proactively implementing these lessons within their operations can help such businesses avoid a similarly hefty financial penalty and avoid losing a much more valuable asset, their customers’ trust. Read on to learn more.

The Case Against Uber

Following the Schrems II ruling in July 2020, which invalidated the EU-US Privacy Shield, businesses were required to implement new safeguards for the transfer of personal data outside the EU. However, Uber continued to transfer the personal data of EU drivers to the  US headquarters for two years without relying on any of the transfer tools permitted under GDPR for transfers of data to jurisdictions outside the EEA.

The Dutch DPA's investigation into Uber's alleged data protection violations began after more than 170 French drivers launched a joint complaint through the French human rights interest group the Ligue des droits de l'Homme (LDH) to the French DPA.

Per the GDPR's provisions, organizations that process data in multiple EU member states must deal with the DPA from the country where the organization has its main establishment. Since Uber's main European headquarters is based in the Netherlands, the French DPA forwarded the complaint and then closely collaborated with the Dutch DPA, which also involved consultations and communications with other European DPAs.

As part of its investigation, the Dutch DPA found that Uber had collected personal data, including sensitive information from its European drivers, and stored and maintained it on its US servers. The sensitive information in question included details such as drivers' geolocation, photos, transaction history, ID documents, and, in some instances, their criminal and medical histories.

Cross-Border Transfer Mechanisms

As per the GDPR, personal data transfers to a third country or international organization may take place only where an adequate level of protection is ensured or there are safeguards in place to ensure the level of protection is essentially equivalent to that currently guaranteed inside the EU.

  • An adequacy decision: A determination by the European Commission that a non-EU country ensures an essentially equivalent level of data protection, allowing safe data transfers from the EU to that country.
  • Appropriate safeguards: In the absence of an adequacy decision, transfer can take place only if one of the following appropriate safeguards are in place:
    • Binding Corporate Rules (BCRs);
    • Standard Contractual Clauses (SCCs);
    • Legally binding instrument between public authorities;
    • Data protection clauses adopted by the supervisory authority and approved by the Commission;
    • An approved code of conduct;
    • An approved certification mechanism.

In cases where personal data is being transferred under SCCs, a Transfer Impact Assessment (TIA) needs to be carried out to evaluate the risks of transferring personal data outside the EEA. The TIA is a vital element of the SCC framework, intended to evaluate how well the chosen transfer mechanism protects the data. It assesses the legal framework of the third country to determine if it offers an essentially equivalent level of data protection, as mandated by the GDPR. In instances where SCCs do not provide sufficient safeguards, supplementary measures such as encryption, pseudonymization, or strict access controls need to be implemented to guarantee compliance with the GDPR.

  • Derogations, which can only be used in the case of non-repetitive transfers, where it fits one of the following exceptions:
    • The data subject has explicitly consented to the transfer after being informed of the risks involved;
    • Transfer of data is necessary for the performance of a contract between the data subject and the controller or between the controller and a third party acting on behalf of the data subject;
    • Transfer of data is necessary for reasons of public interest;
    • Transfer of data is necessary for the establishment, exercise, or defense of legal claims;
    • Transfer of data is necessary to protect the vital interests of the data subject or any other person where they are physically or legally incapable of giving consent;
    • The transfer involves data that is sourced from a public register, provided that the transferee complies with the restrictions imposed on its access or use.

Even if the above-mentioned conditions are not met, a transfer is still possible if it is not repetitive, concerns a limited number of data subjects, is necessary for compelling legitimate interests, and the controller has assessed all the circumstances surrounding the data transfer and accordingly provided suitable safeguards for the protection of personal data. In such cases, a business must provide information to the data subjects as per Articles 13 and 14 of the GDPR. Moreover, it should document the assessment as well as the suitable safeguards provided in its records of processing activities.

Lessons For Corporations

There are, of course, some vital lessons for other organizations, and perhaps Uber itself can learn from this entire episode. These include the following:

Identify the Appropriate Transfer Mechanism

Organizations must assess the third country's adequacy decision. In the absence of an adequacy decision by the European Commission, organizations must rely on an appropriate data transfer tool under GDPR Article 46 and fulfill the associated requirements.

Document Cross-Border Transfers

According to Article 30 of the GDPR, businesses are required to document the transfer of personal data to a third country in their record of processing activities. Proper documentation is essential for justifying the transfer and demonstrating that safeguards are in place to ensure an adequate level of protection.

Such thorough documentation often proves invaluable during audits and compliance checks, providing indisputable evidence of an organization’s adoption and adherence to the required data protection standards. It enables swift response to inquiries or concerns from supervisory and enforcement agencies, significantly reducing the risk of penalties for non-compliance.

Moreover, it has a clear functional benefit, as effective documentation allows for effective data governance and management. This, in turn, enables better decision-making and operational efficiency, which can be particularly beneficial in the long run by leveraging data security.

Conduct Transfer Impact Assessment

When adopting Standard Contractual Clauses (SCCs) as a transfer mechanism, data exporters must conduct a Transfer Impact Assessment (TIA) to evaluate the risks of transferring personal data outside the EEA. The TIA is a crucial step within the SCC framework designed to assess the effectiveness of the chosen transfer mechanism. It evaluates the legal and regulatory environment of the destination country and determines whether that third country provides an essentially equivalent level of data protection as required by GDPR.  Based on this assessment, businesses can determine whether the measures provided by the SCCs are adequate or if supplementary measures are necessary to ensure the data's security and compliance with GDPR.

Ensure Transparency via Privacy Notice

Maintaining transparency with users is one of the most effective ways to build and maintain user trust. Users must be kept informed and updated about how their data is collected, processed, stored, secured, and transferred. This can easily be achieved through accessible and easy-to-understand privacy notices. Any changes to data practices, particularly those involving the transfer of users’ data outside the EU jurisdiction, must be promptly reflected in the privacy policy and communicated to the users.

How Securiti Can Help

Securiti is the pioneer of the Data Command Center, a centralized platform that enables the safe use of data+AI. It provides unified data intelligence, controls, and orchestration across hybrid multicloud environments. Numerous reputable global enterprises rely on Securiti's Data Command Center for their data security, privacy, governance, and compliance needs.

With Assessment Automation, organizations can automate records of processing (RoPA) reports, privacy impact assessments, and data protection impact assessments aligning with GDPR requirements. Similarly, Privacy Policy Management provides organizations access to several pre-built templates that can be thoroughly customized based on their business operations and rapidly published in several languages. The Data Mapping module allows monitoring of all cross-border traffic and key data patterns with dynamic data graphs that allow the automatic discovery of new data, trigger new assessments, and update the risk register.

Request a demo today to learn more about how Securiti can help you comply with any and all legal obligations your organization may be subject to under the GDPR and other major data privacy regulations worldwide.

Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox



More Stories that May Interest You
Videos
View More
Mitigating OWASP Top 10 for LLM Applications 2025
Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...
View More
Top 6 DSPM Use Cases
With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...
View More
Colorado Privacy Act (CPA)
What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...
View More
Securiti for Copilot in SaaS
Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...
View More
Top 10 Considerations for Safely Using Unstructured Data with GenAI
A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....
View More
Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes
As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...
View More
Navigating CPRA: Key Insights for Businesses
What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...
View More
Navigating the Shift: Transitioning to PCI DSS v4.0
What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...
View More
Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)
AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...
AWS Startup Showcase Cybersecurity Governance With Generative AI View More
AWS Startup Showcase Cybersecurity Governance With Generative AI
Balancing Innovation and Governance with Generative AI Generative AI has the potential to disrupt all aspects of business, with powerful new capabilities. However, with...

Spotlight Talks

Spotlight 11:29
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Watch Now View
Spotlight 11:18
Rewiring Real Estate Finance — How Walker & Dunlop Is Giving Its $135B Portfolio a Data-First Refresh
Watch Now View
Spotlight 13:38
Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines
Sanofi Thumbnail
Watch Now View
Spotlight 10:35
There’s Been a Material Shift in the Data Center of Gravity
Watch Now View
Spotlight 14:21
AI Governance Is Much More than Technology Risk Mitigation
AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3
You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge
Watch Now View
Spotlight 47:42
Cybersecurity – Where Leaders are Buying, Building, and Partnering
Rehan Jalil
Watch Now View
Spotlight 27:29
Building Safe AI with Databricks and Gencore
Rehan Jalil
Watch Now View
Spotlight 46:02
Building Safe Enterprise AI: A Practical Roadmap
Watch Now View
Spotlight 13:32
Ensuring Solid Governance Is Like Squeezing Jello
Watch Now View
Latest
Shrink The Blast Radius: Automate Data Minimization with DSPM View More
Shrink The Blast Radius:

Automate Data Minimization with DSPM

Recently, DaVita disclosed a ransomware incident that ultimately impacted about 2.7 million people, and it’s already booked $13.5M in related costs this quarter. Healthcare...
Why I Joined Securiti View More
Why I Joined Securiti
I’m beyond excited to join Securiti.ai as a sales leader at this pivotal moment in their journey. The decision was clear, driven by three...
Key Data Protection Reforms Introduced by the Data Use and Access Act View More
Key Data Protection Reforms Introduced by the Data Use and Access Act
UK DUAA 2025 updates UK GDPR, DPA and PECR. Changes cover research and broad consent, legitimate interests and SARs, automated decisions, transfers and cookies.
FTC's 2025 COPPA Final Rule Amendments View More
FTC’s 2025 COPPA Final Rule Amendments: What You Need to Know
Gain insights into FTC's 2025 COPPA Final Rule Amendments. Discover key definitions, notices, consent choices, methods, exceptions, requirements, etc.
View More
Is Your Business Ready for the EU AI Act August 2025 Deadline?
Download the whitepaper to learn where your business is ready for the EU AI Act. Discover who is impacted, prepare for compliance, and learn...
View More
Getting Ready for the EU AI Act: What You Should Know For Effective Compliance
Securiti's whitepaper provides a detailed overview of the three-phased approach to AI Act compliance, making it essential reading for businesses operating with AI.
Navigating the Minnesota Consumer Data Privacy Act (MCDPA) View More
Navigating the Minnesota Consumer Data Privacy Act (MCDPA): Key Details
Download the infographic to learn about the Minnesota Consumer Data Privacy Act (MCDPA) applicability, obligations, key features, definitions, exemptions, and penalties.
EU AI Act Mapping: A Step-by-Step Compliance Roadmap View More
EU AI Act Mapping: A Step-by-Step Compliance Roadmap
Explore the EU AI Act Mapping infographic—a step-by-step compliance roadmap to help organizations understand key requirements, assess risk, and align AI systems with EU...
The DSPM Architect’s Handbook View More
The DSPM Architect’s Handbook: Building an Enterprise-Ready Data+AI Security Program
Get certified in DSPM. Learn to architect a DSPM solution, operationalize data and AI security, apply enterprise best practices, and enable secure AI adoption...
Gencore AI and Amazon Bedrock View More
Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock
Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...
What's
New