British Airways asked customers to post personal information on Twitter ‘to comply with GDPR’
Complaining about airlines on Twitter is a universal pastime for disgruntled travelers, and yet somehow British Airways has managed to turn the activity into a data privacy debacle of its own doing. Security researcher and PhD student Mustafa Al-Bassam discovered yesterday that the airline’s social media team was demanding customers post a trove of personal information publicly on Twitter, so it could help investigate customer service claims. That included passport numbers, full addresses, and other sensitive info, as reported earlier today by TechCrunch.
Even weirder: the airline kept insisting this was to “comply with GDPR,” which is the General Data Protection Regulation. It’s the EU’s new widespread consumer privacy law designed to keep companies from collecting and selling personal information of internet users without their consent. So it doesn’t make much sense why British Airways would require customers post their personal information on Twitter for all to see just to get assistance about a missed or delayed flight.
Al-Bassam notes how, after some users complained about the airline’s bizarrely worded request, it began altering its replies to say that customers should DM them the info instead. Granted, GDPR is an 88-page, 56,000-word law that is quite complex and confusing. It also just went into effect on May 25th and many companies have struggled with compliance. Still, there’s nothing about GDPR that should imply it involves asking people to post personal information to Twitter.
Making matters worse for British Airways, Al-Bassam was only looking into the company’s Twitter activity because he discovered he couldn’t check in for his flight — to a security conference no less — without disabling his ad blocker. It turns out British Airways uses tracking cookies when you check into flights on a web browser that then sends your personal information to third-party sites.
As he notes, without proper consent, this is a violation of GDPR, the same GDPR that British Airways’ social media team thinks it’s complying with by asking people to post personal information on Twitter. After a frustrating back-and-forth with various members of the British Airways team about why there was no consent form or opt-out mechanism, Al-Bassam submitted a complaint to the airline, reposted here, voicing his concerns. He also outlined his plans to submit a more formal GDPR complaint with the UK’s Information Commissioner’s Office within 30 days if the company doesn’t remedy the issue with its web check-in process and ad-tracking practices.
Now, while it’s well understood that GDPR is confusing and takes some time to parse, it seems like there’s a more profound misunderstanding going on over at British Airways.
- REMOTE Penetration Tester - UK. Senior
- United Kingdom
CH7941 Identifier Project REMOTE Penetration Tester - UK. Senior role. Agile, flexible company looking to attract an experienced Penetration Tester that values transparency, creativity and interesting varied work. To join a growing team to deliver varied (Infrastructure, Web application etc) remote penetration testing to an international client base. You must be technically exceptional, able to work remotely / independently and be able to effectively communicate / document / produce written reports. This is a client facing role, so you must be able to represent yourself and the business in the best light. Experience around penetration testing best practice / frameworks highly desired. Manual penetration testing experience highly valued. Any of the following tests / labs are desired, but experience over Pen 200, OSCP, TryHackMe (THM), HackTheBox (HTB), VulnHub, Virtual Hacking Labs (VHL) GIAC Certified Penetration Tester (GPEN) GIAC Exploit Researcher and Advanced Penetration Tester (GXPN) Offensive Security Certified Professional Certified Penetration Tester (CPT) Certified Expert Penetration Tester (CEPT) Offensive Security Certified Expert (OSCE) CompTIA PenTest+ EC-Council Licensed Penetration Tester Master Certified Mobile and Web Application Penetration Tester (CMWAPT)
- Head of CSOC (Cyber Security Operations Centre), London. Greenfield opportunity
CH7928 Identifier Project Head of CSOC (Cyber Security Operations Centre), London. Greenfield UNIQUE opportunity to establish, manage and grow a world class CSOC. Headquartered in the UK, the CSOC will grow and deliver cyber services into an international and underdeveloped market. As a greenfield site the Head of CSOC will be the first person on the ground to build a capability and team around them. The role will include, but not be limited to; Setting up and establishing a CSOC monitoring service using IBM QRadar and Palo Alto CORTEX XSOAR. Develop roadmap for future CSOC capabilities. Establish, develop processes, playbooks and use cases. Recruit, Build and train a specialist team. Build relationships with key clients- onboard and scale. The successful candidate must have experience working within / leading a technical Cyber Security monitoring capability. Technical experience working with IBM QRadar and Palo Alto CORTEX XSOAR will be highly beneficial, although other SIEM / Security Orchestration, Automation and Response tools are welcome as the skillset is transferable. This brings significant opportunity and welcomes creativity / best practice. Frequent travel to London office will be required. Chris.firstname.lastname@example.org 07884666351
- Aruba Data Centre Network Engineer
- Upto £500 a day
**Outside of IR35 contract** Aruba Data Centre Network engineer is required to start ASAP. You will be responsible for Data Center and Campus Network - Design and implementation of Aruba CX Switches, We are looking for an experienced data centre engineer who is happy to work remotely and autonomously Experience you will need to have, Solid Networking experience with good knowledge of -Routing & Switching - MP-BGP EVPN VXLAN, MPLS/VPLS, EIGRP, BGP, OSPF and Multicast, Experience with Aruba switches ideally the CX range Ideally SC cleared or able to become SC Cleared. This will be a 3 month rolling contract
- Network Engineer-
- 65000 plus bonus
An exciting opportunity has arisen with a global financal business that are looking for an experienced Network engineer with strong Firewall experience in particular Checkpoint You will be responsible for help to support and manage the network infrastructure both LAN/ WAN And VPNs and will have a focus on network secuirty (Checkpoint firewall and Security controls) This is a multi-Site environment with few thousand end users, As the business is growing so is the network so great opportunity to join an expanding business that will help cross-train you in both cloud and onsite solutions. They are looking for a strong network engineer with a mix of expereience o Experience with Azure networking managing VNETs, ExpressRoute, VPNs and other Azure network features such as NSG/MS loadbalancer is required. Working with Check Point firewalls in Azure is desirable. o In-Depth understanding of networking fundamentals including: Network topology, Data Centre Infrastructure systems, Layer 2/Layer 3 Switching, VLANs, Routing, VPNs, High availability protocols. o Demonstrable hands-on experience with Meraki Switches and wireless infrastructure, Arista software, Forcepoint Proxy (would be a strongly desirable), Citrix Netscaler, and Forescout CounterACT Location can be flexible, they are looking for someone who would be happy to do a hybrid working model 3 days at home 2 days in the office.