SlimPay, a Paris-based subscription payment services company, has been fined €180,000 by the French CNIL regulatory body after it was found to have held sensitive customer data on a publicly accessible server for five years.
The firm describes itself as a leader in recurring payments for subscriptions, and provides an API and processing service to take care of such payments on behalf of client organisations, which include Unicef, BP, and OVO Energy, to name but a few.
However, it appears that in 2015 SlimPay undertook an internal research project into an anti-fraud mechanism, for which it used personal data contained in its customer databases for testing purposes. Using real data is a good way to ensure that development code is working as expected before live deployment, but when you are dealing with sensitive information such as bank account details, great care must be taken not to fall foul of data protection regulations.
Alas, according to CNIL (Commission nationale de l’informatique et des libertés), when SlimPay’s research project ended in July 2016, the data was left in place on a server that was freely accessible from the public internet without any security procedures in place. Worse still, the company was apparently unaware of this situation until February 2020, when one of SlimPay’s customers became aware of the server and tipped it off.
To its credit, SlimPay appears to have taken immediate action to isolate the server and secure the data, after which it notified CNIL of the data breach, on February 17.
In a later data breach notification, the firm disclosed more details on the security incident, including the number of people and the type of personal data affected by the data breach. This comprised debtor data from SlimPay merchant clients corresponding to approximately 12 million people, consisting of their postal, electronic, and telephone contact details, and banking information such as Bank Identifier Code (BIC) and International Bank Account Number (IBAN).
A subsequent investigation carried out by CNIL found multiple breaches concerning the processing of personal data of customers, and the restricted committee – the CNIL body responsible for issuing sanctions – concluded that SlimPay had failed to comply with several General Data Protection Regulation (GDPR) requirements.
These included failure to comply with the obligation to provide a formal legal framework for the processing operations carried out by a processor (Article 28 of GDPR) as some contracts between SlimPay and its service providers do not contain all the clauses to ensure the processors commit themselves to processing personal data in compliance with GDPR, as well as failure to ensure the security of personal data (Article 32 of GDPR).
CNIL also found that SlimPay had failed to inform data subjects of a personal data breach (Article 34 of GDPR). Given the nature of the personal data (such as bank details), and the potential consequences for those concerned of this data being exposed, CNIL concluded that the risk associated with the breach should be considered high and that the company should have informed all the affected individuals, which it did not do.
According to CNIL, SlimPay defended itself by claiming none of the people affected had informed it of any fraudulent use of their personal data and claimed an audit by a third-party firm showed the data had not been exploited by an attacker. This cut no ice with the regulatory body, which stated that the absence of proven harm to data subjects has no effect on the existence of the security deficiency.
We contacted SlimPay for comment, and will update if we get a response from the company.
The official announcement (in French) is available here. ®