Sweden Issues An Order 'Stop Using Google Analytics'

Sweden’s  government privacy protection agency, the IMY, has ordered four companies to stop using Google Analytics due to the transfer of personal data to the US, in violation of the EU’s data protection regulation (GDPR). 

The IMY said it had examined the use of Google Analytics by the firms following a complaint by the Austrian data privacy group noyb (none of your business) which has filed dozens of complaints against Google across Europe. The four companies were fined, with telecommunications firm Tele2 receiving a penalty of  SKr. 12 million ($1.2m) and online marketplace CDON fined SKr. 300,000 ($30,000)

IMY legal adviser Sandra Arvidsson, who led the investigation, said the agency has the rulings "made clear what requirements are placed on technical security measures and other measures when transferring personal data to a third country, in this case the United States.'

The IMY deemed the data sent to Google Analytics as personal data and found the technical security measures taken by the companies insufficient to meet EU standards.

At the end of May, the European Commission said it hoped to conclude by the end of the summer a new legal framework for data transfers between the EU and United States. The GDPR, in place since 2018, can lead to penalties of up 20 million euros or four percent of a company’s global revenue. This is the first financial penalty imposed on companies for using Google Analytics in violation of the GDPR.

The national retail chain Coop and the Dagens Industri newspaper were judged to  have taken more stringent measures to protect the data being transferred to Google and were not fined.

In 2022 a number of European Union data privacy regulators, including the French and Italian authorities, warned against use of Google’s analytics tool after finding a number of users to be non-compliant with the Union’s rules on international data transfers.

 However other regulators have not issued financial sanctions, according to noyb, which was behind the original complaints, appearing to prefer a softer approach to enforcing the GDPR on users of such a familiar tool, despite the same data transfer issue underlying them all.

IMY:     noyb:   Oodaloop:   Security Week:   VOA:    The LocalTechcrunch:   Ground:   Image:  PhotoMIX 

You  Might Also Read: 

EU Still Blocking Social Media Users' Data Transfer:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« A Perfect Storm For Cybercrime
British Employees Lack The Training To Use AI Tools »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

DataLocker

DataLocker

DataLocker offers both hardware based external storage and software based cloud storage encryption solutions.

iLand

iLand

iland is a global cloud service provider of secure and compliant hosting for infrastructure (IaaS), disaster recovery (DRaaS), and backup as a service (BaaS).

Northwave

Northwave

Northwave is 100% focused on providing integrated high quality information security services.

Teramind

Teramind

Teramind provides a user-centric security approach to monitor employee behavior in order to identify suspicious activity, detect possible threats, monitor efficiency, and ensure industry compliance.

WizNucleus

WizNucleus

WizNucleus develops, markets and supports a software platform (Cyberwiz-Pro) that enables Critical Infrastructure enterprises to ensure the future state of their cybersecurity and remain compliant.

QOMPLX

QOMPLX

QOMPLX integrate, contextualize, and analyze data from virtually any source to help you identify operational risk and inefficiencies throughout the enterprise.

Agility Networks

Agility Networks

Agility Networks is a technology company providing integrated services and solutions for Digital Transformation and Cyber Security.

Insight Partners

Insight Partners

Insight Partners is a leading global private equity and venture capital firm investing in growth-stage technology, software and Internet businesses.

iZOOlogic

iZOOlogic

iZOOlogic protects hundreds of the world’s leading brands, across banking, finance and government from cybercrime. We provide strong cyber defence solutions to protect client digital assets.

Resistant AI

Resistant AI

Resistant AI protects against evolving online fraud. We connect the dots to provide a new layer of trust and performance for our clients’ systems.

Belcan

Belcan

Belcan is a global supplier of engineering, manufacturing & supply chain, workforce and government IT solutions to customers in the aerospace, defense, automotive, industrial, and private sector.

Global Cybersecurity Association (GCA)

Global Cybersecurity Association (GCA)

GCA’s Symposium and conferences featuring global thought leaders and CISOs provide a global best practice perspective on cybersecurity.

Axellio

Axellio

Axellio provides economic, end-to-end cyber security solutions designed for your team, environment, and security objectives, providing packet level visibility across your network.

Rimstorm

Rimstorm

Rimstorm’s mission is to significantly improve the security of your data using award-winning, state-of-the-art technology combined with cyber managed security services.

Federal Bureau of Investigation (FBI)

Federal Bureau of Investigation (FBI)

The mission of the FBI is to protect and defend against intelligence threats, uphold and enforce criminal laws, and provide criminal justice services.

Cythera

Cythera

Cythera is an Australian cyber security company with in-house cyber security professionals providing world-class cyber protection to medium to large companies all over Australia.