• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
e.u. commission fined for transferring user data to meta in

E.U. Commission Fined for Transferring User Data to Meta in Violation of Privacy Laws

You are here: Home / General Cyber Security News / E.U. Commission Fined for Transferring User Data to Meta in Violation of Privacy Laws
January 9, 2025

The European General Court on Wednesday fined the European Commission, the primary executive arm of the European Union responsible for proposing and enforcing laws for member states, for violating the bloc’s own data privacy regulations.

The development marks the first time the Commission has been held liable for infringing stringent data protection laws in the region.

The court determined that a “sufficiently serious breach” was committed by transferring a German citizen’s personal data, including their IP address and web browser metadata, to Meta’s servers in the United States when visiting the now-inactive futureu.europa[.]eu website in March 2022.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The individual registered for one of the events on the site by using the Commission’s login service, which included an option to sign in using a Facebook account.

“By means of the ‘Sign in with Facebook’ hyperlink displayed on the E.U. Login webpage, the Commission created the conditions for transmission of the IP address of the individual concerned to the U.S. undertaking Meta Platforms,” the Court of Justice of the European Union said in a press statement.

Cybersecurity

The applicant had alleged that by transferring their information to the U.S., there arose a risk of their personal data being accessed by the U.S. security and intelligence services.

However, their accusation that the data was also transferred to Amazon CloudFront servers in the U.S. was dismissed after it was determined that the information was hosted on a server located in Munich, Germany. The website in question used Amazon’s content delivery network (CDN).

“At the time of that transfer, on 30 March 2022, there was no Commission decision finding that the United States ensured an adequate level of protection for the personal data of E.U. citizens,” the court said. “Furthermore, the Commission has neither demonstrated nor claimed that there was an appropriate safeguard, in particular a standard data protection clause or contractual clause.”

This, the General Court said, amounted to a contravention of laws related to transfer of personal data by an E.U. institution, body, office or agency to a third country under Article 46 of Regulation 2018/1725.

As a result, the court has ordered the Commission to pay the individual €400 ($412), which they sought as compensation for the non-material damage they claimed to have sustained as a result of the data transfer.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «ivanti flaw cve 2025 0282 actively exploited, impacts connect secure and policy Ivanti Flaw CVE-2025-0282 Actively Exploited, Impacts Connect Secure and Policy Secure
Next Post: Critical RCE Flaw in GFI KerioControl Allows Remote Code Execution via CRLF Injection critical rce flaw in gfi keriocontrol allows remote code execution»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.