Please use this identifier to cite or link to this item: http://hdl.handle.net/1942/29194
Full metadata record
DC FieldValueLanguage
dc.contributor.authorDI MARTINO, Mariano-
dc.contributor.authorROBYNS, Pieter-
dc.contributor.authorWeyts, Winnie-
dc.contributor.authorQUAX, Peter-
dc.contributor.authorLAMOTTE, Wim-
dc.contributor.authorANDRIES, Ken-
dc.date.accessioned2019-09-16T10:44:47Z-
dc.date.available2019-09-16T10:44:47Z-
dc.date.issued2019-
dc.identifier.citationProceedings of the Fifteenth Symposium on Usable Privacy and Security, USENIX,p. 371-386-
dc.identifier.isbn9781939133052-
dc.identifier.urihttp://hdl.handle.net/1942/29194-
dc.description.abstractThe General Data Protection Regulation (GDPR) “Right of Access” grants (European) natural persons the right to request and access all their personal data that is being processed by a given organization. Verifying the identity of the requester is an important aspect of this process, since it is essential to prevent data leaks to unauthorized third parties (e.g. criminals).in this paper, we evaluate the verification process as implemented by 55 organizations from the domains of finances, entertainment, retail and others. To this end, we attempt to impersonate targeted individuals who have their data processed by these organizations, using only forged or publicly available information extracted from social media and alike. We show that policies and practices regarding the handling of GDPR data requests vary significantly between organizations and can often be manipulated using social engineering techniques. For 15 out of the 55 organizations, we were successfully able to impersonate a subject and obtained full access to their personal data. The leaked personal data contained a wide variety of sensitive information, including financial transactions, website visits and physical location history. Finally, we also suggest a number of practical policy improvements that can be implemented by organizations in order to minimize the risk of personal information leakage to unauthorized third parties.-
dc.description.sponsorshipThis research was funded in part by the Bijzonder Onderzoeksfonds (BOF) of Hasselt University and by a Ph.D. Grant of the Research Foundation Flanders (FWO), grant number 1S14916N. Finally, we thank the reviewers and shepherd for their in-depth feedback.-
dc.language.isoen-
dc.publisherUSENIX-
dc.rights2019 by The USENIX Association. All Rights Reserved This volume is published as a collective work. Rights to individual papers remain with the author or the author’s employer. Permission is granted for the noncommercial reproduction of the complete work for educational or research purposes. Permission is granted to print, primarily for one person’s exclusive use, a single copy of these Proceedings. USENIX acknowledges all trademarks herein.-
dc.titlePersonal Information Leakage by Abusing the GDPR 'Right of Access'-
dc.typeProceedings Paper-
local.bibliographicCitation.conferencedate12/08/2019 - 13/08/2019-
local.bibliographicCitation.conferencenameConference: 15th Symposium on Usable Privacy and Security-
local.bibliographicCitation.conferenceplaceSanta Clara, California, USA-
dc.identifier.epage386-
dc.identifier.spage371-
local.bibliographicCitation.jcatC1-
local.publisher.placeSanta Clara, CA, USA-
local.type.refereedRefereed-
local.type.specifiedProceedings Paper-
dc.source.typeMeeting-
dc.identifier.isiWOS:000527571900022-
dc.identifier.urlhttps://www.usenix.org/conference/soups2019/presentation/dimartino-
local.provider.typeWeb of Science-
local.bibliographicCitation.btitleProceedings of the Fifteenth Symposium on Usable Privacy and Security-
local.uhasselt.uhpubyes-
item.validationecoom 2021-
item.fullcitationDI MARTINO, Mariano; ROBYNS, Pieter; Weyts, Winnie; QUAX, Peter; LAMOTTE, Wim & ANDRIES, Ken (2019) Personal Information Leakage by Abusing the GDPR 'Right of Access'. In: Proceedings of the Fifteenth Symposium on Usable Privacy and Security, USENIX,p. 371-386.-
item.contributorDI MARTINO, Mariano-
item.contributorROBYNS, Pieter-
item.contributorWeyts, Winnie-
item.contributorQUAX, Peter-
item.contributorLAMOTTE, Wim-
item.contributorANDRIES, Ken-
item.accessRightsOpen Access-
item.fulltextWith Fulltext-
Appears in Collections:Research publications
Files in This Item:
File Description SizeFormat 
Revised_GDPR_paper.pdfPeer-reviewed author version1.92 MBAdobe PDFView/Open
soups2019-di_martino.pdf
  Restricted Access
Published version3.28 MBAdobe PDFView/Open    Request a copy
Show simple item record

WEB OF SCIENCETM
Citations

9
checked on May 2, 2024

Page view(s)

128
checked on Sep 7, 2022

Download(s)

34
checked on Sep 7, 2022

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.