Customer Compensation Claim Follows The EasyJet Hack

EasyJet announced on the 19th May, 2020 that sensitive personal data of 9 million travellers had been exposed in a data breach.  Despite notifying the UK’s Information Commissioner’s Office of the breach in January 2020, EasyJet waited four months to notify its customers. It said email addresses and travel details had been stolen and that 2,208 customers had also had their credit and debit card details "accessed".

International law firm PGMBM have issued a class action claim in the High Court of London on behalf of EasyJet customers impacted by the data breach, with a potential liability of £18billion, or £2,000 per customer who was impacted. Under Article 82 of the EU General Data Protection Regulation (GDPR), customers have a right to compensation for inconvenience, distress, annoyance and loss of control of their personal data.

PGMBM have issued the claim on behalf of impacted customers, having been contacted by numerous affected people when the data breach was made public.

The law firm have instructed a litigation team comprising some of the most renowned specialst commercial lawyers in the UK.
A spokesman for PGMBM said: “This is a monumental data breach and a terrible failure of responsibility that has a serious impact on EasyJet’s customers....This is personal information that we trust companies with, and customers rightly expect that every effort is made to protect their privacy."

Affected EasyJet customers from around the world can join the claim on a 'no-win, no-fee basis' via a landing page set up by for them by the prosecuting law firm at www.theeasyjetclaim.com. They may be entitled to £2,000 or more each in compensation.

British Airways announced that the personal details of more than half a million of its customers had been stolen by hackers in September 2018. Initially it said that only 380,000 transactions were affected and that the data did not include travel or passport details.

The ICO later issued a record £183m fine over the breach. Compensation pay-outs to customers could see that reach £3bn. Under GDPR (General Data Protection Regulation), if EasyJet is found to have mishandled customer data, it could face fines of up to 4% of its annual worldwide turnover.

PGMGM EasyJet Claim:    Essex Gazette:     Guardian:       BBC:      

You Migh Also Read: 

The BA Hack And How Not To Respond To A Cyber Attack:


 

 

« Do Not Underestimate Iran’s Cyber Threat
The Leading AI Cyber Security Firms (Part 1) »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

iXsystems

iXsystems

iXsystems is a leader in Open-Source enterprise server and storage solutions including Backup & Recovery to protect critical data.

Australian Information Security Association (AISA)

Australian Information Security Association (AISA)

AISA champions the development of a robust information security sector by building professional capacity and advancing the cyber security of the public, business and governments in Australia.

Digital Infrastructure Association (DINL)

Digital Infrastructure Association (DINL)

DINL is the leading representative for companies and organisations which are active within the Dutch digital infrastructure sector.

Purple Security

Purple Security

Purple Security arises from the association of specialists in offensive security (ethical hackers, white hats) and experts in insurance, compliance and implementation of industry standards.

Flipside

Flipside

Information Security training provider specialized in personalized training and security awareness campaigns.

Crypto Quantique

Crypto Quantique

Crypto Quantique's ground-breaking technology radically simplifies the process of generating a hardware root of trust in an IoT device.

Salient Law

Salient Law

Salient Law is a virtual law firm that specialises in advising providers and users of technology on contracts involving technology.

Authomize

Authomize

Authomize aggregates identities and authorization mechanisms from any applications around your hybrid environment into one unified platform so you can easily and rapidly manage and secure all users.

ADL Consulting

ADL Consulting

ADL Consulting provide information security-related consultancy and training support to businesses across the UK. Our services include ISO27001, GDPR, Cyber Essentials and training.

MorganFranklin Consulting

MorganFranklin Consulting

MorganFranklin Consulting is a management advisory firm that works with businesses and government to address complex and transformational technology and business objectives including cybersecurity.

Mitiga

Mitiga

Mitiga uniquily combines the top cybersecurity minds in Incident Readiness and Response with a cloud-based platform for cloud and hybrid environments.

Binare

Binare

Binare empowers companies all over the world to improve their IIot/IoT /Embedded cybersecurity posture and digital privacy.

ERCOM

ERCOM

Ercom, a subsidiary of the Thales Group, is a French company known for its mobility security solutions.

SecureFlag

SecureFlag

SecureFlag is dedicated to enhancing secure coding across all technical profiles within the Software Development Lifecycle.

SGNL

SGNL

SGNL redefines identity-first security by integrating business context, closing critical gaps, and transforming how enterprises manage privileged access for a secure, adaptive future.

Datacom

Datacom

Datacom design, build and run IT systems and processes across operations, cybersecurity, cloud, digital platforms, payroll and enterprise applications.