Customer Compensation Claim Follows The EasyJet Hack

EasyJet announced on the 19th May, 2020 that sensitive personal data of 9 million travellers had been exposed in a data breach.  Despite notifying the UK’s Information Commissioner’s Office of the breach in January 2020, EasyJet waited four months to notify its customers. It said email addresses and travel details had been stolen and that 2,208 customers had also had their credit and debit card details "accessed".

International law firm PGMBM have issued a class action claim in the High Court of London on behalf of EasyJet customers impacted by the data breach, with a potential liability of £18billion, or £2,000 per customer who was impacted. Under Article 82 of the EU General Data Protection Regulation (GDPR), customers have a right to compensation for inconvenience, distress, annoyance and loss of control of their personal data.

PGMBM have issued the claim on behalf of impacted customers, having been contacted by numerous affected people when the data breach was made public.

The law firm have instructed a litigation team comprising some of the most renowned specialst commercial lawyers in the UK.
A spokesman for PGMBM said: “This is a monumental data breach and a terrible failure of responsibility that has a serious impact on EasyJet’s customers....This is personal information that we trust companies with, and customers rightly expect that every effort is made to protect their privacy."

Affected EasyJet customers from around the world can join the claim on a 'no-win, no-fee basis' via a landing page set up by for them by the prosecuting law firm at www.theeasyjetclaim.com. They may be entitled to £2,000 or more each in compensation.

British Airways announced that the personal details of more than half a million of its customers had been stolen by hackers in September 2018. Initially it said that only 380,000 transactions were affected and that the data did not include travel or passport details.

The ICO later issued a record £183m fine over the breach. Compensation pay-outs to customers could see that reach £3bn. Under GDPR (General Data Protection Regulation), if EasyJet is found to have mishandled customer data, it could face fines of up to 4% of its annual worldwide turnover.

PGMGM EasyJet Claim:    Essex Gazette:     Guardian:       BBC:      

You Migh Also Read: 

The BA Hack And How Not To Respond To A Cyber Attack:


 

 

« Do Not Underestimate Iran’s Cyber Threat
The Leading AI Cyber Security Firms (Part 1) »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Gigamon

Gigamon

Gigamon provides intelligent Traffic Visability solutions that provide unmatched visbility into physical & birtual networks without affecting the performance or stability of production environments.

ForeScout Technologies

ForeScout Technologies

ForeScout delivers pervasive network security by allowing organisations to continuously monitor & mitigate security exposures & cyberattacks.

FIRST Conference

FIRST Conference

Annual conference organised by the Forum of Incident Response and Security Teams (FIRST), a recognized global leader in computer incident response.

Hillstone Networks

Hillstone Networks

Hillstone Networks offers a broad range of security solutions for enterprises and data center networks – whether physical, virtual, or in the cloud.

Veriato

Veriato

Veriato develops intelligent solutions that provide companies with visibility into the human behaviors and activities occurring within their network, making them more secure and productive.

XM Cyber

XM Cyber

XM Cyber is a leading hybrid cloud security company that’s changing the way innovative organizations approach cyber risk.

Cyber Science

Cyber Science

Cyber Science is the flagship conference of C-MRiC, focusing on pioneering research and innovation in Cyber Situational Awareness, Social Media, Cyber Security and Cyber Incident Response.

Boxphish

Boxphish

Boxphish provides a proven solution to reduce Human Error and Cyber Human Risk via automated learning journeys and intelligent phishing simulations.

AirDroid Business

AirDroid Business

AirDroid Business is an efficient mobile device management solution for Android devices, helping businesses to remotely control and access devices in large quantities using a centralized approach.

Gem Security

Gem Security

Gem is on a mission to help security operations evolve into the cloud era, and stop cloud threats before they become incidents.

Omega Systems

Omega Systems

Omega Systems is a leading managed service provider (MSP) and managed security service provider (MSSP) to mid-market organizations.

TAFEcyber

TAFEcyber

TAFEcyber is an Australian based consortium focusing on the skilling of the fast-growing cyber security workforce through education and training.

Zeus Cloud

Zeus Cloud

Zeus Cloud provide clients with world-class web hosting services to businesses both big and small.

M7 Services

M7 Services

M7 Services are a comprehensive Managed Services Provider (MSP) with a focus on delivering cutting-edge information technology solutions and unparalleled customer service.

CyVent

CyVent

CyVent helps you select the right cybersecurity solutions at the right price for your unique situation, without the need to invest endless time evaluating the ever-evolving options.

Keystrike

Keystrike

Keystrike secures remote connections. Our technology ensures that commands made by an employee were physically made on their computer, rather than by a remote attacker.