The Incident (The Plaintext Password Email): On a date in 2024 (***FECHA.1), Free Technologies Excom S.L., a Spanish telecommunications operator providing internet and mobile phone services, sent an email to one of their customers announcing an upgrade to their customer portal. The email, sent in plaintext (unencrypted), contained complete login credentials—both the username and password—for accessing the new customer area. The company had unilaterally changed the customer's password without prior notice and sent the new authentication details via standard, unsecured email.
The Customer Portal's Sensitive Contents: The customer portal in question provided access to highly sensitive personal data including the customer's full name, home address, national identity card number (DNI), phone number, email address, service contracts, invoices, detailed call logs, mobile data consumption records, and potentially banking details. In other words, this was a comprehensive repository of personal and financial information—all protected by nothing more than the username and password that had just been sent in plaintext via email. Critically, the portal lacked two-factor authentication, meaning anyone who intercepted the email could immediately access all of this data using the credentials provided.
The Customer's Immediate Complaint: The customer, clearly knowledgeable about cybersecurity, immediately recognised the severity of this security breach. They sent an email to Free Technologies expressing outrage: "Please never again send credentials with username and password in plaintext email, especially when the username is the DNI and you've arbitrarily changed the password yourselves. The management portal contains my address, phone, DNI, bank account… do you not have a security department or at least common sense?" The customer explicitly called this a "security breach."
The Company's Response (Excuses and Promises): Free Technologies responded within 24 hours (25 April 2024), apologising and claiming the incident was due to "human error" and that they were implementing measures to prevent recurrence. They claimed to have changed the password reset procedure to strengthen security and sent the customer new credentials using the "improved" process. However, this reactive response came only after a customer complained—not as a result of proactive security monitoring.
The AEPD Investigation and Company Defences: When the AEPD opened a formal sanction procedure, Free Technologies mounted an extensive defence arguing:
The Core Ruling (Rejection of All Defences): The AEPD categorically rejected every argument and imposed a €10,000 fine for violating Article 32 GDPR (Security of Processing). The regulator's decisive findings:
On "Human Error": The AEPD ruled that human error does not excuse security failures—it reveals them. Article 32 GDPR specifically requires organisations to implement technical and organisational measures to prevent human mistakes. If an employee can accidentally send passwords in plaintext, your security procedures are inadequate by definition.
On "Obligation of Means": Whilst Article 32 is indeed an obligation of means rather than results, this does not mean companies can ignore foreseeable risks. The AEPD emphasised that sending authentication credentials via unsecured email is a well-known, easily preventable security failure that violates basic cybersecurity principles established since the 1980s.
On "No Harm Occurred": The AEPD firmly stated that Article 32 violations do not require proof of actual damage. The law is violated when adequate security measures are absent, regardless of whether a breach is exploited. The mere exposure of credentials via insecure channels constitutes the infraction.
On Email Security Claims: The AEPD invoked expert guidance from Spain's National Cryptologic Centre (CNN-CERT) demonstrating that standard email protocols (SMTP) are fundamentally insecure, even with extensions like STARTTLS. The regulator concluded that email is never an appropriate channel for transmitting authentication credentials, regardless of what encryption is applied at the transport layer, because:
The Aggravating and Mitigating Factors: The AEPD applied a structured analysis under Article 83.2 GDPR:
Aggravating Circumstances:
Mitigating Circumstances:
The Final Sanction: After weighing these factors against the company's €19.5 million annual turnover, the AEPD imposed a €10,000 fine—a relatively modest sanction intended to be "effective, proportionate, and dissuasive" without being financially crippling for a mid-sized telecommunications provider.
Based on Resolution EXP202406965, here is the comprehensive compliance protocol for any organisation that manages customer accounts, authentication systems, or password resets:
This is the most fundamental rule established by this case, and it brooks no exceptions.
Legal Reality: The AEPD, citing guidance from Spain's National Cryptologic Centre (CNN-CERT), confirmed that email—even with TLS encryption—is inherently unsuitable for transmitting authentication credentials. This is because:
Action: Implement an absolute organisational policy: "Authentication credentials (passwords, PINs, security codes, API keys, access tokens) shall NEVER be transmitted via email under any circumstances." Train all IT staff, customer service representatives, and developers on this rule. Configure automated systems to prevent credential transmission via email.
If you cannot use email, what should you use?
Best Practice Methods (In Order of Security):
Option 1: Password Reset Links (Recommended)
Option 2: Secure Customer Portal with Authentication
Option 3: SMS One-Time Codes (With Caveats)
Option 4: In-Person or Phone Verification
What NOT to Do:
Free Technologies' "human error" defence failed because they had no systems to prevent such errors.
Technical Safeguards:
Email Content Filtering:
Template Lockdown:
Developer Code Reviews:
Action: If Free Technologies had implemented email content filtering, an employee attempting to send the plaintext password would have been automatically blocked and alerted to use the secure password reset link instead.
Free Technologies unilaterally changed a customer's password without notice and emailed the new password. This is wrong on multiple levels.
Secure Password Reset Protocol:
Step 1: User-Initiated Reset Only
Step 2: Multi-Factor Identity Verification
Step 3: Secure Reset Link Delivery
Step 4: User Creates New Password
Step 5: Confirmation and Security Notifications
Action: NEVER allow customer service staff or administrators to view, create, or transmit passwords on behalf of users. Passwords should be system-generated hashes that only the user ever sees.
The customer explicitly noted that the portal lacked multi-factor authentication, amplifying the risk of the plaintext password email.
Legal Requirement: Whilst Article 32 GDPR does not explicitly mandate 2FA, the AEPD's ruling makes clear that for portals containing extensive personal and financial data (addresses, DNI numbers, bank details, call logs), username/password alone is inadequate security.
Implement 2FA Immediately For:
2FA Methods (In Order of Security):
Action: Free Technologies should have implemented 2FA before migrating customers to the new portal. The combination of emailed passwords + no 2FA created a perfect storm of vulnerability.
Free Technologies repeatedly claimed this was a one-time human mistake. The AEPD rejected this entirely.
AEPD Position: Article 32 GDPR requires organisations to implement measures precisely to prevent human error. If your security depends on employees never making mistakes, your security is inadequate.
Organisational Measures Required:
Action: Document your security measures and prove they are actually implemented through training records, access logs, and audit reports. The AEPD will not accept claims of "we have good security" without evidence.
Free Technologies argued that because no unauthorised access occurred, no violation should be found. The AEPD rejected this comprehensively.
Legal Principle: Article 32 GDPR is violated when adequate security measures are absent, regardless of whether a breach is exploited. The law is preventive, not reactive.
Analogy: It's like arguing "I drove drunk but didn't crash, so I shouldn't be fined." The violation is driving whilst impaired (inadequate security), not necessarily causing an accident (actual data breach).
Action: Do not wait until a data breach occurs to implement security measures. The legal obligation is to prevent breaches through proactive security, not merely respond after damage is done.
Free Technologies listed various email security technologies (TLS, encryption, access controls) as evidence of compliance. The AEPD was unmoved.
AEPD Analysis: The regulator cited the National Cryptologic Centre's technical guidance explaining that:
Conclusion: No amount of email security makes it appropriate for transmitting passwords. Use secure password reset links instead.
To Free Technologies' credit, they responded within 24 hours of the customer's complaint. However, this was reactive, not proactive.
Proper Incident Response Protocol:
Within 24 Hours:
Within 72 Hours:
Within 30 Days:
Action: Free Technologies' response was reasonably quick, which likely reduced the fine. However, their lack of proactive monitoring meant they only discovered the problem when a customer complained.
The AEPD imposed a €10,000 fine for a company with €19.5 million annual revenue—approximately 0.05% of turnover.
Why This Amount?
Aggravating Factors:
Mitigating Factors:
Alternative Sanctions Considered:
Lessons: The fine was significant enough to be "effective, proportionate, and dissuasive" (Article 83.1 GDPR) but not crippling. However, companies with worse facts (multiple affected customers, prior violations, delayed response, non-cooperation) could face fines 10-20 times higher.
This case establishes that emailing passwords in plaintext is a per se violation of Article 32 GDPR, regardless of email encryption technologies, lack of actual harm, or claims of "human error." Telecommunications companies and any organisation managing customer portals must implement secure password reset protocols using time-limited links, prohibit credential transmission via email through technical controls, and deploy two-factor authentication for portals containing sensitive personal data. The AEPD's rejection of the "human error" and "no harm" defences signals that Article 32 GDPR imposes strict liability for inadequate security measures—companies cannot escape sanctions by claiming employees made isolated mistakes or that breaches were not exploited. Fines for security violations start at €10,000 for single-customer incidents and scale dramatically with the number of affected individuals and severity of negligence.
Informational Purposes Only: The content provided by ANRO DIGITAL SOLUTIONS S.L.U. (including resolution summaries, infographics, and case analyses) is for educational and informational purposes only.
No Legal Advice: This information does not constitute legal advice, a formal legal opinion, or a substitute for professional legal counsel. The interpretation of data protection laws (including the GDPR, LOPDGDD, and AEPD resolutions) is subject to change and can vary based on specific facts and circumstances.
No Liability: ANRO DIGITAL SOLUTIONS S.L.U. assumes no responsibility or liability for any actions taken, or not taken, based on the information provided on this website. While we strive for accuracy, we make no guarantees regarding the completeness or timeliness of the information.
Consult a Professional: Data protection compliance is a complex legal requirement. You should not act upon this information without seeking advice from a qualified Data Protection Officer (DPO) or a specialist data protection lawyer licensed to practice in your jurisdiction.
Third-Party Links: Links to official AEPD documents are provided for convenience. We are not responsible for the content or availability of these external government portals.
Este resumen tiene carácter meramente informativo. Para más información, consulte nuestro Aviso Legal.