Imagine walking into a high-security vault, only to find that every employee uses the exact same physical key. If a stack of cash goes missing, how do you determine who opened the door? This isn't a plot point from a heist movie; it is the digital reality that led the Spanish Data Protection Agency (AEPD) to slap Unicaja Banco with a €400,000 fine.
At the heart of this case is a fundamental breakdown in what we call access control. In the world of cybersecurity, access control is the digital bouncer that decides who gets to see what. For Unicaja, the bouncer was essentially asleep at the post, allowing multiple operators to access sensitive video surveillance footage using shared, generic credentials.
When the AEPD investigated the bank’s surveillance practices, they discovered a systemic vulnerability. Instead of each security officer having a unique username and password—a practice known as nominative accounts—the bank relied on shared logins. From a regulatory context, this is a cardinal sin. If five people use the login 'Security_Admin,' the bank loses all traceability.
Traceability is the breadcrumb trail that allows an organization to reconstruct who accessed personal data, when they did it, and what they looked at. Without it, the bank couldn't prove that the people watching the cameras were authorized to do so at that specific moment. Under the GDPR, data is a toxic asset if not handled with extreme care; video footage of citizens is particularly sensitive because it captures behavior, movement, and identity in public and private spaces.
One of the most interesting facets of this ruling is how it handles the relationship between a 'Data Controller' (the bank) and its 'Data Processor' (the external security firm). In plain English, the Controller is the boss who decides why data is collected, and the Processor is the contractor hired to do the actual work.
Unicaja argued that the security firm was responsible for the technical implementation of the surveillance system. However, the AEPD wasn't buying it. In the eyes of the law, the Controller is the captain of the ship. You can delegate the task of steering, but you cannot delegate the responsibility for staying on course. Unicaja failed to supervise its processor, essentially signing a contract and then looking the other way while the contractor used outdated, insecure login methods.
This €400,000 penalty serves as a stern reminder that compliance is not a 'set it and forget it' task. It is a continuous process of navigation. The AEPD has given Unicaja three months to overhaul its entire approach to video security. This isn't just about changing passwords; it’s about rebuilding the foundation of their privacy architecture.
To become compliant, the bank must implement several robust measures:
As someone who spends my days dissecting data breaches and regulatory filings, I see this pattern frequently. Organizations often view privacy as a bureaucratic hurdle rather than a fundamental human right. They invest millions in physical vaults but leave the digital 'back door' propped open with a shared password written on a sticky note.
In my own work, I treat every piece of data like Uranium. It’s powerful and necessary, but if you don't have the right shielding and containment protocols, it will eventually leak and cause significant damage. For Unicaja, the leak wasn't a hacker from across the globe; it was a systemic failure to respect the digital footprints of their own employees and customers.
Whether you run a small business or a multinational corporation, the Unicaja case offers actionable lessons for staying on the right side of the law:
Ultimately, privacy by design is the foundation of a house. If the foundation is cracked—if you can't even say for certain who is looking at your data—the entire structure is precarious.
Sources
Disclaimer
This article is provided for informational and journalistic purposes only. It does not constitute legal advice. For specific guidance on complying with privacy regulations, please consult with a qualified legal professional.



Our end-to-end encrypted email and cloud storage solution provides the most powerful means of secure data exchange, ensuring the safety and privacy of your data.
/ Create a free account