FeaturedOpinion

What does the TSTT breach mean for customers?

2 Mins read

Above: Rishi Maharaj.

Data protection consultant Rishi Maharaj on the TSTT Breach

From a Data Protection standpoint (which we don’t have but other countries in the region have adopted) there are several areas of concern.

Timing of the Disclosure: TSTT mentions that they became aware of the cyber-attack on October 9th, 2023. The gap between the attack and public disclosure appears to be significant, which could be concerning under Data Protection principles, especially as people’s personal data was comprised. From a data Protection perspective, reports should be made to a regulator within a specific time frame, namely 3 to 5 days and individuals must be informed, but alas we have no laws that place these requirements on companies here.

Nature of the Data: The breach reportedly includes customer lines, ID scans, and database dumps. ID scans can be considered as sensitive data, and its exfiltration poses significant risks for identity theft and fraud.

Assertion of ‘No Loss or Compromise’: TSTT states that there was “no loss or compromise of customer data”. However, considering the purported evidence available on the dark web, this claim may appear to contradict the presented data by RansomEXX. Under Data Protection best practice, transparency and accuracy in communication are critical.

Data Volumes and Relevance: TSTT points out that its platforms generate terabytes of data, possibly attempting to downplay the significance of the purported 6GB of exfiltrated data. While this might be accurate in the context of total data volume, GDPR focuses on the quality and sensitivity of data, not quantity. The sheer number of affected customers and the types of data involved make this breach significant.

In light of the recent cyber-attack on TSTT, their statement raises several concerns from a Data Protection perspective. The delayed disclosure, and the apparent contradiction between their claims and evidence presented by the hackers are alarming.

While TSTT’s proactive response in securing their systems is commendable, the nature of the data involved—especially the ID scans—poses a significant risk.

TSTT’s emphasis on the vast amounts of data they handle might be an attempt to downplay the breach’s gravity. However, from a Data Protection standpoint, it’s not the volume but the sensitivity and relevance of the data that counts. The situation underscores the need for transparent, accurate, and prompt communication in the face of security breaches.

Again, it places the need for revised legislation not only from a Data Protection perspective but also a cyber crime perspective to provide for an independent regulator and also to empower TT CSIRT with the ability to independently act and ensure accuracy and timely release of information and investigations and also to hold companies honest and accountable.

About Rishi Maharaj

Rishi Maharaj is a graduate of the University of the West Indies with a BSc. and MSc. in Government. He is a Certified Information Privacy Manager and provides consultancies through Privicy Advisory Services which assists organizations through data expansion and digital transformation, emphasizing the reduction of compliance burdens.

With over 15 years in the public and privacy sectors, he offers deep insights into government workings and the challenges of digital transformation. Notably, Rishi spearheaded the finalization and partial proclamation of Trinidad and Tobago’s Data Protection Act in 2011 and contributed to international model data protection legislation.

In the private sector, he helps businesses to align with GDPR and regional data protection standards, using compliance as a unique differentiator to boost organizational value and foster trust and engagement. He is a member of both the Canadian Institute of Access and Privacy Professionals and the International Association of Privacy Professionals.

Related Posts…

Ghost women in AI? Hardly!

Ghost women in AI? Hardly!

"When I first came out of university a million years ago, everybody was like, why build something here? Just take what's in Europe, lift and shift. That has been the...
Read More
Who will ride the digital rails? The challenge of inclusion

Who will ride the digital rails? The challenge of inclusion

A cheque written on one branch of a commercial bank takes four working days to clear at another branch of the same bank. Cheques between two different banks take longer.
Read More
Why Digital Identity is more than an ID card

Why Digital Identity is more than an ID card

Digital identity is not chiefly a technology problem. It is a trust problem expressed through technology.
Read More
What a 1956 shipping revolution can teach us about GovTech

What a 1956 shipping revolution can teach us about GovTech

Fragmented storage was not a security feature. It was a vulnerability. The databases had been safe only by virtue of being useless to each other.
Read More
IShowSpeed: Here and gone

IShowSpeed: Here and gone

Watkins has 53 million subscribers on YouTube and his Trinidad and Tobago visit alone clocked 4.8 million views for a five hour and 47 minute stream.
Read More
Digital Public Infrastructure is the most important thing you’ve (probably) never heard of

Digital Public Infrastructure is the most important thing you’ve (probably) never heard of

The expertise and learnings from building India’s digital stack did not remain in India.
Read More
How TT journalists can turn modern media realities to advantage

How TT journalists can turn modern media realities to advantage

The faceless, anonymized journalist adhering to a house style holds little value for this next generation audience.
Read More
VerifyTT lays a foundation stone for digital identity

VerifyTT lays a foundation stone for digital identity

Regardless of the geography, the size of the country, the size of the government, and the level of development, governments are designed to work in a fragmented way by default.
Read More
NPICTT launches free CitizenTT AI service

NPICTT launches free CitizenTT AI service

Access is granted through a website that sets up the messaging for each user and the entire process takes around five minutes.
Read More
Planning a comfortable and safe workspace

Planning a comfortable and safe workspace

Practical choices in layout, climate control, lighting, materials, and maintenance create a comforting environment that lasts.
Read More
Ghost women in AI? Hardly! Ghost women in AI? Hardly!
Who will ride the digital rails? The challenge of inclusion Who will ride the digital rails?...
Why Digital Identity is more than an ID card Why Digital Identity is more than...
What a 1956 shipping revolution can teach us about GovTech What a 1956 shipping revolution can...
IShowSpeed: Here and gone IShowSpeed: Here and gone
Digital Public Infrastructure is the most important thing you’ve (probably) never heard of Digital Public Infrastructure is the most...
How TT journalists can turn modern media realities to advantage How TT journalists can turn modern...
VerifyTT lays a foundation stone for digital identity VerifyTT lays a foundation stone for...
NPICTT launches free CitizenTT AI service NPICTT launches free CitizenTT AI service
Planning a comfortable and safe workspace Planning a comfortable and safe workspace

🤞 Get connected!

A once weekly email notification of new stories on TechNewsTT. Just that. No spam.

Possible UI Glitch. Click top right corner to dismiss 👉

Get Connected!

A once weekly email notification of new stories on TechNewsTT.

Just that. No spam.

Related posts
BitDepthFeatured

TSTT's payments problem (updated)

6 Mins read
Something seems to have collapsed in what should be an efficient, all-digital payment and verification loop.
FeaturedOpinion

DIY data protection Is costing you more than you think

3 Mins read
When your DIY system misses an update — even once — you can find yourself out of compliance.
Press Releases

NPICTT and TSTT announce strategic national partnership for digital payments and eKYC

3 Mins read
NPICTT now operates as the national payments infrastructure provider, while its Innovation Centre functions as the entry point for certified digital solutions to be rolled out across the public sector.
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

2 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
trackback
2 years ago

[…] Trinidad and Tobago – From a Data Protection standpoint (which we don’t have but other countries in the region have adopted) there are several areas of concern… more […]

trackback
2 years ago

[…] writing at Tech News T&T was data protection consultant Rishi Maharaj, who expressed concerns about the timing of the data […]

×
FeaturedNews Briefs

Updated: TSTT reported hacked by RansomEXX exploit

2
0
Share your perspective in the comments!x
()
x