AEPD (Spain) - EXP202205206: Difference between revisions

From GDPRhub
mNo edit summary
 
Line 63: Line 63:
}}
}}


The DPA fined a controller € 3,500,000 after it failed to conduct an adequate risk assessment, overlooking avoidable security vulnerabilities that resulted in a data breach affecting 1,350,000 data subjects.
The DPA fined a controller €3,500,000 after it failed to conduct an adequate risk assessment, overlooking avoidable security vulnerabilities that resulted in a data breach affecting 1,350,000 data subjects.


== English Summary ==
== English Summary ==
Line 79: Line 79:


=== Holding ===
=== Holding ===
The AEPD found that the controller violated [[Article 5 GDPR#1f|Articles 5(1)(f)]] and [[Article 32 GDPR|32 GDPR]], imposing a fine of € 3,500,000.  
The AEPD found that the controller violated [[Article 5 GDPR#1f|Articles 5(1)(f)]] and [[Article 32 GDPR|32 GDPR]], imposing a fine of €3,500,000.  


It began by rejecting the controller’s request for joinder, finding that even though there was a common security incident, the cases involve distinct breaches of different sets of personal data.  
It began by rejecting the controller’s request for joinder, finding that even though there was a common security incident, the cases involve distinct breaches of different sets of personal data.  

Latest revision as of 09:29, 24 April 2024

AEPD - EXP202205206
LogoES.jpg
Authority: AEPD (Spain)
Jurisdiction: Spain
Relevant Law: Article 5(1)(f) GDPR
Article 32 GDPR
Type: Investigation
Outcome: Violation Found
Started: 15.03.2022
Decided: 07.02.2024
Published:
Fine: 3,500,000 EUR
Parties: I-DE Redes Eléctricas Inteligentes, S.A.U.
National Case Number/Name: EXP202205206
European Case Law Identifier: n/a
Appeal: Unknown
Original Language(s): Spanish
Original Source: AEPD (in ES)
Initial Contributor: lm

The DPA fined a controller €3,500,000 after it failed to conduct an adequate risk assessment, overlooking avoidable security vulnerabilities that resulted in a data breach affecting 1,350,000 data subjects.

English Summary

Facts

On 15 March 2022, I-DE Redes Eléctricas Inteligentes, S.A.U. (the controller) detected an attack on its GEA management portal (GEA portal), which is a web portal that manages service connections between the electric distribution network. At that point, the controller had yet to detect any effect on personal data.

The following day (16 March), a brute force attack was made against the same webpage, resulting in a general slowdown. The controller adopted security measures in order to repel the attack. The controller analysed the attack’s activity and concluded that it has extracted the personal data of 1.35 million clients. The breached data included names, surnames, email addresses, phone numbers, addresses, national identification card numbers and client codes. On 18 March 2022, the controller notified the breach to the AEPD.

The controller is Iberdrola's energy distribution brand. Spanish law concerning the electricity sector requires that regulated activities (such as distribution of electricity) and unregulated activities (such as marketing) be unbundled. In accordance with such law, the controller stated that it could only access the personal data of users of its electric service. It thus claims that it does not have access to the data of data subjects managed by other distribution companies.

Despite this separation, the controller communicated the breach to other companies of the Iberdrola group on 28 March 2022, noting that it could have affected information referring to clients of these companies. The controller included internal codes corresponding to the affected clients so that the companies could verify if those clients’ data had been compromised. Two companies, Iberdrola Clientes, S.A. and Curenergía Comercializador de Ultimo Recurso SA, subsequently reported to the AEPD that personal data of 92,550 and 1,515,000 clients was affected, respectively. Due to the numerous companies affected, the AEPD initiated investigations into four entities.

The controller requested that its case be joined with the AEPD’s investigation of Iberdrola (EXP202305587). It noted that the attack on its GEA portal was the common security incident that prompted both cases. With regard to the data breach and its security measures, the controller stated that had adopted the totality of security measures established by Iberdrola. It also argued that there had been no harm to the data subjects as a result of the breach.

Holding

The AEPD found that the controller violated Articles 5(1)(f) and 32 GDPR, imposing a fine of €3,500,000.

It began by rejecting the controller’s request for joinder, finding that even though there was a common security incident, the cases involve distinct breaches of different sets of personal data.

With regard to the violation of Article 32 GDPR, the AEPD considered that the vulnerability resulting in the data breach was foreseeable and avoidable. The controller failed to carry out an appropriate assessment of the risks of harms to data subjects that were inherent in its processing, and it did not account for risks to confidentiality, availability or integrity of the data. Furthermore, the AEPD noted that there were vulnerabilities in the portal that could have been detected prior to the cyberattack, including an inadequate password policy and a failure to limit access to the portal from suspicious IP addresses. The precise details of the vulnerabilities are redacted in the decision, but the AEPD noted that the shortcomings were exploited in the cyberattack and resulted in the breach. It further stated that the vulnerability could have been identified in security assessments, but that the controller had not conducted a security review of its critical applications since 2019 – over two years before the incident. Due to the shortcomings in security measures that resulted in oversights of the GEA portal’s vulnerabilities, the AEPD found the controller violated Article 32 GDPR.

The AEPD also found that the controller violated Article 5(1)(f) GDPR. It focused in particular on the failure to protect confidentiality of the personal data affected. In addition to lacking the security measures discussed above, the controller also did not have technical measures in place, such as pseudonymisation, that corresponded to the detail of the personal data it was regularly processing. The AEPD rejected the argument that none of the data subjects were adversely affected by the breach, emphasizing that the loss of confidentiality is, in of itself, a harm to the fundamental right to data protection.

Comment

The AEPD rejected the controller’s request for joinder with EXP202305587, an investigation against Iberdrola arising out of the same incident. Even though there was a common security incident, the cases involve distinct breaches of different sets of personal data. Indeed, the AEPD considered that the cyberattack was significant not only because it accessed the controller’s database, but because it also accessed the databases of two other Iberdrola companies (Iberdrola Clientes and Curenergía Comercializador de Ultimo Recurso). The different databases are hosted on a system maintained by Iberdrola, which is in charge of all of these companies. As a result of this, there has been a separate sanctioning procedure against Iberdrola focusing on its responsibility as the entity in charge of the processing of Ibercli y Curenergía and exclusively for the breach of personal data that affected those two companies. In this sense, the AEPD concluded, the impact on personal data of clients hosted in databases other than the controller’s cannot be part of the sanctioning procedure, which is meant to examine the conduct specifically of the controller.

Further Resources

Share blogs or news articles here!

English Machine Translation of the Decision

The decision below is a machine translation of the Spanish original. Please refer to the Spanish original for more details.

1/88








      File No.: EXP202205206



                      - RESOLUTION OF SANCTIONING PROCEDURE


From the procedure instructed by the Spanish Data Protection Agency and based
to the following



index

BACKGROUND................................................. .................................................. .......3
   FIRST................................................. .................................................. ...............3

   SECOND................................................. .................................................. ..............4

   THIRD................................................. .................................................. ...............4

   ROOM................................................. .................................................. .................4

   FIFTH................................................. .................................................. ..................4

   SIXTH................................................. .................................................. ....................4
   SEVENTH................................................. .................................................. ................5

   EIGHTH................................................. .................................................. ..................5

      Regulatory framework................................................ .................................................. ...5

      Systems and database architecture. GEA Application.................................7

      Regarding the chronology of the events. Actions taken in order to
      minimize adverse effects and measures adopted for their final resolution.....10

      Regarding the causes that made the gap possible................................................13

      Regarding the affected data................................................. ............................16

      Regarding the treatment manager contract................................................... .18
      Regarding security measures................................................... ....................18

      Regarding communication to those affected................................................... ...........25

      Information on the recurrence of these events and number of analogous events
      events over time.............................................. .......................................26

   NINETH................................................. .................................................. ...............26

   TENTH................................................. .................................................. ................26

   ELEVENTH................................................ ...................................................27

   TWELFTH................................................ ................................................29

   THIRTEENTH................................................ ...................................................29
   FOURTEENTH................................................ .................................................. .30

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 2/88








PROVEN FACTS................................................ ................................................30

   FIRST: First notification of personal data breach...................................30

   SECOND: Second notification of personal data breach...................................30
   THIRD: Chronology of the attack................................................ ..................................31

   FOURTH: About the GEA application.............................................. ................................33

   FIFTH: Causes that made the gap possible................................................ ...........3. 4

   SIXTH: Recommended measures................................................ ..................................36

   SEVENTH: immediate measures after the breach................................................... ..............37

   EIGHTH: security measures implemented prior to the incident......38
   NINTH: Risk analysis of the treatment affected by the data breach

   personal................................................ .................................................. .............39

   TENTH: Number of people affected and type of data affected...................................39
   ELEVENTH: Communication to those affected................................................. .....40

LEGAL FUNDAMENTALS................................................. ...................................40

   Competence................................................. .................................................. ........40

   Previous questions................................................ .................................................. .40

   Regarding the request for accumulation and the suspension of the deadline to formulate
   allegations................................................. .................................................. ...........41

   Response to the allegations to the Startup Agreement................................................... ..........43

      FIRST: ON THE ACCUMULATION OF PROCEDURES.................43

      SECOND. – ABOUT THE SPECIAL CIRCUMSTANCES THAT OCCURRED IN
      RELATIONSHIP WITH THE PROCESSING OF THIS FILE AND THE
      VIOLATION OF THE PRINCIPLES OF GOOD FAITH, LEGITIMATE TRUST AND

      LEGAL SECURITY................................................ .......................................44

      THIRD.- ON THE ADDITIONAL AFFECTION OF THE PRINCIPLES OF THE
      SANCTIONAL LAW DERIVED FROM THE INTERPRETATION
      CARRIED OUT BY LAAEPD................................................... ...................................49

      FOURTH.- ON THE ALLEGED VIOLATION BY I- OF THE ARTICLE
      32 OF THE RGPD................................................. .................................................. ......57

      FIFTH. – ON THE ALLEGED DELART INFRINGEMENT. 5.1.F) OF

      GDPR................................................. .................................................. ................63
   Response to the allegations to the Proposed Resolution...................................................68

      SECOND: About the previous acts of the AEPD and the violation of the

      principles of good faith, legitimate trust and legal certainty...................................69
      THIRD: About the arguments supported by the Proposed Resolution

      to consider that bis in idem does not occur................................................. ..............74
C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 3/88








     FOURTH: On the application of the principles of the right to sanctions to
     activity of the AEPD and the concurrence of a media contest................................77

     FIFTH: Regarding the lack of violation by I-DE of article 32 of the RGPD
     .................................................. .................................................. .........................82

     SIXTH: Regarding the absence of violation of the principle of confidentiality and

     integrity................................................. .................................................. ...........92

     SEVENTH: Regarding the violation of the principle of proportionality to the detriment of
     I-DE rights................................................ ................................................96

  Integrity and confidentiality................................................ ...................................102

  Classification of the violation of article 5.1.f) of the RGPD................................................... ..103
  Penalty for violation of article 5.1.f) of the RGPD................................................. ......104

  Article 32 of the GDPR................................................ ................................................105

  Classification of the violation of article 32 of the RGPD................................................. ....110

  Penalty for violation of article 32 of the RGPD................................................. .......111




                                   BACKGROUND



FIRST: On March 18, 2022, the Innovation Division was notified
Technology of this Spanish Data Protection Agency (hereinafter AEPD or the
Agency) a security breach of personal data sent by I-DE REDES
ELÉCTRICAS INTELLIGENTES, S.A.U. with NIF A95075578 (hereinafter, I-DE) as

responsible for the treatment, in which it informs this Agency of the following:

On the afternoon of March 15, 2022, an attack was detected against the information management website.
connections (GEA) of I-DE. (…). At this time, no condition has yet been identified.
personal information. The next day, March 16, a brute force attack is detected

directed against the same target (GEA) as the incident the previous day. It repels
taking action. On March 17, GEA reopens and the activity record is analyzed
and it is concluded that there has been extraction of personal data. It is indicated that the number
affected is 4.5 million clients of this company.

SECOND: On March 29, 2022, I-DE presents a new notification

expanding the information on the security breach reported on the 18th of the same month,
in which he indicates that, after the forensic analysis of the incident, the number of his clients
whose data has been affected is 1.35 million and that the
existence of affected data of clients of other companies of the Iberdrola group, since
that the attacker could potentially have exceeded security conditions

of the exclusive information of I-DE, jumping to ranges of information from other
societies, which has already been transmitted to the Company's Systems management
for a detailed analysis of other conditions in other companies or businesses of the
Iberdrola group.

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 4/88









Likewise, they indicate that the exact start date of the breach is March 7, 2022.
and report that the breach has not yet been communicated to the affected people and

which, at the latest, will be informed by March 31, 2022.

Along with the notification, the following is provided:

       - Report “GEA cyber incident. Incident description and actions”, in which
           describes the attack suffered and also includes the text of the

           communication that will be sent to those affected.

THIRD: dated March 29, 2022, CURENERGIA COMERCIALIZADOR DE
ULTIMO RESOURCE SA, with N.I.F. A95554630 (hereinafter CURENERGÍA) presents
security breach notification, in which it indicates that it was aware of it on 28

March 2022 that it has been affected by the security breach suffered by I-DE,
indicating the violation of the confidentiality of the personal data of 1,550,000
of its clients, whom it has not yet informed but will do so no later than
03/31/2022.

FOURTH: dated March 28, 2022, IBERDROLA CLIENTES, S.A.,

with N.I.F. A95758389 (hereinafter IBERCLI) presents notification of breach of
security, in which it indicates that it has been aware on March 28, 2022 that
has been affected by the security breach suffered by I-DE, indicating the violation
of the confidentiality of the personal data of 85,000 of its clients, to whom
has not yet reported but will do so no later than 03/31/2022.


FIFTH: Since April 2, 2022, they have been presented to this Agency
claims from clients affected by the security incident, which have been
progressively admitted for processing from May 9, 2022.


SIXTH: On April 6, 2022, IBERCLI presents an extension of the notification
gap in which it reports that the people affected by it are 1,515,000 and
that they have been informed of the same on March 31, 2022 by communication
addressed personally to each affected person (postcard, email, SMS or similar).

Along with the notification, the following is provided:


       - Report “Cyberattack incident 03/28/2022. Incident description and
           Actions"
       - Annex Communication to interested parties


SEVENTH: On April 6, 2022, CURENERGÍA presents an extension of the
breach notification in which it informs that the people affected by it are
92,550 and that they have been informed of the same on March 31, 2022 through
communication addressed personally to each affected person (postal, email, SMS or similar).


Along with the notification, the following is provided:

       - Report “Cyberattack incident 03/28/2022. Incident description and
           Actions"

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 5/88









       - Annex Communication to interested parties


EIGHTH: The General Subdirectorate of Data Inspection proceeded to carry out
of previous investigative actions to clarify the facts in
issue, by virtue of the functions assigned to the control authorities in the

article 57.1 and the powers granted in article 58.1 of the Regulation (EU)
2016/679 (General Data Protection Regulation, hereinafter GDPR), and
in accordance with the provisions of Title VII, Chapter I, Second Section, of the

LOPDGDD, having knowledge of the following points:


During these actions, the following entities have been investigated:


    - I-DE REDES ELECTRICAS INTELLIGENTES S.A. with NIF A95075578 (in
       forward, I-DE)

    - IBERDROLA S.A. with NIF A48010615 with address at C/ TOMAS REDONDO,
       1 - 28033 MADRID (MADRID) (hereinafter IBERDROLA)


    - IBERDROLA CLIENTES S.A.U. with NIF A95758389 (hereinafter, IBERCLI)

    - CURENERGIA COMERCIALIZADOR DE ULTIMO RESURSO S.A. with NIF
       A95554630 (hereinafter, CURENERGIA)


Regulatory framework

    - The regulations governing the electricity sector, Law 54/1997, of November 27,
       of the Electrical Sector, imposes an obligation of total separation between the

       regulated activities, such as distribution, and liberalized activities, such as
       marketing.

    - The right that consumers of electrical energy have to access and
       connection to the transportation and distribution networks of electrical energy in the
       Spanish territory is specifically included in Law 24/2013, of 26

       December, from the Electrical Sector.

       Distribution companies and marketing companies are two
       differentiated entities in the field of the Electrical Sector. In this sense the
       Law 24/2013, of December 26, of the Electrical Sector defines them as subjects

       different.

    - In accordance with the regulation of the electrical sector, the consumer, to receive
       electricity at your home, you need to be the holder of two contracts
       differentiated in relation to their point of supply (CUPS):


            On the one hand, the energy purchase contract, “contract of
               supply”, which is signed between a consumer and a company
               electricity marketer.

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 6/88








               Although it is also possible that the consumer acquires the
               electricity directly on the market, without the need for
               marketer, is not typical of natural person clients but of
               large electricity consuming companies, indicate I-DE, IBERCLI
               and CURENERGÍA in their response.

            On the other hand, the network access or distribution or transportation contract,
               “ATR contract”, which the consumer signs with the intermediation
               as agent of the marketing company with which it has
               contracted the purchase of electrical energy.
               Although you can also subscribe directly with the owner company

               of the network, is not typical of natural person clients but of
               large electricity consuming companies, indicate I-DE, IBERCLI
               and CURENERGÍA in their response.

    - When a customer wants to contract electricity at a supply point or
       make any contractual modification, said client goes to a

       marketing company, who on behalf of the client and as his agent
       contracts on its behalf the ATR contract, access contract to the
       distribution.

       Any contractual modification requested by a marketer to a
       distributor is made through XML digital requests complying with the

       exchange formats between agents established by the National Commission
       of Markets and Competition (CNMC), by virtue of the Resolution of 20
       December 2016, which approves the formats of the data files
       exchange of information between energy distributors and marketers
       electricity and natural gas, and Resolution of December 17, 2019, by which

       New formats for information exchange files are approved
       between distributors and marketers and the Resolution of 20 December is modified.
       December 2016.

Taking into account the above:


    - I-DE, electricity distributor of the Iberdrola group, states that
       can only access the data of its clients, that is, users
       of the electrical service whose supply point is within the network
       whose management, as a distributor, corresponds to you and not to those managed by
       other distribution companies.


       In relation to the users of your network, you know the information of the marketer
       of each consumer as a consequence of the signature with him (or with the
       marketer as agent of the consumer) of the ATR contract.

    - I-DE indicates that it would not have the capacity to know any type of information
       related to those who, being clients of IBERCLI or CURENERGIA,

       electric energy marketers of the Iberdrola group in the free market and
       regulated market, respectively, were not of this distributor.

Systems and database architecture. GEA application


C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 7/88








(…)

IBERDROLA indicates that the audit to verify the logical separation of the
access to information by I-DE has its cause in what is established in the
regulatory regulations of the electrical sector, which imposes an obligation of separation

total between regulated activities, such as distribution, and liberalized activities, such as
is marketing, so that distribution companies must prove the
aforementioned separation.

I-DE informs that, annually, it issues a report that is presented to the Ministry
for the Ecological Transition and the Demographic Challenge (MITERD) and the National Commission

of Markets and Competition (CNMC) to account for compliance with the
obligations regarding separation of activities by the companies of the
group formed by Iberdrola España and the companies in which it participates with
regulated activities, that is, the company I-DE REDES ELÉCTRICAS
INTELIGENTES, S.A.U., article 12.2 b) of the Electricity Sector Law and article 14 of the

Code of separation of Activities of the Companies of the Iberdrola Spain Group
with Regulated Activities (“CSA”) available on the Iberdrola Spain website,
during exercise.

    (…)


Regarding the chronology of the events. Actions taken in order to minimize
the adverse effects and measures adopted for their final resolution.

I-D states the following:


    - On March 15, in the afternoon, an attack was detected against the management website
       I-DE attacks, (GEA), the sequence of events being the following:

            (…)


    - On the morning of March 16, 2022, there is a general slowdown
       access to various Iberdrola group websites.

            (…)


    - Starting March 17, 2022:

            (…)
            As of the 17th, no suspicious traffic or impact has been observed in

               none of the Iberdrola group's internet service systems.
            From the analysis of the activity log of the GEA application of the last
               days it is concluded on March 17 that a
               exfiltration, between March 7 and 15, 2022, of
               approximately 4.5 million interested parties (natural persons).

            (…)
            On March 28, 2022, the Systems Directorate communicates to
               IBERCLI and CURENERGIA the existence of a security incident in

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 8/88








               the I-DE systems that could have affected the information referring to
               the clients of these companies and includes information regarding the
               internal customer codes of those affected, so that the companies
               verify whether data corresponding to
               Your clients. Information analyzed by IBERCLI and CURENERGIA

               verify that the security breach has affected personal data of
               clients of said companies.
            (…)

    - Likewise, I-DE states and certifies that since it became aware of the

       incident, the necessary actions were put into practice to, in coordination
       with affected organizations, comply with internal protocols
       established for this purpose and the applicable legislation, and which include the following
       Actions:

            Communication to INCIBE-CERT, National Institute of Cybersecurity in

               Spain, as a response team to security incidents
               Iberdrola reference computing.
            Communication to the Cybernetic Coordination Office, under the
               RDL 12/2018 on security of networks and information systems that

               refers the cybersecurity incident to the National Police for
               investigation,
            Communication to the National Center for Infrastructure Protection
               Criticisms under Law 08/2011 on Infrastructure Protection
               Critics.
            Presentation of a complaint to the National Police (Central Unit

               of Cybercrime) and the document presented by I-DE together with the
               same.
            Notification of the security breach to the AEPD and those affected.


    - In summary, the monitoring systems allowed the detection of a
       abnormal volume of traffic, a traffic analysis activity was launched
       greater detail and the immediate measures that were adopted were:

            (…)


-IBERCLI and CURENERGIA state that the cessation of the incident occurred
even before they were aware that it had affected
personal data referring to its clients, resulting in said cessation of the
additional security measures implemented by the Systems Directorate in the
GEA application, aimed at preventing access to it from

be exfiltrated by entering a random code information from the Database
Data referring to clients of other Group entities.

Regarding the causes that made the gap possible


       - (…)



C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 9/88








Regarding the affected data

    - Exfiltrated customer data (…):

            Name

            Last names
            Email
            Fax

            Telephone
            Address
            NIF/DNI
            Client Code

            (…).

    - (…)

       On March 28, 2022, the Systems Management notifies IBERCLI

       and CURENERGIA the existence of a security incident in the security systems
       I-DE that may have affected the information referring to the clients of these
       companies and includes information referring to internal customer codes
       of those affected, so that the companies verify if they have been able to see
       compromised data corresponding to their clients.
       IBERCLI and CURENERGÍA verify that the security breach has affected

       personal data of 1,515,000 and 92,550 clients, respectively.

Regarding the data processor contract


    - The Group's Framework Agreement for the Protection of Personal Data is provided
       Iberdrola in which the scope of the provision of services to the
       Group companies carried out by IBERDROLA. This agreement has been
       updated in its Annex II, said update being pending
       formalization.


       Likewise, the Declaration of Acceptance of Iberdrola España S.A.U. is provided.
       of its adhesion to the Framework Agreement for the Protection of Personal Data of the
       Iberdrola Group, the aforementioned entity acting, in accordance with what is indicated in the
       second clause, in his own name and right and on behalf of the
       companies belonging to its corporate group over which it has direct or
       indirectly control, among which are I-DE, IBERCLI and

       CURENERGY.

    - IBERCLI and CURENERGIA provide a copy of the record of the activities of
       processing of personal data corresponding to the affected treatments
       through the gap:


            (…)

    - IBERDROLA provides a copy of the records of the treatment activities
       corresponding to the treatments “Support and Maintenance of

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 10/88








       IT Infrastructures” and “Application Development (SWF)”, which is carried out in
       your status as the person in charge of the treatment, with respect to various treatments
       of the Group companies, among which are those affected by the

       security breach.

Regarding security measures

Regarding the risk analysis carried out on the treatment activity that has been

suffered the security breach before the breach occurred:

    - IBERDROLA states in a response letter that the Iberdrola Group has
       adopted a risk analysis methodology for data processing
       personal data that is implemented in an automated way in the company itself.

       corporate tool for recording treatment activities, so that
       In the registration process itself, the risk level of the treatment is determined.

    - In the case of treatments for which IBERDROLA acts as
       person in charge of the treatment, points out that the methodology involves carrying out the
       risk analysis in relation to each of the treatments with respect to

       those for which IBERDROLA holds said condition, so that this analysis is
       developed by the entity responsible for the treatment in collaboration
       with IBERDROLA

    - For this reason, the result of the risk analysis related to the

       specific treatments ***TREATMENT.1 and ***TREATMENT.2 figure
       incorporated into the Records of Treatment Activities of I-DE and those of
       IBERCLI and CURENERGIA, their results having been communicated to
       IBERDROLA.


(…)

-Security measures implemented prior to the gap in treatments
of data where it has occurred:

I-DE, IBERCLI and CURENERGIA indicate in their responses that prior to the

incident, the following common security measures were implemented
to the IT infrastructure of the Iberdrola Group:

    - (…)


Likewise, like IBERDROLA, they also describe the security measures
specific to the GEA system:
    - (…)

Measures adopted to avoid, as far as possible, incidents such as the one that occurred


    - With the data obtained from the cyberattack methodology, (...).

Regarding communication to those affected


C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 11/88








    - I-DE informs the Systems Directorate, on March 28, 2022, that,
       of the information provided regarding the customer codes of those affected
       Due to the gap, only 1.34 million records correspond to

       I-DE clients.

Likewise, it determines that it will proceed to communicate the security breach to the
affected through the communication channels that I-DE maintains with the
themselves. The communications were sent via email; to the
clients whose email address was available to them, through the

making several shipments between March 31 and April 12, 2022; and by
postal mail to the rest between March 30 and April 7, 2022.

    - On March 28, 2022, the Systems Department notifies IBERCLI
       and CURENERGIA the existence of a security incident in the security systems

       I-DE that may have affected the information referring to the clients of these
       companies and includes information referring to internal customer codes
       of those affected, so that the companies verify if they have been able to see
       compromised data corresponding to their clients.

IBERCLI and CURENERGÍA state that after analyzing the information by their respective

systems teams verify that the security breach has affected data
personal of 1,515,000 and 92,550 clients, respectively.

Likewise, they resolve to notify those affected of the security breach. The notification to
those affected was carried out, between March 31 and April 1, 2022, at the

clients whose email address was available, by sending
massive electronic communications; and by postal mail to the rest on the 4th and
April 5, 2022.

    - The three companies provide the communication model sent to those affected

       and it is verified that it complies with what is specified in article 34 of the RGPD.

Information on the recurrence of these events and number of analogous events
events in time.


IBERDROLA states that apart from the security incident that is the subject of this
procedure, no other procedure of a similar nature has occurred.

NINTH: The entity I-DE REDES ELÉCTRICAS INTELLIGENTES, S.A.U. it is a great

company established in 2000, and with a turnover, according to AXESOR
of ***QUANTITY.1 euros in the year 2021 and ***QUANTITY.2 euros in the year 2022.

TENTH: On May 5, 2023, the Director of the Spanish Agency for
Data Protection agreed to initiate sanctioning proceedings against I-DE, in accordance with the

provided in articles 63 and 64 of Law 39/2015, of October 1, of the
Common Administrative Procedure of Public Administrations (hereinafter,
LPACAP), for the alleged violation of Article 5.1.f) of the RGPD and Article 32 of the
GDPR, typified in Article 83.5 of the GDPR and Article 83.4 of the GDPR.



C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 12/88








The aforementioned Startup Agreement was notified in accordance with the rules established in the Law
39/2015, of October 1, of the Common Administrative Procedure of the
Public Administrations (hereinafter, LPACAP).


ELEVENTH: On May 24, 2023, I-DE presents a document by which
requests the accumulation of this file with EXP202305587, as well as the
suspension of the deadline for issuing allegations until it is resolved
about this petition, stating the following:


I-DE understands that the facts that serve as a basis for the exercise of power
sanctioning that the Agency tries to exercise are or have a unique basis that affects
the two sanctioning files that have been opened as differentiated, for
which requests the accumulation of both sanctioning procedures when understanding
that there is a necessary connectivity between them, that is, that it is a

same situation that can result in the responsibility of both. Understand by
I-DE that the terms of said responsibility, total, partial, at the level of author,
collaborator or any other that comes from criminal references can only
be appreciated if the procedure is analyzed as a whole.

I-DE maintains that the lack of accumulation in the present case could imply a

double imputation to two entities of the same facts, which the greater the
many belong to the same business group, specifically the Iberdrola group
of which IBERDROLA is the parent company.

If both files are not consolidated, I-DE states that it would be impossible to determine which

is the degree of responsibility of each of them, since the facts are
would be analyzed separately and without assessing the supposed simultaneous action,
in terms of responsibility, of the two entities against which both
procedures are directed. In this way, a double
imputation of the same facts to both entities without assessing whether or not it is

shared or if the sanctioning reproach directed separately against both does not
should be subject to reduction as a consequence of this supposed concurrence of
responsibility. With this, it is limited, in the terms established in the jurisprudence
constitutional that is reproduced below, the right to defend I-DE, by not
be able to analyze the concurrent circumstances in the case in a unified way as
consequence of the fragmentation caused by the opening of two procedures

differentiated.

I-DE understands that the budgets established in article 57 of the Law are met
39/2015, of October 1, of the Common Administrative Procedure of the
Public Administrations (hereinafter, LPACAP) that justify the accumulation of the

procedures, as well as the individualization of the relevance of their application to the
present assumption:

A) Existence of "intimate connection" or "substantial identity."


I-DE points out that, in the present case, on March 18, 2022, a
personal data security breach, initially reported by I-DE. Is this
same security breach that determines the opening of this procedure


C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 13/88








in which responsibility is attributed to i-DE, as well as that of the one that is intended
accumulate with the present, open to elucidate the responsibility of IBERDROLA.

I-DE indicates that connectivity, in the present case, derives, therefore, from the fact that
It tries to purge responsibility of two legal entities, but for the same fact:

It is the Agency itself that makes it clear that this is a single security breach and
that on it is the one on which, where appropriate, the responsibilities will be based.
subjective opinions of I-DE, in this procedure, and of IBERDROLA in the
procedure whose accumulation is requested.

Therefore, I-DE concludes that, since there are only a few facts for which

responsibility to both i-DE and IBERDROLA, it is evident that it is necessary
the joint assessment of them in order to determine if there is a
joint or separate responsibility of both entities, as well as whether the
responsibility would be by different title in both cases.


B) That the processing and resolution of the procedure corresponds to the same body.

I-DE points out that, together with the previous requirement, the LPACAP imposes respect for
general principle of competence of the body that must issue the resolution, requirement
which is fulfilled in the present case, given that the Law attributes the jurisdiction to
the processing of both procedures to a single sanctioning body, so with

accumulation is not lost or that competence is blurred as a consequence of the
potential existence of different instructional bodies.

In the opinion of I-DE, the essential effect of the accumulation of files is that
all issues to be resolved must be examined in a single procedure and
decided in a single final act that jointly assesses the responsibilities of

all those involved.

I-DE points out that the scheme that has just been analyzed has, without a doubt, characteristics
special in the sanctioning area due to the structure itself and the value judgment that the
itself encloses.


He brings up several Rulings of the Constitutional Court to point out that the
main principles and constitutional guarantees of the criminal order and criminal process
must be observed, with certain nuances, in the administrative procedure
sanctioning system such as the right to be informed of the accusation (SSTC 31/1986,
190/1987, 29/1989) and to use the relevant means of evidence for the defense
(SSTC 2/1987, 190/1987 and 212/1990), as well as the right to the presumption of

innocence (SSTC 13/1982, 36 and 37/1985, 42/1989, 76/1990 and 138/1990), rights
fundamental, all of them that have been incorporated by the legislator into the regulations
regulating the common administrative procedure.

I-DE understands that the fragmentation of the procedure into two procedures

separated substantially affects the determination and verification of the facts
relevant in it, as well as the delimitation of the potential
responsibilities that may correspond to the entities to which the
procedures whose accumulation is requested.


C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 14/88








Therefore, I-DE concludes that accumulation is a requirement of adequate
instruction and the guarantee of the right of defense and that the separate processing
of two disciplinary proceedings against two different legal entities for the same

facts is detrimental to their interests.

I-DE understands that the lack of accumulation in the present case could imply a
double imputation to I-DE and IBERDROLA, as has been said, of the same facts,
without the accumulation allowing us to elucidate what would be the degree of responsibility of
each of them, since the facts would be analyzed separately and without entering

to assess the alleged simultaneous action, in terms of responsibility, of the two
entities against which both procedures are directed.

Understands that maintaining the separation of procedures means in terms
procedural a division of the cause that conditions the instructional action and

of proposal because different instructions, evaluations and tests appear
potentially different and, therefore, criteria that can be, equally,
differentiated.

For all the above, I-DE requests the accumulation of the two aforementioned files and
that the suspension of the deadline for the

formalization of allegations until the accumulation incident that
is raised in accordance with this writing.

Likewise, I-DE understands that, taking into account the nature of the request and the
impact on the investigation of the files in question and, finally, on the law

of defense of the interested parties in both procedures, by substantially affecting the
content of the allegations that I-DE could make in the event that the
mentioned accumulation, with the consequent reduction of their right to judicial protection
effective in its modality of using the means of proof necessary for the
adequate defense of your rights, we expressly request the suspension of the deadline

for the formalization of the allegations so that they can be made
according to the instruction criteria that we are requesting.

Therefore, I-DE requests the suspension of the deadline for formalizing allegations
until the accumulation incident that arises pursuant to the
present writing.


TWELFTH: On May 30, 2023, I-DE presented a written
allegations to the Startup Agreement.

THIRTEENTH: On January 2, 2024, a Proposal for

Resolution, proposing that the Director of the Spanish Agency for the Protection of
Data will be sanctioned to I-DE REDES ELÉCTRICAS INTELLIGENTES, S.A.U. with NIF
A95075578, for a violation of Article 5.1.f) of the RGPD, typified in Article
83.5 of the RGPD, with an administrative fine of 2,500,000 euros (two and a half million
euros) and for a violation of Article 32 of the RGPD, typified in Article 83.5 of the

GDPR, with a fine of 1,000,000 euros (one million euros).




C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 15/88








FOURTEENTH: On January 22, 2024, this Agency receives, in
time and form, letter from I-DE in which it alleges allegations to the proposal of
resolution.


Of the actions carried out in this procedure and the documentation
recorded in the file, the following have been accredited:





                                PROVEN FACTS


FIRST: First notification of personal data breach

On March 18, 2022, I-DE notifies the AEPD of a data breach
personal information in which he reports the following:


(…)

It is indicated that the number of affected people is 4.5 million clients of this company.

Indicates the start date of the gap as March 9, 2022


Indicates the date of detection of the breach, understood as the date on which the
responsible is certain that personal data has been affected: 17 of
March 2022.


SECOND: Second notification of personal data breach

On March 29, 2022, I-DE presents a new notification expanding the
information about the reported personal data breach, through the contribution

from the report “GEA cyber incident. Incident description and actions.” dated 28
March 2022, according to which:

“I-DE, within the provision of services to its clients, offers a web application
called File Management and Connections (GEA): ***URL.1


This service allows customers or their representatives (installers) to carry out the
relevant procedures for the process of a connection to the network. In the course of the
application sessions, there is an exchange of client data information that
is subject to the application's own security filters, so that each

client (or delegated representative) will only be able to access the information that
corresponds to the security and intended access profiles.

It indicates that the number of affected clients of this company is 1,350,000

Indicates the start date of the gap as March 7, 2022




C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 16/88








THIRD: Chronology of the attack

According to I-D, in the report “GEA cyber incident. Incident description and

Actions." dated March 28, 2022” and provided along with the second notification
of personal data breach, as well as in the written response to the request
of information carried out by this AEPD, during the previous actions of
investigation, presented on August 1, 2022 (Registration number:
REGAGE22e00033475096) the chronology of the attack is as follows:


    - “On March 15, in the afternoon, an attack was detected against the information management website.
       I-DE connections, (GEA)

            (…)


    - On the morning of March 16, 2022, there is a general slowdown
       access to various Iberdrola group websites.

            (…)


    - Starting March 17:

            (…)

            As of the 17th, no suspicious traffic or impact has been observed in
               none of the Iberdrola group's internet service systems.
            From the analysis of the activity log of the GEA application of the last
               days it is concluded on March 17 that a
               exfiltration, between March 7 and 15, 2022, of

               approximately 4.5 million interested parties (natural persons).

            (…)
            On March 28, 2022, the Systems Directorate communicates to

               IBERCLI and CURENERGIA the existence of a security incident in
               the I-DE systems that could have affected the information referring to
               the clients of these companies and includes information regarding the
               internal customer codes of those affected, so that the companies
               verify whether data corresponding to

               Your clients. Information analyzed by IBERCLI and CURENERGIA
               verify that the security breach has affected personal data of
               clients of said companies.
            (…)


FOURTH: About the GEA application

Regarding the GEA application, I-DE states:


In the report “GEA cyber incident. Incident description and actions.” dated 28
March 2022:



C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 17/88








-“I-DE, within the provision of services to its clients, offers a web application
called File Management and Connections (GEA): ***URL.1


This service allows customers or their representatives (installers) to carry out the
relevant procedures for the process of a connection to the network. In the course of the
application sessions, there is an exchange of client data information that
is subject to the application's own security filters, so that each
client (or delegated representative) will only be able to access the information that
corresponds to the security and intended access profiles”


-I-DE has a system (SIC) of which GEA is its own and exclusive web service
for the processing of their processes and customer data, with the business teams
and systems responsible for the development, evolution and maintenance of this system,
Likewise, exclusive for I-DE.


-In the “Access Manual for regular clients, GEA”, provided by I-DE, the
methodology for registering a user (Document No. 6 of entry
REGAGE23e00004673128), which indicates that for the development of the
Registering a new user requires an email address
valid and accessible, to which an individualized link is automatically sent

for each user, which allows setting the password for the first access,
thus validating the registration in the application.

-In the written response to the request made by this AEPD, presented with
date February 21, 2023 (Registration number: REGAGE23e00011000318) indicates I-

About what:

(…)

This URL was displayed to validated users at the time of the incident.


IBERDROLA S.A., which provides different services to I-DE and other companies in the
Group, among them, “IT infrastructure support and maintenance” and “Development
of applications”, acting accordingly, as in charge of R-D processing,
in its written response to the information request made by this AEPD
during the period of prior investigations, presented on January 24,

2023 (Registration number: REGAGE23e00004670187), upon request for information
relative to the description of the control and access permissions to the application of each one
of the identified profiles, IBERDROLA responds:

(…)


FIFTH: Causes that made the gap possible


In the “GEA Security Incident Forensic Report Summary”, dated March 23,
2022, provided by I-DE together with its written response to the request made by
this AEPD, presented on August 1, 2022 (Registration number:
REGAGE22e00033475841), it is indicated:

(…)

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 18/88









-I-DE indicates the following:


(…)

-IBERDROLA S.A., which provides different services to I-DE and other companies in the
Group, among them, “IT infrastructure support and maintenance” and “Development
of applications”, acting accordingly, as in charge of R-D processing,
in its written response to the information request made by this AEPD

during the period of prior investigations, presented on January 24,
2023(Registration number: REGAGE23e00004670187), indicates the following:

(…)


SIXTH: Recommended measures

It appears in the document “Summary Forensic Report GEA Security Incident”, of
03/23/2022, provided by I-DE in its letter of 08/1/2022, the following

recommendations:

(…)



SEVENTH: immediate measures after the breach

I-DE, in its written response to the request made by this AEPD,

submitted on February 21, 2023 (Registration number:
REGAGE23e00011000318) indicates:

(…)

IBERDROLA, S.A., in its response to the request for information

carried out by this AEPD during the period of prior investigations, presented in
dated January 24, 2023 (Registration number: REGAGE23e00004670187), attached
as “Document No. 11”, the “Urgent Cybersecurity Plan”. In it it is indicated,
among others, the following measures: Application Security:


(…)

EIGHTH: security measures implemented prior to the incident


Among others, it was contributed:

(…)


NINTH: Risk analysis of the treatment affected by the data breach
personal



C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 19/88








At the request of this AEPD for a copy of the risk analysis on the rights and
freedoms of natural persons carried out on the processing activity that has
suffered the security breach prior to the incident, I-DE provided the scheme

followed within the Iberdrola Group for the assessment of risk in the treatment
of personal data is carried out in accordance with it.

This scheme provides details of certain threats or circumstances such as
“vulnerable groups” “access to personal data by more than 10 people”
“international transfers” “large-scale treatments” “profiles with

legal”. These circumstances are stated as questions and, as answered
“yes” or “no”, a result is applied.

Likewise, it indicates that “Attached as Document No. 8 is an explanatory document of
the logic followed to calculate the risk level according to this methodology.

This methodology is implemented in an automated way in the company itself.
corporate tool for recording treatment activities, so that in the
The registration process itself determines the risk level of the treatment. So, the
application of said methodology in relation to treatment ***TREATMENT.1
resulted in a MEDIUM risk level, as stated in Document No.
7 referred to above.


In said document 8, circumstances or threats are analyzed in the sense of
indicated scheme, which are transferred to the Registry of Treatment Activities.


TENTH: Number of people affected and type of data affected

1,350,000 I-DE clients affected.


Type of data affected:

Name and surname
Email address
Fax number
Phone

Postal address
NIF/DNI
Client code
Company code


ELEVENTH: Communication to those affected

In the written response to the information request made by this AEPD,

during the previous investigation proceedings, presented on August 1,
2022 (Registration number: REGAGE22e00033475096), I-DE states that it has
communicated to those affected the personal data breach, indicating:

       “The aforementioned communications were sent to i-DE clients of whom
       email address was available through this means through

       making several shipments between March 31 and April 12,

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 20/88








       2022, the gap being notified by ordinary mail to the remaining clients between
       on March 30 and April 7, 2022.”









                           FOUNDATIONS OF LAW

                                           Yo

                                     Competence

In accordance with the powers that article 58.2 of Regulation (EU) 2016/679
(General Data Protection Regulation, hereinafter RGPD), grants each

control authority and as established in articles 47, 48.1, 64.2 and 68.1 of the
Organic Law 3/2018, of December 5, on Protection of Personal Data and
guarantee of digital rights (hereinafter, LOPDGDD), is competent to
initiate and resolve this procedure the Director of the Spanish Protection Agency
of data.


Likewise, article 63.2 of the LOPDGDD determines that: "The procedures
processed by the Spanish Data Protection Agency will be governed by the provisions
in Regulation (EU) 2016/679, in this organic law, by the provisions
regulations dictated in its development and, insofar as they do not contradict them, with a

subsidiary, by the general rules on administrative procedures."

                                           II
                                  Previous issues


I-DE is a large company of the Iberdrola Group dedicated to energy distribution
electricity and for this purpose it processes personal data as the person responsible for a
very high number of people since, according to what it states, it processes data of 21 million
Of customers.


Therefore, in accordance with the provisions of article 4.1 of the RGPD, the
processing of personal data, since I-DE carries out, among
other treatments, the collection, conservation, consultation, use, deletion, etc., of
personal data of natural persons, such as: name, surname, ID, address
postal address, telephone number, email address, bank details, data

related to electricity supply and consumption, current account, etc.

Likewise, IBERDROLA S.A. provides different services to I-DE and other companies
of the Group, among them, “IT infrastructure support and maintenance” and
“Application development”, acting accordingly, as in charge of the

I-D treatment.



C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 21/88








In the case at hand, the security breach suffered has affected data
personal data processed by I-DE in its capacity as data controller,
determine the purposes and means with respect to these treatments, under article 4.7

of the GDPR.

Article 4 section 12 of the GDPR broadly defines “violations of
security of personal data” (hereinafter security breach) as “all
those security violations that cause the destruction, loss or alteration
accidental or unlawful personal data transmitted, preserved or otherwise processed

form, or unauthorized communication or access to said data.”

In the present case, there is a personal data security breach in the
circumstances indicated above, categorized as a breach of confidentiality, by
there has been improper access by an unauthorized third party to data

personal data treated by I-DE.




                                           III

Regarding the request for consolidation and the suspension of the deadline to formulate allegations



Regarding the request for accumulation of this file and EXP202305587
carried out by I-DE, it should be noted that article 57 of the LPACAP establishes:

       “The administrative body that initiates or processes a procedure, whichever
       has been the form of his initiation, he may dispose, ex officio or at the request of

       part, its accumulation to others with whom it maintains a substantial or intimate identity
       connection, provided that it is the same body that must process and resolve the
       procedure.
       There will be no appeal against the accumulation agreement.”
       (emphasis is ours)


Therefore, it is a possibility that the Administration has, not being obliged to
proceed with the accumulation if requested. However, this does not prevent
Motivate below the reasons why it has been considered appropriate.
process both sanctioning procedures separately.


Thus, although the two sanctioning files, one directed against I-DE and the other against
IBERDROLA, S.A., start from the same security incident (the attack on the application
GEA), it has produced two different personal data breaches and
differentiated, as reflected in the Factual Background of this
proposal, especially in the Eighth Factual Background, where the

information collected during the phase of prior investigative actions carried out
carried out by this AEPD.

Thus, on the one hand, the attack was initiated through an I-DE web application,
taking advantage of a vulnerability in it and that allowed access to the database
I-DE data and which affected the confidentiality of 1,350,000 I-DE clients. By

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 22/88








Therefore, this sanctioning procedure is directed exclusively at I-DE as
responsible for the processing of the personal data of its clients and as
consequence of an existing vulnerability in one of your web applications.


On the other hand, not only personal data of I-DE was affected in the cyberattack,
but, when accessing the I-DE database, which was hosted in a
system in which databases from other companies in the same group coexist, but
that it was also possible to overcome the logical separation and access the databases
of two other companies, IBERCLI and CURENERGÍA, affecting the confidentiality of

personal data of clients of the latter two. These different databases
different businesses are hosted or run on one maintained and supported system
by the company IBERDROLA, S.A., which, consequently, is in charge of
treatment of all of them, that is, I-DE, IBERCLI and CURENERGÍA.


This fact has led to the initiation of a sanctioning procedure against IBERDROLA,
S.A., but due to its responsibility as the person in charge of processing IBERCLI and
CURENERGÍA and exclusively for the personal data breach that has affected
only to the personal data of the clients of these two companies
marketing companies and only taking into account the responsibility that may have
IBERDROLA, S.A. regarding the configuration of the databases it manages

regarding these two affected companies.

In this sense, this impact on personal data of clients hosted in databases
data other than I-DE cannot be part of this sanctioning procedure directed
exclusively to examine the conduct of I-DE, since it is not responsible for any

the personal data of affected customers that belong to other companies, nor of the
possible failure to adopt appropriate measures for their protection or for the
absolute separation between them. Therefore, it must be analyzed
independent management of the databases carried out by IBERDROLA, S.A. regard
of these third companies, without I-DE being able to respond for possible

breaches of data protection regulations that may have been incurred
those third companies.

This was stated by I-DE in its written response to the request made by this
AEPD, presented on August 1, 2022, in which when requested
information on the data affected by the breach relating to IBERCLI clients and

CURENERGÍA, responded that “I-DE does not have access to the data of the people who
have been affected by the security breach and do not have the condition
of clients of the aforementioned entity as their supply point is not assigned to the
network managed by i-DE. This means that i-DE does not have the capacity to know
any type of information related to those who are clients of IBERCLI or of

CURNERGIA are not from this distributor”

Therefore, the sanctioning procedures being directed at different subjects (two
different companies), the personal data of clients from different companies may be affected.
companies, I-DE having nothing to do with the data of other clients, be processed

due to vulnerabilities or non-compliance with respect to different systems (one,
web application, another a database), etc., which is why it has not been considered
This AEPD accumulates the two files, but processes the two procedures
sanctions separately, as the responsibility is clearly separated

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 23/88








that is attributed to each one, as well as being personal data breaches
different and that affect personal data processed by different controllers.


Likewise, this does not make I-DE defenseless because at all times it knows
the facts of which he is accused, the infringement that they entail, their classification, the
responsibility that has been incurred, as well as that it has had and has the opportunity to
formulate allegations and present whatever documentation it deems appropriate in
defense of your interests permitted by applicable legislation.


Finally, regarding the request for suspension of the deadline to formulate allegations
to the Startup Agreement until a decision is made on the accumulation of the two
procedures, it means that this possibility does not exist even in the applicable regulations
of data protection (RGPD AND LOPDGDD) nor in the LPACAP. On the contrary, in
What this last law establishes is the obligation that the procedures that must

be completed by the interested parties are mandatory:

       “Article 73. Compliance with procedures.
       1. The procedures that must be completed by the interested parties must
       be made within a period of ten days from the day following the notification of the
       corresponding act, except in the case that the corresponding norm states

       set a different deadline.”

Therefore, the request for suspension is not applicable, as this does not legally exist.
possibility, nor has it had any effect, having not been suspended, in
consequently, the deadline for formulating allegations.


                                            IV
                   Response to allegations to the Startup Agreement


In response to the allegations presented by I-DE, the following should be noted:

FIRST: ON THE ACCUMULATION OF PROCEDURES


I-DE reiterates the request for accumulation again and refers to the request presented
to this effect on May 24, 2023.

In this regard, it is appropriate to refer to what was argued in the Legal Basis
above, in which a due answer to this question is given.


SECOND. – ABOUT THE SPECIAL CIRCUMSTANCES THAT OCCURRED IN
RELATIONSHIP WITH THE PROCESSING OF THIS FILE AND THE
VIOLATION OF THE PRINCIPLES OF GOOD FAITH, LEGITIMATE TRUST AND

LEGAL SECURITY

I-DE alleges that this AEPD has violated the principles of legal certainty, good faith
and legitimate trust established in article 3.2 e) of Law 40/2015, of 1
October, of the Legal Regime of the Public Sector (hereinafter LRJSP) since through
writing dated April 18, 2022, from the Technological Innovation Division of the

AEPD, it is indicated, in relation to the additional information provided by I-DE regarding
the personal data breach suffered by her, which “After analyzing the information
C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 24/88








provided, the security breach has been updated in the security log.
notifications of security breaches and the initiation of other actions by
part of this Agency”, but that nevertheless, subsequently and without

no subsequent action until the date of the first information request
that is addressed to you (writing signed on July 8, 2022 by the acting Inspector) of what
which seems to indicate the initiation by the AEPD of investigative actions,
without any agreement or decision in this regard.

I-DE understands that this shows that it was not appropriate to carry out

additional investigation related to the gap since the AEPD when signing the
referred letter of April 18 considered appropriate the statements made
by I-DE, not appreciating in the gap the concurrence of any element that
justify the carrying out of investigative actions aimed at determining whether
had produced an alleged violation of data protection regulations.


However, I-DE continues, the AEPD on May 9, 2022, agrees to admission to
processing of claims (formulated prior to April 18, 2022) and the
initiation of prior investigative actions, but without it being stated in the
file no action or circumstance related to this case that would have
been contributed or occurred in the period between April 18 and the date of

admission to processing and that justifies the start of the same.

Likewise, I-DE understands that the letter of May 18, 2022 implies that the AEPD
considered that the information received from her about the breach was sufficient to
understand that it did not bear any responsibility for an alleged

non-compliance with data protection regulations, which determined the archive
of a file that, however, the AEPD decides to open days later without
there is any indication that implies a substantial change in the nature,
circumstances or severity of the breach. From this I-DE concludes that the AEPD adopted
a decision that directly contradicts the previous one adopted just 20 days ago

before.

Faced with this, it should be noted that in no way can the interpretation
of I-DE of the letter that he received on May 18, 2022. Thus, said letter is signed
generically by the AEPD, comes from the Technological Innovation Division, the
which is responsible for receiving security breaches and recording them in the registry at

effect, and in which the following was indicated:

       “In relation to the additional information provided through check-in
       REGAGE22e00010072289, relating to a personal data breach in a
       treatment of I-DE REDES ELECTRICAS INTELLIGENTES S.A.U. we inform

       that:

       After analyzing the additional information provided, the security breach has
       been updated in the security breach notification log and not
       The initiation of other actions by this Agency is expected.


       However, we remind you of the need to investigate the causes of the incident
       until we understand how and why it has happened, and the obligation to take the
       timely actions to prevent it from happening again and minimize the impact

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 25/88








       potential on those affected, as well as the obligation to document any
       security incident that may affect personal data such as
       facts related to them and the corrective measures provided as and

       as established in article 33.5 of the RGPD.

       If over time you obtain indications that imply a change
       substantial in the nature, circumstances or severity of the breach, may
       make a new complete notification through our electronic office
       https://sedeagpd.gob.es/sede-electronica-web/.


       Likewise, we inform you that in the following link you have at your disposal the
       guide for managing and reporting data security breaches
       personal information published by this Agency:
       https://www.aepd.es/media/guias/1ome-brechas-seguro.pdf”


       The heading includes “TECHNOLOGICAL INNOVATION DIVISION”

       On the left side of the document it is indicated that “Signed electronically by:
       Spanish Data Protection Agency. As of 04/18/2022”


       It is not signed by the Director of the Agency, it has no operative part in
       which something is agreed upon or resolved, nor does it have any indication of any recourse against
       the same.

Therefore, and contrary to what I-DE states, this document does not have a decisive nature, nor

due to its content, which only contains a forecast and which in no way can
understood to mean that this AEPD has assessed and decided that it did not attend I-
OF any responsibility for an alleged breach of the regulations of
data protection, which would mean archiving some actions - as has
wanted to understand I-DE-, nor by its form, since it does not even formally reflect

a decision, much less a resolution to file any action, since
For this to be the case, the only competent body for this is the current Director of the
AEPD. Thus, Article 13 of the AEPD Statute, approved by Royal Decree
389/2021, of June 1, the functions of the Presidency are determined:

    1. The Presidency of the Spanish Data Protection Agency is responsible for:


       d) Issue the resolutions and guidelines required for the exercise of functions
       of the Agency, in particular those derived from the exercise of powers
       provided for in article 57 of Regulation (EU) 2016/679 of Parliament
       European Parliament and of the Council, of April 27, 2016, and the exercise of powers

       of investigation and corrective powers provided for in article 58 of the
       cited Regulation.

Therefore, to proceed with the archiving of investigation proceedings, it is required,
first, that they have been initiated (either because a claim has been admitted for processing,

either on their own initiative, which in both cases requires an express resolution
signed by the Director), which had not happened at the time of issuance of the
aforementioned writing from the Technological Innovation Division and, secondly, it is
necessary again an express resolution on the part of the Director archiving

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 26/88








said actions to understand, now, that from the information collected in said
investigations, the existence of a violation of the regulations of
data protection, which had not occurred.


In the present case, after notification of the personal data breach by
I-DE, several claims were filed by people affected by it, the
which were admitted for processing jointly by the AEPD in compliance with the
article 64 LOPDGDD:


Article 64. Form of initiation of the procedure and duration.

    1.When the procedure refers exclusively to the lack of attention of a
    request to exercise the rights established in articles 15 to 22 of the
    Regulation (EU) 2016/679, will begin by agreement of admission to processing, which will be

    will be adopted in accordance with the provisions of article 65 of this organic law.
    In this case, the period to resolve the procedure will be six months from
    from the date on which the claimant had been notified of the agreement
    admission for processing. After this period, the interested party may consider
    estimated your claim.


    2.When the procedure aims to determine the possible
    existence of a violation of the provisions of Regulation (EU) 2016/679 and in
    This organic law will begin by means of an initial agreement adopted by
    own initiative or as a result of a claim.


    If the procedure is based on a claim made before the Agency
    Spanish Data Protection Authority, in advance, will decide on your
    admission for processing, in accordance with the provisions of article 65 of this organic law.

    When the rules established in article 60 of the

    Regulation (EU) 2016/679, the procedure will begin by adopting the
    draft agreement to initiate the sanctioning procedure, which will be given
    formal knowledge to the interested party for the purposes provided for in article 75 of this
    organic Law.

    The claim is admitted for processing, as well as in cases in which the Agency

    Spanish Data Protection Agency acts on its own initiative, prior to the
    initiation agreement, there may be a phase of prior investigation actions,
    which will be governed by the provisions of article 67 of this organic law.

    Article 67. Previous investigation actions.


    1.Before the adoption of the agreement to initiate the procedure, and once admitted
    processing the claim if there is one, the Spanish Data Protection Agency
    may carry out prior research actions in order to achieve a better
    determination of the facts and circumstances that justify the processing of the

    procedure.




C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 27/88








    The Spanish Data Protection Agency will act in any case when it is
    requires research into treatments that involve massive data traffic
    personal.


    2.Preliminary investigation actions will be subject to the provisions of the
    Section 2 of Chapter I of Title VII of this organic law and may not have a
    duration exceeding twelve months from the date of the admission agreement to
    procedure or the date of the agreement by which its initiation is decided when the
    Spanish Data Protection Agency acts on its own initiative or as

    consequence of the communication that had been sent to him by the authority of
    control of another Member State of the European Union, in accordance with article 64.3 of
    this organic law. (emphasis is ours)

From said regulations it is not inferred in any way that the AEPD has to justify

the way that I-DE requires the initiation of prior actions in the sense that it has
that there is something new or some new circumstance or that the claims have
had to provide new and different circumstances regarding documentation
provided by I-DE in its notification of the breach to this Agency, since this is not
required by the indicated regulations, in addition to the fact that it cannot be claimed that the
affected parties contribute something new, apart from knowing that the

confidentiality of your personal data due to a cyber attack, the circumstances of which
they don't know.

Precisely the previous investigative actions are carried out to clarify the
facts and circumstances of what happened, gathering more information in order to

be able to determine or not the existence of a possible violation of the regulations in
data protection matters. In this sense, the beginning of previous investigations and
its realization, the power of the AEPD with or without claims, does not prejudge anything, but
that allows gathering the necessary information to determine whether or not there are indications of
infringement. Even after said investigation, the proceedings may be archived

to understand, in view of the information collected, that there are no indications of
infringement. Which, in the present case, has not happened.

What the regulations do indicate is that, after the presentation of claims, this
Agency must decide whether to admit them for processing or not, having finally decided on their
admission through, this time, an Admission Agreement for processing, signed by the

Director of the Agency dated May 9, 2022. And, as indicated in article 67.2
referenced LOPDGDD, the AEPD can carry out prior actions of
investigation in order to achieve a better determination of the facts and the
circumstances. It is a power attributed to it by the RGPD and the LOPDGDD.


Likewise, and to make matters worse, even in the event of there being no
claims existed, the document from the Technological Innovation Division did not
nor would it have been an obstacle or obstacle to the exercise of the powers of
investigation that the AEPD has in accordance with the aforementioned article 64.2 that
determines that “The claim is admitted for processing, as well as in the cases in which

The Spanish Data Protection Agency acts on its own initiative, with character
Prior to the initiation agreement, there may be a phase of prior actions of
investigation…"


C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 28/88








Therefore, this sanctioning procedure has not been initiated due to the content or
by some new information provided in the claims, but by the information and
documentation obtained after the period of prior investigation actions, to the
possible violations of protection regulations may be inferred from it.
of data.


Finally, I-DE brings up the Supreme Court ruling of February 22
of 2016 (resource 4048/2013), understanding that it is fully applicable to the case, in the
which is indicated:

       “According to the facts briefly stated, we can consider

       legitimate trust has been injured, since the Administration cannot adopt
       decisions that contravene the perspectives and hopes founded on the
       own previous decisions of the Administration. When you trust the
       stability of his criteria, evidenced in multiple previous acts in a
       same sense, which leads the administrator to adopt certain decisions,

       trust is generated based on the consistency of behavior
       administrative, which cannot be defrauded through an act
       amazing. […]
       It is worth keeping in mind that legitimate trust requires, ultimately, the
       concurrence of three essential requirements. Namely, that it is based on signs
       undeniable and external (1); that the hopes generated in the administered

       they must be legitimate (2); and that the final conduct of the Administration is
       contradictory with previous acts, is surprising and incoherent (3).
       Exactly what happens in the case examined, according to the facts
       previously reported.
       Let us remember that, with respect to legitimate trust, we have been declaring
       reiterated, by all, Judgment of December 22, 2010 (appeal

       contentious-administrative no. 257 / 2009), that << the principle of good faith
       protects the legitimate trust that may have been reasonably placed in
       the behavior of others and imposes the duty of coherence in the
       own behavior. Which is to say that the principle implies the
       requirement of a duty of behavior that consists of the need to
       to observe, with a view to the future, the behavior that previous acts predicted and

       accept the binding consequences that arise from one's own actions
       constituting a case of injury to the legitimate confidence of the parties
       “I will come contra factum propium >>

In this regard, it is meant that the doctrine established therein is not “of
application to the present case, since, as indicated above, it has not been a

decision of this Administration, neither due to its form nor its content, nor has it caused
trust in the stability of his criterion, since there has been no criterion
decisive in this regard, much less evidenced in multiple previous acts in a
same sense, so the action of this Agency in relation to the alleged has not
supposed a final conduct of her that is contradictory with previous acts that

be surprising or incoherent, in the sense of the Court's doctrine.

For the above reasons, the claim made is rejected.



C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 29/88








THIRD.- ON THE ADDITIONAL AFFECTION TO THE PRINCIPLES OF THE
SANCTIONING RIGHT ARISING FROM THE INTERPRETATION MADE
BY LAAEPD


I-DE alleges in this section that the Startup Agreement incurs important
violations of the principles of administrative sanctioning law, since it implies
the imposition of two infractions whose content is, in reality, identical or with respect to
which, at least, it is possible to appreciate the subsumption of one of them in the other:


1.Violation of the non bis in idem principle

I-DE alleges that in the Start Agreement the AEPD considers that the
security implemented by it have not been, in its opinion, adequate and that this
implies a double violation of the RGPD, on the one hand, it understands that I-DE has not

adopted the appropriate technical and organizational measures, required by article 32
of the GDPR; and,
On the other hand, it considers that the principle of security has been violated, allegedly violating
article 5.1 f) of the GDPR, of which article 32 is nothing more than a mere specification.

I-DE understands that this means that two different sanctions are imposed,

respectively, considering that my client lacks the appropriate
security measures and because he understands that it has occurred, due to the lack of such
measures, a breach of confidentiality of personal data. And also,
establishes for both alleged infractions circumstances modifying the
responsibility of I-DE in every point identical, both in its determination and in the

legal basis for its imposition.

I-DE points out that it follows that the AEPD considers that the same fact (the
alleged insufficiency of security measures) would constitute two infractions
of the same protected legal asset (the adequate guarantee of the rights and freedoms

of interested parties). And this, because, on the one hand, the absence of the
security measures that the AEPD considers necessary to adopt and, on the other, the
principle of security and confidentiality, which requires the adoption of such measures.

Therefore, I-DE maintains that, incurring the triple identity of subject, fact and good
protected legal, there is no doubt that the principle of non bis in has been violated

idem, so it would only be possible to charge and punish for a single infraction, which in this
case would only be for article 32, since it would only be possible to appreciate the supposed
insufficiency of security measures.

Faced with this, it is necessary to explain the difference between the violation of art. 5.1.f and the

article 32 of the RGPD, which will be expanded in the following point regarding the allegation
regarding the existence of media competition, as well as the different classification in
sections even different from art. 83 of the GDPR and the different qualification of both
the effects of prescription in the LOPDGDD.


The art. 5.1.f) of the RGPD is violated when there is a loss of confidentiality,
of integrity or availability of personal data due to the absence or deficiency of
measures of any kind.


C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 30/88








This principle only determines the channel through which the
maintenance of confidentiality, integrity or availability when explicit
“through the application of appropriate technical and organizational measures”, which are not

Strictly security.

I-DE indicates that the appropriate technical and organizational measures to which it makes
mention the art. 5.1.f) RGPD are the security measures of art. 32 of the GDPR. This
would be to simplify the essence of the RGPD whose compliance is not limited to the implementation
technical and organizational security measures; would mean, in our case,

reduce the required guarantee through the principle of integrity and confidentiality at your discretion.
achievement only with security measures.

When art. 5.1.f) of the GDPR refers to technical or organizational measures
appropriate to guarantee the rights and freedoms of the interested parties within the framework of

The management of regulatory compliance with the RGPD does so in the sense provided in the
art. 25 of the GDPR regarding privacy by design.

This precept determines that,

       “Taking into account the state of the art, the cost of the application and the

       nature, scope, context and purposes of the processing, as well as the risks of
       varying probability and severity that the treatment entails for the rights and
       freedoms of natural persons, the person responsible for the treatment will apply, both
       at the time of determining the means of treatment as well as at the time
       of the treatment itself, appropriate technical and organizational measures, such as

       pseudonymization, designed to effectively apply the principles of
       data protection, such as data minimization, and integrate safeguards
       necessary in the treatment, in order to comply with the requirements of this
       Regulation and protect the rights of the interested parties” (emphasis is
       our)


It should be noted that there are multiple technical or organizational measures that are not
security and that the person responsible for the treatment can implement as a channel to
guarantee this principle.

However, art. 32 of the GDPR includes the obligation to implement measures

appropriate technical and organizational security measures to ensure a level of
security appropriate to the risk. Of security. Just for security.

Furthermore, its objective is to guarantee a level of security appropriate to the risk.
regardless of whether a security breach has occurred, while

that in the case of article 5.1.f) of the RGPD, availability must be guaranteed,
confidentiality and integrity and materializes, in this case, with the loss of
data confidentiality. As can be seen, the two articles refer to
different behaviors, although they may be related.


Already entering fully into the examination of the non bis in idem, the Court's Judgment
National of July 23, 2021 (rec. 1/2017) provides that,



C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 31/88








“(…) In accordance with the legislation and jurisprudence set forth, the non bis in idem principle
prevents punishing the same subject twice for the same act with support in the
same foundation, the latter understood as the same legal interest protected by

the sanctioning regulations in question. In fact, when there is the triple identity of
subject, fact and foundation, the sum of sanctions creates a sanction unrelated to the judgment of
proportionality carried out by the legislator and materializes the imposition of a sanction
not legally provided for, which also violates the principle of proportionality.
But for it to be possible to speak of “bis in idem” a triple identity must occur.
between the terms compared: objective (same facts), subjective (against the

same subjects) and causal (for the same basis or reason for punishing):

    2. Subjective identity assumes that the affected subject must be the same,
       whatever the nature or judicial or administrative authority that
       prosecute and regardless of who the accuser or specific body is that

       has been resolved, or that it is tried alone or in conjunction with other
       affected.

b) Factual identity assumes that the facts prosecuted are the same, and rules out
the cases of real competition of infractions in which there is not the same
illegal act but before several.


c) The identity of the foundation or cause implies that the sanctioning measures do not
can coincide if they respond to the same nature, that is, if they participate in a
same teleological foundation, what happens between penal and
administrative sanctions, but not between the punitive and the merely

coercive.”

Taking as reference what was previously explained, the principle has not been violated
non bis in idem, since, although roughly understood the facts are detected
consequence of a personal data breach, the violation of art. 5.1.f) of the GDPR

takes the form of a clear loss of confidentiality and availability, the violation of the
art. 32 of the GDPR boils down to the absence and deficiency of security measures
(security only) detected, present regardless of data breach
personal. In fact, if these deficiencies in the security measures that are
detected in the I-DE web application would have been detected by the AEPD without
would have resulted in the loss of confidentiality, it could only have been

sanctioned by art. 32 of the GDPR.

And all this in the face of the allegations made by I-DE which considers that in both
precepts require only one conduct, which is to implement adequate security. It's not
true, since art. 5.1.f) of the GDPR is not limited to guaranteeing security

appropriate to the risk, but rather to guarantee the integrity and availability through
any measures. And not only through security measures, but through everything
type of appropriate technical or organizational measures.

As we have indicated, through art. 5.1.f) of the RGPD, a loss of

availability and confidentiality and, through art. 32 of the RGPD the absence and/or
deficiency of the security measures implemented by the person responsible for the
treatment. Absent or deficient security measures, we add, that violate the


C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 32/88








GDPR regardless of whether the loss of data had not occurred.
confidentiality and availability.


Finally, regarding the application of identical aggravating factors in both infractions,
We must mean that the circumstances provided for in art. 83.2 of the GDPR and the
provided in art. 76.2 of the LOPDGDD are the only ones that can be applied by
AEPD for any infraction.

The determining factor in this case, with respect to that provided for in art. 83.2.b) of the GDPR does not

is that they coincide in their use, but rather the foundation established for their
consideration.

Having said all that, it is not considered that there is a violation of the principle of non bis in
idem, enshrined in article 25 of the Spanish Constitution.


2. Subsidiarily, existence of medial competition between the two imputed conducts
to I-DE

I-DE alleges that, on the other hand, the Initiation Agreement identifies (and intends to sanction)
a plurality of infractions that, supposedly, my client would have committed (which

which is flatly denied) when, in reality, one of them would be subsumed and
embedded in the other, giving rise to a medial competition in the terms provided in the
article 29.5 of the LRJSP.

I-DE understands that both infractions cannot be sanctioned, given that the commission of

the alleged violation of article 32.1 of the RGPD would determine the alleged violation
of article 5.1.f) of the same legal text and would be sanctioned by themselves
facts, since it considers that the alleged violation of article 5.1 f) would require
and inseparably the cause of the alleged lack of diligent implementation of the
measures referred to in article 32.1 of the RGPD.


I-DE brings up certain jurisprudence (for all, Sentence 339/2015 of
September 25, 2015 of the National Court - appeal 262/2014 - which cites the
Supreme Court ruling of February 8, 1999, - appeal 9/1996 -): “the
application of medial competition requires a necessary referral of infractions
respect to the others and vice versa, so it is essential that some do not

can be committed without executing the others.” Thus, there must exist “such a relationship between the
infringements concerned that one of them necessarily derives from the other, so
that the commission of one is not possible without executing the other” (for all, the Judgment of
the National Court of December 26, 2013, - appeal 416/2012). Thus
I-DE concludes that it is evident that such a relationship exists between the two infringements

who intend to accuse her.

In this regard, it means, as noted above, that art. 32
of the GDPR, although related to art. 5.1.f) of the GDPR does not circumscribe the principle
In its whole.


Thus, Article 5.1.f) of the GDPR is one of the principles relating to processing. The
principles relating to the treatment are, on the one hand, the starting point and the clause of
closure of the legal data protection system, constituting true

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 33/88








informing rules of the system with an intense expansive force; on the other hand, at
have a high level of specificity, they are mandatory standards that are susceptible
of being infringed.


Well, art. 5.1.f) of the RGPD includes the principle of integrity and confidentiality and
determines that personal data will be processed in such a way as to guarantee
adequate security of personal data, including protection against
unauthorized or illicit treatment and against its loss, destruction or accidental damage,
through the application of appropriate technical or organizational measures of all kinds,

not just security.

Moreover, art. 32 of the GDPR regulates how the security of the
processing in relation to the specific security measures that must be
implement, in such a way that taking into account the state of the art, the costs of

application, and the nature, scope, context and purposes of the processing, as well as
risks of varying probability and severity to the rights and freedoms of
natural persons, the person responsible and the person in charge of the treatment will apply measures
appropriate technical and organizational measures to guarantee a level of security appropriate to the
risk that includes, among other issues, the ability to guarantee the
data confidentiality.


As has been noted, this provision, art. 32 of the GDPR, although related to the
art. 5.1.f) of the GDPR does not circumscribe the principle in its entirety. The art. 5.1.f) of the GDPR
strictly requires that confidentiality be guaranteed, and requires for its application
a loss of confidentiality. We can find cases in which there are

inadequate measures without there being a loss of integrity and
confidentiality.

Proof of this is not only this difference between the violation of art. 5.1.f and the
article 32 of the RGPD, but the different classification in sections even different from the

art. 83 of the GDPR and the different qualification of both for the purposes of prescription
in the LOPDGDD.

In the case examined, as stated in the proven facts, there is a clear
loss of confidentiality revealed through a clear result:
produced illegitimate access by an unauthorized third party to personal data.


Likewise, as indicated, art. 5.1.f) of the RGPD is violated when
produces a loss of confidentiality, integrity or availability of data
personal, which may or may not occur due to the absence or deficiency of the measures
Strictly security.


This principle only determines the channel through which the
maintenance of confidentiality, integrity or availability when explicit
“through the application of appropriate technical and organizational measures”, which are not
Strictly security.


I-DE indicates that the appropriate technical and organizational measures to which it makes
mention article 5.1.f) are the security measures of art. 32 of the GDPR. This
would be to simplify the essence of the RGPD whose compliance is not limited to the implementation

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 34/88








technical and organizational security measures; would mean, in our case,
reduce the required guarantee through the principle of integrity and confidentiality at your discretion.
achievement only with security measures.


As noted above, when art. 5.1.f) of the GDPR refers to
appropriate technical or organizational measures to guarantee the rights and freedoms
of interested parties within the framework of GDPR regulatory compliance management.
does in the sense provided in art. 25 of the GDPR regarding privacy from
design.


We reiterate that there are multiple technical or organizational measures that are not
security and that the person responsible for the treatment can implement as a channel to
guarantee this principle.



And all this in the face of the allegations made to the contrary by I-DE that it considers
that in both precepts a single conduct is required, which is to implement security
appropriate. It is not true, since art. 5.1.f) of the RGPD is not restricted to the
guarantee of security appropriate to the risk, but rather to guarantee the integrity and
availability. And not only through security measures, but through all kinds of

appropriate technical or organizational measures.

As we have indicated, through art. 5.1.f) of the RGPD, a loss of
availability and confidentiality and, through art. 32 of the GDPR the absence and
deficiency of the security measures implemented by the person responsible for the

treatment. Absent or deficient security measures, we add, that violate the
GDPR regardless of whether the loss of data had not occurred.
confidentiality and availability.

In the present case, the aforementioned article 32 has been violated regardless of whether

ultimately suffered a breach of confidentiality or not, because the conduct
reprehensible and that violates said precept is the lack or inadequacy of those measures,
in themselves, that is, it is infringed and punished for it regardless of whether
Whether or not a personal data breach has occurred. Which does not prevent, in
In the event of a personal data breach materializing, this
circumstance as an aggravating circumstance, in accordance with the RGPD.


On the other hand, in the present case, so that we are faced with a violation of the article
5.1.f) it has been and is an unavoidable requirement that the confidentiality of the data be violated
personal (which does not happen with the violation of article 32)


Regarding the media competition, it should be noted that article 29 of the LRJSP does not
It is applicable to the sanctioning regime imposed by the RGPD. And this is because:

    3. The GDPR is a complete system.


The GDPR is a community standard directly applicable in the Member States,
which contains a new, complete and global system aimed at guaranteeing the protection
of personal data in a uniform manner throughout the European Union.


C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 35/88








In relation, specifically and also, to the sanctioning regime provided in the
same, its provisions are applicable immediately, directly and
integral, providing for a complete system without gaps that must be understood,

be interpreted and integrated in an absolute, complete, integral manner, thus leaving the
Its ultimate purpose is the effective and real guarantee of the Fundamental Right to
Personal data protection. The opposite determines the loss of the
guarantees of the rights and freedoms of citizens.

In fact, a specific example of the lack of loopholes in the system of

GDPR is article 83 of the GDPR that determines the circumstances that can operate
as aggravating or mitigating circumstances with respect to an infringement (art. 83.2 of the RGDP) or that
specifies the existing rule regarding a possible medial competition (art. 83.3 of the
GDPR).


To the above we must add that the RGPD does not allow the development or realization of
its provisions by the legislators of the Member States, safe from what
the European legislator himself has specifically provided for, delimiting it in a very
concrete (for example, the provision of art. 83.7 of the RGPD). The LOPDGDD only
develops or specifies some aspects of the RGPD as far as it allows and with the
scope that it allows.


This is because the intended purpose of the European legislator is to implement a
uniform system throughout the European Union that guarantees the rights and freedoms of
natural persons, that corrects behavior contrary to the RGPD, that encourages
compliance, which enables the free circulation of this data.


In this sense, recital 2 of the GDPR determines that,

“(2) The principles and rules relating to the protection of natural persons in what
regarding the processing of your personal data must, whatever

their nationality or residence, respect their fundamental freedoms and rights, in
particularly the right to the protection of personal data. The present
Regulation aims to contribute to the full realization of an area of freedom,
security and justice and an economic union, to economic and social progress, to
reinforcement and convergence of economies within the internal market, as well as
well-being of natural persons.” (emphasis is ours)


Recital 13 of the GDPR continues to indicate that,

“(13) To ensure a consistent level of protection of natural persons throughout
the Union and avoid divergences that hinder the free circulation of personal data

within the internal market, a regulation is necessary that provides security
legal and transparency to economic operators, including microenterprises and
small and medium-sized businesses, and offer individuals of all
Member States the same level of enforceable rights and obligations and
responsibilities for those responsible and in charge of the treatment, in order to

ensure consistent supervision of the processing of personal data and sanctions
equivalents in all Member States, as well as effective cooperation between
the supervisory authorities of the different Member States. The good
functioning of the internal market requires that the free circulation of data

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 36/88








personal property in the Union is not restricted or prohibited for reasons related to
protection of natural persons with regard to data processing
personal”. (emphasis is ours)

In this system, the determining factor of the GDPR is not the fines. The corrective powers

of the control authorities provided for in art. 58.2 of the RGPD conjugated with the
provisions of art. 83 of the GDPR show the prevalence of corrective measures
against fines.

Thus, art. 83.2 of the GDPR says that “Administrative fines will be imposed, in
depending on the circumstances of each individual case, in addition to or in lieu of

the measures contemplated in article 58, paragraph 2, letters a) to h) and j).

In this way the corrective measures, which are all those provided for in art. 58.2 of
RGPD except the fine, have prevalence in this system, the fine being relegated
economic to cases in which the circumstances of the specific case determine

that a fine be imposed together with corrective measures or in lieu of the
themselves.

And all this with the purpose of forcing compliance with the RGPD, avoiding
non-compliance, encourage compliance and ensure that infringement is not more profitable
than non-compliance.


For this reason, art. 83.1 of the RGPD prevents that “Each supervisory authority will guarantee
that the imposition of administrative fines pursuant to this article for the
infringements of this Regulation indicated in paragraphs 4, 5 and 6 are in
each individual case effective, proportionate and dissuasive.” (emphasis is
our)


For this system to work with all its guarantees, it is necessary that several
elements are deployed in an integral and complete manner. The application of foreign rules
to the RGPD regarding the determination of fines in each of the States
members applying their national law, whether due to aggravating circumstances or
mitigating circumstances not provided for in the RGPD -or in the LOPDGDD in the Spanish case-, whether

due to the application of a media contest different from that provided in the RGPD, it would remain
effectiveness to the system that would lose its meaning, its teleological purpose, resulting in
the fines imposed for different violations would no longer be effective,
proportionate and dissuasive. And in this way the interested parties would also be robbed.
of the effective guarantee of their rights and freedoms, weakening the uniform application
of the GDPR. Mechanisms for the protection of rights and

freedoms of citizens and would be contrary to the spirit of the RGPD.

The GDPR is endowed with its own principle of proportionality that must be
applied in its strict terms.


    4. There is no legal loophole, there is no supplementary application of art. 29 of the GDPR.

In addition to the above, it means that there is no legal gap regarding the application of the
media contest. Neither the RGPD allows nor the LOPDGDD provides for the supplementary application
of the provisions of art. 29 of the LRJSP.

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 37/88









There is also no subsidiary application of art. 29 of the GDPR. In Title VIII of the
LOPDGDD regarding “Procedures in case of possible violation of the regulations
of data protection”, article 63 that opens the Title provides that “The
Procedures processed by the Spanish Data Protection Agency will be governed

by the provisions of Regulation (EU) 2016/679, in this organic law, by the
regulatory provisions dictated in its development and, as far as they are not
contradict, on a subsidiary basis, by the general rules on the
administrative procedures.” Although there is a clear reference to the LPACAP, it is not
establishes in no way a subsidiary application with respect to the LRJSP that does not
contains in its articles any provision relating to administrative procedure

some.

In the same way that the AEPD is not applying the aggravating and mitigating circumstances provided
in art. 29 of the LRJSP, since the RGPD establishes its own, therefore,
There is no legal loophole or subsidiary application of the same, nor is it possible to apply

section relating to media competition and for identical reasons.

In any case, the judicial precedents cited by the plaintiff regarding the competition
medial come from the application of the LOPD of the year 99 that transposed the Directive
95/46/EC, the RGPD establishing a clearly different system. At that time,
article 115 of Royal Decree 1720/2007, of December 21, which approves

the Regulations for the development of Organic Law 15/1999, of December 13, of
protection of personal data, it did provide for a supplementary application of the
Law 30/1992, of November 26, on the Legal Regime of Administrations
Public and Common Administrative Procedure.

Thirdly, and now focusing on the specific case examined, and without prejudice

From the above, it should be noted that there is no medial competition. Article 29.5 of the
LRJSP establishes that “When the commission of an infraction results
necessarily the commission of another or others, only the sanction should be imposed
corresponding to the most serious infraction committed.”

Well, the medial competition takes place when in a specific case the commission of

an infraction is a necessary means to commit a different one.

The established facts determine the commission of two different infractions, without the
violation of article 32 of the RGPD (security of processing), as stated
the appellant, is the necessary means by which the violation of the
article 5.1.F) of the RGPD (principle of confidentiality).


In conclusion, from all this and against everything argued, it has been proven
that I-DE was not diligent because it did not adequately guarantee confidentiality
of the personal data of its clients, as well as that it did not have the measures
appropriate technical and organizational measures to ensure an appropriate level of security.


For the above reasons, the allegation is rejected.




C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 38/88








FOURTH.- ON THE ALLEGED VIOLATION BY I-DE OF ARTICLE 32
OF THE GDPR


I-DE alleges that it does not agree that the Startup Agreement indicates that it was not the
diligent enough to implement appropriate security measures to
prevent security incidents from occurring like the one that happened, as it maintains
that, as has been revealed in the responses given to the AEPD
in the different information requirements, it has been proven that there was
implemented multiple and robust security measures aimed at protecting

the information of its clients and prior to March 2022.

I-DE proceeds below to detail the security measures it has
implanted.


Faced with this, it means that in the present case there was a vulnerability in the
GEA web application, which was used by the cybercriminal. So, as it has
has been accredited in the Proven Facts and as indicated in the Foundation
of Law VI of the Initiation Agreement, (…).

Therefore, the above shows the existence of a web application with a

vulnerability that allowed:

(…)

Likewise, as a subsequent measure to avoid incidents such as the one that occurred,

proceeded through I-DE to modify the GEA application (…).

On the other hand, as security measures existed before the incident, they pointed out,
among others, the following:


(…). And it is precisely this vulnerability that was used by the attacker during
the security breach.

(…)

From the above, it follows that this attack would have been avoided if that

code would not have been visible. Even more so if you take into account that this is one of the
requirements that are included in the indicated document, (…).

Likewise, this vulnerability is identifiable in security assessments. Without
However, during the investigation proceedings I-DE has not proven that

detect the vulnerability of the GEA application within the framework of the
security evaluation implemented in the Iberdrola Group. Furthermore, as has been
indicated, the last review or security assessment of critical applications dates from
2019, almost two and a half years before the incident, so they were not being very
taking into account the rapid advances in technology, as well as the

sophistication of cyber attacks, in addition to the fact that the
results obtained.



C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 39/88








Therefore, the GEA application contained an avoidable and identifiable vulnerability that
was the one used by the attacker. This clearly shows a
non-compliance with article 32 of the GDPR, as it requires appropriate measures to

guarantee a level of security appropriate to the risk, and all this taking into account the
state of the art, application costs and the nature, scope, context and
the purposes of the treatment.

(…)


Regarding the risks to the rights and freedoms based on which they must
appropriate security measures be established and implemented, I-DE has not provided a
risk analysis carried out prior to the incident that complies with art. 32 of
GDPR, as it does not indicate what measures should be applied to the risk level. Also, the
approach to risk analysis, contained in the Register of Activities of

Treatment regarding the affected activity is not oriented to the risks that for
the rights and freedoms of the owners of personal data may involve the
loss of confidentiality, availability or integrity.

Recital 75 of the GDPR, cited in the Initiation Agreement, indicates that “The risks
for the rights and freedoms of natural persons, of seriousness and probability

variables, may be due to data processing that could cause damage and
physical, material or immaterial damages, particularly in cases in which the
treatment may give rise to problems of discrimination, identity theft or
fraud, financial loss, reputational damage, loss of confidentiality of
data subject to professional secrecy, unauthorized reversal of pseudonymization or

any other significant economic or social harm; in cases where
deprives data subjects of their rights and freedoms or prevents them from exercising control
about your personal data; in cases where the personal data processed
reveal ethnic or racial origin, political opinions, religion or beliefs
philosophical, militancy in unions and the processing of genetic data, data

relating to health or data on sexual life, or criminal convictions and offences.
or related security measures; in cases in which aspects are evaluated
personal, in particular the analysis or prediction of aspects related to the
performance at work, economic situation, health, preferences or interests
personal, reliability or behavior, situation or movements, in order to create or
use personal profiles; in cases in which personal data of

vulnerable people, particularly children; or in cases where the treatment
involves a large amount of personal data and affects a large number of
interested."

For its part, art. 28.2 LOPDGDD determines that “For the adoption of the measures

referred to in the previous section, those responsible and in charge of the treatment
will take into account, in particular, the increased risks that could arise in the
following assumptions:

    5. When the treatment could generate situations of discrimination,

       identity theft or fraud, financial loss, damage to the
       reputation, loss of confidentiality of data subject to professional secrecy,
       unauthorized reversal of pseudonymization or any other harm
       economically, morally or socially significant for those affected.

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 40/88









       b) When the treatment could deprive those affected of their rights and
       freedoms or could prevent them from exercising control over their data

       personal (,,,)”

As explained in the guide “Risk management and impact assessment in
processing of personal data” of the AEPD, “The RGPD establishes the obligation of
manage the risk that a risk to people's rights and freedoms poses
treatment. This risk arises both from the very existence of the treatment and from

its technical and organizational dimensions. The risk arises both from the
automated data processing as well as manual processing,
human elements and the resources involved. The risk arises from the purposes of the
treatment and its nature, and also by its scope and the context in which it is
unwraps.”


However, these risks have not been assessed. Damage has not been assessed for
physical, material or immaterial persons, or at least it is not proven that
fact, lacking, therefore, a risk analysis focused on the protection of the
rights and freedoms of the interested parties.


On the other hand, I-DE understands that the AEPD has linked the alleged non-compliance with
article 32 with the production of the result that occurred as a consequence of the
concurrence of a series of factors that were unpredictable and that were
detected and resolved immediately. It therefore concludes that the AEPD is
imposing, with regard to the adoption of security measures, a

obligation of result, but which is nevertheless an obligation of means.

In this regard, it brings up or stated by the Supreme Court in its
ruling of February 15, 2022 (cassation appeal 7359/2020), which clearly states
clear way that the obligation imposed by data protection regulations

personnel, to adopt technical and organizational measures aimed at guaranteeing the
confidentiality, availability and integrity of the information, is an obligation of
means and not result.

In this regard, it should be noted that the aforementioned Judgment effectively indicates, above all
security measures regarding data protection, that “… the obligation that

falls on the person responsible and on the person in charge of the treatment with respect to the
adoption of necessary measures to guarantee the security of personal data
personnel is not an obligation of result but of means, without the obligation being enforceable.
infallibility of the measures adopted. Only the adoption and
implementation of technical and organizational measures, which according to the state of the

technology and in relation to the nature of the processing carried out and the data
personal data in question, reasonably allow to avoid its alteration, loss,
“unauthorized treatment or access.” (emphasis is ours)

However, the Judgment continues indicating, in the specific case analyzed in

same, that “…the program used to collect customer data does not
contained no security measures that would allow checking whether the address of
email entered was real or fictitious and whether it really belonged to the person
whose data was being processed and gave consent for it. The state

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 41/88








of the technique at the time in which these events occurred allowed us to establish
measures aimed at verifying the veracity of the email address, conditioning
the continuation of the process for the user to receive the contract at the address

provided and only from it provide the necessary consent for its
collection and treatment. Measures that were not adopted in this case.

(…) So, at the time these events occurred, there were
technical measures related to the registration process, which would have prevented the filtration of
personal data produced. This implies that the technical measures adopted

did not comply with the security conditions in the terms required in art. 9.1 of the
LO 15/1999, therefore incurring the infringement provided for in art. 44.3.h)
consisting of “Maintain the files, premises, programs or equipment that contain
personal data without due security conditions that via
regulations are determined […]”.


Therefore, although it is inferred from the Judgment that the obligations established by the
Article 32 of the GDPR are media, it also makes it clear that, if at the time of
When the incident occurred, there were adequate technical measures to avoid or mitigate the
effects thereof and were not applied, this represents a breach of the aforementioned
obligation imposed by the RGPD and, therefore, a violation of it.


In the present case, as has been pointed out, there was a vulnerability in the application
GEA, which was identifiable in the safety evaluations as well as avoidable, as
as evidenced by the fact that I-DE subsequently proceeded to correct
said vulnerability. This clearly shows a breach of the article

32 of the GDPR, as it requires appropriate measures to guarantee a level of
security appropriate to the risk, and all this taking into account the state of the art,
the costs of implementation and the nature, scope, context and purposes of the
treatment.


I-DE also alleges that the security breach is not caused by insufficient
the measures adopted, but rather the intense activity carried out by a third party with the
sole intention to carry out the cyberattack produced to the detriment not only of the
i-DE clients, but of the company itself.

Faced with this, it should be noted that total infallibility of the

measures that can be taken to ensure adequate protection in the
processing of personal data. However, once the attack occurs, it must
evaluate the diligence of the data controller in the application of the measures
appropriate technical and organizational measures to guarantee a level of security appropriate to the
risk, taking into account the state of the art, application costs,

nature, scope, context and purposes of the processing.

In the present case, I-DE did not count, at the time of the breach of
data protection, with appropriate measures in relation to the risks of the
processing for the protection of personal data, since as indicated,

There was a detectable and avoidable vulnerability in its web application, which was
exploited by cybercriminals.



C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 42/88








Finally, in accordance with the Judgment of June 22, 2021- Rec. 1210/2018,
and the Judgment of November 5, 2011 - Rec. 1796/2019, in which the
subjective or culpable element, it is insisted that the guilt of the plaintiff

cannot be considered excluded or attenuated by the fact that the
fraudulent action of a third party, since the responsibility of the plaintiff does not
derives from his actions, but from his own.

Finally, I-DE points out that it had implemented mechanisms that allowed the
almost immediate detection of the security breach suffered as a result of the

access to GEA, adopting immediately, so i-DE understands that its rapid
performance is a clear example that for the same reason it was given, and is given, complete
compliance with the provisions of article 32.1 c) of the RGPD, when it refers to “the
ability to restore availability and access to personal data
in the event of a physical or technical incident”, something that, however, has not been the object

of sufficient assessment by the Initiation Agreement.

In this regard, both in the Initiation Agreement and in this proposal it has been
taken into account that I-DE reacted as quickly as possible and proceeded to take action
aimed at repelling the attack and to avoid its repetition, considering it as
mitigating circumstance in accordance with article 83.2.c) RGPD.


For the above reasons, the claim made is rejected.




FIFTH. – ON THE ALLEGED DELART INFRINGEMENT. 5.1.F) OF THE RGPD


In this section I-DE alleges that it has not been proven, not even indicatively, the
fraudulent use of personal data, limiting the Startup Agreement to consider
that there is a very high risk nor that it has materialized in practice.

In this regard, it should be clarified that what I-DE is accused of is the violation of the
principle of confidentiality since it is clear that, after suffering a computer attack against

the GEA website, taking advantage of a vulnerability in it, there was an access
illegitimate access to personal data and the extraction thereof by a third party does not
authorized, which meant the loss of confidentiality and control of numerous
personal data (name and surname, ID, postal address, fax, e-mail, telephone,
client code) and that affected 1,350,000 I-DE clients. This supposes the

breach of the duty to guarantee the confidentiality of personal data,
since, as has been indicated, article 5.1.f) indicates that they must be treated in such a way
manner that ensures adequate security of personal data, including the
protection against unauthorized or illicit processing.


Regarding the high risk that these data, in the hands of
cybercriminal/s, were used fraudulently, this was indicated to express what
involves the loss of confidentiality, but is not necessary in any way, to
understand violated article 5.1.f) that said risks of fraudulent use are
materialize, because what has materialized with the gap is the loss of
confidentiality of the personal data processed by I-DE, which is what is attributed to it

exclusively.
C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 43/88









On the other hand, I-DE once again insists in this section that it understands that the
AEPD considered the breach reported by it to be archived and that the claims were not

provide nothing new and, therefore, nothing seems to justify the reopening of the
investigation when it had been archived.

In this regard, it is appropriate to refer to everything already argued in relation to it in the
Second section of this Legal Basis.


For the above reasons, the claim made is rejected.

SIXTH. – ON THE VIOLATION OF THE PRINCIPLE OF PROPORTIONALITY

I-DE alleges that the sanctions imposed violate the principle of proportionality,

since the AEPD, to determine the amount of the sanctions, has resorted to criteria
completely generic.

Thus, regarding the alleged negligence in its actions, I-DE indicates that it has
proven that the events that occurred occurred at a specific time and that
were resolved very quickly, so the measures adopted before the

incident mitigated its effects. This immediate solution to the incident, which
shows that they did have planned actions in the event of a possible attack on their
systems.

Faced with this, it should be noted that the appropriate technical and organizational measures

to guarantee a level of security appropriate to the risk that for the rights and
freedoms of natural persons may have the processing of personal data
They cannot in any way be only reactive measures, that is, to solve
immediately a personal data breach. Thus, article 32 of the GDPR not only
indicates that they must guarantee adequate security, but also that said

Measures should include the ability to ensure the confidentiality, integrity,
ongoing availability and resilience of treatment systems and services
(letter b of article 32.1 GDPR). Therefore, it is not enough to have measures to
react as soon as possible when confidentiality has been breached, we must have
also appropriate prior measures to prevent said violation. And this because
Equally or more important are the measures aimed at safeguarding confidentiality,

the integrity and availability of personal data, that is, the measures
preventive measures aimed at avoiding any violation of this.

Therefore, it cannot be accepted that the measures that I-DE had implemented were
adequate in that they allowed the incident to be resolved later, since this

it only demonstrates the existence of corrective measures. However, what they allowed
Those reactive measures were the cessation of the attack once it had occurred and the restoration of the
service, that is, in terms of the protection of personal data, it avoided an impact
greater and this has already been taken into account as a mitigating circumstance in the present procedure
sanctioning, but in no way can they solve the loss of confidentiality

of the personal data affected, since this had already materialized.

That is, the confidentiality of personal data is guaranteed above all with
precautionary measures. In this sense, it has already been indicated in the response to the allegation

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 44/88








Fourth of this Legal Basis, the vulnerability contained in the
GEA application, which was used by the cybercriminal for his attack and that the
Furthermore, it was perfectly identifiable in the security evaluations. In

In relation to the latter, it should not be forgotten that article 32.2 GDPR determines that
security measures must also include a process of verification, evaluation
and regular assessment of the effectiveness of technical and organizational measures to
ensure the safety of the treatment.

Therefore, all of this only reflects a lack of diligence on the part of I-DE to the

when it comes to guaranteeing security appropriate to the risk of data processing that
performed. In this sense, it should not be forgotten that GEA is a web application, it is
That is, it allows access from the Internet to a database where
stored personal data of millions of customers, which involves processing
on a large scale, which requires appropriate security measures for that web environment and

aimed especially at guaranteeing that illegitimate access does not occur to said
personal information.

On the other hand, I-DE points out that it does not agree that it is considered an aggravating circumstance.
the linking of your activity with the processing of personal data,
because he understands that his behavior is getting worse because he belongs to the electrical sector and

that for this reason special diligence must be required, and that this once again attacks
the principle of proportionality.

Faced with this, it means that their behavior is not aggravated by belonging to the sector
electrical, but because its activity, the development of its business, involves and requires

continuous and abundant processing of personal data, as demonstrated by the
fact that it processes data from millions of people.

Therefore, as indicated in the Startup Agreement, I-DE is a company accustomed to
processing of personal data, which entails, once again, the requirement of greater

degree of diligence.

On the other hand, it is noted that article 83.2 of the RGPD provides that “When deciding the
imposition of an administrative fine and its amount in each individual case will be
due account:
(…)


       k) any other aggravating or mitigating factor applicable to the circumstances of the
       case…".

In this sense, the Spanish legislator has considered including in article 76 of the

LOPDGDD that: “2. In accordance with the provisions of article 83.2.k) of the Regulations
(EU) 2016/679 may also be taken into account:

(…)


       b) The linking of the offender's activity with the performance of treatments
       of personal data.”



C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 45/88








This Agency simply takes into consideration that circumstance, provided for by the
legislator, when deciding the imposition of the administrative fine.


It should be noted that, for the purposes of deciding the imposition of a fine, it cannot have
administrative, the same consideration as an infraction produced by a natural person
or a small company not accustomed to processing personal data, which a
large company like I-DE, accustomed to processing personal data of
millions of clients, with a long history behind them in this regard. By
assumption that the violation is considered to be more serious for the purposes of imposing

a fine if the person responsible for the treatment is among the latter, as is
the case of I-DE.

On the other hand, it alleges the lack of proportionality comparing it with the file
PS/00179/2020, in which it indicates that he was only fined 500,000 euros despite

that not only was confidentiality breached, but that the breach was not notified to the
AEPD, something that I-DE has done, but, nevertheless, the sanction is
considerably smaller.

In this regard, it should be noted, on the one hand, that in terms of data protection,
the technical and organizational security measures to be adopted by those responsible for the

treatment and other obligations to comply required by the RGPD, must be the
appropriate in relation to the specific risks posed by the specific
treatments carried out by each person responsible. Therefore, when analyzing the diligence of some
and others in compliance with the regulations must be based on the circumstances of each
case, taking into account the nature, scope, context and purposes of each

treatment, therefore there are no identical cases.

On the other hand, article 83 establishes that

       1. Each supervisory authority shall ensure that the imposition of fines

       administrative sanctions under this article for violations of the
       of this Regulation indicated in sections 4, 5 and 6 are in each case
       effective, proportionate and dissuasive individual treatment.
       2. Administrative fines will be imposed, depending on the circumstances
       of each individual case..."


Therefore, it is necessary to attend to the circumstances of each individual case, there being no
two identical files and, therefore, with equal results. As an example, in the
file that brings up those affected were less than half than in the case
which concerns us now; the violation of art. 32 of the GDPR, it was for another type of
insufficiency in measures to guarantee adequate safety for the treatment;

These were events that occurred in 2018, the year in which it became mandatory
GDPR compliance, which is not the same as four years later; it is not the same
knowledge of the technique a few years before and after, especially due to the rapid
progress thereof, v etc.


Likewise, it is pointed out that there are many other files after and before the
present in which the violation of the
confidentiality of data such as the violation of security measures of the


C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 46/88








article 32 of the RGPD, although, as has been pointed out, the
specific circumstances of the case.


Finally, and for completeness, it is not appropriate to demand equality in illegality. The
Jurisprudence is clear on this. Thus, the Judgment of the National Court of
April 28, 2023 (SAN 04/28/2023 REC. 409/2021 indicates that “A deal is referred to
discriminatory sanction since that fine or economic sanction can
be replaced by the measures of art. 58 GDPR, less burdensome measures as could
be the warning. And refers to other infractions committed by other

entities. Of course the plaintiff tries to compare this situation with another
sanctioning procedure that is mentioned, but we are not dealing with a deal
discriminatory or that the principle of equality is violated since it is a principle that
only operates within the framework of legality when equal factual situations have a
different treatment without reasonable justification. As the STS of January 20 points out

2004, “equality must be preached within the law, so that if the action
correct of the Administration is the one now prosecuted, as we have declared, the
invoked as contrary to it was not and, consequently, it cannot be used to
request that equal treatment be applied to the appellant, since, as this Chamber of the Court
Supreme Court has declared in its sentences of June 16, 2003, July 14, 2003
and October 20, 2003 that "the principle of equality has no significance for

protect a situation contrary to the legal system", and this, as indicated by the
Sentencing chamber, regardless of the fact that the administrative action has not been proven
alleged as contradictory to the present one.”

In the same sense, the STS of April 2, 2014 (Rec. 1916/2010) points out that “the

“Legality prevails over a possible injury to the principle of equality.” In this case,
We are facing an administrative infraction that is intended to be compared with another that has
had a different solution, but from what is observed in the allegation that is formulated
the plaintiff can hardly make a comparison of a situation
and another. Let us remember that according to the consolidated constitutional doctrine for

To appreciate the occurrence of a violation of the principle of equality, there must be
the following assumptions: 1) provision of an ideal comparison term
demonstrative of the substantial identity of the legal situations that have received
different treatment, 2) that the unequal treatment is not based on objective reasons that
justify, and 3) that the comparative trial is carried out within the framework of legality,
since it is not possible to invoke the principle of equality in illegality to perpetuate

situations contrary to what is provided for by the legal system. Thus things, the
conduct for which the plaintiff has been sanctioned and which is contrary to law
does not allow its responsibility to be further attenuated by the fact that in other
assumptions, which are unknown, the sanction imposed was not economic and
considered more beneficial.”


For all the above reasons, the claim made is rejected.

                                           V

              Response to the allegations to the Proposed Resolution

In response to the allegations presented by I-DE, the following should be noted:



C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 47/88








FIRST: Regarding the defenselessness generated by I-DE as a consequence of not having
agreed to the accumulation of procedures EXP202305587 and EXP202205206



I-DE is once again ratified in the allegations regarding the Initiation Agreement regarding its
request for the accumulation of both files, also indicating that with
Regardless of whether article 57 of the LPACAP indicates a “may”, the power
granted must be considered in all cases enforceable to the Administration when the

non-cumulative processing of the procedures may negatively affect the
rights of those included in them, I-DE insisting that the non-accumulation
attentive to their right to defense.

Thus, it indicates that the administrative file does not even contain the real accreditation of
the admission for processing of any claim directed against I-DE or against any

another company of the Iberdrola Group, so that I-DE has been forced to intuit,
from the Research Actions Report (IAI), the information that could
have given rise to the AEPD opening this sanctioning procedure.
I-DE therefore understands that this simple fact would be sufficient to justify the
obligation to consolidate the two files since their access to the

information that the AEPD has available to consider committed two alleged
violations of data protection regulations has been limited to those
elements that the AEPD has considered appropriate to incorporate into this file,
without being able to have a complete vision of the facts or, consequently, of the motives
that induce the AEPD to impose such sanctions. For this reason, I-DE considers that the

accumulation of procedures harms their rights.

In this regard, it should be noted, first of all, that it has already been answered in the proposal
resolution regarding the request for consolidation of the two files
referenced, response that is transcribed in the Fundamentals of Law III
of this Resolution to which reference should be made. Therefore, although it is true that it is

a power of the Administration to proceed with the accumulation or not, it is also
that the reasons were argued and the reasons why it was not appropriate or not
It was appropriate to combine both sanctioning procedures.

Regarding what is alleged by I-DE regarding the fact that non-accumulation produces

defenselessness, because in his file there is no record of the admission for processing of any
claim against it, it means that said admissions for processing are not recorded either.
in the other file to which the accumulation is requested, so it would not have
effects in this sense, consequently not causing any defenselessness
accumulation.


In this regard, it is noted that, since April 2, 2022, they have been presented to
this Agency claims from clients affected by the security incident, the
which have been progressively admitted for processing since May 9, 2022. In
In this sense, it is indicated that the claimants basically claim to have seen
their personal data affected by the aforementioned breach, without being able to provide any

added information because, logically, in the face of cyberattacks such as the one suffered,
They can provide little or no information because they are unaware of it and do not have access to it.
same. These claims were accepted for processing successively, from the
May 9, by the Director of this Agency, as they were presented since April

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 48/88








2022. All of them have not been the subject of any further procedures. That is why
These claims are not part of this sanctioning procedure, only
two to which I-DE has had access, so defenselessness has not been caused.


Likewise, in the Background of both the Initiation Agreement and the Proposal for
Resolution and also this Resolution, the existence of these
claims. Specifically, it is indicated in the Fifth Background that “Since 2
April 2022, customer complaints have been submitted to this Agency
affected by the security incident, which have been progressively

admitted for processing since May 9, 2022.” Therefore, I-DE has been informed
from the beginning of the existence of said claims.

Due to the above, whether or not knowledge of the specific content of said claims
does not affect in any way the right of defense of I-DE since this

sanctioning procedure was initiated and has been processed solely as a consequence
of the facts proven during the preliminary investigation actions
carried out by this Agency. Therefore, I-DE has known at all times and
complete form of the facts of which he is accused and all the circumstances in relation
with them, which, it is insisted, derive exclusively from the entire
documentation collected and other actions carried out during the

prior investigations and not the content of the claims that are not part
of either procedure. Likewise, he has had knowledge of everything
moment of the infractions that are attributed to such acts and the sanctions
that could arise from them, and has been able to allege and present whatever
documentation has been deemed relevant throughout this procedure

sanctioner.

Therefore, the requested non-accumulation does not cause you any defenselessness nor does it affect you.
negatively to any of your procedural rights


In relation to the rest of the arguments raised by I-DE to demand the
accumulation, as these are reproductions of those exposed in the Initiation Agreement,
It is appropriate to refer to the response given by this Agency and which appears, as has been
indicated, transcribed in Legal Basis III of this Resolution.


SECOND: About the previous acts of the AEPD and the violation of the principles
of good faith, legitimate trust and legal certainty.

I-DE insists again that the letter of April 18, 2022 that was addressed to it
from the Technological Innovation Division of this Agency has a decision-making nature and

that this prevents or should have prevented any investigative action
subsequent of the personal data breach suffered which, in addition, violates the
principles of good faith, legitimate trust and legal certainty.

Likewise, it indicates that one of the functions of the Technological Innovation Division of

This Agency is to “analyze and classify security breaches and, where appropriate,
reasonedly propose to the Presidency the initiation of an investigation when
“sees signs of the commission of an infraction” (article 31 e) of the Statute of the
AEPD).


C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 49/88








I-DE adds that the aforementioned letter is signed by the “AEPD”, which means that it must
be understood as signed by the Director, since the “legal and institutional representation” of the
Agency corresponds solely and exclusively to the Director, as established in the

article 13.1b) of the AEPD Statute.

From this I-DE concludes that, having been analyzed by the Innovation Division
Technological the information communicated by her about the security breach,
understood that it was not appropriate to submit any type of proposal to the Director of the AEPD
motivated in relation to the same, as I do not consider the provisions of the

GDPR, this resulted in this Agency being notified of the decision not to carry out
any action related to the aforementioned gap.

Faced with this, first of all it is worth remembering that this question was already answered in
the Proposed Resolution, a response that appears transcribed entirely in the

Legal basis IV of this Resolution and to which reference should be made.

On the other hand, it cannot be admitted or understood, even indirectly, that the
The aforementioned writing in question is signed by the Director of this Agency, by
as long as his signature does not appear expressly, no matter how much I-DE wants to assume
artificially that the signature comes from said body by holding the representation

of the AEPD. No generic signature from the AEPD or any of the bodies in which
is structured, nor can the signature of any of the holders thereof
replace the signature of the Director when exercising the powers attributed to her
both by Law and by the Statute of the AEPD, the delegation of signature in these cases
must be direct and express, and must be stated in the administrative act that is signed by

delegation to guarantee and safeguard that the decision has been adopted by
competent body.

In this sense, the Statute of the Spanish Data Protection Agency, approved
By Royal Decree 389/2021, of June 1 (hereinafter the Statute) establishes

expressly that:

1. The Presidency of the Spanish Data Protection Agency is responsible for:

       d) Issue the resolutions and guidelines required for the exercise of functions
       of the Agency, in particular those derived from the exercise of powers

       provided for in article 57 of Regulation (EU) 2016/679 of Parliament
       European Parliament and of the Council, of April 27, 2016, and the exercise of powers
       of investigation and corrective powers provided for in article 58 of the
       cited Regulation. (emphasis is ours)


On the other hand, article 27 of the Statute establishes the powers that the
General Subdirectorate of Data Inspection of the AEPD:

1. The Subdirectorate General of Data Inspection is the administrative body,
dependent on the Presidency of the Spanish Data Protection Agency, which

develops the powers provided for in article 57.1, letters f), g), h), i) and u) of the
Regulation (EU) 2016/679 of the European Parliament and of the Council, of April 27,
2016, and carries out the inspection and instruction functions necessary for the exercise
of the investigative powers established in article 58.1, letters a), b), d), e) and f)

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 50/88








and the corrective powers provided in article 58.2, letters a), b), c), d), f), g), i)
and j), both of the aforementioned Regulation. (emphasis is ours)


2. In order to fulfill the tasks established in the previous section, to the
General Data Inspection Subdirectorate is responsible for the following:
functions:

       a) Permanent supervision of compliance with Regulation (EU) 2016/679
       of the European Parliament and of the Council, of April 27, 2016, of the Law

       Organic 3/2018, of December 5, and the provisions that develop it,
       by those responsible and in charge of the treatments.

       b) The exercise of the investigative powers defined in article 51 of
       Organic Law 3/2018, of December 5.

       (…)
       d) The processing of procedures in case of possible violation of the
       data protection regulations in accordance with the provisions of title VIII of the
       Organic Law 3/2018, of December 5, including the claims of the
       citizens due to lack of attention to their requests to exercise their rights
       contemplated in articles 15 to 22 of Regulation (EU) 2016/679 of the

       European Parliament and of the Council, of April 27, 2016. It corresponds to the
       General Subdirectorate of Data Inspection the duty to inform the
       claimant about the course and outcome of the claim filed with the
       Spanish Data Protection Agency, in accordance with the provisions of the
       article 77.2 of the aforementioned Regulation.

       (…)
       e) The evaluation of the admissibility for processing of the claims that are
       submitted to the Spanish Data Protection Agency, and the proposal to
       the Presidency of decision on the admission or non-admission for processing, in accordance
       to the provisions of article 65 of Organic Law 3/2018, of December 5.

       (…)
       h) Carrying out prior investigation actions agreed upon by the
       Presidency on his own initiative, following a complaint, or at the request of another
       control body or authority, in order to achieve a better determination of the
       facts and circumstances that justify the processing of the procedure,
       according to the provisions of article 67 of Organic Law 3/2018, of 5

       December. (emphasis is ours)


Therefore, with respect to the Technological Innovation Division of the AEPD, which
In accordance with the Statute, its functions include “analyzing and classifying the

security breaches and, where appropriate, propose with reasons to the Presidency the
initiation of an investigation when there are indications of the commission of an
infringement” (article 31 e) of the AEPD Statute), this does not mean that it is the only and
exclusive means by which this Agency can initiate investigative actions. So,
This investigative power that the AEPD has, as has been reflected in the

described regulations, is carried out by the General Subdirectorate of Inspection of
Data, which may initiate investigative actions ex officio, by order of
the Director, either as a consequence of the admission of claims presented
before the AEPD.

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 51/88









The Technological Innovation Division, after analyzing the documentation provided by I-
DE (not all the circumstances of the incident) has indicated that it does not foresee the start

of other actions, and not that I do not consider the provisions of the RGPD violated or that
the decision had been made not to carry out any action related to the
mentioned gap. The Technological Innovation Division did not make a decision, but rather
was limited to informing I-DE of a forecast, which does not prevent them from being taken into account.
takes into account other circumstances, such as the presentation of claims by those affected
due to the gap, which makes it advisable to separate from this forecast.


Therefore, the aforementioned document does not have the decisive and decisive nature that I-DE
intended, neither by its content nor by its form and this is not an obstacle nor can it prevent
in no way the investigative power that the AEPD has and its exercise through
the inspection and investigation functions that the Subdirectorate General of Inspection

of Data is entrusted. Above all, after the presentation of claims for
part of affected people and that the LOPDGDD requires its processing.

Thus, article 65 of the LOPDGDD, relating to the “Admission for processing of
claims”, establishes that


       1.When a request is submitted to the Spanish Data Protection Agency
       claim, it must evaluate its admissibility for processing, in accordance
       with the forecasts of this article.

       2. The Spanish Data Protection Agency will not accept claims

       presented when they do not concern data protection issues
       personal, manifestly unfounded, abusive or not
       provide rational evidence of the existence of an infringement.

Therefore, when complaints are submitted to the AEPD, it is obliged to analyze

their admissibility in advance, and may disallow them only in the cases of
section 2 of article 65 transcribed, which did not occur in the case that we
occupies
Therefore, once admitted for processing, prior investigation actions were initiated.
precisely to find out the facts and circumstances that occurred and if the
These could lead to a possible violation of the regulations regarding

data protection, as permitted and empowered by articles 64 and 66 of the LOPDGDD,
which were already transcribed in the response to the allegations to the Startup Agreement and
which, for the sake of expository clarity, are indicated again:

Article 64. Form of initiation of the procedure and duration.


    1.When the procedure refers exclusively to the lack of attention of a
    request to exercise the rights established in articles 15 to 22 of the
    Regulation (EU) 2016/679, will begin by agreement of admission to processing, which will be
    will be adopted in accordance with the provisions of article 65 of this organic law.


    In this case, the period to resolve the procedure will be six months from
    from the date on which the claimant had been notified of the agreement


C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 52/88








    admission for processing. After this period, the interested party may consider
    estimated your claim.


    2.When the procedure aims to determine the possible
    existence of a violation of the provisions of Regulation (EU) 2016/679 and in
    This organic law will begin by means of an initial agreement adopted by
    own initiative or as a result of a claim.

    If the procedure is based on a claim made before the Agency

    Spanish Data Protection Authority, in advance, will decide on your
    admission for processing, in accordance with the provisions of article 65 of this organic law.

    When the rules established in article 60 of the
    Regulation (EU) 2016/679, the procedure will begin by adopting the

    draft agreement to initiate the sanctioning procedure, which will be given
    formal knowledge to the interested party for the purposes provided for in article 75 of this
    organic Law.

    The claim is admitted for processing, as well as in cases in which the Agency
    Spanish Data Protection Agency acts on its own initiative, prior to the

    initiation agreement, there may be a phase of prior investigation actions,
    which will be governed by the provisions of article 67 of this organic law.

    Article 67. Previous investigation actions.


    1.Before the adoption of the agreement to initiate the procedure, and once admitted
    processing the claim if there is one, the Spanish Data Protection Agency
    may carry out prior research actions in order to achieve a better
    determination of the facts and circumstances that justify the processing of the
    procedure.


    The Spanish Data Protection Agency will act in any case when it is
    requires research into treatments that involve massive data traffic
    personal.

    2.Preliminary investigation actions will be subject to the provisions of the

    Section 2 of Chapter I of Title VII of this organic law and may not have a
    duration exceeding twelve months from the date of the admission agreement to
    procedure or the date of the agreement by which its initiation is decided when the
    Spanish Data Protection Agency acts on its own initiative or as
    consequence of the communication that had been sent to him by the authority of

    control of another Member State of the European Union, in accordance with article 64.3 of
    this organic law. (emphasis is ours)

Therefore, it is reiterated that from said regulations it is not inferred in any way that the AEPD
have to justify in the manner required by I-DE the initiation of prior actions in the

sense that there must be something new or some new circumstance or that the
claims have had to provide new and different circumstances regarding
of the documentation provided by I-DE in its notification of the breach to this Agency,
since this is not required by the indicated regulations, in addition to the fact that it cannot be

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 53/88








pretend that those affected contribute something new, apart from knowing that it has been
violated the confidentiality of your personal data due to a cyber attack whose
circumstances unknown.


Precisely the previous investigative actions are carried out to clarify the
facts and circumstances of what happened, gathering more information in order to
be able to determine or not the existence of a possible violation of the regulations in
data protection matters. In this sense, the beginning of previous investigations and
its realization, the power of the AEPD with or without claims, does not prejudge anything, but

that allows gathering the necessary information to determine whether or not there are indications of
infringement. Even after said investigation, the proceedings may be archived
to understand, in view of the information collected, that there are no indications of
infringement. Which, in the present case, has not happened.


What the reflected regulations do indicate is that, after the presentation of claims,
This Agency must decide whether to admit them for processing or not, having finally decided on their
admission through, this time, an Admission Agreement for processing, signed by the
Director of the Agency dated May 9, 2022. And, as indicated in article 67.2
referenced LOPDGDD, the AEPD can carry out prior actions of
investigation in order to achieve a better determination of the facts and the

circumstances. It is a power attributed to it by the RGPD and the LOPDGDD.

Likewise, and to make matters worse, as indicated, even in the
assuming that the claims have not existed, the forecast of the Division of
Technological Innovation would not have been an obstacle or obstacle to the exercise,

ex officio, of the investigative powers that the AEPD has in accordance with the
cited article 64.2 which determines that “The claim is admitted for processing, as well as in
the cases in which the Spanish Data Protection Agency acts on its own
initiative, prior to the initiation agreement, there may be a phase of
previous investigation actions…”


Therefore, this sanctioning procedure has not been initiated due to the content or
by some new information provided in the claims, but by the information and
documentation obtained after the period of prior investigation actions, to the
possible violations of protection regulations may be inferred from it.
of data.


THIRD: Regarding the arguments supported by the Proposed Resolution for
consider that bis in idem does not occur.


I-DE once again indicates that the non bis in idem principle in taxation has been violated
of the two violations, since it understands that the AEPD is not prosecuting the violation
of article 5.1.f) of the RGPD for a reason other than that derived from, in their opinion,
inadequate security of personal data, but solely and exclusively for that
reason.


In this regard, the Judgment of the National Court of July 23,
2021 (rec. 1/2017), which provides,



C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 54/88








“(…) In accordance with the legislation and jurisprudence set forth, the non bis in idem principle
prevents punishing the same subject twice for the same act with support in the
same foundation, the latter understood as the same legal interest protected by

the sanctioning regulations in question. In fact, when there is the triple identity of
subject, fact and foundation, the sum of sanctions creates a sanction unrelated to the judgment of
proportionality carried out by the legislator and materializes the imposition of a sanction
not legally provided for, which also violates the principle of proportionality.

But in order to speak of "bis in idem" a triple identity must occur.

between the terms compared: objective (same facts), subjective (against the
same subjects) and causal (for the same basis or reason for punishing):

       a) Subjective identity assumes that the affected subject must be the same,
       whatever the nature or judicial or administrative authority that

       prosecute and regardless of who the accuser or specific body is that
       has been resolved, or that it is tried alone or in conjunction with other
       affected.

       b) Factual identity assumes that the facts prosecuted are the same, and
       rules out the cases of real competition of infractions in which there is no

       before the same illegal act but before several.

       c) The identity of foundation or cause implies that the measures
       sanctions cannot occur if they respond to the same nature, that is
       That is, if they participate in the same teleological foundation, what happens

       between criminal and administrative sanctions, but not between
       punitive and merely coercive.”

Taking as reference what was previously explained in the procedure
sanctioning agent, the non bis in idem principle has not been violated, since, although

Roughly understood, the facts are detected as a result of a data breach
personal, the violation of art. 5.1.f) of the RGPD results in a clear loss of
confidentiality that affected certain clients, the violation of art. 32 of
GDPR boils down to poor security measures (security only)
detected, present regardless of the personal data breach. Of
In fact, if these security measures that I-DE had implemented had been

detected by the AEPD without loss of confidentiality having occurred,
It would only have been sanctioned by art. 32 of the GDPR.

As we have indicated, through art. 5.1.f) of the RGPD, a loss of
confidentiality and availability and through art. 32 of the GDPR the deficiency of

security measures implemented by the person responsible for the treatment. Measures of
poor security, we add, that violate the GDPR, regardless of whether
whether or not the personal data breach occurred.

Article 32 of the GDPR is violated regardless of whether a breach occurs or not.

personal data breach. That is, it is violated by not having appropriate measures
to guarantee adequate security in the processing of data without
necessary or essential for a security breach to occur in the
personal data that, where appropriate, may affect the confidentiality of the

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 55/88








data, either only to availability, or only to integrity, or to some or all of them.
Another thing is that the deficiency in security measures becomes evident,
in the specific case, on the occasion of a breach of data security

personal data (violation of confidentiality in this case), as has occurred in the
present assumption.

On the other hand the art. 5.1.f) of the RGPD is violated when there is a loss of
confidentiality or integrity of personal data, which may or may not occur
due to absence or deficiency of security measures. This principle only

determines the channel through which the maintenance of the
confidentiality, integrity or availability when it explains “through the application of
appropriate technical and organizational measures”, which are not strictly security measures.

Likewise, it means again that article 5.1.f) of the RGPD is one of the

principles relating to treatment. The principles relating to treatment are, on the one hand,
side, the starting point and the closing clause of the legal protection system
of data, constituting true informing rules of the system with an intense
expansive force; On the other hand, since they have a high level of concreteness, they are standards of
mandatory compliance susceptible to being infringed.


The violation of confidentiality that is attributed to I-DE is for failing to comply with the
obligation imposed in article 5.1.f to process the data in such a way that
ensures adequate security, including protection against
unauthorized or illicit treatment, through the application of technical measures or
appropriate organizational structures.


Finally, it should be added that, in relation to the alleged violation of the principle
of non bis in idem, a response to this allegation was already given in the Proposal of
Resolution, in which the non-existence of the triple
identity of facts, subject and foundation, as required by jurisprudence,

response that appears fully transcribed in the Third section of the Fundamentals of
Law IV of this Resolution and to which reference should be made.

Finally, regarding the allegations by I-DE regarding the fact that in the imputation of the
violation of article 5.1.f) an obligation of result is being required, which
is contrary to the Judgment of February 15, 2022 (cassation appeal

7359/2020), which indicates that the obligation imposed by the regulations for the protection of
personal data, to adopt technical and organizational measures is an obligation to
means and not results, it means that what is analyzed in said Judgment is the
compliance with technical and organizational measures in the sense of whether they are
adequate to guarantee the safety of the treatments, that is, we would be

not in the scope of compliance with article 5.1.f, but in the scope of compliance
of article 32 RGPD when dealing with security measures. Therefore, the argument
given by I-DE and the analysis of the same that is going to be carried out must refer
exclusively in relation to the violation of article 32 GDPR, which will be
develop in the Fifth section of this Legal Basis relating to the

violation of article 32.




C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 56/88








FOURTH: On the application of the principles of the right to sanctions to the activity
of the AEPD and the concurrence of a media competition.


I-DE alleges again that, if the existence of the bis in idem is not appreciated, when
least one of the infractions would be subsumed and embedded in the other, since
that the imputation of the violation of article 5.1.f) of the RGPD is due to the fact that the
treatment has not been carried out, in the opinion of the AEPD, in compliance with the
necessary security measures. Therefore I-DE understands the existence of absolute
link between the alleged absence of adequate security measures and the

breach of the principle of confidentiality. That is to say, it is the supposed insufficiency of
security measures which directly leads to the violation of article 32
and the violation of 5.1.f).
There is, therefore, a clear case of medial competition, since the two infractions
charges cannot be committed one without the other.


Next, I-DE argues the reasons why it considers that it is
application of article 29 of the LRJSP and that, with its non-application, the AEPD is
implicitly repealing, in terms of data protection, all guarantees
of the sanctioning regime established by the Constitutional Court.


In this regard, since this allegation was already formulated against the Agreement of
Beginning and that it was widely responded to in the Proposed Resolution, the
which is transcribed in full in the Third section of the Fundamentals of Law IV,
It is necessary to refer to it in its entirety.


On the other hand, in relation to the mention made by the AEPD regarding the non-
applicability of art. 29 of Law 40/2015, of October 1, on the Legal Regime of the
Public Sector (hereinafter, “LRJSP”), I-DE brings up Royal Decree 389/2021,
of June 1, which approves the Statute of the Spanish Protection Agency
of Data, in which article 3 establishes that the AEPD is governed by the provisions of the

RGPD, and additionally, by the LRJSP. I-DE understands that the above implies
that, in relation to everything not expressly regulated in the RGPD or the
LOPDGDD will comply with the provisions for this purpose in the LRJSP, as is the case of
contests of infractions provided for in article 29 of the LRJSP in relation to the
principle of proportionality as a principle of sanctioning power.


Faced with this, it means that article 3.2 of the aforementioned Statute of the AEPD establishes
the next:

       2. Additionally, as soon as it is compatible with their full independence,
       will be governed by Law 40/2015, of October 1, on the Legal Regime of the Sector

       Public, particularly what is provided for autonomous organizations; by the law
       39/2015, of October 1, of the Common Administrative Procedure of the
       Public administrations; by Law 47/2003, of November 26, General
       Budgetary; by Law 9/2017, of November 8, on Sector Contracts
       Public, by which the

       Directives of the European Parliament and of the Council 2014/23/EU and 2014/24/EU,
       February 26, 2014; by Law 33/2003, of November 3, of the
       Heritage of Public Administrations, as well as the rest of the regulations


C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 57/88








       of general and special administrative law that may apply. In
       defect of administrative rule, common law will apply.


Therefore, what is being indicated is that the regime is additionally applied
legal of the Public Sector, but in relation to its consideration as an organism
public belonging to the General Administration of the State, that is, to
considerations such as its composition, organization, structure, etc.

For its part, article 3.3 of the AEPD Statute indicates the following:


       3. The procedures processed by the Spanish Agency for the Protection of
       Data will be governed by the provisions of Regulation (EU) 2016/679 of the
       European Parliament and of the Council, of April 27, 2016, the Organic Law
       3/2018, of December 5, on Protection of Personal Data and guarantee of

       digital rights, by the regulatory provisions issued in their
       development and, insofar as they do not contradict them, on a subsidiary basis, by the
       general rules on administrative procedures.

Therefore, in the procedures processed by it, among them, the procedure
sanctioning, neither the LRJSP nor the LPAC is applied additionally, but instead declares

that the procedures processed by the AEPD will be governed by the RGPD and the
LOPDGDD. And on a subsidiary basis (not supplementary) by the rules on the
administrative procedures.

In this regard, it is insisted that there is no supplementary application of the aforementioned precept, for

as there is no legal loophole regarding the application of the media competition provided for in
said article 29 of the LRJSP. Neither the RGPD allows nor the LOPDGDD provides the
supplementary application of the provisions of art. 29 of the LRJSP.

In Title VIII of the LOPDGDD related to “Procedures in case of possible

violation of data protection regulations”, article 63 that opens the Title is
provides that "The procedures processed by the Spanish Agency for the Protection of
Data will be governed by the provisions of Regulation (EU) 2016/679, in this law
organic, by the regulatory provisions dictated in its development and, as
do not contradict them, on a subsidiary basis, by the general rules on the
administrative procedures.". Although there is a referral to the LPACAP, it is not

establishes in no way a subsidiary application with respect to the LRJSP that does not
contains in its articles any provision relating to administrative procedure
some.

In the same way that the AEPD is not applying the aggravating and mitigating circumstances provided

in the same art. 29 of the LRJSP, since the RGPD establishes its own, for
Therefore, there is no legal loophole or subsidiary application of the same, nor is there any
application of the section relating to media competition and for identical reasons.”

As already indicated, in addition to the application of rules other than the GDPR regarding the

determination of fines in each of the Member States applying their
national law, whether due to aggravating or mitigating circumstances not provided for in
the RGPD -or in the LOPDGDD in the Spanish case-, either by the application of a
media contest other than that provided for in the RGPD, would reduce the effectiveness of the system that

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 58/88








would lose its meaning, its teleological purpose, resulting in the fines imposed by
different infringements would no longer be effective, proportionate and dissuasive. And of
This way would also deprive the interested parties of the effective guarantee of their

rights and freedoms, weakening the uniform application of the GDPR. The
mechanisms for the protection of the rights and freedoms of citizens and would be
contrary to the spirit of the GDPR.

Clarify, in advance, that supplementary status refers to cases in which, in
a certain norm does not regulate a specific assumption, legal loophole, giving

give rise to the application of another legal norm that regulates such a situation, provided that it does not
is inconsistent with the legal system.

While subsidiarity refers to a competition of standards, which means
that for a given case two or more rules may be applicable, so

so that the subsidizing norm cedes to the benefit of the main one.

Well, having examined both suppletoriness and subsidiarity, we conclude the
not application of article 29 of the LRJSP but of article 83 of the RGPD in relation
with the principle of proportionality.


This is so because:

• The principle of proportionality applies to the sanctioning procedure.

• The principle of proportionality is fully regulated in article 83 of the

GDPR.

• There is no legal loophole.

• Neither the RGPD nor the LOPDGDD refer to the application, due to the existence of a legal loophole,

of article 29 of the LRJSP.

• In the procedures processed by the AEPD, for the procedures
administrative procedures processed, the subsidiary application of the general rules is foreseen
on administrative procedures.


• In the procedures processed by the AEPD, for the procedures
administrative procedures processed and not in relation to the principles of the procedure
sanctioning, a subsidiary application of the LRJSP is not established in the LOPDGDD.

Therefore, there is neither supplementary nor subsidiarity that would make the article apply.

29 of the LRJSP.

Regarding the fact that, as I-DE indicates, the Agency itself has previously
said article 29 is considered applicable considering the existence of cases of
media contest, as in its Resolution of April 23, 2021, issued in the

procedure PS/00240/2019, it should be noted that the Administration can
separate from what was previously resolved. Thus, article 35 of the LPACAP establishes
that:


C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 59/88








1. They will be motivated, with succinct reference to facts and legal bases:

       c) Acts that are separated from the criteria followed in preceding actions or

       of the opinion of advisory bodies.

Therefore, it is legitimate for the Administration to separate itself from the criteria followed in
preceding actions, as long as said change is motivated, which
occurs in the present case. Thus, in addition to what has just been argued in this
own section, it is worth remembering again that this allegation was already made against the

Initiation Agreement, relating to the media contest and responded to it by motivating and
arguing why the existence of the medial competition is not considered and, furthermore,
The non-applicability of article 29 LRJSP is motivated. Therefore, it is necessary to refer to the
arguments put forward and that appear transcribed in the Third section of the
Legal basis IV of this Resolution.


Therefore, once argued and motivated, not only is the existence
of concurrence of infractions, as well as the reasons why it is not considered
applicable to article 29 LRJSP, the change of
criterion.


In this sense, the Sentence of March 12, 2018, of the Superior Court of
Justice of Madrid, Administrative Litigation Chamber, Section 4 (Rec. 761/2017),
points out, on the occasion of the review of a sanctioning procedure, that:

       “(…) the Administration can separate itself from what was previously resolved

       motivating the change (art. 35.c) of Law 39/2015, of October 1, of the
       Common Administrative Procedure of Public Administrations). As
       points out the Supreme Court in its Order of December 4, 1998 "... so that
       the doctrine of the acts of the Administration has application is
       It is fundamentally necessary that a first body of the Administration has

       issued a first act declaring rights and then in the second
       revoke the decision taken in the first", and said circumstance does not occur
       in this case because the present administrative act of tax settlement does not
       revokes any decision taken in a preceding act relating to it
       tax concept nor is there an express declarative act that is now
       modify.


       For these purposes, it is necessary to distinguish between the effectiveness of the acts of the
       Administration and the connection of the Administration to the precedents
       interpretative measures applied in previous situations since, in the event that
       is questioned, and using the words of the Supreme Court (ruling of 25

       February 2000), it is not possible to speak of "own act but at most a change of
       criterion and interpretation, which is perfectly valid." Likewise, the STS
       of June 27, 2000 states:

       "...the principle of acting against one's own acts could not be taken to extremes

       such that they obstruct the conformity with the Law of a certain action,
       by the mere fact of" (the existence of) "another previous one of a different sign although
       this was not protected by legality, in the same way that equality only
       falls within the scope of legality, as is sufficiently known,

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 60/88








       under penalty of being able to consolidate illegal or inappropriate resolutions forever
       to Law, irreversible and impossible to modify later.

       The High Court has expressed itself in the same sense in other Sentences. So,
       In that of February 1, 1999, it declares that "this principle cannot be invoked

       to create, maintain or extend in the field of public law, situations
       contrary to the legal system, or when the preceding act results in
       contradiction with the purpose or interest protected by a legal norm that, due to its
       nature, is not capable of protecting a discretionary action of the
       Administration that involves the recognition of rights and/or
       obligations that arise from its own acts. Or said by another

       In this way, the doctrine of proper acts without the limitation that has just been explained
       could introduce into the field of public law relations the principle
       of the autonomy of the will as an ordering method of regulated matters
       by norms of a mandatory nature, in which the public interest prevails
       safeguarded by the principle of legality; a principle that would be violated

       If an action by the Administration contrary to the
       legal system for the sole fact that this has been decided by the
       Administration or because it responds to a precedent thereof. (...) or, said in
       In other words, it cannot be said that the trust placed
       in an act or precedent that is contrary to the mandatory norm” (the emphasis
       is ours).


Likewise, and for greater completeness, this criterion of understanding the article as not applicable
29 LRJSP is not new as it has been applied in previous sanctioning proceedings
at the moment. As an example, PS/00020/2023 and PS/00667/2023 are noted.

Finally, I-DE alleges that the application of Article 29 is also a possibility

recognized by Guidelines 4/2022, on the calculation of administrative fines under
the RGPD, which expressly stipulates the criteria that the authority must follow
administrative to evaluate, prior to imposition of the sanction, the possible
concurrence of these.

In light of this, it is noted that, in relation to the citation of Guidelines 04/2022 of the

CEPD on the calculation of administrative fines under the GDPR, in its version
2.1, adopted on May 24, 2023, in section 22 reference is made to three
types of concurrence, namely, infringement, unity of action and plurality of
actions: “When examining the analysis of the traditions of the Member States in
matter of competition rules, as indicated in the jurisprudence of the CJEU,
and taking into account the different areas of application and the consequences

legal, these principles can be roughly grouped into the three categories
following: - Concurrence of violations (chapter 3.1.1), - Unity of action (chapter
3.1.2), - Plurality of actions (chapter 3.2).

In cases of concurrence of infractions, the provision established in this regard

is that contained in article 83.3 of the RGPD, which establishes a quantitative limit in
these cases of concurrence: “If a person responsible or in charge of the treatment
breaches intentionally or negligently, for the same operations of
treatment or related operations, various provisions of this


C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 61/88








Regulation, the total amount of the administrative fine will not be higher than the amount
provided for the most serious infractions.”


Likewise, at this moment we must remember that the seriousness of the infractions
of the GDPR is determined in accordance with the rules established in it and not in the
LOPDGDD. The classification of infractions is regulated in article 83,
sections 4, 5 and 6 of the GDPR, while the classification of infringements as
very serious, serious or minor for the sole purposes of the prescription is provided in the
articles 72, 73 and 74 of the LOPDGDD.


Last but not least, the AEPD does not sanction for the same offense, such as
claims I-DE, but have been verified through proven facts not refuted by
I-DE, the commission of two differentiated infractions, classified differently,
Furthermore, in the specific case, there is no medial competition.


For all the above reasons, this allegation is rejected.

FIFTH: Regarding the lack of violation by I-DE of article 32 of the RGPD


Indicates again that I-DE had carried out an analysis of the risks that the treatment
of the data from access to GEA could generate the rights and freedoms of
interested parties, as well as implemented security measures that allowed mitigating
the aforementioned risks


I-DE does not agree that this Agency understands that the measures of
security were insufficient due to the existence of a
vulnerability in GEA that has given rise to the personal data breach, as
understands that the measures adopted by I-DE were robust despite having existed
a security incident, which he does not deny, but he does deny that it can be considered

that this result must necessarily determine the insufficiency of the measures
adopted by I-DE.

I-DE also points out that, even if the AEPD intends to indicate that the vulnerability
finally detected was “avoidable and identifiable”, the truth is that it had not been
been despite the adoption by i-DE of all the guidelines established by

the Iberdrola Group to preserve the security of the information being processed,
and in the same way it was not “avoidable and identifiable” that a
compromise in the credentials of a GEA user (…), as indicated in the
conclusions of the forensic report provided by my client (page 519 of the
administrative file), without in any case being able to prove that the

exfiltration took place as a consequence of the way in which it had been established
the generation of passwords in the application, as the AEPD categorically states.

And in this sense, I-DE understands that it is obvious to indicate that the state of the art of
pentesting techniques do not guarantee one hundred percent the detection of each and every

of vulnerabilities, which cannot even be qualified, as the
AEPD of obvious, let alone considered “avoidable and identifiable”.

Therefore, it maintains that the reasoning supported by the AEPD can only be qualified
to circulate because, being clear that jurisprudence has highlighted that the

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 62/88








obligation to adopt security measures is one of means and not of result,
The AEPD carries out an assessment of the alleged non-compliance by I-DE with the obligation
to implement security measures by reversing the reasoning that must be followed

for this, by indicating throughout his Proposed Resolution that, ultimately, the
measures were objectively inadequate as a consequence of the fact that
The attack could indeed occur and the security breach took place.

Therefore, I-DE maintains that, in this way, the AEPD intends to avoid the doctrine
supported by the Supreme Court in its ruling of February 15, 2022

referring to the insufficiency of the measures, but ultimately their
reasoning is that the result is taken into consideration as a premise for
consider that the means were inadequate before it occurred.

For this reason, I-DE reiterates everything indicated in the document of allegations to the Startup Agreement and

bring up again the ruling of the Supreme Court that has just been
be mentioned, since the AEPD only intends to create an appearance that
the result is not taken into consideration as a determining fact of the alleged
violation of article 32, when, as has been proven, said result is the
premise on which the AEPD bases the alleged insufficiency of the measures adopted by
My client.


Faced with this, it should be indicated, first of all, that the analysis of the risks of the
treatment carried out from access from the GEA application does not show measurement
something to be adopted to alleviate the alleged risks detected. In fact, it is a
analysis based on a document attached by I-DE as Document No. 8

document explaining the logic followed to calculate the risk level according to
to this methodology. This methodology is implemented in a way
automated in the corporate activity registration tool itself
treatment, so that in the registration process itself it determines the level of risk
of the treatment. Thus, the application of said methodology in relation to the

treatment ***TREATMENT.1 resulted in a MEDIUM risk level,
as stated in Document No. 7 referred to above.”

In the aforementioned Document 8, certain threats or circumstances are detailed such as
“vulnerable groups” “access to personal data by more than 10 people”
“international transfers” “large-scale treatments” “profiles with

legal”. These circumstances are stated as questions and, as answered
“yes” or “no”, a result is applied:

(…)


Several of these questions appear in Document 7 referenced by I-DE, which
appears to be the Treatment Activity Record of the activity affected by the
personal data breach, in which the answer is “Yes” or “No” and a
“Medium” risk, but nothing more. That is, there is no indication of any measure adopted or that
should be adopted to alleviate this medium risk. Nor whether it is an inherent risk or

of a residual risk.

Likewise, as indicated in the Proposed Resolution in response to this
same allegation, nor, in view of the aforementioned Document 8, said analysis is

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 63/88








focused on risks of variable probability and severity that for the “rights and
freedoms of natural persons may entail processing, such as
physical, material or immaterial damages, in particular problems of

discrimination, identity theft, fraud, financial loss, harm to the
reputation, loss of confidentiality of data subject to professional secrecy,
unauthorized reversal of pseudonymization or any other economic damage or
significant social; in cases where the interested parties are deprived of their rights
and freedoms or are prevented from exercising control over their personal data; In the cases
in which personal aspects are evaluated, in particular the analysis or prediction of

aspects related to performance at work, economic situation, health,
personal preferences or interests, reliability or behavior, situation or
movements, in order to create or use personal profiles; in cases where
personal data of vulnerable people, in particular children, are processed; or in cases
in which the processing involves a large amount of personal data and affects a

large number of interested parties, etc., all in accordance with Considering 75 of the
GDPR

For its part, art. 28.2 LOPDGDD determines that “For the adoption of the measures
referred to in the previous section, those responsible and in charge of the treatment
will take into account, in particular, the increased risks that could arise in the

following assumptions:

       a) When the treatment could generate situations of discrimination,
       identity theft or fraud, financial loss, damage to the
       reputation, loss of confidentiality of data subject to professional secrecy,

       unauthorized reversal of pseudonymization or any other harm
       economically, morally or socially significant for those affected.

       b) When the treatment could deprive those affected of their rights and
       freedoms or could prevent them from exercising control over their data

       personal (,,,)”

Likewise, as explained in the guide “Risk management and impact assessment in
processing of personal data” of the AEPD, “The RGPD establishes the obligation of
manage the risk that a risk to people's rights and freedoms poses
treatment. This risk arises both from the very existence of the treatment and from

its technical and organizational dimensions. The risk arises both from the
automated data processing and manual processing,
human elements and the resources involved. The risk arises from the purposes of the
treatment and its nature, and also by its scope and the context in which it is
unwraps.”


However, as already indicated, these risks have not been assessed. Not have
assessed the damages to natural persons, material or immaterial, or at least not
it is proven that it has been done, lacking, therefore, a risk analysis focused on
the protection of the rights and freedoms of the interested parties. Likewise, neither

indicates what security measures to adopt to mitigate this “Medium” risk.

Therefore, I-DE has not proven what it states regarding that “it had led to
carried out an analysis of the risks that the processing of data from access to

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 64/88








GEA could generate in the rights and freedoms of the interested parties, as well as
implemented security measures that allowed mitigating the aforementioned risks."


Secondly, in that I-DE had robust measures implemented and that
This Agency has linked the alleged non-compliance with article 32 to the result of the
incident, bringing up again what was stated by the Supreme Court in its
ruling of February 15, 2022 (cassation appeal 7359/2020), it means that,
As was already responded to this same allegation in the Proposed Resolution,
the deficiencies detected and which represent non-compliance with article 32 of the RGPD

They existed independently of the attack and the security breach that occurred.

Thus, in the present case there was a vulnerability in the GEA web application, so
prior to the attack and which was used by the cybercriminal. So, as it has
proven in the Proven Facts, the attack occurred from a user

validly logged (…).

Therefore, the above shows the existence of a web application with a
vulnerability that allowed:

-(…)


Likewise, as a subsequent measure to avoid incidents such as the one that occurred,
proceeded through I-DE to modify the GEA application (…).

On the other hand, as security measures existed before the incident, they pointed out,

among others, the following:

(…). And it is precisely this vulnerability that was used by the attacker during
the security breach.


(…).

From the above, it follows that this attack would have been avoided if that
code would not have been visible. Even more so if you take into account that this is one of the
requirements that are included in the indicated document, (…).


Likewise, this vulnerability is identifiable in security assessments. Without
However, during the investigation proceedings I-DE has not proven that
detect the vulnerability of the GEA application within the framework of the
security evaluation implemented in the Iberdrola Group. Furthermore, as has been
indicated, the last review or security assessment of critical applications dates from

2019, almost two and a half years before the incident, so they were not being very
taking into account the rapid advances in technology, as well as the
sophistication of cyber attacks, in addition to the fact that the
results obtained.


Therefore, the GEA application contained an avoidable and identifiable vulnerability that
was the one used by the attacker. This clearly shows a
non-compliance with article 32 of the GDPR, as it requires appropriate measures to
guarantee a level of security appropriate to the risk, and all this taking into account the

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 65/88








state of the art, application costs and the nature, scope, context and
the purposes of the treatment.


(…)

Therefore, all this shows that the security measures at the time
of the incident were not appropriate for adequate data protection
according to the risks of the treatments and taking into account the state of the
technique and current costs.


Due to the above, in no way has this Agency indicated that the exfiltration
took place as a consequence of the way in which the
password generation in the affected application. What has been pointed out is that the
attack took place having taken advantage of the vulnerability in said application

consisting of the visualization, from a correctly validated session, (...).

In addition to this fact, what has been pointed out by this Agency is that it also
There were other deficiencies in security measures, such as a policy of
passwords (…).


These are deficiencies in themselves, regardless, it is insisted, of the concrete
incident that occurred and the personal data breach that occurred. However, not
The fact that the vulnerability in the GEA application was
precisely the one taken advantage of by the attacker who, in addition, initially
access validly logged in without the exfiltration being detected at first

illegitimate information and without being able to know with complete certainty why
medium obtained the credentials of a user, since in the report issued by the
company SIA about the incident, it is indicated that:

(…)


Likewise, the SIA company itself, in its recommendations, expressly indicated:

• (…)

Regarding the possibility of access to the web application from suspicious IPs or

malicious or, at least, not necessary for the business, it should not be forgotten either
that, as noted in the SIA company report, (…).

Therefore, in no way has this Agency relied on the result of the cyber attack
to justify non-compliance with article 32 of the RGPD, since, as has been stated

noted, said non-compliance already occurred before and independently of the attack
suffered, which shows that there were no appropriate measures to
ensure an adequate level of security.

Finally, regarding the Supreme Court Ruling of February 15, 2022

(cassation appeal 7359/2020), indicated by I-DE, means, as already stated
pointed out in the Proposed Resolution that the aforementioned Judgment effectively indicates,
on security measures regarding data protection, which “…the
obligation that falls on the person responsible and on the person in charge of the treatment

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 66/88








regarding the adoption of necessary measures to guarantee the safety of the
personal data is not an obligation of result but of means, without
the infallibility of the measures adopted is required. Only the

adoption and implementation of technical and organizational measures, which in accordance with the state
of the technology and in relation to the nature of the processing carried out and the data
personal data in question, reasonably allow to avoid its alteration, loss,
“unauthorized treatment or access.” (emphasis is ours)

However, the Judgment continues indicating, in the specific case analyzed in

same, that “…the program used to collect customer data does not
contained no security measures that would allow checking whether the address of
email entered was real or fictitious and whether it really belonged to the person
whose data was being processed and gave consent for it. The state
of the technique at the time these events occurred made it possible to establish

measures aimed at verifying the veracity of the email address, conditioning
the continuation of the process for the user to receive the contract at the address
provided and only from it provide the necessary consent for its
collection and treatment. Measures that were not adopted in this case.

(…) So, at the time these events occurred, there were

technical measures related to the registration process, which would have prevented the filtration of
personal data produced. This implies that the technical measures adopted
did not comply with the security conditions in the terms required in art. 9.1 of the
LO 15/1999, therefore incurring the infringement provided for in art. 44.3.h)
consisting of "Maintain the files, premises, programs or equipment that contain

personal data without due security conditions that via
regulations are determined [...]".

It should be noted, first of all, that this ruling is issued under the protection of the
regulations prior to the RGPD, in which, in accordance with the system provided for in the LOPD and in

the RLOPD, security measures were perfectly standardized. It has been
gone from a system with standard and static security measures for any
responsible for security measures specific to each organization (adapted to their
characteristics and idiosyncrasy), which considers the specific risks of the entity of
that is concerned; Furthermore, they are now dynamic, in such a way that they are not exhausted by the
implementation of security measures appropriate to the risk at the beginning of the

treatments, but must adapt to the risks that appear.

The new regulation provided for in the GDPR significantly expands the obligations of the
responsible for the treatment and its scope of action and responsibility, extending
now clearly to the actions carried out by those in charge of the

treatment, which fall within their scope of responsibility.


Secondly, the cited Supreme Court Judgment considers, in relation to
a violation of art. 9 of the LOPDP that “the obligation that falls on the

responsible for the file and about the person in charge of processing regarding the adoption
of measures necessary to guarantee the security of personal data
It is not an obligation of result but of means, without infallibility being required.
of the measures adopted. Only the adoption and implementation of

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 67/88








technical and organizational measures, which in accordance with the state of technology and in
relation to the nature of the processing carried out and the personal data in question,
reasonably allow to avoid its alteration, loss, treatment or unauthorized access

authorized".

Regarding this, he specifies that “It is not enough to design the technical and organizational means
necessary, it is also necessary to correctly implement it and use it correctly.
appropriate, so that he will also be responsible for the lack of diligence in his
use, understood as reasonable diligence taking into account the circumstances

of the case".

As has been demonstrated and argued throughout this
sanctioning procedure, it is considered that there were no measures of
appropriate security measures to ensure security appropriate to the risk, including

even if there had been no personal data breach.

In this regard, this Agency wishes to point out that in no way does it consider that the
obligation to implement security measures imposed by the regulations of
data protection has the nature of an obligation of result and not of means.
But it is no less true that I-DE did not count, before the incident occurred,

with measures that “in accordance with the state of technology and in relation to nature
of the processing carried out and the personal data in question, reasonably allow
prevent its alteration, loss, treatment or unauthorized access.”

Therefore, although it is inferred from the Judgment that the obligations established by the

Article 32 of the GDPR are media, it also makes it clear that, if at the time of
When the incident occurred, there were adequate technical measures to avoid or mitigate the
effects thereof and were not applied, this represents a breach of the aforementioned
obligation imposed by the RGPD and, therefore, a violation of it.


In the present case, as has been repeatedly pointed out, there was a vulnerability
in the GEA application, (…). This clearly shows a breach of the
Article 32 of the GDPR, as it requires appropriate measures to guarantee a level
of security appropriate to the risk, and all this taking into account the state of the
technique, the costs of implementation and the nature, scope, context and purposes of the
treatment.


For the above reasons, the allegation is rejected.

SIXTH: Regarding the absence of violation of the principle of confidentiality and

integrity.

I-DE once again outlines the absolute identity between the two infractions that were committed against it.
charge to the extent that the alleged violation of article 5.1.f) of the RGPD or
well it turns out to be the result of the alleged violation of article 32 of said

Regulation or brings direct, immediate and exclusive cause of this assumption
second breach, that is, due to the lack of adequate security measures.

I-DE points out in this regard that the AEPD has not considered the existence of
any violation that does not refer to security measures, since no

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 68/88








indicated any measure that has ceased to comply other than the security measures that
may be required.


In this regard, it was already indicated in the Proposed Resolution that when art. 5.1.f)
of the GDPR refers to appropriate technical or organizational measures to ensure the
rights and freedoms of data subjects within the framework of compliance management
regulations of the RGPD does so in the sense provided for in art. 25 of the GDPR regarding
privacy by design.


This precept determines that,

       “Taking into account the state of the art, the cost of the application and the
       nature, scope, context and purposes of the processing, as well as the risks of
       varying probability and severity that the treatment entails for the rights and

       freedoms of natural persons, the person responsible for the treatment will apply, both
       at the time of determining the means of treatment as well as at the time
       of the treatment itself, appropriate technical and organizational measures, such as
       pseudonymization, designed to effectively apply the principles of
       data protection, such as data minimization, and integrate safeguards
       necessary in the treatment, in order to comply with the requirements of this

       Regulation and protect the rights of the interested parties” (emphasis is
       our)

It should be noted that there are multiple technical or organizational measures that are not
security and that the person responsible for the treatment can implement as a channel to

guarantee this principle.

In this sense, I-DE has not proven that it has complied with the provisions of said
precept, since it has not been proven that, in accordance with the risks of
varying probability and severity that the treatment entails, for the rights and

freedoms of natural persons, has applied technical and organizational measures
appropriate measures, such as pseudonymization, designed and intended to apply
effectively the principles of data protection, among which is the
confidentiality principle.

Therefore, the GDPR requires the applicability of data protection from design and implementation.

need to manage both the risks to the rights and freedoms of
individuals, such as the impact on those rights and freedoms that a
data breach, especially in web environments, because they can affect a large
population volume.


As stated in the guidelines for treatments that involve communication of
data between public administrations of this Agency, whose reasoning is
extrapolated to large organizations that handle large amounts of data, always

There are risks related to personal data breaches. However, these
will be especially considerable in the processing of personal data carried out
carried out by large public and private organizations that are serving a large

part of the citizens, and even much more if they are interconnected. Is very
It is important to keep in mind that the risk that data breaches can pose

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 69/88








personal data in such treatments does not depend so much on whether categories of
sensitive and/or specially protected data as well as the consequences for the

fundamental rights that can arise from an information compromise

To estimate the impact that a personal data breach could have, you must
consider the consequences that would arise from its materialization. A form of

To do so is, before a breach occurs, to consider the possible scenarios of
materialization of a compromise of personal data, determine its
consequences, and evaluate how it affects the rights and freedoms of the interested parties,

especially if these are irreversible consequences on their fundamental rights

Regarding measures appropriate to the level of risks to rights and freedoms,
the art. 24.1 of the GDPR establishes that the measures to be adopted in a

treatment to guarantee and be able to demonstrate its compliance with the Regulation
must take into account the scope, context and purposes of the treatment, and must

address, in particular, the extent of subjects affected by it and the risk that
means for fundamental rights and not only the typology of the data

In the aforementioned Guidelines it is indicated that “the technical and organizational measures that

adopted must be specifically aimed at minimizing the risks
identified for rights and freedoms from potential data breaches
personal. This implies that the person responsible must evaluate the risks that may

appear, design measures aimed at minimizing its probability and impact, and
determine the extent to which such measures are appropriately managing the
“concrete risks in a dynamic process”


And it is added that “Appropriate measures must be selected and implemented
from the design of the treatments with the aim that all risk contexts
for rights and freedoms to be considered. It must be taken into account that

Some measures will be more effective in avoiding or mitigating the direct impact on the
individuals and other measures will be mainly about the social impact for the
Fundamental rights. It is necessary to apply a high level of data protection by

flaw (…)"

It is not disputed that a personal data breach may occur, therefore within
of the risk management of a given organization, precisely because
may produce a gap, said scenario must be evaluated as

inseparable part of risk management for the purposes of (i) adopting all types of
appropriate technical and organizational measures to prevent it from materializing and (ii)
determine post-facto measures to minimize damage. On this particular
The aforementioned Guidelines explain that “given the possible scenarios of materialization of
different types of gaps, the answer must be found, at least, to the following

questions from the design of the treatment and prior to its implementation:

• What personal and social impact a personal data breach can have if
materializes.


C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 70/88








• What data protection measures should be implemented a priori to
minimize the personal and social impact that a materialized breach could produce.


• What response measures should be planned and executed after the fact,
once the breach has occurred, to minimize the personal and social impact.”

Therefore, its management cannot be based exclusively on the scope of the
cybersecurity, but it has to encompass all the areas in which it is developed
treatment, since, otherwise, risk management would not be complete, and, therefore,

it would be useless. To achieve this, it is essential to adopt specific measures for the
data protection by design and by default, and also measures for a
effective management of the consequences of the gap aimed at protecting rights
fundamentals of natural persons.


As has been noted, there are multiple technical or organizational measures that are not of
security and that the person responsible for the treatment can implement as a channel to
guarantee the principle of confidentiality.

In this sense, I-DE has not proven that it has complied with the provisions of the
RGPD, since it has not been proven that, in accordance with all of the above, there has been

evaluated those risks and applied appropriate technical and organizational measures
aimed at effectively applying data protection principles, including
measures aimed at guaranteeing the principle of confidentiality. And along with this there must be
highlight that in this case the bankruptcy of the principle of
confidentiality


Furthermore, and apart from the above, not even in the analysis of the risks
to adopt the security measures of article 32, the measures have been indicated.
measures to be adopted to alleviate the “medium” risk that the activity of
treatment affected by the gap, as indicated below in detail.

more extensive and detailed in the response to the Fourth allegation hereof
Foundation of Law.

Therefore, in the case examined, as stated in the proven facts, there is
a clear loss of confidentiality since access has occurred by a third party
not authorized to the personal data processed by I-DE, which does not imply a

objective liability, since I-DE was not diligent in not guaranteeing, in this way,
adequate security through the application of technical measures and
appropriate organizational measures, not only security, but of all kinds.

Regarding what was pointed out by I-DE regarding that this AEPD has not accredited

in no way materializes the risk posed by the loss of confidentiality.
for the affected people, that no I-DE client has seen their
rights as a consequence of the security breach that occurred, which includes
which does not allow considering a principle violated and imposing as a consequence of
said alleged infringement the fine of two million euros on the basis of a mere

potential or the consideration that a high risk of fraud could occur, in
in any way accredited.



C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 71/88








Faced with this, and as already indicated in the Proposed Resolution, what was
charges I-DE is the violation of the principle of confidentiality since it is clear that, after
suffer a computer attack against the GEA website, there was illegitimate access to data

personal data and their extraction by an unauthorized third party, which meant
the loss of confidentiality and control of numerous personal data (name and
surnames, ID, postal address, fax, e-mail, telephone, customer code) and that affected
1,350,000 I-DE clients. Therefore, the risk did materialize, the loss of
confidentiality and loss of control over data. What is guaranteed is the
confidentiality in order to avoid the serious damage that bankruptcy may cause, since

It represents a high risk for the interested parties, if confidentiality is violated,
of fraudulent use of data: identity theft for recruitment
online, phishing, financial fraud, etc. The loss of confidentiality has already been
occurred in this case when the access and exfiltration occurred, which does not
is that there is a “probability” of risk, but rather the realization of this risk causing a

damage by itself. This represents a breach of the duty to guarantee the
confidentiality of personal data, since as indicated, article 5.1.f)
points out that they must be treated in such a way as to guarantee safety
adequate protection of personal data, including protection against unauthorized processing.
authorized or illegal.


Likewise, regarding the fact that none of its clients have been affected in any
of their rights as a consequence of the security breach, I-DE forgets that the
The loss of confidentiality itself means that the
core of the fundamental right to data protection, which is none other than that of
have control of personal data.


Regarding the high risk that this data, in the hands of
cybercriminal/s, were used fraudulently, this was indicated to express what
involves the loss of confidentiality, but is not necessary in any way, to
understand that article 5.1.f has been violated, that said risks of fraudulent use are

materialize, because what has materialized with the gap is the loss of
confidentiality of the personal data processed by I-DE, which is what is attributed to it
exclusively.

For the above reasons, the allegation is rejected.


SEVENTH: Regarding the violation of the principle of proportionality to the detriment of the
I-DE rights

I-DE draws attention to the fact that the same aggravating circumstances have been applied in

relation to the two infractions charged, which is understood to show to what extent
point the connection between both in total, proceeding with the application of what was invoked in
the Second and Third allegations (violation of the non bis in idem principle and
existence of medial contest)


In this regard, it was already indicated, in relation to the application of identical aggravating factors
in both infractions, that the circumstances provided for in art. 83.2 of the GDPR and the
provided in art. 76.2 of the LOPDGDD are the only ones that can be applied by
AEPD for any infraction.


C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 72/88








The determining factor in this case is not that they coincide in their use, but rather the foundation
to be established for your consideration.


Likewise, I-DE alleges the inappropriate application of article 83.2.a) of the RGPD,
drawing I-DE attention to the fact that it has been considered appropriate
aggravate the penalty imposed due to the fact that a loss of property has occurred
confidentiality of personal data, both in relation to article 32 and
article 5.1.f)


Thus, I-DE maintains that, in relation to the violation of article 32, in accordance with
traditional concept of security in systems, its objective is the
guarantee of the integrity, confidentiality and availability of the information, therefore
that, if the AEPD considers that the fact that a gap occurs
confidentiality would aggravate the conduct consisting of the alleged absence of such

security measures, any accusation for the alleged violation of article 32,
will be aggravated by the AEPD, which would entail the inclusion in the catalog of
violations of a kind aggravated by their very nature, which without
However, it is not included in the RGPD or the LOPDGDD.

In this regard, it should be noted, contrary to what has been argued, that the violation of

Confidentiality is not necessary or essential in the commission of the
violation of article 32, since as already indicated above, it can be
violate the aforementioned article 32 due to the absence of appropriate security measures or due to
inefficiency in its use or implementation, without necessarily having
a personal data breach has occurred. Another different thing is that it is put into

evidences the violation of article 32 as a consequence of the materialization of a
violation of the security of personal data that, by its very definition, involves
“any breach of security that results in the destruction, loss or alteration
accidental or unlawful personal data transmitted, preserved or otherwise processed
form, or unauthorized communication or access to said data” (section 12 of

article 4 of the GDPR)

Therefore, in the present case, there was a vulnerability in an I-DE application,
in addition to other deficiencies such as password policy and limits
existing in access to the application from suspicious IPs and not necessary for the
business development, which revealed that I-DE was not applying

appropriate measures to guarantee a level of security appropriate to the risk of its
treatments (don't forget that it is a web application, that is, with access from
internet), which in itself represents a violation of article 32. If in addition
These deficiencies have allowed or facilitated, as is the case, the occurrence of
a personal data breach (in this case, confidentiality breach), there is no

no obstacle to considering said violation as an aggravating circumstance of the
article 83.2.a), which allows taking into account the “nature, severity and duration of
the infringement, taking into account the nature, scope or purpose of the operation of
treatment in question as well as the number of interested parties affected and the level of
the damages and losses they have suffered” (emphasis added).


Regarding the application of the aggravating circumstance of article 83.2.a) for violation of the article
5.1.f), although it is true that the violation of confidentiality is not appropriate
as a circumstance to be taken into account to aggravate the infringement since

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 73/88








is subsumed in the offending type itself, it is also true that said precept, the
83.2.a) of the RGPD has been applied as an aggravating circumstance, also taking into account the
number of interested parties affected, which are very numerous, amounting to more than one

million people (1,350,000), as well as numerous data were stolen
personal information (name and surname, ID, postal address, e-mail, telephone number,
client code), so it is appropriate to continue taking these circumstances into account
as aggravating factors, so article 83.2.a) of the GDPR continues to apply.

Regarding the fact that I-DE understands that in relation to this aggravating circumstance, it is intended to take into account

account of alleged damages and losses suffered, which have not been proven
by the AEPD, it means that what is taken into account in said aggravating circumstance is the damage
and the risk that it poses in itself to loss of confidentiality, which entails a total
loss of control over one's own personal data and the high risk that it entails of
that are used fraudulently, since they have been stolen by a cybercriminal.


On the other hand, I-DE argues that the aggravating circumstance of article 83.2.b cannot be applied.
of the RGPD regarding the existence of negligence since, in the Court's Ruling
of Justice, of December 5, 2023 (case C-807/21), it is declared that:

          “75 Consequently, it must be declared that article 83 of the GDPR does not

       allows imposing an administrative fine for an infraction contemplated in
       its sections 4 to 6 without proving that said infringement was committed
       intentionally or negligently by the person responsible for the treatment and that, for
       Therefore, guilt in the commission of the infraction constitutes a requirement
       for the imposition of the fine.”


From this I-DE deduces that if this intentionality or negligence is necessary for
the infringement can be considered committed, it can hardly be considered that the
The most serious form of culpable guilt can act as an aggravating circumstance,
and even less about a subjective criterion, such as the volume of I-DE.


Faced with this, it should be noted that one thing is that, in order to impute an infringement
administrative is necessary the existence of intention or negligence and another, which does not
The existence of especially negligent negligence may be used as an aggravating circumstance.
highlighted, due to the circumstances of the case. The opposite would be contrary to one's own
article 83.2.b) which establishes that “When deciding to impose an administrative fine

and its amount in each individual case will be duly taken into account:

       b) intentionality or negligence in the infringement”

Thus, in any violation of data protection regulations,

the existence of intentionality or negligence. And this both to a
data controller as a natural person, as a legal entity, whether a small
company with little connection with the processing of personal data, whether it is a
large company, a multinational, etc., and with processing of personal data in a manner
continuous and on a large scale, for example.


Therefore, once it has been determined that, as a premise, this subjective element occurs
base guilt, this does not prevent the aggravating factor from being considered
intentionality or negligence indicated by considering that, in accordance with the

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 74/88








specific circumstances of the case, a different degree of intentionality is considered
or negligence in the actions of the offending subject. Thus, in accordance with the
Guidelines 04/2022 of the European Data Protection Board on the calculation of

administrative fines under the GDPR, version 2.1, adopted on 24
May 2023, notes the following:

“4.2.2 — Intentional or negligent nature of the infringement

55. In its previous guidance the EDPB stated that "in general, the intention

includes both knowledge and will in relation to the characteristics of
a crime, while "unintentional" means that there was no intention to cause the
infringement, although the controller/processor breached the duty to
care required by law.


Example 4 — Illustrations of intent and negligence (from WP 253)

"Circumstances indicative of intentional violations may be a
illicit processing explicitly authorized by the senior management hierarchy of the
responsible for the treatment, or despite the advice of the protection delegate
of data or violating existing policies, for example, obtaining and

processing of data about the employees of a competitor with the intention of
discredit that competitor in the market. Other examples here can be:

       - the modification of personal data to give a (positive) impression
       misleading about whether objectives have been met; we have seen it in the context

       of targets for hospital waiting times

       - the trading of personal data for commercial purposes, i.e. the sale of
       data as “opted in” without checking or ignoring the opinions of users.
       interested parties about how their data should be used


Other circumstances, such as failure to read and follow policies
existing, human error, lack of verification of personal data in the
published information, the lack of application of technical updates in the
timing, lack of policy adoption (rather than simply lack of
of application) may be indicative of negligence";


56. The intentional or negligent nature of the infringement [Article 83(2)(b) of the
GDPR] must be evaluated taking into account the objective elements of conduct
obtained from the facts of the matter. The EDPB highlighted that it is generally accepted that
intentional violations, "demonstrate contempt for the provisions of the law,

are more serious than unintentional ones. In the case of intentional infringement, it is
The supervisory authority is likely to give more weight to this factor. According to
the circumstances of the case, the supervisory authority may also attribute weight to the
degree of negligence. At best, negligence could be considered
neutral." (emphasis is ours)


In the present case, the aggravating circumstance of negligence was appreciated since the
detected vulnerability could have been avoided, and is also a vulnerability
identifiable in security assessments. Likewise, in relation to the infringement

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 75/88








of article 5.1.f) of the RGPD, negligence was also seen as an aggravating circumstance
shown by I-DE because, as has been pointed out, due to its subjective circumstances
and due to the high number of clients it has, a higher degree of

professionalism and diligence in the duty to guarantee the confidentiality of the
personal data of its numerous clients.

Regarding the consideration of the size of I-DE as an aggravating factor, it should be noted
that the same level of diligence cannot be demanded from a company like I-DE, which
required from a natural person or a small business, for example. This means that

A higher level of diligence is required because the level of professionalism is
elderly.

It is appropriate to recall again, in this sense, the Judgment of the National Court of
10/17/2007 (rec. 63/2006), that with respect to entities whose activity involves the

continuous processing of customer data, indicates “…the Supreme Court comes
understanding that imprudence exists whenever a legal duty of
care, that is, when the offender does not behave with the required diligence. And in the
assessment of the degree of diligence, special consideration must be given to professionalism
or not of the subject, and there is no doubt that, in the case now examined, when the
activity of the appellant is constant and abundant handling of data of a

personnel must insist on rigor and exquisite care to conform to the
legal provisions in this regard.

Finally, contrary to what was stated by I-DE, the consideration of this aggravating circumstance
of negligence has at no time meant that the limit has been increased

maximum of the sanction to be imposed, since the maximum limits are established
in sections 4 and 5 of article 83 of the RGPD, which allow imposing a
penalty, respectively of 10,000,000 euros or 2% of the business volume
global annual total and 20,000,000 euros or 4% of the total annual business volume
global. Therefore, at no time has the maximum amount of the

sanction that could be imposed as a consequence of the application of the aggravating circumstances
as indicated by I-DE.

Regarding the aggravating circumstance included in article 76.2.b of the LOPDGDD,
I-DE points out that his behavior is getting worse due to the mere fact of belonging to
a specific sector of activity. In this regard, it is meant that this provision does not

The specific activity to which I-DE is dedicated (distributor) is taken into consideration.
of energy), but its connection with the performance of data processing
personal, since it carries out massive and large-scale treatments (21 million
clients), through computer applications and web applications and continuously.


In this sense, the Spanish legislator has considered including in article 76 of the
LOPDGDD that: “2. In accordance with the provisions of article 83.2.k) of the Regulations
(EU) 2016/679 may also be taken into account:
(…)
b) The linking of the offender's activity with the performance of medical treatments.

personal information."

This Agency simply takes into consideration that circumstance, provided for by the
legislator, when deciding the imposition of the administrative fine.

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 76/88









Finally, I-DE alleges the breach of the principle of equal treatment if it is taken into account
consideration of the precedents of this Agency. Thus, it indicates the procedure

PS/000179/2020 in which it indicates that a minor penalty was imposed despite
understand that the circumstances were more serious, but that, above all, in said
file, no sanction was imposed for violation of article 5.1.f) of the RGPD,
despite the existence of a data confidentiality breach being evident,
The AEPD having therefore modified its criteria, since by now converting what was
considered a violation of article 32 of the GDPR in two violations, by making

now refers to 5.1.f) of the RGPD, and considerably multiply the total amount of
The infringement represents a flagrant breach of the principle of equality, security
legal and public faith. Likewise, he points out that this also goes against the doctrine of
own acts.


Faced with this, as already pointed out in the Proposed Resolution, the
circumstances and facts of procedure PS/000179/2020 are not the same nor
comparable, just as there is no equality in illegality, so there is no
try to equate sanctions in the face of different facts and circumstances. Therefore,
It is necessary to refer to the response to this same allegation and which appears
transcribed in its entirety in the Sixth section of the Fundamentals of Law IV of the

present Resolution.

Regarding what I-DE maintains regarding the fact that the principle of
equality also in the fact that PS/000179/2020 only sanctioned
for a violation of article 32 and was not considered a violation of article 5.1.f) of the

RGPD, there having also been a confidentiality breach, and that this also
goes against the doctrine of proper acts, it means that I-DE has only
selected and brings up this file to defend an alleged treatment
unequal but which, however, ignores the numerous sanctioning procedures
existing prior to the present in which, after a gap of

confidentiality, has been sanctioned for violating both precepts. By way
As an example and without exhaustive character, since there are more, the following should be indicated:
PS/00444/2021, PS/00420/2021, PS/00528/2021, PS/00099/2022, PS/00113/2022,
PS/00164/2022, PS/00419/2022, PS/00168/2022.

Finally, regarding the procedure PS/0002/2023 in which they have been imposed

also two sanctions for violating both article 32 and 5.1.f) of the RGPD and that for
also refer to a company in the electrical sector, brings up I-DE to make
a comparison, because there it was imposed, in the total sum of the two sanctions for
these two infractions, an amount that only exceeds 500,000 euros than those imposed
to I-DE, despite the fact that there were affected parties, it means again that the

facts and circumstances are different and that, for this reason, a fine was imposed
different (in this case higher), in addition to other fines for other violations
different ones that were considered.

In this sense, it is once again recalled that, in terms of data protection, the

technical and organizational security measures to be adopted by those responsible for the
treatment and other obligations to comply required by the RGPD, must be the
appropriate in relation to the specific risks posed by the specific
treatments carried out by each person responsible. Therefore, when analyzing the diligence of some

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 77/88








and others in compliance with the regulations must be based on the circumstances of each
case, taking into account the nature, scope, context and purposes of each
treatment, therefore there are no identical cases. In this sense, it must be remembered
that article 83, in section 2, establishes that “Administrative fines are
will be imposed, depending on the circumstances of each individual case…” (the emphasis

is ours)

Therefore, it is necessary to attend to the circumstances of each individual case, there being no
two identical files and, therefore, with equal results.

As a general and final consideration, it should be noted that none of the sanctions

applied violates the principle of proportionality. Thus, it must be remembered that the
articles 83.4 and 83.5 of the RGPD, where the
violation of article 32 and article 5.1.f), establish limits on the amounts
of the fines that can be imposed, very far from those that have finally been imposed
established.


Thus, article 83.4 of the aforementioned Regulation establishes that sanctions will be imposed, in accordance
with paragraph 2, with administrative fines of a maximum of EUR 10 000 000 or,
In the case of a company, an amount equivalent to a maximum of 2% of the
total global annual business volume of the previous financial year, opting for the
of greater amount. In this regard, according to the Axesor entity, the volume

of business for 2022 from I-DE was ***AMOUNT.2 euros, which would have
allowed to impose a penalty of up to ***AMOUNT.3 euros, for the violation
of article 32.

For its part, article 83.5 of the RGPD establishes that sanctions will be imposed, in accordance with
paragraph 2, with administrative fines of a maximum of EUR 20 000 000 or,

In the case of a company, an amount equivalent to a maximum of 4% of the
total global annual business volume of the previous financial year, opting for the
of greater amount. In this regard, in accordance with the turnover
indicated, would have allowed imposing a penalty of up to ***AMOUNT.4 euros,
for violation of article 5.1.f).


Therefore, taking into account the above, as well as the negligence of I-DE in having a
web application with the vulnerability detected, with a weak password policy and
with access permissions from suspicious IPs and not necessary for development
of your business activity (and much less for the purpose of the application in
issue), from which the personal data of its clients is accessed and taking into account
takes into account the high number of affected people whose personal data were

exfiltrated by a cybercriminal, which represents a loss of control over the
personal data irremediably, with the risk that this entails, cannot be
It can be said that the sanctions finally imposed violate the principle of
proportionality, taking into account that “Each supervisory authority will ensure that
the imposition of administrative fines in accordance with this article for the

infringements of this Regulation indicated in paragraphs 4, 5 and 6 are in
each individual case effective, proportionate and dissuasive” (emphasis is
our)



C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 78/88










                                           SAW

                              Integrity and confidentiality

Article 5.1.f) “Principles relating to processing” of the GDPR establishes:


"1. The personal data will be:
(…)

       f) treated in such a way as to ensure adequate safety of the
       personal data, including protection against unauthorized processing or

       unlawful and against its loss, destruction or accidental damage, through the application
       of appropriate technical or organizational measures ("integrity and
       confidentiality»).”

The principle of data integrity and confidentiality requires a guarantee of
security in the application of technical or organizational measures that prevent alteration

of personal data, its loss, unauthorized or illicit processing or access. It's not
the existence of this fundamental right is not possible if the
confidentiality, integrity and availability thereof.

Hence, the integrity and confidentiality of personal data are considered

essential to prevent the interested parties from suffering negative effects. Therefore, they must
be treated in a manner that ensures adequate integrity and confidentiality of
personal data, especially to prevent access, processing or use
authorized users of said data.


In short, it is the data controller who has the obligation to integrate the
necessary guarantees in the treatment, with the purpose of, by virtue of the principle of
proactive responsibility, comply and be able to demonstrate compliance, while
while respecting the fundamental right to data protection.

In this regard, it must be remembered that the confidentiality of personal data is

regulated in article 5 of the RGPD, being, therefore, one of the principles relating to
treatment. The principles relating to treatment are, on the one hand, the starting point
and the closing clause of the legal data protection system, constituting
true informing rules of the system with an intense expansive force; for another
On the other hand, as they have a high level of specificity, they are mandatory standards.

likely to be infringed.

Article 5.1.f) of the GDPR establishes a clear obligation of consistent compliance
in preventing unauthorized or illicit treatments by implementing measures of all kinds
adequate to guarantee the confidentiality, integrity and availability of the data.

Consequently, those responsible for the treatment must be available to
guarantee the confidentiality of personal data to prevent a third party
access data that does not belong to them, since it is precisely their responsibility to process the
personal data in accordance with the RGPD and LOPDGDD. For this reason, it is an activity in
where the diligence provided by them is essential to avoid this type of access
Not allowed.

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 79/88









In the present case, the principle of confidentiality has been violated since it is clear that
after suffering a computer attack against the I-DE connection management website

(GEA), taking advantage of its vulnerability, an illegitimate access occurred
to personal data and their extraction, which meant the loss of
confidentiality and control of numerous personal data (name and surname,
ID, postal address, fax, e-mail, telephone, customer code) and which affected, among others,
1,350,000 I-DE clients. This represents a breach of the duty to guarantee the
confidentiality of personal data, since as indicated, article 5.1f)

points out that they must be treated in such a way as to guarantee safety
adequate protection of personal data, including protection against unauthorized processing.
authorized or illegal.

Therefore, the risk of loss of confidentiality has materialized, having been

usurped by a cybercriminal, which means that they can be used for
not known (sold, communicated, published, etc.), all without consent
of its owners, leading to a total and absolute loss of control over them.
In addition, it also poses a very high risk of fraudulent use of them.
(identity theft, fraud, financial losses, etc.) or that serve to
any other utility that in certain circumstances constitutes a threat

for its owners. It should also be taken into account that most of the data
Leaked personal information is data that cannot be modified or changed by others.
(name, surname, ID, address...)

This loss of control over one's own personal data results in a

violation of the fundamental right to data protection recognized in the article
18 of the Spanish Constitution, as the Constitutional Court has indicated
(Sentence 292/2000, of November 30, 2000) “the fundamental right to
Data protection seeks to guarantee the person power of control over their
personal data, about its use and destination, with the purpose of preventing its illicit trafficking and

harmful to the dignity and rights of the affected person (…) The right to data protection
"It guarantees individuals the power to dispose of these data."

For all the above and in accordance with the evidence available in
At this time of proposal for a resolution, it is considered that the known facts
could constitute an infraction, attributable to I-DE, for violation of the

article 5.1.f) of the RGPD.


                                           VII

                Classification of the violation of article 5.1.f) of the RGPD

The aforementioned violation of article 5.1.f) of the RGPD implies the commission of the violations
typified in article 83.5 of the RGPD that under the heading “General conditions

for the imposition of administrative fines” provides:

“Infringements of the following provisions will be sanctioned, in accordance with the
paragraph 2, with administrative fines of a maximum of EUR 20 000 000 or,
In the case of a company, an amount equivalent to a maximum of 4% of the


C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 80/88








global total annual business volume of the previous financial year, opting for
the largest amount:


       a) the basic principles for the treatment, including the conditions for the
           consent under articles 5, 6, 7 and 9; (…)”

In this regard, the LOPDGDD, in its article 71 “Infringements” establishes that
“The acts and conduct referred to in sections 4,
5 and 6 of article 83 of Regulation (EU) 2016/679, as well as those that result

contrary to this organic law.”

For the purposes of the limitation period, article 72 “Infringements considered very
“serious” of the LOPDGDD indicates:


"1. Based on what is established in article 83.5 of Regulation (EU) 2016/679,
considered very serious and will prescribe after three years the infractions that involve
a substantial violation of the articles mentioned therein and, in particular, the
following:

       a) The processing of personal data violating the principles and guarantees

       established in article 5 of Regulation (EU) 2016/679. (…)”

                                           VIII
                  Penalty for violation of article 5.1.f) of the RGPD


In accordance with the evidence available, the sanction should be graduated to

impose in accordance with the following criteria established in article 83.2 of the
GDPR:

As aggravating factors:

- Article 83.2.a) RGPD: Nature, severity and duration of the infringement.


       -Number of interested parties affected: there are very numerous people affected, since
       amounts to more than one million I-DE clients (1,350,000).

       -Level of damages and losses suffered: High. Numerous were stolen

       personal data (name and surname, ID, postal address, e-mail, phone number
       telephone, client code) and a very considerable number of I-DE clients
       (1,350,000) losing, therefore, all control over them, thus emptying
       of content the fundamental right to the protection of personal data that,
       As indicated by the Constitutional Court in the previously reviewed Judgment,

       seeks to guarantee the person power of control and disposition over their
       personal data, about its use and destination, with the purpose of preventing its traffic
       illegal and harmful to the dignity and rights of the affected person.

- Article 83.2.b) RGPD. Intentional or negligence in the infringement: the
existence of negligence in compliance and observance of technical measures and

organizational measures to ensure the security necessary for data protection
personal data, specifically to guarantee their confidentiality. To this
C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 81/88








In this regard, it must be remembered that I-DE is a large company, which carries out treatments
large scale, affecting its treatments to numerous natural persons (21 million
people) so a higher level of diligence is required.


It is worth remembering, in this sense, the Judgment of the National Court of
10/17/2007 (rec. 63/2006), that with respect to entities whose activity involves the
continuous processing of customer data, indicates “…the Supreme Court comes
understanding that imprudence exists whenever a legal duty of
care, that is, when the offender does not behave with the required diligence. And in the

assessment of the degree of diligence, special consideration must be given to professionalism
or not of the subject, and there is no doubt that, in the case now examined, when the
activity of the appellant is constant and abundant handling of data of a
personnel must insist on rigor and exquisite care to conform to the
legal provisions in this regard.


As mitigating factors:

- Article 83.2.c) RGPD. Measures taken by the person responsible to alleviate the damage and
damages suffered by the interested parties: Positive. As soon as he became aware of the attack,
reacted as quickly as possible and proceeded to take measures aimed at repelling

the same and to avoid its repetition (suspension of the web application; blocking of IPs
suspicious events, disconnections, etc.) and immediate activation of its internal protocols
corresponding, which could have avoided a much more serious impact.

Likewise, it is considered that it is appropriate to graduate the sanction to be imposed in accordance with the

following criteria established in section 2 of article 76 “Sanctions and measures
“corrective measures” of the LOPDGDD:

As aggravating factors:


- Article 76.2.b) LOPDGDD. Linking the offender's activity with the performance
of personal data processing: The development of the activity
I-DE's business involves continuous, large-scale processing of
personal data, since, according to what it states, it processes data of 21 million people. By
Therefore, it is a large company used to processing personal data.


In accordance with the evidence available, taking into account the
circumstances of the case and the criteria established in article 83.2 of the RGPD with
regarding the infraction committed by violating the provisions of article 5.1.f) of the
GDPR, a penalty of €2,500,000 (two and a half million euros) is established.


                                           IX
                                 Article 32 of the GDPR


Article 32 “Security of processing” of the GDPR establishes:

"1. Taking into account the state of the art, the application costs, and the
nature, scope, context and purposes of the processing, as well as risks of
variable probability and severity for people's rights and freedoms
physical, the person responsible and the person in charge of the treatment will apply technical and

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 82/88








appropriate organizational measures to guarantee a level of security appropriate to the risk,
which, if applicable, includes, among others:


       a) pseudonymization and encryption of personal data;

       b) the ability to guarantee the confidentiality, integrity, availability and
       permanent resilience of treatment systems and services;

       c) the ability to restore availability and access to data

       personnel quickly in the event of a physical or technical incident;

       d) a process of regular verification, evaluation and assessment of effectiveness
       of the technical and organizational measures to guarantee the security of the
       treatment.


2. When evaluating the adequacy of the security level, particular consideration will be given to
takes into account the risks presented by data processing, in particular as
consequence of the accidental or unlawful destruction, loss or alteration of data
personal data transmitted, preserved or otherwise processed, or the communication or
unauthorized access to said data.


3. Adherence to a code of conduct approved pursuant to Article 40 or to a
certification mechanism approved pursuant to article 42 may serve as an element
to demonstrate compliance with the requirements established in section 1 of the
present article.


4. The controller and the person in charge of the treatment will take measures to ensure that
any person acting under the authority of the person responsible or in charge and
has access to personal data can only process said data following
instructions of the person responsible, unless it is obliged to do so by virtue of the Law of

the Union or the Member States.”

Article 32 does not establish static security measures, but will correspond to the
responsible for determining those security measures that are necessary to
guarantee the confidentiality, integrity and availability of personal data,
Therefore, the same data processing may involve security measures

different depending on the specific specificities in which said
data treatment.

In line with these provisions, Recital 75 of the GDPR establishes:
risks to the rights and freedoms of natural persons, serious and

variable probability, may be due to data processing that could cause
physical, material or immaterial damages, particularly in cases where
that the treatment may give rise to problems of discrimination, usurpation of
identity or fraud, financial loss, reputational damage, loss of
confidentiality of data subject to professional secrecy, unauthorized reversal of the

pseudonymization or any other significant economic or social harm; in the
cases in which the interested parties are deprived of their rights and freedoms or are
prevents you from exercising control over your personal data; in cases where the data
processed personal reveals ethnic or racial origin, political opinions, religion

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 83/88








or philosophical beliefs, militancy in unions and the processing of genetic data,
data relating to health or data on sexual life, or convictions and offenses
criminal or related security measures; in cases in which they are evaluated

personal aspects, in particular the analysis or prediction of aspects related to the
performance at work, economic situation, health, preferences or interests
personal, reliability or behavior, situation or movements, in order to create or
use personal profiles; in cases in which personal data of
vulnerable people, particularly children; or in cases where the treatment
involves a large amount of personal data and affects a large number of

interested. (emphasis is ours)

Likewise, Recital 83 of the GDPR establishes: In order to maintain the security and
prevent the processing from infringing the provisions of this Regulation, the
responsible or the person in charge must evaluate the risks inherent to the treatment and

apply measures to mitigate them, such as encryption. These measures must guarantee a
appropriate level of security, including confidentiality, taking into account the status
of the technique and the cost of its application with respect to the risks and the nature of
personal data that must be protected. When assessing risk in relation to
data security, the risks that arise from the
processing of personal data, such as destruction, loss or alteration

accidental or unlawful personal data transmitted, preserved or otherwise processed
form, or unauthorized communication or access to said data, susceptible in
particular of causing physical, material or immaterial damages. (he
emphasis is ours)


In short, the first step to determine the security measures will be the
Risk assessment. Once evaluated, it will be necessary to determine the measures of
security aimed at reducing or eliminating risks for the treatment of
data.


Data security requires the application of technical or organizational measures
appropriate in the processing of personal data to protect said data
against access, use, modification, dissemination, loss, destruction or accidental damage,
unauthorized or illicit. In this sense, security measures are key when
to guarantee the fundamental right to data protection. It is not possible
existence of the fundamental right to the protection of personal data if it is not

possible to guarantee their confidentiality, integrity and availability.

It should not be forgotten that, in accordance with article 32.1 of the aforementioned GDPR, the
technical and organizational measures to apply to guarantee a level of security
appropriate to the risk must take into account the state of the art, the costs of

application, nature, scope, context and purposes of the processing, as well as
risks of varying probability and severity to the rights and freedoms of
Physical persons.

Therefore, I-DE, when evaluating risks and determining technical measures and

appropriate organizational measures to guarantee a level of security appropriate to the risk,
is obliged to take into account the specific activity that its business entails, which
involves processing personal data continuously and on a large scale (numerous data at a time)
collect, process, store...); the type of data processed: identification,

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 84/88








contact, those related to the supply and consumption of electricity, current accounts,
etc); the context: use of a web application on the Internet, that is, in an environment not
isolated, which entails risks derived from the interconnectivity itself that the

network, which must be attended to in a specialized way.

Therefore, derived from the activity to which it is dedicated, I-DE is obliged to carry out
a very specialized way of analyzing risks and implementing measures
appropriate technical and organizational measures to guarantee a level of security appropriate to the
risk of its activity for the rights and freedoms of people.


In the present case, as noted above, I-DE suffered a cyber attack on
its GEA web application, causing a security breach consisting of a breach
of confidentiality when there is access to personal data of its clients,
contained in the Group's database and an illicit exfiltration of the same.


The GEA application is an I-DE web application used for the management of
electrical connections. It is published on the Internet for access by
users (customers, installers, etc.) involved in the management process of those
connection files.


(…)

All of the above shows that I-DE was not diligent enough when it came to
implement appropriate security measures to prevent incidents from occurring
of security like the one that took place in the present case, that is, it did not apply measures

appropriate technical and organizational measures to guarantee a level of security appropriate to the
risk of your personal data processing. Likewise, there is no appreciation of the
necessary diligence in the process of regular verification, evaluation and assessment of
the effectiveness of technical and organizational measures to ensure the safety of the
treatment. (article 32.1)


Therefore, in accordance with the evidence available, it is considered that
The known facts constitute an infringement, attributable to I-DE, for
violation of article 32 of the RGPD.

                                            x

                  Classification of the violation of article 32 of the RGPD

The aforementioned violation of article 32 of the RGPD implies the commission of the violations

typified in article 83.4 of the RGPD that under the heading “General conditions
for the imposition of administrative fines” provides:

“Infractions of the following provisions will be sanctioned, in accordance with the
paragraph 2, with administrative fines of a maximum of EUR 10 000 000 or,

In the case of a company, an amount equivalent to a maximum of 2% of the
global total annual business volume of the previous financial year, opting for
the largest amount:

       a) the obligations of the controller and the processor pursuant to Articles 8,
       11, 25 to 39, 42 and 43; (…)”

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 85/88









In this regard, the LOPDGDD, in its article 71 “Infringements” establishes that
“The acts and conduct referred to in sections 4,

5 and 6 of article 83 of Regulation (EU) 2016/679, as well as those that result
contrary to this organic law.”

For the purposes of the limitation period, article 73 “Infringements considered serious”
of the LOPDGDD indicates:


“Based on what is established in article 83.4 of Regulation (EU) 2016/679,
are considered serious and will prescribe after two years the infractions that involve a
substantial violation of the articles mentioned therein and, in particular, the
following:
(…)

       f) The lack of adoption of those technical and organizational measures that
       are appropriate to guarantee a level of security appropriate to the risk
       of the treatment, in the terms required by article 32.1 of the Regulation
       (EU) 2016/679.

                                          XI

                  Penalty for violation of article 32 of the GDPR


In accordance with the evidence available, the sanction should be graduated to
impose, in accordance with the following criteria established in article 83.2 of the

GDPR:

As aggravating factors:

- Article 83.2.a) RGPD: Nature, severity and duration of the infringement.


       -It is considered that the nature of the infraction is serious since it has
entailed a loss of confidentiality and, therefore, of disposition and control
irremediable on personal data.

       -Number of interested parties affected: there are very numerous people affected, since

amounts to 1,350,000

       -Level of damages and losses suffered: High. Numerous were stolen
personal data (name and surname, ID, postal address, e-mail, phone number
telephone, client code) and a very considerable number of I-DE clients

(1,350,000) losing, therefore, all control over them, thus emptying
content the fundamental right to the protection of personal data that, as
indicates the Constitutional Court in the previously reviewed Judgment, pursues
guarantee the person power of control and disposal over their personal data,
on its use and destination, with the purpose of preventing its illicit trafficking and harm to the
dignity and rights of the affected person.


- Article 83.2.b) RGPD. Intentional or negligence in the infringement: the
existence of negligence in compliance and observance of technical measures and

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 86/88








organizational measures to ensure adequate security for data protection
personal data, specifically to guarantee their confidentiality. The
detected vulnerability could have been avoided, and is also a vulnerability

identifiable in security assessments.

In this regard, it must be remembered that I-DE is a large company, which carries out
large-scale treatments, affecting numerous natural persons
(21 million people) so a higher level of diligence is required and
appropriate security measures to ensure the confidentiality of data

personal it deals with.

It is worth remembering, in this sense, the Judgment of the National Court of
10/17/2007 (rec. 63/2006), that with respect to entities whose activity involves the
continuous processing of customer data, indicates “…the Supreme Court comes

understanding that imprudence exists whenever a legal duty of
care, that is, when the offender does not behave with the required diligence. And in the
assessment of the degree of diligence, special consideration must be given to professionalism
or not of the subject, and there is no doubt that, in the case now examined, when the
activity of the appellant is constant and abundant handling of data of a
personnel must insist on rigor and exquisite care to conform to the

legal provisions in this regard.

As mitigating factors:

- Article 83.2.c) RGPD. Measures taken by the person responsible to alleviate the damage and

damages suffered by the interested parties: Positive. As soon as he became aware of the attack,
I-DE staff reacted as quickly as possible and proceeded to take action
aimed at repelling the same and to avoid its repetition (suspension of the web application;
blocking suspicious IPs, disconnections, etc.) and immediate activation of your
corresponding internal protocols, which could have avoided a major impact

More serious.

Likewise, it is considered that it is appropriate to graduate the sanction to be imposed in accordance with the
following criteria established in section 2 of article 76 “Sanctions and measures
“corrective measures” of the LOPDGDD:


As aggravating factors:

- Article 76.2.b) LOPDGDD. Linking the offender's activity with the performance
of personal data processing: The development of the activity
business that I-DE performs involves a continuous, large-scale treatment of

personal information. Therefore, it is a large company used to treating
of personal data.

The balance of the circumstances contemplated in article 83.2 of the RGPD and the
article 76.2 of the LOPDGDD, with respect to the infraction committed by violating the

established in article 32 of the RGPD, allows establishing a penalty of €1,000,000
(one million euros).



C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 87/88








Therefore, in accordance with the applicable legislation and evaluated the criteria of
graduation of the sanctions whose existence has been proven, the Director of the
Spanish Data Protection Agency RESOLVES:


FIRST: IMPOSE I-DE REDES ELÉCTRICAS INTELLIGENTES, S.A.U., with NIF
A95075578, for a violation of Article 5.1.f) of the RGPD typified in Article
83.5 of the RGPD, a fine of 2,500,000 euros (TWO MILLION FIVE HUNDRED THOUSAND
EUROS).


SECOND: IMPOSE I-DE REDES ELÉCTRICAS INTELLIGENTES, S.A.U., with
NIF A95075578, for a violation of Article 32 of the RGPD, typified in Article
83.4 of the RGPD, a fine of 1,000,000 (ONE MILLION EUROS)

THIRD: NOTIFY this resolution to I-DE REDES ELÉCTRICAS

INTELLIGENTES, S.A.U.

FOURTH: This resolution will be enforceable once the deadline to file the
optional resource for replacement (one month counting from the day following the
notification of this resolution) without the interested party having made use of this power.
The sanctioned person is warned that he must make effective the sanction imposed once

This resolution is executive, in accordance with the provisions of art. 98.1.b)
of Law 39/2015, of October 1, on the Common Administrative Procedure of the
Public Administrations (hereinafter LPACAP), within the voluntary payment period
established in art. 68 of the General Collection Regulations, approved by Real
Decree 939/2005, of July 29, in relation to art. 62 of Law 58/2003, of 17

December, through your entry, indicating the NIF of the sanctioned person and the number of
procedure that appears in the heading of this document, in the account
restricted IBAN number: ES00-0000-0000-0000-0000-0000, opened in the name of the
Spanish Data Protection Agency in the banking entity CAIXABANK, S.A.
Otherwise, it will be collected during the executive period.


Once the notification is received and once enforceable, if the enforceable date is
between the 1st and 15th of each month, both inclusive, the deadline to make the payment
voluntary will be until the 20th of the following month or immediately following business month, and if
The payment period is between the 16th and last day of each month, both inclusive.
It will be until the 5th of the second following or immediately following business month.


In accordance with the provisions of article 76.4 of the LOPDGDD and given that the
The amount of the penalty imposed is greater than one million euros, it will be subject to
publication in the Official State Gazette of the information that identifies the offender, the
violation committed and the amount of the penalty.


In accordance with the provisions of article 50 of the LOPDGDD, this
Resolution will be made public once it has been notified to the interested parties.

Against this resolution, which puts an end to the administrative procedure in accordance with art. 48.6 of the

LOPDGDD, and in accordance with the provisions of article 123 of the LPACAP, the
Interested parties may optionally file an appeal for reconsideration before the
Director of the Spanish Data Protection Agency within a period of one month to
count from the day following the notification of this resolution or directly

C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es 88/88








contentious-administrative appeal before the Contentious-administrative Chamber of the

National Court, in accordance with the provisions of article 25 and section 5 of
the fourth additional provision of Law 29/1998, of July 13, regulating the
Contentious-administrative Jurisdiction, within a period of two months from the
day following the notification of this act, as provided for in article 46.1 of the

referred Law.

Finally, it is noted that in accordance with the provisions of art. 90.3 a) of the LPACAP,
may provisionally suspend the final resolution through administrative means if the

interested party expresses his intention to file a contentious-administrative appeal.
If this is the case, the interested party must formally communicate this fact through
writing addressed to the Spanish Data Protection Agency, presenting it through
of the Agency's Electronic Registry [https://sedeagpd.gob.es/sede-electronica-
web/], or through any of the other registries provided for in art. 16.4 of the

cited Law 39/2015, of October 1. You must also transfer to the Agency the
documentation that proves the effective filing of the contentious appeal
administrative. If the Agency was not aware of the filing of the appeal
contentious-administrative procedure within a period of two months from the day following the

notification of this resolution would terminate the precautionary suspension.


                                                                                938-16012024
Sea Spain Martí
Director of the Spanish Data Protection Agency


































C/ Jorge Juan, 6 www.aepd.es
28001 – Madrid sedeagpd.gob.es