Saturday, April 5, 2025
HomeCyber Security NewsFacebook Hit With record-breaking $1.3 Billion Fine Over Data Rules

Facebook Hit With record-breaking $1.3 Billion Fine Over Data Rules

Published on

SIEM as a Service

Follow Us on Google News

Facebook (now Meta) has faced many allegations and litigations in the past 10 years. Most are related to privacy, data protection, and surveillance in other countries. However, a case that was filed against Facebook in 2013 was given a verdict. 

The case involves US mass surveillance against European Personal data and transferring of EU data to US data centers. According to the US Surveillance Law (FISA 702), Meta has been subject to the transfer of a large number of data over the past 10 years.

As per the European Court of Justice (CJEU), Meta will now have to pay a record fine of €1.2 billion and also return all the personal data to its EU data centers.

The whistle Blew in 2013

Edward Snowden blew the whistle about US surveillance in 2013, which created huge havoc against the NSA’s mass surveillance apparatus. Meta has been aware of the case that was filed against them in 2013 but did not take any precautions in the past 10 years.

The verdict also stated the reauthorization of the US Surveillance Law (FISA 702). Many Cloud providers like Microsoft, Google, and Amazon might face a similar fine if they do not comply with the European Data Protection Board  (EDPB). 

Other countries like Austria, France, and Italy have also felt the US services were unlawful but did not proceed with a major fine.

Irish DPC’s Protection Against Meta

It took nearly 10 years, 3 court proceedings, and 10 million euros to end up with the verdict while the Irish DPC was trying to protect Meta by all means. Initially, they rejected this case as “frivolous,” which had Mr. Schrems (the Austrian Activist) to get back to the CJEU. 

The DPC also tried to frame that Meta had used the “Standard Contractual Clause” henceforth, they cannot take any action against them. However, the claim was rejected by the CJEU, which made DPC provide the final shield to Meta by arguing to stop a fine and go with the deletion of data that was already transferred. The EDPB overturned it.

These court proceedings and the verdict have a shaky situation between the previous EU-US data deals (“Privacy Shield” and “Safe Harbor”), which had faced a lot of criticism.

Mr. Schrems stated, “Meta will appeal this decision, but there is no real chance to have this decision materially overturned. Past violations cannot be overcome by a new EU-US deal. Meta can, at best delay the payment of the fine for a bit. Meta plans to rely on the new deal for transfers going forward, but this is likely not a permanent fix. In my view, the new deal has maybe a ten percent chance of not being killed by the CJEU. Unless US surveillance laws gets fixed, Meta will likely have to keep EU data in the EU.”

Privacy must always be an option when it comes to sharing of a user’s data. The current generation depends entirely on “data,” which must be protected at all costs.

Shut Down Phishing Attacks with Device Posture Security – Download Free E-Book

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...

PoisonSeed Targets CRM and Bulk Email Providers in New Supply Chain Phishing Attack

A sophisticated phishing campaign, dubbed "PoisonSeed," has been identified targeting customer relationship management (CRM)...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...