{"id":11681,"date":"2026-04-07T08:22:50","date_gmt":"2026-04-07T06:22:50","guid":{"rendered":"https:\/\/techgdpr.com\/?p=11681"},"modified":"2026-04-07T08:22:51","modified_gmt":"2026-04-07T06:22:51","slug":"data-protection-digest-06042026-abusive-access-request-human-resources-management-patient-data-in-the-cloud","status":"publish","type":"post","link":"https:\/\/techgdpr.com\/blog\/data-protection-digest-06042026-abusive-access-request-human-resources-management-patient-data-in-the-cloud\/","title":{"rendered":"Data protection digest 3 April 2026: abusive access request, human resources management &amp; patient data in the cloud\u00a0"},"content":{"rendered":"\n<h4 class=\"wp-block-heading\">Abusive data access request<\/h4>\n\n\n\n<p>The EU Court of Justice ruled that even a <strong>first personal data access request may be deemed abusive under the GDPR if it is made solely to generate compensation <\/strong>claims, allowing controllers to refuse such requests. An individual residing in Austria subscribed to the newsletter of a family-run optician company in Germany by entering his personal data in the registration form available on the company\u2019s website.&nbsp;<\/p>\n\n\n\n<p>Thirteen days later, he sent a request for access under Article 15 of the GDPR. The company refused the request, considering it to be abusive. According to various reports and blog articles, the <a href=\"https:\/\/curia.europa.eu\/site\/upload\/docs\/application\/pdf\/2026-03\/cp260038en.pdf\">individual systematically subscribes to newsletters of various companies before submitting an access request<\/a> and then a compensation claim. The individual maintained that his access request was legitimate and <strong>claimed compensation of at least 1,000 euros<\/strong>.\u00a0<\/p>\n\n\n\n<h6 class=\"wp-block-heading\"><a href=\"#newslettersignup\" id=\"#newslettersignup\"><mark style=\"background-color:#fbd0b1;color:#b771f9\" class=\"has-inline-color\">\u00a0Stay up to date! Sign up to receive our fortnightly digest via email.<\/mark><\/a><\/h6>\n\n\n\n<h4 class=\"wp-block-heading\">Main developments<\/h4>\n\n\n\n<p><strong>Protecting children online: <\/strong>On 3 April, the Regulation on the Extension of Derogation from the ePrivacy Directive for the purpose of identifying Child Sexual Abuse Material (CSAM) online expired, digitalpolicyalert.org reports. The extension concerns an <a href=\"https:\/\/digitalpolicyalert.org\/event\/22146-terminated-regulation-on-extension-of-derogation-from-the-eprivacy-directive-to-support-the-detection-of-child-sexual-abuse\">exemption from data protection regulations, which grants hundreds of providers offering number-independent interpersonal communication services<\/a>, such as messaging services, the authority to use technologies for processing personal and other data <strong>to identify, report, and remove instances of online child sexual abuse on their platforms<\/strong>.\u00a0In addition, providers must ensure that information regarding reports of detected online child sexual abuse submitted to authorities and the Commission is accessible in a structured format.<\/p>\n\n\n\n<p><strong>\u2018Legitimate interests\u2019 analysis: <\/strong>The EDPB has published a One-Stop-Shop case digest on the legal basis of &#8220;legitimate interest&#8221;. It provides useful examples of how regulators analyse controllers\u2019 reliance on this legal basis in specific contexts, providing positive and negative compliance examples. In particular, it explains and summarises <a href=\"https:\/\/www.edpb.europa.eu\/our-work-tools\/our-documents\/support-pool-experts-projects\/one-stop-shop-case-digest-legal-basis_en\">how regulators apply the three-step test to assess whether a controller can lawfully rely<\/a> on legitimate interests. Relevant cases before the CJEU and national courts are also mentioned.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Back up!<\/h4>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"grid-template-columns:25% auto\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" width=\"1024\" height=\"633\" src=\"https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/04\/image-1024x633.png\" alt=\"access request\" class=\"wp-image-11683 size-full\" srcset=\"https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/04\/image-1024x633.png 1024w, https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/04\/image-300x185.png 300w, https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/04\/image-768x475.png 768w, https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/04\/image.png 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p><\/p>\n\n\n\n<p>On World Backup Day, 31 March, the German Federal Office for Information Security (BSI) called on consumers to back up important data. Data backup is not a complicated process: most operating systems guide users through the process. Nonetheless, only one-fifth of internet users regularly create backups. <a href=\"https:\/\/www.bsi.bund.de\/DE\/Service-Navi\/Presse\/Pressemitteilungen\/Presse2026\/260330_World_Backup_Day.html\">Backups can be performed in the cloud or on a physical storage medium, such as an external hard drive<\/a>. <\/p>\n<\/div><\/div>\n\n\n\n<p>Those who opt for a physical storage medium should keep it in a different location than, for example, the source computer for the data being backed up.\u00a0\u00a0<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Human resources management<\/h4>\n\n\n\n<p>The CNIL has published a reference framework (in French) to help data controllers identify retention periods for their personnel management activities. This document is particularly useful for <a href=\"https:\/\/www.cnil.fr\/fr\/referentiel-durees-conservation-donnees-rh\">data protection officers, GDPR referents, but also for staff working in human resources departments or for the information systems department.<\/a> This repository is organised by processing activities and includes:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>recruitment;<\/li>\n\n\n\n<li>administrative management of personnel;<\/li>\n\n\n\n<li>compensation management;<\/li>\n\n\n\n<li>the security of goods and people;<\/li>\n\n\n\n<li>the management of professional vehicles;<\/li>\n\n\n\n<li>listening to and recording telephone conversations in the workplace;<\/li>\n\n\n\n<li>the management of collective labour relations;<\/li>\n\n\n\n<li>the management of occupational accidents;<\/li>\n\n\n\n<li>the management of litigation and pre-litigation;<\/li>\n\n\n\n<li>the management of Whistleblowing.\u00a0<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">More official guidance<\/h4>\n\n\n\n<p><strong>Cookies user guide: <\/strong>The Swiss regulator, FDPIC, has published a factsheet on the use of cookies (in English) that explains how users can retain <a href=\"https:\/\/www.edoeb.admin.ch\/en\/factsheet-cookies\">control over their own data and minimise the digital footprint they leave behind while browsing<\/a>. Although cookies and similar technologies can enhance the online browsing experience, for example, by saving the contents of a shopping basket or certain preferences, they can also enable third parties to track users\u2019 online activities.\u00a0<\/p>\n\n\n\n<p><strong>AI red lines:<\/strong> The Future of Privacy Forum continues its series of publications on Red Lines under the EU <a href=\"https:\/\/techgdpr.com\/blog\/reconciling-the-regulatory-clock\/\">AI Act<\/a>. This time, it pays attention to the prohibition on biometric categorisation for \u201ccertain sensitive characteristics\u201d to <a href=\"https:\/\/fpf.org\/blog\/red-lines-under-the-eu-ai-act-understanding-the-prohibition-of-biometric-categorization-for-certain-sensitive-characteristics\/\">deduce or infer race, political opinions, trade union membership, religious or philosophical beliefs<\/a>, etc. The risks associated with biometric categorisation also reflect broader concerns under EU data protection legislation, as sensitive characteristics may themselves constitute special categories of personal data under the GDPR.\u00a0<\/p>\n\n\n\n<p>Previous analysis by FPF also looked at <a href=\"https:\/\/fpf.org\/blog\/red-lines-under-eu-ai-act-unpacking-the-prohibition-of-emotion-recognition-in-the-workplace-and-education-institutions\/\">prohibition and emotion recognition in the workplace and educational institutions<\/a>.<\/p>\n\n\n\n<p><strong>Health data in the cloud:<\/strong> More and more organisations are using cloud solutions for processing health data. The Dutch data protection authority AP has therefore published an updated and broadened version of <a href=\"https:\/\/www.autoriteitpersoonsgegevens.nl\/actueel\/ap-publiceert-praktijkgids-gezondheidsgegevens-in-de-cloud\">AP&#8217;s practice guide on patient data in the cloud<\/a>. The practice guide now focuses <strong>not only on patient data within the treatment relationship, but on health data in a broader sense<\/strong>.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">In other news<\/h4>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"grid-template-columns:25% auto\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/04\/image-1024x683.jpeg\" alt=\"\" class=\"wp-image-11682 size-full\" srcset=\"https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/04\/image-1024x683.jpeg 1024w, https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/04\/image-300x200.jpeg 300w, https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/04\/image-768x512.jpeg 768w, https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/04\/image-1536x1024.jpeg 1536w, https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/04\/image.jpeg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p><\/p>\n\n\n\n<p><strong>Police biometric data: <\/strong>A police authority may,<a href=\"https:\/\/idpc.org.mt\/news-latest\/a-police-authority-may-in-a-criminal-investigation-collect-biometric-data-solely-on-the-ground-that-that-collection-is-strictly-necessary\/\">in a criminal investigation, collect biometric data solely because the collection is strictly necessary<\/a>. The Maltese data protection agency looked at a recent ruling by the CJEU, which stated that the gathering of identification data may not be required systematically and clear reasons must be given for it, failing which the criminal penalty laid down for refusing to consent to that gathering will be invalid.<\/p>\n<\/div><\/div>\n\n\n\n<p>In a related case, a person was detained in Paris for organising a demonstration without prior notice and for disobedience. While he was in police custody, <a href=\"https:\/\/curia.europa.eu\/site\/upload\/docs\/application\/pdf\/2026-03\/cp260039en.pdf\">he refused to consent to the gathering of identification data (fingerprints and photo)<\/a>. That refusal resulted in his being charged, even though he was acquitted of the offence forming the basis of the envisaged gathering of identification data.&nbsp;<\/p>\n\n\n\n<p><strong>Credit information checks should be free of charge:<\/strong> The Finnish data protection ombudsman considers that the regular practice of the credit information company Dun&amp;Bradstreet, in which a<a href=\"https:\/\/tietosuoja.fi\/-\/apulaistietosuojavaltuutettu-omat-luottotiedot-on-voitava-tarkastaa-lahtokohtaisesti-maksutta\"> person has only been able to check their own credit information once a year, free of charge, is not in accordance with data protection legislation<\/a>. Customers had been regularly charged a fee if they had requested information more than once within a year. The company also had shortcomings in responding to requests for personal data.&nbsp;<\/p>\n\n\n\n<p>According to the law, a fee can only be charged in situations where the request is manifestly unfounded or unreasonable, for example, if the same information is requested repeatedly.&nbsp;<\/p>\n\n\n<div id=\"newslettersignup\"><\/div>\n<div id=\"role-block_84442b7b0c9218dc4668b1d2675edaaf\" class=\"text-t-black bg-t-pink p-6 md:p-12 rounded-tr-50 rounded-bl-50 mb-4 lg:mb-12 text-center role\">\n  \n      <h2 class=\"text-xl lg:text-2xl max-w-screen-lg mx-auto text-t-black font-display mb-4\">\n      Receive our digest by email\u00a0    <\/h2>\n        <h3 class=\"text-base max-w-screen-lg mx-auto text-t-black font-body mb-4\">Sign up to receive our digest by email every 2 weeks<\/h3>\n  \n  <div id=\"rmOrganism\">\n    <div class=\"rmEmbed rmLayout--vertical rmBase\">\n      <div data-page-type=\"formSubscribe\" class=\"rmBase__body rmSubscription\">\n                  <form method=\"post\" action=\"https:\/\/mailing.techgdpr.com\/145\/6351\/5e9fc3cdda\/subscribe\/form.html?_g=1698845230\" class=\"rmBase__content\">\n                  <div class=\"rmBase__container mx-auto max-w-screen-sm\">          \n            <div class=\"rmBase__section\">\n              <div class=\"text-left rmBase__el rmBase__el--input rmBase__el--label-pos-none\" data-field=\"email\">\n                <label for=\"email\" class=\"rmBase__compLabel rmBase__compLabel--hideable hidden\">\n                  Email address\n                <\/label>\n                <div class=\"rmBase__compContainer mb-2\">\n                  <input type=\"text\" name=\"email\" id=\"email\" placeholder=\"Email\" value=\"\" class=\"p-4 border rounded border-gray-400 w-full rmBase__comp--input comp__input\">\n                  <div class=\"rmBase__compError text-left font-display font-bold text-xs\"><\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n            <div class=\"rmBase__section mb-4\">\n              <div class=\"rmBase__el rmBase__el--consent\" data-field=\"consent_text\">\n                <div class=\"rmBase__comp--checkbox\">\n                  <label for=\"consent_text\" class=\"flex space-x-2 items-baseline text-left vFormCheckbox comp__checkbox\">\n                    <input type=\"checkbox\" value=\"yes\" name=\"consent_text\" id=\"consent_text\" class=\"vFormCheckbox__input\">\n                    <div class=\"vFormCheckbox__indicator hidden\"><\/div>\n                    <div class=\"vFormCheckbox__label\">\n                                              I consent to the processing of my data and to receiving regular updates from TechGDPR. Data is processed according to our <a href=\"https:\/\/techgdpr.com\/privacy-policy\/\"> Privacy Notice<\/a>.                                          <\/div>\n                  <\/label>\n                <\/div>\n                <div class=\"rmBase__compError text-left font-display font-bold text-xs\"><\/div>\n              <\/div>\n            <\/div>\n            <div class=\"rmBase__section\">\n              <div class=\"rmBase__el rmBase__el--cta\">\n                <button type=\"submit\" class=\"inline-flex items-center justify-center px-8 py-3 text-white visited:text-white font-bodybold rounded-md bg-t-navy border-3 border-t-navy hover:border-t-navy hover:bg-transparent hover:text-t-navy transition-all hover:text-white cursor-pointer rmBase__comp--cta\">\n                  Subscribe\n                <\/button>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/form>\n      <\/div>\n      <div data-page-type=\"pageSubscribeSuccess\" class=\"rmBase__body rmSubscription hidden\">\n        <div class=\"rmBase__content\">\n          <div class=\"rmBase__container\">\n            <div class=\"rmBase__section\">\n              <div class=\"rmBase__el rmBase__el--heading\">\n                <div class=\"rmBase__comp--heading\">\n                  Thank you for your subscription!\n      <!-- this linebreak is important, don't remove it! this will force trailing linebreaks to be displayed -->\n                  <br>\n                <\/div>\n              <\/div>\n            <\/div>\n            <div class=\"rmBase__section\">\n              <div class=\"rmBase__el rmBase__el--text\">\n                <div class=\"rmBase__comp--text\">\n                  We have sent you an email &#8211; please confirm your email address by clicking the activation link in it.\n      <!-- this linebreak is important, don't remove it! this will force trailing linebreaks to be displayed -->\n                  <br>\n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/div>\n\n      <script src=\"https:\/\/mailing.techgdpr.com\/form\/145\/6069\/8a53c9178b\/embedded.js\" async><\/script>\n  \n<\/div>\n\n\n\n<h4 class=\"wp-block-heading\">More enforcement decisions<\/h4>\n\n\n\n<p><strong>OKCupid data sharing: <\/strong>In the US, the Federal Trade Commission is taking action against OkCupid and its affiliate Match Group Americas over allegations that it deceived users of its dating app by sharing their personal information, including photos and location information, with an unrelated third party, contrary to OkCupid\u2019s privacy promises. <a href=\"https:\/\/www.ftc.gov\/news-events\/news\/press-releases\/2026\/03\/ftc-takes-action-against-match-okcupid-deceiving-users-sharing-personal-data-third-party\">OkCupid provided the third party with access to nearly three million OkCupid user photos as well as location<\/a> and other information without placing any formal or contractual restrictions on how the information could be used.&nbsp;<\/p>\n\n\n\n<p>The FTC also alleged that, since September 2014, Match and <strong>OkCupid took extensive steps to conceal their wrongdoing<\/strong>, including by trying to obstruct the FTC\u2019s investigation.<\/p>\n\n\n\n<p><strong>Unauthorised access to banking information:<\/strong> The Italian data protection authority Garante has fined <a href=\"https:\/\/www.garanteprivacy.it\/garante\/doc.jsp?ID=10234984\">Intesa<\/a> Sanpaolo 31.8 million euros for serious shortcomings in personal data security. The investigation found that <a href=\"https:\/\/www.garanteprivacy.it\/home\/docweb\/-\/docweb-display\/docweb\/10235001\">an employee accessed, without justification, the banking information of 3,573 customers, making over 6,600 inquiries<\/a> between February 21, 2022, and April 24, 2024. These <strong>unauthorised accesses were not detected by internal control systems, <\/strong>highlighting significant weaknesses in the monitoring and prevention mechanisms.\u00a0<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">And Finally<\/h4>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"grid-template-columns:25% auto\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" width=\"1024\" height=\"732\" src=\"https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/04\/image-1-1024x732.png\" alt=\"access request\" class=\"wp-image-11685 size-full\" srcset=\"https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/04\/image-1-1024x732.png 1024w, https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/04\/image-1-300x214.png 300w, https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/04\/image-1-768x549.png 768w, https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/04\/image-1-1536x1097.png 1536w, https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/04\/image-1.png 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p><\/p>\n\n\n\n<p><strong>Wearables: <\/strong>The Swiss FDPIC has published practical advice on smartwatches and fitness trackers, which <a href=\"https:\/\/www.edoeb.admin.ch\/en\/wearables-things-to-consider-when-buying-and-tips-for-use\">monitor your physical activity and bodily functions<\/a>, and are now widely used. Smart glasses, which make it easy to take and share photos and videos, are also gaining in popularity. As all these body-worn devices pose a particular threat to privacy, <strong>users should exercise particular caution when using them<\/strong>.\u00a0<\/p>\n<\/div><\/div>\n\n\n\n<p>Before making their choice, buyers should <strong>check how the manufacturer has configured it<\/strong> and whether the product allows for privacy-friendly settings, where collected data is stored, and whether the processing of such data is comprehensible overall.<\/p>\n\n\n\n<p><strong>Fraudulent websites: <\/strong>Reportedly, phishing remains one of the largest forms of online crime. To better protect internet users against this, several Dutch public and private parties have jointly tested a new approach. The so-called Anti Phishing Shield demonstrates that the approach works: since the start of the pilot in July 2025, over two million attempts to visit phishing and fraudulent websites have been blocked among a group of over 200,000 users. <strong>Internet providers can easily connect to the tool<\/strong> and use it to protect their customers. And <strong>users must give their prior explicit consent <\/strong>via a so-called &#8216;opt-in&#8217;.\u00a0<\/p>\n\n\n\n<p>Read the original publication to see how <a href=\"https:\/\/www.ncsc.nl\/nieuws\/ruim-twee-miljoen-bezoeken-aan-kwaadaardige-websites-voorkomen-in-pilot\">the Anti Phishing Shield works<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Abusive data access request The EU Court of Justice ruled that even a first personal data access request may be deemed abusive under the GDPR if it is made solely to generate compensation claims, allowing controllers to refuse such requests. An individual residing in Austria subscribed to the newsletter of a family-run optician company in [&hellip;]<\/p>\n","protected":false},"author":21,"featured_media":11659,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[94],"tags":[51,129,100,122,58],"class_list":["post-11681","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection-digest","tag-artificial-intelligence","tag-consumer-data-protection","tag-cookies","tag-data-subject-access-requests","tag-gdpr-compliance"],"acf":[],"featured_image_urls":{"full":["https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/03\/thedigitalartist-big-data-7645172-scaled.jpg",2560,1600,false],"thumbnail":["https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/03\/thedigitalartist-big-data-7645172-150x150.jpg",150,150,true],"medium":["https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/03\/thedigitalartist-big-data-7645172-300x188.jpg",300,188,true],"medium_large":["https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/03\/thedigitalartist-big-data-7645172-768x480.jpg",640,400,true],"large":["https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/03\/thedigitalartist-big-data-7645172-1024x640.jpg",640,400,true],"1536x1536":["https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/03\/thedigitalartist-big-data-7645172-1536x960.jpg",1536,960,true],"2048x2048":["https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/03\/thedigitalartist-big-data-7645172-2048x1280.jpg",2048,1280,true],"image-200-200":["https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/03\/thedigitalartist-big-data-7645172-200x200.jpg",200,200,true]},"post_excerpt_stackable":"<p>Abusive data access request The EU Court of Justice ruled that even a first personal data access request may be deemed abusive under the GDPR if it is made solely to generate compensation claims, allowing controllers to refuse such requests. An individual residing in Austria subscribed to the newsletter of a family-run optician company in Germany by entering his personal data in the registration form available on the company\u2019s website.&nbsp; Thirteen days later, he sent a request for access under Article 15 of the GDPR. The company refused the request, considering it to be abusive. According to various reports and&hellip;<\/p>\n","category_list":"<a href=\"https:\/\/techgdpr.com\/blog\/category\/data-protection-digest\/\" rel=\"category tag\">Data Protection Digest<\/a>","author_info":{"name":"Olya Vasylyk","url":"https:\/\/techgdpr.com\/blog\/author\/olyav\/"},"comments_num":"0 comments","featured_image_urls_v2":{"full":["https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/03\/thedigitalartist-big-data-7645172-scaled.jpg",2560,1600,false],"thumbnail":["https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/03\/thedigitalartist-big-data-7645172-150x150.jpg",150,150,true],"medium":["https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/03\/thedigitalartist-big-data-7645172-300x188.jpg",300,188,true],"medium_large":["https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/03\/thedigitalartist-big-data-7645172-768x480.jpg",640,400,true],"large":["https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/03\/thedigitalartist-big-data-7645172-1024x640.jpg",640,400,true],"1536x1536":["https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/03\/thedigitalartist-big-data-7645172-1536x960.jpg",1536,960,true],"2048x2048":["https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/03\/thedigitalartist-big-data-7645172-2048x1280.jpg",2048,1280,true],"image-200-200":["https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/03\/thedigitalartist-big-data-7645172-200x200.jpg",200,200,true]},"post_excerpt_stackable_v2":"<p>Abusive data access request The EU Court of Justice ruled that even a first personal data access request may be deemed abusive under the GDPR if it is made solely to generate compensation claims, allowing controllers to refuse such requests. An individual residing in Austria subscribed to the newsletter of a family-run optician company in Germany by entering his personal data in the registration form available on the company\u2019s website.&nbsp; Thirteen days later, he sent a request for access under Article 15 of the GDPR. The company refused the request, considering it to be abusive. According to various reports and&hellip;<\/p>\n","category_list_v2":"<a href=\"https:\/\/techgdpr.com\/blog\/category\/data-protection-digest\/\" rel=\"category tag\">Data Protection Digest<\/a>","author_info_v2":{"name":"Olya Vasylyk","url":"https:\/\/techgdpr.com\/blog\/author\/olyav\/"},"comments_num_v2":"0 comments","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Data protection digest 3 April 2026: abusive access request, human resources management &amp; patient data in the cloud\u00a0 - TechGDPR<\/title>\n<meta name=\"description\" content=\"TechGDPR\u2019s review of the most important data-related stories: abusive access request, human resources management &amp; patient data in the cloud\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/techgdpr.com\/blog\/data-protection-digest-06042026-abusive-access-request-human-resources-management-patient-data-in-the-cloud\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data protection digest 3 April 2026: abusive access request, human resources management &amp; patient data in the cloud\u00a0 - TechGDPR\" \/>\n<meta property=\"og:description\" content=\"TechGDPR\u2019s review of the most important data-related stories: abusive access request, human resources management &amp; patient data in the cloud\" \/>\n<meta property=\"og:url\" content=\"https:\/\/techgdpr.com\/blog\/data-protection-digest-06042026-abusive-access-request-human-resources-management-patient-data-in-the-cloud\/\" \/>\n<meta property=\"og:site_name\" content=\"TechGDPR\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-07T06:22:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-07T06:22:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/03\/thedigitalartist-big-data-7645172-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Olya Vasylyk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@techgdpr\" \/>\n<meta name=\"twitter:site\" content=\"@techgdpr\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Olya Vasylyk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/techgdpr.com\\\/blog\\\/data-protection-digest-06042026-abusive-access-request-human-resources-management-patient-data-in-the-cloud\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/techgdpr.com\\\/blog\\\/data-protection-digest-06042026-abusive-access-request-human-resources-management-patient-data-in-the-cloud\\\/\"},\"author\":{\"name\":\"Olya Vasylyk\",\"@id\":\"https:\\\/\\\/techgdpr.com\\\/#\\\/schema\\\/person\\\/07e9c14fd01b25bd2c1907537e8547e8\"},\"headline\":\"Data protection digest 3 April 2026: abusive access request, human resources management &amp; patient data in the cloud\u00a0\",\"datePublished\":\"2026-04-07T06:22:50+00:00\",\"dateModified\":\"2026-04-07T06:22:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/techgdpr.com\\\/blog\\\/data-protection-digest-06042026-abusive-access-request-human-resources-management-patient-data-in-the-cloud\\\/\"},\"wordCount\":1435,\"publisher\":{\"@id\":\"https:\\\/\\\/techgdpr.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/techgdpr.com\\\/blog\\\/data-protection-digest-06042026-abusive-access-request-human-resources-management-patient-data-in-the-cloud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/techgdpr.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/thedigitalartist-big-data-7645172-scaled.jpg\",\"keywords\":[\"Artificial Intelligence\",\"consumer data protection\",\"cookies\",\"data subject access requests\",\"GDPR Compliance\"],\"articleSection\":[\"Data Protection Digest\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/techgdpr.com\\\/blog\\\/data-protection-digest-06042026-abusive-access-request-human-resources-management-patient-data-in-the-cloud\\\/\",\"url\":\"https:\\\/\\\/techgdpr.com\\\/blog\\\/data-protection-digest-06042026-abusive-access-request-human-resources-management-patient-data-in-the-cloud\\\/\",\"name\":\"Data protection digest 3 April 2026: abusive access request, human resources management &amp; patient data in the cloud\u00a0 - TechGDPR\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/techgdpr.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/techgdpr.com\\\/blog\\\/data-protection-digest-06042026-abusive-access-request-human-resources-management-patient-data-in-the-cloud\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/techgdpr.com\\\/blog\\\/data-protection-digest-06042026-abusive-access-request-human-resources-management-patient-data-in-the-cloud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/techgdpr.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/thedigitalartist-big-data-7645172-scaled.jpg\",\"datePublished\":\"2026-04-07T06:22:50+00:00\",\"dateModified\":\"2026-04-07T06:22:51+00:00\",\"description\":\"TechGDPR\u2019s review of the most important data-related stories: abusive access request, human resources management & patient data in the cloud\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/techgdpr.com\\\/blog\\\/data-protection-digest-06042026-abusive-access-request-human-resources-management-patient-data-in-the-cloud\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/techgdpr.com\\\/blog\\\/data-protection-digest-06042026-abusive-access-request-human-resources-management-patient-data-in-the-cloud\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/techgdpr.com\\\/blog\\\/data-protection-digest-06042026-abusive-access-request-human-resources-management-patient-data-in-the-cloud\\\/#primaryimage\",\"url\":\"https:\\\/\\\/techgdpr.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/thedigitalartist-big-data-7645172-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/techgdpr.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/thedigitalartist-big-data-7645172-scaled.jpg\",\"width\":2560,\"height\":1600,\"caption\":\"access request\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/techgdpr.com\\\/blog\\\/data-protection-digest-06042026-abusive-access-request-human-resources-management-patient-data-in-the-cloud\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/techgdpr.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data protection digest 3 April 2026: abusive access request, human resources management &amp; patient data in the cloud\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/techgdpr.com\\\/#website\",\"url\":\"https:\\\/\\\/techgdpr.com\\\/\",\"name\":\"TechGDPR\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/techgdpr.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/techgdpr.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/techgdpr.com\\\/#organization\",\"name\":\"TechGDPR\",\"url\":\"https:\\\/\\\/techgdpr.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/techgdpr.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/staging.techgdpr.com\\\/wp-content\\\/uploads\\\/2018\\\/04\\\/TGDPR_logo_500px.png\",\"contentUrl\":\"https:\\\/\\\/staging.techgdpr.com\\\/wp-content\\\/uploads\\\/2018\\\/04\\\/TGDPR_logo_500px.png\",\"width\":501,\"height\":334,\"caption\":\"TechGDPR\"},\"image\":{\"@id\":\"https:\\\/\\\/techgdpr.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/techgdpr\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/techgdpr\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/techgdpr.com\\\/#\\\/schema\\\/person\\\/07e9c14fd01b25bd2c1907537e8547e8\",\"name\":\"Olya Vasylyk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/techgdpr.com\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/readyIMG_3694-1-2-150x150.jpg\",\"url\":\"https:\\\/\\\/techgdpr.com\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/readyIMG_3694-1-2-150x150.jpg\",\"contentUrl\":\"https:\\\/\\\/techgdpr.com\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/readyIMG_3694-1-2-150x150.jpg\",\"caption\":\"Olya Vasylyk\"},\"description\":\"Creator and editor of TechGDPR\u2019s weekly Digest. Postgraduate masters Diploma in Data Protection, Digital law and Management. Over a decade Olga previously was a broadcast journalist in Ukraine and France specializing in international affairs.\",\"url\":\"https:\\\/\\\/techgdpr.com\\\/blog\\\/author\\\/olyav\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data protection digest 3 April 2026: abusive access request, human resources management &amp; patient data in the cloud\u00a0 - TechGDPR","description":"TechGDPR\u2019s review of the most important data-related stories: abusive access request, human resources management & patient data in the cloud","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/techgdpr.com\/blog\/data-protection-digest-06042026-abusive-access-request-human-resources-management-patient-data-in-the-cloud\/","og_locale":"en_US","og_type":"article","og_title":"Data protection digest 3 April 2026: abusive access request, human resources management &amp; patient data in the cloud\u00a0 - TechGDPR","og_description":"TechGDPR\u2019s review of the most important data-related stories: abusive access request, human resources management & patient data in the cloud","og_url":"https:\/\/techgdpr.com\/blog\/data-protection-digest-06042026-abusive-access-request-human-resources-management-patient-data-in-the-cloud\/","og_site_name":"TechGDPR","article_published_time":"2026-04-07T06:22:50+00:00","article_modified_time":"2026-04-07T06:22:51+00:00","og_image":[{"width":2560,"height":1600,"url":"https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/03\/thedigitalartist-big-data-7645172-scaled.jpg","type":"image\/jpeg"}],"author":"Olya Vasylyk","twitter_card":"summary_large_image","twitter_creator":"@techgdpr","twitter_site":"@techgdpr","twitter_misc":{"Written by":"Olya Vasylyk","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/techgdpr.com\/blog\/data-protection-digest-06042026-abusive-access-request-human-resources-management-patient-data-in-the-cloud\/#article","isPartOf":{"@id":"https:\/\/techgdpr.com\/blog\/data-protection-digest-06042026-abusive-access-request-human-resources-management-patient-data-in-the-cloud\/"},"author":{"name":"Olya Vasylyk","@id":"https:\/\/techgdpr.com\/#\/schema\/person\/07e9c14fd01b25bd2c1907537e8547e8"},"headline":"Data protection digest 3 April 2026: abusive access request, human resources management &amp; patient data in the cloud\u00a0","datePublished":"2026-04-07T06:22:50+00:00","dateModified":"2026-04-07T06:22:51+00:00","mainEntityOfPage":{"@id":"https:\/\/techgdpr.com\/blog\/data-protection-digest-06042026-abusive-access-request-human-resources-management-patient-data-in-the-cloud\/"},"wordCount":1435,"publisher":{"@id":"https:\/\/techgdpr.com\/#organization"},"image":{"@id":"https:\/\/techgdpr.com\/blog\/data-protection-digest-06042026-abusive-access-request-human-resources-management-patient-data-in-the-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/03\/thedigitalartist-big-data-7645172-scaled.jpg","keywords":["Artificial Intelligence","consumer data protection","cookies","data subject access requests","GDPR Compliance"],"articleSection":["Data Protection Digest"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/techgdpr.com\/blog\/data-protection-digest-06042026-abusive-access-request-human-resources-management-patient-data-in-the-cloud\/","url":"https:\/\/techgdpr.com\/blog\/data-protection-digest-06042026-abusive-access-request-human-resources-management-patient-data-in-the-cloud\/","name":"Data protection digest 3 April 2026: abusive access request, human resources management &amp; patient data in the cloud\u00a0 - TechGDPR","isPartOf":{"@id":"https:\/\/techgdpr.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/techgdpr.com\/blog\/data-protection-digest-06042026-abusive-access-request-human-resources-management-patient-data-in-the-cloud\/#primaryimage"},"image":{"@id":"https:\/\/techgdpr.com\/blog\/data-protection-digest-06042026-abusive-access-request-human-resources-management-patient-data-in-the-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/03\/thedigitalartist-big-data-7645172-scaled.jpg","datePublished":"2026-04-07T06:22:50+00:00","dateModified":"2026-04-07T06:22:51+00:00","description":"TechGDPR\u2019s review of the most important data-related stories: abusive access request, human resources management & patient data in the cloud","breadcrumb":{"@id":"https:\/\/techgdpr.com\/blog\/data-protection-digest-06042026-abusive-access-request-human-resources-management-patient-data-in-the-cloud\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/techgdpr.com\/blog\/data-protection-digest-06042026-abusive-access-request-human-resources-management-patient-data-in-the-cloud\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/techgdpr.com\/blog\/data-protection-digest-06042026-abusive-access-request-human-resources-management-patient-data-in-the-cloud\/#primaryimage","url":"https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/03\/thedigitalartist-big-data-7645172-scaled.jpg","contentUrl":"https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/03\/thedigitalartist-big-data-7645172-scaled.jpg","width":2560,"height":1600,"caption":"access request"},{"@type":"BreadcrumbList","@id":"https:\/\/techgdpr.com\/blog\/data-protection-digest-06042026-abusive-access-request-human-resources-management-patient-data-in-the-cloud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/techgdpr.com\/"},{"@type":"ListItem","position":2,"name":"Data protection digest 3 April 2026: abusive access request, human resources management &amp; patient data in the cloud\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/techgdpr.com\/#website","url":"https:\/\/techgdpr.com\/","name":"TechGDPR","description":"","publisher":{"@id":"https:\/\/techgdpr.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/techgdpr.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/techgdpr.com\/#organization","name":"TechGDPR","url":"https:\/\/techgdpr.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/techgdpr.com\/#\/schema\/logo\/image\/","url":"https:\/\/staging.techgdpr.com\/wp-content\/uploads\/2018\/04\/TGDPR_logo_500px.png","contentUrl":"https:\/\/staging.techgdpr.com\/wp-content\/uploads\/2018\/04\/TGDPR_logo_500px.png","width":501,"height":334,"caption":"TechGDPR"},"image":{"@id":"https:\/\/techgdpr.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/techgdpr","https:\/\/www.linkedin.com\/company\/techgdpr"]},{"@type":"Person","@id":"https:\/\/techgdpr.com\/#\/schema\/person\/07e9c14fd01b25bd2c1907537e8547e8","name":"Olya Vasylyk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/techgdpr.com\/wp-content\/uploads\/2021\/10\/readyIMG_3694-1-2-150x150.jpg","url":"https:\/\/techgdpr.com\/wp-content\/uploads\/2021\/10\/readyIMG_3694-1-2-150x150.jpg","contentUrl":"https:\/\/techgdpr.com\/wp-content\/uploads\/2021\/10\/readyIMG_3694-1-2-150x150.jpg","caption":"Olya Vasylyk"},"description":"Creator and editor of TechGDPR\u2019s weekly Digest. Postgraduate masters Diploma in Data Protection, Digital law and Management. Over a decade Olga previously was a broadcast journalist in Ukraine and France specializing in international affairs.","url":"https:\/\/techgdpr.com\/blog\/author\/olyav\/"}]}},"_links":{"self":[{"href":"https:\/\/techgdpr.com\/wp-json\/wp\/v2\/posts\/11681","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techgdpr.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techgdpr.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techgdpr.com\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/techgdpr.com\/wp-json\/wp\/v2\/comments?post=11681"}],"version-history":[{"count":8,"href":"https:\/\/techgdpr.com\/wp-json\/wp\/v2\/posts\/11681\/revisions"}],"predecessor-version":[{"id":11694,"href":"https:\/\/techgdpr.com\/wp-json\/wp\/v2\/posts\/11681\/revisions\/11694"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techgdpr.com\/wp-json\/wp\/v2\/media\/11659"}],"wp:attachment":[{"href":"https:\/\/techgdpr.com\/wp-json\/wp\/v2\/media?parent=11681"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techgdpr.com\/wp-json\/wp\/v2\/categories?post=11681"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techgdpr.com\/wp-json\/wp\/v2\/tags?post=11681"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}