Support from readers like you keeps The Journal open.
You are visiting us because we have something you value. Independent, unbiased news that tells the truth. Advertising revenue goes some way to support our mission, but this year it has not been enough.
If you've seen value in our reporting, please contribute what you can, so we can continue to produce accurate and meaningful journalism. For everyone who needs it.
Man deported from Ireland on Nigeria flight earlier this year wins appeal to return
Snap happy tourists harming seals by picking up pups for selfies and flying drones
'Awful to watch': Outrage over video of horse and trap crashing into car on Dublin road
Holly Reynolds 4, from Belfast, joins peace protesters at Belfast City Hall, in response to the continuing loyalist flag violence. (Paul Faith/Press Association Images)
Opinion
Column We need new ideas to solve the flag issue in Belfast
Innovative ideas are needed to solve the crisis in the North, writes Steve Wrenn, who says we need to think outside the box and compromise.
Last week, the Oireachtas Joint Committee on the Implementation of the Good Friday Agreement met to discuss the impact of the recent protests in Belfast on the local retail sector, which is costing the local economy at least £15 million (€17.7 million). Dublin Counsellor, Steve Wrenn says that riots can easily progress into a bigger problem, so in order to stem this issue there needs to be some give-and-take.
WE ARE NOW into the eighth week of Unionist rioting in Northern Ireland. It is estimated that over £15 million in revenue has been lost and many police officers have been hurt. Property has been destroyed on a nightly basis and Northern Ireland’s reputation, which it citizens and representatives have worked hard to establish since the Good Friday Agreement is suffering as a result.
Riots
The trigger for these riots was the decision to limit the display of the Union flag over City Hall. We saw how easily mass rioting broke out all over Los Angeles in 1992 and in France in 2005. We also saw mass rioting in England in 2011 catching the authorities off guard and bringing cities to a halt. All had triggers that resulted in large-scale public unrest. History has shown us that if these conflicts are not resolved quickly and fairly it can result in loss of life and large-scale destruction of property. Countries reputations can be effected for years resulting in tourism and their economy suffering also.
These riots and their beginnings in the flag issue indicate a new type of problem faced by the citizens, both private and public, of Northern Ireland. In the past, violence had its roots embedded in decades of dispute with all sides clinging to their grievances. In the past, differences arose due to inequality. Now, with the new more equal structures in place in Northern Ireland, it is vital that all involved look to a new solution to this situation, one that moves away from the jarring reminders of the past we have seen in recent weeks and forward to new methods of resolving the inevitable conflicts that arise in a new society.
Solutions
Riots by their very nature are difficult to police and the bigger the riot the harder it is for the police to arrest offenders and stop the disorder. I have no doubt that this is what makes rioters feel comfortable enough to keep engaged and returning to the streets of Belfast. The fact that these riots are occurring at the same time as an increase in activity involving criminals with Republican links in the Republic of Ireland adds an even more sinister element to them.
It goes without saying that both the rioting and the security threat posed by dissident republicans needs be resolved as hastily as possible in order to underline and emphasis the success of the peace process in Northern Ireland and the desire of the majority of the people living in Northern Ireland to continue to live in the peaceful fashion to which they are now accustomed.
Advertisement
Policing may be the only method available to control a riot but communication, compromise and the process of conflict resolution are the only methods that will bring the unrest to a close. Eventually, the rioters might disperse because of the weather or early morning raids by the police. Raids on the homes of the ringleaders will result in stiff fines and prison sentences that may end the current trouble. The worry for the future is that this might have brought a whole new generation of young people into a fight that they don’t fully understand or remember how it started.
Young protesters
Young people may be criminalised and potentially given a ‘badge of honour’ by their peers for their involvement in such behaviours. It is vital that we recall the lessons of our past and develop new strategies to ensure that this harmful cycle doesn’t start again. In the Republic of Ireland we have seen situations escalate out of control resulting in ongoing murders and several generations continuing feuds that become impossible to resolve. The families feuding in Limerick is a prime example of how generational violence and murder will continue, and serves as a reminder of how important it is to deal with smaller issues before the point of escalation.
Mediation is a perfect example of the type of intervention that has been used successfully in the past in communities and could be considered in this instance. It promotes ‘win-win’ outcomes, offers those involved the opportunity to express their issues in a comprehensive fashion and, most importantly, is very successful.
Coming from a mediation point of view, a way of preventing young people from both communities from engaging in rioting or sectarian violence could be to have them design a Northern Ireland Peace Flag. This flag could have, for example logos from both communities or incorporate colours from both the national flags. Schools, community based groups and other interested agencies could propose their designs and the people of Northern Ireland could choose their winner.
Peace flag
This flag could be flown over city hall and other controversial locations all year around. The peace flag could have huge significance for Northern Ireland and show the world once again that the people of Northern Ireland have refused to bow to violence and have decided to emerge from these recent difficulties a community that is stronger and more united than ever.
Another option that could be explored is the establishment of a “symbol commission” similar to that established by the British government in 1930 “to determine the rights and claims of Muslims and Jews in connection with the Western or Wailing Wall”. A commission such as this could have input into decisions such as those made regarding the flag and propose resolutions to prevent situations such as this arising again.
Steve Wrenn is a Labour Councillor for the Dublin North West Constituency. He is also the Peace Commissioner for the City of Dublin and surrounding counties.
Readers like you are keeping these stories free for everyone...
A mix of advertising and supporting contributions helps keep paywalls away from valuable information like this article.
Over 5,000 readers like you have already stepped up and support us with a monthly payment or a once-off donation.
@Edward Natali: training on Info Sec is vital but that’s an extremely narrow view, systems need to be current, updated, backed up, and that’s just the beginning. It’s not just a single point of failure.
@Chris Byrne: Windows 7 or WIndows 10, the hack they deployed wouldn’t have made much of a difference. Even though Win 7 is out of support, MS will still provide security updates to customers that pay an additional yearly fee. It doesn’t matter if you have the best security systems, if someone inside invites the hackers in by clicking on a bad link it’s game on. Companies need to provide better training on how to avoid these scams.
@Chris Byrne: I can’t speak for the HSE and I’m making assumptions with this comment. If you have a very large organisation, with a great scope and variety of recorded data, that probably stretches back through older IT hardware and software systems……upgrading hardware and operating system software would take a long time and have to be still able to cope with some critical legacy applications and network elements. IBM itself suffered from being so big and having so many levels of management that decision making became problematic to implement quickly. There were 67 levels of management (I think) between the head of IBM and the newest junior employee.
@john s: company’s do this all the time, it doesn’t need to be a zoom class, it can be a presentation you watch and verify, then there’s phishing drinks as well. These make people more aware/suspicious of emails from unknown sources.
@David A. Murray: I mean when IBM was at the height of its success in the early 1980′s. They had got that big and successful by cornering major parts of the IT/mainframe business. When change in the computer business became more rapid, IBM were ill-equipped to adapt.
@Edward Natali: you’ll have to explain abit more on staff training, because it’s really common sense to know if something looks legit or not.. but hey everything must be true if its on facebook
@sean o’dhubhghaill: Why would he be sarcastic. Theres any more things to be done, such as actually caring about keeping goverent I.T. infrastructure up to date, but it’s still surprising how many people belive scams that tell them to click on a link or pay money for support. Staff training would help with that
@David Kelly: That’s not always the case. I’ve seen some come thru our company that have a level of detail, that our cyber security guys have to really look at to confirm it’s a scam. These are targeted attempts, very specific to our company, not some random scattergun approach.
@Edward Natali: seriously you think a few zoom meetings are going to sort this?? The hse computers were not secure, they had outdated software, and a lone computer ? No such thing I would have thought in the network and no matter how many times you remind people not you click on links.. someone always does it.. distracted with work , talking to someone.. seriously unlucky.. we need to update everything and employ some of these hackers to help make systems safe again.. we also need them in our Dail.. our firewalls were not good ..
@Justin Fay: That’s not clear. The message could have just been on some dodgy site and the user clicked a link, downloaded and installed some software.
@Mickety Dee: It is clear, how would they encrypt and download 700GB of data almost instantaneously? After clicking the user was brought to a chat where the ransom demand was made. It is public knowledge they were in the IT system for 2 weeks prior to making the demand. Bad reporting by the journal.
@Edward Natali: There are some basic ‘internet hygiene’ rules that so called staff training focus on: 1. Do you know the sender of a message? 2. Is the message expected (e.g. part of a previous telephone conversation)? 3. Is it coming from an known address? Has it passed through malware protection.
So I know of several instances where the answers would be:
1. Yes
2. Yes
3. Yes
4. 3 different protection systems.
Citing ‘staff training’ is glib.
And… one person does not have access to all the HSE systems that have reportedly been affected. the true nature of this incident will take some investigation.
Alas 10 years ago that may have been enough. But with the rise of cryptocurrencies that bad guys have financial incentive to build teams that can break anything – package it all into a toolkit that they can sell for equivalent of a 1000 bucks with complete impunity
@Edward Natali: I work for a major IT company here, and they send out face phishing emails at least once a month, if you get stung, you need to do a small training which fills you in on all types of attacks… The issue here is not the employee that’s for sure and people would be wise not to make any assumtions…. But this is the HSE we are talking about,
I genuinely feel sorry for this person right now they literally have the weight of the Health Service of Ireland on their shoulder and the Guilt that they are feeling must be completely unimaginable feeling that are responsible for sick people not been able to access the care that they need because of their unintentional actions and I genuinely hope that they get proper support and not vilified.
@Fi Wyse: I agree. I hope their identity never reaches the public domain. It’s a mistake anyone could make, and if it hadn’t been them, it would have been someone else.
@Fi Wyse: not a very helpful or kind comment. It infers that they should feel guilty for the actions of a criminal gang??
Whoever the person is, they are not responsible and they should feel NO guilt
@Angela Lavin: I think that was the intention of @Fis comment, ie for the person who clicked on the link not to feel guilty about it and to get the support they need if they do feel guilty or stressed about it.
@Fi Wyse: All this could easily have been avoided if the right systems were in place. The staff member is in no way responsible. The sham that is the hse is so incompetent that it doesn’t have security in place to avoid this situation.
@Fi Wyse: Given the HSE’s history of never accepting responsibility / liability when losing court cases and the multitude of mistakes and damage it has caused to people eg X case, Hospital trollies etc etc etc. It is the people who work in the HSE that are the HSE and we should all start holding those people accountable, not just 3 letters. She may have just tried to fix a computer but the real story is why weren’t systems previously backed up and protected. The Hackers are not the only ones in the wrong
@ZiggyS: Why should they carry the can the HSE, Paul Reid and their computing services are to blame. Who the hell is still using windows 97. They are so out of touch that it was inevitable this was going to happen and is now going to continue as these criminals now know what crap systems we have. It should now be a priority that the Government invest heavily in making sure that all Computer systems are totally up to date and as far as possible be hacker proof. My comments are not toxic but literally point out the problem. Everything that is provided by the state is usually on a very thin shoestring which goes back years.
@Fi Wyse: That employee only got the ransom notification. At that stage the hackers had already been through the system and downloaded patient data. Dont shoot the messenger
@ZiggyS: Unless any sort of training was provided to avoid these type of scenarios then i doubt anyone has anything to worry about… What is alarming is that they seem to focusing on one single person like a scape goat… The issue here is no the employee but the whole IT system in general.
@Greg Ward: i was chatting to him yesterday. He was still looking to get sorted so don’t think so. Gave him my bank details to help him out. He was telling me that everyone just assumes he was a crook. I knew he was genuine when I saw his profile picture of himself outside his Palace….
@Enda Flaherty: I hope you have him your mother’s maiden name, often it’s handy to pass that on especially if you’ve a common name and they need to track you down to find you and pay you the reward.
@Enda Flaherty: aw isn’t that just lovely to hear, so much misinformation going about, goes to show you shouldn’t judge people who have random numbers and letters in their @gmail address!
This story seems doubtful. 700GB of data, including relational databases, accessible from a single computer with permission to overwrite with encrypted copies?
@Helpless In The Face Of Your Beauty: You’re aware of the internet, right? ;) You wrote this comment from a single computer to a website through encrypted traffic, saved it to a database, where it now shows to all the rest of us. Don’t underestimate the power of one compromised computer on a network..
@Helpless In The Face Of Your Beauty: under normal circumstances, that would sound crazy. But we don’t know what attack mechanisms they could have launched once they have access to one machine. Could be some RDP back door with an admin elevation hack that no normal user would unleash on their own.
@Helpless In The Face Of Your Beauty: There is plenty of information on the internet on how the Conti virus is planted and once it starts spreading from one infected machine to another it will soon come across an account with Administrator access, and then it uses the psexec command and RDP protocols to infect and access servers and other PC’s. There are a number of measures you could put in place to stop this but it makes administering a computer network more difficult. We need to invest more money in properly securing our critical IT systems. It can be done.
@Helpless In The Face Of Your Beauty: NotPetya in June/July 2017 disabled an entire country (Ukraine) and then wider across the world within a day from a single computer in an accountants office in Odessa. All it takes is one accidental or mistaken click on an unpatched computer and its a done deal.
Still doesn’t ring true. Patients data is held on databases. Even is they could access the tables and copy it is highly likely it’s hashed, plus they’ve no presentation layer to decipher.
@iohanx: You’re right about the presentation layer. I’ve had the dubious pleasure of trying to decipher even non-encrypted databases from legacy vendors and it isn’t straight forward (what does status=1 actually mean? Where do the keys and indexes actually lead to?). I suspect its file shares with plain old Word docs that is at issue. Particularly if its ‘only’ 700GB (although even that, if true, could be up to 9M individual docs) [lots of assumptions in that calculation]
@Sam Murray: Low blow- it can happen to anyone, also could have been an employee of an older generation. Not everyone is as tech savvy as you may think, especially those who havent grown up in this new digital world from birth.
@Sam Murray: could happen to anyone man, cop on, was hardly intentional on their part. 100% blame to the hackers who targeted a national health service
@Byrne Billy: they are a HSE employee ffs
Not some tech illiterate random granny
Everyone should get training on this stuff to spot dodgy mails.
That’s not rocket science by any means.
In fact it’s mainly being street wise with a 5 minute understanding of hyperlinks
@Paul Dolan: It’s not much use internationally, but I’m sure there might be multiple companies here that wouldn’t mind seeing that data if it was accessible, private health insurance providers, car insurance, etc.
@Paul Dolan: useful to order the USA giant ITC to block the links on their searching engines as well as act immediately when a person request them to erasure of their personal data. With the other any person can request to these companies to remove the links from their searching engines. The herd protecting the community
@Alan Byrne: I doubt they’d be able to use it, pretty much impossible to find a lawful basis for processing it on several grounds. I doubt a local insurance conpany would take such risk.
That’s not fair now to blame this poor person. Imagine how they feel ? If the hse had updated their systems then maybe this would not have happened. Not fair to blame one person come on.
@Emer Daly: Probably not so much to do with updating as with security levels. You can have a fully up-to-date system but if you have standard employees that can execute processes with admin authorisations then you have accidents waiting to happen.
Sounds like the journal and/or their source have completely misunderstood whatever information was passed to them. What they are describing is a computer that’s already encrypted and the ‘link’ the user clicked contained the details on how to pay the ransom. The hackers were already in their network before this user clicked the infamous ‘link’ in their clickbait headline. No other news company is going with this story.
@dreiglaser: Exactly. It specifically says in the story that the hackers were in the network for some time before they learned of the attack. And thay also explicitly say that this employee was the one who was informed of the attack. A lot of people seem to be believe that just training people not to click on links is all we need to do. In fact the hackers may have gained access through a number of different routes.
@Anna Carr: The weakest link in any network is the human element. I was watching this thing on youtube about fake tech support just last week. A guy had hacked their network with a reverse tunel and got cctv audio from all the calls and got in contact with bbc a great watch. But this is exactly what they fell for Fake Tech-Suport.
Just goes to show how poor email server and cyber security protection is if this attack goes through firewalls and security screening. Shame on you HSE for not backing up your systems and testing BCP plans regularly. IT 101
@vanc: They have extensive backups for the important databases, if the infections goes back a couple of weeks as suspected they will not have lost much data compared to the amount of important historical data they have that they need to access.
@Alan Byrne: if they contact me for money to stop my data being published I will pay them with all the money I have in my Monopoly set and throw in a hotel and railway station
@Edward Reid: No point in restoring if there is still malicious software present. I’d say they are rebuilding the servers from scratch to be sure they are clean
Whats the betting that the user had local admin rights on the PC they were using. Local admin rights are evil in the enterprise and should never be granted to end users.
IT security should be layered like an onion where a small mistake lower down doesn’t hose the whole network.
They should have implemented the principle of least access (where employees are only given the necessary permissions to carry out their work)
However if the malware did exploit a zero day, its game over.
Regular penetration testing by outside cyber security companies is required, such as fake phishing campaigns (which generates a report to IT on how many clicked the link) also include the classic dropping a few flash drives in the car park of the hospital to see who is careless enough to plug them into their PC.
@Allen Nicholson: I agree, and on the fake phishing tests, it’s amazing to see the people that fall for them, I’ve seen many IT support staff amongst them that should know better.
@Alan Byrne: In fairness some of them are well thought out and worded so as to think it might be relevant to you. I work in IT and clicked on one recently (in my defence, after a very long day!). It referenced something that I had been expecting a mail on and I had clicked it out of instinct before I actually read it. D’oh
@Donal Hogan: Clearly you understand nothing about computers or hacking. This person was used to inform the HSE that the hackers were already in the system, likely for weeks or longer. He or she didn’t let them in.
It sounds like by the time they initiated communication that the damage was done, it wasn’t this one poor persons fault they just happened to get the demand.
@Hugh: Privatisation with the government paying everyones yearly subscription would probably be cheaper than what it currently costs us due to the ineffecient setup we are lumbered with.
@Hugh: Yeah right because privatised healthcare works so well and because no large private companies have ever been hacked. Hacking is a fact of life. Very large and sophisticated companies have been hacked including very sensitive areas of the US federal government. No company is necessarily immune to this. It has zero to do with ownership. The NHS was hacked some years ago should they be privatised as well? Take your ideology elsewhere.
Well that’s the problem with keeping staff working from home! It would not have happened if staff were working in the office. It’s time to get people back to working from office again .
There are two new support system that were launched in the last 15 months, one is on line IT support the other around the new SAP payroll. The roll out of SAP has been very problematic with very little lead in time due to Covid. Its not hard to understand how some could hit a suggested support link if they were having issues,around either of the systems.
Surely the SAP payroll, internal emails, Admin, and patient records are on entirely separate fully protected circuits, to presumably cloud-based systems within the organisation, each requiring independent log ins.
An independent IT audit and Report on the findings may be required so that we all can learn from the attack.
@Rory J Leonard: cloud based…..in the HSE. Not a hope. Broadly, the public service is still almost exclusively based on premise. ICT Managers across the HSE have been clamouring for guidance from the OGCIO in regards to cloud usage and the prevailing wisdom is not to use it as its “not secure”. Many public service bodies are only beginning to look at cloud and they’re 5 years to late.
@Rory J Leonard: I cab log on to any PC in the HSE using my account once I select the correct domain. I have access to the systems that apply to me ie SAP, NIMS, but many users will have multiple access to various systems depend on their role. Everyone has access to email and that’s the only common denominator. I need access permission from an Admin to access certain folders on a system of different drives but on email could bring the whole thing tumbling down
They should have been sitting at their desk when clicking the link, would have saved them having to ‘reach out’, not good for your back.
Who scripts these articles?
well my data has already been published as evidenced by third party criminals constantly calling me. I just block each number in turn and they stop. if we just don’t turn a hair whatever they do, their business model fails.
Typical blame game… If the right systems and backup were in place this could easily have been avoided. But now we must spend “millions to fix this”… Same old story, no one will accept responsibility.
Whats the betting that the user had local admin rights on the PC they were using. Local admin rights are evil in the enterprise and should never be granted to end users.
IT security should be layered like an onion where a small mistake lower down doesn’t hose the whole network.
They should have implemented the principle of least access (where employees are only given the necessary permissions to carry out their work)
However if the malware did exploit a zero day, its game over.
Regular penetration testing by outside cyber security companies is required, such as fake phishing campaigns (which generates a report to IT on how many clicked the link) also include the classic dropping a few flash drives in the car park of the hospital to see who is careless enough to plug them into their PC.
@Noel Donohue: Indeed. It is well known and publicised (by Interpol, FBI, etc) that this was and is an outfit comprised of mostly Ukrainian hackers. Go figure.
At best this article seems like a misinterpretation of the information, and at worst is just speculation being passed off as fact.
If the employee followed instructions in a file already on their computer, that would suggest that some breach had already occurred, otherwise how would that instruction file have been on the computer in the first place…
Very disingenuous to state as fact that the ransomware attack ‘began’ when the employee followed these instructions.
Seems the Journal, and their source, have just enough information/knowledge on the subject to be dangerous.
@Patrick Guerin:
This event happened immediately after the” jews in palestine ” threw a hissy fit over our condemnation of their assault on the Palestinians which followed a deliberate series of provocations in Palestinian east Jerusalem and during friday prayers which was predictably responded to . Israel has form and skill in such attacks qv Iran.
Perhaps the Israeli ambassador is the one who should be expelled ?
@Random_paddy: Do it Paddy, it will be me on the other end providing on-line support. I won’t charge much to fix your computer. I’m trying to earn a few bob here ;-)
@Random_paddy: yeah i should have, actually provided a little info on content. Its the begining of a series of videos and a documentary that i belive everyone should watch. It shows exactly how theese guys operate and scam anyone that falls of it. Most victims are vulnerable people that arent great with tech. Education is key to stoping this kind of activity.
This puts the HSE in a very bad situation if accurate. The ransom will be tiny in comparison to DPC fines, Possible European fines and litigation from citizens. It suggests a complete dereliction of duty.
Not sure what is worse the insistence in “it wasn’t the Americans” or the incredible explanation like people knew nothing about firewalls, security controls and filters in workplace computers.
The only way to pass the firewalls is by someone actually working on them within the organisation, again strongly pointing towards USA subcontractors. The only with a reason too, the High Court decision to keep our data in our Land.
Today the government has got the High Court permission to order to all those USA corporations to remove from their searching engines anything that facilitate finding the data stolen by the noisy neighbour.
@Alan Byrne: normal ITC security in workplace with sensitive information. A team filtering and blocking access to …. the version of the government is impossible unless someone from the ITC security opens the wall, the access. All it’s contracted to USA corporations. They’re the only ones with an interest and in the trusted position.
The problem with the scams phone calls is a security at servers level, physically according to them … again USA contractors and again the FB Vs DPC on behalf of the EU case …. FB lost therefore “our data in our Land”
@Maria Quinn: any person phoning to government and public services lines … got a phone back from the telecom servers managing the system from the scammers …. you need physically access to the telecom servers to do so
So the question is where are those servers and who are the subcontractor
it is not the staff member’s fault. the lack of adequate training/policies/procedures, and security awareness around the elaborate schemes on phishing/social engineering.
the blame lies fairly and squarely with the IT department management and in other management departments.
force the staff to go through a training sessions and learn to discriminate, “if in doubt of any suspect email with phishing attempts, forward to security at IT department” and mass circulate alerting everyone. it’s a two way thing. clearly not the case here.
I think we miss the point at times, I have given a cyber security class, people don’t intentionally click on bad links. The con men coax them into clicking on a link they think is fine. A lot of contentious people have been caught out. But on the flip side the security of the servers etc must be better to battle the virus if downloaded. And most importantly up to date software and hardware.
The work was done at that point.
Front end machines probably need be out of contact with public almost everywhere you can get to the ports at back and email still the greatest threat for everyone.
This is confusing. Did the hackers gain access to the network when one employee was tricked into clicking a link? Or had the hackers already stolen the data and then started to communicate with the HSE by making one PC non functional and directing the HSE employee to clink a link to message with the hackers?
Man deported from Ireland on Nigeria flight earlier this year wins appeal to return
Eoghan Dalton
7 hrs ago
32.8k
InvestigatesSeal harm
Snap happy tourists harming seals by picking up pups for selfies and flying drones
Patricia Devlin
2 hrs ago
754
6
Animal Welfare
'Awful to watch': Outrage over video of horse and trap crashing into car on Dublin road
17 hrs ago
35.7k
Your Cookies. Your Choice.
Cookies help provide our news service while also enabling the advertising needed to fund this work.
We categorise cookies as Necessary, Performance (used to analyse the site performance) and Targeting (used to target advertising which helps us keep this service free).
We and our 220 partners store and access personal data, like browsing data or unique identifiers, on your device. Selecting Accept All enables tracking technologies to support the purposes shown under we and our partners process data to provide. If trackers are disabled, some content and ads you see may not be as relevant to you. You can resurface this menu to change your choices or withdraw consent at any time by clicking the Cookie Preferences link on the bottom of the webpage . Your choices will have effect within our Website. For more details, refer to our Privacy Policy.
We and our vendors process data for the following purposes:
Use precise geolocation data. Actively scan device characteristics for identification. Store and/or access information on a device. Personalised advertising and content, advertising and content measurement, audience research and services development.
Cookies Preference Centre
We process your data to deliver content or advertisements and measure the delivery of such content or advertisements to extract insights about our website. We share this information with our partners on the basis of consent. You may exercise your right to consent, based on a specific purpose below or at a partner level in the link under each purpose. Some vendors may process your data based on their legitimate interests, which does not require your consent. You cannot object to tracking technologies placed to ensure security, prevent fraud, fix errors, or deliver and present advertising and content, and precise geolocation data and active scanning of device characteristics for identification may be used to support this purpose. This exception does not apply to targeted advertising. These choices will be signaled to our vendors participating in the Transparency and Consent Framework. The choices you make regarding the purposes and vendors listed in this notice are saved and stored locally on your device for a maximum duration of 1 year.
Manage Consent Preferences
Necessary Cookies
Always Active
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work.
Social Media Cookies
These cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.
Targeting Cookies
These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.
Functional Cookies
These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then these services may not function properly.
Performance Cookies
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not be able to monitor our performance.
Store and/or access information on a device 154 partners can use this purpose
Cookies, device or similar online identifiers (e.g. login-based identifiers, randomly assigned identifiers, network based identifiers) together with other information (e.g. browser type and information, language, screen size, supported technologies etc.) can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here.
Personalised advertising and content, advertising and content measurement, audience research and services development 201 partners can use this purpose
Use limited data to select advertising 163 partners can use this purpose
Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are (or have been) interacting with (for example, to limit the number of times an ad is presented to you).
Create profiles for personalised advertising 124 partners can use this purpose
Information about your activity on this service (such as forms you submit, content you look at) can be stored and combined with other information about you (for example, information from your previous activity on this service and other websites or apps) or similar users. This is then used to build or improve a profile about you (that might include possible interests and personal aspects). Your profile can be used (also later) to present advertising that appears more relevant based on your possible interests by this and other entities.
Use profiles to select personalised advertising 125 partners can use this purpose
Advertising presented to you on this service can be based on your advertising profiles, which can reflect your activity on this service or other websites or apps (like the forms you submit, content you look at), possible interests and personal aspects.
Create profiles to personalise content 52 partners can use this purpose
Information about your activity on this service (for instance, forms you submit, non-advertising content you look at) can be stored and combined with other information about you (such as your previous activity on this service or other websites or apps) or similar users. This is then used to build or improve a profile about you (which might for example include possible interests and personal aspects). Your profile can be used (also later) to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests.
Use profiles to select personalised content 49 partners can use this purpose
Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services (for instance, the forms you submit, content you look at), possible interests and personal aspects. This can for example be used to adapt the order in which content is shown to you, so that it is even easier for you to find (non-advertising) content that matches your interests.
Measure advertising performance 181 partners can use this purpose
Information regarding which advertising is presented to you and how you interact with it can be used to determine how well an advert has worked for you or other users and whether the goals of the advertising were reached. For instance, whether you saw an ad, whether you clicked on it, whether it led you to buy a product or visit a website, etc. This is very helpful to understand the relevance of advertising campaigns.
Measure content performance 79 partners can use this purpose
Information regarding which content is presented to you and how you interact with it can be used to determine whether the (non-advertising) content e.g. reached its intended audience and matched your interests. For instance, whether you read an article, watch a video, listen to a podcast or look at a product description, how long you spent on this service and the web pages you visit etc. This is very helpful to understand the relevance of (non-advertising) content that is shown to you.
Understand audiences through statistics or combinations of data from different sources 113 partners can use this purpose
Reports can be generated based on the combination of data sets (like user profiles, statistics, market research, analytics data) regarding your interactions and those of other users with advertising or (non-advertising) content to identify common characteristics (for instance, to determine which target audiences are more receptive to an ad campaign or to certain contents).
Develop and improve services 119 partners can use this purpose
Information about your activity on this service, such as your interaction with ads or content, can be very helpful to improve products and services and to build new products and services based on user interactions, the type of audience, etc. This specific purpose does not include the development or improvement of user profiles and identifiers.
Use limited data to select content 52 partners can use this purpose
Content presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type, or which content you are (or have been) interacting with (for example, to limit the number of times a video or an article is presented to you).
Use precise geolocation data 67 partners can use this special feature
With your acceptance, your precise location (within a radius of less than 500 metres) may be used in support of the purposes explained in this notice.
Actively scan device characteristics for identification 38 partners can use this special feature
With your acceptance, certain characteristics specific to your device might be requested and used to distinguish it from other devices (such as the installed fonts or plugins, the resolution of your screen) in support of the purposes explained in this notice.
Ensure security, prevent and detect fraud, and fix errors 126 partners can use this special purpose
Always Active
Your data can be used to monitor for and prevent unusual and possibly fraudulent activity (for example, regarding advertising, ad clicks by bots), and ensure systems and processes work properly and securely. It can also be used to correct any problems you, the publisher or the advertiser may encounter in the delivery of content and ads and in your interaction with them.
Deliver and present advertising and content 128 partners can use this special purpose
Always Active
Certain information (like an IP address or device capabilities) is used to ensure the technical compatibility of the content or advertising, and to facilitate the transmission of the content or ad to your device.
Match and combine data from other data sources 96 partners can use this feature
Always Active
Information about your activity on this service may be matched and combined with other information relating to you and originating from various sources (for instance your activity on a separate online service, your use of a loyalty card in-store, or your answers to a survey), in support of the purposes explained in this notice.
Link different devices 69 partners can use this feature
Always Active
In support of the purposes explained in this notice, your device might be considered as likely linked to other devices that belong to you or your household (for instance because you are logged in to the same service on both your phone and your computer, or because you may use the same Internet connection on both devices).
Identify devices based on information transmitted automatically 120 partners can use this feature
Always Active
Your device might be distinguished from other devices based on information it automatically sends when accessing the Internet (for instance, the IP address of your Internet connection or the type of browser you are using) in support of the purposes exposed in this notice.
Save and communicate privacy choices 108 partners can use this special purpose
Always Active
The choices you make regarding the purposes and entities listed in this notice are saved and made available to those entities in the form of digital signals (such as a string of characters). This is necessary in order to enable both this service and those entities to respect such choices.
have your say