An international banking organization violated European Union and Belgian data-privacy laws by turning over information to U.S. authorities for terrorism investigations, an independent panel set up by the European Commission has concluded.The Society for Worldwide Interbank Financial Telecommunication (Swift) should cease violating data-protection laws or face sanctions, the panel of E.U. data-protection officials said Thursday.Swift, a cooperative owned by about 8,000 financial institutions, runs a messaging service that enables worldwide financial transactions between banks.After the attacks on the United States on Sept. 11, 2001, Swift responded to court orders to hand over messaging information to the U.S. Treasury Department to track financial transactions by suspected terrorists. Press reports revealed the long-running operation earlier this year. The panel, known as the Article 29 Working Group, said Swift’s actions could undermine the financial stability of the payment system.“Any measure taken in the fight against crime and terrorism should not and must not reduce standards of protection and fundamental rights which characterize democratic societies,” the panel said. European data-protection laws forbid the transfer of personal data outside the E.U. to countries such as the United States that are considered to have weaker data-protection measures.Swift, based in Belgium, keeps the same data in two information storage facilities, in the United States and the Netherlands, which it says are each subject to local laws.A spokesman for Swift said Friday the organization turns over specific subsets of data to the Treasury based on narrow court-ordered requests and doesn’t allow indiscriminate access. Swift negotiated with the U.S. government to monitor and audit the requests.“People have this misunderstanding that the U.S. government has access to the totality of our traffic,” the spokesman said.The company said it did not violate E.U. law in handing over the information. It obtained guarantees from the Treasury Department to protect the confidentiality of the limited sets of data turned over to U.S. authorities, it said in a statement. The company was “clearly caught in the middle,” trying to help with financial intelligence for terrorism investigations and trying to ensure data was protected, it said.The panel also called on financial institutions within the European Union to notify clients to how their personal data has been used and inform clients that U.S. authorities could potentially have access to the data. The panel’s report will be studied by the commission, a spokesman for the Directorate-General for Justice, Freedom and Security said Friday. The report is non-binding, however, the spokesman said.Belgian authorities have also conducted a two-month investigation of the matter, concluding in September that Swift had violated E.U. and Belgian data-privacy laws. However, the authorities stopped short of fining Swift.Swift’s spokesman said he is aware Belgian prosecutors have an ongoing investigation.By Jeremy Kirk, IDG News Service (London Bureau) Keep checking in at our Security Feed for updated news coverage. Related content brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security news Gitlab fixes bug that exploited internal policies to trigger hostile pipelines It was possible for an attacker to run pipelines as an arbitrary user via scheduled security scan policies. By Shweta Sharma Sep 21, 2023 3 mins Vulnerabilities Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe