How This Briefing Works
This report opens with key findings, then maps the gaps between what Comarch discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.
Key Findings
Analysis pending. Findings will appear here once intelligence collection is complete.
Claims vs. Observed Behavior
pending
“GDPR-compliant with consent-based profiling”
Awaiting scanner verification of actual cookie and tracking behavior on client websites
pending
“First-party data only, cookieless approach”
No runtime evidence yet to confirm absence of third-party tracking on client deployments
What This Means For You
What To Do About It
Role-specific actions based on observed behavior
Recommended Actions for Comarch
- →- Audit what customer data Comarch collects through loyalty program touchpoints and verify alignment with your privacy policy disclosures. - Review Comarch's data processing agreement to understand data controller vs. processor roles and cross-border transfer mechanisms. - Assess whether AI-driven behavioral profiling and predictive personalization are adequately disclosed to end customers. - Evaluate consent mechanisms for cross-channel messaging (email, push, SMS) to ensure opt-in granularity meets regulatory requirements. - Map all data flows between Comarch and integrated systems (CRM, POS, e-commerce) to identify unmonitored data sharing.
Negotiation Leverage
- →Comarch holds ISO, ITIL, PCI DSS, CCAP, and GDPR certifications, which provides a compliance baseline for negotiations. Key leverage points include requiring transparency on AI model training data usage, demanding audit rights for behavioral profiling algorithms, and negotiating data portability and deletion SLAs for loyalty program member data. Request documentation of all third-party sub-processors and cross-border data transfer safeguards. The platform's enterprise positioning means Comarch should be willing to accommodate custom data processing addendums and security review processes.
IOC Manifest
Indicators of compromise across 4 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.
Ecosystem & Supply Chain
Evidence Artifacts
Artifacts collected during analysis, available with evidence-tier access.
Complete network capture with all requests and responses
77 detection signatures across scripts, domains, cookies, and network endpoints