
This breach of a women-focused dating safety app illustrates how poor data governance—particularly around identity verification and message storage—can severely compromise user privacy and safety. It also highlights regulatory concerns related to data minimization, deletion policies, and secure-by-design principles in high-growth tech platforms.
On July 25, 2025, Tea, a viral women-only app designed to anonymously flag abusive dating behavior, confirmed a significant data breach involving a legacy data system. The exposed archive contained approximately 72,000 user images, including:
Although Tea had stated that photo ID images were deleted immediately after use, the data was retained in an unsecured cloud storage bucket. The breach affected only early users, but the consequences were severe: personal data appeared on platforms such as 4chan, raising concerns over identity theft, harassment, and reputational harm. Shortly after the breach, Tea took down its in-app messaging system following the discovery of a second security issue affecting private messages.
Based upon the information available, it appears Tea failed to observe three fundamental principles in data security/privacy compliance and risk avoidance. First, Tea failed to have a complete updated data map/data inventory. If they had, highly sensitive photo identification card data would not have been stored in an unsecured cloud storage container. Understanding the entirety of the data processed and the systems in which it is processed allows operators to make appropriate security decisions and to implement proper privacy mechanisms. Secondly, Tea failed to practice data minimization. You can’t lose data that you don’t have. If the sensitive data had been appropriately disposed of after its use, it could not have been stolen. Lastly, Tea failed to follow its own policies and procedures. Users uploaded copies of their photo identification cards with the assurance that the data would be deleted immediately after verification was completed. If the data had been deleted as provided in Tea’s policies, it could not have been exfiltrated and exposed on the Internet. These failures substantially exacerbated the effect of this data breach and increased Tea’s exposure. Following these three fundamental principles will help reduce data security risks and aid in privacy compliance.Billee Elliott McAuliffe, Data Protection Practice Group Leader, LewisRice
Organizations should reassess their data retention and deletion practices frequently, especially for sensitive identity documents or verification systems. Identity verification data, by its very nature is sensitive. If retention policies aren’t operationalized, risks can mount quickly. Learn how to implement a data retention program with our whitepaper, Filling in Your Blind Spots.