SlideShare a Scribd company logo
1 of 17
The Right to Be Forgotten: Reflections on
Cynicisms and Possible Responses
                  Kinfe M. Yilma
                  9th May/2012
   Current Developments in Information Society(Law)
                     NRCCL-CRIDS
              University of Namur, Belgium
Outline

• Introduction
• Meaning, Nature and Rationale
• Concerns
   -Free Speech
   -General Interest of the Public to Remember
• Conclusion
Introduction

• Ubiquitous digital remembering enables easy
  availability of personal data to a wide array of
  audience including prospective employers
“Technologies are making the past easily and
  eternally present”[Allen, 2008]
• Web 2.0 accelerates the rate of unwanted publicity
  and invasion of data privacy
• First hand victims are teenagers
• Right to be forgotten proposed
• Focus: Is the right really a threat?
Meaning, Nature and Rationale(1)

• The French ‘le droit à l’oubli’[Right of Oblivion] of
  1999 is often mentioned as the intellectual root for
  the right to be forgotten.[Rosen, 2012] It entitles
  complete erasure of ones criminal record after
  discharging jail time.
• This view is partly dubious as the right(privilege) to
  demand erasure of criminal history existed even
  earlier before 90s, at least for more than half a
  century.
  -E.g. Repealed Ethiopian Penal Code(1957)
  recognized ‘privilege’ of ‘reinstatement’ to,
  i.a.,persons who have undergone their penalties[Arts
Meaning, Nature and Rationale(2)
▪Spain pioneered in introducing the right to be forgotten
  as we know it today.[Castellano, 2012]
  ‘citizens, who neither are not public figures nor are
  subject of news of public relevance, have right to
  react and correct the unlawful inclusion of personal
  data on the internet.’
▪Google has been ordered to delete links to any
  website containing nasty content in violation of the
  right to be forgotten. The case is now referred to
  court of Justice for preliminary ruling.[AEPD vs
  Google]
Meaning, Nature and Rationale(3)

EU:
• Initially outlined on 4th Nov. 2010, COM(2010) 609
   as part of overhaul of DPD/46/95/EC
• Formally proposed on 25th January/2012,
   COM(2012) 11
Rationale:
-building users trust on online services and increasing
   control of personal information
-protecting the youth(cf. Art 17, Recital 53, DPR)
-Inadequacy of the existing regime
Meaning, Nature and Rationale(4)

Meaning and Nature:
• The right implies a ‘control-right’ of the data
  subject to decide on fate of data on
  him.[Ausloos, 2012]

• ‘the right of individuals to have their data no
  longer processed and deleted when they are
  no longer needed for legitimate purposes’
           [COM(2010) 609 ]
Meaning, Nature and Rationale(5)

• Right to be forgotten is implicit in extant data
  protection principles
   - personal data cannot be kept longer than is
  necessary for the purpose for which it is collected or
  further processed[Art 6(e), DPD]
   - the right of data subjects to obtain from the data
  controller eraser or blocking of data[Art 12(b), DPD]
   - the general right to object data processing[Art 14,
  DPD]
• Limited scope and imprecision of what constitutes
  consent crippled the reach of these principles
Meaning, Nature and Rationale(6)

• One can also read the ‘aroma’ of the right to be
  forgotten into the e-privacy and data retention
  directives

 - traffic data must be erased or made anonymous
  when it is no longer needed for the purpose of the
  transmission of a communication[Art 6, e-Privacy
  Directive]

 -service providers must store traffic and location data
  for up to two years[Art 3, Data Retention Directive]
Concerns

I. Issues of Free speech
▪Concerns mainly come from free speech over-
  protective US camp
  -The concerns are premised on a higher level of
  protection given to privacy rights in Europe than free
  speech.
▪Rosen argues ‘the right to be forgotten would require
  controllers to delete personal data which have gone
  viral over the net.’[Rosen, 2012]
▪He also claims that the right could be invoked against
  search engines which just ‘link’ to content
Concerns(2)

▪   Huge fines ensuing non-compliance up to €500,000
    or 1% of annual world wide income[Art 79(5(c))]
    would induce self-censorship

 Possible Responses
▪The right is restricted to seeking deletion and further
  dissemination(sic)…[Art 17(1)]
   -Likely to exonerate from complying with request for
  deletion of data which have gone viral and
  undeletable
Concerns(3)

▪ The right is enforceable only against ‘controllers who
  authorized a third party publication of personal
  data’(sic)[Art 17(2), Recital 54, DPR]
    -This may not necessarily apply to search engines
  which just provide links to content
    -The upcoming ECJ ruling in Google Spain vs
  AEPD would probably throw light on this
   -Another basic issue would be ‘are search engines
  controllers within the meaning of Art 2(d), DPD?
   -WP 169 doesn’t give a clear answer
   -Bygrave writes ‘control’ is the crucial criterion
Concerns(4)

▪Exceptions for exercising right of freedom of
  expression[Art 17(3(a)) cum Art 80, DPR]
   - European case law also reveals beckoning
  protection to free speech
Examples:
  ●Winer v UK(1978)
  ●Von Hannover v Germany(2004)
  ● Satakunnan Markkinapörssi and Satamedia(C-
  73/07)
  ● Volker und Markus Schecke GbR and Hartmut
  Eifert(Joined Cases-C-92/09 and C-93/09)
Concerns(5)

II. General Interest of the Public to Remember
▪ Right to be forgotten would render otherwise
   important data inaccessible, incomplete and
   misrepresentative of reality[Ausloos]
▪ Dwindles right to information of the public
 Possible Responses
▪Deletion cannot be claimed where ‘the data are
   necessary’[acontrario reading of Art 17(1(a)), DPR]
▪Deletion doesn’t apply where data are necessary for
   reasons of public interest, historical, stastical and
   scientific research purposes[Art 17(17(3(b,c)), 81,
   83, DPR]
Conclusion

▪The right to be forgotten is a leap forward in regaining
  control over ones data in the digital age

▪Introduction of the right per se would not be a threat as
   advertised

▪Issues of who decides what data is no longer
   necessary, liability of intermediaries have to be,
   though, hammered down
    -Cf. Commission empowered to adopt specific
   criteria[Art 17(9) cum Art 86, DPR]
Conclusion(2)

Supplementary Measures
▪Awareness creation via, e.g. EU standard privacy
  information notices
▪Encouraging self-regulation through codes of
  conduct(Art 38, DPR)
▪Encouraging Technical measures
  -E.g. Tigertext, X-Pire
  cf. ‘Expiration Dates’[Mayor-Schonberger,
  Delete(2009)]
▪Rosen proposes Japanese Web 2.0 users culture of
  using pseudonyms online cf. ‘Digital Abstinence’
References

• Allen(2008), Dredging up the Past: Lifelogging, Memory and
  Surveillance, 75 Univ. Chic. L. Rev. 47
• Ausloos(2012), The Right to be Forgotten-Worth
  Remembering?, Computer Law and Security Review
• Castellano(2012), The Right to Be Forgotten Under European
  Law: A Constitutional Debate, Lex Electronica, Vol. 16, No. 1
• Rosen(2012), The Right to Be Forgotten, 64 Stanford Law
  Review Online 88
• Rosen(2011), Free Speech, Privacy, And The Web That Never
  Forgets(Keynote Address), Journal on Telecommunication and
  High Technology Law, Vol. 9
• Weber(2011), The Right to Be Forgotten: More Than a
  Pandora’s Box?, 2JIPItec 120

More Related Content

What's hot

Ubicomp challenges for privacy law
Ubicomp challenges for privacy lawUbicomp challenges for privacy law
Ubicomp challenges for privacy lawblogzilla
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentblogzilla
 
Communications data retention in an evolving Internet
Communications data retention in an evolving InternetCommunications data retention in an evolving Internet
Communications data retention in an evolving Internetblogzilla
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africablogzilla
 
Key principles for data protection & lawful protection in GDPR
Key principles for data protection & lawful protection in GDPRKey principles for data protection & lawful protection in GDPR
Key principles for data protection & lawful protection in GDPRDr. Marinos Papadopoulos
 
Engage 2018: GDPR Three Days To Go
Engage 2018: GDPR Three Days To GoEngage 2018: GDPR Three Days To Go
Engage 2018: GDPR Three Days To Gopanagenda
 
Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Russell_Kennedy
 
Freedom of information
Freedom of informationFreedom of information
Freedom of informationSaroj Makwana
 
The principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - ukThe principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - uk- Mark - Fullbright
 
GDPR- GENERAL DATA PROTECTION REGULATION
GDPR- GENERAL DATA PROTECTION REGULATIONGDPR- GENERAL DATA PROTECTION REGULATION
GDPR- GENERAL DATA PROTECTION REGULATIONSaurabh Pandey
 
Intro to Freedom of Information (FOI)
Intro to Freedom of Information (FOI)Intro to Freedom of Information (FOI)
Intro to Freedom of Information (FOI)alaninbelfast
 
Freedom of Information, What do We Know?
Freedom of Information, What do We Know?Freedom of Information, What do We Know?
Freedom of Information, What do We Know?Kieran Lamb
 
DMA Legal update: autumn 2013 - Tuesday 1 October
DMA Legal update: autumn 2013 - Tuesday 1 OctoberDMA Legal update: autumn 2013 - Tuesday 1 October
DMA Legal update: autumn 2013 - Tuesday 1 OctoberRachel Aldighieri
 
GDPR, DPAs and the Journalistic Media: Walking the Regulatory Tightrope
GDPR, DPAs and the Journalistic Media:  Walking the Regulatory TightropeGDPR, DPAs and the Journalistic Media:  Walking the Regulatory Tightrope
GDPR, DPAs and the Journalistic Media: Walking the Regulatory TightropeDavid Erdos
 
Reconciling Humanities and Social Science Research With Data Protection
Reconciling Humanities and Social Science Research With Data ProtectionReconciling Humanities and Social Science Research With Data Protection
Reconciling Humanities and Social Science Research With Data ProtectionDavid Erdos
 
Data Protection and Journalism: The Changing Landscape
Data Protection and Journalism: The Changing LandscapeData Protection and Journalism: The Changing Landscape
Data Protection and Journalism: The Changing LandscapeDavid Erdos
 
GDPR Introduction and overview
GDPR Introduction and overviewGDPR Introduction and overview
GDPR Introduction and overviewJane Lambert
 

What's hot (20)

Ubicomp challenges for privacy law
Ubicomp challenges for privacy lawUbicomp challenges for privacy law
Ubicomp challenges for privacy law
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgment
 
Communications data retention in an evolving Internet
Communications data retention in an evolving InternetCommunications data retention in an evolving Internet
Communications data retention in an evolving Internet
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
 
Key principles for data protection & lawful protection in GDPR
Key principles for data protection & lawful protection in GDPRKey principles for data protection & lawful protection in GDPR
Key principles for data protection & lawful protection in GDPR
 
Engage 2018: GDPR Three Days To Go
Engage 2018: GDPR Three Days To GoEngage 2018: GDPR Three Days To Go
Engage 2018: GDPR Three Days To Go
 
TDM of National Libraries in the EU.pptx
TDM of National Libraries in the EU.pptxTDM of National Libraries in the EU.pptx
TDM of National Libraries in the EU.pptx
 
Box 11
Box 11Box 11
Box 11
 
Box 9
Box 9Box 9
Box 9
 
Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)
 
Freedom of information
Freedom of informationFreedom of information
Freedom of information
 
The principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - ukThe principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - uk
 
GDPR- GENERAL DATA PROTECTION REGULATION
GDPR- GENERAL DATA PROTECTION REGULATIONGDPR- GENERAL DATA PROTECTION REGULATION
GDPR- GENERAL DATA PROTECTION REGULATION
 
Intro to Freedom of Information (FOI)
Intro to Freedom of Information (FOI)Intro to Freedom of Information (FOI)
Intro to Freedom of Information (FOI)
 
Freedom of Information, What do We Know?
Freedom of Information, What do We Know?Freedom of Information, What do We Know?
Freedom of Information, What do We Know?
 
DMA Legal update: autumn 2013 - Tuesday 1 October
DMA Legal update: autumn 2013 - Tuesday 1 OctoberDMA Legal update: autumn 2013 - Tuesday 1 October
DMA Legal update: autumn 2013 - Tuesday 1 October
 
GDPR, DPAs and the Journalistic Media: Walking the Regulatory Tightrope
GDPR, DPAs and the Journalistic Media:  Walking the Regulatory TightropeGDPR, DPAs and the Journalistic Media:  Walking the Regulatory Tightrope
GDPR, DPAs and the Journalistic Media: Walking the Regulatory Tightrope
 
Reconciling Humanities and Social Science Research With Data Protection
Reconciling Humanities and Social Science Research With Data ProtectionReconciling Humanities and Social Science Research With Data Protection
Reconciling Humanities and Social Science Research With Data Protection
 
Data Protection and Journalism: The Changing Landscape
Data Protection and Journalism: The Changing LandscapeData Protection and Journalism: The Changing Landscape
Data Protection and Journalism: The Changing Landscape
 
GDPR Introduction and overview
GDPR Introduction and overviewGDPR Introduction and overview
GDPR Introduction and overview
 

Similar to The Right to Be Forgotten: Remarks on Its Impact on Free Speech and Right of the Public to Remember

Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...IISPEastMids
 
The GDPR, Brexit, the UK and adequacy
The GDPR, Brexit, the UK and adequacyThe GDPR, Brexit, the UK and adequacy
The GDPR, Brexit, the UK and adequacyLilian Edwards
 
Draft data protection regn 2012
Draft data protection regn 2012Draft data protection regn 2012
Draft data protection regn 2012lilianedwards
 
1º Palestra sobre Proteção de Dados Pessoais
1º Palestra sobre Proteção de Dados Pessoais1º Palestra sobre Proteção de Dados Pessoais
1º Palestra sobre Proteção de Dados PessoaisIBE_USP
 
Lesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxLesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxadnis1
 
Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1Dione McBride, CISSP, CIPP/E
 
Factsheet data protection_en
Factsheet data protection_enFactsheet data protection_en
Factsheet data protection_enGreg Sterling
 
Factsheet on the "Right to be Forgotten" ruling
Factsheet on the "Right to be Forgotten" rulingFactsheet on the "Right to be Forgotten" ruling
Factsheet on the "Right to be Forgotten" rulingSilesia SEM
 
Data Protection and "Intermediary" Responsibility: An Historical Perspective
Data Protection and "Intermediary" Responsibility:  An Historical PerspectiveData Protection and "Intermediary" Responsibility:  An Historical Perspective
Data Protection and "Intermediary" Responsibility: An Historical PerspectiveDavid Erdos
 
Social Media and Legal Ethics
Social Media and Legal EthicsSocial Media and Legal Ethics
Social Media and Legal Ethicsanthonywong
 
Presentatie Giorgos Rossides, Europese Commissie
Presentatie Giorgos Rossides, Europese CommissiePresentatie Giorgos Rossides, Europese Commissie
Presentatie Giorgos Rossides, Europese CommissieEuropadialoog
 
Google Spain and its Aftermath 2014-2023: An EU and UK GDPR Perspective
Google Spain and its Aftermath 2014-2023: An  EU and UK GDPR PerspectiveGoogle Spain and its Aftermath 2014-2023: An  EU and UK GDPR Perspective
Google Spain and its Aftermath 2014-2023: An EU and UK GDPR PerspectiveDavid Erdos
 
the Death of Privacy in Three Acts
the Death of Privacy in Three Actsthe Death of Privacy in Three Acts
the Death of Privacy in Three ActsLilian Edwards
 
The Death of Privacy in Three Acts
The Death of Privacy in Three ActsThe Death of Privacy in Three Acts
The Death of Privacy in Three ActsLilian Edwards
 
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...Konstantinos Demertzis
 
Floundering towards EU information law
Floundering towards EU information lawFloundering towards EU information law
Floundering towards EU information lawblogzilla
 
In Rem Injunctions: Case of Website Blocking
In Rem Injunctions: Case of Website BlockingIn Rem Injunctions: Case of Website Blocking
In Rem Injunctions: Case of Website BlockingMartin Husovec
 

Similar to The Right to Be Forgotten: Remarks on Its Impact on Free Speech and Right of the Public to Remember (20)

The GDPR for Techies
The GDPR for TechiesThe GDPR for Techies
The GDPR for Techies
 
Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...
 
The GDPR, Brexit, the UK and adequacy
The GDPR, Brexit, the UK and adequacyThe GDPR, Brexit, the UK and adequacy
The GDPR, Brexit, the UK and adequacy
 
Draft data protection regn 2012
Draft data protection regn 2012Draft data protection regn 2012
Draft data protection regn 2012
 
1º Palestra sobre Proteção de Dados Pessoais
1º Palestra sobre Proteção de Dados Pessoais1º Palestra sobre Proteção de Dados Pessoais
1º Palestra sobre Proteção de Dados Pessoais
 
Apresentação de Jeanette Hofmann
Apresentação de Jeanette HofmannApresentação de Jeanette Hofmann
Apresentação de Jeanette Hofmann
 
Lesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxLesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptx
 
Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1
 
Factsheet data protection_en
Factsheet data protection_enFactsheet data protection_en
Factsheet data protection_en
 
Factsheet on the "Right to be Forgotten" ruling
Factsheet on the "Right to be Forgotten" rulingFactsheet on the "Right to be Forgotten" ruling
Factsheet on the "Right to be Forgotten" ruling
 
Data Protection and "Intermediary" Responsibility: An Historical Perspective
Data Protection and "Intermediary" Responsibility:  An Historical PerspectiveData Protection and "Intermediary" Responsibility:  An Historical Perspective
Data Protection and "Intermediary" Responsibility: An Historical Perspective
 
Social Media and Legal Ethics
Social Media and Legal EthicsSocial Media and Legal Ethics
Social Media and Legal Ethics
 
PC213.L3.pdf
PC213.L3.pdfPC213.L3.pdf
PC213.L3.pdf
 
Presentatie Giorgos Rossides, Europese Commissie
Presentatie Giorgos Rossides, Europese CommissiePresentatie Giorgos Rossides, Europese Commissie
Presentatie Giorgos Rossides, Europese Commissie
 
Google Spain and its Aftermath 2014-2023: An EU and UK GDPR Perspective
Google Spain and its Aftermath 2014-2023: An  EU and UK GDPR PerspectiveGoogle Spain and its Aftermath 2014-2023: An  EU and UK GDPR Perspective
Google Spain and its Aftermath 2014-2023: An EU and UK GDPR Perspective
 
the Death of Privacy in Three Acts
the Death of Privacy in Three Actsthe Death of Privacy in Three Acts
the Death of Privacy in Three Acts
 
The Death of Privacy in Three Acts
The Death of Privacy in Three ActsThe Death of Privacy in Three Acts
The Death of Privacy in Three Acts
 
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
 
Floundering towards EU information law
Floundering towards EU information lawFloundering towards EU information law
Floundering towards EU information law
 
In Rem Injunctions: Case of Website Blocking
In Rem Injunctions: Case of Website BlockingIn Rem Injunctions: Case of Website Blocking
In Rem Injunctions: Case of Website Blocking
 

Recently uploaded

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Recently uploaded (20)

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

The Right to Be Forgotten: Remarks on Its Impact on Free Speech and Right of the Public to Remember

  • 1. The Right to Be Forgotten: Reflections on Cynicisms and Possible Responses Kinfe M. Yilma 9th May/2012 Current Developments in Information Society(Law) NRCCL-CRIDS University of Namur, Belgium
  • 2. Outline • Introduction • Meaning, Nature and Rationale • Concerns -Free Speech -General Interest of the Public to Remember • Conclusion
  • 3. Introduction • Ubiquitous digital remembering enables easy availability of personal data to a wide array of audience including prospective employers “Technologies are making the past easily and eternally present”[Allen, 2008] • Web 2.0 accelerates the rate of unwanted publicity and invasion of data privacy • First hand victims are teenagers • Right to be forgotten proposed • Focus: Is the right really a threat?
  • 4. Meaning, Nature and Rationale(1) • The French ‘le droit à l’oubli’[Right of Oblivion] of 1999 is often mentioned as the intellectual root for the right to be forgotten.[Rosen, 2012] It entitles complete erasure of ones criminal record after discharging jail time. • This view is partly dubious as the right(privilege) to demand erasure of criminal history existed even earlier before 90s, at least for more than half a century. -E.g. Repealed Ethiopian Penal Code(1957) recognized ‘privilege’ of ‘reinstatement’ to, i.a.,persons who have undergone their penalties[Arts
  • 5. Meaning, Nature and Rationale(2) ▪Spain pioneered in introducing the right to be forgotten as we know it today.[Castellano, 2012] ‘citizens, who neither are not public figures nor are subject of news of public relevance, have right to react and correct the unlawful inclusion of personal data on the internet.’ ▪Google has been ordered to delete links to any website containing nasty content in violation of the right to be forgotten. The case is now referred to court of Justice for preliminary ruling.[AEPD vs Google]
  • 6. Meaning, Nature and Rationale(3) EU: • Initially outlined on 4th Nov. 2010, COM(2010) 609 as part of overhaul of DPD/46/95/EC • Formally proposed on 25th January/2012, COM(2012) 11 Rationale: -building users trust on online services and increasing control of personal information -protecting the youth(cf. Art 17, Recital 53, DPR) -Inadequacy of the existing regime
  • 7. Meaning, Nature and Rationale(4) Meaning and Nature: • The right implies a ‘control-right’ of the data subject to decide on fate of data on him.[Ausloos, 2012] • ‘the right of individuals to have their data no longer processed and deleted when they are no longer needed for legitimate purposes’ [COM(2010) 609 ]
  • 8. Meaning, Nature and Rationale(5) • Right to be forgotten is implicit in extant data protection principles - personal data cannot be kept longer than is necessary for the purpose for which it is collected or further processed[Art 6(e), DPD] - the right of data subjects to obtain from the data controller eraser or blocking of data[Art 12(b), DPD] - the general right to object data processing[Art 14, DPD] • Limited scope and imprecision of what constitutes consent crippled the reach of these principles
  • 9. Meaning, Nature and Rationale(6) • One can also read the ‘aroma’ of the right to be forgotten into the e-privacy and data retention directives - traffic data must be erased or made anonymous when it is no longer needed for the purpose of the transmission of a communication[Art 6, e-Privacy Directive] -service providers must store traffic and location data for up to two years[Art 3, Data Retention Directive]
  • 10. Concerns I. Issues of Free speech ▪Concerns mainly come from free speech over- protective US camp -The concerns are premised on a higher level of protection given to privacy rights in Europe than free speech. ▪Rosen argues ‘the right to be forgotten would require controllers to delete personal data which have gone viral over the net.’[Rosen, 2012] ▪He also claims that the right could be invoked against search engines which just ‘link’ to content
  • 11. Concerns(2) ▪ Huge fines ensuing non-compliance up to €500,000 or 1% of annual world wide income[Art 79(5(c))] would induce self-censorship Possible Responses ▪The right is restricted to seeking deletion and further dissemination(sic)…[Art 17(1)] -Likely to exonerate from complying with request for deletion of data which have gone viral and undeletable
  • 12. Concerns(3) ▪ The right is enforceable only against ‘controllers who authorized a third party publication of personal data’(sic)[Art 17(2), Recital 54, DPR] -This may not necessarily apply to search engines which just provide links to content -The upcoming ECJ ruling in Google Spain vs AEPD would probably throw light on this -Another basic issue would be ‘are search engines controllers within the meaning of Art 2(d), DPD? -WP 169 doesn’t give a clear answer -Bygrave writes ‘control’ is the crucial criterion
  • 13. Concerns(4) ▪Exceptions for exercising right of freedom of expression[Art 17(3(a)) cum Art 80, DPR] - European case law also reveals beckoning protection to free speech Examples: ●Winer v UK(1978) ●Von Hannover v Germany(2004) ● Satakunnan Markkinapörssi and Satamedia(C- 73/07) ● Volker und Markus Schecke GbR and Hartmut Eifert(Joined Cases-C-92/09 and C-93/09)
  • 14. Concerns(5) II. General Interest of the Public to Remember ▪ Right to be forgotten would render otherwise important data inaccessible, incomplete and misrepresentative of reality[Ausloos] ▪ Dwindles right to information of the public Possible Responses ▪Deletion cannot be claimed where ‘the data are necessary’[acontrario reading of Art 17(1(a)), DPR] ▪Deletion doesn’t apply where data are necessary for reasons of public interest, historical, stastical and scientific research purposes[Art 17(17(3(b,c)), 81, 83, DPR]
  • 15. Conclusion ▪The right to be forgotten is a leap forward in regaining control over ones data in the digital age ▪Introduction of the right per se would not be a threat as advertised ▪Issues of who decides what data is no longer necessary, liability of intermediaries have to be, though, hammered down -Cf. Commission empowered to adopt specific criteria[Art 17(9) cum Art 86, DPR]
  • 16. Conclusion(2) Supplementary Measures ▪Awareness creation via, e.g. EU standard privacy information notices ▪Encouraging self-regulation through codes of conduct(Art 38, DPR) ▪Encouraging Technical measures -E.g. Tigertext, X-Pire cf. ‘Expiration Dates’[Mayor-Schonberger, Delete(2009)] ▪Rosen proposes Japanese Web 2.0 users culture of using pseudonyms online cf. ‘Digital Abstinence’
  • 17. References • Allen(2008), Dredging up the Past: Lifelogging, Memory and Surveillance, 75 Univ. Chic. L. Rev. 47 • Ausloos(2012), The Right to be Forgotten-Worth Remembering?, Computer Law and Security Review • Castellano(2012), The Right to Be Forgotten Under European Law: A Constitutional Debate, Lex Electronica, Vol. 16, No. 1 • Rosen(2012), The Right to Be Forgotten, 64 Stanford Law Review Online 88 • Rosen(2011), Free Speech, Privacy, And The Web That Never Forgets(Keynote Address), Journal on Telecommunication and High Technology Law, Vol. 9 • Weber(2011), The Right to Be Forgotten: More Than a Pandora’s Box?, 2JIPItec 120