SlideShare a Scribd company logo
1 of 12
Analyzing the EU’s “right to be forgotten”

        Presentation by: Alyah Khan




                                Photo courtesy of Flickr CC
Client
• Analysis conducted on behalf of European
  Digital Rights (EDRi), an international
  advocacy group headquartered in Brussels,
  Belgium.

• Goal of EDRi: Protect digital civil rights in the
  information society.
Purpose of report
• Analyze the feasibility and effectiveness of
  EU’s proposed “right to be forgotten”

• Examine policy’s scope, applicability and
  potential impact on freedom of speech
EU proposes data protection reform

• January 2012: European Commission proposes
  comprehensive reform of its 1995 data protection rules.

• Reform includes several changes intended to strengthen
  online privacy rights and enhance Europe’s digital economy.

• Most controversial provision is the “right to be forgotten” –
  Focus of this report
EU perspective on personal data
              protection

                                              Viviane Reding, European
                                              Commission, said on January
                                              25:



                       Photo courtesy of AP


“The protection of personal data is a fundamental right for
all Europeans, but citizens do not always feel in full control of
their personal data. My proposals will build trust in online
services because people will be better informed about their
rights and in more control of their information.”
Perspective of EU citizens
• More than half of Europeans feel that they
  must disclose personal information if they
  want to obtain products or services.

• Yet, only 26 percent of social network users
  and 18 percent of online shoppers feel in
  complete control of their data, according to a
  2011 survey.

           Source: Citizens’ perceptions of data protection and privacy in Europe
Article 17: right to be forgotten and to
                erasure

• Policy is laid out in Section 3, Article 17 of the
  EU’s proposed data protection regulation.

• Right enables people to delete their data
  (text, photos, videos) if there are no
  “legitimate grounds” for retaining it.
Analysis: Scope & Applicability

– Scope of policy is too broad and could lead to
  enforcement discrepancies among countries

– Policy wrongly places “burden of proof” on users

– Policy fails to address issue of how to request erasure
  of cross-posted information with any clarity

– Responsibilities of data controllers (Facebook, Google,
  YouTube) are not clearly articulated
Analysis: Impact on Free Speech
• Rosen (2012) said “right to be forgotten”
  represents the “biggest threat to free speech in
  the coming decade.”

• EDRi also concerned right could be misused as a
  tool for censorship.

• Other scholars said the right could produce a
  “chilling effect” caused by deletion in ambiguous
  cases.
Suggested revisions
• Limit the scope of the policy so that it applies
  only to data that users have consented to.

• Define the right to be forgotten in specific terms
  by clearly articulating situations where erasure is
  appropriate.

• Explain the materials or information (i.e. the
  proof) required to request erasure.
Suggested revisions cont’d

• Address the issue of information cross-posted
  on multiple platforms and whether it is up to
  users to ensure erasure is carried out to the
  fullest extent.

• State as explicitly as possible the
  responsibilities of data controllers in terms of
  fulfilling an erasure request.
Conclusion
• By making the suggested revisions and seeking the input of
  data controllers, the policy stands a greater chance of
  succeeding in the future.

• If the “right to be forgotten” is effectively implemented
  across Europe, a new global standard will emerge for the
  protection of personal data.

• The balance of power will shift in favor of individuals.

• It remains to be seen whether other countries, such as the
  U.S., will consider a similar policy.

More Related Content

What's hot

Lesson 9 interactive media (1)
Lesson 9  interactive media (1)Lesson 9  interactive media (1)
Lesson 9 interactive media (1)
Helen Bruce
 

What's hot (20)

AI and Legal Tech in Context: Privacy and Security Commons
AI and Legal Tech in Context: Privacy and Security CommonsAI and Legal Tech in Context: Privacy and Security Commons
AI and Legal Tech in Context: Privacy and Security Commons
 
Internet ecosystem and the internet
Internet ecosystem and the internetInternet ecosystem and the internet
Internet ecosystem and the internet
 
Unesco paris-2011
Unesco paris-2011Unesco paris-2011
Unesco paris-2011
 
Net Neutrality: how its elimination might impact patients & healthcare
Net Neutrality:how its elimination might impact patients & healthcareNet Neutrality:how its elimination might impact patients & healthcare
Net Neutrality: how its elimination might impact patients & healthcare
 
ICT for Governance
 ICT for Governance ICT for Governance
ICT for Governance
 
Lesson 9 interactive media (1)
Lesson 9  interactive media (1)Lesson 9  interactive media (1)
Lesson 9 interactive media (1)
 
Offdata: a prosumer law agency to govern big data in the public interest
Offdata:  a prosumer law agency to govern big data in the public interestOffdata:  a prosumer law agency to govern big data in the public interest
Offdata: a prosumer law agency to govern big data in the public interest
 
Module 7: ICT and Social Responsibilities
Module 7: ICT and Social ResponsibilitiesModule 7: ICT and Social Responsibilities
Module 7: ICT and Social Responsibilities
 
CILIP Policy Seminar - Privacy & the library & information sectors
CILIP Policy Seminar - Privacy & the library & information sectorsCILIP Policy Seminar - Privacy & the library & information sectors
CILIP Policy Seminar - Privacy & the library & information sectors
 
Wsis unesco-2015
Wsis unesco-2015Wsis unesco-2015
Wsis unesco-2015
 
Social media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacySocial media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacy
 
Ann Ox09 Presentation
Ann Ox09 PresentationAnn Ox09 Presentation
Ann Ox09 Presentation
 
Techinnovation
TechinnovationTechinnovation
Techinnovation
 
Freedom of Connection – Freedom of Expression: The Future Internet in the Lar...
Freedom of Connection – Freedom of Expression: The Future Internet in the Lar...Freedom of Connection – Freedom of Expression: The Future Internet in the Lar...
Freedom of Connection – Freedom of Expression: The Future Internet in the Lar...
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
 
Internet Governance and Open Source Software
Internet Governance and Open Source SoftwareInternet Governance and Open Source Software
Internet Governance and Open Source Software
 
Data Protection and Academia: Fundamental Rights in Conflict
Data Protection and Academia: Fundamental Rights in ConflictData Protection and Academia: Fundamental Rights in Conflict
Data Protection and Academia: Fundamental Rights in Conflict
 
Net neutrality
Net neutralityNet neutrality
Net neutrality
 
Canary in the coal mine: how Internet regulation leads
Canary in the coal mine: how Internet regulation leadsCanary in the coal mine: how Internet regulation leads
Canary in the coal mine: how Internet regulation leads
 

Similar to Right to be forgotten presentation

Right to be forgotten presentation
Right to be forgotten presentationRight to be forgotten presentation
Right to be forgotten presentation
reporter1120
 
Right to be forgotten final paper
Right to be forgotten final paperRight to be forgotten final paper
Right to be forgotten final paper
reporter1120
 
PLA Legal aspects of Big Data analytics final
PLA Legal aspects of Big Data analytics finalPLA Legal aspects of Big Data analytics final
PLA Legal aspects of Big Data analytics final
Sofie van der Meulen
 
Presentatie Giorgos Rossides, Europese Commissie
Presentatie Giorgos Rossides, Europese CommissiePresentatie Giorgos Rossides, Europese Commissie
Presentatie Giorgos Rossides, Europese Commissie
Europadialoog
 
"The value of a European approach to mHealth in cancer Unleashing the mHealth...
"The value of a European approach to mHealth in cancer Unleashing the mHealth..."The value of a European approach to mHealth in cancer Unleashing the mHealth...
"The value of a European approach to mHealth in cancer Unleashing the mHealth...
3GDR
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obama
Lilian Edwards
 
Where does EU money go? Availability and quality of Open Data on the recipien...
Where does EU money go? Availability and quality of Open Data on the recipien...Where does EU money go? Availability and quality of Open Data on the recipien...
Where does EU money go? Availability and quality of Open Data on the recipien...
Luigi Reggi
 

Similar to Right to be forgotten presentation (20)

Right to be forgotten presentation
Right to be forgotten presentationRight to be forgotten presentation
Right to be forgotten presentation
 
Data Privacy of the Internet of Things
Data Privacy of the Internet of ThingsData Privacy of the Internet of Things
Data Privacy of the Internet of Things
 
Right to be forgotten final paper
Right to be forgotten final paperRight to be forgotten final paper
Right to be forgotten final paper
 
1st draft
1st draft1st draft
1st draft
 
PLA Legal aspects of Big Data analytics final
PLA Legal aspects of Big Data analytics finalPLA Legal aspects of Big Data analytics final
PLA Legal aspects of Big Data analytics final
 
Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics' Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics'
 
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
 
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
 
GCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxGCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptx
 
DAY 1_ITEM 4_Privacy and personal data protection.ppt
DAY 1_ITEM 4_Privacy and personal data protection.pptDAY 1_ITEM 4_Privacy and personal data protection.ppt
DAY 1_ITEM 4_Privacy and personal data protection.ppt
 
Presentatie Giorgos Rossides, Europese Commissie
Presentatie Giorgos Rossides, Europese CommissiePresentatie Giorgos Rossides, Europese Commissie
Presentatie Giorgos Rossides, Europese Commissie
 
[REPORT PREVIEW] GDPR Beyond May 25, 2018
[REPORT PREVIEW] GDPR Beyond May 25, 2018[REPORT PREVIEW] GDPR Beyond May 25, 2018
[REPORT PREVIEW] GDPR Beyond May 25, 2018
 
"The value of a European approach to mHealth in cancer Unleashing the mHealth...
"The value of a European approach to mHealth in cancer Unleashing the mHealth..."The value of a European approach to mHealth in cancer Unleashing the mHealth...
"The value of a European approach to mHealth in cancer Unleashing the mHealth...
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obama
 
The death of data protection
The death of data protection The death of data protection
The death of data protection
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
 
Rights to privacy and freedom of expression in public libraries: squaring the...
Rights to privacy and freedom of expression in public libraries: squaring the...Rights to privacy and freedom of expression in public libraries: squaring the...
Rights to privacy and freedom of expression in public libraries: squaring the...
 
Where does EU money go? Availability and quality of Open Data on the recipien...
Where does EU money go? Availability and quality of Open Data on the recipien...Where does EU money go? Availability and quality of Open Data on the recipien...
Where does EU money go? Availability and quality of Open Data on the recipien...
 
Multimedia Privacy
Multimedia PrivacyMultimedia Privacy
Multimedia Privacy
 
Internet rights.pdf
Internet rights.pdfInternet rights.pdf
Internet rights.pdf
 

Recently uploaded

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 

Recently uploaded (20)

Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 

Right to be forgotten presentation

  • 1. Analyzing the EU’s “right to be forgotten” Presentation by: Alyah Khan Photo courtesy of Flickr CC
  • 2. Client • Analysis conducted on behalf of European Digital Rights (EDRi), an international advocacy group headquartered in Brussels, Belgium. • Goal of EDRi: Protect digital civil rights in the information society.
  • 3. Purpose of report • Analyze the feasibility and effectiveness of EU’s proposed “right to be forgotten” • Examine policy’s scope, applicability and potential impact on freedom of speech
  • 4. EU proposes data protection reform • January 2012: European Commission proposes comprehensive reform of its 1995 data protection rules. • Reform includes several changes intended to strengthen online privacy rights and enhance Europe’s digital economy. • Most controversial provision is the “right to be forgotten” – Focus of this report
  • 5. EU perspective on personal data protection Viviane Reding, European Commission, said on January 25: Photo courtesy of AP “The protection of personal data is a fundamental right for all Europeans, but citizens do not always feel in full control of their personal data. My proposals will build trust in online services because people will be better informed about their rights and in more control of their information.”
  • 6. Perspective of EU citizens • More than half of Europeans feel that they must disclose personal information if they want to obtain products or services. • Yet, only 26 percent of social network users and 18 percent of online shoppers feel in complete control of their data, according to a 2011 survey. Source: Citizens’ perceptions of data protection and privacy in Europe
  • 7. Article 17: right to be forgotten and to erasure • Policy is laid out in Section 3, Article 17 of the EU’s proposed data protection regulation. • Right enables people to delete their data (text, photos, videos) if there are no “legitimate grounds” for retaining it.
  • 8. Analysis: Scope & Applicability – Scope of policy is too broad and could lead to enforcement discrepancies among countries – Policy wrongly places “burden of proof” on users – Policy fails to address issue of how to request erasure of cross-posted information with any clarity – Responsibilities of data controllers (Facebook, Google, YouTube) are not clearly articulated
  • 9. Analysis: Impact on Free Speech • Rosen (2012) said “right to be forgotten” represents the “biggest threat to free speech in the coming decade.” • EDRi also concerned right could be misused as a tool for censorship. • Other scholars said the right could produce a “chilling effect” caused by deletion in ambiguous cases.
  • 10. Suggested revisions • Limit the scope of the policy so that it applies only to data that users have consented to. • Define the right to be forgotten in specific terms by clearly articulating situations where erasure is appropriate. • Explain the materials or information (i.e. the proof) required to request erasure.
  • 11. Suggested revisions cont’d • Address the issue of information cross-posted on multiple platforms and whether it is up to users to ensure erasure is carried out to the fullest extent. • State as explicitly as possible the responsibilities of data controllers in terms of fulfilling an erasure request.
  • 12. Conclusion • By making the suggested revisions and seeking the input of data controllers, the policy stands a greater chance of succeeding in the future. • If the “right to be forgotten” is effectively implemented across Europe, a new global standard will emerge for the protection of personal data. • The balance of power will shift in favor of individuals. • It remains to be seen whether other countries, such as the U.S., will consider a similar policy.