SlideShare una empresa de Scribd logo
1 de 18
The right to delete Paul Bernal – London School of Economics
Personal data on the internet Massive amounts are held Current commercial models rely on it The data that is held is vulnerable – and may be increasingly so The existence and use of that data is something that concerns people – and rightly so It’s our data, isn’t it??
The right to delete To address the existence of this data To encourage the development of business models that don’t rely on the holding of data To begin the process of putting data subjects in control of their own data
Personal data in the new internet The Google/Facebook model Behavioural tracking Commercial data gathering The market in personal data
Data vulnerability Physical loss – e.g. HMRC/MOD data losses Hacking Vulnerability to government action: Subpoenas, USA PATRIOT act, Data retention Swiss banking data/Chinese Google hackers Commercial vulnerability T-Mobile data-selling scandal Changes of ownership etc
What can happen to lost data? Into the hands of criminals – nastier and better-targeted scams Into the hands of governments – used without the normal restrictions (e.g. Germany) Into the hands of less scrupulous or less controlled businesses or different jurisdictions Into the overall data morass
What can be done? Systematic culture change – emphasis on data security More powerful, better resourced and better supported data protection systems Better use of technological protection – encryption etc More community awareness of the issue
But there will always be problems: Human errors Human malice Technological errors Community pressures New technological and business ideas
Data minimisation Already a principle within data protection, but one that is effectively paid only lip-service to It needs to be better enforced – both better detected and more harshly punished.  Punishment for data protection breaches are generally for losses or inappropriate processing, not for failures of data minimisation Needs to be put in the hands of the data subjects
New business models (1) The drive behind the current web model has been the business concepts of Google and Facebook New business models could bring about new changes – but how to get them to happen? We need a change in assumptions – that unless you have a strong NEED to hold data, you should not hold that data One key could be giving data subjects the right to delete
New business models (2) Currently it is the business that decides whether data should be held, anonymised or deleted If that decision is put in the hands of the data subject, businesses would think twice before using business models that rely on the data being held Instead, they might look for ways to use the data immediately, then discard it
The right to delete Not ‘the right to be forgotten’ – no rewriting of history or censorship A change in paradigm. The assumption is that data can and should be deleted if the data subject wants it, unless there are pressing reasons the other way The right needs to be made easily applied – access to data and then the ability to delete it directly on the web A shift in the nature of data protection – putting the focus on the rights of the individual, not on the obligations of the data controllers
When can data be held? Paternalistic reasons – for the benefit of the individual (e.g. medical data) Communitarian reasons – for the benefit of the community (e.g. criminal records) Administrative or economic reasons – for the benefit of society (e.g. tax records, electoral rolls) Archival reasons – for a good, accurate and useful historical record (e.g. newspaper records, British Library ‘right to archive’) Security reasons – for national security or criminal investigations (e.g. data retention laws)
Business reasons…. 		….are not enough
Deletion and anonymisation Closely related – and complex Data can relate to more than one individual Data controllers might offer the option to anonymise rather than delete – but it should be the data subject’s option
Data protection principles The right to delete extends and improves implementation of data protection principles First point is better data access rights Second is putting data minimisation in the hand of the data subject Important to ensure that this right does not replace the data controller’s responsibility for data minimisation, but adds to it
Implications Gives individuals more control and autonomy Forces those holding data to justify why they’re holding it – in such a way that users understand Encourages the development of better business models Could end up supporting individuals even in places where data protection doesn’t apply – because the big businesses develop global business models
Human rights in the online world With our online life more and more integrated into our offline life, we need to focus on rights in the online world Those rights must include our ability to control and shape our digital footprint The right to delete data is just one of the rights that will be needed. p.a.bernal@lse.ac.uk http://personal.lse.ac.uk/bernal

Más contenido relacionado

La actualidad más candente

Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Dr. Donald Macfarlane
 

La actualidad más candente (20)

Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
Autonomy, Privacy, The Symbiotic Web
Autonomy, Privacy, The Symbiotic WebAutonomy, Privacy, The Symbiotic Web
Autonomy, Privacy, The Symbiotic Web
 
Gdpr compliance univ'air carslon wagon lit 5 oktober 2017
Gdpr compliance univ'air carslon wagon lit 5 oktober 2017Gdpr compliance univ'air carslon wagon lit 5 oktober 2017
Gdpr compliance univ'air carslon wagon lit 5 oktober 2017
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
 
Magento checklist AVG / GDPR - Algemene Verordering Gegevensbescherming
Magento checklist  AVG / GDPR - Algemene Verordering GegevensbeschermingMagento checklist  AVG / GDPR - Algemene Verordering Gegevensbescherming
Magento checklist AVG / GDPR - Algemene Verordering Gegevensbescherming
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
Privacy and data protection - Presentation for Bdma real time and trigger bas...
Privacy and data protection - Presentation for Bdma real time and trigger bas...Privacy and data protection - Presentation for Bdma real time and trigger bas...
Privacy and data protection - Presentation for Bdma real time and trigger bas...
 
Data Protection Forum Brussels 230517 - Implementing GDPR
Data Protection Forum Brussels 230517 - Implementing GDPRData Protection Forum Brussels 230517 - Implementing GDPR
Data Protection Forum Brussels 230517 - Implementing GDPR
 
Get you and your business GDPR ready
Get you and your business GDPR readyGet you and your business GDPR ready
Get you and your business GDPR ready
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer Privacy
 
Explain your algorithmic decisions for gdpr
Explain your algorithmic decisions for gdprExplain your algorithmic decisions for gdpr
Explain your algorithmic decisions for gdpr
 
Associates quick guide to gdpr v 1.0
Associates quick guide to gdpr v 1.0Associates quick guide to gdpr v 1.0
Associates quick guide to gdpr v 1.0
 
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz..."Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
 
Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)
 
GDPR Guide: The ICO's 12 Recommended Steps To Take Now
GDPR Guide: The ICO's 12 Recommended Steps To Take NowGDPR Guide: The ICO's 12 Recommended Steps To Take Now
GDPR Guide: The ICO's 12 Recommended Steps To Take Now
 
Checklist for SMEs for GDPR compliance
Checklist for SMEs for GDPR complianceChecklist for SMEs for GDPR compliance
Checklist for SMEs for GDPR compliance
 
GDPR The New Data Protection Law coming into effect May 2018. What does it me...
GDPR The New Data Protection Law coming into effect May 2018. What does it me...GDPR The New Data Protection Law coming into effect May 2018. What does it me...
GDPR The New Data Protection Law coming into effect May 2018. What does it me...
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny Leroy
 

Destacado

Media A2 Portfolio
Media A2 PortfolioMedia A2 Portfolio
Media A2 Portfolio
hugojarvis
 
Digital Scholarship powered by reflection and reflective practice through the...
Digital Scholarship powered by reflection and reflective practice through the...Digital Scholarship powered by reflection and reflective practice through the...
Digital Scholarship powered by reflection and reflective practice through the...
Judy O'Connell
 

Destacado (8)

Collaborative Consent
Collaborative ConsentCollaborative Consent
Collaborative Consent
 
Rise and Phall
Rise and PhallRise and Phall
Rise and Phall
 
The Symbiotic Web
The Symbiotic WebThe Symbiotic Web
The Symbiotic Web
 
The internet: a new frontier for human rights
The internet: a new frontier for human rightsThe internet: a new frontier for human rights
The internet: a new frontier for human rights
 
Media A2 Portfolio
Media A2 PortfolioMedia A2 Portfolio
Media A2 Portfolio
 
Digital Scholarship powered by reflection and reflective practice through the...
Digital Scholarship powered by reflection and reflective practice through the...Digital Scholarship powered by reflection and reflective practice through the...
Digital Scholarship powered by reflection and reflective practice through the...
 
The Next Big Thing is Web 3.0. Catch It If You Can
The Next Big Thing is Web 3.0. Catch It If You Can The Next Big Thing is Web 3.0. Catch It If You Can
The Next Big Thing is Web 3.0. Catch It If You Can
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
 

Similar a The right to delete

Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docxRunning Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
todd581
 
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docxRunning Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
glendar3
 
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
Pranav Godse
 

Similar a The right to delete (20)

Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docxRunning Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
 
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docxRunning Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
 
Ekwensi ACC article
Ekwensi ACC articleEkwensi ACC article
Ekwensi ACC article
 
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
 
GDPR (En) JM Tyszka
GDPR (En)  JM TyszkaGDPR (En)  JM Tyszka
GDPR (En) JM Tyszka
 
Data set module 4
Data set   module 4Data set   module 4
Data set module 4
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Big data: Bringing competition policy to the digital era – MANNE – November 2...
Big data: Bringing competition policy to the digital era – MANNE – November 2...Big data: Bringing competition policy to the digital era – MANNE – November 2...
Big data: Bringing competition policy to the digital era – MANNE – November 2...
 
Streamlining Data Privacy.pdf
Streamlining Data Privacy.pdfStreamlining Data Privacy.pdf
Streamlining Data Privacy.pdf
 
General data protection regulation
General data protection regulationGeneral data protection regulation
General data protection regulation
 
The Evolution of Data Privacy: 3 Things You Need To Consider
The Evolution of Data Privacy:  3 Things You Need To ConsiderThe Evolution of Data Privacy:  3 Things You Need To Consider
The Evolution of Data Privacy: 3 Things You Need To Consider
 
Eu data protection regulations (point-of-view)
Eu data protection regulations (point-of-view)Eu data protection regulations (point-of-view)
Eu data protection regulations (point-of-view)
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
 
A Brave New World Of Data Protection. Ready? Counting down to GDPR.
A Brave New World Of Data Protection. Ready? Counting down to GDPR. A Brave New World Of Data Protection. Ready? Counting down to GDPR.
A Brave New World Of Data Protection. Ready? Counting down to GDPR.
 

Último

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Último (20)

ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 

The right to delete

  • 1. The right to delete Paul Bernal – London School of Economics
  • 2. Personal data on the internet Massive amounts are held Current commercial models rely on it The data that is held is vulnerable – and may be increasingly so The existence and use of that data is something that concerns people – and rightly so It’s our data, isn’t it??
  • 3. The right to delete To address the existence of this data To encourage the development of business models that don’t rely on the holding of data To begin the process of putting data subjects in control of their own data
  • 4. Personal data in the new internet The Google/Facebook model Behavioural tracking Commercial data gathering The market in personal data
  • 5. Data vulnerability Physical loss – e.g. HMRC/MOD data losses Hacking Vulnerability to government action: Subpoenas, USA PATRIOT act, Data retention Swiss banking data/Chinese Google hackers Commercial vulnerability T-Mobile data-selling scandal Changes of ownership etc
  • 6. What can happen to lost data? Into the hands of criminals – nastier and better-targeted scams Into the hands of governments – used without the normal restrictions (e.g. Germany) Into the hands of less scrupulous or less controlled businesses or different jurisdictions Into the overall data morass
  • 7. What can be done? Systematic culture change – emphasis on data security More powerful, better resourced and better supported data protection systems Better use of technological protection – encryption etc More community awareness of the issue
  • 8. But there will always be problems: Human errors Human malice Technological errors Community pressures New technological and business ideas
  • 9. Data minimisation Already a principle within data protection, but one that is effectively paid only lip-service to It needs to be better enforced – both better detected and more harshly punished. Punishment for data protection breaches are generally for losses or inappropriate processing, not for failures of data minimisation Needs to be put in the hands of the data subjects
  • 10. New business models (1) The drive behind the current web model has been the business concepts of Google and Facebook New business models could bring about new changes – but how to get them to happen? We need a change in assumptions – that unless you have a strong NEED to hold data, you should not hold that data One key could be giving data subjects the right to delete
  • 11. New business models (2) Currently it is the business that decides whether data should be held, anonymised or deleted If that decision is put in the hands of the data subject, businesses would think twice before using business models that rely on the data being held Instead, they might look for ways to use the data immediately, then discard it
  • 12. The right to delete Not ‘the right to be forgotten’ – no rewriting of history or censorship A change in paradigm. The assumption is that data can and should be deleted if the data subject wants it, unless there are pressing reasons the other way The right needs to be made easily applied – access to data and then the ability to delete it directly on the web A shift in the nature of data protection – putting the focus on the rights of the individual, not on the obligations of the data controllers
  • 13. When can data be held? Paternalistic reasons – for the benefit of the individual (e.g. medical data) Communitarian reasons – for the benefit of the community (e.g. criminal records) Administrative or economic reasons – for the benefit of society (e.g. tax records, electoral rolls) Archival reasons – for a good, accurate and useful historical record (e.g. newspaper records, British Library ‘right to archive’) Security reasons – for national security or criminal investigations (e.g. data retention laws)
  • 15. Deletion and anonymisation Closely related – and complex Data can relate to more than one individual Data controllers might offer the option to anonymise rather than delete – but it should be the data subject’s option
  • 16. Data protection principles The right to delete extends and improves implementation of data protection principles First point is better data access rights Second is putting data minimisation in the hand of the data subject Important to ensure that this right does not replace the data controller’s responsibility for data minimisation, but adds to it
  • 17. Implications Gives individuals more control and autonomy Forces those holding data to justify why they’re holding it – in such a way that users understand Encourages the development of better business models Could end up supporting individuals even in places where data protection doesn’t apply – because the big businesses develop global business models
  • 18. Human rights in the online world With our online life more and more integrated into our offline life, we need to focus on rights in the online world Those rights must include our ability to control and shape our digital footprint The right to delete data is just one of the rights that will be needed. p.a.bernal@lse.ac.uk http://personal.lse.ac.uk/bernal