What is the Right to erasure – right to be forgotten?

What is the Right to Erasure (‘right to be forgotten’) of the EU GDPR?

 

The fast approaching General Data Protection Regulations (GDPR) of the European Union is the most comprehensive set of laws to hit the world of data technology.

GDPR is unique not only in the broad range of areas it regulates, but also in the high bar it sets for dealing with personal data.

Perhaps the most demanding requirement of GDPR in regards to personal information storage is the setting into law of the right to erasure, otherwise known as, the right to be forgotten.   Article 17 of the Regulations lays out a list of reasons for which individuals can demand from a company to delete all their personal data contained on enterprise systems. These reasons include:

  • The personal data have been unlawfully processed
  • The reasons for the data’s collection is no longer relevant
  • The information has to be erased to comply with another legal obligation of the subject
  • An individual issues a claim objecting to the legal grounds for the data’s initial collection

The Need for System-Wide Control

What does this mean for organizations seeking to achieve compliance with GDPR?

Simply put, organizations will require the capability of identifying all data pertaining to European Union citizens contained in their systems.

The need for this requirement is further compounded when considering that most of the reasons requiring a company to erase data are dependent on the personal preference of the subject. Even an individual withdrawing consent for data containment can in many cases be grounds for invoking the right to be forgotten.

How can enterprises prepare themselves for abiding by these requirements laid out in the soon-to-be codified GDPR?

Gain an Edge with Compliance

Organizations will require a solution that can accurately locate, categorize, and classify the wide array of company data types. In this way, businesses will be able to comply with client demands for the right to be forgotten when they arise.

GTB’s smart solutions, based on artificially intelligent algorithms, provide the strongest tools in data loss protection (DLP).  They allow companies to stay in control of all their data, whether they be located on company systems or in the cloud, at rest or in motion, giving organizations the edge in achieving seamless compliance with the even the most demanding regulation.

adroll_adv_id = “UIOFH72HVBDSPBBLAJUZE6”;
adroll_pix_id = “HNO2CUNA4BAINCHLEPH2JH”;
/* OPTIONAL: provide email to improve user identification */
/* adroll_email = “username@example.com”; */
(function () {
var _onload = function(){
if (document.readyState && !/loaded|complete/.test(document.readyState)){setTimeout(_onload, 10);return}
if (!window.__adroll_loaded){__adroll_loaded=true;setTimeout(_onload, 50);return}
var scr = document.createElement(“script”);
var host = ((“https:” == document.location.protocol) ? “https://s.adroll.com” : “http://a.adroll.com”);
scr.setAttribute(‘async’, ‘true’);
scr.type = “text/javascript”;
scr.src = host + “/j/roundtrip.js”;
((document.getElementsByTagName(‘head’) || [null])[0] ||
document.getElementsByTagName(‘script’)[0].parentNode).appendChild(scr);
};
if (window.addEventListener) {window.addEventListener(‘load’, _onload, false);}
else {window.attachEvent(‘onload’, _onload)}
}());

_linkedin_data_partner_id = “320828”;

(function(){var s = document.getElementsByTagName(“script”)[0];
var b = document.createElement(“script”);
b.type = “text/javascript”;b.async = true;
b.src = “https://snap.licdn.com/li.lms-analytics/insight.min.js”;
s.parentNode.insertBefore(b, s);})();

Visibility: Accurately, discover sensitive data; detect and address broken business process, or insider threats including sensitive data breach attempts.

Protection: Automate data protection, breach prevention and incident response both on and off the network; for example, find and quarantine sensitive data within files exposed on user workstations, FileShares and cloud storage.

Notification: Alert and educate users on violations to raise awareness and educate the end user about cybersecurity and corporate policies.

Education: Start target cyber-security training; e.g., identify end-users violating policies and train them.

  • Employees and organizations have knowledge and control of the information leaving the organization, where it is being sent, and where it is being preserved.
  • Ability to allow user classification to give them influence in how the data they produce is controlled, which increases protection and end-user adoption.
  • Control your data across your entire domain in one Central Management Dashboard with Universal policies.
  • Many levels of control together with the ability to warn end-users of possible non-compliant – risky activities, protecting from malicious insiders and human error.
  • Full data discovery collection detects sensitive data anywhere it is stored, and provides strong classification, watermarking, and other controls.
  • Delivers full technical controls on who can copy what data, to what devices, what can be printed, and/or watermarked.
  • Integrate with GRC workflows.
  • Reduce the risk of fines and non-compliance.
  • Protect intellectual property and corporate assets.
  • Ensure compliance within industry, regulatory, and corporate policy.
  • Ability to enforce boundaries and control what types of sensitive information can flow where.
  • Control data flow to third parties and between business units.