SlideShare uma empresa Scribd logo
1 de 18
The right to delete Paul Bernal – London School of Economics
Personal data on the internet Massive amounts are held Current commercial models rely on it The data that is held is vulnerable – and may be increasingly so The existence and use of that data is something that concerns people – and rightly so It’s our data, isn’t it??
The right to delete To address the existence of this data To encourage the development of business models that don’t rely on the holding of data To begin the process of putting data subjects in control of their own data
Personal data in the new internet The Google/Facebook model Behavioural tracking Commercial data gathering The market in personal data
Data vulnerability Physical loss – e.g. HMRC/MOD data losses Hacking Vulnerability to government action: Subpoenas, USA PATRIOT act, Data retention Swiss banking data/Chinese Google hackers Commercial vulnerability T-Mobile data-selling scandal Changes of ownership etc
What can happen to lost data? Into the hands of criminals – nastier and better-targeted scams Into the hands of governments – used without the normal restrictions (e.g. Germany) Into the hands of less scrupulous or less controlled businesses or different jurisdictions Into the overall data morass
What can be done? Systematic culture change – emphasis on data security More powerful, better resourced and better supported data protection systems Better use of technological protection – encryption etc More community awareness of the issue
But there will always be problems: Human errors Human malice Technological errors Community pressures New technological and business ideas
Data minimisation Already a principle within data protection, but one that is effectively paid only lip-service to It needs to be better enforced – both better detected and more harshly punished.  Punishment for data protection breaches are generally for losses or inappropriate processing, not for failures of data minimisation Needs to be put in the hands of the data subjects
New business models (1) The drive behind the current web model has been the business concepts of Google and Facebook New business models could bring about new changes – but how to get them to happen? We need a change in assumptions – that unless you have a strong NEED to hold data, you should not hold that data One key could be giving data subjects the right to delete
New business models (2) Currently it is the business that decides whether data should be held, anonymised or deleted If that decision is put in the hands of the data subject, businesses would think twice before using business models that rely on the data being held Instead, they might look for ways to use the data immediately, then discard it
The right to delete Not ‘the right to be forgotten’ – no rewriting of history or censorship A change in paradigm. The assumption is that data can and should be deleted if the data subject wants it, unless there are pressing reasons the other way The right needs to be made easily applied – access to data and then the ability to delete it directly on the web A shift in the nature of data protection – putting the focus on the rights of the individual, not on the obligations of the data controllers
When can data be held? Paternalistic reasons – for the benefit of the individual (e.g. medical data) Communitarian reasons – for the benefit of the community (e.g. criminal records) Administrative or economic reasons – for the benefit of society (e.g. tax records, electoral rolls) Archival reasons – for a good, accurate and useful historical record (e.g. newspaper records, British Library ‘right to archive’) Security reasons – for national security or criminal investigations (e.g. data retention laws)
Business reasons…. 		….are not enough
Deletion and anonymisation Closely related – and complex Data can relate to more than one individual Data controllers might offer the option to anonymise rather than delete – but it should be the data subject’s option
Data protection principles The right to delete extends and improves implementation of data protection principles First point is better data access rights Second is putting data minimisation in the hand of the data subject Important to ensure that this right does not replace the data controller’s responsibility for data minimisation, but adds to it
Implications Gives individuals more control and autonomy Forces those holding data to justify why they’re holding it – in such a way that users understand Encourages the development of better business models Could end up supporting individuals even in places where data protection doesn’t apply – because the big businesses develop global business models
Human rights in the online world With our online life more and more integrated into our offline life, we need to focus on rights in the online world Those rights must include our ability to control and shape our digital footprint The right to delete data is just one of the rights that will be needed. p.a.bernal@lse.ac.uk http://personal.lse.ac.uk/bernal

Mais conteúdo relacionado

Mais procurados

Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and PrivacyVertex Holdings
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalDr. Donald Macfarlane
 
Autonomy, Privacy, The Symbiotic Web
Autonomy, Privacy, The Symbiotic WebAutonomy, Privacy, The Symbiotic Web
Autonomy, Privacy, The Symbiotic WebPaul Bernal
 
Gdpr compliance univ'air carslon wagon lit 5 oktober 2017
Gdpr compliance univ'air carslon wagon lit 5 oktober 2017Gdpr compliance univ'air carslon wagon lit 5 oktober 2017
Gdpr compliance univ'air carslon wagon lit 5 oktober 2017Bart Van Den Brande
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by QualsysQualsys Ltd
 
Magento checklist AVG / GDPR - Algemene Verordering Gegevensbescherming
Magento checklist  AVG / GDPR - Algemene Verordering GegevensbeschermingMagento checklist  AVG / GDPR - Algemene Verordering Gegevensbescherming
Magento checklist AVG / GDPR - Algemene Verordering GegevensbeschermingErwin Otten
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsAT Internet
 
Privacy and data protection - Presentation for Bdma real time and trigger bas...
Privacy and data protection - Presentation for Bdma real time and trigger bas...Privacy and data protection - Presentation for Bdma real time and trigger bas...
Privacy and data protection - Presentation for Bdma real time and trigger bas...Bart Van Den Brande
 
Data Protection Forum Brussels 230517 - Implementing GDPR
Data Protection Forum Brussels 230517 - Implementing GDPRData Protection Forum Brussels 230517 - Implementing GDPR
Data Protection Forum Brussels 230517 - Implementing GDPRJohn M Walsh
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer PrivacyAshish Jain
 
Explain your algorithmic decisions for gdpr
Explain your algorithmic decisions for gdprExplain your algorithmic decisions for gdpr
Explain your algorithmic decisions for gdprPierre Feillet
 
Associates quick guide to gdpr v 1.0
Associates quick guide to gdpr v 1.0Associates quick guide to gdpr v 1.0
Associates quick guide to gdpr v 1.0Aaron Banham
 
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz..."Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...Cédric Laurant
 
Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Acquia
 
GDPR Guide: The ICO's 12 Recommended Steps To Take Now
GDPR Guide: The ICO's 12 Recommended Steps To Take NowGDPR Guide: The ICO's 12 Recommended Steps To Take Now
GDPR Guide: The ICO's 12 Recommended Steps To Take NowHackerOne
 
Checklist for SMEs for GDPR compliance
Checklist for SMEs for GDPR complianceChecklist for SMEs for GDPR compliance
Checklist for SMEs for GDPR complianceSarah Fox
 
GDPR The New Data Protection Law coming into effect May 2018. What does it me...
GDPR The New Data Protection Law coming into effect May 2018. What does it me...GDPR The New Data Protection Law coming into effect May 2018. What does it me...
GDPR The New Data Protection Law coming into effect May 2018. What does it me...eHealth Forum
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyThoughtworks
 

Mais procurados (20)

Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
Autonomy, Privacy, The Symbiotic Web
Autonomy, Privacy, The Symbiotic WebAutonomy, Privacy, The Symbiotic Web
Autonomy, Privacy, The Symbiotic Web
 
Gdpr compliance univ'air carslon wagon lit 5 oktober 2017
Gdpr compliance univ'air carslon wagon lit 5 oktober 2017Gdpr compliance univ'air carslon wagon lit 5 oktober 2017
Gdpr compliance univ'air carslon wagon lit 5 oktober 2017
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
 
Magento checklist AVG / GDPR - Algemene Verordering Gegevensbescherming
Magento checklist  AVG / GDPR - Algemene Verordering GegevensbeschermingMagento checklist  AVG / GDPR - Algemene Verordering Gegevensbescherming
Magento checklist AVG / GDPR - Algemene Verordering Gegevensbescherming
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
Privacy and data protection - Presentation for Bdma real time and trigger bas...
Privacy and data protection - Presentation for Bdma real time and trigger bas...Privacy and data protection - Presentation for Bdma real time and trigger bas...
Privacy and data protection - Presentation for Bdma real time and trigger bas...
 
Data Protection Forum Brussels 230517 - Implementing GDPR
Data Protection Forum Brussels 230517 - Implementing GDPRData Protection Forum Brussels 230517 - Implementing GDPR
Data Protection Forum Brussels 230517 - Implementing GDPR
 
Get you and your business GDPR ready
Get you and your business GDPR readyGet you and your business GDPR ready
Get you and your business GDPR ready
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer Privacy
 
Explain your algorithmic decisions for gdpr
Explain your algorithmic decisions for gdprExplain your algorithmic decisions for gdpr
Explain your algorithmic decisions for gdpr
 
Associates quick guide to gdpr v 1.0
Associates quick guide to gdpr v 1.0Associates quick guide to gdpr v 1.0
Associates quick guide to gdpr v 1.0
 
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz..."Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
 
Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)
 
GDPR Guide: The ICO's 12 Recommended Steps To Take Now
GDPR Guide: The ICO's 12 Recommended Steps To Take NowGDPR Guide: The ICO's 12 Recommended Steps To Take Now
GDPR Guide: The ICO's 12 Recommended Steps To Take Now
 
Checklist for SMEs for GDPR compliance
Checklist for SMEs for GDPR complianceChecklist for SMEs for GDPR compliance
Checklist for SMEs for GDPR compliance
 
GDPR The New Data Protection Law coming into effect May 2018. What does it me...
GDPR The New Data Protection Law coming into effect May 2018. What does it me...GDPR The New Data Protection Law coming into effect May 2018. What does it me...
GDPR The New Data Protection Law coming into effect May 2018. What does it me...
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny Leroy
 

Destaque

Collaborative Consent
Collaborative ConsentCollaborative Consent
Collaborative ConsentPaul Bernal
 
The Symbiotic Web
The Symbiotic WebThe Symbiotic Web
The Symbiotic WebPaul Bernal
 
The internet: a new frontier for human rights
The internet: a new frontier for human rightsThe internet: a new frontier for human rights
The internet: a new frontier for human rightsPaul Bernal
 
Media A2 Portfolio
Media A2 PortfolioMedia A2 Portfolio
Media A2 Portfoliohugojarvis
 
Digital Scholarship powered by reflection and reflective practice through the...
Digital Scholarship powered by reflection and reflective practice through the...Digital Scholarship powered by reflection and reflective practice through the...
Digital Scholarship powered by reflection and reflective practice through the...Judy O'Connell
 
The Next Big Thing is Web 3.0. Catch It If You Can
The Next Big Thing is Web 3.0. Catch It If You Can The Next Big Thing is Web 3.0. Catch It If You Can
The Next Big Thing is Web 3.0. Catch It If You Can Judy O'Connell
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsLinkedIn
 

Destaque (8)

Collaborative Consent
Collaborative ConsentCollaborative Consent
Collaborative Consent
 
Rise and Phall
Rise and PhallRise and Phall
Rise and Phall
 
The Symbiotic Web
The Symbiotic WebThe Symbiotic Web
The Symbiotic Web
 
The internet: a new frontier for human rights
The internet: a new frontier for human rightsThe internet: a new frontier for human rights
The internet: a new frontier for human rights
 
Media A2 Portfolio
Media A2 PortfolioMedia A2 Portfolio
Media A2 Portfolio
 
Digital Scholarship powered by reflection and reflective practice through the...
Digital Scholarship powered by reflection and reflective practice through the...Digital Scholarship powered by reflection and reflective practice through the...
Digital Scholarship powered by reflection and reflective practice through the...
 
The Next Big Thing is Web 3.0. Catch It If You Can
The Next Big Thing is Web 3.0. Catch It If You Can The Next Big Thing is Web 3.0. Catch It If You Can
The Next Big Thing is Web 3.0. Catch It If You Can
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
 

Semelhante a The right to delete

Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-finalDr. Donald Macfarlane
 
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docxRunning Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docxtodd581
 
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docxRunning Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docxglendar3
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...Symantec
 
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONPranav Godse
 
Data set module 4
Data set   module 4Data set   module 4
Data set module 4Data-Set
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Qualsys Ltd
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationcaniceconsulting
 
Data set Legislation
Data set LegislationData set Legislation
Data set LegislationData-Set
 
Data set Legislation
Data set LegislationData set Legislation
Data set LegislationData-Set
 
Streamlining Data Privacy.pdf
Streamlining Data Privacy.pdfStreamlining Data Privacy.pdf
Streamlining Data Privacy.pdfTEWMAGAZINE
 
General data protection regulation
General data protection regulationGeneral data protection regulation
General data protection regulationFahad Ameen
 
The Evolution of Data Privacy: 3 Things You Need To Consider
The Evolution of Data Privacy:  3 Things You Need To ConsiderThe Evolution of Data Privacy:  3 Things You Need To Consider
The Evolution of Data Privacy: 3 Things You Need To ConsiderSymantec
 
Eu data protection regulations (point-of-view)
Eu data protection regulations (point-of-view)Eu data protection regulations (point-of-view)
Eu data protection regulations (point-of-view)Gerson Trigueiros
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation Data-Set
 
A Brave New World Of Data Protection. Ready? Counting down to GDPR.
A Brave New World Of Data Protection. Ready? Counting down to GDPR. A Brave New World Of Data Protection. Ready? Counting down to GDPR.
A Brave New World Of Data Protection. Ready? Counting down to GDPR. dan hyde
 

Semelhante a The right to delete (20)

Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docxRunning Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
 
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docxRunning Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
 
Ekwensi ACC article
Ekwensi ACC articleEkwensi ACC article
Ekwensi ACC article
 
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
 
GDPR (En) JM Tyszka
GDPR (En)  JM TyszkaGDPR (En)  JM Tyszka
GDPR (En) JM Tyszka
 
Data set module 4
Data set   module 4Data set   module 4
Data set module 4
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Big data: Bringing competition policy to the digital era – MANNE – November 2...
Big data: Bringing competition policy to the digital era – MANNE – November 2...Big data: Bringing competition policy to the digital era – MANNE – November 2...
Big data: Bringing competition policy to the digital era – MANNE – November 2...
 
Streamlining Data Privacy.pdf
Streamlining Data Privacy.pdfStreamlining Data Privacy.pdf
Streamlining Data Privacy.pdf
 
General data protection regulation
General data protection regulationGeneral data protection regulation
General data protection regulation
 
The Evolution of Data Privacy: 3 Things You Need To Consider
The Evolution of Data Privacy:  3 Things You Need To ConsiderThe Evolution of Data Privacy:  3 Things You Need To Consider
The Evolution of Data Privacy: 3 Things You Need To Consider
 
Eu data protection regulations (point-of-view)
Eu data protection regulations (point-of-view)Eu data protection regulations (point-of-view)
Eu data protection regulations (point-of-view)
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
 
A Brave New World Of Data Protection. Ready? Counting down to GDPR.
A Brave New World Of Data Protection. Ready? Counting down to GDPR. A Brave New World Of Data Protection. Ready? Counting down to GDPR.
A Brave New World Of Data Protection. Ready? Counting down to GDPR.
 

Último

Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 

Último (20)

Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 

The right to delete

  • 1. The right to delete Paul Bernal – London School of Economics
  • 2. Personal data on the internet Massive amounts are held Current commercial models rely on it The data that is held is vulnerable – and may be increasingly so The existence and use of that data is something that concerns people – and rightly so It’s our data, isn’t it??
  • 3. The right to delete To address the existence of this data To encourage the development of business models that don’t rely on the holding of data To begin the process of putting data subjects in control of their own data
  • 4. Personal data in the new internet The Google/Facebook model Behavioural tracking Commercial data gathering The market in personal data
  • 5. Data vulnerability Physical loss – e.g. HMRC/MOD data losses Hacking Vulnerability to government action: Subpoenas, USA PATRIOT act, Data retention Swiss banking data/Chinese Google hackers Commercial vulnerability T-Mobile data-selling scandal Changes of ownership etc
  • 6. What can happen to lost data? Into the hands of criminals – nastier and better-targeted scams Into the hands of governments – used without the normal restrictions (e.g. Germany) Into the hands of less scrupulous or less controlled businesses or different jurisdictions Into the overall data morass
  • 7. What can be done? Systematic culture change – emphasis on data security More powerful, better resourced and better supported data protection systems Better use of technological protection – encryption etc More community awareness of the issue
  • 8. But there will always be problems: Human errors Human malice Technological errors Community pressures New technological and business ideas
  • 9. Data minimisation Already a principle within data protection, but one that is effectively paid only lip-service to It needs to be better enforced – both better detected and more harshly punished. Punishment for data protection breaches are generally for losses or inappropriate processing, not for failures of data minimisation Needs to be put in the hands of the data subjects
  • 10. New business models (1) The drive behind the current web model has been the business concepts of Google and Facebook New business models could bring about new changes – but how to get them to happen? We need a change in assumptions – that unless you have a strong NEED to hold data, you should not hold that data One key could be giving data subjects the right to delete
  • 11. New business models (2) Currently it is the business that decides whether data should be held, anonymised or deleted If that decision is put in the hands of the data subject, businesses would think twice before using business models that rely on the data being held Instead, they might look for ways to use the data immediately, then discard it
  • 12. The right to delete Not ‘the right to be forgotten’ – no rewriting of history or censorship A change in paradigm. The assumption is that data can and should be deleted if the data subject wants it, unless there are pressing reasons the other way The right needs to be made easily applied – access to data and then the ability to delete it directly on the web A shift in the nature of data protection – putting the focus on the rights of the individual, not on the obligations of the data controllers
  • 13. When can data be held? Paternalistic reasons – for the benefit of the individual (e.g. medical data) Communitarian reasons – for the benefit of the community (e.g. criminal records) Administrative or economic reasons – for the benefit of society (e.g. tax records, electoral rolls) Archival reasons – for a good, accurate and useful historical record (e.g. newspaper records, British Library ‘right to archive’) Security reasons – for national security or criminal investigations (e.g. data retention laws)
  • 15. Deletion and anonymisation Closely related – and complex Data can relate to more than one individual Data controllers might offer the option to anonymise rather than delete – but it should be the data subject’s option
  • 16. Data protection principles The right to delete extends and improves implementation of data protection principles First point is better data access rights Second is putting data minimisation in the hand of the data subject Important to ensure that this right does not replace the data controller’s responsibility for data minimisation, but adds to it
  • 17. Implications Gives individuals more control and autonomy Forces those holding data to justify why they’re holding it – in such a way that users understand Encourages the development of better business models Could end up supporting individuals even in places where data protection doesn’t apply – because the big businesses develop global business models
  • 18. Human rights in the online world With our online life more and more integrated into our offline life, we need to focus on rights in the online world Those rights must include our ability to control and shape our digital footprint The right to delete data is just one of the rights that will be needed. p.a.bernal@lse.ac.uk http://personal.lse.ac.uk/bernal