Right to Erasure ('Right to be Forgotten')
Also known as:
1. Overview
Right to Erasure (‘Right to be Forgotten’) is a pattern for building resilient value creation systems.
Problem: Personal data is often kept by organizations indefinitely, even long after the original purpose for its collection has expired. This increases the risk of the data being breached, misused, or becoming inaccurate. Users have little control over their digital footprint and find it difficult to have their old, irrelevant, or sensitive data removed from systems.
Context: You are an organization that collects and processes personal data. You need to provide a mechanism for users to request the deletion of their data and to ensure that this deletion is carried out completely and securely, in compliance with legal obligations like the GDPR.
2. Core Principles
Implement a robust process for handling Right to Erasure requests. This involves both a user-facing interface and a comprehensive backend process.
- Request Intake: Provide a clear and accessible way for users to submit a deletion request (e.g., through their account settings or a dedicated privacy portal).
- Identity Verification: Securely verify the identity of the person making the request to prevent malicious or fraudulent deletions.
- Request Validation: Determine if the request is valid and if there are any legal grounds for retaining the data (e.g., for compliance with a legal obligation, for the establishment or defense of legal claims).
- Data Deletion: If the request is valid, permanently and securely delete the user’s personal data from all systems, including production databases, logs, backups, and third-party services.
- Confirmation: Inform the user that their request has been completed.
This process must be well-documented and auditable.
3. Rationale
The Right to Erasure is a fundamental data protection right that gives individuals control over their personal information. Implementing this pattern:
- Empowers Users: Gives individuals agency over their digital footprint.
- Reduces Risk: Minimizes the amount of data your organization holds, thereby reducing the attack surface and the potential impact of a data breach (in line with Data Minimization, P001).
- Ensures Compliance: It is a legal requirement under GDPR (Article 17) and other data protection laws.
- Builds Trust: Demonstrates respect for user privacy and a commitment to responsible data stewardship.
4. Consequences
- Positive:
- Increased user trust.
- Compliance with fundamental data protection principles.
- A reduced data footprint for the organization.
- Negative:
- Technical Complexity: Completely and permanently deleting all instances of a user’s data from complex, distributed systems (especially backups and logs) can be extremely challenging.
- Operational Burden: Requires a well-defined and resourced operational process to handle requests in a timely manner.
- Potential for Abuse: The process can be abused by malicious actors to harass others or to try to erase legitimate records.
5. Application Context
Best Used For:
- Value creation systems requiring strong privacy and security foundations
- Organizations operating in regulated environments
- Systems handling sensitive data or requiring high trust
6. Known Uses
- All major online platforms (e.g., Google, Facebook, Twitter) provide mechanisms for users to delete their accounts and associated data.
- It is a standard feature of any service that is compliant with GDPR.