SlideShare a Scribd company logo
Analyzing the EU’s “right to be forgotten”

        Presentation by: Alyah Khan




                                Photo courtesy of Flickr CC
Client
• Analysis conducted on behalf of European
  Digital Rights (EDRi), an international
  advocacy group headquartered in Brussels,
  Belgium.

• Goal of EDRi: Protect digital civil rights in the
  information society.
Purpose of report
• Analyze the feasibility and effectiveness of
  EU’s proposed “right to be forgotten”

• Examine policy’s scope, applicability and
  potential impact on freedom of speech
EU proposes data protection reform

• January 2012: European Commission proposes
  comprehensive reform of its 1995 data protection rules.

• Reform includes several changes intended to strengthen
  online privacy rights and enhance Europe’s digital economy.

• Most controversial provision is the “right to be forgotten” –
  Focus of this report
EU perspective on personal data
              protection

                                              Viviane Reding, European
                                              Commission, said on January
                                              25:



                       Photo courtesy of AP


“The protection of personal data is a fundamental right for
all Europeans, but citizens do not always feel in full control of
their personal data. My proposals will build trust in online
services because people will be better informed about their
rights and in more control of their information.”
Perspective of EU citizens
• More than half of Europeans feel that they
  must disclose personal information if they
  want to obtain products or services.

• Yet, only 26 percent of social network users
  and 18 percent of online shoppers feel in
  complete control of their data, according to a
  2011 survey.

           Source: Citizens’ perceptions of data protection and privacy in Europe
Article 17: right to be forgotten and to
                erasure

• Policy is laid out in Section 3, Article 17 of the
  EU’s proposed data protection regulation.

• Right enables people to delete their data
  (text, photos, videos) if there are no
  “legitimate grounds” for retaining it.
Analysis: Scope & Applicability

– Scope of policy is too broad and could lead to
  enforcement discrepancies among countries

– Policy wrongly places “burden of proof” on users

– Policy fails to address issue of how to request erasure
  of cross-posted information with any clarity

– Responsibilities of data controllers (Facebook, Google,
  YouTube) are not clearly articulated
Analysis: Impact on Free Speech
• Rosen (2012) said “right to be forgotten”
  represents the “biggest threat to free speech in
  the coming decade.”

• EDRi also concerned right could be misused as a
  tool for censorship.

• Other scholars said the right could produce a
  “chilling effect” caused by deletion in ambiguous
  cases.
Suggested revisions
• Limit the scope of the policy so that it applies
  only to data that users have consented to.

• Define the right to be forgotten in specific terms
  by clearly articulating situations where erasure is
  appropriate.

• Explain the materials or information (i.e. the
  proof) required to request erasure.
Suggested revisions cont’d

• Address the issue of information cross-posted
  on multiple platforms and whether it is up to
  users to ensure erasure is carried out to the
  fullest extent.

• State as explicitly as possible the
  responsibilities of data controllers in terms of
  fulfilling an erasure request.
Conclusion
• By making the suggested revisions and seeking the input of
  data controllers, the policy stands a greater chance of
  succeeding in the future.

• If the “right to be forgotten” is effectively implemented
  across Europe, a new global standard will emerge for the
  protection of personal data.

• The balance of power will shift in favor of individuals.

• It remains to be seen whether other countries, such as the
  U.S., will consider a similar policy.

More Related Content

What's hot

AI and Legal Tech in Context: Privacy and Security Commons
AI and Legal Tech in Context: Privacy and Security CommonsAI and Legal Tech in Context: Privacy and Security Commons
AI and Legal Tech in Context: Privacy and Security Commons
professormadison
 
Internet ecosystem and the internet
Internet ecosystem and the internetInternet ecosystem and the internet
Internet ecosystem and the internet
Shreedeep Rayamajhi
 
Unesco paris-2011
Unesco paris-2011Unesco paris-2011
Net Neutrality: how its elimination might impact patients & healthcare
Net Neutrality:how its elimination might impact patients & healthcareNet Neutrality:how its elimination might impact patients & healthcare
Net Neutrality: how its elimination might impact patients & healthcare
KR_Barker
 
ICT for Governance
 ICT for Governance ICT for Governance
Lesson 9 interactive media (1)
Lesson 9  interactive media (1)Lesson 9  interactive media (1)
Lesson 9 interactive media (1)
Helen Bruce
 
Offdata: a prosumer law agency to govern big data in the public interest
Offdata:  a prosumer law agency to govern big data in the public interestOffdata:  a prosumer law agency to govern big data in the public interest
Offdata: a prosumer law agency to govern big data in the public interest
Chris Marsden
 
Module 7: ICT and Social Responsibilities
Module 7: ICT and Social ResponsibilitiesModule 7: ICT and Social Responsibilities
Module 7: ICT and Social Responsibilities
KatherineGarcia94
 
CILIP Policy Seminar - Privacy & the library & information sectors
CILIP Policy Seminar - Privacy & the library & information sectorsCILIP Policy Seminar - Privacy & the library & information sectors
CILIP Policy Seminar - Privacy & the library & information sectors
CILIP
 
Wsis unesco-2015
Wsis unesco-2015Wsis unesco-2015
Social media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacySocial media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacy
Yasmin AbdelAziz
 
Ann Ox09 Presentation
Ann Ox09 PresentationAnn Ox09 Presentation
Ann Ox09 Presentation
Heather Blanchard
 
Techinnovation
TechinnovationTechinnovation
Techinnovation
Jeffrey Hart
 
Freedom of Connection – Freedom of Expression: The Future Internet in the Lar...
Freedom of Connection – Freedom of Expression: The Future Internet in the Lar...Freedom of Connection – Freedom of Expression: The Future Internet in the Lar...
Freedom of Connection – Freedom of Expression: The Future Internet in the Lar...
ictseserv
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
blogzilla
 
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Oxford Martin Centre, OII, and Computer Science at the University of Oxford
 
Internet Governance and Open Source Software
Internet Governance and Open Source SoftwareInternet Governance and Open Source Software
Internet Governance and Open Source Software
Seaparo Phala
 
Data Protection and Academia: Fundamental Rights in Conflict
Data Protection and Academia: Fundamental Rights in ConflictData Protection and Academia: Fundamental Rights in Conflict
Data Protection and Academia: Fundamental Rights in Conflict
David Erdos
 
Net neutrality
Net neutralityNet neutrality
Net neutrality
DivyanshuTyagi8
 
Canary in the coal mine: how Internet regulation leads
Canary in the coal mine: how Internet regulation leadsCanary in the coal mine: how Internet regulation leads
Canary in the coal mine: how Internet regulation leads
Chris Marsden
 

What's hot (20)

AI and Legal Tech in Context: Privacy and Security Commons
AI and Legal Tech in Context: Privacy and Security CommonsAI and Legal Tech in Context: Privacy and Security Commons
AI and Legal Tech in Context: Privacy and Security Commons
 
Internet ecosystem and the internet
Internet ecosystem and the internetInternet ecosystem and the internet
Internet ecosystem and the internet
 
Unesco paris-2011
Unesco paris-2011Unesco paris-2011
Unesco paris-2011
 
Net Neutrality: how its elimination might impact patients & healthcare
Net Neutrality:how its elimination might impact patients & healthcareNet Neutrality:how its elimination might impact patients & healthcare
Net Neutrality: how its elimination might impact patients & healthcare
 
ICT for Governance
 ICT for Governance ICT for Governance
ICT for Governance
 
Lesson 9 interactive media (1)
Lesson 9  interactive media (1)Lesson 9  interactive media (1)
Lesson 9 interactive media (1)
 
Offdata: a prosumer law agency to govern big data in the public interest
Offdata:  a prosumer law agency to govern big data in the public interestOffdata:  a prosumer law agency to govern big data in the public interest
Offdata: a prosumer law agency to govern big data in the public interest
 
Module 7: ICT and Social Responsibilities
Module 7: ICT and Social ResponsibilitiesModule 7: ICT and Social Responsibilities
Module 7: ICT and Social Responsibilities
 
CILIP Policy Seminar - Privacy & the library & information sectors
CILIP Policy Seminar - Privacy & the library & information sectorsCILIP Policy Seminar - Privacy & the library & information sectors
CILIP Policy Seminar - Privacy & the library & information sectors
 
Wsis unesco-2015
Wsis unesco-2015Wsis unesco-2015
Wsis unesco-2015
 
Social media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacySocial media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacy
 
Ann Ox09 Presentation
Ann Ox09 PresentationAnn Ox09 Presentation
Ann Ox09 Presentation
 
Techinnovation
TechinnovationTechinnovation
Techinnovation
 
Freedom of Connection – Freedom of Expression: The Future Internet in the Lar...
Freedom of Connection – Freedom of Expression: The Future Internet in the Lar...Freedom of Connection – Freedom of Expression: The Future Internet in the Lar...
Freedom of Connection – Freedom of Expression: The Future Internet in the Lar...
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
 
Internet Governance and Open Source Software
Internet Governance and Open Source SoftwareInternet Governance and Open Source Software
Internet Governance and Open Source Software
 
Data Protection and Academia: Fundamental Rights in Conflict
Data Protection and Academia: Fundamental Rights in ConflictData Protection and Academia: Fundamental Rights in Conflict
Data Protection and Academia: Fundamental Rights in Conflict
 
Net neutrality
Net neutralityNet neutrality
Net neutrality
 
Canary in the coal mine: how Internet regulation leads
Canary in the coal mine: how Internet regulation leadsCanary in the coal mine: how Internet regulation leads
Canary in the coal mine: how Internet regulation leads
 

Similar to Right to be forgotten presentation

Right to be forgotten presentation
Right to be forgotten presentationRight to be forgotten presentation
Right to be forgotten presentationreporter1120
 
Data Privacy of the Internet of Things
Data Privacy of the Internet of ThingsData Privacy of the Internet of Things
Data Privacy of the Internet of Things
mabualsh
 
Right to be forgotten final paper
Right to be forgotten final paperRight to be forgotten final paper
Right to be forgotten final paperreporter1120
 
Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics' Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics'
Axon Lawyers
 
PLA Legal aspects of Big Data analytics final
PLA Legal aspects of Big Data analytics finalPLA Legal aspects of Big Data analytics final
PLA Legal aspects of Big Data analytics finalSofie van der Meulen
 
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
e-SIDES.eu
 
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
IDC4EU
 
GCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxGCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptx
MuhammadAbdullah311866
 
DAY 1_ITEM 4_Privacy and personal data protection.ppt
DAY 1_ITEM 4_Privacy and personal data protection.pptDAY 1_ITEM 4_Privacy and personal data protection.ppt
DAY 1_ITEM 4_Privacy and personal data protection.ppt
GmvViju1
 
DAY 1_ITEM 4_Privacy and personal data protection.pptx
DAY 1_ITEM 4_Privacy and personal data protection.pptxDAY 1_ITEM 4_Privacy and personal data protection.pptx
DAY 1_ITEM 4_Privacy and personal data protection.pptx
MekanSaipov
 
Presentatie Giorgos Rossides, Europese Commissie
Presentatie Giorgos Rossides, Europese CommissiePresentatie Giorgos Rossides, Europese Commissie
Presentatie Giorgos Rossides, Europese CommissieEuropadialoog
 
[REPORT PREVIEW] GDPR Beyond May 25, 2018
[REPORT PREVIEW] GDPR Beyond May 25, 2018[REPORT PREVIEW] GDPR Beyond May 25, 2018
[REPORT PREVIEW] GDPR Beyond May 25, 2018
Altimeter, a Prophet Company
 
"The value of a European approach to mHealth in cancer Unleashing the mHealth...
"The value of a European approach to mHealth in cancer Unleashing the mHealth..."The value of a European approach to mHealth in cancer Unleashing the mHealth...
"The value of a European approach to mHealth in cancer Unleashing the mHealth...
3GDR
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obamaLilian Edwards
 
The death of data protection
The death of data protection The death of data protection
The death of data protection
Lilian Edwards
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Irish Future Internet Forum
 
Rights to privacy and freedom of expression in public libraries: squaring the...
Rights to privacy and freedom of expression in public libraries: squaring the...Rights to privacy and freedom of expression in public libraries: squaring the...
Rights to privacy and freedom of expression in public libraries: squaring the...
dmcmenemy
 
Where does EU money go? Availability and quality of Open Data on the recipien...
Where does EU money go? Availability and quality of Open Data on the recipien...Where does EU money go? Availability and quality of Open Data on the recipien...
Where does EU money go? Availability and quality of Open Data on the recipien...Luigi Reggi
 
Multimedia Privacy
Multimedia PrivacyMultimedia Privacy
Multimedia Privacy
Symeon Papadopoulos
 

Similar to Right to be forgotten presentation (20)

Right to be forgotten presentation
Right to be forgotten presentationRight to be forgotten presentation
Right to be forgotten presentation
 
Data Privacy of the Internet of Things
Data Privacy of the Internet of ThingsData Privacy of the Internet of Things
Data Privacy of the Internet of Things
 
Right to be forgotten final paper
Right to be forgotten final paperRight to be forgotten final paper
Right to be forgotten final paper
 
1st draft
1st draft1st draft
1st draft
 
Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics' Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics'
 
PLA Legal aspects of Big Data analytics final
PLA Legal aspects of Big Data analytics finalPLA Legal aspects of Big Data analytics final
PLA Legal aspects of Big Data analytics final
 
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
 
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
 
GCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxGCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptx
 
DAY 1_ITEM 4_Privacy and personal data protection.ppt
DAY 1_ITEM 4_Privacy and personal data protection.pptDAY 1_ITEM 4_Privacy and personal data protection.ppt
DAY 1_ITEM 4_Privacy and personal data protection.ppt
 
DAY 1_ITEM 4_Privacy and personal data protection.pptx
DAY 1_ITEM 4_Privacy and personal data protection.pptxDAY 1_ITEM 4_Privacy and personal data protection.pptx
DAY 1_ITEM 4_Privacy and personal data protection.pptx
 
Presentatie Giorgos Rossides, Europese Commissie
Presentatie Giorgos Rossides, Europese CommissiePresentatie Giorgos Rossides, Europese Commissie
Presentatie Giorgos Rossides, Europese Commissie
 
[REPORT PREVIEW] GDPR Beyond May 25, 2018
[REPORT PREVIEW] GDPR Beyond May 25, 2018[REPORT PREVIEW] GDPR Beyond May 25, 2018
[REPORT PREVIEW] GDPR Beyond May 25, 2018
 
"The value of a European approach to mHealth in cancer Unleashing the mHealth...
"The value of a European approach to mHealth in cancer Unleashing the mHealth..."The value of a European approach to mHealth in cancer Unleashing the mHealth...
"The value of a European approach to mHealth in cancer Unleashing the mHealth...
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obama
 
The death of data protection
The death of data protection The death of data protection
The death of data protection
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
 
Rights to privacy and freedom of expression in public libraries: squaring the...
Rights to privacy and freedom of expression in public libraries: squaring the...Rights to privacy and freedom of expression in public libraries: squaring the...
Rights to privacy and freedom of expression in public libraries: squaring the...
 
Where does EU money go? Availability and quality of Open Data on the recipien...
Where does EU money go? Availability and quality of Open Data on the recipien...Where does EU money go? Availability and quality of Open Data on the recipien...
Where does EU money go? Availability and quality of Open Data on the recipien...
 
Multimedia Privacy
Multimedia PrivacyMultimedia Privacy
Multimedia Privacy
 

Recently uploaded

By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 

Right to be forgotten presentation

  • 1. Analyzing the EU’s “right to be forgotten” Presentation by: Alyah Khan Photo courtesy of Flickr CC
  • 2. Client • Analysis conducted on behalf of European Digital Rights (EDRi), an international advocacy group headquartered in Brussels, Belgium. • Goal of EDRi: Protect digital civil rights in the information society.
  • 3. Purpose of report • Analyze the feasibility and effectiveness of EU’s proposed “right to be forgotten” • Examine policy’s scope, applicability and potential impact on freedom of speech
  • 4. EU proposes data protection reform • January 2012: European Commission proposes comprehensive reform of its 1995 data protection rules. • Reform includes several changes intended to strengthen online privacy rights and enhance Europe’s digital economy. • Most controversial provision is the “right to be forgotten” – Focus of this report
  • 5. EU perspective on personal data protection Viviane Reding, European Commission, said on January 25: Photo courtesy of AP “The protection of personal data is a fundamental right for all Europeans, but citizens do not always feel in full control of their personal data. My proposals will build trust in online services because people will be better informed about their rights and in more control of their information.”
  • 6. Perspective of EU citizens • More than half of Europeans feel that they must disclose personal information if they want to obtain products or services. • Yet, only 26 percent of social network users and 18 percent of online shoppers feel in complete control of their data, according to a 2011 survey. Source: Citizens’ perceptions of data protection and privacy in Europe
  • 7. Article 17: right to be forgotten and to erasure • Policy is laid out in Section 3, Article 17 of the EU’s proposed data protection regulation. • Right enables people to delete their data (text, photos, videos) if there are no “legitimate grounds” for retaining it.
  • 8. Analysis: Scope & Applicability – Scope of policy is too broad and could lead to enforcement discrepancies among countries – Policy wrongly places “burden of proof” on users – Policy fails to address issue of how to request erasure of cross-posted information with any clarity – Responsibilities of data controllers (Facebook, Google, YouTube) are not clearly articulated
  • 9. Analysis: Impact on Free Speech • Rosen (2012) said “right to be forgotten” represents the “biggest threat to free speech in the coming decade.” • EDRi also concerned right could be misused as a tool for censorship. • Other scholars said the right could produce a “chilling effect” caused by deletion in ambiguous cases.
  • 10. Suggested revisions • Limit the scope of the policy so that it applies only to data that users have consented to. • Define the right to be forgotten in specific terms by clearly articulating situations where erasure is appropriate. • Explain the materials or information (i.e. the proof) required to request erasure.
  • 11. Suggested revisions cont’d • Address the issue of information cross-posted on multiple platforms and whether it is up to users to ensure erasure is carried out to the fullest extent. • State as explicitly as possible the responsibilities of data controllers in terms of fulfilling an erasure request.
  • 12. Conclusion • By making the suggested revisions and seeking the input of data controllers, the policy stands a greater chance of succeeding in the future. • If the “right to be forgotten” is effectively implemented across Europe, a new global standard will emerge for the protection of personal data. • The balance of power will shift in favor of individuals. • It remains to be seen whether other countries, such as the U.S., will consider a similar policy.