• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Cybersecurity Tips  /  Right to Be Forgotten – When It Applies & When It Doesn’t
Right to Be Forgotten – When It Applies & When It Doesn’t
09 April 2019

Right to Be Forgotten – When It Applies & When It Doesn’t

Written by Ankita Ashesh
Ankita Ashesh
Cybersecurity Tips
8
Shares

One of the most complex topics in the European Union’s landmark General Data Protection Regulation (GDPR) is the Right to be Forgotten, also known as the Right to Erasure. On the outset, the concept seems simple – individuals can request for their personally identifiable data to be removed if they have provided it to a data controller, hence they can be “forgotten”.

But, in a world of connected data where information is shared across servers, people, territories and what not, the Right to be Forgotten is a complex regulation which has many enterprises tripping up after the implementation of GDPR. While the moral and philosophical effects of this rule are for a different topic, this article tries to understand this right and explain where and when it applies.

The role of personal data

The first point to keep in mind is that this is not an absolute right. The Right to Erasure or Right to be Forgotten is provided to all individuals but only if they meet certain specifications. As the specific Article 17 of the GDPR regulation says:

The data subject shall have the right to obtain from the controller the erasure of personal data concerning him or her without undue delay and the controller shall have the obligation to erase personal data without undue delay where one of the following grounds applies:

  1. the personal data are no longer necessary in relation to the purposes for which they were collected or otherwise processed;
  2. the data subject withdraws consent on which the processing is based according to point (a) of Article 6(1), or point (a) of Article 9(2), and where there is no other legal ground for the processing;
  3. the data subject objects to the processing pursuant to Article 21(1) and there are no overriding legitimate grounds for the processing, or the data subject objects to the processing pursuant to Article 21(2);
  4. the personal data have been unlawfully processed;
  5. the personal data have to be erased for compliance with a legal obligation in Union or Member State law to which the controller is subject;
  6. the personal data have been collected in relation to the offer of information society services referred to in Article 8(1).

The criteria to meet

This makes it clear that an individual cannot randomly request to be forgotten. They must fit some of the criteria – i.e. their personal data is no longer necessary in relation to the reason for its collection, the consent has been withdrawn, etc. This is a point which enterprises must keep in mind when considering the right to be forgotten requests.

Furthermore, the same article also makes it clear that enterprises do not have to comply with the request in case of the following circumstances:

  • for exercising the right of freedom of expression and information
  • for compliance with legal obligations
  • for reasons of public interest in the area of public health
  • for archiving purposes in the public interest, scientific or historical research purposes or statistical purposes
  • for the establishment, exercise or defense of legal claims.

Hence while enterprises must comply with GDPR requirements which also involved compliance with a user’s right to be forgotten, they must also work according to the clauses provided in the article. It is important that there is recognition that GDPR is more than just security compliance; it is a regulation with both legal and social consequences.

 Previous PostJCry – A Ransomware written in Golang!
Next Post  Seqrite MobiSMART for GDPR Compliance
Ankita Ashesh

About Ankita Ashesh

...

Articles by Ankita Ashesh »

Related Posts

  • Threat Actors are Targeting US Tax-Session with new Tactics of Stealerium-infostealer

    April 30, 2025
  • Advisory: Pahalgam Attack themed decoys used by APT36 to target the Indian Government

    April 30, 2025
  • Zero Trust Best Practices for Enterprises and Small Businesses

    April 28, 2025
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies