2020
DOI: 10.1007/978-3-030-45724-2_13
|View full text |Cite
|
Sign up to set email alerts
|

Formalizing Data Deletion in the Context of the Right to Be Forgotten

Abstract: The right of an individual to request the deletion of their personal data by an entity that might be storing it – referred to as the right to be forgotten – has been explicitly recognized, legislated, and exercised in several jurisdictions across the world, including the European Union, Argentina, and California. However, much of the discussion surrounding this right offers only an intuitive notion of what it means for it to be fulfilled – of what it means for such personal data to be de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
81
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 48 publications
(81 citation statements)
references
References 20 publications
0
81
0
Order By: Relevance
“…The present work continues this vein of research in the context of the "right to be forgotten", that was recently pioneered by Garg, Goldwasser, and Vasudevan [GGV20]. They have defined a notion of deletion-compliance that sets formal guidelines for service providers -that we will hereby refer to as data-collectors -to satisfy in order to comply with data deletion requests in accordance with the law.…”
Section: Introductionmentioning
confidence: 72%
See 2 more Smart Citations
“…The present work continues this vein of research in the context of the "right to be forgotten", that was recently pioneered by Garg, Goldwasser, and Vasudevan [GGV20]. They have defined a notion of deletion-compliance that sets formal guidelines for service providers -that we will hereby refer to as data-collectors -to satisfy in order to comply with data deletion requests in accordance with the law.…”
Section: Introductionmentioning
confidence: 72%
“…Deletion-compliance is not in itself a formal representation of a law, but rather a sufficient criteria to comply with the spirit of the law. In the formalism of [GGV20], a data-collector X interacts with two other entities: the deletion-requester Y that represents the set of users that request deletion of their data, and the environment Z that represents other users and any other entity. Interactions with the data-collector are described via a protocol π to which is associated a corresponding deletion protocol π D .…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, the work in [16] presents a statistical formulation of data deletion from machine learning similar to differential privacy and describes a method to achieve deletion in linear and logistic regression scenarios. A formulation of data deletion problems using cryptographic notations is presented in [17] with a brief discussion on deletion in ML models. Other works on statistical unlearning are also presented in [18]- [21].…”
Section: B Related Workmentioning
confidence: 99%
“…Third-party services can use data both for legitimate and non-legitimate purposes, and an aggressive sharing of data increases the probability of non-legitimate uses. Examples of non-legitimate uses are unfair prices or insurance premiums, stigmatization of people and, in the worst case, the unfair punishment of people in non-honest states [ 4 ]. Furthermore, any service that stores data centrally is potentially the target of malicious attacks.…”
Section: Introductionmentioning
confidence: 99%