I have information security-related issues with the "right to be forgotten". In information security, non-repudiation is the assurance that someone cannot deny something. Systems built for non-repudiation have the ability to ensure that a party to a communication cannot deny the sending of a message that they originated.
It seems to me that the "right to be forgotten" circumvents that ability. For example someone posts racist or sexist jokes on twitter, they get called out for it, and the tweets get embedded into my blog or a major news website that is writing about the incident. With the right to be forgotten rule if the tweets are deleted then mine and all website referencing the incident would lose the proof the incident occurred. And if the tweet information was instead copied to my website or the new sites via the Twitter API, we would be on the hook to remove "the evidence".
Perhaps the lawyers who wrote up the GDPR spoke to information scientist and they have some clever way to handle non-repudiation of negative incidents but from the surface, the right to be forgotten seems problematic. Shall I have to resort to taking screenshots?
Then there is the issue of how the GDPR defines personal information; IP addresses are considered personal information. I think many network security analyst and forensics analysts are going to be panicked thinking about how they are going to an analysis of traffic flows during an investigation when the personal information has been scrubbed or deleted from logs. Data security standards such as PCI DSS which require the retention of at least a year of the network, web server, computer systems and applications logs so that the details of a data breach can be analysed for determination of cause and attribution.
I want to stay positive about all of this. For all the organizations large and small -- especially local businesses with a web presence -- that are working on solutions to meet the GDPR law and its implications, but don’t have the in-house talent, one of the first places to start is to begin classifying data. The next step would be to fingerprint and uniquely identify every user’s “critical” data and encrypt it. You may no longer be able to allow anonymity.
Copy to IndieWeb News.