Abstract

Are you unclear about the European Commission's 2012 draft Data Protection Regulation proposing a qualified “right to be forgotten?” That's not surprising, say Meg Ambrose and Jef Ausloos. Their in-depth analysis finds a bifurcated social and legal history, divergent conceptions of the “right,” and alternative options for implementation. They contrast a right to “oblivion” (full deletion of certain public data) with a “right to erasure” (removal of personal data provided for automated processing) and find them conflated in the “right to be forgotten” in the EU's proposed data regulation. The two should be separated, they argue, with support for the right to erasure while more study is needed on the less clear “right to oblivion.”

The text of this article is only available as a PDF.

Bibliography

Ambrose, Meg Leta, Nicole Friess, and Jill Van Matre.
“Seeking Digital Redemption: The Future of Forgiveness in the Digital Age.”
Santa Clara Computer & High Technology Law Journal
29
,
no. 1
(
2012
):
99
163
.
American Law Institute
.
Restatements of Torts, Second
.
St. Paul, Minn.
:
American Law Institute
,
1965
.
Angelo, Megan.
“You Are What Google Says You Are.”
Wired
, Feb. 11,
2009
. Accessed Feb. 13,
2013
, http://www.wired.com/business/2009/02/you-are-what-go/.
Article 29 Data Protection Working Party
.
Opinion 15/2011 on the Definition of Consent
, July 13,
2011
. Accessed Feb. 14,
2013
, http://ec.europa.eu/justice/policies/privacy/docs/wpdocs/2011/wp187_en.pdf.
Ayenson, Mika, Dietrich James Wambach, Ashkan Soltani, Nathan Good, and Chris Jay Hoofnagle.
“Flash Cookies and Privacy II: Now with HTML5 and ETag Respawning.”
White paper, July 29,
2011
. Accessed Feb. 13, 2013, http://ssrn.com/abstract=1898390.
Bendrath, Ralf and Milton Mueller.
“The End of the Net as We Know It? Deep Packet Inspection and Internet Governance.”
White paper, Aug. 4,
2010
. Accessed Feb. 13,
2013
, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1653259.
Beuth, Patrick.
“Vorratsdatenspeicherung Findet Bei Der Telekom Weiter Statt.”
Die Zeit
, Jan. 26,
2012
. Accessed Fab. 13,
2013
, http://www.zeit.de/digital/datenschutz/2012–01/malte-spitz-vorratsdatenspeicherung-lebt.
“Beware the Cookie Monster.”
The Economist
, Aug. 22,
2011
. Accessed Feb. 13,
2013
, http://www.economist.com/blogs/babbage/2011/08/online-privacy.
Brito, Jerry.
“Your Right to Be Forgotten and My Right to Speak.”
Blog post, June 7,
2012
. Accessed Feb. 13,
2013
, http://jerrybrito.org/post/24629517011/your-right-to-be-forgotten-and-my-right-to-speak.
Center for Democracy & Technology
.
Comments to the European Commission in the Matter of Consultation on the Commission's Comprehensive Approach on Personal Data Protection in the European Union
, Jan. 15,
2011
. Accessed Feb. 14,
2013
, https://www.cdt.org/files/pdfs/CDT_DPD_Comments.pdf.
“Challenges and Opportunities with Big Data: A Community White Paper Developed by Leading Researchers Across the United States.”
White paper (
2012
). Accessed Feb. 14,
2013
, http://cra.org/ccc/docs/init/bigdatawhitepaper.pdf.
Council of Europe
.
“Modernization of Convention No. 108.”
Accessed Feb, 14,
2013
, http://www.coe.int/t/dghl/standardsetting/dataprotection/modernisation_en.asp.
Daley, Suzanne.
“On Its Own, Europe Backs Web Privacy Fights.”
New York Times
, Aug. 9,
2011
. Accessed Feb. 13,
2013
, http://www.nytimes.com/2011/08/10/world/europe/10spain.html.
“EU: Spain Consults CJEU on Extent of the Right to be Forgotten.”
Data Guidance, Mar. 3,
2012
. Accessed Feb. 13,
2013
, http://www.dataguidance.com/news.asp?id=1745.
European Commission
.
“Commission Proposes a Comprehensive Reform of the Data Protection Rules,”
Jan. 25,
2012
. Accessed Feb. 14,
2013
, http://ec.europa.eu/justice/newsroom/dataprotection/news/120125_en.htm.
Findlay, Stephanie.
“Microsoft Files Emotion Monitoring Patent, Will Match Ads with User's Moods.”
The Toronto Star
, June 11,
2012
. Accessed Feb. 13,
2013
, http://www.thestar.com/business/article/1209483–microsoft-files-emotion-monitoring-patent-will-match-ads-with-user-s-moods.
Fiveash, Kelly.
“Reding's ‘Right to Be Forgotten’ Bill Polarises Euro Biz World.”
The Register
, Jan. 25,
2012
. Accessed Feb. 13,
2013
, http://www.theregister.co.uk/2012/01/25/europe_data_protection_proposal/.
Flock, Elizabeth.
“Should We Have a Right to be Forgotten Online?”
Washington Post
, April 20,
2011
. Accessed Feb. 13,
2013
, http://www.washingtonpost.com/blogs/blogpost/post/should-we-have-a-right-to-be-forgotten-online/2011/04/20/AF2iOPCE_blog.html.
Gandy, Oscar H.
The Panoptic Sort: A Political Economy of Personal Information
.
Boulder, Colo.
:
Westview
,
1993
.
Halavais, Alexander.
Search Engine Society
.
Cambridge, Mass.
;
Polity
,
2009
.
Helft, Miguel.
“Google Tightens Data Retention Policy – Again.”
New York Times
, Sept. 9,
2008
. Accessed Feb. 14,
2013
, http://bits.blogs.nytimes.com/2008/09/09/google-tightens-data-retention-policy-again/.
Hendel, John.
“In Europe, a Right to Be Forgotten Trumps the Memory of the Internet.”
The Atlantic
, Feb. 3,
2011
. Accessed Feb. 13,
2013
, http://www.theatlantic.com/technology/archive/2011/02/in-europe-a-right-to-be-forgotten-trumps-the-memory-of-the-internet/70643/.
“Hong Kong Banks Sold Personal Data: Watchdog.”
The China Post
, June 21,
2011
. Accessed Feb. 13,
2013
, http://www.chinapost.com.tw/china/local-news/hong-kong/2011/06/21/307011/Hong-Kong.htm.
Howe, Daniel C. and Helen Nissenbaum.
“Trackmenot: Resisting Surveillance in Web Search.”
In
Lessons from the Identity Trail: Anonymity, Privacy and Identity in a Networked Society
, edited by Ian Kerr, Valerie Steeves, and Carole Lucock,
417
436
.
New York
:
Oxford University Press
,
2009
.
Hunton & Williams LLP
.
“French Government Secures ‘Right to Be Forgotten’ on the Internet.”
Privacy and Information Security Law Blog, Oct. 21,
2010
. Accessed Feb. 13,
2013
, http://www.huntonprivacyblog.com/2010/10/articles/french-government-secures-right-to-be-forgotten-on-the-internet/.
International Association for Privacy Protection
.
“European Commission Sends Draft Regulation Out for Review,”
Dec. 8,
2011
. Accessed Feb. 14,
2013
, https://www.privacyassociation.org/publications/european_commission_sends_draft_regulation_out_for_review/.
Jenkins, Holman W. Jr.
“Google and the Search for the Future.”
Wall Street Journal
, Aug. 14,
2010
. Accessed Feb. 13,
2013
, http://online.wsj.com/article/SB10001424052748704901104575423294099527212.html.
Jonas, Jeff.
“Data Decommissioning – Destruction of Accountability.”
Blog post, Jan. 5,
2008
. Accessed Feb. 14,
2013
, http://jeffjonas.typepad.com/jeff_jonas/2008/01/data-decommissi.html.
Jonas, Jeff.
“Data Tethering: Managing the Echo.”
Blog post, Sept. 21,
2006
. Accessed Feb. 14,
2013
, http://jeffjonas.typepad.com/jeff_jonas/2006/09/data_tethering_.html.
Kuner, Christopher.
“The European Commission's Proposed Data Protection Regulation: A Copernican Revolution in European Data Protection Law.”
White paper, Feb. 6,
2012
. Accessed Feb. 14,
2013
, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2162781.
Markey, Congressman Ed.
“Children and Teen Online Privacy,”
unknown date. Accessed Feb. 14,
2013
, http://markey.house.gov/issues/children-and-teen-online-privacy.
Markey, Congressman Ed. Speech at EU-US Conference on Privacy and Protection of Personal Data, Washington, DC, Mar. 19,
2012
. Accessed Feb. 14,
2013
, http://www.youtube.com/watch?v=mdD07BVBZbo.
Mayer, Jonathan.
“Tracking the Trackers: Where Everybody Knows Your Username.”
The Center for Internet and Society
, Oct. 11,
2011
. Accessed Feb. 13,
2013
, http://cyberlaw.stanford.edu/node/6740.
Mayer-Schonberger, Viktor.
Delete: The Virtue of Forgetting in the Digital Age
.
Princeton, N.J.
:
Princeton University Press
,
2009
.
Millar, Jason.
“A Problem of Predictive Data Mining.”
In
Lessons from the Identity Trail: Anonymity, Privacy and Identity in a Networked Society
, edited by Ian Kerr, Valerie Steeves, and Carole Lucock,
103
119
.
New York
:
Oxford University Press
,
2009
.
“New Google's Service Raises Privacy Concerns.”
EDRi-gram
, Feb. 24,
2010
. Accessed Feb. 13,
2013
, www.edri.org/edrigram/number8.4/privacy-google-buzz-service.
Nissenbaum, Helen.
Privacy in Context: Technology, Policy, and the Integrity of Social Life
.
Stanford, Cal.
:
Stanford University Press
,
2010
.
Ohm, Paul.
“Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization.”
UCLA Law Review
57
(
2010
):
1701
1777
.
Prado, Rafael I. and Michelle R. Lacey.
“Undue Hardship in the Bankruptcy Courts: An Empirical Assessment of the Discharge of Educational Debt.”
University of Cincinnati Law Review
74
(
2005
):
405
529
.
Prosser, William L.
“Privacy.”
California Law Review
48
,
no. 3
(
1960
):
383
423
.
Reding, Viviane.
“EU Data Protection Reform and Social Media: Encouraging Citizens' Trust and Creating New Opportunities.”
Speech at the New Frontiers for Social Media Marketing conference, Paris, France, Nov. 29,
2011
. Accessed Feb. 14,
2013
, http://europa.eu/rapid/press-release_SPEECH-11–827_en.htm.
Reding, Viviane.
“Why the EU Needs New Personal Data Protection Rules.”
Speech at the European Data Protection and Privacy Conference, Brussels, Belgium, Nov. 30,
2010
. Accessed Feb. 14,
2013
, europa.eu/rapid/press-release_SPEECH-10–700_en.htm.
Reidenberg, Joel R.
“Resolving Conflicting International Data Privacy Rules in Cyberspace.”
Stanford Law Review
52
(
2000
):
1315
1376
.
Richmond, Riva.
“As ‘Like’ Buttons Spread, So Do Facebook's Tentacles.”
New York Times
, Sept. 27,
2011
. Accessed Feb. 13,
2013
, http://bits.blogs.nytimes.com/2011/09/27/as-like-buttons-spread-so-do-facebooks-tentacles.
Rosen, Jeffrey.
“The Right to Be Forgotten.”
Stanford Law Review Online
64
, Feb. 13,
2012
. Accessed Feb. 13,
2013
, http://www.stanfordlawreview.org/online/privacy-paradox/right-to-be-forgotten.
Rosen, Jeffrey.
“The Web Means the End of Forgetting.”
New York Times
, July 21,
2010
. Accessed Feb. 13,
2013
, http://www.nytimes.com/2010/07/25/magazine/25privacy-t2.html.
Rouvroy, Antoinette and Yves Poullet.
“The Right to Informational Self-Determination and the Value of Self-Development: Reassessing the Importance of Privacy for Democracy.”
In
Reinventing Data Protection?
, edited by Serge Gutwirth, Yves Poullet, Paul de Hert, Cécile de Terwangne, and Sjaak Nouwt,
45
76
.
New York
:
Springer
,
2009
.
Salkin, Allen.
“What's in a Name? Ask Google.”
New York Times
, Nov. 25,
2011
. Accessed Feb. 13,
2013
, http://www.nytimes.com/2011/11/27/fashion/google-searches-help-parents-narrow-down-baby-names.html.
Singel, Ryan.
“NetFlix Cancels Recommendation Contest after Privacy Lawsuit.”
Wired
, March 12,
2010
. Accessed Feb. 13,
2013
, http://www.wired.com/threatlevel/2010/03/netflix-cancels-contest/.
Smolla, Rodney A.
Smolla and Nimmer on Freedom of Speech
.
New York
:
Clark Boardman Callaghan
,
2010
.
Solove, Daniel J.
“Justice Scalia's Dossier: Interesting Issues about Privacy and Ethics.”
Concurring Opinions, Apr. 29,
2009
. Accessed Feb. 13,
2013
, http://www.concurringopinions.com/archives/2009/04/justice_scalias_2.html.
Solove, Daniel J.
Understanding Privacy
.
Cambridge, Mass.
:
Harvard University Press
,
2010
.
Steel, Emily and Geoffrey A. Fowler.
“Facebook in Privacy Breach.”
Wall Street Journal
, Oct. 17,
2010
. Accessed Feb. 14,
2013
, http://online.wsj.com/article/SB10001424052702304772804575558484075236968.html.
Temple, James.
“Privacy Policies That Don't Work – And Some That Might.”
Sidney Morning Herald
, Jan. 30,
2012
. Accessed Feb. 14,
2013
, http://www.smh.com.au/technology/technology-news/privacy-policies-that-dont-work-and-some-that-might-20120130–1qp4m.html.
Thierer, Adam.
“Europe's ‘Right to Be Forgotten’: Privacy as Internet Censorship.”
The Technology Liberation Front
, Jan. 23,
2012
. Accessed Feb. 13,
2013
, http://techliberation.com/2012/01/23/europes-right-to-be-forgotten-privacy-as-internet-censorship.
United States, The White House
.
National Strategy for Trusted Identities in Cyberspace, Enhancing Online Choice, Efficiency, Security, and Privacy
, Apr.
2011
. Accessed Feb. 14,
2013
, http://www.whitehouse.gov/sites/default/files/rss_viewer/NSTICstrategy_041511.pdf.
Vaas, Lisa.
“Microsoft and Yahoo Are Selling Us to Politicians, Facebook and Google Are Keeping Out of It.”
Naked Security
, June 13,
2012
. Accessed Feb. 13,
2013
, http://nakedsecurity.sophos.com/2012/06/13/microsoft-and-yahoo-are-selling-us-to-politicians-facebook-and-google-are-keeping-out-of-it/.
Van Hoboken, Joris.
“9 Reasons Why a ‘Right to Be Forgotten’ Is Really Wrong.”
Blog post
, Dec. 8,
2011
. Accessed Feb. 13,
2013
, http://www.jorisvanhoboken.nl/?m=201112.
Vinograd, Cassandra and Raphael Satter.
“Google: Didn't Delete Street View Data After All.”
The Sydney Morning Herald
, June 28,
2012
. Accessed Feb. 13,
2013
, http://news.smh.com.au/breaking-news-technology/google-didnt-delete-street-view-data-after-all-20120728–230vw.html.
Weber, Rolf H.
“The Right to Be Forgotten More Than a Pandora's Box?”
White paper (
2011
). Accessed Feb. 14, 2013, http://www.jipitec.eu/issues/jipitec-2–2-2011/3084/jipitec%202%20-%20a%20-%20weber.pdf.
Williams, Christopher.
“ISP Data Deal with Former ‘Spyware’ Boss Triggers Privacy Fears.”
The Register
, Feb. 25,
2008
. Accessed Feb. 13, 2013, http://www.theregister.co.uk/2008/02/25/phorm_isp_advertising/.
Yakowitz, Jane.
“More Bad Ideas from the E.U.”
Forbes
, Jan. 25,
2012
. Accessed Feb. 13, 2013, http://www.forbes.com/sites/kashmirhill/2012/01/25/more-bad-ideas-from-the-e-u.
Zittrain, Jonathan.
The Future of the Internet – And How to Stop It
.
Harrisonburg, Va.
:
R.R. Donnelley
,
2008
.

Author notes

*

Doctoral candidate, ATLAS Institute at the University of Colorado; fellow at CableLabs and the Harvard Berkman Center for Internet and Society.

Doctoral candidate, Interdisciplinary Center for Law and ICT (ICRI) at the University of Leuven, Belgium.

This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.