• Corpus ID: 56058892

Three years of the Right to be Forgotten

  title={Three years of the Right to be Forgotten},
  author={Theo Bertram and Elie Bursztein and Stephanie Caro and Hubert Chao and Rutledge Chin Feman and Peter Fleischer and Albin Gustafsson and Jess Hemerly and Chris Hibbert and Luca Invernizzi and Lanah Kammourieh Donnelly and Jason Ketover and Jay Laefer and Paul Nicholas and Yuan Niu and Harjinder Obhi and David Price and Andrew Strait and Kurt Thomas and Alain Verney},
The “Right to be Forgotten” is a privacy ruling that enables Europeans to delist certain URLs appearing in search results related to their name. In order to illuminate the effect this ruling has on information access, we conduct a retrospective measurement study of 2.4 million URLs that were requested for delisting from Google Search over the last three and a half years. We analyze the countries and anonymized parties generating the largest volume of requests; the news, government, social media… 
Disordered Punishment: Workaround Technologies of Criminal Records Disclosure and the Rise of a New Penal Entrepreneurialism
The privatization of punishment is a well-established phenomenon in modern criminal justice operations. Less understood are the market and technological forces that have dramatically reshaped the
Children and the ‘Right to be Forgotten’: what the right to erasure means for European children, and why Australian children should be afforded a similar right
  • A. Bunn
  • Political Science
    Media International Australia
  • 2019
This article provides an overview of the right to erasure, or the right to be forgotten, in the General Data Protection Regulation (GDPR) and how it is likely to impact on children. It contrasts the
How Design, Architecture, and Operation of Modern Systems Conflict with GDPR
This paper reviews GDPR from a system design perspective, and identifies how its regulations conflict with the design, architecture, and operation of modern systems, via the seven privacy sins.
GDPR Anti-Patterns: How Design and Operation of[0.1cm] Modern Cloud-scale Systems Conflict with GDPR
This article reviews GDPR from a systems perspective, and identifies how the design and operation of modern cloud-scale systems conflict with this regulation via six GDPR antipatterns: storing data without a clear timeline for deletion; reusing data indiscriminately; creating walled gardens and black markets.
Recht auf Vergessen
Gefahren und Grenzen einer automatisierten Entfernung of Inhalten speziell in Suchmaschinen auf werden zeigen in ihrem Beitrag.
GDPR anti-patterns
How design and operation of modern cloud-scale systems conflict with GDPR.


The Right to Be Forgotten Across the Pond
The ‘right to be forgotten’ has gained increasing traction and significant debate on both sides of the Atlantic since the popularization of Viktor Mayer-Schonberger’s 2009 book, Delete. The term has
The Right to be Forgotten in the Media: A Data-Driven Study
A data-driven approach is taken to study the RTBF in the traditional media outlets, its consequences, and its susceptibility to inference attacks, and to measure the presence (or lack of presence) of a Streisand effect.
The 'Right to be Forgotten' - Worth remembering?
The European Right to Be Forgotten
The presentation of the EU Proposal for a General Data Protection Regulation has caused a wide debate between lawyers and law scholars and many opinions have been voiced on the issue of the right to
unFriendly: Multi-party Privacy Risks in Social Networks
This paper examines how the lack of joint privacy controls over content can inadvertently reveal sensitive information about a user including preferences, relationships, conversations, and photos and presents a proof of concept application built into Facebook that automatically ensures mutually acceptable privacy restrictions are enforced on group content.
ARTICLE 29 Data Protection Working Party
At its plenary meeting on 12 and 13 July 2010, the European Data Protection Authorities (the Article 29 Working Party [WP29]) discussed the data protection and privacy implications of the
Face/Off: Preventing Privacy Leakage From Photos in Social Networks
This paper proposes to rethink access control when applied to photos, in a way that allows us to effectively prevent unwanted individuals from recognizing users in a photo, and reveals the misconceptions about the privacy offered by existing mechanisms.
Moving beyond untagging: photo privacy in a tagged world
This paper explored the needs and concerns of users, resulting in a set of design considerations for tagged photo privacy, and designed a privacy enhancing mechanism based on these findings, and validated it using a mixed methods approach.
Multiparty Access Control for Online Social Networks: Model and Mechanisms
This work forms an access control model to capture the essence of multiparty authorization requirements, along with a multiparty policy specification scheme and a policy enforcement mechanism and presents a logical representation of the model that allows for the features of existing logic solvers to perform various analysis tasks on the model.
A right to be forgotten?
The question of how much responsibility search engine operators should bear for privacy-related issues connected to search engine results is investigated.