CompTIA Security+ Exam Notes

CompTIA Security+ Exam Notes
Let Us Help You Pass

Saturday, February 1, 2025

GDPR "Right to Be Forgotten": Controlling Your Online Data

 Right to be Forgotten

The GDPR's "right to be forgotten," also known as the "right to erasure," is a legal provision within the General Data Protection Regulation (GDPR) that allows individuals to request that organizations delete their personal data under certain circumstances. This essentially gives individuals the power to control how much of their personal information is stored and accessible online, particularly when that information is no longer relevant or necessary for the intended purpose. However, this right is not absolute and only applies when specific conditions are met. 

Key points about the right to be forgotten:

Article 17 of GDPR: This article outlines the specifics of the right to be forgotten, detailing when an individual can request data deletion.
 
When it applies:
  • No longer necessary for processing: If the personal data is no longer needed for the original purpose for which it was collected. 
  • Withdrawal of consent: When an individual withdraws consent to data processing and there is no other legal basis for storing the data. 
  • Objection to processing: If an individual objects to the processing of their data and there are no overriding legitimate reasons for retaining it. 
  • Illegal processing: If the data was processed unlawfully. 
Limitations:
  • Public interest exceptions: The right to be forgotten may not apply if the data is necessary for exercising freedom of expression, for journalistic purposes, or for historical research. 
  • Legal obligation: If the organization is legally required to retain the data, it cannot be deleted. 
  • Data anonymization: If the data is properly anonymized, it may not be subject to a deletion request. 
How to exercise the right to be forgotten:

Submit a request: Individuals can contact the data controller (the organization holding their data) to formally request the deletion of their personal data. 

Provide details: The request should clearly specify the personal data to be deleted and the reasons why the individual believes they have the right to erasure. 

Impact on search engines:
  • "De-indexing" requests: The right to be forgotten is particularly relevant in search engines, where individuals can request that links to certain personal information be removed from search results. 
Important considerations:

Compliance obligations: Organizations must respond to a request for a right to be forgotten within a reasonable timeframe and inform the individual of their decision.

Data protection authorities: If individuals believe their requests have been wrongly denied, they can appeal to a data protection authority.

Blockchain Explained: The Future of Decentralized Networks

 Blockchain

A blockchain is a decentralized, distributed digital ledger that records transactions across a network of computers, creating an immutable record of data that is extremely difficult to tamper with, as each transaction is verified and added to a chain of blocks, with each block linked to the previous one through cryptography, making it transparent and secure for tracking assets or information across a network without a central authority; essentially, it's like a shared, constantly updating spreadsheet where everyone on the network can see the same information simultaneously, ensuring consistency and preventing fraud. 

Key points about blockchain:
  • Distributed ledger: Unlike traditional databases, blockchain data is not stored in a single location but is replicated across multiple computers on the network, which means no single entity controls the data. 
  • Blocks: Information is grouped into "blocks" that contain transaction data, a timestamp, and a cryptographic hash of the previous block, creating a chain where each block is linked to the one before it. 
  • Cryptographic Hashing: Each block is assigned a unique cryptographic hash, which acts as a digital fingerprint. This ensures that any modification to the block data results in a completely different hash, making it easily detectable. 
  • Consensus mechanism: To add a new block to the chain, a consensus must be reached among the network nodes, validating the transaction data and ensuring its accuracy. 
  • Immutability: Once a block is added to the chain, it cannot be altered retroactively without changing all subsequent blocks, which requires the agreement of the entire network, making the data unchangeable. 
How blockchain works:
  • Transaction initiation: A new transaction is initiated by a user on the network. 
  • Validation: The transaction is verified by network nodes, which check its legitimacy and ensure it follows the established rules. 
  • Block creation: Validated transactions are grouped together into a block. 
  • Hashing: The block is assigned a unique cryptographic hash linked to the previous block's hash. 
  • Consensus building: The network reaches consensus on the block's validity through a consensus mechanism like Proof of Work (PoW) or Proof of Stake (PoS). 
  • Block addition: Once verified, the new block is added to the blockchain, updating the shared ledger across all network nodes. 
Applications of blockchain technology:
  • Cryptocurrency: Bitcoin is the most well-known blockchain application, allowing for secure and decentralized digital currency transactions. 
  • Supply chain management: Tracking the movement of goods throughout the supply chain, ensuring transparency and preventing counterfeiting. 
  • Smart contracts: Self-executing contracts with terms directly written into lines of code on the blockchain. 
  • Digital identity verification: Securely storing and managing digital identities. 
  • Healthcare data management: Protecting patient data privacy and ensuring data integrity.