Print

Print


Dear all

 

Has anyone yet worked out how they might, or whether it is even possible to, demonstrate compliance with an individual’s request to be erased? What evidence could be given to the requester to prove that they no longer existed (as far as you need to delete them) within your company’s systems?

 

Is it a matter of trust?

 

Kind regards

Christine

 

Royal Holloway, University of London


All archives of messages are stored permanently and are available to the world wide web community at large at http://www.jiscmail.ac.uk/lists/data-protection.html

Selected commands (the command has been filled in below in the body of the email if you are receiving emails in HTML format):

All user commands can be found at https://www.jiscmail.ac.uk/help/subscribers/subscribercommands.html and are sent in the body of an otherwise blank email to [log in to unmask]

Any queries about sending or receiving messages please send to the list owner [log in to unmask]

(Please send all commands to [log in to unmask] not the list or the moderators, and all requests for technical help to [log in to unmask], the general office helpline)