{"id":12942,"date":"2019-06-20T16:35:13","date_gmt":"2019-06-20T20:35:13","guid":{"rendered":"http:\/\/www.iri.com\/blog\/?p=12942"},"modified":"2025-03-24T16:00:36","modified_gmt":"2025-03-24T20:00:36","slug":"right-to-erasure","status":"publish","type":"post","link":"https:\/\/www.iri.com\/blog\/data-protection\/right-to-erasure\/","title":{"rendered":"How to Support the Right to be Forgotten in IRI Data Masking Tools"},"content":{"rendered":"<p><a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?qid=1528874672298&amp;uri=CELEX%3A32016R0679#d1e2606-1-1\"><span style=\"font-weight: 400;\">Article 17<\/span><\/a><span style=\"font-weight: 400;\"> of the General Data Protection Regulation (<a href=\"https:\/\/www.iri.com\/solutions\/data-masking\/gdpr\">GDPR<\/a>) stipulates the need to minimize aging data through deletion, as well as the ad hoc Right to Erasure, often referred to as the Right to be Forgotten. While the regulation specifies some requirements as to what controllers must do with data requested to be \u201cerased\u201d, it does not expressly define what the term erasure means. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The California Consumer Protection Act (<a href=\"https:\/\/www.iri.com\/solutions\/data-masking\/ccpa\">CCPA<\/a>), the Cayman Islands Data Protection Law (<a href=\"https:\/\/ombudsman.ky\/data-protection-organisation\/individual-rights\/the-right-to-stop-or-restrict-processing\">DPL<\/a>), the Digital Personal Data Protection (<a href=\"https:\/\/www.iri.com\/blog\/data-protection\/dpdpa-compliance\/\">DPDP<\/a>) Act of India, and other international data privacy laws modeled after the GDPR also have a similar provision.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This article describes methods in the IRI <\/span><a href=\"https:\/\/www.iri.com\/solutions\/data-masking\/static-data-masking\"><span style=\"font-weight: 400;\">static data masking<\/span><\/a><span style=\"font-weight: 400;\"> products that help you find, and then rectify (fix) or remove (erase), personally identifiable information (PII) in different <\/span><a href=\"https:\/\/www.iri.com\/products\/workbench\/data-sources\"><span style=\"font-weight: 400;\">data sources<\/span><\/a><span style=\"font-weight: 400;\">. All IRI \u2018shield\u2019 products are front-ended in the same Eclipse IDE called <\/span><a href=\"https:\/\/www.iri.com\/products\/workbench\"><span style=\"font-weight: 400;\">IRI Workbench<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span>In fact, it is through Workbench that data collectors and processors subject to GDPR and similar laws can:<\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">define (classify) PII specific to an individual, group, or any PII attributes in general<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">search and locate that PII in disparate sources to validate and fix it, helping comply with Article 16 (the Right to Rectification)<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">extract and provide (deliver) that data in various formats, helping comply with Article 20 (Data Portability)<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">delete or remove PII ad hoc from individual files or tables, or en masse across multiple sources through a multi-source wizard applying the erasure function to a data class; or,<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Otherwise mask or de-identify PII with other obfuscation and anonymization functions like encryption, pseudonymization, character\/blackout redaction, hashing, blurring, etc.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">There are three different product avenues for complying with the <\/span><a href=\"https:\/\/www.iri.com\/solutions\/data-masking\/gdpr\"><span style=\"font-weight: 400;\">regulation<\/span><\/a><span style=\"font-weight: 400;\"> in IRI Workbench:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">1NF structured databases and flat files through <\/span><a href=\"https:\/\/www.iri.com\/products\/fieldshield\"><span style=\"font-weight: 400;\">IRI FieldShield<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">semi-structured files, plus unstructured text, document, databases (RDB or NoSQL), and image files through <\/span><a href=\"https:\/\/www.iri.com\/products\/darkshield\"><span style=\"font-weight: 400;\">IRI DarkShield<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Excel spreadsheets through <\/span><a href=\"https:\/\/www.iri.com\/products\/cellshield\/cellshield-ee\"><span style=\"font-weight: 400;\">IRI CellShield EE<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<span id='easy-footnote-1-12942' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.iri.com\/blog\/data-protection\/right-to-erasure\/#easy-footnote-bottom-1-12942' title=' All three of these shield products are available in a single &lt;a href=&quot;https:\/\/www.iri.com\/products\/voracity&quot;&gt;IRI Voracity&lt;\/a&gt; data management platform subscription as well as individually.'><sup>1<\/sup><\/a><\/span><\/span><\/li>\n<\/ol>\n<h3><b><br \/>\nPII Erasure in Structured Data Sources<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Two of the <\/span><a href=\"https:\/\/www.iri.com\/solutions\/data-masking\/static-data-masking\"><span style=\"font-weight: 400;\">many<\/span><\/a><span style=\"font-weight: 400;\"> data masking methods in FieldShield can be used to comply with an erasure request for PII stored in relational databases and sequential (flat) files. Some semi-structured instances of MongoDB, JSON, and mainframe files may require DarkShield instead.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The first option replaces the personally identifying information (PII) with an empty string. The second option deletes (removes) the entire record. <\/span><\/p>\n<h3><b>Replacement<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">To replace a PII value with an empty string, you can use the same deletion function shown in the DarkShield rule dialog (see further down in the article). <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Alternatively, you can also manually create an assignment rule to specify the empty string within the inside your FieldShield job script. The rule can then be applied to any field deemed by the controller to be PII. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">For the assignment rule option, s<\/span><span style=\"font-weight: 400;\">elect the <\/span><b>Assignment Expression<\/b> function\u00a0from the Masking menu inside the Data Rule dialog in IRI Workbench<span style=\"font-weight: 400;\">. Once the assignment expression builder opens, enter &#8220;&#8221; in the Expression field\u201d. When using this rule in a SortCL script, the field name will be replaced with <\/span><i><span style=\"font-weight: 400;\">&lt;fieldName&gt;=\u201d\u201d<\/span><\/i><span style=\"font-weight: 400;\">. \u00a0<\/span><\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2019\/06\/erasure-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-12952 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/erasure-1.png\" alt=\"\" width=\"525\" height=\"508\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/erasure-1.png 525w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/erasure-1-300x290.png 300w\" sizes=\"(max-width: 525px) 100vw, 525px\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Filter for the requestee\u2019s information using an <\/span><b>Include <\/b><span style=\"font-weight: 400;\">statement where the search item is a unique identifier.<\/span><\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2019\/06\/erasure-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-12953 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/erasure-2.png\" alt=\"\" width=\"525\" height=\"450\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/erasure-2.png 525w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/erasure-2-300x257.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/erasure-2-350x300.png 350w\" sizes=\"(max-width: 525px) 100vw, 525px\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">This example script replaces six fields with an empty string where the IDNUMBER equals 12345678.<\/span><\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2019\/06\/erasure-3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-12954 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/erasure-3.png\" alt=\"\" width=\"849\" height=\"171\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/erasure-3.png 849w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/erasure-3-300x60.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/erasure-3-768x155.png 768w\" sizes=\"(max-width: 849px) 100vw, 849px\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Once the scripts are made for all of the sources with PII, the job can be reused by simply changing the identifier being searched for. For example, the IDNUMBER was changed below,<\/span><\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2019\/06\/erasure-4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-12955 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/erasure-4.png\" alt=\"\" width=\"856\" height=\"174\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/erasure-4.png 856w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/erasure-4-300x61.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/erasure-4-768x156.png 768w\" sizes=\"(max-width: 856px) 100vw, 856px\" \/><\/a><\/p>\n<h3><b>Deletion<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The procedure for deleting a record will depend on the source type of the data. To delete a record in a database, use the <\/span><b>Delete <\/b><span style=\"font-weight: 400;\">statement with a unique identifier field. Filter for the requester\u2019s information using an <\/span><b>Include <\/b><span style=\"font-weight: 400;\">statement as above where the search item is a unique identifier.<\/span><\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2019\/06\/erasure-5.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-12956 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/erasure-5.png\" alt=\"\" width=\"525\" height=\"675\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/erasure-5.png 525w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/erasure-5-233x300.png 233w\" sizes=\"(max-width: 525px) 100vw, 525px\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">To delete from a flat file, use an <\/span><b>Omit<\/b><span style=\"font-weight: 400;\"> statement instead to overwrite the file with the same source information, which removes the requestee\u2019s information from that source.<\/span><\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2019\/06\/erasure-6.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-12957 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/erasure-6.png\" alt=\"\" width=\"525\" height=\"450\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/erasure-6.png 525w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/erasure-6-300x257.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/erasure-6-350x300.png 350w\" sizes=\"(max-width: 525px) 100vw, 525px\" \/><\/a><\/p>\n<h3><b><br \/>\nPII Erasure in Unstructured Files<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">DarkShield provides a custom <\/span><b>Deletion Function <\/b><span style=\"font-weight: 400;\">which can replace PII with an empty string, much like FieldShield\u2019s assignment function. It\u2019s simply a matter of creating the <\/span><b>Deletion Function<\/b><span style=\"font-weight: 400;\"> as a data rule from within the <\/span><i><span style=\"font-weight: 400;\">Dark Data Discovery Wizard <\/span><\/i><span style=\"font-weight: 400;\">while defining the search criteria, or from the separate <\/span><i><span style=\"font-weight: 400;\">New Data Rule Wizard<\/span><\/i><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2019\/06\/erasure-7.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-12958 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/erasure-7.png\" alt=\"\" width=\"525\" height=\"553\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/erasure-7.png 525w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/erasure-7-285x300.png 285w\" sizes=\"(max-width: 525px) 100vw, 525px\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">This function will then operate automatically on all instances of the specified PII for the requester wishing to be forgotten, as defined for him\/her\/them in the data class or data class group. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">To find and erase PII belonging to the requester, it is necessary to create a Data Class composed of a set file lookup matcher containing the PII of the requester:<\/span><\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2019\/06\/erasure-8.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-12959\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/erasure-8.png\" alt=\"\" width=\"193\" height=\"60\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">The Data Class can then be associated with the Deletion Function through a Search Matcher:<\/span><\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2019\/06\/erasure-9.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-12960 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/erasure-9.png\" alt=\"\" width=\"525\" height=\"450\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/erasure-9.png 525w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/erasure-9-300x257.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/erasure-9-350x300.png 350w\" sizes=\"(max-width: 525px) 100vw, 525px\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">The search methods that can be associated with a given data class include:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">RegEx pattern matching<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">String matches to values in a lookup (set) file<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Named-entity recognition (NER) models<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Bounding boxes draws around fixed image areas <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Facial detection and recognition<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">However, in the context of right to be erased requests, NER would not be applicable, and the bounding box would need that person\u2019s information to be in a fixed position within an image.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The search results can then be obtained by performing the <\/span><i><span style=\"font-weight: 400;\">Search and Remediate Job <\/span><\/i><span style=\"font-weight: 400;\">with the generated <\/span><i><span style=\"font-weight: 400;\">.search <\/span><\/i><span style=\"font-weight: 400;\">configuration file:<\/span><\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2019\/06\/erasure-10.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-12961 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/erasure-10.png\" alt=\"\" width=\"857\" height=\"129\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/erasure-10.png 857w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/erasure-10-300x45.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/erasure-10-768x116.png 768w\" sizes=\"(max-width: 857px) 100vw, 857px\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Note that for PDFs the whitespace for where the original PII was located will be retained. For images, a black box redaction will be applied instead.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>PII Erasure in Excel Sheets<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The CellShield Enterprise Edition (EE) data masking tool for Excel spreadsheets uses the same <\/span><i><span style=\"font-weight: 400;\">Dark Data Discovery<\/span><\/i><span style=\"font-weight: 400;\"> wizard in IRI Workbench to classify and find specific PII items, and the first three search methods as DarkShield above. At the end of the search process, a report on all the PII found in all the .xls and .xlsx files is also created in an Excel Interchange Format (.eif) file.<\/span><\/p>\n<p><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/erasure-11.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-12947 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/erasure-11-1024x345.png\" alt=\"\" width=\"1024\" height=\"345\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/erasure-11-1024x345.png 1024w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/erasure-11-300x101.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/erasure-11-768x258.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/erasure-11.png 1058w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">The EIF file is an Excel-compatible sheet listing folder, file, sheet, and cell locations for every item of PII discovered LAN-wide. This helps you comply with GDPR articles 16 and 20, and stages compliance with article 17 via ad hoc or bulk erasure through a redaction function using space characters. Either can be invoked in a selector dialog tied to the same report sheet above:<\/span><\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2019\/06\/erasure-12.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-12948 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/erasure-12.png\" alt=\"\" width=\"596\" height=\"344\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/erasure-12.png 596w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/erasure-12-300x173.png 300w\" sizes=\"(max-width: 596px) 100vw, 596px\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">That dialog can also launch &#8212; or you can launch separately &#8212; the Intra-Cell Search (and masking) dialog, to specify deletion through redaction. For example:<\/span><\/p>\n<p><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/erasure-13.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-12949 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/erasure-13-1024x503.png\" alt=\"\" width=\"1024\" height=\"503\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/erasure-13-1024x503.png 1024w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/erasure-13-300x147.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/erasure-13-768x377.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/erasure-13.png 1406w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">The intra-cell feature identifies the locations of the PII anywhere in a sheet and can erase it using a space-character to mask each string automatically:<\/span><\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2019\/06\/erasure-14.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-12950 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/erasure-14.png\" alt=\"\" width=\"286\" height=\"146\" \/><\/a><\/p>\n<p><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/erasure-15.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-12951 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/erasure-15-1024x503.png\" alt=\"\" width=\"1024\" height=\"503\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/erasure-15-1024x503.png 1024w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/erasure-15-300x147.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/erasure-15-768x377.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/erasure-15.png 1406w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Alternatively, now that all the rows with that person are found, you could choose to erase everything else in, or any other personally identifying parts of, those same rows as needed.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you have questions about how you can use IRI data masking software to comply with the Right to Erasure, or other provisions of the GDPR, CCPA and similar data privacy laws, please email <\/span><a href=\"mailto:info@iri.com\"><span style=\"font-weight: 400;\">info@iri.com<\/span><\/a><span style=\"font-weight: 400;\"> with details about your use case, and arrange a live demo with us <\/span><a href=\"https:\/\/www.iri.com\/products\/go\/live-demo\"><span style=\"font-weight: 400;\">here<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Article 17 of the General Data Protection Regulation (GDPR) stipulates the need to minimize aging data through deletion, as well as the ad hoc Right to Erasure, often referred to as the Right to be Forgotten. While the regulation specifies some requirements as to what controllers must do with data requested to be \u201cerased\u201d, it<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/right-to-erasure\/\" title=\"How to Support the Right to be Forgotten in IRI Data Masking Tools\">Read More<\/a><\/div>\n","protected":false},"author":101,"featured_media":12964,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8,34],"tags":[1452,1215,1413,2055,14,2057,9,1219,1388,789,850,149,1417,1306,1416,2056,1415],"class_list":["post-12942","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","category-business","tag-ccpa","tag-cellshield","tag-data-erasure","tag-data-erasure-under-gdpr","tag-data-masking","tag-data-masking-and-anonymization-techniques","tag-fieldshield","tag-gdpr","tag-iri-darkshield","tag-iri-voracity","tag-iri-workbench","tag-pii","tag-pii-deletion","tag-pii-masking","tag-right-to-be-forgotten","tag-right-to-delete-personal-data","tag-right-to-erasure"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v23.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Support the Right to be Forgotten in IRI Data Masking Tools - IRI<\/title>\n<meta name=\"description\" content=\"General Data Protection Regulation (GDPR) Article 17 guarantees the Right to Erasure, or the Right to be Forgotten. Learn how to comply here.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/right-to-erasure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Support the Right to be Forgotten in IRI Data Masking Tools\" \/>\n<meta property=\"og:description\" content=\"General Data Protection Regulation (GDPR) Article 17 guarantees the Right to Erasure, or the Right to be Forgotten. Learn how to comply here.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.iri.com\/blog\/data-protection\/right-to-erasure\/\" \/>\n<meta property=\"og:site_name\" content=\"IRI\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-20T20:35:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-24T20:00:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/right-to-erasure.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Donna Davis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Donna Davis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/right-to-erasure\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/right-to-erasure\/\"},\"author\":{\"name\":\"Donna Davis\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/52271b71b77d927ce9421530e2b1260b\"},\"headline\":\"How to Support the Right to be Forgotten in IRI Data Masking Tools\",\"datePublished\":\"2019-06-20T20:35:13+00:00\",\"dateModified\":\"2025-03-24T20:00:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/right-to-erasure\/\"},\"wordCount\":1200,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/right-to-erasure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/right-to-erasure.png\",\"keywords\":[\"CCPA\",\"CellShield\",\"data erasure\",\"Data erasure under GDPR\",\"data masking\",\"Data masking and anonymization techniques\",\"FieldShield\",\"GDPR\",\"IRI DarkShield\",\"IRI Voracity\",\"IRI Workbench\",\"PII\",\"PII deletion\",\"pii masking\",\"right to be forgotten\",\"right to delete personal data\",\"right to erasure\"],\"articleSection\":[\"Data Masking\/Protection\",\"IRI Business\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/right-to-erasure\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/right-to-erasure\/\",\"url\":\"https:\/\/www.iri.com\/blog\/data-protection\/right-to-erasure\/\",\"name\":\"How to Support the Right to be Forgotten in IRI Data Masking Tools - IRI\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/right-to-erasure\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/right-to-erasure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/right-to-erasure.png\",\"datePublished\":\"2019-06-20T20:35:13+00:00\",\"dateModified\":\"2025-03-24T20:00:36+00:00\",\"description\":\"General Data Protection Regulation (GDPR) Article 17 guarantees the Right to Erasure, or the Right to be Forgotten. Learn how to comply here.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/right-to-erasure\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/right-to-erasure\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/right-to-erasure\/#primaryimage\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/right-to-erasure.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/right-to-erasure.png\",\"width\":2048,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/right-to-erasure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.iri.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Support the Right to be Forgotten in IRI Data Masking Tools\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.iri.com\/blog\/#website\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"name\":\"IRI\",\"description\":\"Total Data Management Blog\",\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.iri.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\",\"name\":\"IRI\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"width\":750,\"height\":206,\"caption\":\"IRI\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/52271b71b77d927ce9421530e2b1260b\",\"name\":\"Donna Davis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f109ab98ab74af3d4419d9d477bb85db?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f109ab98ab74af3d4419d9d477bb85db?s=96&d=blank&r=g\",\"caption\":\"Donna Davis\"},\"url\":\"https:\/\/www.iri.com\/blog\/author\/donnad\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Support the Right to be Forgotten in IRI Data Masking Tools - IRI","description":"General Data Protection Regulation (GDPR) Article 17 guarantees the Right to Erasure, or the Right to be Forgotten. Learn how to comply here.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.iri.com\/blog\/data-protection\/right-to-erasure\/","og_locale":"en_US","og_type":"article","og_title":"How to Support the Right to be Forgotten in IRI Data Masking Tools","og_description":"General Data Protection Regulation (GDPR) Article 17 guarantees the Right to Erasure, or the Right to be Forgotten. Learn how to comply here.","og_url":"https:\/\/www.iri.com\/blog\/data-protection\/right-to-erasure\/","og_site_name":"IRI","article_published_time":"2019-06-20T20:35:13+00:00","article_modified_time":"2025-03-24T20:00:36+00:00","og_image":[{"width":2048,"height":1024,"url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/right-to-erasure.png","type":"image\/png"}],"author":"Donna Davis","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Donna Davis","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.iri.com\/blog\/data-protection\/right-to-erasure\/#article","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/right-to-erasure\/"},"author":{"name":"Donna Davis","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/52271b71b77d927ce9421530e2b1260b"},"headline":"How to Support the Right to be Forgotten in IRI Data Masking Tools","datePublished":"2019-06-20T20:35:13+00:00","dateModified":"2025-03-24T20:00:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/right-to-erasure\/"},"wordCount":1200,"commentCount":0,"publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/right-to-erasure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/right-to-erasure.png","keywords":["CCPA","CellShield","data erasure","Data erasure under GDPR","data masking","Data masking and anonymization techniques","FieldShield","GDPR","IRI DarkShield","IRI Voracity","IRI Workbench","PII","PII deletion","pii masking","right to be forgotten","right to delete personal data","right to erasure"],"articleSection":["Data Masking\/Protection","IRI Business"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.iri.com\/blog\/data-protection\/right-to-erasure\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.iri.com\/blog\/data-protection\/right-to-erasure\/","url":"https:\/\/www.iri.com\/blog\/data-protection\/right-to-erasure\/","name":"How to Support the Right to be Forgotten in IRI Data Masking Tools - IRI","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/right-to-erasure\/#primaryimage"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/right-to-erasure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/right-to-erasure.png","datePublished":"2019-06-20T20:35:13+00:00","dateModified":"2025-03-24T20:00:36+00:00","description":"General Data Protection Regulation (GDPR) Article 17 guarantees the Right to Erasure, or the Right to be Forgotten. Learn how to comply here.","breadcrumb":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/right-to-erasure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.iri.com\/blog\/data-protection\/right-to-erasure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/data-protection\/right-to-erasure\/#primaryimage","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/right-to-erasure.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/right-to-erasure.png","width":2048,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.iri.com\/blog\/data-protection\/right-to-erasure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.iri.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Support the Right to be Forgotten in IRI Data Masking Tools"}]},{"@type":"WebSite","@id":"https:\/\/www.iri.com\/blog\/#website","url":"https:\/\/www.iri.com\/blog\/","name":"IRI","description":"Total Data Management Blog","publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.iri.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.iri.com\/blog\/#organization","name":"IRI","url":"https:\/\/www.iri.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","width":750,"height":206,"caption":"IRI"},"image":{"@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/52271b71b77d927ce9421530e2b1260b","name":"Donna Davis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f109ab98ab74af3d4419d9d477bb85db?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f109ab98ab74af3d4419d9d477bb85db?s=96&d=blank&r=g","caption":"Donna Davis"},"url":"https:\/\/www.iri.com\/blog\/author\/donnad\/"}]}},"jetpack_featured_media_url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/06\/right-to-erasure.png","_links":{"self":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/12942"}],"collection":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/users\/101"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/comments?post=12942"}],"version-history":[{"count":16,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/12942\/revisions"}],"predecessor-version":[{"id":18329,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/12942\/revisions\/18329"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media\/12964"}],"wp:attachment":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media?parent=12942"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/categories?post=12942"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/tags?post=12942"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}