To be in compliance with new privacy laws and record retention requirements, organizations often need to ensure that sensitive data is securely and completely deleted when necessary. As you've correctly pointed out, the standard DELETE operation, such as DELETE /contents/{id}, often performs a soft delete, which means the data may still be retrievable in some form. To achieve complete data deletion, organizations can consider implementing a combination of methods, including "hard delete" and secure data destruction techniques. Below are some approaches commonly used to achieve data deletion compliance:
-
Hard Delete with Purging:
- As you mentioned, using
DELETE /contents/{id}/action/purge can be the first step towards data deletion compliance. This operation removes all associations and references to the object, making it more difficult to access the data in the future.
-
Implementing a Custom "Hard Delete" Endpoint:
- Organizations can create custom endpoints, such as
DELETE /contents/{id}/action/hard-delete, to specifically handle hard deletions. This custom endpoint can ensure that the data is permanently and irreversibly removed from the system.
-
Data Encryption and Secure Key Management:
- Before performing a hard delete, consider encrypting sensitive data using strong encryption algorithms. Properly manage encryption keys to ensure that data cannot be decrypted without proper authorization.
-
Data Overwriting:
- In some cases, organizations may choose to overwrite sensitive data with random values or zeros before performing a hard delete. This adds an extra layer of data obfuscation.
-
Secure Data Destruction Techniques:
- For physical storage media like hard drives, solid-state drives, and backup tapes, organizations should adopt secure data destruction techniques, such as degaussing, physical destruction, or secure erasure tools that meet industry standards (e.g., NIST SP 800-88).
-
Retention Policies and Scheduling:
- Implement clear data retention policies to determine the appropriate data retention periods. Automated processes can be used to enforce data deletion once the retention period expires.
-
Data Protection Impact Assessment (DPIA):
- Conduct DPIAs to assess the impact of data processing activities on data privacy and compliance. This includes ensuring that data deletion measures align with applicable privacy laws and regulations.
-
Data Auditing and Logging:
- Implement comprehensive data auditing and logging mechanisms to track data access, modification, and deletion events for compliance and accountability purposes.
------------------------------
Youssef Sbai Idrissi
Software Engineer
------------------------------
Original Message:
Sent: Mon July 24, 2023 01:33 PM
From: Andrea Mugherini
Subject: GDRP, CPRA etc. API delete end point
Hello OpenPages Community,
What end point are folks using to be in compliance with new privacy laws and record retentions?
DELETE /contents/{id} is only a soft delete
DELETE /contents/{id}/action/purge looks like it will remove all associations and reference to the object which is a good step to do first, but we really need something that will delete a specific record completely.
------------------------------
Andrea Mugherini
------------------------------