BBC Forgotten List 'sets a precedent'

bbc-google-delisted-rtfg-links-1435579571.png

The BBC has "set a precedent" for other media organisations by publishing a list of links removed from Google searches, the corporation's policy boss has said. The links were removed as part of the "right to be forgotten" ruling put in place by the European court. It allows individuals to request certain links do not show up when a person searches their name.

The BBC published a full list of stories that had been removed so far. It would continue to do so, said David Jordan, head of editorial policy. He said while it was up to individual media organisations to decide how best to be transparent with audiences over what has been removed, he felt the BBC had taken the lead "without being provocative".

He denied the suggestion that publishing the links was bringing more attention to those who had wanted to be forgotten. "What it does is give a sense of and a flavour of what kind of material is being delisted. That's important."

The European Union Court of Justice ruled last year that search engine links to "irrelevant" and outdated data about a person should be erased on request. It only affects searches made by users in the European Union. The decision arose after a Spanish man complained that an auction notice of his repossessed home on Google's search results infringed his privacy. 

A removal does not mean it is taken off the Internet, nor the search engine as a whole. Instead, it means the specific link will not appear when a search for a person's name is conducted. Google has described the ruling as "disappointing". Internet rights campaigners are concerned that the rule amounts to censorship.

Soon after the ruling, Google began informing media organisations whenever a link had been removed from search results - a move which was said to have angered regulators.

After seeking the advice of media organisations, Google implemented an appeal system. One story that had been removed, about a court case involving members of the Real IRA, was relisted after the BBC appealed against the decision.

In 2012, the European Commission published plans for a "right to be forgotten" law, allowing people to request that data about themselves to be deleted. Online service providers would have to comply unless they had "legitimate" reason to do otherwise. The plans are part of a wide-ranging overhaul of the commission's 1995 Data Protection Directive.

BBC

« Google’s Robot Intelligence Help Desk
Biter Bitten: The Hacking Team Hit by Breach »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Cyber Security Associates (CSA)

Cyber Security Associates (CSA)

Cyber Security Associates provides cyber consultancy and cyber managed services which help to detect, protect and educate against the ever-changing cyber threat.

Chertoff Group

Chertoff Group

The Chertoff Group provide security advice and risk management services covering cyber security, insider threat, physical security and asset protection.

Proofpoint

Proofpoint

Proofpoint provide the most effective cybersecurity and compliance solutions to protect people on every channel including email, the web, the cloud, social media and mobile messaging.

Accelerator Frankfurt

Accelerator Frankfurt

Accelerator Frankfurt is an independent go-to-market program focused on Fintech, Cybersecurity and Digital B2B startups.

BLUECYFORCE

BLUECYFORCE

BLUECYFORCE is the leading professional training and cyber defense training organization in France.

Stone Forest IT (SFIT)

Stone Forest IT (SFIT)

Stone Forest IT specialises in providing advisory, implementation and managed services for IT infrastructure, IT security solutions, business applications (ERP and CRM) and business analytical tools.

Cyber Defence Solutions (CDS)

Cyber Defence Solutions (CDS)

Cyber Defence Solutions is a cyber and privacy Consultancy with extensive experience in the development and implementation of cyber and data security solutions to your assets.

Extreme Engineering Solutions (X-ES)

Extreme Engineering Solutions (X-ES)

Extreme Engineering Solutions is a leader in the design, manufacture, testing, and support of hardware and software solutions for the embedded computing market.

US Coast Guard Cyber Command

US Coast Guard Cyber Command

US Coast Guard Cyber Command’s focus is to ensure the security of our cyberspace, maintain superiority over our adversaries,and safeguard our Nation’s critical maritime infrastructure.

Abertay cyberQuarter

Abertay cyberQuarter

The Abertay cyberQuarter is a cybersecurity research and development centre housed within Abertay University.

Quartz Network

Quartz Network

Quartz Network is a curated community for change-makers, up-and-comers, and professionals who are ready to grow, adapt, and thrive.

Avalon Cyber

Avalon Cyber

Arm your organization in the fight against cyberattacks by partnering with the experts at Avalon Cyber.

AirMDR

AirMDR

Designed by experts, AirMDR solutions cater to the unique demands of security operations centers.

Complete Cyber

Complete Cyber

Complete Cyber provide professional cybersecurity services and products to help secure your infrastructure, systems and data.

Academia the Technology Group

Academia the Technology Group

Academia specialise in the supply of software, IT hardware, training and service solutions to the public sectors, business and pro media markets.

Transcendental Technologies

Transcendental Technologies

Transcendental is a consulting organization which specializes in customized assurance services in the fields of Localization, Mobile Software Solutions, Web Design, Cyber Security & Cyber Forensics.