BBC Forgotten List 'sets a precedent'

bbc-google-delisted-rtfg-links-1435579571.png

The BBC has "set a precedent" for other media organisations by publishing a list of links removed from Google searches, the corporation's policy boss has said. The links were removed as part of the "right to be forgotten" ruling put in place by the European court. It allows individuals to request certain links do not show up when a person searches their name.

The BBC published a full list of stories that had been removed so far. It would continue to do so, said David Jordan, head of editorial policy. He said while it was up to individual media organisations to decide how best to be transparent with audiences over what has been removed, he felt the BBC had taken the lead "without being provocative".

He denied the suggestion that publishing the links was bringing more attention to those who had wanted to be forgotten. "What it does is give a sense of and a flavour of what kind of material is being delisted. That's important."

The European Union Court of Justice ruled last year that search engine links to "irrelevant" and outdated data about a person should be erased on request. It only affects searches made by users in the European Union. The decision arose after a Spanish man complained that an auction notice of his repossessed home on Google's search results infringed his privacy. 

A removal does not mean it is taken off the Internet, nor the search engine as a whole. Instead, it means the specific link will not appear when a search for a person's name is conducted. Google has described the ruling as "disappointing". Internet rights campaigners are concerned that the rule amounts to censorship.

Soon after the ruling, Google began informing media organisations whenever a link had been removed from search results - a move which was said to have angered regulators.

After seeking the advice of media organisations, Google implemented an appeal system. One story that had been removed, about a court case involving members of the Real IRA, was relisted after the BBC appealed against the decision.

In 2012, the European Commission published plans for a "right to be forgotten" law, allowing people to request that data about themselves to be deleted. Online service providers would have to comply unless they had "legitimate" reason to do otherwise. The plans are part of a wide-ranging overhaul of the commission's 1995 Data Protection Directive.

BBC

« Google’s Robot Intelligence Help Desk
Biter Bitten: The Hacking Team Hit by Breach »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cynet

Cynet

Cynet simplifies security by providing a rapidly deployed, comprehensive platform for detection, prevention and automated response to advanced threats with near-zero false positives.

Talend

Talend

Talend is a leader in cloud and big data integration software. Applications include Risk and Compliance management.

Centrify

Centrify

Centrify’s Next-Gen Access is an identity & access management solution that uniquely converges Identity-as-a-Service, enterprise mobility management and privileged access management.

TZ-CERT

TZ-CERT

TZ-CERT is the National Computer Emergence Response Team of Tanzania.

Engineering Group

Engineering Group

Engineering is the Digital Transformation Company, a leader in Italy and with over 80 offices across Europe, the United States, and South America.

Axis Capital

Axis Capital

AXIS Insurance’s Professional Lines Division is a leading underwriter of technology/cyber coverage and other specialty products around the globe.

Versa Networks

Versa Networks

Versa is a software-defined networking vendor providing an end-to-end solution that both simplifies and secures the WAN/branch office network.

Micro Strategies Inc.

Micro Strategies Inc.

Micro Strategies provides IT solutions that help businesses tackle digital transformation in style.

Brimondo

Brimondo

At Brimondo we help you to maximize and protect your brand value by being a proactive and strategic partner within brand protection with experts within intellectual property and digital assets.

AmWINS Group

AmWINS Group

AmWINS are a global specialty insurance distributor with expertise in property, casualty and professional lines including cyber liability.

Duality Technologies

Duality Technologies

Duality Technologies combine Advanced Cryptography with Data Science to deliver High-Performance Privacy-Protecting Computing to Regulated Industries.

SIRP Labs

SIRP Labs

SIRP is a Risk-based Security Orchestration, Automation and Response (SOAR) platform that fuses essential cybersecurity information to enable a unified cyber response.

Accenture

Accenture

Accenture is a leading global professional services company providing a range of strategy, consulting, digital, technology & operations services and solutions including cybersecurity.

Intelequia

Intelequia

Intelequia SOC is the Security Operations Center your company needs. 24x7 monitoring, protection and automated response to cyber threats.

Tidelift

Tidelift

Tidelift provides the tools, data, and strategies that help organizations assess risk and improve the health, security, and resilience of the open source used in their applications.

Xiphera

Xiphera

Xiphera designs and implements proven cryptographic security for embedded systems.