Listen to this page: 
OWASP Top 10 Privacy Risk Countermeasures
OWASP is the acronym for the Open Web Application Security Project .
4. Insufficient Deletion of Personal Data
- Risk Description
-
Failure to effectively and / or timeously delete personal data after termination of the specified purpose or upon request.
- How to check?
-
-
Inspect the data retention / deletion policies and/or agreements.
Evaluate their appropriateness.
Request deletion protocols.
Test processes for deletion requests.
-
Check if transparency is provided (which data is deleted when and which data is not deleted and why).
-
- Countermeasures
-
-
Deploy systems with good privacy practices, in this case minimization.
-
Personal data has to be deleted after termination of the specified purpose and after an appropriate timeframe (e.g. one month).
-
Personal data has to be deleted on rightful user request.
-
Secure locking (with very limited access to the data) might be an option if deletion is not possible due to technical restrictions.
-
Real deletion is preferable though and minimizes the risk.
-
Data retention, archival and deletion policies and processes have to be documented and followed.
-
Evidence should be collected to verify the deletion as per policy.
-
Any data in backups, other copies or shared with third parties has to be considered.
-
Exceptions are possible in case of retention required by law. Access should be very limited and protocolled for this case.
-
When deleting data in cloud, take note of historical data stored in older snapshots.
-
Deletion of user profiles after longer periods of inactivity.
-
- Example
-
Customer data is deleted automatically:
-
After a certain period of inactivity (Hotmail removes user profiles in case they are not used for one year).
-
After termination of a contract (it is not required by law to keep all customer information for accounting or other purposes).
-
- References