Skip to main content

How do I handle deletion requests securely?

Handling deletion requests securely requires verifying the requester's identity before taking action. You must be confident that the person requesting deletion is actually the data subject (or their authorized representative), not an impersonator or malicious actor trying to sabotage someone's subscription. Verification methods include matching the request to an email address on file and sending a confirmation link, asking security questions based on account information, or accepting requests only through authenticated account portals. Balance verification rigor with user experience-overly burdensome verification processes can themselves become compliance issues if they discourage legitimate requests.

Once verified, execute the deletion through a documented, auditable process. Log the request (date received, requester identity, verification method), track the deletion across all systems where data exists, and document completion. Even though you're deleting personal data, you may retain a record of the deletion action itself (the fact that a deletion was requested and processed, potentially with a hashed identifier) to demonstrate compliance if later questioned. This audit trail proves you honored the request without retaining the actual personal data.

Ensure deletion is technically complete and irreversible within your specified timeframes. This means removing data from active databases, propagating deletion to backup systems (or ensuring backups will be purged within their normal rotation cycle), and notifying any third parties with whom you've shared the data so they can delete their copies. For data that cannot be immediately deleted (backup tapes, archived databases), implement processes to delete it when those systems are next accessed or rotated. Secure deletion is methodical-verify first, document everything, and ensure data actually disappears from everywhere it lives.