Humans forget, machines remember: Artificial intelligence and the Right to Be Forgotten

被引:80
作者
Villaronga, Eduard Fosch [1 ]
Kieseberg, Peter [2 ]
Li, Tiffany [3 ,4 ]
机构
[1] Univ Twente, Drienerlolaan 5, NL-7522 NB Enschede, Netherlands
[2] SBA Res, Vienna, Austria
[3] WikimediaYale Law Sch Initiat Intermediaries & In, Yale Law Sch Informat Soc Project, New Haven, CT USA
[4] Princeton Ctr Informat Technol Policy, Princeton, NJ USA
关键词
Right to Be Forgotten; Artificial intelligence (AI); Privacy; Data deletion; Memory;
D O I
10.1016/j.clsr.2017.08.007
中图分类号
D9 [法律]; DF [法律];
学科分类号
0301 ;
摘要
This article examines the problem of AI memory and the Right to Be Forgotten. First, this article analyzes the legal background behind the Right to Be Forgotten, in order to understand its potential applicability to AI, including a discussion on the antagonism between the values of privacy and transparency under current E.U. privacy law. Next, the authors explore whether the Right to Be Forgotten is practicable or beneficial in an AI/machine learning context, in order to understand whether and how the law should address the Right to Be Forgotten in a post-AI world. The authors discuss the technical problems faced when adhering to strict interpretation of data deletion requirements under the Right to Be Forgotten, ultimately concluding that it may be impossible to fulfill the legal aims of the Right to Be Forgotten in artificial intelligence environments. Finally, this article addresses the core issue at the heart of the AI and Right to Be Forgotten problem: the unfortunate dearth of interdisciplinary scholarship supporting privacy law and regulation. (C) 2017 Eduard Fosch Villaronga, Peter Kieseberg, Tiffany Li. Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:304 / 313
页数:10
相关论文
共 18 条
  • [1] Hard and soft law in international governance
    Abbott, KW
    Snidal, D
    [J]. INTERNATIONAL ORGANIZATION, 2000, 54 (03) : 421 - +
  • [2] [Anonymous], 2013, 14001 ISO
  • [3] [Anonymous], 2013, STAN TECH L REV
  • [4] [Anonymous], 2011, Journal on Telecommunications High Technology Law
  • [5] Collateral Consequences Resource Center, 2020, COLLATERAL CONSEQUEN
  • [6] EASTERBROOK FH, 1996, CYBERSPACE LAW HORSE
  • [7] Equal Rights Trust, 2008, DECL PRINC EQ
  • [8] USING INTERNAL MySQL/InnoDB B-TREE INDEX NAVIGATION FOR DATA HIDING
    Fruhwirt, Peter
    Kieseberg, Peter
    Weippl, Edgar
    [J]. ADVANCES IN DIGITAL FORENSICS XI, 2015, 462 : 179 - 194
  • [9] Gasser Urs., 2016, Harvard Law Review
  • [10] Jocnckheer T., 2012, COPYING ID DOCUMENTS