{"id":11568,"date":"2026-02-19T10:54:35","date_gmt":"2026-02-19T09:54:35","guid":{"rendered":"https:\/\/techgdpr.com\/?p=11568"},"modified":"2026-02-19T10:54:36","modified_gmt":"2026-02-19T09:54:36","slug":"data-protection-digest-19022026-when-using-anonymisation-for-deletion-controllers-have-differing-degrees-of-success","status":"publish","type":"post","link":"https:\/\/techgdpr.com\/blog\/data-protection-digest-19022026-when-using-anonymisation-for-deletion-controllers-have-differing-degrees-of-success\/","title":{"rendered":"Data protection digest 3-17 Feb 2026: When using anonymisation for deletion, controllers have differing degrees of success &#8211; EDPB"},"content":{"rendered":"\n<h4 class=\"wp-block-heading\">Data deletion requests<\/h4>\n\n\n\n<p>Throughout 2025, 32 supervisory authorities across the EU\/EEA launched coordinated investigations into controllers&#8217; compliance with the right to erasure under the GDPR. Now, the <a href=\"https:\/\/www.edpb.europa.eu\/system\/files\/2026-02\/edpb_cef-report_2025_right-to-erasure_en.pdf\">EDPB has published a report of the findings<\/a>. As the right to deletion is not absolute, some controllers face difficulties in assessing and applying the conditions for exercising this right, including in conducting the balancing tests between the right to erasure and other rights and freedoms.\u00a0Many regulators raised concerns regarding controllers not having:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>internal <strong>procedure or practice in place<\/strong> to handle erasure requests, or having an incomplete or irregularly reviewed procedure,<\/li>\n\n\n\n<li>specific procedures and measures to handle erasure requests in the context of <strong>back-ups<\/strong>,<\/li>\n\n\n\n<li>staff <strong>training<\/strong>,\u00a0\u00a0<\/li>\n\n\n\n<li><strong>information<\/strong> provided to data subjects,<\/li>\n\n\n\n<li><strong>legal certainty<\/strong> on the exceptions to deny erasure requests, and\u00a0<\/li>\n\n\n\n<li><strong>data retention periods<\/strong>, etc.<\/li>\n<\/ul>\n\n\n\n<p>Multiple regulators found that controllers relying on <strong>anonymisation for deletion<\/strong> have varying degrees of success in correctly implementing it. In some cases, they only apply basic pseudonymisation or partial masking, although such a process would not fulfil the requirements of the GDPR regarding deletion.<\/p>\n\n\n\n<h6 class=\"wp-block-heading\"><a href=\"#newslettersignup\" id=\"#newslettersignup\"><mark style=\"background-color:#f9d8c2;color:#bc7cf8\" class=\"has-inline-color\">Stay up to date! Sign up to receive our fortnightly digest via email. <\/mark><\/a><\/h6>\n\n\n\n<p>Interestingly, the majority of the <a href=\"https:\/\/www.edpb.europa.eu\/system\/files\/2026-02\/edpb_cef-report_2025_right-to-erasure_en.pdf\">polled controllers (out of 764) had not received a single request for erasure in the last two years<\/a>. While controllers were often chosen due to being in certain particular situations (processing sensitive data, processing a very large amount of data, etc.), about 70% of controllers still received fewer than 10 requests per year. Also, it appears that certain profiles are less likely to exercise their rights (eg, applicants in public services, citizens toward public services, contractors, or job applicants\/employees) while others seem less hesitant to do so (eg, potential customers).<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Main developments&nbsp;<\/h4>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"grid-template-columns:25% auto\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/europe-3225257_1280-1024x768.jpg\" alt=\"\" class=\"wp-image-11578 size-full\" srcset=\"https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/europe-3225257_1280-1024x768.jpg 1024w, https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/europe-3225257_1280-300x225.jpg 300w, https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/europe-3225257_1280-768x576.jpg 768w, https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/europe-3225257_1280.jpg 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p><\/p>\n\n\n\n<p><strong>Digital omnibus and GDPR simplification:<\/strong> The EDPB and EDPS issued a long-awaited statement on simplification of the digital legislative framework in the EU. Among many things, they advised against the proposed changes to the definition of personal data. The changes go far beyond a targeted modification of the GDPR, a \u2018technical amendment\u2019 or a mere codification of CJEU jurisprudence.<\/p>\n<\/div><\/div>\n\n\n\n<p> Defining what is no longer personal data directly affects and narrows the scope of application of EU data protection legislation and should not be addressed in an implementing act, say the regulators.\u00a0The full opinion in the context of GDPR, AI Act, and ePrivacy Directive can be read <a href=\"https:\/\/www.edpb.europa.eu\/system\/files\/2026-02\/edpb_edps_jointopinion_202602_digitalomnibus_en.pdf\">here<\/a>.<\/p>\n\n\n\n<p><strong>UK data reform: <\/strong>Meanwhile, in the UK, on 5 February, the main provisions of the Data Use and Access Act 2025\u00a0 came into force, <a href=\"https:\/\/privacymatters.dlapiper.com\/2026\/02\/uk-commencement-of-the-data-protection-provisions-in-the-data-use-and-access-act\/\">amending the UK GDPR and Data Protection Act 2018<\/a>. These include: new \u2018recognised legitimate interests\u2019 legal basis for data controllers, cookie consent exemptions, data reuse permissions, the use of <a href=\"https:\/\/techgdpr.com\/blog\/reconciling-the-regulatory-clock\/\">automated decision making<\/a>, more relaxed transfers of personal data internationally, and sometimes limiting data subject access requests, etc.\u00a0<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Age-appropriate code design<\/strong><\/h4>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"grid-template-columns:25% auto\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/image-4-1024x683.jpeg\" alt=\"deletion\" class=\"wp-image-11572 size-full\" srcset=\"https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/image-4-1024x683.jpeg 1024w, https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/image-4-300x200.jpeg 300w, https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/image-4-768x512.jpeg 768w, https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/image-4.jpeg 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p><\/p>\n\n\n\n<p>On February 5, South Carolina signed <a href=\"https:\/\/www.scstatehouse.gov\/sess126_2025-2026\/prever\/3431_20260114.htm\">Age-Appropriate Code Design<\/a> into law, after it was previously adopted by California, Maryland, Nebraska, and Vermont. According to JD Supra <a href=\"https:\/\/www.jdsupra.com\/legalnews\/south-carolina-becomes-fifth-state-to-2022559\/\">analysis<\/a>, covered online services must exercise \u201creasonable care\u201d in the use of a minor\u2019s personal data and the design and operation of the covered online service. This includes features that:<\/p>\n<\/div><\/div>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u00a0Decrease minors\u2019 time and activity on the service to prevent compulsive usage, severe psychological harm, and privacy intrusions.\u00a0<\/li>\n\n\n\n<li>Opt minors out of \u201cpersonalisation recommendation systems\u201d by default, and\u00a0<\/li>\n\n\n\n<li>Set personal data settings to the highest level of protection by default.<\/li>\n\n\n\n<li>Collect, use, share, or retain the minimum amount of a minor\u2019s personal data \u201cnecessary\u201d to provide the specific elements of the covered online service, etc.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">More from supervisory authorities<\/h4>\n\n\n\n<p><strong>DPO role: <\/strong>Under EU law, all EU institutions, bodies, offices and agencies (EUIs) are required to appoint a data protection officer (DPO). To strengthen the effectiveness and independence of this function, the EDPS has adopted two key documents clarifying the role and protection of DPOs within EUIs:\u00a0<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.edps.europa.eu\/data-protection\/our-work\/publications\/guidelines\/2025-12-18-edps-guidance-role-data-protection-officers-eu-institutions-bodies-offices-and-agencies_en\">Supervisory Guidance on the role of DPOs in EUIs<\/a>, and <\/li>\n\n\n\n<li><a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=OJ:L_202600199\">Rules on the application of the requirement of prior consent by the EDPS for the dismissal of DPOs<\/a>\u00a0<\/li>\n<\/ul>\n\n\n\n<p>They provide practical and up-to-date guidance on the designation of DPOs, their institutional positioning, the guarantees of independence attached to the function, and the responsibilities entrusted to them.&nbsp;<\/p>\n\n\n\n<p><strong>Cybersecurity exercise: <\/strong>The ENISA offers a methodology to an end-to-end theoretical framework for planning, running and evaluating cybersecurity exercises. It ensures the right profiles and stakeholders are involved at the right time, and provides theoretical material based on lessons identified, industry best practices and cybersecurity expertise. Download the <a href=\"https:\/\/www.enisa.europa.eu\/sites\/default\/files\/2026-02\/ENISA%20Cybersecurity%20Exercise%20Methodology%20-%20Support%20templates.zip\">guide and the support toolkit templates here<\/a>.&nbsp;<\/p>\n\n\n\n<p><strong>Games age limitation: <\/strong>The French government, on 4 February, adopted a decree on the experimentation of games with monetisable digital objects. It requires, among other controls,&nbsp; the <a href=\"https:\/\/digitalpolicyalert.org\/event\/37700-government-adopted-decree-no-2026-60-relating-to-the-experimentation-of-games-with-monetisable-digital-objects-including-age-verification-requirement\">refusal of the opening of a player account for any minor<\/a>, or before verification of the identity and the age of the applicant. It requires the enterprise offering a game to document the arrangements used for verification, to carry out regular checks, and to be able to demonstrate the effectiveness and compliance of those arrangements to the National Gaming Authority.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>How to deal with data protection complaints<\/strong><\/h4>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"grid-template-columns:25% auto\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" width=\"1024\" height=\"670\" src=\"https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/image-2-1024x670.jpeg\" alt=\"deletion\" class=\"wp-image-11570 size-full\" srcset=\"https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/image-2-1024x670.jpeg 1024w, https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/image-2-300x196.jpeg 300w, https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/image-2-768x503.jpeg 768w, https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/image-2.jpeg 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p><\/p>\n\n\n\n<p>The updated UK ICO guidance reminds organisations what they need to do to meet the new requirements for people to open a data protection complaints process, as set out in the new <a href=\"https:\/\/ico.org.uk\/about-the-ico\/what-we-do\/legislation-we-cover\/data-use-and-access-act-2025\/\">Data Use and Access Act<\/a>, although these requirements are not in force until 19 June 2026. At a glance, the law says organisations must:<\/p>\n<\/div><\/div>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Give people a way of making data protection complaints;<\/li>\n\n\n\n<li>Acknowledge receipt of complaints within 30 days of receiving them;<\/li>\n\n\n\n<li>Without undue delay, take appropriate steps to respond to complaints, including making appropriate enquiries, and keep people informed; <\/li>\n\n\n\n<li>Without undue delay, tell people the outcome of their complaints.<\/li>\n<\/ul>\n\n\n\n<p>Read practical advice on each of these points in the <a href=\"https:\/\/ico.org.uk\/for-organisations\/how-to-deal-with-data-protection-complaints\/\">original publication<\/a>.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">In other news<\/h4>\n\n\n\n<p><strong>\u0421NIL sanctions statistics: <\/strong>Cookies, employee surveillance and data security were the main subjects of the penalties imposed by the French data protection authority CNIL, <a href=\"https:\/\/www.cnil.fr\/fr\/bilan-sanctions-2025\">in 2025, the cumulative amount of which totalled 486,839,500 euros<\/a>. Also, insufficient security of personal data, lack of cooperation with the CNIL and non-respect for the rights of individuals were the three main reasons for sanctions under the recently introduced simplified procedures. Numerous formal notices have targeted websites that allowed the deposit of cookies and other trackers without respecting the consent of individuals, either by not allowing them to refuse the deposit in a simple way, or by not taking into account the withdrawal of users&#8217; consent.<\/p>\n\n\n\n<p>In addition, the regulator often sanctioned the <strong>non-compliance with the obligations of the subcontractors <\/strong>concerning the data entrusted to them, in particular:\u00a0<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>implementing appropriate technical and organisational measures to ensure an adequate level of security;<\/li>\n\n\n\n<li>only processing data on the instructions of the data controller;<\/li>\n\n\n\n<li>deleting the data at the end of their contractual relationship with the data controller.<\/li>\n<\/ul>\n\n\n\n<p><strong>OpenClaw AI:<\/strong> The Dutch data protection authority AP warns against the use of <a href=\"https:\/\/autoriteitpersoonsgegevens.nl\/actueel\/ap-waarschuwt-voor-grote-beveiligingsrisicos-bij-ai-agents-zoals-openclaw\">OpenClaw<\/a>,\u00a0an AI agent tool that has become popular since last year. The platform <strong>provides users with an AI assistant to install, which can perform tasks autonomously<\/strong>. For that, the user has to give full access to their computer and programs, including email, files and online services. The platform can also be <a href=\"https:\/\/www.vitallaw.com\/news\/dutch-privacy-office-issues-warning-about-use-of-openclaw-ai\/cspd0183797bb1bed849aa839b765925c680b2\">vulnerable to hidden commands in websites, emails and chat messages<\/a>. That can lead to taking over accounts, reading personal data and stealing access codes.<\/p>\n\n\n<div id=\"newslettersignup\"><\/div>\n<div id=\"role-block_910ad8cedd3a9064c57118a05629cc35\" class=\"text-t-black bg-t-pink p-6 md:p-12 rounded-tr-50 rounded-bl-50 mb-4 lg:mb-12 text-center role\">\n  \n      <h2 class=\"text-xl lg:text-2xl max-w-screen-lg mx-auto text-t-black font-display mb-4\">\n      Receive our digest by email     <\/h2>\n        <h3 class=\"text-base max-w-screen-lg mx-auto text-t-black font-body mb-4\">Sign up to receive our digest by email every 2 weeks<\/h3>\n  \n  <div id=\"rmOrganism\">\n    <div class=\"rmEmbed rmLayout--vertical rmBase\">\n      <div data-page-type=\"formSubscribe\" class=\"rmBase__body rmSubscription\">\n                  <form method=\"post\" action=\"https:\/\/mailing.techgdpr.com\/145\/6351\/5e9fc3cdda\/subscribe\/form.html?_g=1698845230\" class=\"rmBase__content\">\n                  <div class=\"rmBase__container mx-auto max-w-screen-sm\">          \n            <div class=\"rmBase__section\">\n              <div class=\"text-left rmBase__el rmBase__el--input rmBase__el--label-pos-none\" data-field=\"email\">\n                <label for=\"email\" class=\"rmBase__compLabel rmBase__compLabel--hideable hidden\">\n                  Email address\n                <\/label>\n                <div class=\"rmBase__compContainer mb-2\">\n                  <input type=\"text\" name=\"email\" id=\"email\" placeholder=\"Email\" value=\"\" class=\"p-4 border rounded border-gray-400 w-full rmBase__comp--input comp__input\">\n                  <div class=\"rmBase__compError text-left font-display font-bold text-xs\"><\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n            <div class=\"rmBase__section mb-4\">\n              <div class=\"rmBase__el rmBase__el--consent\" data-field=\"consent_text\">\n                <div class=\"rmBase__comp--checkbox\">\n                  <label for=\"consent_text\" class=\"flex space-x-2 items-baseline text-left vFormCheckbox comp__checkbox\">\n                    <input type=\"checkbox\" value=\"yes\" name=\"consent_text\" id=\"consent_text\" class=\"vFormCheckbox__input\">\n                    <div class=\"vFormCheckbox__indicator hidden\"><\/div>\n                    <div class=\"vFormCheckbox__label\">\n                                              I consent to the processing of my data and to receiving regular updates from TechGDPR. Data is processed according to our <a href=\"https:\/\/techgdpr.com\/privacy-policy\/\"> Privacy Notice<\/a>.                                          <\/div>\n                  <\/label>\n                <\/div>\n                <div class=\"rmBase__compError text-left font-display font-bold text-xs\"><\/div>\n              <\/div>\n            <\/div>\n            <div class=\"rmBase__section\">\n              <div class=\"rmBase__el rmBase__el--cta\">\n                <button type=\"submit\" class=\"inline-flex items-center justify-center px-8 py-3 text-white visited:text-white font-bodybold rounded-md bg-t-navy border-3 border-t-navy hover:border-t-navy hover:bg-transparent hover:text-t-navy transition-all hover:text-white cursor-pointer rmBase__comp--cta\">\n                  Subscribe\n                <\/button>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/form>\n      <\/div>\n      <div data-page-type=\"pageSubscribeSuccess\" class=\"rmBase__body rmSubscription hidden\">\n        <div class=\"rmBase__content\">\n          <div class=\"rmBase__container\">\n            <div class=\"rmBase__section\">\n              <div class=\"rmBase__el rmBase__el--heading\">\n                <div class=\"rmBase__comp--heading\">\n                  Thank you for your subscription!\n      <!-- this linebreak is important, don't remove it! this will force trailing linebreaks to be displayed -->\n                  <br>\n                <\/div>\n              <\/div>\n            <\/div>\n            <div class=\"rmBase__section\">\n              <div class=\"rmBase__el rmBase__el--text\">\n                <div class=\"rmBase__comp--text\">\n                  We have sent you an email &#8211; please confirm your email address by clicking the activation link in it.\n      <!-- this linebreak is important, don't remove it! this will force trailing linebreaks to be displayed -->\n                  <br>\n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/div>\n\n      <script src=\"https:\/\/mailing.techgdpr.com\/form\/145\/6069\/8a53c9178b\/embedded.js\" async><\/script>\n  \n<\/div>\n\n\n\n<h4 class=\"wp-block-heading\">More enforcement decisions<\/h4>\n\n\n\n<p><strong>Amazon Italy investigation: <\/strong>On 9 February, the Italian data protection authority Garante and the National Labour Inspectorate announced an investigation into Amazon regarding the processing of <a href=\"https:\/\/www.garanteprivacy.it\/web\/guest\/home\/docweb\/-\/docweb-display\/docweb\/10219613\">workers&#8217; personal data and the use of video surveillance systems<\/a>. The investigation will examine the company&#8217;s logistics hubs, with a particular focus on the distribution centres in Passo Corese and Castel San Giovanni, to determine the extent to which monitoring practices comply with the legal requirements stipulated within the Workers&#8217; Statute, <a href=\"http:\/\/digitalpolicyalert.org\">digitalpolicyalert.org<\/a> reports.&nbsp;<\/p>\n\n\n\n<p><strong>Dutch municipalities fined:<\/strong> The Dutch data protection AP authority fined 10 municipalities 250,000 euros for processing sensitive information without consent, according to DataGuidance. Violations included processing data on <a href=\"https:\/\/www.dataguidance.com\/news\/netherlands-ap-fines-10-municipalities-total-eu250000\">religious beliefs, family relationships, political views, and criminal or terrorism-related information.<\/a> The municipalities processed this sensitive information (from an external research bureau, amid national counter-radicalisation efforts) without valid consent.<\/p>\n\n\n\n<p><strong>Swiss cookie redress case: <\/strong>Digitec Galaxus informed the Swiss privacy regulator FDPIC that it had implemented its formal recommendation that customers be given the option to object to the processing of their personal data for marketing purposes. Following criticism over excessive data processing, users <a href=\"https:\/\/www.edoeb.admin.ch\/en\/digitec-galaxus-en\">can now disable personalisation with one click (one-click opt-out), whereby the corresponding cookies are automatically disabled<\/a>. To that end, the registration form now explicitly mentions personalisation and the right to object, and the privacy policy has been updated accordingly.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">And Finally<\/h4>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"grid-template-columns:25% auto\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" width=\"1024\" height=\"617\" src=\"https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/image-5-1024x617.jpeg\" alt=\"\" class=\"wp-image-11574 size-full\" srcset=\"https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/image-5-1024x617.jpeg 1024w, https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/image-5-300x181.jpeg 300w, https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/image-5-768x463.jpeg 768w, https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/image-5.jpeg 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p><\/p>\n\n\n\n<p><strong>Data brokers warning in the US: <\/strong>The Federal Trade Commission sent letters to 13 data brokers warning them of their responsibility to comply with the <a href=\"https:\/\/www.ftc.gov\/news-events\/news\/press-releases\/2026\/02\/ftc-reminds-data-brokers-their-obligations-comply-padfaa\">Protecting Americans\u2019 Data from Foreign Adversaries Act of 2024<\/a>. It prohibits data brokers from selling, releasing, disclosing, or providing access to personally identifiable sensitive data about Americans to any foreign adversary, which includes <strong>North Korea, China, Russia, and Iran, or any entity controlled by those countries<\/strong>.\u00a0<\/p>\n<\/div><\/div>\n\n\n\n<p>The law defines personally identifiable sensitive data to include health, financial, genetic, biometric, geolocation, and sexual behaviour information, etc.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data deletion requests Throughout 2025, 32 supervisory authorities across the EU\/EEA launched coordinated investigations into controllers&#8217; compliance with the right to erasure under the GDPR. Now, the EDPB has published a report of the findings. As the right to deletion is not absolute, some controllers face difficulties in assessing and applying the conditions for exercising [&hellip;]<\/p>\n","protected":false},"author":21,"featured_media":11569,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[94,88],"tags":[51,100,122,89,58,56],"class_list":["post-11568","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection-digest","category-gdpr","tag-artificial-intelligence","tag-cookies","tag-data-subject-access-requests","tag-dpo","tag-gdpr-compliance","tag-right-to-be-forgotten"],"acf":[],"featured_image_urls":{"full":["https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/image-3.jpeg",1280,853,false],"thumbnail":["https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/image-3-150x150.jpeg",150,150,true],"medium":["https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/image-3-300x200.jpeg",300,200,true],"medium_large":["https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/image-3-768x512.jpeg",640,427,true],"large":["https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/image-3-1024x682.jpeg",640,426,true],"1536x1536":["https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/image-3.jpeg",1280,853,false],"2048x2048":["https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/image-3.jpeg",1280,853,false],"image-200-200":["https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/image-3-200x200.jpeg",200,200,true]},"post_excerpt_stackable":"<p>Data deletion requests Throughout 2025, 32 supervisory authorities across the EU\/EEA launched coordinated investigations into controllers&#8217; compliance with the right to erasure under the GDPR. Now, the EDPB has published a report of the findings. As the right to deletion is not absolute, some controllers face difficulties in assessing and applying the conditions for exercising this right, including in conducting the balancing tests between the right to erasure and other rights and freedoms.\u00a0Many regulators raised concerns regarding controllers not having: internal procedure or practice in place to handle erasure requests, or having an incomplete or irregularly reviewed procedure, specific procedures&hellip;<\/p>\n","category_list":"<a href=\"https:\/\/techgdpr.com\/blog\/category\/data-protection-digest\/\" rel=\"category tag\">Data Protection Digest<\/a>, <a href=\"https:\/\/techgdpr.com\/blog\/category\/gdpr\/\" rel=\"category tag\">GDPR<\/a>","author_info":{"name":"Olya Vasylyk","url":"https:\/\/techgdpr.com\/blog\/author\/olyav\/"},"comments_num":"0 comments","featured_image_urls_v2":{"full":["https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/image-3.jpeg",1280,853,false],"thumbnail":["https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/image-3-150x150.jpeg",150,150,true],"medium":["https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/image-3-300x200.jpeg",300,200,true],"medium_large":["https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/image-3-768x512.jpeg",640,427,true],"large":["https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/image-3-1024x682.jpeg",640,426,true],"1536x1536":["https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/image-3.jpeg",1280,853,false],"2048x2048":["https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/image-3.jpeg",1280,853,false],"image-200-200":["https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/image-3-200x200.jpeg",200,200,true]},"post_excerpt_stackable_v2":"<p>Data deletion requests Throughout 2025, 32 supervisory authorities across the EU\/EEA launched coordinated investigations into controllers&#8217; compliance with the right to erasure under the GDPR. Now, the EDPB has published a report of the findings. As the right to deletion is not absolute, some controllers face difficulties in assessing and applying the conditions for exercising this right, including in conducting the balancing tests between the right to erasure and other rights and freedoms.\u00a0Many regulators raised concerns regarding controllers not having: internal procedure or practice in place to handle erasure requests, or having an incomplete or irregularly reviewed procedure, specific procedures&hellip;<\/p>\n","category_list_v2":"<a href=\"https:\/\/techgdpr.com\/blog\/category\/data-protection-digest\/\" rel=\"category tag\">Data Protection Digest<\/a>, <a href=\"https:\/\/techgdpr.com\/blog\/category\/gdpr\/\" rel=\"category tag\">GDPR<\/a>","author_info_v2":{"name":"Olya Vasylyk","url":"https:\/\/techgdpr.com\/blog\/author\/olyav\/"},"comments_num_v2":"0 comments","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Data protection digest 3-17 Feb 2026: When using anonymisation for deletion, controllers have differing degrees of success - EDPB - TechGDPR<\/title>\n<meta name=\"description\" content=\"TechGDPR\u2019s review of the important data-related stories: when using anonymisation for deletion, controllers have differing degrees of success\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/techgdpr.com\/blog\/data-protection-digest-19022026-when-using-anonymisation-for-deletion-controllers-have-differing-degrees-of-success\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data protection digest 3-17 Feb 2026: When using anonymisation for deletion, controllers have differing degrees of success - EDPB - TechGDPR\" \/>\n<meta property=\"og:description\" content=\"TechGDPR\u2019s review of the important data-related stories: when using anonymisation for deletion, controllers have differing degrees of success\" \/>\n<meta property=\"og:url\" content=\"https:\/\/techgdpr.com\/blog\/data-protection-digest-19022026-when-using-anonymisation-for-deletion-controllers-have-differing-degrees-of-success\/\" \/>\n<meta property=\"og:site_name\" content=\"TechGDPR\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-19T09:54:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-19T09:54:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/image-3.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Olya Vasylyk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@techgdpr\" \/>\n<meta name=\"twitter:site\" content=\"@techgdpr\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Olya Vasylyk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/techgdpr.com\\\/blog\\\/data-protection-digest-19022026-when-using-anonymisation-for-deletion-controllers-have-differing-degrees-of-success\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/techgdpr.com\\\/blog\\\/data-protection-digest-19022026-when-using-anonymisation-for-deletion-controllers-have-differing-degrees-of-success\\\/\"},\"author\":{\"name\":\"Olya Vasylyk\",\"@id\":\"https:\\\/\\\/techgdpr.com\\\/#\\\/schema\\\/person\\\/07e9c14fd01b25bd2c1907537e8547e8\"},\"headline\":\"Data protection digest 3-17 Feb 2026: When using anonymisation for deletion, controllers have differing degrees of success &#8211; EDPB\",\"datePublished\":\"2026-02-19T09:54:35+00:00\",\"dateModified\":\"2026-02-19T09:54:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/techgdpr.com\\\/blog\\\/data-protection-digest-19022026-when-using-anonymisation-for-deletion-controllers-have-differing-degrees-of-success\\\/\"},\"wordCount\":1547,\"publisher\":{\"@id\":\"https:\\\/\\\/techgdpr.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/techgdpr.com\\\/blog\\\/data-protection-digest-19022026-when-using-anonymisation-for-deletion-controllers-have-differing-degrees-of-success\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/techgdpr.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/image-3.jpeg\",\"keywords\":[\"Artificial Intelligence\",\"cookies\",\"data subject access requests\",\"dpo\",\"GDPR Compliance\",\"right to be forgotten\"],\"articleSection\":[\"Data Protection Digest\",\"GDPR\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/techgdpr.com\\\/blog\\\/data-protection-digest-19022026-when-using-anonymisation-for-deletion-controllers-have-differing-degrees-of-success\\\/\",\"url\":\"https:\\\/\\\/techgdpr.com\\\/blog\\\/data-protection-digest-19022026-when-using-anonymisation-for-deletion-controllers-have-differing-degrees-of-success\\\/\",\"name\":\"Data protection digest 3-17 Feb 2026: When using anonymisation for deletion, controllers have differing degrees of success - EDPB - TechGDPR\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/techgdpr.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/techgdpr.com\\\/blog\\\/data-protection-digest-19022026-when-using-anonymisation-for-deletion-controllers-have-differing-degrees-of-success\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/techgdpr.com\\\/blog\\\/data-protection-digest-19022026-when-using-anonymisation-for-deletion-controllers-have-differing-degrees-of-success\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/techgdpr.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/image-3.jpeg\",\"datePublished\":\"2026-02-19T09:54:35+00:00\",\"dateModified\":\"2026-02-19T09:54:36+00:00\",\"description\":\"TechGDPR\u2019s review of the important data-related stories: when using anonymisation for deletion, controllers have differing degrees of success\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/techgdpr.com\\\/blog\\\/data-protection-digest-19022026-when-using-anonymisation-for-deletion-controllers-have-differing-degrees-of-success\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/techgdpr.com\\\/blog\\\/data-protection-digest-19022026-when-using-anonymisation-for-deletion-controllers-have-differing-degrees-of-success\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/techgdpr.com\\\/blog\\\/data-protection-digest-19022026-when-using-anonymisation-for-deletion-controllers-have-differing-degrees-of-success\\\/#primaryimage\",\"url\":\"https:\\\/\\\/techgdpr.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/image-3.jpeg\",\"contentUrl\":\"https:\\\/\\\/techgdpr.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/image-3.jpeg\",\"width\":1280,\"height\":853,\"caption\":\"deletion\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/techgdpr.com\\\/blog\\\/data-protection-digest-19022026-when-using-anonymisation-for-deletion-controllers-have-differing-degrees-of-success\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/techgdpr.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data protection digest 3-17 Feb 2026: When using anonymisation for deletion, controllers have differing degrees of success &#8211; EDPB\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/techgdpr.com\\\/#website\",\"url\":\"https:\\\/\\\/techgdpr.com\\\/\",\"name\":\"TechGDPR\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/techgdpr.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/techgdpr.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/techgdpr.com\\\/#organization\",\"name\":\"TechGDPR\",\"url\":\"https:\\\/\\\/techgdpr.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/techgdpr.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/staging.techgdpr.com\\\/wp-content\\\/uploads\\\/2018\\\/04\\\/TGDPR_logo_500px.png\",\"contentUrl\":\"https:\\\/\\\/staging.techgdpr.com\\\/wp-content\\\/uploads\\\/2018\\\/04\\\/TGDPR_logo_500px.png\",\"width\":501,\"height\":334,\"caption\":\"TechGDPR\"},\"image\":{\"@id\":\"https:\\\/\\\/techgdpr.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/techgdpr\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/techgdpr\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/techgdpr.com\\\/#\\\/schema\\\/person\\\/07e9c14fd01b25bd2c1907537e8547e8\",\"name\":\"Olya Vasylyk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/techgdpr.com\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/readyIMG_3694-1-2-150x150.jpg\",\"url\":\"https:\\\/\\\/techgdpr.com\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/readyIMG_3694-1-2-150x150.jpg\",\"contentUrl\":\"https:\\\/\\\/techgdpr.com\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/readyIMG_3694-1-2-150x150.jpg\",\"caption\":\"Olya Vasylyk\"},\"description\":\"Creator and editor of TechGDPR\u2019s weekly Digest. Postgraduate masters Diploma in Data Protection, Digital law and Management. Over a decade Olga previously was a broadcast journalist in Ukraine and France specializing in international affairs.\",\"url\":\"https:\\\/\\\/techgdpr.com\\\/blog\\\/author\\\/olyav\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data protection digest 3-17 Feb 2026: When using anonymisation for deletion, controllers have differing degrees of success - EDPB - TechGDPR","description":"TechGDPR\u2019s review of the important data-related stories: when using anonymisation for deletion, controllers have differing degrees of success","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/techgdpr.com\/blog\/data-protection-digest-19022026-when-using-anonymisation-for-deletion-controllers-have-differing-degrees-of-success\/","og_locale":"en_US","og_type":"article","og_title":"Data protection digest 3-17 Feb 2026: When using anonymisation for deletion, controllers have differing degrees of success - EDPB - TechGDPR","og_description":"TechGDPR\u2019s review of the important data-related stories: when using anonymisation for deletion, controllers have differing degrees of success","og_url":"https:\/\/techgdpr.com\/blog\/data-protection-digest-19022026-when-using-anonymisation-for-deletion-controllers-have-differing-degrees-of-success\/","og_site_name":"TechGDPR","article_published_time":"2026-02-19T09:54:35+00:00","article_modified_time":"2026-02-19T09:54:36+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/image-3.jpeg","type":"image\/jpeg"}],"author":"Olya Vasylyk","twitter_card":"summary_large_image","twitter_creator":"@techgdpr","twitter_site":"@techgdpr","twitter_misc":{"Written by":"Olya Vasylyk","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/techgdpr.com\/blog\/data-protection-digest-19022026-when-using-anonymisation-for-deletion-controllers-have-differing-degrees-of-success\/#article","isPartOf":{"@id":"https:\/\/techgdpr.com\/blog\/data-protection-digest-19022026-when-using-anonymisation-for-deletion-controllers-have-differing-degrees-of-success\/"},"author":{"name":"Olya Vasylyk","@id":"https:\/\/techgdpr.com\/#\/schema\/person\/07e9c14fd01b25bd2c1907537e8547e8"},"headline":"Data protection digest 3-17 Feb 2026: When using anonymisation for deletion, controllers have differing degrees of success &#8211; EDPB","datePublished":"2026-02-19T09:54:35+00:00","dateModified":"2026-02-19T09:54:36+00:00","mainEntityOfPage":{"@id":"https:\/\/techgdpr.com\/blog\/data-protection-digest-19022026-when-using-anonymisation-for-deletion-controllers-have-differing-degrees-of-success\/"},"wordCount":1547,"publisher":{"@id":"https:\/\/techgdpr.com\/#organization"},"image":{"@id":"https:\/\/techgdpr.com\/blog\/data-protection-digest-19022026-when-using-anonymisation-for-deletion-controllers-have-differing-degrees-of-success\/#primaryimage"},"thumbnailUrl":"https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/image-3.jpeg","keywords":["Artificial Intelligence","cookies","data subject access requests","dpo","GDPR Compliance","right to be forgotten"],"articleSection":["Data Protection Digest","GDPR"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/techgdpr.com\/blog\/data-protection-digest-19022026-when-using-anonymisation-for-deletion-controllers-have-differing-degrees-of-success\/","url":"https:\/\/techgdpr.com\/blog\/data-protection-digest-19022026-when-using-anonymisation-for-deletion-controllers-have-differing-degrees-of-success\/","name":"Data protection digest 3-17 Feb 2026: When using anonymisation for deletion, controllers have differing degrees of success - EDPB - TechGDPR","isPartOf":{"@id":"https:\/\/techgdpr.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/techgdpr.com\/blog\/data-protection-digest-19022026-when-using-anonymisation-for-deletion-controllers-have-differing-degrees-of-success\/#primaryimage"},"image":{"@id":"https:\/\/techgdpr.com\/blog\/data-protection-digest-19022026-when-using-anonymisation-for-deletion-controllers-have-differing-degrees-of-success\/#primaryimage"},"thumbnailUrl":"https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/image-3.jpeg","datePublished":"2026-02-19T09:54:35+00:00","dateModified":"2026-02-19T09:54:36+00:00","description":"TechGDPR\u2019s review of the important data-related stories: when using anonymisation for deletion, controllers have differing degrees of success","breadcrumb":{"@id":"https:\/\/techgdpr.com\/blog\/data-protection-digest-19022026-when-using-anonymisation-for-deletion-controllers-have-differing-degrees-of-success\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/techgdpr.com\/blog\/data-protection-digest-19022026-when-using-anonymisation-for-deletion-controllers-have-differing-degrees-of-success\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/techgdpr.com\/blog\/data-protection-digest-19022026-when-using-anonymisation-for-deletion-controllers-have-differing-degrees-of-success\/#primaryimage","url":"https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/image-3.jpeg","contentUrl":"https:\/\/techgdpr.com\/wp-content\/uploads\/2026\/02\/image-3.jpeg","width":1280,"height":853,"caption":"deletion"},{"@type":"BreadcrumbList","@id":"https:\/\/techgdpr.com\/blog\/data-protection-digest-19022026-when-using-anonymisation-for-deletion-controllers-have-differing-degrees-of-success\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/techgdpr.com\/"},{"@type":"ListItem","position":2,"name":"Data protection digest 3-17 Feb 2026: When using anonymisation for deletion, controllers have differing degrees of success &#8211; EDPB"}]},{"@type":"WebSite","@id":"https:\/\/techgdpr.com\/#website","url":"https:\/\/techgdpr.com\/","name":"TechGDPR","description":"","publisher":{"@id":"https:\/\/techgdpr.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/techgdpr.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/techgdpr.com\/#organization","name":"TechGDPR","url":"https:\/\/techgdpr.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/techgdpr.com\/#\/schema\/logo\/image\/","url":"https:\/\/staging.techgdpr.com\/wp-content\/uploads\/2018\/04\/TGDPR_logo_500px.png","contentUrl":"https:\/\/staging.techgdpr.com\/wp-content\/uploads\/2018\/04\/TGDPR_logo_500px.png","width":501,"height":334,"caption":"TechGDPR"},"image":{"@id":"https:\/\/techgdpr.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/techgdpr","https:\/\/www.linkedin.com\/company\/techgdpr"]},{"@type":"Person","@id":"https:\/\/techgdpr.com\/#\/schema\/person\/07e9c14fd01b25bd2c1907537e8547e8","name":"Olya Vasylyk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/techgdpr.com\/wp-content\/uploads\/2021\/10\/readyIMG_3694-1-2-150x150.jpg","url":"https:\/\/techgdpr.com\/wp-content\/uploads\/2021\/10\/readyIMG_3694-1-2-150x150.jpg","contentUrl":"https:\/\/techgdpr.com\/wp-content\/uploads\/2021\/10\/readyIMG_3694-1-2-150x150.jpg","caption":"Olya Vasylyk"},"description":"Creator and editor of TechGDPR\u2019s weekly Digest. Postgraduate masters Diploma in Data Protection, Digital law and Management. Over a decade Olga previously was a broadcast journalist in Ukraine and France specializing in international affairs.","url":"https:\/\/techgdpr.com\/blog\/author\/olyav\/"}]}},"_links":{"self":[{"href":"https:\/\/techgdpr.com\/wp-json\/wp\/v2\/posts\/11568","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techgdpr.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techgdpr.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techgdpr.com\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/techgdpr.com\/wp-json\/wp\/v2\/comments?post=11568"}],"version-history":[{"count":17,"href":"https:\/\/techgdpr.com\/wp-json\/wp\/v2\/posts\/11568\/revisions"}],"predecessor-version":[{"id":11596,"href":"https:\/\/techgdpr.com\/wp-json\/wp\/v2\/posts\/11568\/revisions\/11596"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techgdpr.com\/wp-json\/wp\/v2\/media\/11569"}],"wp:attachment":[{"href":"https:\/\/techgdpr.com\/wp-json\/wp\/v2\/media?parent=11568"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techgdpr.com\/wp-json\/wp\/v2\/categories?post=11568"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techgdpr.com\/wp-json\/wp\/v2\/tags?post=11568"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}