Destructive Actions
Handling irreversible operations in FERIN registers: redaction, deletion, and content removal with appropriate safeguards.
Understanding Destructive Actions
FERIN is designed for persistence and traceability. However, some situations require removing or hiding content. This guide covers how to handle these cases properly.
Types of Destructive Actions
| Action | Visibility | Reversibility | Use Case |
|---|---|---|---|
| Invalidation | Item visible, marked invalid | Fully reversible | Item no longer appropriate for use |
| Redaction | Content hidden, record exists | Partially reversible | Remove sensitive content |
| Tombstoning | Placeholder only | Irreversible | Complete removal |
| Purging | Completely removed | Irreversible | Legal/GDPR requirements |
Invalidation vs Deletion
FERIN's preferred approach is invalidation, not deletion. Invalidated items remain in the register with their history preserved.
When to Invalidate
- Item contains errors that cannot be corrected
- Item was created based on incorrect information
- Item is superseded by a new item
- Item is no longer relevant or appropriate
When Deletion May Be Required
- Legal order requires removal
- GDPR right to erasure applies
- Sensitive data exposed in content
- Copyright or licensing violation
Invalidation
- ✓ History preserved
- ✓ References remain valid
- ✓ Fully auditable
- ✓ Reversible if needed
- ✓ Aligns with FERIN principles
Deletion
- ✗ History lost
- ✗ References break
- ✗ Audit trail incomplete
- ✗ Irreversible
- ✗ Requires special handling
Redaction
Redaction removes specific content while preserving the record and its identifier. Use redaction when you need to hide content without breaking references.
Redaction Process
- Identify content requiring redaction
- Create proposal (if governed) with justification
- Obtain approval from appropriate authority
- Replace content with redaction marker
- Preserve redaction metadata
- Update search indexes
Redaction Record
{
"id": "urn:example:item:abc123",
"content": {
"name": "Example Item",
"description": "[REDACTED - Privacy concern - 2024-03-15]",
"status": "valid"
},
"redactions": [
{
"date": "2024-03-15",
"field": "description",
"reason": "Privacy concern",
"approvedBy": "Control Body",
"proposalId": "prop-789"
}
]
}What to Redact
- Personal identifying information (PII)
- Confidential business information
- Security-sensitive details
- Legally protected content
Tombstoning
Tombstoning replaces an item with a minimal placeholder, preserving the identifier but removing all content. This is more aggressive than redaction but less than purging.
Tombstone Record
{
"id": "urn:example:item:abc123",
"status": "removed",
"tombstone": {
"date": "2024-03-15",
"reason": "Legal order #12345",
"removedBy": "Register Manager",
"approvalRef": "legal-order-12345"
},
"content": null,
"versions": []
}When to Use Tombstoning
- Court order requires removal
- Severe content violation
- Security vulnerability in content
- Complete content removal required
Tombstone vs Purge
| Aspect | Tombstone | Purge |
|---|---|---|
| Identifier exists | Yes | No |
| Record of removal | Yes | No (or separate log) |
| References work | Yes (returns tombstone) | No (404 error) |
| History retained | No | No |
Purging
Purging completely removes an item and its history. This is the most destructive action and should be extremely rare.
When Purging Is Necessary
- GDPR right to erasure with no exceptions
- Court order explicitly requiring destruction
- Illegal content that must be completely removed
Purging Process
- Obtain legal/compliance approval
- Document justification thoroughly
- Identify all copies and backups
- Remove from primary database
- Remove from backups (or mark for exclusion)
- Remove from search indexes
- Remove from caches
- Update any foreign key references
- Create purge audit record (separate from register)
Purge Audit Log
Maintain a separate, immutable log of all purges:
{
"purgeId": "purge-2024-0001",
"date": "2024-03-15T14:30:00Z",
"itemId": "urn:example:item:abc123",
"reason": "GDPR right to erasure request #789",
"approvedBy": "Data Protection Officer",
"executedBy": "Register Manager",
"systemsPurged": [
"primary-database",
"search-index",
"cache-layer"
],
"backupsAffected": [
"daily-backup-2024-03-14",
"weekly-backup-2024-03-10"
],
"legalBasis": "GDPR Article 17"
}GDPR Considerations
The General Data Protection Regulation (GDPR) requires specific handling of personal data, including the right to erasure.
Right to Erasure (Article 17)
Individuals have the right to request deletion of their personal data when:
- Data is no longer necessary for original purpose
- Consent is withdrawn
- Data was unlawfully processed
- Legal obligation requires erasure
Exceptions
Erasure may not be required when data is needed for:
- Freedom of expression and information
- Compliance with legal obligation
- Public health purposes
- Archiving in the public interest
- Establishment, exercise, or defense of legal claims
Register-Specific Considerations
Identify Personal Data
Know which items contain personal data and what data they contain.
Data Minimization
Only collect personal data necessary for register purpose.
Retention Policy
Define how long personal data is kept and why.
Erasure Procedure
Have a documented process for handling erasure requests.
Safeguards
Implement these safeguards for destructive actions:
Technical Safeguards
- Role-based access: Only specific roles can execute destructive actions
- Approval workflow: Require second-person approval for destructive actions
- Soft delete first: Mark for deletion, purge later after confirmation
- Audit everything: Log all destructive actions immutably
- Backup verification: Confirm backups are appropriately handled
Process Safeguards
- Legal review: Require legal/compliance sign-off for purges
- Waiting period: Implement delay between request and execution
- Notification: Notify relevant parties before destructive actions
- Documentation: Require thorough justification documentation
- Regular review: Periodically review destructive action logs
Implementation Checklist
Before Destructive Action
- ☐ Justification documented
- ☐ Legal/compliance approval obtained
- ☐ Alternative approaches considered
- ☐ Impact on references assessed
During Execution
- ☐ Authorized user executes
- ☐ All copies identified
- ☐ Audit log created
- ☐ Search indexes updated
After Execution
- ☐ Verification of removal
- ☐ Backup handling confirmed
- ☐ Stakeholders notified
- ☐ Documentation complete