As digital takes its place at the center of most businesses across the world, the issue of consumer privacy has become a critical concern. It is disconcerting to witness a prevalent trend among businesses: the hoarding of consumer personal data long after its initial necessity, often without proper mechanisms for permanent deletion. This practice has thrived unchecked for too long, raising serious concerns about data security, privacy, and the potential serious ramifications for consumers. In this technical blog, I delve into the reasons behind this data hoarding, the impact on consumers, recent hacking events in Australia, and the imperative need for businesses to embrace a comprehensive approach to data security, including the critical practice of data deletion.

The Data Hoarding Dilemma

1. Lack of Regulatory Enforcement

One of the key reasons why businesses persist in holding onto consumer data indefinitely is the absence of stringent regulatory enforcement. While privacy laws may dictate that companies should not retain data for longer than necessary, the lack of severe consequences for non-compliance has allowed this practice to persist.

2. Monetisation of Consumer Data

Companies often view consumer data as a valuable asset that can be monetised through targeted advertising, data analytics, or even sold to third parties. The prospect of financial gain creates a strong incentive for businesses to retain data well beyond its initial utility.

3. Inadequate Data Governance Policies

Some businesses lack robust data governance policies, including clear guidelines on data retention and deletion. Without a structured framework for managing consumer data throughout its lifecycle, the default becomes data accumulation rather than responsible data management.

The Unchecked Practice and Its Impact on Consumers

1. Privacy Erosion

Persistent data hoarding erodes consumer privacy, leaving individuals vulnerable to identity theft, unauthorised profiling, and other malicious activities. The more data stored, the greater the risk of exposure in the event of a security breach.

2. Increased Target for Cyber Attacks

Businesses holding vast amounts of consumer data become attractive targets for cybercriminals. The larger the dataset, the more enticing it is for hackers seeking valuable information for various nefarious purposes.

3. Loss of Control Over Personal Information

Consumers lose control over their personal information when companies retain it indefinitely. The right to be forgotten is a fundamental aspect of privacy, allowing individuals to manage and control their digital footprint.

Recent Hacking Events in Australia

1. Parliament House Hack (2019)

In 2019, Australia experienced a significant cybersecurity incident when the Parliament House suffered a massive data breach. Personal details of politicians and staffers were compromised, highlighting the severity of the threat to sensitive information.

2. Australian National University (ANU) Breach (2018)

In 2018, ANU fell victim to a cyberattack resulting in unauthorised access to significant amounts of personal data, including bank account details. The incident underscored the importance of robust cybersecurity measures to protect sensitive information.

3. Bomgar Data Leak (2020)

In 2020, Bomgar, a remote support solutions provider, faced a data leak that exposed sensitive customer data. The incident shed light on the interconnected nature of data security, emphasising the need for stringent controls, even among third-party service providers.

3. DP World (2023)

Stevedore, DP World, confirmed hackers stole data during a breach that forced it to shut down ports around the country. It is believed the hack was likely to have stemmed from a failure to patch a widely known security flaw.

The Need for Data Deletion

1. Reducing the Attack Surface

By deleting unnecessary consumer data, businesses can significantly reduce their attack surface. The less data stored, the fewer potential entry points for cybercriminals to exploit.

2. Compliance with Privacy Regulations

Adhering to data deletion practices ensures compliance with privacy regulations, such as the European Union’s General Data Protection Regulation (GDPR) and the Australian Privacy Principles (APPs), which emphasise the necessity of limiting data storage to the period required for the specified purpose.

3. Enhancing Data Management Efficiency

Clear data deletion policies streamline data management processes. Businesses can allocate resources more efficiently, focusing on securing and managing the data that truly matters.

Technical Measures for Proper Data Security

1. Encryption and Tokenisation

Implementing encryption and tokenization techniques ensures that even if data is compromised, it remains indecipherable without the corresponding cryptographic keys.

2. Regular Security Audits and Penetration Testing

Conducting regular security audits and penetration testing helps identify vulnerabilities in the system, allowing businesses to proactively address potential security risks.

3. Data Anonymisation and Pseudonymisation

Anonymising or pseudonymising data can provide an additional layer of protection by making it challenging to associate specific information with individual identities.

4. Role-Based Access Controls

Implementing role-based access controls ensures that only authorised personnel have access to sensitive consumer data, reducing the risk of internal threats.

5. Automated Data Deletion Policies

Integrating automated data deletion policies into systems ensures that data is purged after the expiration of its retention period, minimising the chances of inadvertent data hoarding.


It is imperative to recognise the significance of responsible data management. The right to be forgotten is not just a legal obligation; it is a crucial aspect of preserving consumer privacy and protecting against the evolving threat landscape. Recent hacking events in Australia serve as stark reminders of the vulnerabilities inherent in data-rich environments. To address this, businesses must not only fortify their cybersecurity measures but also embrace the ethical imperative of data deletion. By adopting technical measures and robust policies, companies can navigate the delicate balance between leveraging consumer data and respecting the fundamental right to digital oblivion. In the evolving cyber landscape, the right to be forgotten stands as a beacon, guiding businesses toward a more secure and privacy-centric future.

Get our latest news
and insights delievered
to your inbox___

Contact Newpath Team Today
Back to top