Connect with us

Hi, what are you looking for?


Data Protection

Solving the Right to be Forgotten Problem

The Right to be Forgotten (technically the right to erasure or for users to have personal data removed from service providers’ records) creates a big problem for suppliers. This right is becoming standard across the new global wave of data protection and consumer privacy legislation that has followed GDPR. 

The Right to be Forgotten (technically the right to erasure or for users to have personal data removed from service providers’ records) creates a big problem for suppliers. This right is becoming standard across the new global wave of data protection and consumer privacy legislation that has followed GDPR. 

The process of continuous location monitoring and/or on-demand detection of users’ data for erasure is time-consuming and costly. A new tokenization service offers a potential solution.

Tokenization is an attractive option for protecting data. For full benefit, individual characters should be tokenized. However, the processing power necessary for such a process has held back its implementation. Now the compute power and low storage cost of cloud computing is removing this restriction.

Start-up firm Rixon Technology has developed and is using its own patented cloud-based vaultless tokenization engine to provide flexible and almost real-time tokenization and detokenization.

(See SecurityWeek’s report on tokenization and encryption for more information on tokenization technology.)

The basic Rixon approach to tokenization is that cleartext should never be stored on its customer’s network. Raw text is sent to the cloud tokenization engine and returned as tokens. The original cleartext is stored neither locally nor in the cloud – the engine simply remembers the tokenization process. This is held in immutable cloud servers that cannot be accessed by any human, whether the customer, a hacker or Rixon itself. If the server detects anything unusual, it simply burns itself down and rebuilds elsewhere.

Rixon invited Joseph Demarest, former assistant director for the cyber division of the FBI, to review its security. “I couldn’t find any gaps,” he told SecurityWeek. “The technology is durable, very fast, flexible and customizable. The customer retains ownership of the data and can decide on its security policy based on its own risk tolerances.”

Advertisement. Scroll to continue reading.

Demarest believes that security needs a change of direction. The old moat and castle approach clearly no longer works. “We had a saying in the Bureau,” he said: “if you try to protect everything, you end up protecting nothing.” But concentrating on protecting the data is different. “Tokenization has the potential to transform the way organizations manage and protect their data,” he added.

Tokenization is by nature format-preserving, which means that tokenized data can still be processed by existing applications. Since individual characters can be tokenized, enough of the cleartext can be retained to be useful to the company without being useful to any criminal – for example, the last four characters of a bank card number or a portion of an email address that can confirm the identity. 

Rixon has now combined the power and flexibility of its tokenization technology to produce a solution to the RTBF problem by giving control of personal data back to the data owner; that is, the user.

RTBF – the user’s right to have PII erased

PII is ubiquitous within business. It is basically ‘customer information’. RTBF requires that every instance of PII should be available for deletion on demand. But most companies don’t know where it is held. It could be in databases; it could be free form in emails and letters; and with the rise of remote working, it could be on employees’ home computers in spreadsheets or in their Shadow IT cloud apps.

Much of this PII is initially captured by online retailers for purchasing transactions. With Rixon’s RTBF solution, the Rixon customer – such as an online retailer or service provider – can add an additional button to its online payment data collection form. The button is a toggle between ‘allow’ and ‘forget’. The initial state is ‘allow’.

When a user enters payment data into the form it is encrypted and sent to the tokenization engine where that information is tokenized. Since the initial state of the allow/forget button is set to allow, the vendor is ‘allowed’ to see the cleartext detokenized data. Payment for the purchased goods can proceed and be processed.

But if the user subsequently decides, on completion of the transaction, that he or she does not want the vendor to keep any personal information, the toggle button can be switched to ‘forget’. This sends an instruction to the tokenization engine, and the vendor’s ability to see cleartext is immediately removed. All that remains is the meaningless tokenized characters.

User ‘consent’ is given by entering the data and is removed by resetting the toggle button to forget. The vendor is released from any need to manage PII, and data auditing becomes simple: there is no PII to audit.

The flexibility of the system goes further. Provided the user retains the initial data entry form, the toggle button can be switched back to ‘allow’. If that user wishes to make future purchases from the same vendor using the same bank card, switching to ‘allow’ immediately allows the vendor to see the detokenized data to process the purchase. The user can subsequently switch to ‘forget’, to once again remove the PII from the vendors system. 

This allow/forget/allow process can be continued indefinitely. It means that the user has control over personal data and its use, and the vendor no longer has to manage or worry about PII. The vendor is protected from any compliance issues because he doesn’t store any personal data. He is less attractive to hackers since there is no PII to steal, and data auditing requirements are minimized if not effectively eliminated.

On October 14, 2021, Rixon Technology was announced as one of three platinum award winners in the annual Pepperdine ‘Most Fundable Companies’ competition. This year, 3,300 U.S start-ups entered the competition.

Related: Tokenization: Benefits and Challenges for Securing Transaction Data

Related: California Attorney General Outlines Enforcement of Upcoming Privacy Law

Related: Eight Steps to Data Privacy Regulation Readiness

Related: The Implications of China’s New Personal Information Protection Law

Written By

Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.


The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...