A Step-by-Step Guide to Performing a GDPR ‘Right to Erasure’ Request Using Selective Data Restoration

The GDPR’s “Right to Erasure” (or “Right to be Forgotten”) empowers individuals to request the deletion of their personal data. For businesses, handling such requests correctly is not just a legal obligation but a crucial aspect of data integrity and trust. Traditional data deletion methods can be blunt, risking the loss of essential related information that is *not* subject to erasure. This guide provides a practical, step-by-step approach to navigate a GDPR erasure request, leveraging the strategic advantage of selective data restoration tools—like those integrated into robust CRM backup solutions—to ensure compliance without compromising your business-critical data.

Step 1: Validate the Erasure Request and Identity

Upon receiving a Right to Erasure request, your immediate priority is to validate its legitimacy and the identity of the individual making it. GDPR specifies certain conditions under which the right applies (e.g., data is no longer necessary, consent is withdrawn, unlawful processing). Begin by acknowledging receipt promptly and requesting sufficient information to verify the data subject’s identity. This prevents malicious actors from requesting deletion of another person’s data. Document all communication, including how identity was verified and the specific scope of the request. A clear, auditable trail is paramount for demonstrating compliance and managing potential disputes, ensuring your process withstands scrutiny.

Step 2: Identify All Relevant Personal Data for Erasure

Once the request is validated, conduct a thorough audit across all your systems to identify every instance of the data subject’s personal data. This includes not only your primary CRM (like Keap) but also marketing automation platforms, HR systems, customer service databases, email archives, and any physical records. Critically, distinguish between data that *must* be erased and data that might be exempt (e.g., data required for legal obligations, contractual necessity, or legitimate business interests not overridden by the individual’s rights). This comprehensive mapping is essential for precise execution, particularly when preparing for a selective restoration strategy that isolates the data to be acted upon.

Step 3: Plan for Selective Erasure and Data Preservation

This step is where the strategic advantage of selective data restoration comes into play. Instead of a wholesale deletion that might remove critical, non-personal data linked to the individual (e.g., historical sales records, project data, or internal notes not considered personal), plan a targeted approach. Utilizing a CRM-backup solution with selective restore capabilities allows you to conceptually “isolate” the data. The strategy here is to identify what *must* be erased, and what *can and should* be preserved due to legal or legitimate business reasons. This pre-planning minimizes the risk of over-erasure and ensures that valuable operational insights remain intact while respecting the individual’s rights.

Step 4: Execute the Erasure using a Controlled Process

With your plan in hand, proceed with the actual data erasure. For systems like Keap, this typically involves direct deletion of contact records and associated personal fields. However, if your strategy involves selective restoration, you might first perform a comprehensive backup of the *entire* relevant dataset. Then, delete the specific personal data fields/records as per the validated request. Subsequently, use your selective restoration tool to bring back only the *non-personal* or *legitimately retained* data that was inadvertently removed during the broad deletion. This method ensures surgical precision, leaving behind only the data you are legally permitted and operationally required to keep.

Step 5: Verify Deletion and Update Data Minimization Protocols

After executing the erasure, it’s imperative to verify that all specified personal data has indeed been permanently removed from all identified systems and backups (where applicable and appropriate for the backup type). This verification often involves cross-referencing your data inventory and potentially performing system checks. Furthermore, take this opportunity to review and update your data minimization and retention policies. This proactive step helps prevent future GDPR challenges by ensuring you are only collecting and retaining necessary data for defined periods. Documenting these internal reviews and updates reinforces your commitment to ongoing data protection compliance.

Step 6: Confirm Erasure with the Data Subject and Document Compliance

The final step is to inform the data subject that their request has been fulfilled. This communication should be clear, concise, and confirm the specific actions taken. Maintain a comprehensive record of the entire process, including the initial request, identity verification, data mapping, the specific actions taken for erasure (and any selective restoration if applicable), internal approvals, and the final confirmation sent to the data subject. This detailed documentation serves as irrefutable proof of your organization’s adherence to GDPR regulations, protecting your business from potential penalties and upholding your reputation for robust data governance.

If you would like to read more, we recommend this article: Selective Field Restore in Keap: Essential Data Protection for HR & Recruiting with CRM-Backup

By Published On: December 16, 2025

Ready to Start Automating?

Let’s talk about what’s slowing you down—and how to fix it together.

Share This Story, Choose Your Platform!