Dangerous Failure Modes in Privacy Compliance
SHADOW COPIES IN UNEXPECTED PLACES
Data exists in more places than tracked: logs, snapshots, backups, CDN caches, search indexes, queues. Deletion from primary database leaves copies in many other locations. Audit all data flows—not just obvious ones.
MODEL MEMORIZATION
Large models can memorize training examples verbatim. A language model may output user emails when prompted. Even after deleting source data, models retain it. Detection: membership inference attacks. Mitigation: differential privacy, output filtering.
IDENTIFIER MISMATCH
User requests deletion by email, but ML uses internal user_id. DSAR orchestrator cannot map—deletion fails silently. Systems report success while data remains. Solution: universal identity graph linking all identifiers.
THIRD-PARTY VENDOR GAPS
Data shared with vendors does not get deleted. GDPR holds you responsible for processor compliance. Require contractual deletion SLAs and track lineage across organizational boundaries.