So if there were a request to destroy data, as per some pre-existing protocol within a particular department, would the department in question, which is your client, be able to do that from their own system or would they actually have to provide you with a request to destroy data?
On December 3rd, 2013. See this statement in context.