checklist
Are You Ready for DSAR Fulfillment?
Share this doc:
Fulfilling data subject access requests (DSARs) can seem daunting. To make the task manageable, you need a plan that adequately and efficiently fulfills the volume of requests you receive.
Review the following steps to assess your current processes and identify any gaps to fill or opportunities to improve.
DSAR Fulfillment Steps
Check off each action that you and your organization implement:
1. Local Data
If you left a box unchecked, you have more work to do. Use the following guidance to begin strategizing how to close these gaps.
Evaluation Questions:
- What processing pre-checks do you have in place?
- How do you define personal data?
- What are your data classification practices?
- Where is data being stored across internal systems and third-party platforms?
- Do you maintain an up-to-date, accurate, and complete data map?
Why It Matters:
Running pre-checks before processing a DSAR can help you avoid taxing your resources unnecessarily.
Understanding and evaluating your data governance processes, like the quality of your data map, can help you confidently locate all of the data required to fulfill a DSAR.
2. Assemble Data
If you left a box unchecked, you have more work to do. Use the following guidance to begin strategizing how to close these gaps.
Evaluation Questions:
- Do you have a ready-to-use format for DSAR responses?
- How do you ensure that you will not compromise another user's privacy when you respond to a DSAR?
- What is your current process for redaction when assembling data for a DSAR response?
- What kind of tools and/or software would be beneficial to scale your DSAR fulfillment process?
Why It Matters:
The format and size of your response will depend on the type of data you collect and the characteristics of your users.
Creating templates will enable you to reduce some of the strain on your systems and resources.
While you aren't required to accommodate a user's personal preferences, you must make sure your fulfillment processes keep your users safe. Redaction can be costly and time consuming, but it is critical to ensure other users' data isn't compromised. Choosing whether you buy or build tools will depend on your current resources, processes, and expected DSAR volume.
3. Approve & Deliver
If you left a box unchecked, you have more work to do. Use the following guidance to begin strategizing how to close these gaps.
Evaluation Questions:
- How do you stay up-to-date on applicable data privacy laws?
- What are your requirements for approving and delivering DSAR responses?
- How long does fulfillment take, on average, from DSAR submission to delivery?
- What steps, if any, do you currently take to ensure that the DSAR responses are secure during transit and delivered within the required timeframe?
Why It Matters:
Working with teams like legal and privacy will help you stay compliant as regulations evolve.
Defining requirements around DSAR response approval and delivery will help you stay compliant and fulfill DSARs on time.
Maintaining strong security standards, like safe delivery and strict access controls, is essential to building trust with your users.
4. Delete
If you left a box unchecked, you have more work to do. Use the following guidance to begin strategizing how to close these gaps.
Evaluation Questions:
- Do you have a specific retention period for storing DSAR response data?
- How long do you give users to download their DSAR response before deleting that data?
- How do you log the DSARs that you receive, process, and fulfill?
- What metrics are you currently required to report under applicable data privacy laws, and how often are you required to do so?
- Does your dashboard enable you to report on DSAR metrics when you need to, with all required information?
Why It Matters:
Deleting DSAR response data after a specified retention period helps reduce your attack surface by eliminating unnecessary copies of your users' personal data.
Logging DSARs you receive, process, and fulfill helps you prepare for potential audits and stay compliant with applicable data privacy laws.