Data Protocol Docs Logo
0/

guide

DSAR Resource

4 min read

Share this doc:


Consumers exercise the right to access a copy of the personal data an organization collects about them by submitting a Data Subject Access Request, or DSAR.

Before you begin responding to DSARs, it's important to know which rules apply to you.

GDPR VS. CCPA Overview

Use this table to help you understand the nuances of leading legislation like the General Data Protection Regulation (GDPR), and the California Consumer Privacy Act (CCPA).

JurisdictionIndividuals within the European Union
Personal DataDefined as any information relating to a data subject; does not apply to anonymized data
Right to DeletionApplies to all data concerning a data subject
Right to AccessData subjects have the right to request access to their personal data; they must be informed of their rights at the point of data collection
Portability RequirementShare data electronically unless a data subject requests otherwise

According to leading regulations...

Data subjects can request:

Companies are legally required to fulfill these requests. Adhering to the strictest and most common requirements can help you stay ahead and comply with most data privacy laws. Use this evaluation to see if you're on the right track.

Is submitting a DSAR clear, simple, and free for your users?

Do you verify user identity before they submit their request?

Do you include all of the user's personal data in their response?

Does your response maintain the privacy of other users?

Do you respond to requests within 30 days or less?

If you answered “No” to any of these questions, you have more work to do. Identify which questions you responded “No” to, then assess and align your stakeholders to address these gaps.

Once you understand what your data subjects are entitled to and whether or not you're respecting those rights, you're ready to respond to DSARs. Use this step-by-step DSAR Guide to help you define an ideal plan for processing, fulfilling, and scaling data requests at your organization:

Step 1Establish a reasonable cadence for how often users can submit a request
Step 2Design a submission feature that is free, easy to find, and easy to use
Step 3Build a mechanism to verify user identity
Step 4Map user identities for accurate data collection
Step 5Design functionality to register and log DSARs
Step 6Consider exceptions to fulfilling DSARs

For more on this topic, take the Courses:


Data Protocol Course

DSAR Fundamentals

This short code walks you through five requirements to help you comply with the evolving legislative landscape and respond to Data Subject Access Requests.

Get Started
Data Protocol Course

Processing DSARs

This course walks you through creating an efficient processing workflow that will enable scale.

Get Started

Share this doc:


Your privacy matters.

By clicking "Accept All", you are agreeing to Data Protocol's Cookie Policy.