AMLEGALSDPDPAVibe Data Privacy
Rights Management

How to Handle Data Subject Access Requests

Establishing efficient procedures for responding to Data Principal information requests

16 min read
Updated 17 January 2025

Executive Summary

The right of access enables Data Principals to understand what personal data organisations hold about them and how it is processed. Organisations must establish procedures to receive, verify, and respond to these requests within prescribed timelines. This guide provides a practical framework for access request management.

Key Takeaways

  • 1
    Establish clear intake channels for receiving access requests across all customer touchpoints
  • 2
    Implement identity verification proportionate to the sensitivity of data requested
  • 3
    Search all systems comprehensively, including backups and archived data
  • 4
    Provide responses in accessible formats within regulatory timelines
  • 5
    Document the handling process to demonstrate compliance

1Understanding the Right of Access

Section 11 grants Data Principals the right to obtain from the Data Fiduciary a summary of personal data being processed and the processing activities undertaken. This is not unlimited access to raw data but rather comprehensible information about what data exists and how it is used.

2Establishing Intake Procedures

Requests may arrive through multiple channels. Organisations need centralised procedures to capture and route them appropriately.

1

Define Intake Channels

Determine how requests will be received. Options include dedicated email addresses, web forms, in app request features, and physical mail. Publishing these channels in privacy notices guides requesters.

2

Centralise Receipt

Route all requests to a central team or system for consistent handling. Requests received by customer service, sales, or other teams should be forwarded promptly.

3

Acknowledge Receipt

Confirm receipt of the request to the requester, indicating expected timelines and any additional information needed.

4

Log and Track

Maintain a register of all requests including receipt date, requester identity, request scope, and status. This enables timeline compliance monitoring.

3Verifying Requester Identity

Before disclosing personal data, verify that the requester is indeed the Data Principal or their authorised representative. The level of verification should be proportionate to the sensitivity of data involved.

1

Authentication Methods

For existing customers, use established authentication such as account login. For others, request identifying information sufficient to match against records.

2

Authorised Representatives

Where someone requests on behalf of a Data Principal, require proof of authorisation such as a power of attorney or, for minors, evidence of guardianship.

3

Balancing Security and Accessibility

Verification should not be so onerous that it effectively denies the right. Requiring excessive documentation may itself constitute non-compliance.

Important Warnings

  • Disclosing data to an impersonator constitutes a breach. Verification is essential.
  • Demanding in-person appearance or notarised documents is generally disproportionate for routine requests.

4Searching for Responsive Data

A comprehensive search is essential. Organisations often hold personal data in more locations than initially apparent.

1

Identify Data Sources

Reference the data inventory to identify all systems containing personal data. Include databases, file shares, email systems, cloud services, and third party platforms.

2

Execute Searches

Search each identified source using appropriate identifiers. For unstructured data, this may require keyword searches or manual review.

3

Include Backups and Archives

Data in backup systems and archives remains subject to access rights. Determine whether retrieval is practicable and document the approach.

4

Check Third Party Holdings

Where processors hold data on behalf of the organisation, coordinate retrieval. Contractual arrangements should facilitate this.

5Preparing the Response

The response must be comprehensible to the requester, not merely a data dump that satisfies the letter but not the spirit of the right.

1

Organise Information Logically

Structure the response to help the requester understand what data exists and how it is processed. Group related information and use clear headings.

2

Provide Processing Context

Include information about processing purposes, categories of recipients, retention periods, and the source of data if not collected directly.

3

Use Accessible Formats

Provide the response in a format the requester can access. Common formats include PDF for documents and CSV or JSON for structured data.

4

Redact Third Party Data

Where responding would disclose another individual's personal data, redact that information unless the third party has consented to disclosure.

6Meeting Timeline Requirements

Responses must be provided within the timeframe specified in the Rules. Currently, this requires response without unreasonable delay. Organisations should establish internal targets to ensure compliance.

Practical Tips

  • Set internal deadlines shorter than regulatory requirements to allow buffer for complex requests
  • Establish escalation procedures for requests that cannot be completed within standard timelines

7Handling Complex Situations

Not all requests are straightforward. Establish procedures for common complexities.

1

Clarification Requests

If the request is unclear or overly broad, seek clarification before proceeding. This is not a delay tactic but a means to provide relevant responses.

2

Partial Responses

Where some information can be provided promptly while other searches continue, consider providing a partial response rather than delaying entirely.

3

Exemptions

Certain data may be exempt from disclosure, such as information subject to legal privilege or that would compromise security. Document the basis for any exemption claimed.

4

Denials

If the request must be denied, explain the reason clearly and inform the requester of their right to complain to the Data Protection Board.

Frequently Asked Questions

Need Implementation Support?

Our data protection team can help translate these guidelines into organisation-specific policies, procedures, and technical implementations.

Get Expert Guidance