{"id":468,"date":"2024-05-02T10:23:21","date_gmt":"2024-05-02T08:23:21","guid":{"rendered":"https:\/\/stage.usercentrics.com\/?post_type=knowledge&#038;p=12641"},"modified":"2025-06-24T13:11:29","modified_gmt":"2025-06-24T11:11:29","slug":"data-subject-access-requests","status":"publish","type":"knowledge","link":"https:\/\/usercentrics.com\/us\/knowledge-hub\/data-subject-access-requests\/","title":{"rendered":"What is a data subject access request (DSAR)? How-to guide"},"content":{"rendered":"<p>Today\u2019s consumers are more data-conscious than ever before. As spending power increasingly lies with digital natives who are savvy to the internet\u2019s privacy risks, businesses need to optimize their approach to data privacy and protection.<\/p>\n<p>In addition to ensuring robust data security and consent management practices, this means being ready to respond to customers when they ask about the data you\u2019ve collected on them or when they make requests about it, like for correction or deletion. This is not just a customer service function; they are legal rights granted to consumers under many data privacy laws.<\/p>\n<p>This type of request, known as a <a href=\"https:\/\/usercentrics.com\/knowledge-hub\/data-is-the-new-gold-how-and-why-it-is-collected-and-sold\/\">data subject access request (DSAR)<\/a> is increasingly common as more data privacy laws are passed around the world and consumers learn more about their rights. According to the <a href=\"https:\/\/www.cisco.com\/c\/en\/us\/about\/trust-center\/consumer-privacy-survey.html#~key-findings\" target=\"_blank\" rel=\"noopener\">Cisco 2023 Consumer Privacy Survey<\/a>, nearly 30% of international respondents have exercised their right to request this information, and this number will only increase year on year.<\/p>\n<p>In this article, we\u2019ll explain what DSARs are, how to prepare to receive and respond to them compliantly, and how to proceed whenever your business receives one.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-a-data-subject-access-request-dsar\">What is a data subject access request (DSAR)?<\/h2>\n\n\n<p>A DSAR is a request from a member of the public, often a company\u2019s users or customers, but depending on the regulatory jurisdiction, can include business partners or employees, among others \u2014 regarding the personal data that a company has collected about them.<\/p>\n<p>This can be a request to see specific categories of information collected, or all of it, within a specified time frame. Data collected in the last 12 months is a common parameter. As this is a consumer privacy right conferred by regulation, companies are required to respond within a set time frame, or to notify the person making the request if they are unable to respond within the prescribed time period.<\/p>\n<p>Consumers can make requests beyond just seeing their data, however. They can request that the company stop collecting and processing their data and delete what they have. They can request information about the company\u2019s use of automated decision-making. They can often ask for a portable copy of their data that they can use elsewhere, possibly with a competitor\u2019s product or service.<\/p>\n\n<h3>Opt-in and opt-out consent models<\/h3>\n<p>The right to submit a DSAR is included in modern and comprehensive privacy laws passed to date, including laws that use both opt-in and opt-out models for obtaining consumer consent.<\/p>\n<p>Opt-in consent requires you to obtain explicit consent before collecting consumers\u2019 personal information. It\u2019s the more common consent model and the one used in regulations like the <a href=\"https:\/\/usercentrics.com\/gdpr\/\" rel=\"noopener\">European Union\u2019s General Data Protection Regulation (GDPR)<\/a>, which has been influential around the world.<\/p>\n<p>Opt-out models only require consumer consent in some cases, but require data subjects (mainly consumers) to be able to opt out of data collection and processing at any time. Consent does need to be obtained in advance in some cases, depending on the law, e.g. if personal data is categorized as sensitive or belongs to known children, or in some cases if it is to be sold or shared. Though under the <a href=\"https:\/\/usercentrics.com\/knowledge-hub\/california-consumer-privacy-act\/\">California Consumer Privacy Act (CCPA)<\/a> consumers only have to be able to opt out of sale, sharing, targeted advertising, or profiling. The <a href=\"https:\/\/usercentrics.com\/knowledge-hub\/differences-between-digital-markets-act-and-digital-services-act\/\">Digital Markets Act (DMA)<\/a> bans targeted advertising without consent.<\/p>\n<p><strong>Learn more:<\/strong> Review our explanation of how U.S. <a href=\"https:\/\/usercentrics.com\/knowledge-hub\/comparison-guide-to-us-state-level-data-privacy-laws\/\">data privacy regulations vary state by state<\/a>.<\/p>\n<h3>DSRs vs DSARs<\/h3>\n<p>The terms data subject request (DSR) and data subject access request (DSAR) are commonly used interchangeably, as we have largely done in this article. However, you may see the terms used to refer to slightly different things.<\/p>\n<p>DSRs can be used to describe a broader category that includes any request a person might make to exercise their rights regarding their personal data held by an organization.<\/p>\n<p>DSARs, on the other hand, more often specifically refer to requests to access the personal data an organization holds about someone. As noted, however, there are various ways a consumer can request access to their data, and then request what is done with it. As such, a DSAR can be seen as a kind of DSR.<\/p>\n<p>\u00a0<\/p>\n<p><a href=\"https:\/\/usercentrics.com\/wp-content\/uploads\/sites\/7\/2024\/05\/uc_blog_DSAR-infographic.svg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-10491\" src=\"https:\/\/usercentrics.com\/wp-content\/uploads\/sites\/7\/2024\/05\/uc_blog_DSAR-infographic.svg\" alt=\"Infographic presenting the rights a person can exercise under CCPA\/CPRA when making a DSAR \" \/><\/a><\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"h-who-can-submit-data-subject-access-requests\">Who can submit data subject access requests?<\/h2>\n\n\n<p>Organizations can receive DSARs from a variety of sources. They can be submitted by:<\/p>\n<ul>\n<li>any data subject covered by relevant privacy law whose personal information has been collected by a company<\/li>\n<li>the parent or legal guardian of a child who is a data subject<\/li>\n<li>an employee on behalf of their employer or a representative on behalf of a client<\/li>\n<li>a court-appointed representative of an adult who manages someone else\u2019s affairs<\/li>\n<\/ul>\n<p>As long as the requester can prove their identity and legal right to make the request, a company is required to release whatever personal data is held about the individual subject. Companies must provide a reasonable mechanism to enable people to verify their identities when making a request. However, they can also deny a request if the requester\u2019s identity cannot be reasonably verified.<\/p>\n<p>Each law specifies a time frame for both the data included and the response to such requests. For example, under the CCPA, a data subject can request data collected about them in the preceding 12 months. A person can\u2019t, for example, demand data going back 10 years. Commonly, a person also can\u2019t make more than one DSAR per calendar year. If they do, the company can either charge them a reasonable fee to fulfill it, or deny the request.<\/p>\n<p>Under various regulations, companies typically have a specified amount of time to respond to DSARs. Under the CCPA, it\u2019s 45 days, with the possibility of an extension for special circumstances. If a company cannot fulfill a request within the prescribed 45 days, it has to notify the requester with a reason before that 45-day period ends. Typically the extension is only for another period of the same amount of time, e.g. another 45 days.<\/p>\n\n\n<div class=\"wp-block-cover is-light has-custom-content-position is-position-top-left\" style=\"margin-top:var(--wp--preset--spacing--l);margin-bottom:var(--wp--preset--spacing--m);padding-top:var(--wp--preset--spacing--m);padding-right:var(--wp--preset--spacing--s);padding-bottom:var(--wp--preset--spacing--m);padding-left:var(--wp--preset--spacing--s);min-height:50px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-brand-white-background-color has-background-dim-100 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-constrained wp-container-core-cover-is-layout-6c749cc1 wp-block-cover-is-layout-constrained\">\n<h2 class=\"wp-block-heading\" id=\"h-how-do-dsars-take-place\">How do DSARs take place?<\/h2>\n\n\n<ol>\n<li style=\"font-weight: 400\">An individual contacts the company via a reasonable mechanism (e.g. email, web form) to make a request<\/li>\n<li style=\"font-weight: 400\">At the time of submitting the request, the individual also provides identity verification (commonly companies can make customers\/users login to their accounts as part of the verification process in submitting a request, but they can&#8217;t make people create a new account to send a request)<\/li>\n<li style=\"font-weight: 400\">Smaller organizations may need to handle requests manually, but larger ones, which may receive many thousands of requests, typically automate the processes (this is why it&#8217;s important to have an up-to-date data audit so responses to requests can be fulfilled in a timely manner and are accurate)<\/li>\n<li style=\"font-weight: 400\">The company receives and reviews the request, typically (auto)responds to the individual confirming receipt and the time frame for response<\/li>\n<li style=\"font-weight: 400\">If verification is not good enough, or someone is making the request for someone they can&#8217;t legally represent, they can notify the individual and ask them to re-send or get a viable representative to send the request<\/li>\n<li style=\"font-weight: 400\">If the request(s) is &#8220;manifestly unfounded or excessive&#8221; the company can deny the request or charge the individual a fee (under some laws) to fulfill it<\/li>\n<li style=\"font-weight: 400\">If the request is verifiable and reasonable, the company has a set period of time to fulfill it, depending on the law (often 45 days)<\/li>\n<li style=\"font-weight: 400\">If the company cannot fulfill the request within the specified time due to reasonable circumstances, e.g. due to a high volume of requests, before the first response period ends the company must notify the individual that they can&#8217;t fulfill the request in the required time, and will need an extension, but that they can expect a response in a set period amount of time<\/li>\n<li style=\"font-weight: 400\">The company then has to fulfill the response within the extended period&#8217;s allotted time<\/li>\n<\/ol>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-cover is-light has-custom-content-position is-position-top-left\" style=\"margin-top:var(--wp--preset--spacing--l);margin-bottom:var(--wp--preset--spacing--m);padding-top:var(--wp--preset--spacing--m);padding-right:var(--wp--preset--spacing--s);padding-bottom:var(--wp--preset--spacing--m);padding-left:var(--wp--preset--spacing--s);min-height:50px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-brand-white-background-color has-background-dim-100 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-constrained wp-container-core-cover-is-layout-6c749cc1 wp-block-cover-is-layout-constrained\"><p>Read next: <a href=\"https:\/\/usercentrics.com\/knowledge-hub\/data-privacy-in-2024-what-we-are-watching\/\">Data privacy regulation in 2024: what we\u2019re watching<\/a><\/p>\n<\/div><\/div>\n\n\n<h3>How can a DSAR be submitted?<\/h3>\n<p>Companies are required to make it relatively easy for consumers to submit a DSAR. Here are a few ways to make the process user-friendly and compliant:<\/p>\n<ul>\n<li><strong>Ease of submission:<\/strong> Companies should enable DSARs to be submitted through the same channels customers normally use to contact them, e.g. web forms or email, to help ensure the process is straightforward and accessible.<\/li>\n<li><strong>No account requirement<\/strong>: If an individual doesn\u2019t already have an account with the company, they cannot be compelled to create one just to submit a DSAR. Companies can require individuals who already have accounts to login to theirs to submit the request as part of the verification process.<\/li>\n<li><strong>Preference for written requests<\/strong>: Although not legally mandated, written requests are often preferred because they create a clear record of the interaction, facilitating a more accurate and complete response. Written records are likely to mostly be in digital format, which enables all records to be kept together in the event of an audit or future request.<\/li>\n<li><strong>Flexible wording:<\/strong> Requesters are not required to use specific terminology when making a DSAR. Simple requests like \u201cCan you send me the information you have collected on me?\u201d are as valid as more formally worded requests that cite specific regulations. Request mechanisms like a web form may provide the request language, and the requester simply has to check off the type of request(s) and verify their identity.<\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"h-when-and-how-does-a-company-have-to-respond-to-a-dsar\">When and how does a company have to respond to a DSAR?<\/h2>\n\n\n<p>Companies need to be familiar with the privacy laws relevant to them. As noted, the CCPA allows 45 days for a DSAR response, though under the GDPR they are expected to respond within one month. The phrase \u201cwithout undue delay\u201d comes up regularly in regulations and should be followed as closely as possible.<\/p>\n<p>As privacy laws generally apply to residents of a particular jurisdiction, e.g. California or the EU, companies may need to comply with multiple privacy laws, or laws for regions where the company is not physically located, as it only matters if their customers are there and those people\u2019s data is being processed.<\/p>\n<p>After receiving a DSAR and verifying the requester&#8217;s identity, a company has to respond by supplying the requested data or otherwise acting on the request, like making corrections or deleting it. Or the company must provide a specific reason why more time is needed to fulfill the request, e.g. they have a high volume of requests.<\/p>\n<p>Under the GDPR, for example, companies can extend their deadline by 60 days if it proves challenging to track down all the necessary information, but this must be clearly explained in their initial response, which must be sent within the initial 60 days.<\/p>\n<p>Companies can\u2019t ask for repeated extensions before supplying the requested data. If a company takes too long to respond to a request, it is a type of violation and risks fines, penalties, and reputational damage.<\/p>\n\n<h3>What does not have to be included in a DSAR response?<\/h3>\n<p>DSAR responses must include the personal information of the subject requesting it, which has been collected\/processed in the prescribed time frame, e.g. the last 12 months. This is for access or portability requests. For other requests, the company needs to confirm fulfillment, e.g. corrections or deletion. A company is not required to provide:<\/p>\n<ul>\n<li>more data than requested<\/li>\n<li>data that is exempted due to legal requirements, e.g. in some cases companies cannot delete personal data for a number of years<\/li>\n<li>data concerning the subject\u2019s interactions with the organization (e.g. internal account notes)<\/li>\n<li>data relating to another individual for whom they are not the legal guardian or representative (this could constitute a data breach)<\/li>\n<\/ul>\n<p>In other words, the DSAR is always for only an individual\u2019s personal data (or the person they legally represent), as defined by applicable regulations, e.g. addresses, browser activities, dates of birth, medical records, credit ratings, etc.<\/p>\n<p>Anything that can identify an individual alone or combined with other data points could count as personal data. However, the definition of <a href=\"https:\/\/usercentrics.com\/knowledge-hub\/personally-identifiable-information-vs-personal-data\/\">personal data<\/a> varies depending on the law.<\/p>\n<p>Regulations can also delineate between personal data and personally identifiable data, or specify what is considered sensitive personal data, and definitions can be different across laws.<\/p>\n<p>Some laws provide specific examples of types of such data, but others are more general. Companies can redact data in supplied documentation if it\u2019s not relevant or not legal to supply it, for instance, if it references another person\u2019s personal information.<\/p>\n\n<h3>Grounds for refusing a DSAR<\/h3>\n<p>There are only two legal grounds for refusing a DSAR: if the request is excessive, or if it\u2019s manifestly unfounded. Excessive does not mean onerous or large in scale. Rather, it means that the request overlaps with another request(s) and is therefore resource-intensive without providing the requester with any additional information.<\/p>\n<p>For example, requesting personal data from a local library every month could be deemed excessive. Under some laws, a person requesting their data from a company more than once in 12 months is not allowed for this reason. Companies can still choose to fulfill excessive requests, but under some laws can charge a reasonable fee to do so.<\/p>\n<p>However, this frequency may not be deemed excessive for large ecommerce platforms, where data changes regularly. Always err on the side of compliance and stay familiar with relevant privacy laws. Large platforms likely have automated processes for DSARs, so there would be less manual work involved, potentially, than at the local library.<\/p>\n<p>\u201cManifestly unfounded\u201d can be harder to prove. This would apply if a company doesn\u2019t hold any data on the subject, or the data is all very old and does not fall within the required time frame, so the DSAR is in error.<\/p>\n<p>Or if the person is specifically requesting data that the company is not permitted to release\u2014such as the medical records of a relative they do not have custodial responsibility for, or a request to delete data a company is legally required to retain\u2014a company could also argue that the request is unfounded. A request for which the individual can\u2019t be reasonably verified could also fall under this category.<\/p>\n<p>Companies can\u2019t break one part of the law to comply with another, so this is an area where it\u2019s recommended to consult legal counsel.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-the-process-for-fulfilling-a-dsar\">What is the process for fulfilling a DSAR?<\/h2>\n\n\n<p>The process to fulfill a DSAR is typically managed by a company\u2019s data protection officer (DPO), whose appointment may be required to ensure <a href=\"https:\/\/usercentrics.com\/knowledge-hub\/who-is-responsible-for-gdpr-compliance\/\">GDPR compliance<\/a>. Under other laws, a DPO may only be required under certain conditions or isn\u2019t required, but is recommended.<\/p>\n<p>To ensure the process runs smoothly, companies should keep an organized and auditable record (i.e. database) of all requests, including the dates of receipt, initial and subsequent responses, and final fulfillment. As noted, for many organizations, especially larger ones, these systems and processes will likely be automated and scalable. There are tools dedicated to DSAR fulfillment.<\/p>\n<p>Here\u2019s a typical process to fulfill a DSAR:<\/p>\n<ol>\n<li><strong>Log the DSAR:<\/strong> When you receive a DSAR, promptly log it in a tracking system and include the date of receipt.<\/li>\n<li><strong>Acknowledge the request:<\/strong> Send an acknowledgment to the person who submitted the DSAR, confirming that you are processing their request.<\/li>\n<li><strong>Verify the requester\u2019s identity:<\/strong> Ensure that the person requesting the data is who they claim to be or legally represent. If there is any doubt, request additional identification documents or deny the request if they can\u2019t or won\u2019t comply.<\/li>\n<li><strong>Collect the requested data:<\/strong> Gather all data related to the request from across your organization, coordinating between departments as needed.<\/li>\n<li><strong>Review and prepare the data or data-related action:<\/strong> Once collected, review the data carefully. Redact any sensitive information that\u2019s not required, or that relates to other individuals. Many laws require the data to be in an accessible and reasonably portable format. Ensure any corrections are accurate or deletions are complete, etc.<\/li>\n<li><strong>Deliver the data or response noting completed actions:<\/strong> Choose the most secure delivery method, either electronic with encryption or password protection, or physical with a trackable, signature-required service. Whichever method you choose, ensure that receipt can be confirmed and proven. The more sensitive the data, the more precautions should be taken for delivery.<\/li>\n<li><strong>Update your records:<\/strong> Finally, mark the DSAR as completed in your tracking system, with the date of delivery and any other relevant details. This is crucial to maintain an auditable record, and to track the number of requests in a given time frame.<\/li>\n<\/ol>\n<p>Following these steps will help to ensure your DSAR response is quick, efficient, and compliant with relevant regulations.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-to-automate-dsars\">How to automate DSARs<\/h2>\n\n\n<p>By automating DSARs, businesses can boost their efficiency, cut down on human error, and take steps toward compliance with privacy regulations.<\/p>\n<p>Automation accelerates the DSAR handling process and should keep procedures updated with the latest in privacy regulation, saving valuable time and resources while focusing human input where it&#8217;s needed most.<\/p>\n<p>Automating DSARs also makes the process more convenient for the individual submitting the request, as they\u2019re more likely guaranteed a timely and sufficiently detailed response.<\/p>\n<p>Tools like <a href=\"https:\/\/usercentrics.com\/integrate-mineos-dsr\/\">MineOS DSAR,<\/a> Usercentrics partner, make this kind of DSAR automation possible. It creates a single, user-friendly point of contact for data subjects on your website, making their experience clearer and easier.<\/p>\n<p>This approach also simplifies the management of requests and ensures that only necessary data is collected or actioned, while maintaining privacy and reducing risk of data being mishandled. The MineOS solution provides an admin panel which allows for easy tracking and centralized management of DSARs, making the process seamless for both your company and the data subject.<\/p>\n<p>This approach also simplifies the management of requests and ensures that only necessary data is collected or actioned, while maintaining privacy and reducing risk of data being mishandled. The Usercentrics solution provides an Admin Interface, which allows for easy tracking and centralized management of DSARs, making the process seamless for both your company and the data subject.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-33617\" src=\"https:\/\/usercentrics.com\/wp-content\/uploads\/sites\/7\/2021\/08\/DSR-Admin-Usercentrics.png\" alt=\"DSAR product - Usercentrics\" width=\"2880\" height=\"1800\" \/><\/p>\n\n<div id=\"uc-cta_69e1f3bd90583\" class=\"uc-cta uc-cta--button uc-cta--primary uc-ctx--blue\">\n    <div class=\"uc-cta__inner container\">\n        <div class=\"uc-cta__content\">\n                                        <div class=\"uc-cta__heading no-default-margin\">Easily automate DSARs with MineOS and Usercentrics<\/div>\n                                        <div class=\"uc-cta__description\">\n                    <p>Our DSAR solution simplifies the DSAR process, minimizing non-compliance risks and enhancing efficiency. Ideal for companies prioritizing data privacy compliance, automation, and resource optimization.<\/p>\n                <\/div>\n                                                                    <\/div>\n                            <div class=\"uc-cta__section\">\n                                        <a id=\"dd174cc9-dcfe-4dab-aaf9-fe2cefc71bb9\" class=\"uc-button uc-button-size-m uc-button-contained  no-default-link-decoration\" href=\"https:\/\/usercentrics.com\/integrate-mineos-dsr\/\" target=\"\"><span>Learn more<\/span><\/a>                                    <\/div>\n            <\/div>\n<\/div>\n    <script type=\"module\">\n        new Uc_Cta(document.getElementById(\"uc-cta_69e1f3bd90583\"));\n    <\/script>\n\n\n<h3>Challenges of the DSAR fulfillment process<\/h3>\n<p>Regulations like the GDPR and CCPA include stringent data management and DSAR fulfillment requirements, which can be difficult to meet in some circumstances or for some organizations. Here are the most common challenges that companies encounter when trying to respond to a DSAR:<\/p>\n<ul>\n<li><strong>The requests are not reasonable or verifiable:<\/strong> The company is responsible for providing a reasonable mechanism for requests, but human error in making requests still happens, and people are often impatient online or don\u2019t read carefully or follow instructions well. The burden of verification and security lies with the company, and they also have rights regarding fulfillment. A regulatory violation is a much bigger issue than a disgruntled customer. This is one area where a purpose-built tool that is user-friendly, like Usercentrics\u2019 DSAR solution, can help.<\/li>\n<li><strong>The data is in many locations:<\/strong> It can be a challenge to pull together data from many different departments\u2014like account details, billing details, website activity, and medical records. Companies may need to invest in data mapping, or in a system that tracks and centralizes personal data, to speed up the preparation of DSARs. Without these tools, it may take companies longer to fulfill requests and the risk of error is higher.<\/li>\n<li><strong>The data requires complex redaction:<\/strong> Manually reviewing and redacting documents can be a laborious process, as can getting approvals from senior management and\/or the legal department before releasing or deleting potentially sensitive data. Again, it\u2019s beneficial to have all individual customers\u2019 personal data accessible in one location or at least efficiently tagged or linked, so that a company doesn\u2019t end up having to redact dozens of documents.<\/li>\n<li><strong>The data requested is wide-ranging:<\/strong> If a member of the public simply asks for \u201call the data you hold about me\u201d, it still constitutes a valid DSAR. Remember that you\u2019re only required to release personal data, and usually only that from within a specific time frame, which should help to narrow down what you compile and send. As noted, the relevant personal data that has to be included or actioned can often be located in a variety of locations, departments, and systems around a company.<\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"h-dsar-fulfillment-checklist\">DSAR fulfillment checklist<\/h2>\n\n\n<p>Every organization should develop and communicate its own processes that are based on relevant regulations by working with its legal counsel and data protection officer. The whole organization should have data privacy training and be aware of DSAR processes as well.<\/p>\n<p>Here is an outline of a general process.<\/p>\n\n\n<div class=\"wp-block-cover is-light has-custom-content-position is-position-top-left\" style=\"margin-top:var(--wp--preset--spacing--l);margin-bottom:var(--wp--preset--spacing--m);padding-top:var(--wp--preset--spacing--m);padding-right:var(--wp--preset--spacing--s);padding-bottom:var(--wp--preset--spacing--m);padding-left:var(--wp--preset--spacing--s);min-height:50px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-brand-white-background-color has-background-dim-100 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-constrained wp-container-core-cover-is-layout-6c749cc1 wp-block-cover-is-layout-constrained\"><ol>\n<li>Authenticate the requesting data subject\u2019s identity and whether the company has the requested personal information that\u2019s within the legally required time frame and categories. Further authentication can be required if there\u2019s any doubt.<\/li>\n<li>Clarify the nature of the request if needed and inform the subject of any issues, e.g. if they\u2019ve asked for an action that falls outside of the regulatory scope, or for excessive amounts of data, data that legally can\u2019t be provided, or data going back beyond the legally required scope of the DSAR.<\/li>\n<li>Respond to the initial DSAR with written acknowledgment and expected time for fulfillment within the legally prescribed time period. Don\u2019t overpromise, but keep within the legally mandated timescales. The initial response may include fulfillment, or reason for a required extension.<\/li>\n<li>Gather and review the requested data. Make any necessary exclusions and redactions or prepare the requested action(s), then have a senior manager, or DPO, approve if needed.<\/li>\n<li>Format and send the data to the data subject. Include the recipient\u2019s rights regarding data erasure or change. If the request was for an action, include confirmation of changes, deletion, etc.<\/li>\n<li>Ensure the data is sent securely and is only accessible to the intended recipient. Where possible, confirm that the recipient has received the data package.<\/li>\n<li>Check that the recipient is happy with what they have received and make changes and updates as needed, within the scope of relevant regulations. Changes to physical address, phone number, and email address are common.<\/li>\n<\/ol>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-data-protection-policy-best-practices\">Data protection policy best practices<\/h2>\n\n\n<p>A focus on best practices will serve companies well long-term both for legal compliance and efficient use of their resources. It will also help provide better customer experiences. Here\u2019s how.<\/p>\n<ul>\n<li><strong>Designate a data protection officer:<\/strong> Appoint an expert in data protection and privacy legislation to oversee DSARs, ensuring deputies are in place as backup. The GDPR outlines this role&#8217;s tasks and responsibilities in <a href=\"https:\/\/gdpr.eu\/tag\/chapter-4\/\" target=\"_blank\" rel=\"noopener\">Chapter 4, Art 37\u201339<\/a>. It\u2019s a legally required position under some regulations and circumstances, but only recommended in others.<\/li>\n<li><strong>Record and automate DSAR requests:<\/strong> Invest in the right tool for data management, like a robust <a href=\"https:\/\/usercentrics.com\/\">consent management platform<\/a> that seamlessly integrates with a DSAR management solution, to streamline consent and DSAR management. This helps ensure an auditable, efficient process, safeguard against privacy noncompliance, and track user consent and requests.<\/li>\n<li><strong>Create a DSAR policy:<\/strong> Companies should have a policy for handling DSARs as part of their broader data protection or data management policy, which should be part of every new hire\u2019s training. DSAR information should also be included in the company\u2019s privacy policy, typically found on the website.<\/li>\n<li><strong>Centralize customers\u2019 or users\u2019 personal data:<\/strong> Centralize customer records and personnel files from across departments like HR, sales, marketing, and IT as much as is reasonable, so that data is more easily kept up to date and can be tracked, changed, provided, or deleted in a timely manner.<\/li>\n<li><strong>Adhere to other data protection principles:<\/strong> Following world-leading data protection practices, which tend to be more strict, will help to ensure secure and appropriate handling of data and regulatory compliance. The <a href=\"https:\/\/www.itgovernance.eu\/blog\/en\/the-gdpr-understanding-the-6-data-protection-principles\" target=\"_blank\" rel=\"noopener\">EU Data Protection Principles<\/a>, for instance, cover lawfulness, fairness, transparency, purpose limitation, data minimization, accuracy, storage limitation, and data integrity.<\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"h-manage-data-subject-access-requests-with-mineos-and-usercentrics\">Manage data subject access requests with MineOS and Usercentrics<\/h2>\n\n\n<p>Usercentrics provides a leading CMP for consent management, and a streamlined, scalable, and user-friendly DSAR management solution through the partner solution MineOS DSR that fully integrates with the CMP\u2014and simplifies and optimizes the DSAR process.<\/p>\n<p>With customizable intake forms, secure data handling, and reliable automation, you can minimize errors, streamline fulfillment, and help to ensure ongoing regulatory compliance.<\/p>\n\n<div id=\"uc-cta_69e1f3bd90cc9\" class=\"uc-cta uc-cta--button uc-cta--primary uc-ctx--blue\">\n    <div class=\"uc-cta__inner container\">\n        <div class=\"uc-cta__content\">\n                                        <div class=\"uc-cta__heading no-default-margin\">Stay ahead of data regulations with seamless DSAR management<\/div>\n                                        <div class=\"uc-cta__description\">\n                    <p>Tailored for companies seeking to fortify data privacy practices, improve operational workflows, and minimize manual effort.<\/p>\n                <\/div>\n                                                                    <\/div>\n                            <div class=\"uc-cta__section\">\n                                        <a id=\"281a38ea-2949-403f-b793-e97575bb6bf9\" class=\"uc-button uc-button-size-m uc-button-contained  no-default-link-decoration\" href=\"https:\/\/usercentrics.com\/integrate-mineos-dsr\/\" target=\"\"><span>Learn more<\/span><\/a>                                    <\/div>\n            <\/div>\n<\/div>\n    <script type=\"module\">\n        new Uc_Cta(document.getElementById(\"uc-cta_69e1f3bd90cc9\"));\n    <\/script>\n","protected":false},"excerpt":{"rendered":"<p>A data subject access request (DSAR) is a request from any member of the public to exercise their data privacy rights as granted by regulations, like seeing a copy of their personal data that\u2019s been collected by a company. Here\u2019s everything you need to know.<\/p>\n","protected":false},"featured_media":8869,"template":"","meta":{"_acf_changed":false,"editor_notices":[],"footnotes":""},"tags":[],"magazine_issue":[],"magazine_tag":[],"resource_tag":[14,13],"class_list":["post-468","knowledge","type-knowledge","status-publish","has-post-thumbnail","hentry","resource_tag-privacy","resource_tag-regulations"],"acf":[],"yoast_head":"<title>What is a DSAR (Data Subject Access Request)?<\/title>\n<meta name=\"description\" content=\"Find out everything you need to know about data subject access requests (DSARs) and exercising data privacy rights with Usercentrics\" \/>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is a DSAR (Data Subject Access Request)?\" \/>\n<meta property=\"og:description\" content=\"Find out everything you need to know about data subject access requests (DSARs) and exercising data privacy rights with Usercentrics\" \/>\n<meta property=\"og:url\" content=\"https:\/\/usercentrics.com\/us\/knowledge-hub\/data-subject-access-requests\/\" \/>\n<meta property=\"og:site_name\" content=\"Usercentrics - US\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/usercentrics\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-24T11:11:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/usercentrics.com\/wp-content\/uploads\/2021\/08\/personal-data.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"What is a DSAR (Data Subject Access Request)?\" \/>\n<meta name=\"twitter:description\" content=\"Find out everything you need to know about data subject access requests (DSARs) and exercising data privacy rights with Usercentrics\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/usercentrics.com\/wp-content\/uploads\/2021\/08\/personal-data.jpg\" \/>\n<meta name=\"twitter:site\" content=\"@usercentrics\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"18 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/usercentrics.com\\\/us\\\/knowledge-hub\\\/data-subject-access-requests\\\/\",\"url\":\"https:\\\/\\\/usercentrics.com\\\/us\\\/knowledge-hub\\\/data-subject-access-requests\\\/\",\"name\":\"What is a DSAR (Data Subject Access Request)?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/usercentrics.com\\\/us\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/usercentrics.com\\\/us\\\/knowledge-hub\\\/data-subject-access-requests\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/usercentrics.com\\\/us\\\/knowledge-hub\\\/data-subject-access-requests\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/usercentrics.com\\\/us\\\/wp-content\\\/uploads\\\/sites\\\/7\\\/2024\\\/05\\\/What-is-a-data-subject-access-request-DSAR-How-to-guide-min.jpg\",\"datePublished\":\"2024-05-02T08:23:21+00:00\",\"dateModified\":\"2025-06-24T11:11:29+00:00\",\"description\":\"Find out everything you need to know about data subject access requests (DSARs) and exercising data privacy rights with Usercentrics\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/usercentrics.com\\\/us\\\/knowledge-hub\\\/data-subject-access-requests\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":\"https:\\\/\\\/usercentrics.com\\\/us\\\/knowledge-hub\\\/data-subject-access-requests\\\/\"}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/usercentrics.com\\\/us\\\/knowledge-hub\\\/data-subject-access-requests\\\/#primaryimage\",\"url\":\"https:\\\/\\\/usercentrics.com\\\/us\\\/wp-content\\\/uploads\\\/sites\\\/7\\\/2024\\\/05\\\/What-is-a-data-subject-access-request-DSAR-How-to-guide-min.jpg\",\"contentUrl\":\"https:\\\/\\\/usercentrics.com\\\/us\\\/wp-content\\\/uploads\\\/sites\\\/7\\\/2024\\\/05\\\/What-is-a-data-subject-access-request-DSAR-How-to-guide-min.jpg\",\"width\":1000,\"height\":1000,\"caption\":\"Man sitting on a couch, learning\",\"copyrightNotice\":\"\u00a9 Copyright 2026 Usercentrics GmbH\",\"creator\":{\"@type\":\"Organization\",\"name\":\"Usercentrics GmbH\"},\"creditText\":\"Image: Usercentrics GmbH\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/usercentrics.com\\\/us\\\/knowledge-hub\\\/data-subject-access-requests\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Resources\",\"item\":\"https:\\\/\\\/usercentrics.com\\\/us\\\/resources\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/usercentrics.com\\\/us\\\/knowledge-hub\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What is a data subject access request (DSAR)? How-to guide\",\"item\":\"https:\\\/\\\/usercentrics.com\\\/us\\\/knowledge-hub\\\/data-subject-access-requests\\\/\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/usercentrics.com\\\/us\\\/#website\",\"url\":\"https:\\\/\\\/usercentrics.com\\\/us\\\/\",\"name\":\"Usercentrics - US\",\"description\":\"Consent Management Platform (CMP) Usercentrics\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/usercentrics.com\\\/us\\\/?s={search_term_string}\"}}],\"inLanguage\":\"en-US\"}]}<\/script>","yoast_head_json":{"title":"What is a DSAR (Data Subject Access Request)?","description":"Find out everything you need to know about data subject access requests (DSARs) and exercising data privacy rights with Usercentrics","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"What is a DSAR (Data Subject Access Request)?","og_description":"Find out everything you need to know about data subject access requests (DSARs) and exercising data privacy rights with Usercentrics","og_url":"https:\/\/usercentrics.com\/us\/knowledge-hub\/data-subject-access-requests\/","og_site_name":"Usercentrics - US","article_publisher":"https:\/\/www.facebook.com\/usercentrics","article_modified_time":"2025-06-24T11:11:29+00:00","og_image":[{"url":"https:\/\/usercentrics.com\/wp-content\/uploads\/2021\/08\/personal-data.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_title":"What is a DSAR (Data Subject Access Request)?","twitter_description":"Find out everything you need to know about data subject access requests (DSARs) and exercising data privacy rights with Usercentrics","twitter_image":"https:\/\/usercentrics.com\/wp-content\/uploads\/2021\/08\/personal-data.jpg","twitter_site":"@usercentrics","twitter_misc":{"Est. reading time":"18 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/usercentrics.com\/us\/knowledge-hub\/data-subject-access-requests\/","url":"https:\/\/usercentrics.com\/us\/knowledge-hub\/data-subject-access-requests\/","name":"What is a DSAR (Data Subject Access Request)?","isPartOf":{"@id":"https:\/\/usercentrics.com\/us\/#website"},"primaryImageOfPage":{"@id":"https:\/\/usercentrics.com\/us\/knowledge-hub\/data-subject-access-requests\/#primaryimage"},"image":{"@id":"https:\/\/usercentrics.com\/us\/knowledge-hub\/data-subject-access-requests\/#primaryimage"},"thumbnailUrl":"https:\/\/usercentrics.com\/us\/wp-content\/uploads\/sites\/7\/2024\/05\/What-is-a-data-subject-access-request-DSAR-How-to-guide-min.jpg","datePublished":"2024-05-02T08:23:21+00:00","dateModified":"2025-06-24T11:11:29+00:00","description":"Find out everything you need to know about data subject access requests (DSARs) and exercising data privacy rights with Usercentrics","breadcrumb":{"@id":"https:\/\/usercentrics.com\/us\/knowledge-hub\/data-subject-access-requests\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":"https:\/\/usercentrics.com\/us\/knowledge-hub\/data-subject-access-requests\/"}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/usercentrics.com\/us\/knowledge-hub\/data-subject-access-requests\/#primaryimage","url":"https:\/\/usercentrics.com\/us\/wp-content\/uploads\/sites\/7\/2024\/05\/What-is-a-data-subject-access-request-DSAR-How-to-guide-min.jpg","contentUrl":"https:\/\/usercentrics.com\/us\/wp-content\/uploads\/sites\/7\/2024\/05\/What-is-a-data-subject-access-request-DSAR-How-to-guide-min.jpg","width":1000,"height":1000,"caption":"Man sitting on a couch, learning","copyrightNotice":"\u00a9 Copyright 2026 Usercentrics GmbH","creator":{"@type":"Organization","name":"Usercentrics GmbH"},"creditText":"Image: Usercentrics GmbH"},{"@type":"BreadcrumbList","@id":"https:\/\/usercentrics.com\/us\/knowledge-hub\/data-subject-access-requests\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Resources","item":"https:\/\/usercentrics.com\/us\/resources\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/usercentrics.com\/us\/knowledge-hub\/"},{"@type":"ListItem","position":3,"name":"What is a data subject access request (DSAR)? How-to guide","item":"https:\/\/usercentrics.com\/us\/knowledge-hub\/data-subject-access-requests\/"}]},{"@type":"WebSite","@id":"https:\/\/usercentrics.com\/us\/#website","url":"https:\/\/usercentrics.com\/us\/","name":"Usercentrics - US","description":"Consent Management Platform (CMP) Usercentrics","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/usercentrics.com\/us\/?s={search_term_string}"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/usercentrics.com\/us\/wp-json\/wp\/v2\/knowledge\/468","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/usercentrics.com\/us\/wp-json\/wp\/v2\/knowledge"}],"about":[{"href":"https:\/\/usercentrics.com\/us\/wp-json\/wp\/v2\/types\/knowledge"}],"version-history":[{"count":0,"href":"https:\/\/usercentrics.com\/us\/wp-json\/wp\/v2\/knowledge\/468\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/usercentrics.com\/us\/wp-json\/wp\/v2\/media\/8869"}],"wp:attachment":[{"href":"https:\/\/usercentrics.com\/us\/wp-json\/wp\/v2\/media?parent=468"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/usercentrics.com\/us\/wp-json\/wp\/v2\/tags?post=468"},{"taxonomy":"magazine_issue","embeddable":true,"href":"https:\/\/usercentrics.com\/us\/wp-json\/wp\/v2\/magazine_issue?post=468"},{"taxonomy":"magazine_tag","embeddable":true,"href":"https:\/\/usercentrics.com\/us\/wp-json\/wp\/v2\/magazine_tag?post=468"},{"taxonomy":"resource_tag","embeddable":true,"href":"https:\/\/usercentrics.com\/us\/wp-json\/wp\/v2\/resource_tag?post=468"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}