Article

What is a Data Subject Access Request (DSAR)?

Definition of Data Subject Access Request (DSAR)

A data subject access request (DSAR) is a formal request made by an individual to a company, asking for access to the personal data that the company holds about them. DSAR requirements vary based on the regulation, but in general terms, they provide individuals with the right to access, correct, and port their data, as well as opt out of the collection process and request that the data be deleted.

The DSAR process is a fundamental aspect of privacy rights. Companies are required to provide a transparent overview of the personal data being processed.

Understanding DSAR

Data privacy regulations introduced in recent years have given individuals more control over their personal information. Their rights include knowing what data companies hold about them and why through a provision called a data subject access request. Employees of enterprises that handle private information should understand how a DSAR might impact operations.

Individual access rights have long been recognized as a key mechanism for individuals to learn what type of data organizations process about them. The European Union’s General Data Protection Regulation (GDPR) expanded these rights, referring to individuals as “data subjects”, hence the DSAR terminology. Since then, similar rights have been incorporated into other privacy laws, including the California Consumer Privacy Act (CCPA) and the Colorado Privacy Act (CPA).

Why Data Subject Access Requests are important

Data subject access requests are a fundamental component of modern data privacy laws, such as the GDPR and CCPA, and a key element of maintaining compliance and protecting individuals' privacy. However, the importance of DSARs extends beyond compliance. DSARs are pivotal for building trust with customers by demonstrating a commitment to data transparency and protection.

DSARs and GDPR compliance

Data subject access requests are a core requirement of the General Data Protection Regulation (GDPR), which grants individuals greater control over their personal data. Under GDPR, individuals have the right to obtain confirmation as to whether their personal data is being processed, access to that data, and details about how and why it is being used.

GDPR requires certain organizations to appoint a data protection officer (DPO) who is responsible for monitoring compliance. Since DPO contact details must be available for data subjects, this individual may also assist with handling DSARs.

The data protection officer can be an in-house employee or someone appointed externally. However, in either case, they must be an expert in data protection who acts independently. Note that GDPR allows multiple organizations to share the same DPO.

Complying with DSARs is essential for demonstrating GDPR compliance. Organizations must respond to DSARs without undue delay and within one month of receipt, providing a copy of the requested data in a commonly used electronic format. Failure to respond appropriately can result in significant fines—up to €20 million or 4% of annual global turnover, whichever is higher.

DSARs and other regulations

The breadth of global data privacy regulations that grant individuals the right to access their personal data (i.e., support DSARs) demonstrates the importance of this across the world. The following are examples of regulations that require organizations to have a process in place for responding to a DSAR or similar request.

United States

Canada

Mexico

  • Federal Law on the Protection of Personal Data Held by Private Parties (LFPDPPP)

Europe (Non-European Union)

Asia-Pacific

Middle East and Africa

Which parties can submit a DSAR?

Anyone whose personal information is being processed by the controller organization can submit a data subject access request, including customers, employees, and vendors. Authorized agents, such as parents, guardians, and legal representatives, can also submit a DSAR on behalf of the subject.

How do you submit a DSAR?

To submit a data subject access request, an individual should follow these general steps.

Step one: Find the DSAR recipient

Identify the data controller organization that holds their personal data. This can usually be found in an organization's privacy notice or data protection contact information.

Step two: Prepare the DSAR

The key points to include in a DSAR are a clear statement that the communication is a DSAR and the specific data being requested. In some cases, the organization may also request you to provide valid proof of identity to help the organization verify the request and prevent unauthorized access to personal data.

Step three: Choose a submission method

The three primary methods for submitting a DSAR are:
1. Email via an organization's dedicated privacy or legal email address
2. Web forms or online DSAR portals
3. In writing by mail

Once the DSAR has been submitted, the organization should acknowledge receipt of your request and may ask for additional verification. Always retain a copy of your request and any correspondence for your records, ensuring that dates are accurately recorded.

DSAR response process

As part of organizational preparedness to comply with privacy regulations, enterprises must implement a process and workflow so responses can be provided in a timely manner. The following are the recommended steps.

Establish processes to receive DSARs

Establishing processes to receive and manage data subject access requests is essential for regulatory compliance and operational efficiency. Key elements include the following.

  • Designate a DSAR point of contact (e.g., data protection officer, privacy team member, or compliance officer) to handle DSAR intake and coordination.
  • Set up DSAR submission channels, such as a dedicated DSAR or privacy email address, a portal, a web form, and a mailing address, and make them easily accessible.
  • Create a standardized DSAR form that collects the requester's identity and contact information and a description of the data requested
  • Implement steps to verify the identity of the requester before fulfilling a DSAR and match contact details to internal records
  • Define internal workflows for:
    o Acknowledging receipt
    o Locating and compiling data across systems
    o Reviewing and redacting sensitive third-party data
    o Responding within legal timeframes
  • Educate relevant departments (e.g., customer service, IT, HR) on how to recognize, escalate, and respond to DSARs
  • Maintain records by logging all DSARs and responses to demonstrate compliance and monitor trends

Verify the identity of the DSAR submitter

Since anyone can submit a DSAR, it is important to ensure that the requester is entitled to that information by law. Additionally, the person's identity must be authenticated to confirm that the request is not fraudulent, for example, due to identity theft.

Existing account verification

One way to verify and authenticate the requestor is through the same methods used to collect the data. This may be a member or subscriber account that includes a username or email address, multi-factor authentication such as a code sent to an authenticator app or email, and security questions that the user provided when opening the account. Some organizations also choose to ask for a copy of an official document, such as a passport or national identification card.

Third-party verification

When the DSAR comes from a third party, the responding organization must first verify that this person is authorized to act on behalf of the data subject. The third-party agent must provide proof, including their own identity and the ability to represent the subject.

Collect applicable data

Companies may be storing the requested data across multiple locations and in various formats, including paper records and unstructured files. As part of organizational privacy compliance preparedness, fundamental practices, including data governance, must be implemented to help streamline and automate the DSAR workflow. Understanding the kind of data collected (including structured and unstructured), where it is stored, and how it is handled enables more efficient compliance.

Deliver DSAR results

The DSAR results need to be delivered in a format that's readable and readily accessible. Depending on the regulation, this could range from verbal delivery to a self-service portal where the information can be downloaded. GDPR states that if the request is electronic, then the delivery must also be electronic unless the person specified otherwise.

DSAR response best practices

Establish data minimization and classification policies

Adopt data minimization practices to reduce the amount of personal data stored. Additionally, classify data by type and sensitivity.

Use access controls

Limit who within the organization can access or process DSAR-related data. Ensure only authorized personnel are involved in compiling or reviewing personal information to avoid internal data leakage or misuse.

Integrate DSAR tracking into privacy governance

Incorporate DSAR metrics (e.g., volume, response time, and request type) into broader data privacy and compliance reporting. This helps monitor trends, identify gaps, and support audits.

Prepare for edge cases

Create guidance for less common scenarios, such as:

  • Requests involving minors or deceased individuals
  • Requests that conflict with other legal obligations (e.g., ongoing investigations)
  • Requests involving joint data controllers

Secure the DSAR response packages

Ensure all DSAR responses are securely transmitted. Use encryption, password protection, or secure download portals to minimize the risk of exposing sensitive data.

Maintain transparency with requestors

If a DSAR is denied, delayed, or partially fulfilled, clearly explain the reasons to the requester and reference applicable legal exceptions.

Conduct regular DSAR simulations

Perform mock DSAR drills to test your team's readiness, identify inefficiencies, and refine the workflow under realistic conditions. Include stakeholders from legal, IT, and compliance.

Common challenges in handling DSAR requests

As noted earlier, efficiently complying with DSAR requirements requires enterprises to have robust data governance processes in place. Without these processes, common barriers that organizations encounter include the following.

  • Locating all relevant data across systems (e.g., cloud, on-premises, and third-party apps)
  • Identifying personal data within unstructured formats, such as emails, documents, and chat logs
  • Verifying the requester's identity
  • Handling third-party data to ensure privacy (e.g., redacting sensitive information that is not related to a DSAR)
  • Lack of standardized processes
  • High volume of requests
  • Meeting tight regulatory deadlines
  • Ensuring data accuracy and completeness
  • Managing DSAR costs, especially when fulfilling complex or frequent requests
  • Balancing transparency with legal obligations

Reasons to refuse a DSAR

Laws typically allow organizations to refuse a request, even if it's legitimate. Some circumstances that may warrant refusal include:

  • A "manifestly excessive request" (e.g., responding would require excessive resources that are disproportionate to other DSAR burdens)
  • Inability to verify the requestor using reasonable means
  • Malicious intent (e.g., with the purpose of harassing or overburdening the organization or specific employees)
  • Compliance with other laws (e.g., national security restrictions)

When organizations refuse to comply with a DSAR, the requester must be informed of the reason and provided with information on how to dispute the refusal.

Charging a "reasonable fee" for a DSAR

Usually, regulations state that a fee can't be charged for fulfilling information requests. However, some allow "reasonable" fees for administrative costs in certain situations, including:

  • Repetitive requests—If an individual submits multiple DSARs within a short period and the requests are clearly excessive or duplicative.
  • Manifestly unfounded or excessive requests—If a request has no legitimate basis, is intended to harass the organization, or places an unreasonable burden on resources.
  • It is important to note that the fee may only cover the actual administrative cost of gathering, copying, or delivering the data (e.g., printing, postage, or time spent redacting sensitive third-party information).

Automation and technology in DSAR management

Automation and technology can significantly enhance DSAR management and streamline related operations. Several examples include the following.

  • Automated intake and tracking, such as web forms or DSAR portals, to standardize submissions, confirm receipt, and track progress in real time.
  • Identity verification tools that integrate authentication methods to validate requesters securely and efficiently.
  • AI-powered data discovery and classification to locate, identify, and classify personal data across systems and storage locations.
  • Natural language processing (NLP) to scan unstructured data (e.g., emails and documents) for relevant personal information.
  • Workflow orchestration platforms that can coordinate tasks across legal, IT, and compliance teams using predefined workflows, reducing delays and manual errors.
  • Automated redaction tools to remove third-party or sensitive data while maintaining context and compliance.
  • Automated response generation that creates reports or data packages in standardized, user-friendly formats (e.g., PDF, CSV) for delivery.
  • Audit logging and compliance reporting.
  • Maintain detailed logs of request handling to demonstrate compliance during audits or regulatory reviews.
  • Scalability for high request volumes.
  • Enable consistent and timely DSAR responses even during spikes in demand by reducing manual workload.
  • Integration with privacy and data governance platforms that can connect DSAR workflows with broader privacy management systems for unified oversight and reporting.

Be ready for a DSAR

The best way to prepare for DSAR requirements is by understanding the data. Managing and gaining visibility into unstructured data, in particular, is a significant challenge, yet this is extremely important because the majority of data held by a typical organization is unstructured. As enterprises continue to collect vast volumes of information, solving this challenge will grow increasingly difficult.

DISCLAIMER: THE INFORMATION CONTAINED IN THIS DOCUMENT IS FOR INFORMATIONAL PURPOSES ONLY, AND NOTHING CONVEYED IN THIS DOCUMENT IS INTENDED TO CONSTITUTE ANY FORM OF LEGAL ADVICE. SAILPOINT CANNOT GIVE SUCH ADVICE AND RECOMMENDS THAT YOU CONTACT LEGAL COUNSEL REGARDING APPLICABLE LEGAL ISSUES.

Data Subject Access Request (DSAR) FAQ

What can individuals ask for in a DSAR?

Individuals can request a variety of information through a DSAR. The types of information a request can include are:

  • A copy of all personal data an organization holds about them or specific pieces of information
  • Confirmation about whether an organization is processing its personal data
  • Where the organization obtained their personal data, especially if it was not directly collected by the organization that receives the DSAR
  • Details about automated decision-making processes, including profiling, and information about the logic involved and potential consequences
  • Details on how the data is processed, the purposes of processing, categories of personal data involved, recipients of the data, and the duration of data retention
What is the difference between DSAR and DSR?

A DSAR is a specific type of request where an individual seeks access to their personal data held by an organization. On the other hand, a DSR encompasses a broader range of requests that a data subject can make beyond just accessing their data. These may include:

  • Cessation of the processing of personal data for specific purposes, such as direct marketing
  • Correction of inaccurate or incomplete personal data
  • Deletion of personal data under certain circumstances, such as when the data is no longer necessary, or the individual withdraws consent
  • Opt-out of the sale or sharing of their personal data, the use of their personal data for targeted advertising, or the use of data for decisions based solely on automated processing, including profiling
  • Temporary halt to the processing of personal data
  • Transfer of personal data to another organization in a structured, commonly used, and machine-readable format
Which parties can submit a DSAR?

Anyone whose information is being managed by a controller organization can submit a data subject access request, including customers, employees, and vendors. Authorized agents, such as parents, guardians, and legal representatives, can also submit a DSAR on behalf of the subject.

Which individual should respond to a DSAR?

While it may change by regulation, generally, a designated employee of the controller organization responds to a data subject access request. Most commonly, this is a legal or privacy team member, process owners, or the IT department.

Can you refuse to respond to a DSAR?

Yes, organizations can refuse to respond to a DSAR under limited and specific circumstances. Scenarios where an organization may lawfully refuse to respond to a DSAR include:

  • Cannot verify the identity of the requestor
  • Data contains personal information of others and cannot be separated without affecting their rights
  • Data is protected by privilege (e.g., attorney-client communications)
  • Data is used for internal evaluations only, such as employee performance reviews or disciplinary investigations (varies by regulation)
  • National security or law enforcement exemptions apply
  • Request conflicts with legal obligations (e.g., data must be retained for legal compliance or litigation)
  • Request is manifestly unfounded or excessive (e.g., repetitive or abusive requests)
  • Request relates to anonymized or non-personal data
What does DPA mean?

In the context of a DSAR, DPA is an acronym for Data Protection Authority. These are regional bodies that enforce privacy laws like GDPR, LGPD, or PIPEDA, including:

  • Handling complaints when a DSAR is denied, delayed, or mishandled
  • Supervising compliance
  • Issuing fines or sanctions
  • Providing guidance to individuals and organizations

Examples of DPAs include:

  • ICO (Information Commissioner's Office) in the UK
  • CNIL in France
  • OPC (Office of the Privacy Commissioner) in Canada
  • ANPD (Autoridade Nacional de Proteção de Dados) in Brazil
What is the difference between DSAR and FOI?

DSAR and Freedom of Information (FOI) requests serve distinct purposes and are governed by different regulations.

  • DSARs are designed to enable individuals to access their personal data that an organization holds.
  • FOI requests are a mechanism that provides the general public access to information held by public authorities.
Date: December 15, 2025Reading time: 13 minutes
ComplianceData securityIdentity security