Step 8 of 10

Response Workflow

Fulfill requests and communicate effectively with requesters.

Processing Different Request Types

Access Requests

  1. Collect all data from your systems
  2. Package in a readable format (JSON, CSV, or PDF)
  3. Provide summary of processing activities
  4. Include categories of data and recipients

Erasure Requests

  1. Identify all data locations
  2. Check for legal retention requirements
  3. Delete data (or anonymize where deletion impossible)
  4. Notify third parties (if data was shared)
  5. Provide confirmation of deletion

Correction Requests

  1. Verify the current data
  2. Validate the requested correction
  3. Update records across systems
  4. Notify third parties of correction
  5. Confirm changes to requester

Creating Responses

1

Open the Request

Go to the request details page.

2

Select Response Type

Choose: Fulfill, Partial Fulfill, or Deny (with valid reason).

3

Attach Data Export (if applicable)

Upload the data package for access/portability requests.

4

Write Response Message

Use templates or write a custom message explaining what was done.

5

Review and Send

Double-check everything before sending to the requester.

Response Templates

Create templates for common response types to ensure consistency:

Access Request - Complete
Erasure Request - Complete
Erasure Request - Partial (retention applies)
Correction Request - Complete
Request Denied - Cannot Verify
Request Denied - Exemption Applies
Extension Notice
Information Request (need more details)

Denying Requests

Valid reasons to deny a DSAR include:

  • • Identity cannot be verified
  • • Request is manifestly unfounded or excessive
  • • Legal exemption applies (e.g., legal proceedings)
  • • Third-party rights would be violated
  • • Request falls outside regulation scope

⚠️ Important

Always document the reason for denial thoroughly. You may be required to justify this decision to regulators.

Secure Delivery

For data exports, use secure delivery methods:

Password-protected portal download
Encrypted email attachment
Secure file sharing link (time-limited)
Postal mail for highly sensitive data