Step 8 of 10
Response Workflow
Fulfill requests and communicate effectively with requesters.
Processing Different Request Types
Access Requests
- Collect all data from your systems
- Package in a readable format (JSON, CSV, or PDF)
- Provide summary of processing activities
- Include categories of data and recipients
Erasure Requests
- Identify all data locations
- Check for legal retention requirements
- Delete data (or anonymize where deletion impossible)
- Notify third parties (if data was shared)
- Provide confirmation of deletion
Correction Requests
- Verify the current data
- Validate the requested correction
- Update records across systems
- Notify third parties of correction
- Confirm changes to requester
Creating Responses
1
Open the Request
Go to the request details page.
2
Select Response Type
Choose: Fulfill, Partial Fulfill, or Deny (with valid reason).
3
Attach Data Export (if applicable)
Upload the data package for access/portability requests.
4
Write Response Message
Use templates or write a custom message explaining what was done.
5
Review and Send
Double-check everything before sending to the requester.
Response Templates
Create templates for common response types to ensure consistency:
Access Request - Complete
Erasure Request - Complete
Erasure Request - Partial (retention applies)
Correction Request - Complete
Request Denied - Cannot Verify
Request Denied - Exemption Applies
Extension Notice
Information Request (need more details)
Denying Requests
Valid reasons to deny a DSAR include:
- • Identity cannot be verified
- • Request is manifestly unfounded or excessive
- • Legal exemption applies (e.g., legal proceedings)
- • Third-party rights would be violated
- • Request falls outside regulation scope
⚠️ Important
Always document the reason for denial thoroughly. You may be required to justify this decision to regulators.
Secure Delivery
For data exports, use secure delivery methods:
Password-protected portal download
Encrypted email attachment
Secure file sharing link (time-limited)
Postal mail for highly sensitive data