Step 7 of 10

Identity Verification

Verify requesters to prevent unauthorized access to personal data.

Why Identity Verification Matters

Prevent Fraud

Stop bad actors from accessing others' data

Legal Requirement

Regulations require reasonable verification steps

Protect Users

Ensure data goes to the rightful owner

Security Warning

Releasing personal data to the wrong person is a data breach. Always verify identity before providing data.

Verification Methods

Email Verification

Send a verification link to the email address on file.

Low Friction

Account Login

Require the user to log into their account before submitting.

Low Friction

Knowledge-Based

Ask questions only the user would know (last purchase, account details).

Medium Friction

ID Document Upload

Request government ID for higher-risk requests.

High Friction

Setting Up Verification Workflow

1

Go to DSAR Settings → Verification

Access verification configuration.

2

Choose Default Method

Select the verification method that balances security and user experience for your use case.

3

Configure Escalation Rules

Set rules for when to require additional verification. For example, always require ID for erasure requests.

4

Set Timeout Period

Configure how long verification links remain valid.

Best Practices

Match verification level to data sensitivity
Don't request more than necessary
Explain why verification is needed
Keep verification data secure
Set reasonable time limits
Document your verification policy