Identity Verification
Verify requesters to prevent unauthorized access to personal data.
Why Identity Verification Matters
Prevent Fraud
Stop bad actors from accessing others' data
Legal Requirement
Regulations require reasonable verification steps
Protect Users
Ensure data goes to the rightful owner
Security Warning
Releasing personal data to the wrong person is a data breach. Always verify identity before providing data.
Verification Methods
Email Verification
Send a verification link to the email address on file.
Low FrictionAccount Login
Require the user to log into their account before submitting.
Low FrictionKnowledge-Based
Ask questions only the user would know (last purchase, account details).
Medium FrictionID Document Upload
Request government ID for higher-risk requests.
High FrictionSetting Up Verification Workflow
Go to DSAR Settings → Verification
Access verification configuration.
Choose Default Method
Select the verification method that balances security and user experience for your use case.
Configure Escalation Rules
Set rules for when to require additional verification. For example, always require ID for erasure requests.
Set Timeout Period
Configure how long verification links remain valid.