How to Handle Data Subject Access Requests (DSARs) — Step by Step

Published Feb 12, 2026 · By PrivaBase Team · 13 min read

Under GDPR Article 15, any individual has the right to obtain confirmation of whether their personal data is being processed, and if so, to receive a copy of that data along with supplementary information about how it's being used. This is called a Data Subject Access Request (DSAR), and it's one of the most operationally challenging aspects of privacy compliance.

DSARs can arrive at any time, from any channel — email, web forms, social media, even verbal requests. You have one month to respond. Miss that deadline, and you're looking at potential regulatory action. Handle it poorly, and you risk exposing other people's data in the response. This guide walks you through the entire process, from intake to delivery.

What Triggers a DSAR?

A DSAR can be submitted by any data subject — a customer, employee, website visitor, job applicant, or any other individual whose personal data you process. There's no required format. A DSAR doesn't need to mention "GDPR" or "Article 15" or use any specific language. An email saying "I want to know what data you have on me" is a valid DSAR.

Common scenarios that trigger DSARs:

Step 1: Recognize and Log the Request

The first challenge is recognizing a DSAR when you receive one. Since there's no required format, DSARs can arrive as customer support tickets, emails to generic inboxes, DMs on social media, or even verbal requests to staff members.

Every customer-facing team member should be trained to recognize a DSAR. When one arrives:

The one-month response deadline starts from the day you receive the request — not from when you acknowledge it, verify identity, or assign it to someone. Delayed logging means a shorter effective response window.

Step 2: Verify the Requester's Identity

Before disclosing any personal data, you must verify that the person making the request is who they claim to be. Disclosing data to the wrong person is itself a data breach — so identity verification is critical.

The verification method should be proportionate to the sensitivity of the data and the risk of unauthorized access:

Important: You cannot use identity verification as a stalling tactic. If you already hold enough information to confirm the requester's identity (e.g., they emailed from their registered email address), requesting additional ID is unreasonable and could be seen as obstructing the request.

Step 3: Determine Scope and Feasibility

Once identity is verified, determine the scope of the request. Data subjects can request:

At this stage, assess whether any exemptions apply. You may be able to refuse or limit a response if:

If you're refusing or limiting a response, you must inform the requester of the reasons and their right to complain to a supervisory authority.

Step 4: Locate and Collect the Data

This is typically the most time-consuming step. Personal data often lives in multiple systems:

Without a comprehensive data map, this step becomes a nightmare. You're essentially searching across every system in your organization for any data that relates to a specific individual. This is why data mapping is a foundational compliance requirement — not just a documentation exercise.

Step 5: Review and Redact

Before delivering the data, review it carefully for:

This review process is where manual DSARs consume the most resources. A single employee DSAR can involve reviewing thousands of emails, documents, and system records.

Step 6: Compile and Deliver the Response

Package the response in a clear, accessible format:

Timeline Requirements

Under GDPR:

Under CCPA:

Common Mistakes

1. Missing the Deadline

The most common and most avoidable mistake. Without a tracking system, requests slip through the cracks. By the time someone realizes a DSAR was received three weeks ago, there's barely time to respond.

2. Over-collecting Identity Documentation

Requesting a passport copy from someone who emailed from their registered account is disproportionate. It annoys the requester and adds unnecessary data processing to your obligations.

3. Incomplete Data Collection

Searching only your primary database and missing data in email archives, analytics platforms, or third-party systems. A partial response is a violation.

4. Failing to Redact Third-Party Data

Accidentally including another person's data in the response is a data breach. Every response needs careful review before delivery.

5. Ignoring Verbal Requests

A DSAR doesn't have to be in writing. If a customer asks a support agent on the phone "what data do you have on me?", that's a valid DSAR that needs to be logged and processed.

6. Applying Exemptions Too Broadly

The "manifestly unfounded or excessive" exemption is very narrow. Regulators take a dim view of organizations that routinely refuse DSARs. When in doubt, comply.

Automating DSARs

Manual DSAR handling doesn't scale. At low volumes, you might manage with spreadsheets and email. But as your user base grows — or if you operate in a regulated industry where DSARs are more common — manual processes break down.

Automation can help at every stage:

How PrivaBase Handles DSARs

PrivaBase provides end-to-end DSAR automation. When a request comes in — through our embeddable request portal, API, or manual entry — it's automatically logged, tracked, and routed through your configured workflow.

Our platform connects to your data sources via API, automatically collects relevant personal data, flags items needing human review, and generates compliant response packages ready for secure delivery. Every step is audit-logged, every deadline is tracked, and your team gets alerts before anything goes overdue.

For organizations handling more than a few DSARs per month, automation isn't a luxury — it's a necessity. The time saved on each request compounds quickly, and the risk reduction from consistent, auditable processes is invaluable.

Automate your DSAR workflow

From intake to delivery, PrivaBase handles the operational burden of data subject requests.

Start Free Trial →