GDPR Compliance18 min read0 views

GDPR Data Subject Access Requests: How to Respond Within 30 Days

Complete operational guide to handling GDPR Data Subject Access Requests (DSARs) in 2026. Covers identity verification, data discovery across systems, exemptions and redactions, response formatting, the 30-day deadline (and when you can extend to 90 days), automation tools (OneTrust, BigID, Securiti, DataGrail), cost-per-request benchmarks, and the documented workflows that prevent regulatory penalties.

Chimaka Ikemba

Chimaka Ikemba

Privacy & Compliance Writer · April 10, 2026

GDPR Data Subject Access Requests: How to Respond Within 30 Days

Key Takeaways

  • A Data Subject Access Request (DSAR) is a legal right under GDPR Article 15 that allows any individual to request a complete copy of all personal data an organization holds about them. Organizations must respond within 30 calendar days — not business days — from the date they receive the request, regardless of how complex the request is.
  • Identity verification is the critical first step before processing any DSAR. If you release personal data to someone impersonating the data subject, you have committed a separate data breach. Verify identity using methods proportionate to the sensitivity of the data — government ID for health records, email confirmation for newsletter subscribers.
  • The most common reason organizations miss the 30-day deadline is fragmented data. Personal data is typically spread across 15 to 40 different systems (CRM, email, HR platform, analytics, backups, third-party processors). Building a comprehensive data inventory before you receive your first DSAR is essential — you cannot search systems you do not know about.
  • GDPR allows a 60-day extension (90 days total) for complex or numerous requests, but you must notify the data subject of the extension and the reason within the original 30-day period. Supervisory authorities scrutinize extension claims — "we are busy" or "we have limited staff" is not a valid reason. The complexity must relate to the request itself, not your operational capacity.
  • Automating DSAR fulfillment reduces average cost per request from 4,000 to 6,000 euros (manual process) to 200 to 500 euros (automated). Organizations receiving more than 50 DSARs per year should invest in DSAR automation platforms (OneTrust, BigID, Securiti, DataGrail) that connect to data sources, automate discovery, apply redactions, and generate response packages.

A Data Subject Access Request is not a customer service inquiry. It is a legally binding obligation under GDPR Article 15 that requires your organization to locate, compile, review, redact, and deliver every piece of personal data you hold about an individual within 30 calendar days. Failure to respond — or responding incompletely — exposes your organization to regulatory complaints, supervisory authority investigations, and potential fines.

The challenge is operational, not legal. Most organizations understand the legal requirement. What they struggle with is execution: finding personal data scattered across dozens of systems, determining what qualifies as personal data in context, redacting third-party information without destroying the data subject's record, formatting a response that satisfies the regulator, and doing all of this within 30 days while handling the rest of the privacy program.

This guide provides the documented workflow for handling DSARs from receipt to response, covering identity verification, data discovery, exemptions, redaction, response formatting, deadline management, and automation.

GDPR Article 15 grants data subjects the right to obtain confirmation of whether their personal data is being processed, and if so, access to that data along with specific supplementary information. The supplementary information requirements are often overlooked — providing just the raw data without the required context is an incomplete response.

Required Information in Every DSAR Response

RequirementArticleWhat You Must Provide
Copy of personal dataArt. 15(1)All personal data being processed, in an intelligible form. Not raw database dumps — formatted so the individual can understand what data you hold.
Processing purposesArt. 15(1)(a)The specific purposes for which each category of data is processed (marketing, service delivery, fraud prevention, etc.)
Categories of dataArt. 15(1)(b)The types of personal data processed (contact details, financial data, behavioral data, location data, etc.)
Recipients or categoriesArt. 15(1)(c)Who the data has been or will be shared with — specific names where possible, categories where specific disclosure is not feasible
Retention periodsArt. 15(1)(d)How long each category of data will be stored, or the criteria used to determine retention periods
Data subject rightsArt. 15(1)(e-f)Information about the right to rectification, erasure, restriction, objection, and the right to lodge a complaint with a supervisory authority
Source of dataArt. 15(1)(g)Where the data was collected from, if it was not obtained directly from the data subject
Automated decision-makingArt. 15(1)(h)Whether automated decision-making or profiling is used, the logic involved, and the significance and consequences for the data subject
International transfersArt. 15(2)Whether data is transferred outside the EEA, and the safeguards in place (SCCs, adequacy decisions, BCRs)

The Seven-Step DSAR Workflow

Every DSAR follows the same operational workflow, regardless of the size of your organization or the volume of requests. The steps must be executed in order — skipping or reordering steps creates compliance gaps and operational failures.

DSAR Fulfillment Workflow — 30-Day Timeline Day 0 Day 1-2 Day 2-3 Day 3-14 Day 14-21 Day 21-25 Day 25-28 Day 30 1. RECEIVE Log request Start 30-day clock Assign handler Any channel valid 2. VERIFY ID Confirm identity Proportionate check Document method CRITICAL step 3. SCOPE Clarify request Identify systems Check exemptions Data map required 4. DISCOVER Search all sources 15-40 systems avg Collect + aggregate Longest phase 5. REVIEW Verify completeness Apply exemptions Legal review Check third-party 6. REDACT Remove third-party Privileged data Trade secrets Labor-intensive 7. DELIVER Format response Secure transmission Document delivery Before Day 30 DAY 30 DEADLINE MANUAL PROCESS 40-60 hours per request | 4,000-6,000 euros cost High error rate | Deadline risk | Does not scale Sustainable only below 50 DSARs per year AUTOMATED PROCESS 4-8 hours per request | 200-500 euros cost Consistent quality | On-time delivery | Scales OneTrust | BigID | Securiti | DataGrail
The seven-step DSAR fulfillment workflow showing timeline allocation within the 30-day deadline. Data discovery (Step 4) typically consumes the most time, followed by review and redaction.

Step 1: Receive and Log

DSARs can arrive through any channel — email, web form, phone call, social media direct message, postal mail, or even verbally in person. There is no required format. A customer emailing "I want to know what data you have about me" is a valid DSAR even if they do not use the term "data subject access request" or cite Article 15.

When a request arrives, log it immediately in your DSAR tracking system with: the date received (this starts the 30-day clock), the requestor's name and contact information, the channel through which it was received, the specific data or information requested, and the assigned handler. Every detail matters because supervisory authorities will ask for your DSAR logs during audits.

Step 2: Verify Identity

Identity verification prevents a different kind of data breach — releasing someone's personal data to an unauthorized person. The verification method should be proportionate to the sensitivity of the data and the risk of the request:

Risk LevelData TypeVerification Method
LowNewsletter subscription, public profile dataConfirmation email to the address on file. If they can click the link, they control the email account associated with the data.
MediumPurchase history, account data, customer recordsAccount login verification plus security questions. Request must come from the registered email address or authenticated account.
HighFinancial records, health data, HR recordsGovernment-issued photo ID matching the name on record. For employee DSARs, verification through HR with manager confirmation.
Agent requestAny (third party submitting on behalf of data subject)Written authorization from the data subject plus verification of both the agent's and the data subject's identity.

Step 3: Scope the Request

Many DSARs are broad — "give me everything you have on me." While you are required to provide all personal data, you can contact the data subject to clarify the scope. GDPR Recital 63 states that where an organization processes a large quantity of data, it may ask the data subject to specify the information or processing activities to which the request relates.

This is not an opportunity to narrow the request against the data subject's wishes. It is an opportunity to deliver a more useful response more quickly. If the data subject insists on everything, you must provide everything.

Step 4: Data Discovery

This is the step where most organizations fail. Personal data is rarely centralized. A typical mid-size organization stores personal data across 15 to 40 systems:

System CategoryExamplesCommon Data Found
CRMSalesforce, HubSpot, PipedriveContact details, interaction history, deal notes, communication preferences
Marketing platformsMailchimp, Marketo, ActiveCampaignEmail address, engagement metrics, campaign interactions, consent records
AnalyticsGoogle Analytics, Mixpanel, AmplitudeBehavioral data, device information, IP addresses, session recordings
Support systemsZendesk, Intercom, FreshdeskSupport tickets, chat transcripts, satisfaction scores, complaint records
HR platformsWorkday, BambooHR, PersonioEmployment records, payroll, performance reviews, disciplinary records
FinanceStripe, QuickBooks, SAPPayment records, invoices, billing addresses, bank details
Cloud storageGoogle Drive, SharePoint, DropboxDocuments mentioning the data subject, shared files, collaboration records
Email systemsGoogle Workspace, Microsoft 365Emails from/to/about the data subject across all employee mailboxes
Third-party processorsPayroll providers, analytics vendorsData shared with processors under data processing agreements

Step 5: Review and Apply Exemptions

Not all personal data must be disclosed. GDPR provides several exemptions that allow (or require) you to withhold certain information:

ExemptionLegal BasisApplication
Third-party dataArt. 15(4)Data that would reveal personal data about another individual must be redacted unless that individual consents or it is reasonable to disclose
Legal privilegeNational lawCommunications between the organization and its lawyers regarding the data subject (legal professional privilege)
Trade secretsRecital 63Proprietary algorithms, scoring models, or business processes — but you must still explain the logic of automated decisions without revealing the trade secret itself
Ongoing investigationsArt. 23Data related to active fraud investigations or regulatory proceedings where disclosure would prejudice the investigation
Manifestly unfoundedArt. 12(5)Requests that are clearly made with no intention of exercising data protection rights (harassement, disruption). This exemption is very narrow and rarely applicable.

Step 6: Redaction

Redaction is the most labor-intensive step. Every document, email, chat transcript, and record must be reviewed for third-party personal data, legally privileged content, and trade secrets. Manual redaction of a single DSAR response containing 500 pages of data can take 20 to 30 hours.

Automated redaction tools (Microsoft Presidio, Amazon Comprehend, Google DLP API) can identify and redact common patterns (names, email addresses, phone numbers, national ID numbers) but require human review because false positives (redacting the data subject's own information) and false negatives (missing unusual identifiers) both create compliance problems.

Step 7: Format and Deliver

The response must be provided in a "concise, transparent, intelligible and easily accessible form, using clear and plain language" (Article 12(1)). In practice, this means:

  • Cover letter — summarizing the response, listing all systems searched, describing any exemptions applied and why, and informing the data subject of their right to complain to the supervisory authority.
  • Data package — the actual personal data, organized by system or category. Common formats include PDF (for human readability) and JSON or CSV (for machine readability when the right to data portability applies).
  • Secure delivery — the response must be transmitted securely. Encrypted email, secure file transfer link with password, or secure portal access. Never send unencrypted personal data packages by regular email.

Deadline Management and Extensions

ScenarioDeadlineRequirements
Standard request30 calendar days from receiptNo action required beyond timely completion
Identity verification needed30 days from successful verificationClock does not start until you have confirmed the requester's identity. Document the verification timeline.
Complex request (extension)90 calendar days (30 + 60 extension)Must notify the data subject within the original 30 days that you are extending, with the reason. The complexity must stem from the request itself.
Excessive or repetitiveVariesYou may charge a reasonable fee or refuse to act. Must justify the determination and inform the data subject of their right to complain.
DSAR Automation Platforms — 2026 Comparison OneTrust ✓ 500+ integrations ✓ Automated discovery ✓ Multi-regulation (GDPR+CCPA) ✓ Built-in redaction ✓ Audit-ready reporting Enterprise | Custom pricing Best for: Large enterprises BigID ✓ AI-powered data discovery ✓ ML classification engine ✓ Deep unstructured search ✓ Correlation across systems ✓ Data inventory built-in Enterprise | Custom pricing Best for: Data-heavy orgs Securiti ✓ PrivacyOps automation ✓ People Data Graph ✓ Robotic automation (RPA) ✓ Consent + DSAR unified ✓ Multi-cloud discovery Mid-market + Enterprise Best for: Multi-cloud DataGrail ✓ Purpose-built for DSARs ✓ SaaS connector library ✓ Fast deployment (weeks) ✓ Legal hold workflows ✓ Consumer trust portal Mid-market | Per-request price Best for: DSAR-focused teams
Four leading DSAR automation platforms compared. OneTrust and BigID serve enterprise needs, Securiti excels in multi-cloud environments, and DataGrail provides purpose-built DSAR fulfillment with fast deployment.

The Five Most Common DSAR Mistakes

MistakeWhy It HappensConsequencePrevention
Missing the 30-day deadlineData discovery takes longer than expected. No tracking system in place. Handler goes on leave.Data subject complains to supervisory authority. Investigation reveals systemic compliance failure. Potential fine.Automated deadline tracking with escalation alerts at Day 14, Day 21, and Day 25. Designate backup handlers.
Incomplete data searchOrganization does not have a comprehensive data inventory. Systems get added without being recorded.Supervisory authority finds data the organization did not disclose. Treated as deliberate concealment.Maintain a living data inventory. Cross-reference every DSAR search against the records of processing activities (ROPA).
Releasing third-party dataRedaction step skipped or poorly executed. Reviewer does not recognize all identifiers as personal data.Separate data breach notification required. Complaint from the affected third party. Reputational damage.Standardized redaction checklist. Automated PII detection as first pass. Manual review as second pass. Never skip both.
No identity verificationTeam treats DSAR as customer service request. Sends data without confirming identity.Personal data disclosed to unauthorized person. This is a data breach under GDPR Article 4(12). Mandatory 72-hour breach notification.Verification is a mandatory step before any data processing begins. Document the verification method used for each DSAR.
Providing raw data without contextTeam dumps database exports into a ZIP file without formatting or supplementary information.Response is technically non-compliant. Data subject cannot understand the data. Follow-up complaint to supervisory authority.Use a response template that includes all Article 15 supplementary information. Present data in human-readable format with category labels.

Measuring DSAR Program Performance

Track these metrics to identify bottlenecks and demonstrate compliance maturity to supervisory authorities:

MetricTargetWhy It Matters
Average response timeUnder 21 daysBuffer against the 30-day deadline. Organizations averaging 28 days will inevitably miss deadlines on complex requests.
On-time completion rate100 percentAny missed deadline is a potential compliance violation. Track separately from average response time.
Cost per DSARUnder 500 euros (automated)Benchmarking efficiency. Manual processes averaging over 4,000 euros per request indicate automation is needed.
Data completeness scoreOver 95 percent of systems searchedPercentage of systems in the data inventory that were actually searched for each DSAR. Missing systems means missing data.
Escalation rateUnder 10 percentPercentage of DSARs that require escalation to legal or senior management. High rates indicate unclear processes or training gaps.
Extension usage rateUnder 5 percentPercentage of DSARs requiring the 60-day extension. High rates indicate systemic capacity or process problems.
Complaint rateUnder 2 percentPercentage of DSARs resulting in complaints to the supervisory authority. This is the ultimate quality metric.

Frequently Asked Questions

In most cases, no. GDPR Article 12(5) requires that responses to DSARs be provided free of charge. You may charge a "reasonable fee" only in two situations: (1) the request is manifestly unfounded or excessive, particularly if it is repetitive, or (2) the data subject requests additional copies of the same data beyond the first copy. The fee must be based on the administrative cost of providing the information. You cannot use fees as a deterrent to discourage people from exercising their rights — supervisory authorities will investigate patterns of fee-charging as a potential violation.

Chimaka Ikemba

Chimaka Ikemba

Privacy & Compliance Writer

Data Privacy & Compliance

Chimaka is a CIPP/E-certified data privacy consultant with six years of hands-on experience in regulatory compliance. She specializes in helping organizations navigate GDPR, CCPA, and emerging global privacy regulations, translating complex legal requirements into practical compliance frameworks. Her guides are trusted by legal teams and data protection officers worldwide.

You Might Also Like

GDPR Fines in 2026: Biggest Penalties and Lessons Learned
GDPR Compliance18 min read

GDPR Fines in 2026: Biggest Penalties and Lessons Learned

Analysis of the largest GDPR fines through 2026, covering Meta's record 1.2 billion euro penalty, the enforcement patterns behind DPA decisions, which violations trigger the biggest fines (international transfers, consent failures, insufficient legal basis), and the practical compliance lessons every organization should learn from these cases.

Chimaka Ikemba
Chimaka Ikemba

April 4, 2026

0
Free Newsletter

Stay Ahead of Cyber Threats

Get weekly cybersecurity insights and practical tips. No spam, just actionable advice to keep you safe.