Skip to main content

DSAR User Guide

Overview

Privacy regulations provide the right for individuals to make Data Subject Access Requests (DSAR) to an organization to access, correct or delete their personal data being processed by the organization.

All DSA requests are submitted through the form on the website privacy portal or the IVR (toll-free number). 

Data Subject Access Requests run through three stages in general -- receiving the request, validation of the request, and processing the request and in some cases, providing a report back to the requestor. DSAR Users process and validate requests as they come in depending on the configurations made by the Admin. In other words, DSAR Users respond to the requests and perform the functions depending on the requirements for the request. For example, the DSAR processor deletes the date of the validated requestor from the company database for a Delete Request.

This guide follows the steps required for the following Users: -

  1. DSAR Validator: The user validating the requestor identity and information against the company database. In other words, checking to see if the requestor's information is in fact with the company.

  2. DSAR Processor: The user who performs the function of the request, i.e., deleting, providing a copy, etc as per the requirements of the request.

  3. DSAR Admin/Manager: The user overlooking all the stages of processing a request. This user manually creates action items for DSAR Validators and DSAR Processors so that they can perform their individual functions.

Note: The above three functions can be performed by 3 individual users or 1 user performing all functions or any combination of the same. It is not necessary to have 3 different users performing 3 different functions. This is left at the discretion of the company.

To Respond to a Request, follow these steps: -

  1. Sign into your Data Governance Tool account

    Graphical user interface, text, application, chat or text message   Description automatically    generated

  2. From the Main Screen of Data Governance Tool, click on DSA Request, present on the hamburger menu on the left of the screen.
    A screenshot of a phone Description automatically generated with    medium confidence

  3. On the DSA Request page, click on Active Requests

  4. This is a list of all requests that have come in from requestors that are still active. A screenshot of a computer Description automatically generated    with medium    confidence

    *Note: A guide to understanding and using the features on the grid can be found here

  5. From this list, click on the request that you wish to respond to/process.

  6. On this screen you can view the details of the individual request as well as configure action items to validate and process the request. In other words, this screen is where the requests are responded to/processed.

The Request Tab

Here you can view all the details of the request that was obtained from the Privacy Portal Form A screenshot of a computer Description automatically generated withmedium confidence

First you can view the details obtained from the requestor via the Privacy Portal Form. (The details on this Tab, which were obtained from the requestor are dependent on what was configured while creating the Privacy Portal Form) As per your requirements, certain details can be required from the customer while others won't be required.

  • Tenant: The name of the Tenant to which this request was submitted.

  • Region: The region from which this request came in. In other words, the region to which this specific request configuration is applicable.

  • Request Type: The function to be performed; delete data, unsubscribe etc.

  • Config Mapped: The configuration chosen for this kind of request. This can be created and selected from the DSAR Configuration settings.

  • Requestor Type: Whether the request was sent by a customer, employee, agent etc

  • Request Date: The date on which the request came in.

The above details are mandatory for any request as they provide key information around the context of the request. These details have been configured in the DSAR Configuration settings and accordingly the requests will be received and processed.

  • Version: A new version is created with every stage. This is done to compare information between 2 stages. For example, once additional information to customer is asked from and provided by the customer, a new version will be created.

Note: Customers can, via the form, upload attachments for the following file types .csv, .doc, .docx, .gif, .jpeg, .jpg, .json, .pdf, .png, .ppt, .svg, .txt, .xls, .xlsx, .xml. The file size should be greater than 0 Kb & it should not be exceed 10 MB. If the customer has added an attachment, it will be visible on this screen.

Next you can view the details of the request.

  1. Request ID: This is an auto generated ID by which the request can be identified

  2. Status: The request goes through different stages. The stage that the request is will be displayed here. The different stages of the request: -

    • Unverified: The customer is yet to verify the request. A verification link is sent to the customer once their request is submitted. However, verification emails can be sent to customers by clicking the Send Verification Email button below in case the customer has not yet verified their request.
    • New: Once the request has been verified the status of the request changes to New
    • In validation: The request is presently being validated by the DSAR Validator
    • Need additional information: The information provided by the customer is insufficient and additional information is required from the customer. An email will need to be sent to the customer in this case from the Validate Request Tab
    • In process: The request is presently being processed by the DSAR Processor
    • Rejected: If the information provided by the customer even after seeking additional information cannot be matched with the information present in the company database, the request is rejected.
    • Closed: If the email ID is not verified within given TAT (as defined by the DSAR Config) or additional information requested is not submitted within timeline, the request is closed.
    • Completed: The request has been successfully completed.
  3. Summary: Click on history to get all the information on the request to date A screenshot of a computer Description automatically generated    with low    confidence

  4. Due In: The due in date is configured on the Flow tab, on the DSAR Configuration page.

  5. Assigned to: Select a user who will oversee the entire processing of the request.

  6. Priority: Set the priority of the request

  7. Automate: Click on automate to enable the entire processing of the request to be automated.

  8. Closed: Tick this box if the request is to be considered closed. Provide the reason for closure in the field that appears if the box is ticked.
    A screenshot of a computer Description automatically generated    with medium    confidence

  9. Update Request: Click this button to save any changes made above.

  10. Send Verification Mail: A verification link is sent to the customer once their request is submitted. However, verification emails can be sent to customers by clicking this button in case the customer has not yet verified their request. Once a request has been verified, this option will disappear.

The Validate Request Tab

This is the second stage of responding to a request. Here, the request is validated. This is done by checking whether the requestor's details are in fact stored with the company, rendering the request valid. An action item is created and assigned to a DSAR Validator along with a key value (A key value is any value which can be used to identify a customer's information within the company database). The DSAR Validator uses the key value to search for customers information within the company database. If the customer's information within the database matches the information provided via the form, then the request is valid.

For example, Last transaction amount can be used as a key. On the form, the customer will be asked to fill in their last transaction amount. The DSAR Validator will receive an email asking him to check the Last Transaction Amount of the customer within the company database. If the Last Transaction Amount provided by the customer and the Last Transaction Amount obtained by the DSAR Validator from the company database are the same, then the Match Found option is selected. In this manner requests can be validated.

A screenshot of a computer Description automatically generated with medium confidence

To validate a request, follow these steps: -

  1. Click Create New Action Item. The action items here can be configured on the Flow tab of the DSAR Configuration page. Multiple action items can be created depending on the requirements. In some cases, requests will need to be validated from multiple systems/departments or by multiple users. Or in other cases, when requests are submitted by agents, the agents may have to be validated. In such cases, multiple action items can be configured.

    Each Action Item created when the user clicks on the button can be configured differently to meet different requirements.

  2. The requestor details can be seen on the left side pane, while the DSAR Validator response can be seen on the right-side pane. A screenshot of a computer Description automatically generated    with medium    confidence

  3. Depending on the status of the action item, it will appear in a different colour. If the Action Item has been configured but not sent to the DSAR Validator, it will appear in red

    A screenshot of a computer Description automatically generated    with medium    confidence

    If it has been sent to the DSAR Validator and the response is pending, it will appear in yellow. If the DSAR Validator has responded, it will appear in green

    A screenshot of a computer Description automatically generated    with low confidence

  4. Click Send to configure the email to be sent to the DSAR Validator.

  5. Once the Send button is clicked, the right-side pane will display the email configuration for the email to be sent to the DSAR Validator. A screenshot of a computer Description automatically generated    with medium    confidence Here you can select the user/s to whom the email should be sent. This person/s will in turn validate the request. You can also select and edit the email to be sent to them.

  6. Once the email has been configured, scroll down and click Send A screenshot of a email Description automatically generated with    medium confidence

  7. The DSAR Validator will receive the email with a link to access the Action Item. Alternatively, the Action Items assigned to users can be viewed on their respective dashboards.

  8. Once the DSAR Validator clicks on the link received on their email, they will be redirected to the Data Governance Tool where they will have to sign in if they are not currently signed in.

  9. Once signed in, the Action Item will be visible to them A screenshot of a computer Description automatically generated    with medium    confidence

  10. In this case, the Key Value in the email (as was specified in the selected email template) is the Last Transaction Amount.

  11. The DSAR Validator can use this key to check the details of the customer against the company database. If the information provided by the customer and the information found in the database are a match (in this case if the last transaction amount stated by the customer and the last transaction amount of the customer found within the company database are the same) then this request can be considered valid.

  12. The DSAR Validator will then have to enter the value found within the company database in the Value field. Multiple keys can be added for further verification if needed.

  13. If the two values are a match, the DSAR Validator will click on Match found. In the example given below, the information provided by the customer and the information found by the DSAR Validator are a match. Hence Match Found has been selected A screenshot of a computer Description automatically generated    with medium confidence

  14. If the information was not a match or the customer's information was not found within the database, then the DSAR Validator will click on Match Not Found.

  15. On clicking Match Not Found, a drop-down will appear. From here the DSAR Validator can select all the types of information that will be required from the customer in order to process the request. A screenshot of a computer Description automatically generated    with medium confidence

  16. Attachments and comments can be added if needed to provide more clarity to the Action Item.

Note: DSAR Validators can upload attachments for the following file types .csv, .doc, .docx, .gif, .jpeg, .jpg, .json, .pdf, .png, .ppt, .svg, .txt, .xls, .xlsx, .xml. The file size should be greater than 0 Kb & it should not be exceed 10 MB.

  1. Click Fast Entry to manually type in the details of the customer. The details typed in under Fast Entry can be used as data for the Key and Value fields

  2. Once the Validation is done, the DSAR Validator will click Send Response. A screenshot of a computer Description automatically generated    with medium confidence

  3. Once the Response has been sent, the following message will appear on the screen of the DSAR Validator
    A picture containing text, screenshot, font, rectangle Description    automatically generated

  4. Once the response has been submitted. The response will be visible on the Validate Request Tab. Click Save Response to update the response to the request flow A screenshot of a computer Description automatically generated    with medium    confidence

  5. However, if Match Not Found was selected by the DSAR Validator, then additional information may be required from the customer. If the additional information required has been provided by the DSAR Validator, then the same will be visible here. An email for additional information will need to be sent to the customer.

    A screenshot of a computer Description automatically generated withmedium confidence

  6. Any communication with the customer can be done from the Validate section of the Validate Request Tab A screenshot of a computer Description automatically generated    with medium    confidence

  7. Here, you can select the purpose of your communication with the customer. On clicking a purpose type, a pre-defined email template gets selected. With this, you can email a customer asking for additional information, to inform the customer that the request has been completed and so forth.

  8. In the example below, the purpose for communication is a Request for Extension. Accordingly, a template that conveys the same will be selected and this template can be previewed and edited.

    acknowledge template image

  9. Once the email configuration is done, Click Send As

  10. To view the past communications of this request, scroll down to Communications and click on the link. You will be redirected to the Reports module where you can access all the past communications of this request. A screenshot of a computer Description automatically generated    with low    confidence

The Process Request Tab

This is the third stage of responding to a request. Here, action items are created against Systems which will be affected by the request. For example, if a request comes in to delete data. The date to be deleted is stored in the System -- TestSystem001. Then action item will be created against this system and assigned to a user (DSAR Processor) associated with that System. The user, on receiving the Action Item, the user will then perform the function according to the requirements of the request.

A screenshot of a computer Description automatically generated withlow confidence

To process a request, follow these steps: -

  1. From the Plan Section, select the Systems associated with the request. Here, depending on the configuration made on the DSAR Configuration page, a list of systems will be provided here. Click on the System/s associated with this particular response and then click Create Action Item. A screenshot of a computer Description automatically generated    with medium    confidence

  2. On clicking Create Action Item, you will be redirected to the Act Section. Here you can configure the Action Item to be sent to the DSAR Processor. An email will be sent to the DSAR Processor with a link to the Action Item. The template of the email and the users to whom the email should be sent can be selected here. You can choose to attach the request details if needed. A screenshot of a computer Description automatically generated    with medium    confidence

  3. Once the email configuration is done, scroll down to click on Send A screenshot of a computer Description automatically generated    with medium    confidence

  4. The DSAR Processor will then complete the function stated in the Action Item. The email will also provide a link wherein the DSAR Processor can attach reports (in the same of Summarized Categories of Information and Copy of Information) and provide comments as required. A screenshot of a computer Description automatically    generated

Note: DSAR Processors can, upload attachments for the following file types .csv, .doc, .docx, .gif, .jpeg, .jpg, .json, .pdf, .png, .ppt, .svg, .txt, .xls, .xlsx, .xml. The file size should be greater than 0 Kb & it should not be exceed 10 MB.

  1. Once the DSAR Processor has created the response, they can click Send Response

  2. The response will be visible on the Process Request Tab. If the DSAR Processor has attached a report, download the file so that it can be attached to the final report to be sent to the customer. A screenshot of a computer Description automatically generated    with medium confidence

  3. Now that the request has been processed, intimation of the same can be sent to the customer from the Validate Section of the Validate Request Tab.

Note: AutoSave applies to both DSAR Validators and DSAR Processors when responding to Action Items. In other words, If a Validator and/or Processor is responding to an action Item and have not hit the Send Response button, their response is stored as a draft until they submit it. If they leave the page and then later open the same Action Item, they can see the old values previously entered.

The Build Report Tab

Reports can be sent to the customers in 2 cases; if the request was Summarized Categories of Information or Copy of Information. In both these cases, the attachments would have been provided in the previous stage by the DSAR Processor. These attachments can be downloaded and uploaded here as part of the complete report to be sent to the customer.

A screenshot of a computer Description automatically generated withmedium confidence

To build a report, follow these steps: -

  1. On the Build Report tab, scroll down to Report Attachments

  2. Here, click on Choose Files A screenshot of a computer Description automatically generated    with medium    confidence

  3. From your device, select the file provided by the DSAR Processor. If this file has not been downloaded to your device, you can access and download the same from the Process Request Tab. Multiple files can be selected here.

  4. If the following file types are added - excel, csv, json, xml, they can be edited and configured on the tool as per the requirements of the user. To do this, select the file from the device.

  5. When you click on the Pull Action Item Attachments it will be bringing all the action item attachments associated with the request.

  6. If the following file types are added - excel, csv, json, xml, they can be edited and configured on the tool as per the requirements of the user. To do this, select the file from the device and then click Build Report. Once the file has been saved, click on the settings button next to that file which should now be available under attachments A picture containing text, line, font, screenshot    Description automatically    generated

  7. A screen will open allowing you to configure how you want the excel to appear in your final report. You can select which columns you want to exclude, change the display name of columns and map the sheet to an existing configuration if the two are of the same file format A screenshot of a computer Description automatically generated    with medium confidence

  8. Once the configuration has been done, click Save.

  9. Once the report is ready you can click on the Approve button then only you can be able to zip and deliver it to the customer. A screenshot of a computer Description automatically generated    with medium confidence

  10. To deliver the report, click on the Deliver tab

The Deliver Tab

In the final stage of the request, you can configure the email to be sent to the customer with the attachment of their data that they requested. The customer will receive two emails. One with a link to the Data Governance Tool from where they can download their data and the other with the password required to download their data from the Tool. A screenshot of a computer Description automatically generated withmedium confidence

To deliver the report, follow these steps: -

  1. Ensure the files have been attached and saved on the Build Report Tab

  2. On the Deliver Tab, you can view the email to be sent to the customer. You can edit the email if needed.

  3. Click on Zip Files to create a single, password protected zip file containing the different files to be sent to the customer.

  4. The complete zip file can be viewed at the bottom of the screen along with the password required to access the files.

  5. The contents of the zip file can be viewed under attachments. Here the User can get an overview of all the files that will be included in the final zip file.

    A screenshot of a computer Description automatically generated    with medium    confidence

  6. You can view the final zip file by clicking on Report.zip

  7. The final zip file will be downloaded to your device. Here you can make edits if necessary. Once an edit has been made, the file will need to be encrypted again with the same password and then uploaded by clicking on Choose File.

  8. If edits have been made, choose the edited and the encrypted zip file from your device and then click on Replace Final Report. A screenshot of a computer Description automatically generated    with medium    confidence The edited zip file will now be attached to the email instead of the previous unedited version.

  9. Once the final report has been configured, click Send to send the email to the customer.