Read More about fast-id page

Shufti globally launches webinr-icon - a new kind of identity solution!

Shufti globally launches - a new kind of identity solution!

Read more

DSAR Under GDPR and CCPA – Understanding the Key Differences

DSAR

Data protection is one of the key concerns of organisations these days. For the same reason, data protection laws have increased in different parts of the world. A study reveals that only 10% of the global population had data protected until last year. The study further states that approximately 65% of the population’s data will be secured by the end of the year 2023. The Cisco Consumer Privacy Survey shows that 84% of people are concerned about data privacy in the digital world and want more control over how their data is being used. Given the rising concerns of end-users, law-making bodies have enforced certain data protection regulations that provide consumers with the right to disclose their data. Arguably the European General Data Protection Regulation (GDPR) gives Data Subject Access Request (DSAR) to the residents. Similarly, there are many other regulations for data privacy like the California Consumer Privacy Act (CCPA), PIPEDA in Canada and LGPD in Brazil. Let’s take a look at the key differences of DSAR under GDPR and CCPA. 

What is DSAR?

DSARs are not new since companies and government authorities have been using them for many years now. However, data protection and privacy regulations imposed several changes that make it convenient for consumers to request data access. A DSAR is a request from a data subject to your firm. As per regulatory requirements, you are obligated to provide all the information as soon as possible.  

Article 15 of GDPR states,

“A data subject should have the right of access to personal data which have been collected concerning him or her and to exercise that right easily and at reasonable intervals, to be aware of and verify the lawfulness of the processing.”

According to Title 1.81.5 of CCPA

(a) A consumer shall have the right, at any time, to direct a business that sells personal information about the consumer to third parties not to sell the consumer’s personal information. This right may be referred to as the right to opt-out.

(b) A business that sells consumers’ personal information to third parties shall provide notice to consumers, pursuant to subdivision (a) of Section 1798.135, that this information may be sold and that consumers have the “right to opt-out” of the sale of their personal information.

(c) A business that has received direction from a consumer not to sell the consumer’s personal information or, in the case of a minor consumer’s personal information has not received consent to sell the minor consumer’s personal information shall be prohibited.

DSAR Under GDPR and CCPA

Under GDPR and CCPA, the DSAR has the following differences and similarities:

DSAR

DSAR – The Key Considerations 

With DSAR, there are some common expectations. A few of them are:

  • A company will respond to the request or take action 
  • The response will include all the information 
  • Action will occur in a defined period

For companies, one of the fundamental requirements is to maintain a record that a response was provided on the request. Companies must track the date of the receipt and the date of response. 

Businesses have a certain time limit to respond to DSARs. As per GDPR, firms must get back to the request within 30 days. On the other hand, the CCPA has imposed a 45-day restriction for the responses. Other timelines include:

  • 10 business days for confirming the receipt of the request 
  • 15 business days for responding to opt-out requests 
  • 90 business days for informing vendors to not sell consumer information
  • Two years for maintaining the log of the requests 

DSAR – The Key Exceptions 

There are some exceptions to DSAR for organisations under certain circumstances. A common exception under GDPR is the disproportionate effort. Companies cannot use DSAR exceptions for not responding to the requests.

California Consumer Privacy Act (CCPA) allows organisations to delete requests. For instance, if a consumer requests a deletion before the warranty period ends, the company is allowed to do that. 

In simpler words, there are many exceptions of DSAR and they vary according to the jurisdictions, laws of the state and many other factors. 

DSAR Checklist for Organisations

Here’s how businesses can opt for responding to DSARs:

  • A system that can efficiently receive and process all the requests
  • Verification of identities of data subjects upon receiving requests 
  • Data collection and review of the processed requests
  • Remediation plans 
  • Plans for delivering the requested information 

Can businesses refuse to respond to DSAR? Yes, under certain circumstances, companies can turn down a request. Here are some of these reasons:

  • Searchable and accessible format of personal information is not maintained
  • Compliance is the purpose for processing personal information 
  • Information is not used for commercial reasons 
  • The data is used for national security or law enforcement
  • The data subject has made multiple requests for disrupting the system

Key Takeaways

Data protection and privacy are the major concerns of law enforcing bodies and organisations. Different regions of the world have imposed various regulations like GDPR in the EU, CCPA in California, LGPD in Brazil, etc. The Data Subject Access Request (DSAR) provides consumers with the right to access their data. Under CCPA and GDPR, the DSAR provides visibility and control to the data subjects. Although there are certain exceptions of DSAR under certain situations, data subjects still have the liberty to request access, deletion or closure of their personal information. 

Got questions about data protection and privacy? Our experts are always there to assist you. 

Related Posts

Blog

Know Your Players: Why KYC is Necessary for Gaming and Gambling

The post-COVID-19 era has witnessed a remarkable surge in the e-sports and gaming sectors. This t...

Know Your Players: Why KYC is Necessary for Gaming and Gambling Explore More

Blog, Financial Crime / AML

What is PEP Compliance and Why do Financial Institutions Need it?

For Politically Exposed Persons (PEPs), an inter-governmental body established in 1989, Financial...

What is PEP Compliance and Why do Financial Institutions Need it? Explore More

Blog

Video KYC in 2024 | A Step Towards Digital Evolution

The striking surge in theft and fraud through digitisation is a growing concern for many business...

Video KYC in 2024 | A Step Towards Digital Evolution Explore More

Blog, Financial Crime / AML

Shufti integrates AML Compliance into its end-to-end Verification Services

Shufti has now launched AML compliance in its set of identity verification services to provid...

Shufti integrates AML Compliance into its end-to-end Verification Services Explore More

Blog

5 Key Questions About KYC Compliance to Look Out for in 2021

With the COVID-19 pandemic bringing challenges every day for businesses, the rate of identity fra...

5 Key Questions About KYC Compliance to Look Out for in 2021 Explore More

Blog

Proof of Income: The Most Common Types of Documents Used to Determine a Client’s Financial Status

Proof of income is a vital requirement in many financial and professional contexts. Recently, the...

Proof of Income: The Most Common Types of Documents Used to Determine a Client’s Financial Status Explore More

Blog

Safeguarding Ride-Hailing Services with Identity Verification Solutions

With the global digitization, mobility services are known to the world before the pandemic has ir...

Safeguarding Ride-Hailing Services with Identity Verification Solutions Explore More

Blog

5 Best Practices to Combat Identity Fraud on Social Media Platforms

Social media has demonstrated extraordinary growth in the past decade as a result of improvements...

5 Best Practices to Combat Identity Fraud on Social Media Platforms Explore More

Blog

Shufti’s Secret to Acquiring 92% End-User Satisfaction Rate

Shufti, the global identity verification service provider, started from humble beginnings wit...

Shufti’s Secret to Acquiring 92% End-User Satisfaction Rate Explore More

Blog

Multi-Tier Security – Another Line of Defense Against Bank Account Scammers

The banking sector has been witnessing a significant rise in criminal activities is a major conce...

Multi-Tier Security – Another Line of Defense Against Bank Account Scammers Explore More

Blog

UK’s On-Demand Culture – Building Trust & Security with Digital ID Verification

People across the world are spending more time on the internet ever since the pandemic struck the...

UK’s On-Demand Culture – Building Trust & Security with Digital ID Verification Explore More

Blog

A Brief Insight into AML Regulations for the Art Market

While the banking sector faces increased scrutiny to prevent illicit financial flows, a significa...

A Brief Insight into AML Regulations for the Art Market Explore More

Blog

Six Ways to Protect Your Business from Christmas Scams

Christmas is around the corner and all of you must be very excited to decorate christmas trees, e...

Six Ways to Protect Your Business from Christmas Scams Explore More

Blog

Reshaping Travel and Tourism with Instant Facial Recognition

Few technologies have sparked much debate as much as facial recognition. Today, it is considered ...

Reshaping Travel and Tourism with Instant Facial Recognition Explore More

Blog

Ensuring KYC/AML Compliance In Cryptocurrency Firms – The Role of Shufti

With emerging technologies in the financial industry, cryptocurrency is picking up the pace, and ...

Ensuring KYC/AML Compliance In Cryptocurrency Firms – The Role of Shufti Explore More

Blog

How OCR Helps in Fighting Financial Crimes?

OCR, also known as Optical Character Recognition, isn’t a new technology. However, it’s use in fi...

How OCR Helps in Fighting Financial Crimes? Explore More

Blog, Online Marketplace

Secure Online Merchandises with e-KYC and Digital ID Verification

Selling and purchasing online has its own advantages, both for the seller and the buyer. Online m...

Secure Online Merchandises with e-KYC and Digital ID Verification Explore More

Blog

Addressing Business Challenges Using OCR Scanner

OCR text recognition is similar to how humans process and store information through reading. The ...

Addressing Business Challenges Using OCR Scanner Explore More

Blog

An Insight Into AML Compliance Concerns Amid Russia Sanctions

With Russia’s attack on Ukraine, the international financial landscape is facing concerns of comp...

An Insight Into AML Compliance Concerns Amid Russia Sanctions Explore More

Blog, Identity & KYC

Know Your Patient: Anti-Fraud Pill for Healthcare Industry

Know Your Patient: The healthcare industry is more prone to data breaches than any other industry...

Know Your Patient: Anti-Fraud Pill for Healthcare Industry Explore More

Blog

Strengthening digital businesses with online age verification

It is projected that by the end of 2021, 2.4 billion will buy products and services online, up 46...

Strengthening digital businesses with online age verification Explore More

Blog, Fraud Prevention

4 Fraud Prevention Tips For Your E-commerce Business this Holiday Season

With the holiday shopping season in full swing, e-commerce fraud risk is a glaring reality that n...

4 Fraud Prevention Tips For Your E-commerce Business this Holiday Season Explore More

Blog

Restricting Criminals from Exploiting Investment Industry with Shufti AML Screening Solution

Investing the accumulated capital of investors in financial securities is the primary task of inv...

Restricting Criminals from Exploiting Investment Industry with Shufti AML Screening Solution Explore More

Blog

How to Design an Effective Client Lifecycle Management (CLM) System with ID Verification

The customer journey with a business is very comprehensive. It does not end once the customer is ...

How to Design an Effective Client Lifecycle Management (CLM) System with ID Verification Explore More

Blog

Leveraging Age Assurance for Data Privacy and User Protection

Online age verification has gained great attention in recent years since many minors have been se...

Leveraging Age Assurance for Data Privacy and User Protection Explore More

Blog

What is an OCR Screening and How Does it Work?

In our digital environment, where automated technology has already taken over corporate processes...

What is an OCR Screening and How Does it Work? Explore More

Blog

AML Screening | Fighting the War Against Terrorist Financing & Money Laundering

Money laundering and terrorist financing have become a global concern. In the US alone, approxima...

AML Screening | Fighting the War Against Terrorist Financing & Money Laundering Explore More

Blog

Combatting Fraud in the Automotive Industry

Fraud is a growing concern for many industries and the automotive industry is no exception. In 20...

Combatting Fraud in the Automotive Industry Explore More

Blog

An Insight Into AML Compliance Concerns Amid Russia Sanctions

With Russia’s attack on Ukraine, the international financial landscape is facing concerns of comp...

An Insight Into AML Compliance Concerns Amid Russia Sanctions Explore More

Blog

July 2023 Recap: Major Compliance Events and How AML Verification Can Help

Anti-Money Laundering (AML) violations pose a substantial and concerning threat to the reliabilit...

July 2023 Recap: Major Compliance Events and How AML Verification Can Help Explore More

Blog

May 2023 Recap: Major Security Breaches and Penalties

May 2023 witnessed several security breaches wreaking havoc on the digital landscape. High-profil...

May 2023 Recap: Major Security Breaches and Penalties Explore More

Blog

How to Protect Yourself From Cyber Crime in the Holiday Season?

Most people around the world do the majority of their shopping during the holiday season. Accordi...

How to Protect Yourself From Cyber Crime in the Holiday Season? Explore More

Blog

Enhancing the Effectiveness of KYC Checks with Shufti’s Forensic Document Verification

With emerging technologies and rapid digitization, identity fraud has become quite common, raisin...

Enhancing the Effectiveness of KYC Checks with Shufti’s Forensic Document Verification Explore More

Blog

A Brief Insight into Netherlands’ Cryptocurrency Regulations

Just like other European countries, the Netherlands is also a notable financial center making it ...

A Brief Insight into Netherlands’ Cryptocurrency Regulations Explore More

Blog

Ensuring Compliance and Securing Business Reputation – How Shufti Can Help

In the highly digitized world, businesses are partnering with each other to serve mutual interest...

Ensuring Compliance and Securing Business Reputation – How Shufti Can Help Explore More

Blog

AML Screening – Why Real Estate is an Easy Target for Money Launderers

The strong link between money laundering and the real estate industry is becoming a global concer...

AML Screening – Why Real Estate is an Easy Target for Money Launderers Explore More

Blog, Identity & KYC, Online Marketplace

Importance of Identity Proofing for Facebook & Social Media

For years, social media has been used as a tool for increased connectivity. Both businesses, as w...

Importance of Identity Proofing for Facebook & Social Media Explore More

Blog, Identity & KYC

Enhanced Due Diligence: Ensuring KYC and Regulatory Scrutiny

Enhanced Due Diligence: The adoption of innovative solutions in businesses today, should not have...

Enhanced Due Diligence: Ensuring KYC and Regulatory Scrutiny Explore More

Blog

Biometric Authentication Technology – Everything you Need to Know

Nowadays businesses are looking for more secure systems for the sole reason of customer authentic...

Biometric Authentication Technology – Everything you Need to Know Explore More

Blog

AML Screening – Identifying and Eliminating the Risks of Money Laundering in Businesses

Eliminating the risks of financial crime in businesses has never been easy and has been identifie...

AML Screening – Identifying and Eliminating the Risks of Money Laundering in Businesses Explore More

Blog

ICOs blocking investors from USA and China – Why and How?

Initial Coin Offerings, more commonly known as ICOs, are all the rage in modern day financial wor...

ICOs blocking investors from USA and China – Why and How? Explore More

Blog, Identity & KYC

Merchant Identity Proofing: Building Strong B2B Relations

Identity Proofing: The success of e-commerce has been very remarkable. It is expected that global...

Merchant Identity Proofing: Building Strong B2B Relations Explore More

Blog

Know Your Patient – Balancing Security, Customer Experience and Compliance in the Healthcare Sector

As the healthcare industry continues to offer life-critical services while making efforts to impr...

Know Your Patient – Balancing Security, Customer Experience and Compliance  in the Healthcare Sector Explore More

Blog

5 Key Regulatory Updates for the Banking Sector in 2021

The pandemic disrupted operations in the banking sector and the criminal activities significantly...

5 Key Regulatory Updates for the Banking Sector in 2021 Explore More

Blog, Identity & KYC

Digital Document Verification Giving Wing to Recruitment Sites

Document Verification: In an industry that’s all about people, it’s critical that you know that a...

Digital Document Verification Giving Wing to Recruitment Sites Explore More

Blog

Wholesale or Retail CBDCs? Settling the Endless Debate

The world is now moving towards digitisation at a faster pace than ever. The payment systems have...

Wholesale or Retail CBDCs? Settling the Endless Debate Explore More

Blog

Harnessing the power of AML Screenings to Uncover Politically Exposed Persons [PEPs]

Since the last decade, governments and financial institutions have been trying to limit corruptio...

Harnessing the power of AML Screenings to Uncover Politically Exposed Persons [PEPs] Explore More

Biometric Technology, Blog

Biometric Authentication: Applications and Constraints

Biometric authentication is considered as an advanced way of ensuring Know Your Customer (KYC). T...

Biometric Authentication: Applications and Constraints Explore More

Blog

AML Screening | Fighting the War Against Terrorist Financing & Money Laundering

Money laundering and terrorist financing have become a global concern. In the US alone, approxima...

AML Screening | Fighting the War Against Terrorist Financing & Money Laundering Explore More

Blog

Blockchain Technology and KYC for Crypto Exchanges – How Shufti Can Help

KYC compliance is the backbone of the Anti-Money Laundering (AML) measures implemented by any fin...

Blockchain Technology and KYC for Crypto Exchanges – How Shufti Can Help Explore More

Blog

Why Digital Identity Verification is Booming – A Detailed Insight

According to the report “Digital Identity & Document Verification Market & Technology Ana...

Why Digital Identity Verification is Booming – A Detailed Insight Explore More

Blog

AI-Powered OCR to replace data entry in 2020 – A detailed insight

Living in the data-driven world, there is a huge demand for storing data from printed or handwrit...

AI-Powered OCR to replace data entry in 2020 – A detailed insight Explore More

Blog

Fighting Financial Crimes and Securing Gambling Services with Shufti’s AML Screening Solution

Historically, the measures to curb money laundering and terrorist financing had only been only im...

Fighting Financial Crimes and Securing Gambling Services with Shufti’s AML Screening Solution Explore More

Blog

Risks of Vaccine Verification Apps & What IDV Industry can Offer

COVID-19 has brought enough changes to make the world smarter. Businesses and customers migrating...

Risks of Vaccine Verification Apps & What IDV Industry can Offer Explore More

Blog

Affiliate Fraud Detection | How to Prevent it in 2024

Affiliate marketing is growing at an exceptional rate, worth $17 billion by the end of 2023, and ...

Affiliate Fraud Detection | How to Prevent it in 2024 Explore More

Blog

Periodic to Perpetual KYC — The Changing Landscape in Banks

The employment of effective Know Your Customer (KYC) procedures has long been a challenge for fin...

Periodic to Perpetual KYC — The Changing Landscape in Banks Explore More

Blog

Anti-Money Laundering (AML) Screening | Combat Online Gambling Scams Effectively

Online gambling has seen significant adoption in the past few years because of the convenience, v...

Anti-Money Laundering (AML) Screening | Combat Online Gambling Scams Effectively Explore More

Blog

The Emerging Threat of DeepFakes and the Role of Video KYC

With technological advancement, cybercriminals are revising their strategies to commit fraud. Cri...

The Emerging Threat of DeepFakes and the Role of Video KYC Explore More

Blog

Top 13 Cybersecurity Predictions for 2020

Cybersecurity threats are ostensibly ubiquitous in this internetworking infrastructure. Internet-...

Top 13 Cybersecurity Predictions for 2020 Explore More

Blog

Global KYC and AML Regulatory Updates To Watch for in 2022

In 2022, the world continues to experience the serious aftermath of the coronavirus pandemic, yet...

Global KYC and AML Regulatory Updates To Watch for in 2022 Explore More

Blog

The State of KYC/AML Compliance in Commonwealth of Independent States (CIS) Region

Commonwealth of Independent States (CIS) is among the largest regions of the world with numerous ...

The State of KYC/AML Compliance in Commonwealth of Independent States (CIS) Region Explore More

Blog

Top 5 Ways to Improve Transaction Monitoring in Fintech

Fintech is a fast-growing sector that combines finance and technology to assist businesses and cu...

Top 5 Ways to Improve Transaction Monitoring in Fintech Explore More

Blog

AML in Real Estate – Combating Property Scams at the Forefront

Real estate is deemed to be a profitable and safe business to invest in thanks to its ever-growin...

AML in Real Estate – Combating Property Scams at the Forefront Explore More

Blog

Digital Identity Verification for Open Finance & FinTech Platforms

Financial applications in the modern world have been sub-categorized into open and closed banking...

Digital Identity Verification for Open Finance & FinTech Platforms Explore More

Blog

Lithuania’s AML Regulations – How the EU’s FinTech Hub Prevents Financial Crime

Emerging FinTech firms around the world spend almost one-third of their overall budgets on develo...

Lithuania’s AML Regulations – How the EU’s FinTech Hub Prevents Financial Crime Explore More

Blog

Enhanced Due Diligence: Identifying High-Risk Customers in the Banking Sector

The digitisation of our world and economies have introduced greater ease and efficiency to our pr...

Enhanced Due Diligence: Identifying High-Risk Customers in the Banking Sector Explore More

Blog

A Quantitative Insight into the Global Gaming and Gambling Industry

The gaming and gambling industry has demonstrated exponential growth in the past decades and is e...

A Quantitative Insight into the Global Gaming and Gambling Industry Explore More

Blog

How to protect your online gaming platform from ID frauds?

Gone are the days when online gaming was only restricted to LAN parties. With the development of ...

How to protect your online gaming platform from ID frauds? Explore More

Blog

May 2023 Recap: Major Security Breaches and Penalties

May 2023 witnessed several security breaches wreaking havoc on the digital landscape. High-profil...

May 2023 Recap: Major Security Breaches and Penalties Explore More

Blog

Effectiveness of the UK’s Economic Crime Bill in Combating Financial Crime

The Russian invasion of Ukraine has resulted in a surge in financial crimes in the UK as Russian ...

Effectiveness of the UK’s Economic Crime Bill in Combating Financial Crime Explore More

Blog

What Makes the Automotive Industry a Vehicle for Money Launderers

The automobile industry is the world’s biggest revenue-generating sector. In the global aut...

What Makes the Automotive Industry a Vehicle for Money Launderers Explore More

Blog

EU’s Smart ID Wallet – Paving the Way for a Seamless Digital World

A few days back, the European Union Commission published a draft for digital ID wallets for all t...

EU’s Smart ID Wallet – Paving the Way for a Seamless Digital World Explore More

Take the next steps to better security.

Contact us

Get in touch with our experts. We'll help you find the perfect solution for your compliance and security needs.

Contact us

Request demo

Get free access to our platform and try our products today.

Get started