Consumer Rights Operations

DSAR Response Guide for Businesses 2026: What Is a DSAR & How to Handle It Correctly

April 25, 2026 · Precept Compliance Team · 18 min read

A Data Subject Access Request (DSAR) is a formal consumer request for their personal data — and getting the response wrong costs companies millions. This guide covers what a DSAR is, which laws require response, the exact deadlines, and a 10-step process that keeps you compliant under GDPR, CCPA, VCDPA, CTDPA, CPA, and TDPSA.

30
GDPR calendar days to respond
45
CCPA calendar days (extendable)
$7,500
Max penalty per intentional violation
6
Major regulations requiring DSAR response

Is your site ready for a DSAR?

Scan your website in 60 seconds to see which privacy laws apply to your business and whether your data practices are exposed.

Scan My Site →

What Is a DSAR — and Why Businesses Get It Wrong

A Data Subject Access Request (DSAR) — also called a Consumer Rights Request (CRR) under US state laws — is a formal legal mechanism that allows individuals to exercise their rights over their personal data. When a consumer submits a DSAR, they are invoking statutory rights that your business is legally obligated to fulfill.

The most common DSAR types are:

The reason businesses get DSARs wrong comes down to three failure modes:

Failure Mode #1 — No designated intake process. Requests arrive via email, social media DMs, web forms, or phone calls and get routed to whoever picks them up. There's no clock started, no verification triggered, no escalation path. The deadline passes.

Failure Mode #2 — Data is scattered across systems. Your CRM has one version, your email platform has another, your analytics provider has a third. A "complete" response would require searching 12 systems — and most companies only search two.

Failure Mode #3 — Wrong identity verification standard. Too loose and you're leaking personal data to fraudsters. Too strict (demanding notarized documents) and you're refusing to honor valid requests — which is also a violation.

Each of these failure modes has resulted in regulatory enforcement action. We cover the cases below.

Which Privacy Laws Require DSAR Response — and What Are the Deadlines?

Six major regulations require businesses to respond to consumer data requests. Each has different thresholds, deadlines, and penalties. Understanding your applicable law(s) is the first step.

Regulation Jurisdiction Response Deadline Extension Allowed Max Penalty Enforcer
GDPR EU / UK 30 calendar days +60 days (complex requests, notify consumer) €20M or 4% global revenue Data Protection Authorities
CCPA/CPRA California 45 calendar days +45 days (notify consumer within initial period) $7,500 intentional / $2,500 unintentional California AG / CPPA
VCDPA Virginia 45 calendar days +45 days (notify consumer) $7,500 per violation Virginia AG
CTDPA Connecticut 45 calendar days +45 days (notify consumer) $5,000 per violation Connecticut AG
CPA Colorado 45 calendar days +45 days (notify consumer) $20,000 per violation Colorado AG
TDPSA Texas 45 calendar days +45 days (notify consumer) $7,500 per violation Texas AG

Key insight: GDPR has the shortest deadline (30 days) and the largest financial exposure. But US state laws are increasingly the primary source of consumer complaints, and the California Privacy Protection Agency (CPPA) is ramping up enforcement. If your business serves consumers in multiple states, you are subject to multiple concurrent obligations — the most restrictive deadline applies.

Which Laws Apply to Your Business?

Applicability thresholds vary significantly:

Not sure which laws apply to you?

Precept scans your website and data practices to identify which regulations you're subject to — and what your current exposure looks like.

Get My Compliance Report →

The 10-Step DSAR Response Process

Following a consistent process is what separates companies that handle DSARs smoothly from those that get caught with missed deadlines and incomplete responses. Here is the complete workflow:

  1. Designate a Centralized Intake Channel Every DSAR must enter through a single, monitored channel — typically a dedicated email address (privacy@yourcompany.com), a web form, or a toll-free phone number. The CCPA requires that you offer at least two methods; one must be a web form if you operate a website. All incoming requests must timestamp the moment of receipt, since your response clock starts immediately.
  2. Confirm Receipt Within 10 Business Days (CCPA) or Promptly (GDPR) Acknowledge every request — even if you need time to verify identity or gather data. Under CCPA, you must send a confirmation of receipt within 10 business days. This confirmation should: acknowledge the request, state when the consumer can expect a response, and explain your verification process if applicable.
  3. Verify the Requestor's Identity Identity verification is legally required before you disclose personal data — to prevent fraudulent access. The standard must be calibrated to the sensitivity of the request. For sensitive data categories, use two-factor verification (e.g., match on name + account email + phone on file). Critically: you cannot require more than reasonably necessary. Demanding a notarized government ID for a basic opt-out request is itself a violation. For authenticated users (logged in), authentication alone is sufficient verification for most requests.
  4. Confirm Applicability and Exemptions Not every request must be fulfilled in full. Review whether any statutory exemptions apply: (a) responding would violate confidentiality obligations or third-party rights, (b) the request is manifestly unfounded or excessive (GDPR), (c) the information is subject to attorney-client privilege, or (d) the consumer submitted the same request within 12 months (CCPA limits to two free responses per year). Document your assessment even when you do fulfill the request.
  5. Conduct a Cross-System Data Search Issue a documented data search across all systems where the consumer's personal data could exist: CRM, marketing automation, analytics, customer support tickets, financial records, email lists, advertising pixels, data brokers you've shared with, and any third-party processors with a data sharing agreement. Document which systems were searched, the date of search, and who performed it. Incomplete searches are the #1 cause of regulatory findings in DSAR enforcement actions.
  6. Compile and De-identify Third-Party Data When preparing the response package for access requests, include all personal data held about the consumer but redact or exclude any personal data relating to third parties (e.g., a support ticket that mentions another customer). If your data store includes inferences drawn from the consumer's activity (ad targeting categories, credit risk scores), these must be disclosed under CCPA/CPRA — they are "personal information" even if the consumer never provided them directly.
  7. Deliver the Response in the Required Format For access requests: deliver data electronically in a portable format (CSV or JSON preferred) unless the consumer specifically requests another format. For deletion: provide written confirmation that deletion has been completed, specifying the categories of data deleted and the date. For opt-out: confirm the effective date and which third parties have been notified. Under GDPR, responses must be in clear, plain language — no legalese.
  8. Notify Downstream Processors and Data Brokers A deletion or opt-out request doesn't end at your database. Under CCPA, GDPR, and most US state laws, you must instruct service providers and third parties you've shared data with to honor the request. Maintain a current list of all entities you've shared or sold personal data to so you can issue notifications promptly. Failure to propagate deletion downstream is a common gap that regulators specifically investigate.
  9. Document Everything — Create a Complete DSAR Record Every DSAR response must be fully documented: the original request, identity verification steps taken, systems searched, data provided or deleted, any exemptions applied with reasoning, all downstream notifications sent, and the final response date. Under GDPR's accountability principle, you must be able to demonstrate compliance. Under CCPA, records must be kept for 24 months. Maintain a DSAR log as a formal record.
  10. Establish and Communicate the Appeals Process All US state privacy laws (VCDPA, CTDPA, CPA, TDPSA) require that you offer consumers the right to appeal if you deny their request. The appeal must be reviewed by someone with authority to overturn the original decision — not the same person who denied it. You must respond to appeals within 60 days (VCDPA/CTDPA/CPA) or a "reasonable period" (TDPSA). If the appeal is denied, inform the consumer how to escalate to the state Attorney General's office. Your privacy policy must describe the appeals process in plain language.

Timing discipline is everything. The most common violation is a missed deadline — not a malicious act. Set calendar reminders at Day 1, Day 10, Day 30, and Day 44. Treat each DSAR like a customer support ticket with a hard SLA. Automated DSAR management tools can help, but even a spreadsheet with dates tracked is better than nothing.

Common DSAR Mistakes — and Real Enforcement Cases

Regulatory bodies don't need to prove bad intent to issue fines. Process failures, delayed responses, and inadequate searches are sufficient. Here are documented enforcement actions where DSAR handling failures drove the penalty.

Clearview AI — Multiple DPAs
€50M+ total across EU regulators

Clearview repeatedly failed to respond to access requests submitted by EU residents under GDPR. The Italian DPA (Garante) found that Clearview refused to provide data to requestors, charged fees where none were permitted, and failed to designate a GDPR representative in the EU as required. The French CNIL issued a €20M fine specifically citing failure to honor access and deletion requests. The core failure: treating DSAR obligations as optional for a company that "didn't intend to serve EU customers."

Lesson: Geographic presence is not required for GDPR applicability. If you process EU residents' data, DSAR obligations apply — and claiming otherwise is an independent violation.
Sephora — California AG
$1.2M settlement

California's first major CCPA enforcement action (2022) included findings that Sephora failed to process opt-out requests from consumers who had set a "global opt-out" signal (GPC — Global Privacy Control) in their browsers. Sephora was not honoring the GPC signal as a valid opt-out mechanism. The AG specifically cited failure to honor consumer opt-out requests as a core violation. A 30-day cure period was offered but the company failed to cure fully, leading to the settlement. CPPA has since clarified that GPC signals must be treated as valid DSAR opt-out requests effective immediately.

Lesson: Opt-out requests arrive through multiple channels — including browser-level signals. If your tech stack doesn't honor GPC, every non-compliant session is a potential violation.
British Airways — UK ICO (GDPR)
£20M fine

While primarily a data breach case, the ICO's investigation found that British Airways had inadequate processes for responding to subject access requests and could not demonstrate what personal data was held or where it was stored. The cross-system data discovery failure — central to DSAR compliance — was cited as evidence of broader data governance failure that enabled the breach. The inability to locate and account for personal data is simultaneously a DSAR failure and a security failure.

Lesson: If you can't answer a DSAR (because you don't know what data you hold or where it is), you have a compliance and security problem. Data mapping is a prerequisite for DSAR compliance, not a nice-to-have.
Zoom — FTC (Consent & Access Failures)
Mandated compliance program + monitoring

The FTC's 2020 action against Zoom included findings that the company made representations about data practices that were inconsistent with what users could access or verify through data subject requests. Users attempting to understand how their data was used were unable to get accurate or complete responses. The FTC order required Zoom to implement a comprehensive privacy program with mandatory DSAR workflows, third-party assessments, and annual reporting — with the cost of compliance exceeding any direct fine.

Lesson: DSAR responses that are technically compliant but substantively misleading — providing incomplete data or vague descriptions — create independent liability. "We responded" is not enough; the response must be accurate and complete.
Google Ireland — Irish DPC (GDPR)
€90M across multiple DSAR-related decisions

The Irish DPC has issued multiple decisions against Google entities specifically related to inadequate responses to access requests. In several decisions, Google was found to have provided incomplete responses — omitting categories of personal data (particularly inferences and ad-targeting profiles) that consumers had a right to access. The DPC found that providing raw data without the associated inferences and derived profiles does not constitute a complete response to an access request under GDPR. This is the "hidden data" problem: companies disclose what users consciously provided but withhold the behavioral inferences built from that data.

Lesson: Your DSAR response must include derived data, inferences, ad profiles, and behavioral scores — not just name, email, and purchase history. The less visible the data, the more regulators expect you to proactively disclose it.

Know Your DSAR Exposure Before a Consumer Files One

Precept scans your website to identify which privacy laws apply, what data you're collecting, and whether your privacy practices are ready for consumer rights requests. Get your free compliance report in 60 seconds.

Scan My Site Free →

DSAR Compliance Checklist for Businesses

Use this checklist to assess your DSAR readiness before you receive a request:

On the horizon: The American Privacy Rights Act (APRA), if enacted at the federal level, would standardize DSAR requirements nationally and preempt many state-level variations. Until then, multi-state businesses must maintain compliance with the most restrictive applicable standard across all active regulations.