March 3, 2026•9 min read
A data subject access request (DSAR) is a formal request made by an individual to an organization to disclose what personal data it holds about them, why it is being processed, who it has been shared with, how long it will be retained, and whether it is subject to automated decision-making.
DSARs are a legal right established by GDPR Article 15 and recognized in various forms by US state privacy laws including CCPA, VCDPA, CPA, UCPA, and CTDPA.
A DSAR gives individuals the legal right to know what personal data an organization holds about them and how it's being used. Organizations typically have 30–45 days to respond, depending on the applicable law. DSARs are a subset of data subject requests (DSRs), which also cover deletion, correction, and portability rights.
A data subject access request (DSAR) is a formal request from an individual, protected by an applicable privacy law, asking an organization to disclose the personal data it holds about them.
Though the term DSAR originated with the General Data Protection Regulation (GDPR), the underlying right, the right to access, is now recognized by privacy laws across the US, UK, and beyond. US state privacy laws don't always use the term "data subject" (that language is specific to GDPR), but the practical application is the same.
Under most privacy laws, a DSAR can require an organization to disclose:
A data subject access request (DSAR) specifically refers to the right to access i.e. the right to see what personal data an organization holds. A data subject request (DSR) is a broader term covering the full range of privacy rights an individual can exercise.
Most modern privacy laws grant consumers some combination of the following rights, all of which fall under the DSR umbrella:
GDPR Article 15 is the foundational legal basis for data subject access requests. It establishes that individuals have the right to obtain confirmation from an organization as to whether their personal data is being processed—and if so, to access that data along with specific information about how it's being used.
Under Article 15, an individual can request:
Once a valid request is received, organizations, referred to as "data controllers" under GDPR, must provide a copy of the personal data being processed, along with any requested information from the list above.
Individuals who are unsatisfied with an organization's response have the right to lodge a complaint with their country's data protection authority (DPA) or other supervisory authority.
Each US comprehensive state privacy law establishes various consumer rights, including the ability to access, correct, and delete personal data held by companies. While US state laws don't use the term "data subject," that language is specific to GDPR. the practical effect is the same: consumers can request a copy of the personal data an organization holds about them, and the organization must respond within a defined timeframe.
State privacy legislation has grown rapidly. California passed the first comprehensive US state privacy law in 2018. Virginia and Colorado followed in 2021, then Utah and Connecticut in 2022. In 2023, seven more states passed laws: Delaware, Indiana, Iowa, Montana, Oregon, Tennessee, and Texas. In 2024, seven more followed: New Hampshire, New Jersey, Kentucky, Maryland, Minnesota, Nebraska, and Rhode Island.
Twenty states had comprehensive privacy laws in effect by the end of 2025, with more than a dozen additional states actively considering legislation for 2026 and beyond.
Most states grant consumers a core set of rights including the ability to access, delete, and correct personal data; request copies of their data (data portability); and opt out of targeted advertising, the sale of personal data, and certain types of profiling. There are notable exceptions: Iowa's law does not provide consumers with the right to correct inaccurate data or to opt out of processing for targeted advertising.
Get a skimmable, searchable guide to U.S. state privacy laws, including which require data subject request fulfillment.
Get the trackerRegardless of which regulations apply to your organization, three principles should guide every DSAR program.
This requirement is consistent across all major privacy regulations. Data must be returned in a format the average person can read without specialized software or technical knowledge. If your team would struggle to interpret the output, it's unlikely to meet the standard.
Organizations are required to respond promptly, but they're also responsible for maintaining data security. Sending personal data to the wrong person, or to a bad actor impersonating a legitimate requestor, creates significant liability.
Effective identity verification practices include:
Manual DSAR fulfillment is feasible at very low volumes. As request volumes grow, manual processes introduce compounding risk: slower response times, higher error rates, increased security exposure, and significant resource drain on legal, engineering, and customer experience teams.
DSAR automation addresses all of these by:
Fulfilling a DSAR typically requires coordination across customer experience, engineering, data, and legal teams. The exact steps depend on your data ecosystem and the privacy infrastructure you have in place — but three foundational steps apply to every DSAR process.
A note before you start: Successful DSAR fulfillment assumes the existence of a complete, up-to-date data map. Without knowing where personal data lives across your systems, Step 2 becomes significantly more complex. If your data map is incomplete, address that first.
Before processing any request, confirm the requestor is who they claim to be. Failure to do so risks sending sensitive personal data to the wrong person — a data breach in its own right.
Best practice is to use a secure intake form with two-factor authentication rather than accepting requests by email. For high-sensitivity requests like deletion, requiring account login adds an additional verification layer.
This is where DSAR fulfillment becomes operationally complex. You need to identify every system — every database, SaaS application, data warehouse, and third-party tool — where the individual's personal data may exist, then locate and extract that data from each one.
For organizations with automated DSAR tooling, each connected system is queried automatically. For organizations relying on manual processes, this means querying each system individually — and for third-party SaaS tools, it may mean reaching out to vendors directly and waiting for responses.
This is why automated tooling becomes essential as request volumes grow. A manual process that's manageable at ten requests a month becomes untenable at a hundred.
Once all data is collected, package it in a format the individual can easily read and use. Regulatory guidance is consistent: the format cannot require specialized software or technical knowledge to interpret.
Plain formats like CSV, PDF, or structured JSON with a human-readable summary are generally appropriate. Whatever format you choose, test it against a non-technical standard — if someone without a data background can read and understand it, you're in good shape.
Transcend DSR Automation is the easiest and most comprehensive way to delete, return, or modify a person's data or preferences across your entire tech stack.
Get started with Transcend DSR Automation in minutes and cut privacy request processing costs by up to 80%. Access prebuilt workflows and zero-code customization to fully automate data requests, no humans required.
Explore our Docs Library to learn how DSAR fulfillment works with Transcend.
Ready to start fulfilling privacy requests automatically and efficiently?
Reach outSenior Marketing Manager II, Strategic Accounts