How To Address A Subject Erasure Request

The idea that an individual user can compel a company to delete all traces of their data is powerful, but servicing these requests properly requires a well-honed process and a deeper understanding of what is meant by erasure.


How To Verify User Identity For Data Subject Access Requests

When your business receives a data subject request, verifying the identity of the requestor is a key first step. This step-by-step guide takes you through the pros and cons for different methods of subject request identity verification.