’What
Verifying identity is one of the most critical steps when handling a DSAR request (Data Subject Access Request). Before any personal data is disclosed, organizations must ensure that the requester is genuinely entitled to access it.
A failure at this stage can lead to serious consequences, including data breaches, regulatory penalties, and loss of trust.
If you’re new to DSARs, it’s helpful to first understand what a DSAR request is and how the overall response process works.
Verifying identity is one of the most critical steps when handling a DSAR request (Data Subject Access Request). Before any personal data is disclosed, organizations must ensure that the requester is genuinely entitled to access it.
A failure at this stage can lead to serious consequences, including data breaches, regulatory penalties, and loss of trust.
If you’re new to DSARs, it’s helpful to first understand what a DSAR request is and how the overall response process works.
In this guide, we’ll explore why identity verification is required under GDPR, what “reasonable verification” means in practice, and how organizations can implement secure and efficient verification processes.
Why Identity Verification Is Required Under GDPR
Under GDPR Article 12, organizations are required to verify the identity of a requester “where necessary” before responding to a DSAR.
This requirement exists to prevent unauthorized access to personal data. Without proper verification, organizations risk disclosing sensitive information—such as financial records, employee data, or health information—to the wrong individual.
Identity verification is therefore not just a procedural step. It is a core part of:
- Data protection
- Accountability
- Risk management
The Risks of Weak or Incorrect Verification
Weak identity verification is one of the most overlooked risks in DSAR handling.
If verification fails, the consequences can be severe:
- Unauthorized data disclosure
- Regulatory fines
- Reputational damage
- Legal claims from affected individuals
In many cases, attackers use DSAR requests as a form of social engineering—posing as legitimate users to extract data.
This makes identity verification your first line of defense.
What Does “Reasonable Verification” Mean in Practice?
GDPR does not define a fixed method for identity verification. Instead, it requires organizations to take “reasonable and proportionate” steps.
This means verification should depend on:
- The sensitivity of the data requested
- The context of the request
- The relationship with the requester
For example:
- A known customer requesting basic account data → simple verification
- A high-risk request involving sensitive data → stronger verification
The key principle is balance:
Too weak → security risk
Too strict → unnecessary friction and delays
Common Methods for DSAR Identity Verification
Organizations typically use a combination of methods depending on the situation.
Digital Verification Methods
These include:
- One-time passcodes (OTP) via email or SMS
- Login-based verification for existing users
- Secure portals
These methods are efficient and suitable for low-risk requests.
Document-Based Verification
This involves requesting:
- Government-issued ID
- Utility bills
- Official documents
This approach is more appropriate when:
- The requester is unknown
- The data is sensitive
Knowledge-Based Verification
This includes asking questions based on known data, such as:
- Account activity
- Past interactions
While useful, this method should not be relied on alone for high-risk requests.
Advanced Verification Methods
For higher-risk scenarios, organizations may use:
- Biometric verification
- Digital identity platforms
- Secure authentication tools
These methods provide stronger assurance but should be used proportionately.
Challenges in DSAR Identity Verification
Even with clear guidelines, verification can be difficult in practice.
Balancing Security and User Experience
Strict verification can frustrate legitimate users, while weak verification creates risk.
Handling High Volumes of Requests
Manual verification processes do not scale well, especially during spikes in DSAR requests.
Managing Additional Data
Verification often requires collecting new personal data, which must itself be handled securely and compliantly.
Global and Remote Contexts
Different countries, ID formats, and remote interactions add complexity to verification processes.
Best Practices for DSAR Identity Verification
To implement effective verification:
Use a Tiered Approach
Match verification strength to the risk level of the request.
Communicate Clearly
Explain:
- Why verification is required
- What information is needed
- How it will be used
Limit Data Collection
Only request what is necessary to verify identity.
Use Secure Systems
Avoid sending sensitive documents via unsecured channels.
Document the Process
Maintain records of:
- Verification steps
- Decisions made
- Outcomes
A structured process, such as a DSAR request checklist, can help standardize verification across teams.
How Identity Verification Fits Into the DSAR Process
Identity verification is just one step in a broader DSAR workflow.
It directly impacts:
- Response timelines → delays can affect deadlines
- Response accuracy → incorrect identity leads to incorrect disclosure
- Compliance risk → weak verification can result in violations
To see how this fits into the full process, refer to how to respond to a DSAR request and DSAR timeline under GDPR.
Frequently Asked Questions (FAQs)
1. Why is identity verification required for DSAR requests?
To ensure personal data is only disclosed to the correct individual.
2. What is considered reasonable verification under GDPR?
Verification that is proportionate to the risk and sensitivity of the data.
3. Can you ask for ID for every DSAR request?
Only when necessary. Requests should not be excessive.
4. Does identity verification pause the DSAR timeline?
No, it must be completed within the response timeframe.
5. What happens if verification fails?
The request may be paused or refused until identity is confirmed.
6. What is the safest way to verify identity?
Using secure, multi-factor methods tailored to the risk level.
Conclusion
Verifying identity for a DSAR request is not just a compliance requirement—it is a critical safeguard against data misuse and unauthorized disclosure.
Organizations that implement clear, proportionate verification processes can:
- Reduce risk
- Improve efficiency
- Build trust with users
As DSAR volumes increase, getting this step right will be essential for maintaining both compliance and credibility.
020 8004 8625


