Skip to main content

Data Access Requests

Handling GDPR Article 15 subject access requests.

What is a Data Access Request?

Under GDPR, individuals have the right to:

  • Obtain confirmation that their data is being processed
  • Access their personal data
  • Receive information about how their data is used

Request Handling Checklist

Step 1: Verify Identity

  • Confirm requester's identity matches account holder
  • Request ID verification if submitting via email (not logged in)
  • Check email matches registered account email
  • Document verification method used

Step 2: Acknowledge Receipt

ActionTimeline
Send acknowledgment emailWithin 48 hours
State expected completion dateWithin 30 days of verified request
Provide reference numberImmediately

Template acknowledgment:

"We have received your data access request dated [DATE]. Your request reference is [REF]. We will respond within 30 days as required by GDPR. If we need additional information to verify your identity, we will contact you."

Step 3: Gather Data

Collect data from all sources:

SystemData Types
Corsair ConnectProfile, transactions, commissions, wallet history
CSRnowCSR holdings, retirement records, Hall of Fame entries
SupportTicket history, communications
KYC/KYBVerification documents, approval records

Step 4: Prepare Response

The response must include:

CategoryInformation to Provide
PurposesWhy data is processed
CategoriesTypes of personal data held
RecipientsWho data has been shared with
RetentionHow long data will be stored
RightsTheir rights to rectification, erasure, restriction
SourceWhere data was obtained (if not from them)
Automated decisionsAny profiling or automated decision-making

Step 5: Deliver Response

Delivery MethodWhen to Use
Secure portal downloadPreferred method
Encrypted emailIf portal not available
Registered mailIf specifically requested

Response Timeline

StageDeadline
Acknowledgment48 hours
Initial response30 days
Extension (complex requests)+60 days with notification

Extension only permitted when:

  • Request is complex
  • Multiple requests received from same individual
  • Member notified within original 30 days with reasons for extension

Data Format

Provide data in:

  • Structured format (CSV, JSON) for portability
  • Readable summary (PDF) explaining what the data means
  • Original documents (KYC images) if specifically requested

Common Scenarios

Scenario: Member wants all their data

  1. Verify identity
  2. Export from all platforms
  3. Package with explanatory cover letter
  4. Deliver securely within 30 days

Scenario: Request via third party (e.g., lawyer)

  1. Require written authorization from account holder
  2. Verify authorization is genuine
  3. Confirm identity of both parties
  4. Proceed as normal once verified

Scenario: Excessive or repeated requests

SituationResponse
First requestProcess normally (free)
Same data, short timeframeMay charge reasonable fee or refuse
Clearly unfounded/excessiveMay refuse with explanation

Escalation

Escalate to CIO if:

  • Request involves disputed data
  • Member claims data is inaccurate
  • Legal representative is involved
  • Request overlaps with ongoing investigation

Documentation

Record in support system:

  • Request received date
  • Verification method
  • Data sources checked
  • Response sent date
  • Delivery confirmation