Subject Access Request (SAR) Procedure

Use this template to build procedures for subject access requests.

Subject Access Request (SAR) – Erasure

Use this example as a starting point to document your subject access request procedure for erasure requests.

Subject Access Request (SAR) – Rectification

Use this example as a starting point to document your subject access request procedure for rectification requests.

Subject Access Request (SAR) Registry Tool

Use this tool as a starting point to track all types of subject access requests throughout the process.

User Data Handling Requirements Tool

This tool will help you organize the data handling requirements for users throughout each phase of data's lifecycle.

Data Classification Verification Tool

This tool will help you verify the classification levels of your data by ensuring a balance of protection for sensitive data with limited cost and user friction.

Weighing the Price of a Data Breach: FTC Fines Facebook and Equifax in the Same Week

The US Federal Trade Commission announced both a $5-billion settlement with Facebook and a $575-million penalty against Equifax in the same week. Both were for data...

Netwrix Report: Growing Security Concerns Bringing Data Out of the Cloud – But Not for Good Reason

According to the latest Netwrix, concerns around data security have been encouraging 46% of organizations to move their personally identifiable information (PII) back on...

Varonis Report Identifies Widespread Shortcomings of Organizational Data Security Despite Increased Pressure of Regulations

Varonis reports that even after GDPR, businesses still are failing to effectively protect sensitive data.

Cloud Is Cool, but DLP Is a Sticky Wicket

Using the cloud has become second nature for today’s organizations, and in most cases, cloud enthusiasts report an overall security improvement. However, DLP remains an issue.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us