Data Subject Rights: Obligations and Timelines

The nine rights that GDPR grants to data subjects — introduced in Article 1.5 of this knowledge hub — only have practical value if organisations can actually fulfil them. A right that exists in theory but cannot be exercised in practice because the organisation lacks the systems, processes, or data visibility to respond is not a real right. It is a compliance gap waiting to become a supervisory authority complaint.

This article moves from what the rights are to how organisations must operationalise them. It covers the intake, verification, fulfilment, and documentation workflow that applies to all nine rights, the specific operational requirements for each right, the exemptions that can legitimately be applied, and the most common failure points that generate regulatory action. Article 3.6 provides the implementation-level procedural templates.

 

The Rights Framework at a Glance

NINE GDPR RIGHTS — QUICK REFERENCE

RightArticleBasis Triggers ItCan Be Refused?Standard Deadline
Right to be informed13–14All processingLimited exemptionsAt collection / within 1 month
Right of access (SAR)15All processingLimited exemptions1 calendar month
Right to rectification16All processingDisputed accuracy only1 calendar month
Right to erasure17Consent, LI, no longer necessaryYes — Art. 17(3) exemptions1 calendar month
Right to restriction18Disputed accuracy; unlawful; legal claimsLimited1 calendar month
Right to portability20Consent or contract onlyYes — other bases1 calendar month
Right to object21Legitimate interests; public taskYes — compelling groundsImmediately for direct marketing
Rights re: automated decisions22Solely automated + significant effectExemptions under 22(2)1 calendar month
Rights for children (consent)8Consent-based processing of children’s dataN/AAt or before collection

 

The Universal Workflow: Four Stages for Every Request

Regardless of which right is being exercised, every data subject rights request passes through four operational stages. Failures at any stage can result in a missed deadline, an incomplete response, or a regulatory complaint.

UNIVERSAL RIGHTS REQUEST WORKFLOW

StageKey ActionsTimelineCommon Failure
1. Intake & loggingReceive request; log date/time; assign reference; acknowledge receipt; start clockDay 0 — clock starts on receiptClock started on date reviewed, not received; no acknowledgement sent
2. Identity verificationVerify identity proportionately; request only minimum additional info; do not over-verifyComplete within first 5–7 daysRequesting disproportionate ID; delaying verification to extend timeline
3. FulfilmentSearch all systems; apply exemptions; redact third-party data; compile responseComplete before day 28Incomplete search; missing systems; third-party data not redacted
4. Response & documentationSend response; document action taken; retain record for accountabilityBy day 30 (or notify extension)No documentation; late response; unclear basis for refusal

 

Stage 1: Intake — When the Clock Starts

Article 12(3) is unambiguous: the one-month response period runs from receipt of the request. Not from when it is reviewed. Not from when the data protection team is notified. Not from when a ticket is created in the rights management system. Receipt is the trigger, and the clock starts immediately.

This creates a practical requirement: every channel through which a data subject might submit a rights request must be monitored daily, and requests must be logged and timestamped on the day they arrive. Email inboxes, online forms, postal mail, social media messages, in-app contact forms, and verbal requests made to customer service staff are all valid intake channels under GDPR. Organisations that funnel rights requests only through a dedicated privacy inbox frequently miss requests submitted through other channels, generating missed-deadline complaints.

An acknowledgement of receipt is not legally required by GDPR but is strongly recommended by DPAs and is operationally valuable: it confirms to the data subject that their request has been received, starts the documented timeline, and prevents a follow-up complaint about non-response.

 

Stage 2: Identity Verification — Proportionate, Not Excessive

Article 12(6) permits organisations to request additional information from data subjects where there are reasonable doubts about the identity of the person making the request. This is not a general licence to demand ID documentation before responding to every rights request. Verification must be proportionate to the nature of the request and the data involved.

For low-sensitivity data and requests made through authenticated channels (a logged-in account holder requesting access to their account data), no additional verification may be needed. For high-sensitivity data or where the request is made through an unauthenticated channel, proportionate verification — asking the person to confirm information only they would know, or to submit the request through an authenticated channel — is appropriate. Requesting government-issued ID for a routine access request where the person is already authenticated is disproportionate and has been criticised by DPAs.

IMPORTANTOver-verification is a compliance failure, not a cautious approach. Article 12(6) permits additional verification only where there are reasonable doubts about identity. Using an onerous verification requirement as a de facto deterrent to rights requests — or as a mechanism to extend the response timeline — violates the requirement to facilitate the exercise of rights under Article 12(2).

 

The Right of Access (SAR): Most Complex to Fulfil

Subject Access Requests (SARs) are consistently the most operationally demanding rights request. A complete SAR response requires the organisation to: confirm whether it processes the data subject’s personal data; identify and compile all personal data held across all systems; apply any exemptions; redact third-party data; and provide the supplementary information required by Article 15(1).

SAR RESPONSE — WHAT MUST BE PROVIDED

ComponentArticle 15 ReferencePractical Notes
Confirmation of whether personal data is processed15(1)Must be answered even if no data is held
Copy of all personal data held15(3)All systems; all formats; all processing activities
Purposes of processing15(1)(a)Per processing activity
Categories of data processed15(1)(b)As documented in RoPA
Recipients or categories of recipients15(1)(c)Processors, joint controllers, third parties
Retention periods or criteria for determining them15(1)(d)Per data category
Existence of rectification, erasure, restriction rights15(1)(e)Inform; do not need to action unless separately requested
Right to lodge complaint with supervisory authority15(1)(f)Include relevant DPA contact
Source of data (if not collected from the subject)15(1)(g)Required for indirect collection under Art. 14
Existence of automated decision-making including profiling15(1)(h)Logic, significance, and envisaged consequences

The most common SAR failure is an incomplete data search. Organisations without a current data map frequently miss data held in: email archives; backup systems; legacy databases; third-party processor systems; collaboration tools (Slack, Teams, Notion); analytics platforms; and customer support ticketing systems. A SAR response that omits material data is an incomplete response — and the data subject’s complaint about incompleteness is a straightforward supervisory authority investigation trigger.

 

The Right to Erasure: Conditions, Exemptions, and Technical Execution

Erasure requests require a two-step analysis before any action is taken: first, does one of the Article 17(1) triggering conditions apply? Second, does one of the Article 17(3) exemptions apply that would allow the organisation to refuse erasure?

RIGHT TO ERASURE — CONDITIONS AND EXEMPTIONS

Triggering Conditions (Art. 17(1))Exemptions That Override (Art. 17(3))
Data no longer necessary for the purpose it was collected forExercising the right of freedom of expression and information
Data subject withdraws consent and no other basis existsCompliance with a legal obligation requiring processing
Data subject objects and no overriding legitimate grounds existReasons of public interest in public health (Art. 9(2)(h/i))
Data has been unlawfully processedArchiving, research, or statistical purposes in public interest
Erasure required by legal obligationEstablishment, exercise, or defence of legal claims
Data collected in relation to information society services to a child

Where erasure is required, it must be genuine. Deactivating an account, suppressing data from active systems, or flagging a record as deleted without removing the underlying data does not satisfy the erasure obligation. The data must be deleted from: active databases; backup systems (at the next scheduled backup cycle, or immediately if technically feasible); processor systems (the controller must instruct all processors to delete); and any third parties to whom the data has been disclosed.

 

The Right to Object to Direct Marketing: No Exceptions

Article 21(2)’s right to object to direct marketing processing is unique among the nine rights in that it is absolute. Once a data subject objects to processing for direct marketing purposes, the controller must cease all processing for that purpose. There is no ‘compelling legitimate grounds’ override, no balancing assessment, and no exemption. The right is exercisable at any time and must be acted upon immediately.

DIRECT MARKETING OPT-OUT — OPERATIONAL REQUIREMENTS

RequirementWhat It Means Operationally
Immediate cessationMarketing communications must stop from the moment of opt-out, not the next campaign cycle
All channels coveredOpt-out from email does not automatically apply to SMS, phone, or post — all channels must be managed
Suppress, don’t deleteSuppression list required so the individual is not re-added; deletion risks re-adding them if data is re-collected
Inform at first communicationThe right to object to direct marketing must be explicitly communicated at the first communication with the data subject
No fee or disproportionate barrierOpt-out must be as easy as opting in — single-click unsubscribe; pre-filled opt-out forms
Audit trailRecord of opt-out timestamp and channel for accountability and to respond to future requests or complaints

 

Applying Exemptions Legitimately

GDPR’s rights are not absolute. Article 23 permits member states to restrict rights obligations by national legislative measures where such restrictions respect the essence of fundamental rights and freedoms and are necessary and proportionate in a democratic society to safeguard specific objectives. These national restrictions create a patchwork of exemptions that varies across EU member states.

The most commonly applicable exemptions across the EU include: the legal professional privilege exemption for legal advice and litigation contexts; the law enforcement and national security exemption; the exemption for processing for research, statistical, and archiving purposes; and the exemption for processing necessary for the exercise or defence of legal claims. Some member states have enacted broad exemptions for journalism and public interest investigations.

Critically, exemptions must be assessed per request against the specific circumstances of the request. A blanket policy of refusing certain types of rights requests on the basis of an exemption — without assessing whether the exemption genuinely applies to the individual request — is not a legitimate application of the exemption. The EDPB’s guidance on rights obligations emphasises that exemptions must be applied narrowly and proportionately.

KEY IDEAThe response to a rights request that is being refused — in whole or in part — must explain the specific grounds for refusal, inform the data subject of their right to lodge a complaint with a supervisory authority, and be issued within the one-month deadline. A refusal does not suspend or extend the response timeline. Silence is not a valid response to a rights request.

 

Documentation: The Accountability Record for Every Request

Every rights request, whether fulfilled or refused, whether straightforward or complex, must be documented in a way that demonstrates compliance if the data subject subsequently complains to a supervisory authority. The documentation should capture: the date and channel of receipt; the nature of the right exercised; the identity verification steps taken; the search conducted and systems covered; the data found; any exemptions considered and whether they applied; the response provided; and the date the response was sent.

This documentation serves two purposes. First, it is the evidence that the organisation met its obligations in the specific case — the audit trail for that rights request. Second, it is the aggregate data source for understanding the organisation’s rights request volume, response time performance, and exemption usage patterns, which informs resource planning and process improvement.

RIGHTS REQUEST LOG — MINIMUM FIELDS

FieldPurpose
Request reference numberUnique identifier for tracking and cross-referencing
Date and time of receiptStarts the compliance clock; evidence of timeline compliance
Channel of receipt (email, form, post, verbal)Shows all channels monitored; relevant if dispute arises
Data subject identifierLinks request to the individual’s data records
Right(s) exercisedDetermines the applicable obligations and deadlines
Verification steps taken and dateEvidence that identity was appropriately verified
Systems searched (or reason none required)Demonstrates comprehensive search for access requests
Action taken (fulfilled, refused, partial, extended)Core compliance record
Basis for any refusal or partial responseRequired if exemption applied; must be documented
Date of responseEvidence of compliance with 30-day deadline
Outcome of any DPA complaint (if applicable)Closes the loop on contested responses

 

Responding to Complex and Vexatious Requests

Article 12(5) permits organisations to refuse to act on requests that are ‘manifestly unfounded or excessive’. This is a high threshold — DPAs interpret it narrowly and have criticised organisations that use it as a general mechanism for managing rights request volume. The threshold requires that the manifestly unfounded or excessive nature of the request be clear and obvious — not merely inconvenient, burdensome, or difficult to fulfil.

Where an organisation determines that a request meets this threshold, it has two options: refuse to act, providing written reasons; or charge a reasonable administrative fee. Whichever option is chosen, the organisation must notify the data subject within one month of receipt. The burden of demonstrating that the request is manifestly unfounded or excessive lies with the controller.

BITLION INSIGHTOrganisations with mature rights request processes report that the most effective investment is a comprehensive, current data map that can be searched systematically in response to access requests. Organisations without this capability spend three to five times longer responding to SARs, frequently produce incomplete responses, and carry significantly higher DPA complaint risk. Building the data map is the highest-return investment in rights fulfilment capability.