SOC 2 P5.1: Privacy - Access to Personal Information
What This Control Requires
The entity grants identified and authenticated data subjects the ability to access their stored personal information for review and, upon request, provides physical or electronic copies of that information to data subjects to meet the entity's objectives related to privacy.
In Plain Language
When a user asks "what data do you have on me?" - you need to be able to answer that question fully, accurately, and quickly. This is one of the most fundamental privacy rights, and regulators take it seriously.
In practice, you need a working process for handling data subject access requests (DSARs). That means verifying the requestor's identity, pulling their data from every system where it lives, packaging it in a format they can actually use, and delivering it within the legally required timeframe. Many organisations build self-service portals where users can view and export their own data, which handles the bulk of requests without manual effort.
Auditors evaluate whether you have a defined DSAR process, whether identity verification prevents data being sent to the wrong person, whether responses are comprehensive (not just data from your main database, but from all systems), whether you meet the required timelines, and whether you keep records of every request and response.
How to Implement
Define your DSAR process end to end. Cover how requests are submitted (online form, email, in-app), who handles them, how you verify identity, what data is included in the response, what format it takes, and how quickly you deliver. Document the process and train the people responsible for executing it.
Verify identity before disclosing anything. Sending personal data to the wrong person is a breach, not a compliance win. For existing users, account authentication usually suffices. For non-account requests, use government-issued ID verification or knowledge-based authentication. Scale the verification to the sensitivity of the data.
Build the ability to compile data across all systems. You need a comprehensive data map and the technical capability to query across databases, analytics systems, CRM tools, email, and third-party services. For organisations receiving a high volume of requests, invest in automated export tooling that generates a complete package on demand.
Deliver data in a usable format. Structured exports (JSON, CSV), PDF reports, or secure online portals all work. Under GDPR, if the user asks for machine-readable format, you must provide it. Organise the output so the person can actually understand what they are looking at - a raw database dump is technically compliant but not helpful.
Build self-service access wherever possible. Let authenticated users view and download their personal data through account settings or a privacy dashboard. This satisfies most access requests without manual processing, improves user experience, and shows transparency. Keep a manual process available for data that does not appear in the self-service view.
Track every request. Log when it was received, how identity was verified, what data was provided, the response timeline, and any exceptions or redactions. This log is your primary evidence for auditors and helps you spot process bottlenecks.
Evidence Your Auditor Will Request
- Data subject access request process documentation with submission channels and timelines
- Identity verification procedures for access requests preventing unauthorized disclosure
- Data compilation capabilities documentation showing ability to gather data across all systems
- Sample access request responses demonstrating comprehensive and usable data provision
- Access request tracking log showing requests received, processed, and completed within timelines
Common Mistakes
- No formal process for handling data subject access requests
- Identity verification is insufficient, risking disclosure of personal data to unauthorized parties
- Access responses are incomplete, missing data from some systems where personal information is stored
- Access requests are not fulfilled within required timeframes due to manual, inefficient processes
- No tracking of access requests, preventing demonstration of compliance and trend analysis
Related Controls Across Frameworks
Frequently Asked Questions
Can we charge a fee for access requests?
What data must be included in an access response?
How do we handle access requests that would reveal another person's information?
Track SOC 2 compliance in one place
AuditFront helps you manage every SOC 2 control, collect evidence, and stay audit-ready.
Start Free Assessment