×

Data processing systems for identity validation of data subject access requests and related methods

  • US 10,564,936 B2
  • Filed: 09/13/2019
  • Issued: 02/18/2020
  • Est. Priority Date: 06/10/2016
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented data processing method for validating a data subject access request, the computer-implemented data processing method comprising:

  • receiving, by at least one computer processor, a data subject access request provided by a requestor, wherein the data subject access request comprises a request for a particular organization to perform one or more actions with regard to one or more pieces of personal data associated with an identified data subject that the particular organization has obtained on the identified data subject,wherein at least one of the one or more pieces of personal data associated with the identified data subject was not provided to the particular organization by the identified data subject, andwherein the data subject access request comprises one or more request parameters, wherein one of the one or more request parameters of the data subject access request comprises a type of data subject access request, and wherein the type of data subject access request is selected from a group consisting of;

    a first type of data subject access request that requires a first number of authentication methods, anda second type of data subject access request that requires a second number of authentication methods, wherein the first number of authentication methods is different than the second number of authentication methods;

    in response to receiving the data subject access request provided by the requestor, determining, by at least one computer processor, one or more authentication methods required to validate an identity of the requestor as the identified data subject of the data subject access request;

    providing, by at least one computer processor, the one or more authentication methods to the requestor, wherein each of the one or more authentication methods comprise prompting the requestor to provide particular information to validate the identity of the requestor as the identified data subject;

    determining, by at least one computer processor, whether to validate the identity of the requestor as the identified data subject based at least in part on the particular information provided by the requestor associated with each of the one or more authentication methods;

    in response to determining to validate the identity of the requestor as the identified data subject, validating, by at least one computer processor, the identity of the requestor as the identified data subject; and

    in response to validating the identity of the requestor as the identified data subject, processing, by at least one computer processor, the data subject access request by;

    automatically identifying, by at least one computer processor, the one or more pieces of personal data associated with the identified data subject, wherein the one or more pieces of personal data associated with the identified data subject are stored in one or more data repositories associated with the particular organization; and

    in response to automatically identifying the one or more pieces of personal data associated with the identified data subject, performing, by at least one computer processor, the one or more actions on the one or more pieces of personal data associated with the identified data subject based at least in part on the data subject access request.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×