Verifying the Identity of Someone Requesting Information Under the GDPR

Latest update:
22 Jul
2022

This blog looks at the requirement within both the DPA 2018 and the GDPR to verify the identity of an individual making a request before acting or releasing information.  Our clients are regularly raising questions and concerns with our consultants, along the lines of ‘what do I need to do?’

Let’s start by giving you a bit of context.  A 2019 news story featured a presentation given at the Black Hat security conference in Las Vegas by a PhD student from Oxford University. The student decided to contact about 150 organisations to see how much information he could obtain on his fiancée (with her permission of course… and naturally all in the interest of academic research!).

Anyway, he managed to obtain a mine of ‘useful’ information including credit card and social security numbers, passwords, and even her mother’s maiden name.  Of the organisations which responded, 24% simply accepted an email address and phone number as proof of identity and proceeded to send over all the files they had on his fiancée.  A further 16% requested easily forgeable ID information.

So why was it so easy to obtain all this information?

One suggestion is that organisations are concerned by the time restriction imposed by the GDPR to respond to requests, which reduced from 40 days to a month with the introduction of the GDPR.  As a result, they are looking to ‘process’ the request as quickly and efficiently as possible.  Another possible explanation is that front line staff receiving these subject access requests simply don’t know what they should and shouldn’t do as they haven’t been adequately trained.

So, what are the rules around verifying somebody’s identity?

The data controller MUST take reasonable steps to verify the individual if they are not known to them.

Here’s the guidance from the Information Commissioner’s Office:

You [controller] must comply with a request without undue delay and at the latest within one month of receipt of the request or (if later) within one month of receipt of: any requested information to clarify the request or any information requested to confirm the requester’s identity.

The GDPR states in Recital 64: (remember that courts will use the ‘Recitals’ to inform judgement decisions, so they must be given serious consideration by any controllers)

The controller should use all reasonable measures to verify the identity of a data subject who requests access, in particular in the context of online services and online identifiers.  A controller should not retain personal data for the sole purpose of being able to react to potential requests.”

This really couldn’t be much more explicit.  Verification of identity prior to disclosure is a clear obligation of any controller and is usually solidly practised, particularly within verbal interactions such as customer services, call centres etc., where individuals are required to identify themselves by providing information known only to them.  This includes requests made by a data subject’s representative (e.g., family member or spouse under power of attorney, court order, completion of a disclosure approval form etc.).  If verification cannot be achieved, the request should be denied, in writing, to the individual themselves.

Thumbnail of the Blog Illustration
Data Protection
updateD:
21/7/2022
Gaining Senior Management Buy-In to GDPR Compliance

“It is non-negotiable…….. the potential fines are enormous…….individuals can be held personally liable”. So, with all of these compelling reasons, why can it still be challenging to gain traction on

Read more
Thumbnail of the Blog Illustration
Data Protection
updateD:
25/7/2022
Supply Chain Compliance with the GDPR

This blog focuses on an aspect of the GDPR which can be particularly challenging for a number of organisations, namely, how do you ensure your supply chain complies with the Regulation when processing

Read more
Thumbnail of the Blog Illustration
Data Protection
updateD:
23/6/2022
How to Create a Record of Processing Activities (ROPA)

Creating a ROPA will involve understanding and capturing processing activities throughout an organisation. In this blog, we will outline a step-by-step procedure on how you can create a ROPA.

Read more
contact US

Let us help you

Let us help you in your compliance journey by completing the form and letting us know how we can best support you.