How to Handle DSARs in Canada: A Complete Guide
Last updated: February 2026
Data Subject Access Requests (DSARs) are a fundamental right under Canadian privacy law. Whether you're subject to PIPEDA, Québec's Law 25, or provincial legislation, this guide walks you through building an efficient, compliant DSAR handling process.
Understanding DSARs in the Canadian Context
A Data Subject Access Request (DSAR) is a formal request from an individual to access, correct, or delete their personal information held by an organization.
In Canada, DSAR rights are protected under multiple laws:
Federal Level:
• PIPEDA (Personal Information Protection and Electronic Documents Act) applies to private sector organizations across Canada
Provincial Level:
• Québec's Law 25 (the most comprehensive provincial law)
• Alberta's PIPA
• British Columbia's PIPA
Key Principle: If you collect personal information about Canadians, you must have a process to handle their requests to access, correct, or delete that information.
Step 1: Recognize a DSAR
DSARs can arrive through many channels and in various forms:
Common Channels:
• Email to general inbox or privacy contact
• Web forms
• Phone calls
• Mail
• In-person requests
• Social media messages
What Makes a Valid DSAR:
• The request doesn't need to mention "DSAR" or cite specific legislation
• It doesn't need to be in writing (though you can request written confirmation)
• Any clear expression of wanting to access, correct, or delete personal data qualifies
Train Your Team to Recognize:
• "I want to know what data you have on me"
• "Please delete my information"
• "I need a copy of my file"
• "What information are you storing about me?"
• "I want to update my records"
All of these are valid DSARs that trigger your legal obligations.
Step 2: Log and Acknowledge
Once you identify a DSAR, immediately log it and acknowledge receipt:
Log These Details:
• Date and time received
• Channel it came through
• Requester's name and contact information
• Type of request (access, deletion, correction, portability)
• Assigned case ID
Acknowledge Receipt:
• Send confirmation within 1-2 business days
• Provide the case ID for reference
• Explain next steps and timeline
• Request any additional information needed for verification
Sample Acknowledgment:
"Thank you for your request regarding your personal information. We have logged your request with reference number [ID] and will respond within 30 days as required by law. If we need to verify your identity, we will contact you within the next few days."
Step 3: Verify Identity
Before disclosing personal information, you must confirm you're responding to the right person:
Verification Methods:
• Knowledge-based authentication (questions about their account or history)
• Existing login credentials
• Government ID (use data minimization — only collect what's necessary)
• Two-factor authentication via registered phone/email
Best Practices:
• Match verification rigor to data sensitivity
• Don't create unnecessary barriers
• Document your verification process
• Never request more information than necessary
What If You Can't Verify?
If identity cannot be confirmed, explain why you cannot process the request and give the requester an opportunity to provide additional verification.
Step 4: Search and Collect Data
Conduct a thorough search across all systems where personal data may be stored:
Common Data Locations:
• CRM systems
• Email servers and archives
• HR systems (for employee data)
• Marketing platforms
• Customer support ticketing systems
• Backup systems
• Paper files
• Third-party processors
Create a Data Map:
Document all locations where personal data is stored. This makes future DSARs faster and ensures completeness.
Search Tips:
• Search by name, email, phone, account number
• Check aliases and previous names if applicable
• Include structured and unstructured data
• Don't forget metadata
Third-Party Data:
If you've shared data with processors or partners, contact them for any relevant information they hold.
Step 5: Review and Redact
Before disclosing data, review it for exemptions and third-party information:
What to Redact:
• Information about other individuals
• Legally privileged communications
• Confidential commercial information
• Information that could harm ongoing investigations
What You Cannot Withhold:
• Data simply because it's unflattering
• Information that's "inconvenient" to provide
• Data you'd rather the person didn't see
Document Your Decisions:
For anything you redact or withhold, document:
• What was redacted
• The legal basis for redaction
• Who made the decision
• When the decision was made
Step 6: Prepare the Response
Compile a comprehensive, understandable response:
Include:
• All personal information found (or confirm none exists)
• Sources of the information
• Purposes for which it's used
• Who it's been shared with
• Retention periods
• Information about automated decision-making, if applicable
Format:
• Use clear, plain language
• Organize logically (by system, category, or date)
• Provide data in accessible format
• For portability requests, use machine-readable formats (CSV, JSON)
Response Letter:
Include a cover letter explaining:
• What's included
• How to interpret the data
• Any redactions made and why
• Their right to complain if dissatisfied
Step 7: Deliver Securely
Deliver the response through secure channels:
Secure Delivery Options:
• Encrypted email
• Secure download portal with expiring links
• Password-protected files (share password separately)
• Registered mail for physical documents
What to Avoid:
• Unencrypted email with sensitive data
• Public file sharing links
• Leaving voicemails with personal information
Confirm Receipt:
Request confirmation that the requester received the response, especially for sensitive data.
Step 8: Handle Deletion Requests
For deletion (erasure) requests, follow these steps:
Verify the Request is Valid:
Deletion may not apply if:
• Legal obligations require retention
• Data is needed for ongoing services
• Public interest or research purposes apply
Execute the Deletion:
• Delete from all active systems
• Delete from backups (or implement deletion upon restore)
• Notify third parties who received the data
• Document what was deleted and when
Respond to the Requester:
• Confirm deletion was completed
• List any data retained and why
• Explain their right to complain if dissatisfied
Step 9: Document and Close
Maintain comprehensive records of every DSAR:
Document:
• Complete timeline of the request
• All communications
• Search efforts and results
• Verification steps taken
• Review and redaction decisions
• Final response sent
• Delivery confirmation
Retention:
Keep DSAR records for at least 2-3 years to demonstrate compliance if questioned by regulators.
Close the Case:
• Mark as complete in your tracking system
• Conduct any follow-up if needed
• Update your data map if you discovered new data locations
Common DSAR Mistakes to Avoid
Missing the Deadline
The 30-day clock starts when you receive the request, not when you verify identity. Track deadlines carefully.
Incomplete Searches
Not checking all systems leads to incomplete responses and potential complaints.
Over-Redacting
Redacting information without valid legal basis can be seen as non-compliance.
No Documentation
Without records, you can't prove you handled the request properly if challenged.
Charging Fees Inappropriately
Most first requests must be free. Only charge for excessive or repeated requests, and explain the fee upfront.
Ignoring the Request
Never ignore a DSAR, even if you think it's invalid. Respond explaining why you cannot process it.
Streamline Your DSAR Process
DSAR Suite provides a complete workflow for Canadian organizations to manage access requests efficiently — from intake to response — with full audit trails.
Request Access