A customer or employee asks for access to their data, how do I handle it?
Access, correction, erasure, and objection are GDPR rights. Reply within 1 month, free of charge, securely.
Try this first
- 1Identify the requester. An email alone is usually too little; ask for additional proof if identity is unclear. Do not ask for more than strictly needed (do not require an unredacted ID).
- 2Search your systems: mail, CRM, ticketing, HR, marketing platform, backups. Note what you found.
- 3Deliver securely. Encrypted email, customer portal, or registered post. Not in a plain email.
- 4On correction or erasure: propagate to all systems, including processors you forwarded data to. Tell the requester which actions you took.
- 5Document the request and your response. The AP can ask for it.
When to bring us in
Erasure on a fiscally retained record (invoice, payslip) is tricky. The right to be forgotten yields to statutory retention. Get legal advice before answering.
See also
- Does NIS2 apply to my company?Two questions decide it: are you in a listed sector, and do you meet the threshold from Recommendation 2003/361/EC (more than 50 FTE and more than EUR 10M turnover or balance sheet). Below that you are only indirectly in scope, via your customers. The threshold determines whether you are an important or essential entity depending on sector.
- What changes with the Dutch Cyber Security Act?The Cyberbeveiligingswet is the Dutch implementation of NIS2. Track NCSC for the exact effective date and the lower regulations.
- Am I personally liable as a director under NIS2?Yes. The board is accountable for approving and overseeing the cyber measures. Severe negligence can become personal.
None of the above fits?
Describe your situation below. We pass your input plus the steps you already saw to our AI and return tailored next-step advice. If it's too risky to DIY, we'll say so.
Or skip the DIY entirely
Our Managed IT clients do not look these things up. One point of contact, a fixed monthly price, resolved within working hours.