Data Subject Acess Request Form DSAR SAR GDPR CCPA Seers

plugin banner

Simple to install. Customise to match your website theme. Provided by the world's leading Privacy and Consent management company.

Author:Seers (profile at wordpress.org)
WordPress version required:3.8
WordPress version tested:5.5.5
Plugin version:1.0.0
Added to WordPress repository:28-08-2020
Last updated:07-09-2020
Warning! This plugin has not been updated in over 2 years. It may no longer be maintained or supported and may have compatibility issues when used with more recent versions of WordPress.
Rating, %:100
Rated by:1
Plugin URI:https://seersco.com/wp-DSAR-plugin
Total downloads:926
Active installs:30+
plugin download
Click to start download

Subject Request Management is a product which helps customers to comply with data subject access request outlined in General Data Protection Regulation in EU and Data Protection Act in UK.

Under these laws data subject can request businesses and data controllers to provide any data they have on data subject.

The plugin makes data subject access request easy with a request portal by adding to your site. It tracks and verifies requests, and streamlines the whole process.

DSAR Control Panel
The Seers DSAR Control Panel provides visibility into the status of every action, who is assigned, the requests and much more.

Request Form
Seers DSAR Request Form enables organisations to deploy a fully featured system by which DSAR requests can easily be submitted. It records time of request & offers an efficient means for communicating with the data subject.

Process Workflow
The DSAR solution includes workflows of all tasks & activities associated with the entire DSAR process. Once a request is received, appropriate personnel are notified of required actions, such as validating, searching and fulfilling requested information.

Action Requests & Response
Seers provides authorised personnel the ability to quickly find information stored across their IT infrastructure & review the information. Once the requested information is identified then they can review access, erase, rectify, restrict process and action this information.


FAQ
ChangeLog