It may sound counter-intuitive, but responding to Subject Access Requests is a significant data security risk. Without adequate verification, the risk of data being relayed to unauthorised and unscrupulous parties is a big threat to your organisation.
When you receive a Rvoke SAR, you can be certain of the identity of the sender. Consumer users of Rvoke complete a vigorous Know Your Customer (KYC) process requiring biometric and photo identity checks as part of signing up. With the Subject’s permission, detailed evidence of identity verification is shared with you including Photo ID and selfie and all checks that have been carried out.
We take your – and your customer’s – security very seriously, and go to great lengths to ensure privacy principles are maintained at all times. Communications are secured using advanced military grade encryption, ensuring that data remains inaccessible and unreadable by anybody except the intended recipient.
As decryption of personal data can only occur through the secure key held on your customer’s mobile phone, the only person who will see any personal data you return data will be that customer.More About Security
From the Rvoke consumer app to the Rvoke Data Management Portal, requests, KYC, data mapping and responses need little to no human intervention.
Encrypt your most vulnerable, external-facing customer data, mitigating the risks of a data breach
Secure, simple & automated SAR or equivalent management with reliable biometric KYCMore About Rvoke Data Management
Encrypt your most vulnerable, external-facing customer data, mitigating breach impactsMore About Rvoke Data Protection
Learn more about our ethos and plan to achieve our mission.About Us
We take security seriously which is why we’ve been assessed and certified for addressing cybersecurity effectively and mitigating the risk from Internet-based threats.View our certificate