Secure, simple & automated Subject Access Request (SAR) management with reliable biometric identity verificationFREE Sign Up
Revoke Data Management standardises your SAR workflow, providing a secure single interface to manage and even automate customer cases and requests
Most organisations do not incorporate strong identity verification as part of their subject access requests, leaving them exposed to serious risk of data protection legislation being exploited, as discovered recently by a BBC reporter
Revoke uses best of breed identity verification using a national Photo ID and biometric technology so your obligation as a DPO to correctly identify the subject is easily fulfilled. Revoke handles this for you.
Responses to Subject Access Requests can contain sensitive personal data.
Most organisations do not have a secure communication channel with the subject, especially if they are a former customer. Sending one time links to download files over email is not secure and exposes your organisation to unnecessary and very serious data breach risks.
Revoke uses advanced military grade encryption with a secure communication channel. Only the subject making the request and the organisation responding can see the personal data; Revoke staff have no access.
If responding to typical subject access requests requires manual intervention, your organisation will face increasing pressure to remain compliant with the legislation by responding in a timely fashion.
We believe that the majority of subject access requests should be automated. Revoke can automate responses to subject access requests, freeing up your data protection team.
Revoke Data Management enables your customers to manage their data relationship with you through the Revoke mobile app.
Using the Revoke app, your customers are able to toggle their marketing preferences, make a SAR, and request deletion of their data, following which a case will be created in the Revoke Business portal.
As all Revoke users are fully identified using biometric and national photo ID verification, you can be legally assured of their true identity.
Details of Subject Access Requests are securely shared within your Revoke Business Portal. Requests can be actioned by your registered DPO from the Portal (Revoke Business Data Management – Basic) or Dashboard (Revoke Business Data Management – Plus).
Revoke Data Management – Automated customers can also automatically filter out requests where there is no match, sending automated reponses to requests from Subjects whose data you no longer hold (or never did).
Once your DPO has completed the requested action, they can respond via the Portal, either confirming an action has been completed (e.g. updated marketing preferences) or sending requested data. The opened case will be updated in the Portal, confirming the actions that have been completed and can be used as evidence of compliance.
Secure encrypted messaging throughout ensures communications with your customer are private, with no one being able to see the data sent other than its intended recipient.
Revoke Data Management – Automated Pro customers can also automate the response when an appropriate data match can be verified, completely automating the process from request to resolution.
Revoke Data Management Plans
We do not have any Terms & Conditions for our free services. Read More
Received a SAR via Revoke?
Follow the link sent to you via email to get setup.
Haven't received a SAR?
Complete the following form to get setup. Click here.
To get setup or learn more about our paid plans, tell us a little bit about your business.
Secure, simple & automated SAR or equivalent management with reliable biometric identity verificationMore About Revoke Data Management
Encrypt your most vulnerable, external-facing customer data, mitigating breach impactsMore About Data Protection
Learn more about our ethos and plan to achieve our mission.Our Mission and Ethos
We take security seriously which is why we’ve been assessed and certified for addressing cybersecurity effectively and mitigating the risk from Internet-based threats.View our certificate