Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Data Subject Request Form
"I need a Data Subject Request Form for my e-commerce company based in Kuala Lumpur, with specific sections for handling customer data deletion requests and cross-border data transfers to our Singapore office, to be implemented by March 2025."
1. Data Subject Information: Collection of personal details necessary to identify the data subject, including full name, ID number, contact information, and proof of identity requirements
2. Request Type: Clear options for the type of request being made (access, correction, deletion, restriction, data portability, etc.) with checkboxes or similar selection mechanism
3. Request Details: Space for the data subject to provide specific details about their request, including what personal data is involved and the desired outcome
4. Identity Verification: Section specifying what identity documents must be submitted with the form to verify the requestor's identity
5. Declaration: Statement confirming the truth of information provided and understanding of the process, including signature and date
6. Processing Information: Information about how the request will be processed, including timeframes and potential costs
1. Representative Authorization: Section to be included when the request is made by someone acting on behalf of the data subject, requiring details of the representative and proof of authorization
2. Specific Data Categories: Additional section for requests involving sensitive personal data categories as defined under PDPA 2010
3. Cross-Border Transfer Details: Section to be included when the request involves personal data transferred across borders
4. Urgency Declaration: Optional section for cases where expedited processing is requested, requiring justification for urgency
1. Schedule A: Identity Verification Requirements: Detailed list of acceptable identification documents and requirements for submission
2. Schedule B: Fee Schedule: Information about any applicable fees for different types of requests and payment methods
3. Schedule C: Privacy Notice: Privacy notice explaining how the information provided in the form will be processed
4. Appendix 1: Guidance Notes: Detailed instructions on how to complete the form and what to expect after submission
Authors
Sensitive Personal Data
Data Subject
Data Controller
Data Processor
Processing
Consent
Identity Card
Request
Access Request
Correction Request
Deletion Request
Personal Data Notice
Processing System
Commercial Transaction
Third Party
Transfer
Authorized Representative
Proof of Identity
Response Period
Commissioner
Register
Request Type Selection
Data Scope
Identity Verification
Authorization
Processing Timeline
Fee Declaration
Privacy Notice
Documentation Requirements
Data Subject Rights
Declaration of Truth
Submission Instructions
Contact Details
Processing Information
Confidentiality
Data Security
Response Method
Supporting Documents
Consent
Financial Services
Healthcare
Retail
Technology
Education
Telecommunications
Insurance
E-commerce
Professional Services
Manufacturing
Hospitality
Government Services
Real Estate
Transportation
Media and Entertainment
Legal
Compliance
Data Protection
Information Security
Risk Management
Customer Service
Operations
IT Security
Privacy Office
Information Management
Records Management
Data Protection Officer
Privacy Manager
Compliance Officer
Legal Counsel
Information Security Manager
Risk Manager
Customer Service Manager
Operations Manager
IT Security Officer
Chief Privacy Officer
Chief Compliance Officer
Chief Legal Officer
Data Protection Executive
Privacy Analyst
Compliance Analyst
Find the exact document you need
Cctv Access Request Form
A Malaysian-compliant form for requesting access to CCTV footage under local privacy laws.
Data Subject Request Form
A Malaysian PDPA-compliant form enabling individuals to exercise their data protection rights under Malaysian law.
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.