Practical Scenarios¶
Common privacy situations and how to respond. Use these as reference for real situations you may encounter.
Data Subject Rights Requests¶
Scenario 1: Access Request via Email¶
Situation: A customer emails: "I want to know what information you have about me."
Response Steps:
- Acknowledge receipt within 1-2 business days
- Verify identity - ask them to confirm from their registered email or provide verification information
- Log the request with timestamp in your tracking system
- Gather data from all systems where customer data is stored
- Compile response including: data held, purposes, recipients, retention periods
- Deliver response within one month (GDPR) or 45 days (CCPA)
- Document completion
Example Acknowledgment:
Thank you for your request. We take data protection seriously and will respond within 30 days. To verify your identity, please reply from the email address associated with your account or provide [verification details].
Scenario 2: Deletion Request¶
Situation: Customer requests: "Delete my account and all my data."
Response Steps:
- Verify identity
- Check for exceptions:
- Active subscriptions or outstanding payments
- Legal retention requirements (tax, fraud prevention)
- Ongoing legal claims or disputes
- If deletion is valid: delete from all systems including backups (on next backup cycle)
- Notify any third parties who received the data
- Confirm completion to customer
- Retain minimal record of the request for audit purposes
When to Refuse:
- Legal obligations require retention (explain which)
- Data needed for legal claims
- Overriding public interest
Always explain the reason for any refusal.
Scenario 3: Opt-Out Request¶
Situation: Customer says: "Stop sending me marketing emails."
Response Steps:
- This is typically self-service via unsubscribe link
- Process within 10 business days (CAN-SPAM) or immediately where possible
- Update suppression list to prevent re-addition
- Confirm opt-out to customer
- Service/transactional emails may continue (but clarify this)
Note: Under GDPR, if marketing was based on consent, this may also be a withdrawal of consent affecting other processing.
Data Breach Scenarios¶
Scenario 4: Email to Wrong Recipient¶
Situation: You sent a spreadsheet with customer data to the wrong email address.
Immediate Actions:
- Report to DPO/privacy team immediately
- Attempt email recall (if available)
- Contact recipient directly, request deletion, ask them to confirm
Assessment Questions:
- What data was exposed? (names, financial, health?)
- How many individuals affected?
- Who received it? (known person vs. unknown)
- Was it opened/downloaded?
Documentation:
- Time of incident and discovery
- What data was exposed
- Actions taken
- Outcome
Possible Outcomes:
- Low risk: Document internally, no notification required
- Higher risk: May require regulatory notification within 72 hours and notification to affected individuals
Scenario 5: Suspicious System Activity¶
Situation: You notice unusual login activity or unauthorized access attempts.
Immediate Actions:
- Report to IT security and DPO immediately
- Do not attempt to investigate or fix yourself
- Do not log out or restart systems (preserve evidence)
- Document what you observed and when
IT Security Will:
- Assess scope of potential access
- Contain the incident
- Preserve evidence
- Determine if personal data was accessed
Your Role:
- Provide information requested
- Follow instructions from security team
- Maintain confidentiality about the incident
Scenario 6: Lost Device¶
Situation: Your work laptop containing customer data is stolen or lost.
Immediate Actions:
- Report to IT security and manager immediately
- Attempt to locate device (Find My Device, etc.)
- IT will remotely wipe if possible
- Change passwodatabase for all accounts accessed from device
Assessment Factors:
- Was device encrypted? (reduces risk significantly)
- What data was stored locally?
- Was device locked with strong password?
- Was auto-lock enabled?
Marketing and Consent¶
Scenario 7: Marketing to Existing Customers¶
Situation: Marketing wants to email all customers about a new product.
Verification Steps:
- What is the legal basis?
- Consent: Check consent records, verify not withdrawn
- Legitimate interest: Verify LIA completed, product is related to original purchase
- Check suppression list for opt-outs
- Verify unsubscribe mechanism is working
- Review content for required disclosures
Questions to Ask Marketing:
- Do we have consent/legal basis for all recipients?
- Have we checked the suppression list?
- Is the unsubscribe link working?
- Is the sender clearly identified?
Scenario 8: Third-Party Data Acquisition¶
Situation: Marketing wants to purchase a contact list.
Due Diligence Required:
- How did the vendor collect the data?
- Did individuals consent to sharing with third parties?
- For what purposes can the data be used?
- What documentation can the vendor provide?
Red Flags:
- Vendor cannot explain data source
- No evidence of consent for third-party sharing
- Very low cost (suggests questionable sourcing)
- Vendor will not provide DPA
Recommendation: Consult privacy team before proceeding. Risk of purchasing improperly collected data is significant.
Vendor and Transfer Scenarios¶
Scenario 9: New Cloud Service¶
Situation: Your team wants to use a new US-based SaaS tool that will process customer data.
Before Proceeding:
- Identify what personal data will be processed
- Assess data minimization - can you limit what is shared?
- Conduct vendor security assessment
- Execute Data Processing Agreement
- For EU data: Assess international transfer mechanism
- SCCs in place?
- Transfer Impact Assessment needed?
- Update records of processing activities
- Update privacy notice if needed
Questions for the Vendor:
- Where is data stored and processed?
- What security certifications do you have?
- Will you sign our DPA?
- Who are your sub-processors?
- How do you handle data subject requests?
Scenario 10: Law Enforcement Request¶
Situation: Someone claiming to be from a government agency requests customer data.
Response Steps:
- Do not provide data immediately
- Escalate to legal team
- Verify the request is legitimate:
- Official letterhead and case number
- Verify identity of requester
- Confirm legal authority cited
- Legal team will assess validity and scope
- Provide only data specifically required
- Document the request and response
Never:
- Provide data based on phone call alone
- Share data beyond what is legally required
- Discuss the request with unauthorized persons
Quick Decision Guide¶
| Situation | Immediate Action |
|---|---|
| Rights request received | Acknowledge, verify identity, log request |
| Data sent to wrong person | Report to DPO immediately |
| Suspicious activity | Report to IT security, do not investigate alone |
| Lost/stolen device | Report to IT security, attempt to locate/wipe |
| Marketing question | Verify legal basis and opt-out status |
| New vendor request | Assess privacy impact, get DPA in place first |
| Law enforcement request | Escalate to legal team, do not respond directly |
Return to Training Overview