The entity grants identified and authenticated data subjects the ability to access their stored personal information
To meet the the entity grants identified and authenticated data subjects the ability to access their stored personal information requirement, you must provide a secure, identity-verified method for individuals to view (or receive) the personal information your service stores about them, and you must keep audit-ready evidence that the process works end-to-end. The control fails most often at identity proofing, data completeness, and weak operational records.
Key takeaways:
- Provide an authenticated access path (portal or verified request workflow) that returns the data you actually store about the person.
- Design for completeness: map systems, handle exceptions, and include derived data where appropriate.
- Retain evidence: request logs, identity verification, response packages, and access-control/audit logs.
SOC 2 privacy criteria expect you to do more than publish a privacy policy. For TSC-P5.1, the bar is operational: a data subject who is identified and authenticated must be able to access their stored personal information. That means you need a real mechanism (self-service or assisted) that works across your production systems, not a best-effort email thread.
CCOs and GRC leads usually run into three friction points: (1) proving the requester is the right person without collecting unnecessary new data, (2) assembling a complete and accurate view of personal information across applications and third parties, and (3) producing clean evidence for auditors that shows the control operated consistently during the audit period.
This requirement page translates the criterion into an implementation you can stand up quickly: a defined intake channel, identity verification rules, a repeatable data retrieval workflow, security guardrails, and evidence retention. It also calls out common audit hangups and the artifacts you’ll want ready before your SOC 2 fieldwork starts.
Regulatory text
Excerpt (TSC-P5.1): “The entity grants identified and authenticated data subjects the ability to access their stored personal information.” 1
Operator interpretation: You must implement a process that (a) confirms the requester’s identity to an appropriate level, (b) authenticates them, and (c) provides access to the personal information your organization stores about that individual. The process must be secure, consistent, and evidenced. 1
Plain-English interpretation (what the requirement means in practice)
A verified individual should be able to ask, “What personal information do you have about me?” and you must be able to answer using the systems where that data lives. For SOC 2 purposes, “access” can be satisfied through a secure self-service view, a secure export, or a controlled delivery process—so long as the person is identified and authenticated first, and you can show the process operates. 1
This is not the same as a general privacy inbox. Auditors will look for a defined mechanism, security controls around it, and proof it worked for real requests (or for controlled test cases if request volume is low).
Who it applies to (entity and operational context)
This applies to service organizations pursuing SOC 2 reports where the Privacy category is in scope and the organization stores personal information about data subjects (customers’ end users, your direct users, prospects, employees, or contractors, depending on scope). 1
Typical in-scope contexts:
- SaaS platforms storing user profiles, identifiers, device data, or support artifacts tied to individuals.
- Managed service providers with ticketing systems and operational logs tied to named individuals.
- Data processors handling personal information on behalf of business customers, where your contract and system roles still allow you to support data subject access via the customer.
Key scoping decision you must document: Who is the “data subject” for your SOC 2 Privacy scope? For many B2B services, access requests are routed through the customer (controller). You can still meet TSC-P5.1, but your procedure must reflect the customer-mediated model and your authentication steps must confirm both the requester and their authority through the customer’s channel.
What you actually need to do (step-by-step)
1) Define the access method (self-service, assisted, or hybrid)
Pick one primary path and document it:
- Self-service portal: authenticated user logs in and views/exports their data.
- Assisted workflow: data subject submits a request; you authenticate; you deliver the data through a secure channel.
- Hybrid: portal for core account data plus assisted retrieval for back-office systems (tickets, call logs, archived records).
Decision rule: if you cannot confidently assemble all stored personal information in real time, do hybrid and document system boundaries.
2) Establish “identified and authenticated” rules (identity proofing standard)
Write a short identity verification standard that answers:
- What identifiers you accept (account login, email domain ownership, customer-admin attestation, government ID only if truly necessary).
- What you do when the person does not have an account (e.g., former user).
- How you prevent account takeover abuse (step-up authentication, secondary confirmation).
Keep it proportional. Auditors mainly want to see that you do not disclose personal information to an unverified requester and that the method is consistently applied. 1
3) Build a data map that supports retrieval (systems + fields + owners)
Create and maintain a “personal information inventory for access requests”:
- Systems of record (production DBs, CRM, support desk, marketing automation, data warehouse, logging/analytics where tied to identifiers).
- Data categories stored per system (profile, identifiers, communications, transaction history, device data).
- Retrieval method per system (export, query, admin console, vendor export).
- System owner and backup owner.
This is the difference between producing a complete response and sending only “account profile fields” while ignoring tickets and attachments.
4) Implement the intake and tracking workflow
Minimum operational workflow:
- Intake channel (portal form or dedicated request channel).
- Ticket created in a system of record with status tracking.
- Identity verification performed and recorded.
- Data collection across mapped systems using approved procedures.
- Security review (confirm no third-party data is improperly included; confirm redactions where required by policy).
- Delivery via secure method (in-app download, encrypted file exchange, or authenticated email delivery process you can defend).
- Closure with evidence attached and metrics captured.
If request volume is low, run periodic tabletop tests to show the workflow works and retain the full evidence package from the test.
5) Secure the response package (confidentiality and integrity controls)
Add explicit guardrails:
- Role-based access: only trained staff can compile/approve releases.
- Logging: record who accessed which systems to compile the response.
- Data minimization: provide the subject’s personal information, not internal-only notes that your policy excludes, and not other people’s data.
- Quality check: confirm the response is for the correct subject and matches your system inventory.
6) Train the operators and set escalation paths
Document and train:
- Support and privacy ops steps (what to do, what not to do).
- Escalation triggers (suspected fraud, legal holds, active investigations, conflicts with customer contractual model).
- Hand-off points to Security for suspected impersonation attempts.
7) Retain operating evidence (auditor-ready)
SOC 2 evidence is where many programs fail. Your procedure must produce artifacts without heroic effort at audit time. 1
If you want this to run cleanly, a GRC workflow tool like Daydream can centralize request tickets, evidence attachments, and approval trails so you can answer auditor samples quickly without reconstructing email threads.
Required evidence and artifacts to retain
Keep these artifacts for each fulfilled request (or each control test if requests are rare):
- Policy/procedure for data subject access (scope, authentication rules, steps, roles).
- Request record (ticket ID, intake timestamp, requester, scope).
- Identity verification record (method used, outcome, approver).
- System retrieval checklist mapped to your inventory (which systems were queried and by whom).
- Copy of response package (or a securely stored hash/reference if you avoid retaining the data itself).
- Delivery evidence (portal download log, secure transfer log, or documented delivery confirmation).
- Access logs showing staff access to admin consoles or exports used to compile the response.
- Exception handling records (partial responses, denied requests, or customer-mediated responses).
Program-level artifacts:
- Personal information inventory for access requests (system map).
- Training completion records for staff who handle requests.
- Periodic management review of the process (issues and fixes).
Common exam/audit questions and hangups
Auditors often probe these areas:
- “Show me the mechanism.” Where does a data subject go, and how do they authenticate? 1
- Completeness: How do you know you included all systems that store personal information for that subject?
- Derived/observed data: Do you store inferred attributes (risk scores, segments, flags)? If yes, is it in scope for access?
- Customer-mediated model: If your customer is the controller, how do you validate the request came through the customer and was authorized?
- Evidence quality: Can you produce a clean request-to-closure package for sampled items without chasing Slack messages?
Hangup to expect: teams rely on a privacy inbox and ad hoc exports, but cannot show consistent identity verification or a repeatable retrieval checklist.
Frequent implementation mistakes (and how to avoid them)
-
Mistake: treating login as sufficient authentication for any request.
Fix: require step-up checks for sensitive exports or account changes tied to the request, and document when they apply. -
Mistake: only exporting “profile” fields and forgetting support tickets, attachments, or CRM notes.
Fix: maintain a system inventory specifically for access requests and require operators to check every listed system. -
Mistake: over-collecting identity documents.
Fix: use existing account authentication or customer-admin attestation first; only request additional proof when risk is elevated, and document the trigger. -
Mistake: sending exports over unmanaged channels.
Fix: standardize delivery via in-app download, secure transfer, or another controlled method with logs you can retain. -
Mistake: no operating evidence because “we haven’t received requests.”
Fix: run a controlled test using a test user or consenting internal data subject and retain the complete evidence package.
Enforcement context and risk implications
SOC 2 is an attestation framework rather than a regulator-led enforcement regime. Your primary risk is a qualified SOC 2 opinion, control exceptions, or a mismatch between what you claim in policies and what you can prove in operation. 1
Operationally, the same weaknesses that break TSC-P5.1 also create real incident risk:
- Mis-delivery of personal information to an impersonator (authentication failure).
- Accidental disclosure of other individuals’ data due to poor filtering.
- Inability to respond consistently, which drives customer trust issues and escalations.
Practical 30/60/90-day execution plan
First 30 days: stand up the minimum viable, auditable workflow
- Confirm Privacy scope and define “data subject” populations for your SOC 2 report.
- Choose access method (assisted or hybrid is fastest if engineering capacity is limited).
- Write the procedure: intake, identity verification, retrieval steps, approvals, delivery, retention.
- Create the personal information inventory for access requests (systems, owners, retrieval method).
- Configure a ticket workflow with required fields and an evidence checklist (Daydream or your existing ticketing/GRC stack).
By 60 days: harden identity verification + completeness + security controls
- Implement step-up authentication triggers and fraud escalation path.
- Add retrieval runbooks per system (screenshots acceptable if that’s your reality).
- Standardize response packaging and delivery method with logging.
- Train operators and run a tabletop exercise that produces a full evidence package.
By 90 days: prove operating effectiveness and close audit gaps
- Perform at least one end-to-end test per major data-subject type in scope and retain evidence.
- Review exceptions and update the inventory (missed systems are common).
- Add management review: periodic check of request log quality, timeliness, and recurring issues.
- Prepare an auditor packet template: policy, inventory, sample request packages, and access logs.
Frequently Asked Questions
Do we need a self-service portal to satisfy this requirement?
No. TSC-P5.1 requires that identified and authenticated data subjects can access stored personal information, and that can be met through a controlled assisted workflow if it is secure and evidenced. 1
What does “identified and authenticated” mean in practice for former users without accounts?
Define an identity verification method that fits your risk, such as verifying control of the original email address plus additional corroborating data you already have. Record the verification steps in the request evidence package. 1
We are a processor and our customer is the controller. Can requests go through the customer?
Yes, if your documented process requires customer authorization and you authenticate the requester through the customer-mediated channel you defined. Auditors will expect evidence that you followed that path consistently. 1
Do we have to provide internal notes or fraud signals tied to a user?
TSC-P5.1 is about granting access to stored personal information, but your policy should define exclusions and the review step should prevent disclosing security-sensitive content or other people’s data. Document your rules and apply them consistently. 1
What if we rarely receive data access requests?
Run a controlled test of the workflow with a test user or a consenting internal subject and retain the full request-to-closure evidence. Auditors still need operating evidence during the audit period. 1
How do we prove completeness across systems during an audit?
Maintain a system inventory specifically for access requests and require operators to check off each system for every request. Keep the checklist with the ticket, along with exports or query evidence. 1
Related compliance topics
- 2025 SEC Marketing Rule Examination Focus Areas
- Access and identity controls
- Access Control (AC)
- Access control and identity discipline
- Access control management
Footnotes
Frequently Asked Questions
Do we need a self-service portal to satisfy this requirement?
No. TSC-P5.1 requires that identified and authenticated data subjects can access stored personal information, and that can be met through a controlled assisted workflow if it is secure and evidenced. (Source: AICPA TSC 2017)
What does “identified and authenticated” mean in practice for former users without accounts?
Define an identity verification method that fits your risk, such as verifying control of the original email address plus additional corroborating data you already have. Record the verification steps in the request evidence package. (Source: AICPA TSC 2017)
We are a processor and our customer is the controller. Can requests go through the customer?
Yes, if your documented process requires customer authorization and you authenticate the requester through the customer-mediated channel you defined. Auditors will expect evidence that you followed that path consistently. (Source: AICPA TSC 2017)
Do we have to provide internal notes or fraud signals tied to a user?
TSC-P5.1 is about granting access to stored personal information, but your policy should define exclusions and the review step should prevent disclosing security-sensitive content or other people’s data. Document your rules and apply them consistently. (Source: AICPA TSC 2017)
What if we rarely receive data access requests?
Run a controlled test of the workflow with a test user or a consenting internal subject and retain the full request-to-closure evidence. Auditors still need operating evidence during the audit period. (Source: AICPA TSC 2017)
How do we prove completeness across systems during an audit?
Maintain a system inventory specifically for access requests and require operators to check off each system for every request. Keep the checklist with the ticket, along with exports or query evidence. (Source: AICPA TSC 2017)
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream