Azure Data Subject Requests for the GDPR and CCPA
Introduction to Data Subject Requests (DSRs)
The European Union General Data Protection Regulation (GDPR) gives rights to people (known in the regulation as data subjects) to manage the personal data that has been collected by an employer or other type of agency or organization (known as the data controller or just controller). Personal data is defined broadly under the GDPR as any data that relates to an identified or identifiable natural person. The GDPR gives data subjects specific rights to their personal data; these rights include obtaining copies of personal data, requesting corrections to it, restricting the processing of it, deleting it, or receiving it in an electronic format so it can be moved to another controller. A formal request by a data subject to a controller to take an action on their personal data is called a Data Subject Request or DSR.
Similarly, the California Consumer Privacy Act (CCPA), provides privacy rights and obligations to California consumers, including rights similar to GDPR's Data Subject Rights, such as the right to delete, access, and receive (portability) their personal information. The CCPA also provides for certain disclosures, protections against discrimination when electing exercise rights, and "opt-out/ opt-in" requirements for certain data transfers classified as "sales." Sales are broadly defined to include the sharing of data for a valuable consideration. For more information about the CCPA, see the California Consumer Privacy Act and the California Consumer Privacy Act FAQ.
The guide discusses how to use Microsoft products, services, and administrative tools to help our controller customers find and act on personal data to respond to DSRs. Specifically, this information includes how to find, access, and act on personal data that reside in the Microsoft cloud. Here's a quick overview of the processes outlined in this guide:
- Discover: Use search and discovery tools to more easily find customer data that may be the subject of a DSR. Once potentially responsive documents are collected, you can perform one or more of the DSR actions described in the following steps to respond to the request. Alternatively, you may determine that the request doesn't meet your organization's guidelines for responding to DSRs.
- Access: Retrieve personal data that resides in the Microsoft cloud and, if requested, make a copy of it that can be available to the data subject.
- Rectify: Make changes or implement other requested actions on the personal data, where applicable.
- Restrict: Restrict the processing of personal data, either by removing licenses for various Azure services or turning off the desired services where possible. You can also remove data from the Microsoft cloud and retain it on-premises or at another location.
- Delete: Permanently remove personal data that resided in the Microsoft cloud.
- Export/Receive (Portability): Provide an electronic copy (in a machine-readable format) of personal data or personal information to the data subject. Personal information under the CCPA is any information relating to an identified or identifiable person. There's no distinction between a person's private, public, or work roles. The defined term "personal information" roughly lines up with "personal data" under GDPR. However, the CCPA also includes family and household data. For more information about the CCPA, see the California Consumer Privacy Act and the California Consumer Privacy Act FAQ.
Each section in this guide outlines the technical procedures that a data controller organization can take to respond to a DSR for personal data in the Microsoft cloud.
Terminology
The following provides definitions of terms that are relevant to this guide.
- Controller: The natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data; where the purposes and means of such processing are determined by Union or Member State law, the controller, or the specific criteria for its nomination may be provided for by Union or Member State law.
- Personal data and data subject: Any information relating to an identified or identifiable natural person ('data subject'); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural, or social identity of that natural person.
- Processor: A natural or legal person, public authority, agency, or other body, which processes personal data on behalf of the controller.
- Customer Data: All data, including all text, sound, video, or image files, and software, that are provided to Microsoft by, or on behalf of, a customer through use of the enterprise service. Customer Data includes both (1) identifiable information of end users (for example, user names and contact information in Microsoft Entra ID) and Customer Content that a customer uploads into or creates in specific services (for example, customer content in an Azure Storage account, customer content of an Azure SQL Database, or a customer's virtual machine image in Azure Virtual Machines).
- System-Generated Logs: Logs and related data generated by Microsoft that help Microsoft provide enterprise services to users. System-generated logs contain primarily pseudonymized data, such as unique identifiers—typically a number generated by the system that can't on its own identify an individual person but is used to deliver the enterprise services to users. System-generated logs may also contain identifiable information about end users, such as a username.
How to use this guide
This guide consists of two parts:
- Part 1: Responding to Data Subject Requests for Customer Data: Part 1 of this guide discusses how to access, rectify, restrict, delete, and export data from applications in which you have authored data. This section details how to execute DSRs against both Customer Content and also identifiable information of end users.
- Part 2: Responding to Data Subject Requests for System-Generated Logs: When you use Microsoft's enterprise services, Microsoft generates some information, known as System-Generated Logs, in order to provide the service. Part 2 of this guide discusses how to access, delete, and export such information for Azure.
Understanding DSRs for Microsoft Entra ID and Microsoft service accounts
Through the use of the Extended Directory Direct Token (EDDT), guest users within a tenant are able to initiate DSRs across multiple tenants. Any user-initiated DSRs is executed against all the tenants where the user is authorized by the corresponding tenant administrator.
The same also applies for Microsoft Service Accounts (MSA) within the context of services provided to an enterprise customer: execution of a DSR against an MSA account associated with a Microsoft Entra tenant will only pertain to data within the tenant. In addition, it's important to understand the following when handling MSA accounts within a tenant:
- If an MSA user creates an Azure subscription, the subscription is handled as if it were a Microsoft Entra tenant. Consequently, DSRs are scoped within the tenant as described above.
- If an Azure subscription created via an MSA account is deleted, it will not affect the actual MSA account. Again, as noted above, DSRs executing within the Azure subscription are limited to the scope of the tenant itself.
DSRs against an MSA account itself, outside a given tenant, are executed via the Consumer Privacy Dashboard.
Part 1: DSR Guide for customer data
Executing DSRs against customer data
Microsoft provides the ability to access, delete, and export certain Customer Data through the Azure portal and also directly via pre-existing application programming interfaces (APIs) or user interfaces (UIs) for specific services (also referred to as in-product experiences). Details regarding such in-product experiences are described in the respective services' reference documentation.
Important
Services supporting in-product DSRs require direct usage of the service's application programming interface (API) or user interface (UI), describing applicable CRUD (create, read, update, delete) operations. Consequently, execution of DSRs within a given service must be done in addition to execution of a DSR within the Azure Portal in order to complete a full request for a given data subject. Please refer to specific services' reference documentation for further details.
Step 1: Discover
The first step in responding to a DSR is to find the personal data that is the subject of the request. This first step—finding and reviewing the personal data at issue—will help you determine whether a DSR meets your organization's requirements for honoring or declining a DSR. For example, after finding and reviewing the personal data at issue, you may determine the request doesn't meet your organization's requirements because doing so may adversely affect the rights and freedoms of others.
After you find the data, you can then perform the specific action to satisfy the request by the data subject.
DSR managed through Azure portal
Microsoft Entra ID is Microsoft's cloud-based, multitenant directory and identity management service. You can locate identifiable information of end users, such as customer and employee user profiles and user work information that contain personal data in your Microsoft Entra ID environment by using the Azure portal.
This is helpful if you want to find or change personal data for a specific user. You can also add or change user profile and work information. You must sign in with an account that's a global admin for the directory.
How do I locate or view user profile and work information?
Sign in to the Azure portal with an account that's a global admin for the directory.
Select Microsoft Entra ID.
Select Users.
On the All users blade, select a user from the list, and then, on the blade for the selected user, select Profile to view user profile information that might contain personal data.
If you need to add or change user profile information, you can do so by selecting Edit in the command bar, then select Save after making changes.
DSR managed through service APIs
Microsoft provides the ability to discover Customer Data directly via pre-existing application programming interfaces (APIs) or user interfaces (UIs) for specific services. Details are described in the respective services' reference documentation, describing applicable CRUD (create, read, update, delete) operations.
Step 2: Access
After you've found Customer Data containing personal data that is potentially responsive to a DSR, it's up to you and your organization to decide which data to provide to the data subject. You can provide them with a copy of the actual document, an appropriately redacted version, or a screenshot of the portions you have deemed appropriate to share. For each of these responses to an access request, you'll have to retrieve a copy of the document or other item that contains the responsive data.
When providing a copy to the data subject, you may have to remove or redact personal information about other data subjects and any confidential information.
DSR managed through Azure portal
Microsoft offers both a portal and in-product experiences providing the enterprise customer's tenant administrator the capability to manage DSR access requests. DSR Access requests allow for access of the personal data of the user, including: (a) identifiable information about an end-user and (b) system-generated logs.
DSR managed through service APIs
Microsoft provides the ability to discover Customer Data directly via pre-existing application programming interfaces (APIs) or user interfaces (UIs) for specific services. Details are described in the respective services' reference documentation, describing applicable CRUD (create, read, update, delete) operations.
Step 3: Rectify
If a data subject has asked you to rectify the personal data that resides in your organization's data, you and your organization will have to determine whether it's appropriate to honor the request. Rectifying the data may include taking actions such as editing, redacting, or removing personal data from a document or other type or item.
DSR managed through Azure portal
Enterprise customers have the ability to manage DSR rectify requests, including limited editing features per the nature of a given Microsoft service. As a data processor, Microsoft doesn't offer the ability to correct system-generated logs as it reflects factual activities and constitutes a historical record of events within Microsoft services. With respect to Microsoft Entra ID, limited editing features exist to rectify identifiable information about an end-user, as described further below.
Microsoft Entra ID: rectify/correct inaccurate or incomplete personal data
You can correct, update, or delete identifiable information about end users, such as customer and employee user profiles and user work information that contain personal data, such as a user's name, work title, address, or phone number, in your Microsoft Entra ID environment by using the Azure portal. You must sign in with an account that's a global admin for the directory.
How do I correct or update user profile and work information in Microsoft Entra ID?
Sign in to the Azure portal with an account that's a global admin for the directory.
Select Microsoft Entra ID.
Select Users.
On the All users blade, select a user from the list, and then, on the blade for the selected user, select Profile to view the user profile information that needs to be corrected or updated.
Correct or update the user profile information including work information by selecting Edit in the command bar, then select Save after making changes.
DSR managed through service APIs
Microsoft provides the ability to discover Customer Data directly via pre-existing application programming interfaces (APIs) or user interfaces (UIs) for specific services. Details are described in the respective services' reference documentation, describing applicable CRUD (create, read, update, delete) operations.
Step 4: Restrict
Data subjects may request that you restrict processing of their personal data. We provide both the Azure portal and pre-existing application programming interfaces (APIs) or user interfaces (UIs). These experiences provide the enterprise customer's tenant administrator the capability to manage such DSRs through a combination of data export and data deletion. A customer may (1) export an electronic copy of the personal data of the user, including (a) account(s), (b) system-generated logs, and (c) associated logs, followed with (2) deletion of the account and associated data residing within Microsoft systems.
Step 5: Delete
The "right to erasure" by the removal of personal data from an organization's Customer Data is a key protection in the GDPR. Removing personal data includes removing all personal data and system-generated logs, except audit log information. When a user is soft deleted (see details below), the account is disabled for 30 days. If no further action is taken during this 30-day period, the user is permanently deleted (again, see details below). Upon a permanent delete, the user's account, personal data, and system-generated logs are expunged within an additional 30 days. If a tenant admin immediately issues a permanent delete, the user's account, personal data, and system-generated logs are expunged within 30 days of issuance.
Important
You must be a tenant administrator to delete a user from the tenant.
Delete a user and associated data through the Azure portal
After you receive a delete request for a data subject, you can use the Azure portal to delete both a user and the associated personal information as well as system-generated logs.
Deleting this data also means deleting the user from the tenant. Users are initially soft-deleted, which means the account can be recovered by a tenant admin within 30 days of being marked for soft-delete. After 30 days, the account is automatically, and permanently, deleted from the tenant. Prior to that 30 days, you can manually delete a soft-deleted user from the recycle bin.
Here's the high-level process for deleting users from your tenant.
Go to the Azure portal and locate the user.
Delete the user. When you initially delete the user, the user's account is sent to the Recycle Bin. At this point, the user is soft deleted, but not expunged from Microsoft Entra ID.
Go to the Recently deleted users list and permanently delete the user. At this point the user is permanently deleted (also known as hard deleted), meaning the account has been expunged from Microsoft Entra ID
To delete a user from an Azure tenant
Sign in to the Azure portal with an account that's a global admin for the directory.
Select Microsoft Entra ID.
Select Users.
Check the box next to the user you want to delete, select Delete user, and then select Yes in the box asking if you want to delete the user.
On the All users blade, select Deleted users.
Select the same user again, select Delete permanently in the command bar, and then select Yes in the box asking if you're sure.
Important
Be aware that by clicking Yes you are permanently, and irrevocably, deleting the user and all associated data and system-generated logs. If you do this by mistake, you'll have to manually add the user back to the tenant. The associated data and system-generated logs are non-recoverable.
Delete a user's data when there is no account in the Azure tenant
While some users have an account in your Azure tenant that you are able to delete, business-to-business (B2B) direct connect users do not. B2B direct connect users use their native identities to receive cross-tenant access to the apps and resources hosted in your tenant. They use the user account hosted in their home tenant without requiring a guest account in your tenant.
To honor the DSR for these users, you'll delete the personal data associated with the user in your tenant instead of the user account itself.
Open the Azure portal, select All services, type policy into the filter, and then select Policy.
In the Policy blade, select User privacy, select Manage User Requests, and then select Add delete request.
Complete the New delete data request:
- User. Type the email address of the Microsoft Entra user that requested the delete.
Select Delete.
The delete request goes into Pending status. You can review the report status on the User privacy > Overview blade.
Important
Because personal data can come from multiple systems, the delete process may take up to one month to complete.
DSR delete managed through service APIs
Microsoft provides the ability to discover Customer Data directly via pre-existing application programming interfaces (APIs) or user interfaces (UIs) for specific services. Details are described in the respective services' reference documentation, describing applicable CRUD (create, read, update, delete) operations.
Step 6: Export
The "right of data portability" allows a data subject to request a copy of their personal data in an electronic format (that's a "structured, commonly used, machine read-able, and interoperable format") that may be transmitted to another data controller. Azure supports this by enabling your organization to export the data in the native JSON format, to your specified Azure Storage Container.
Important
You must be a tenant administrator to export user data from the tenant.
DSR managed through Azure Portal
With respect to Customer Data, Microsoft offers both a portal and in-product experiences providing the enterprise customer's tenant administrator the capability to manage export requests for identifiable information about an end user.
DSR managed through service APIs
Microsoft provides the ability to discover Customer Data directly via pre-existing application programming interfaces (APIs) or user interfaces (UIs) for specific services. Details are described in the respective services' reference documentation, describing applicable CRUD (create, read, update, delete) operations.
Part 2: System-Generated Logs
Microsoft also provides tenant administrators with the ability to perform a DSR to access, delete, and export specific system-generated logs.
Important
The ability to restrict or rectify system-generated logs is not supported. System-generated logs constitute factual actions conducted within the Microsoft cloud and diagnostic data, and modifications to such data would compromise the historical record of actions, increasing fraud and security risks.
Executing DSRs against System-Generated Logs
Tenant administrators can execute a DSR for specific system-generated logs through the Azure Portal and also directly via programmatic interfaces or user interfaces for specific services. Details are described in the respective services' reference documentation.
Important
Services supporting in-product DSRs require direct usage of the service's application programming interface (API) or user interface (UI). Execution of an in-product DSR must be done in addition to execution of a DSR within the Azure Portal in order to complete a full request for a given data subject. Please refer to specific services' reference documentation for further details.
Step 1: Access
The tenant admin is the only person within your organization who can execute a data subject request related to the personal data captured in systems-generated logs. The data retrieved for an access request will be provided in a machine-readable format and will be provided in files that will allow the user to know which services the data is associated with. As noted above, the data retrieved will not include data that may compromise the security of the service.
DSR access for systems-generated logs managed through Microsoft Entra ID
Microsoft offers both a portal and in-product experiences providing the enterprise customer's tenant administrator the capability to manage access requests. Access requests will allow for access of the personal data of the user, including: (a) identifiable information about an end user and (b) service-generated logs. The process is identical to that described in the Microsoft Entra ID section of Part 1, Step 2: Access.
DSR access for systems-generated logs managed through service APIs
Microsoft provides the ability to discover Customer Data directly via pre-existing application programming interfaces (APIs) or user interfaces (UIs) for specific services. Details are described in the respective services' reference documentation, describing applicable CRUD (create, read, update, delete) operations.
Step 2: Delete
The tenant admin is the only person within your organization who can execute a DSR delete request for a particular user within an Azure tenant.
DSR managed through Azure Portal
Microsoft offers both a portal and in-product experiences providing the enterprise customer's tenant administrator the capability to manage DSR delete requests. DSR delete requests follow the same as described in the Delete a user and associated data through the Azure portal section of Part 1, Step 5: Delete.
DSR managed through service APIs
Microsoft provides the ability to discover Customer Data directly via pre-existing application programming interfaces (APIs) or user interfaces (UIs) for specific services. Details are described in the respective services' reference documentation, describing applicable CRUD (create, read, update, delete) operations.
DSR delete for a guest in a tenant
All guests are able to see which organizations they can collaborate with at My Account - Organizations (microsoft.com).
If a user selects Leave:
- If the account is a B2B guest account, it will delete the user from the tenant with tenant administrator permission.
- If the account is a Direct Connect Account (EDDT), then it will issue a "Delete my data" request into the DSR stack, which will be issued upon tenant administrator permission.
Step 3: Export
The tenant admin is the only person within your organization who can execute a data subject request related to personal data captured in system-generated logs. The data retrieved for an export request will be provided in a machine-readable format and will be provided in files that will allow the user to know which services the data is associated with. As noted above, the data retrieved will not include data that may compromise the security or stability of the service.
DSR managed through the Azure portal
After you receive an export request for a data subject, you can use the Azure portal to export system-generated logs associated with a given user.
Here's the high-level process for exporting data from your tenant.
- Go to the Azure portal and create an export request on behalf of the user.
- Export the data and send file to user.
To export a user's info from an Azure tenant
Open the Azure portal, select All services, type User Privacy into the filter, and then select User Privacy.
In User privacy, select Manage User Requests, and then select Add export request.
Complete the Export data request:
- User. Type the email address of the Microsoft Entra user that requested the export.
- Subscription. Select the account you use to report resource usage and to bill for services. This is also the location of your Azure storage account.
- Storage account. Select the location of your Azure Storage (Blob). For more info, see the Introduction to Microsoft Azure Storage — Blob storage article.
- Container. Create a new (or select an existing) container as the storage location for the user's exported privacy data.
- Select Create.
The export request goes into Pending status. You can view the report status on the User privacy — Overview blade.
Important
Because personal data can come from multiple systems, the export process may take up to one month to complete.
DSR managed through service APIs
Microsoft provides the ability to discover Customer Data directly via pre-existing application programming interfaces (APIs) or user interfaces (UIs) for specific services. Details are described in the respective services' reference documentation, describing applicable CRUD (create, read, update, delete) operations.
How to notify Microsoft about exporting or deleting issues
If you run into issues while exporting or deleting data from the Azure portal, go to the Azure portal Help + Support blade and submit a new ticket under Subscription Management > Privacy and compliance requests for Subscriptions > Privacy Blade and GDPR Requests.