CPC G06Q 30/018 (2013.01) [G06Q 50/184 (2013.01); H04L 63/107 (2013.01)] | 20 Claims |
1. A method comprising:
receiving, by computing hardware, a personal data request originating from a computing device that is not a data owner of personal data of a data subject and the personal data request is related to collecting, storing, or processing the personal data of the data subject, wherein the personal data request is for a particular entity that is the data owner of the personal data of the data subject to perform an action with regard to the personal data associated with the data subject;
detecting, by the computing hardware, a state of a browser application executing on the computing device indicating a location of the computing device;
determining, by the computing hardware and based on the location of the computing device, identity verification levels comprising a first type of identity verification and a second type of identity verification;
determining, by the computing hardware, that the first type of identity verification requires first user-provided input to verify an identity of the data subject that contains fewer identity verification steps than second user-provided input required by the second type of identity verification to verify the identity of the data subject;
transmitting, by the computing hardware, an instruction to the computing device to dynamically display a prompt for the first user-provided input to verify the identity of the data subject in connection with the personal data request originating from the computing device;
receiving, by the computing hardware, the first user-provided input via the prompt;
verifying, by the computing hardware, the identity of the data subject based on the first user-provided input by:
providing first information included in the personal data request to an external system;
receiving second information from the external system based on the first information; and
verifying the identity of the data subject based on the first user-provided input and the second information; and
responsive to verifying the identity of the data subject in connection with the personal data request originating from the computing device, causing, by the computing hardware, performance of the action with regard to the personal data associated with the data subject.
|