Right of Access to Personal Information
Plain English Translation
Under Quebec Law 25 section 27 right of access to personal information, organizations must confirm the existence of personal data and provide individuals with a copy upon request. When responding to a Loi 25 access request involving computerized data, the organization must deliver the information in a written, intelligible transcript or a structured commonly used technological format Law 25 requires for portability. Ensuring a smooth Law 25 access request process for organizations guarantees individuals can effectively exercise their privacy rights.
Technical Implementation
Use the tabs below to select your organization size.
Required Actions (startup)
- Establish a dedicated privacy email address to receive access requests.
- Manually extract user data from the primary database and provide it in CSV or JSON format.
- Log all requests in a simple data subject request log.
Required Actions (scaleup)
- Implement a user-facing portal allowing individuals to download their own data.
- Standardize the export format across all systems to meet the structured commonly used technological format Law 25 requirement.
- Document standard operating procedures for verifying the identity of the requester.
Required Actions (enterprise)
- Deploy automated privacy rights management software to orchestrate data discovery and extraction across all structured and unstructured data stores.
- Implement secure, time-limited download links with multi-factor authentication for data delivery.
- Conduct regular audits of the Law 25 access request process to ensure SLAs are met without serious practical difficulties.
Under Quebec Law 25 right of access, individuals can ask an organization to confirm whether it holds personal information about them, communicate that information, and provide a copy. Section 27 guarantees transparency and control over one's data.
Organizations must require the applicant to prove they are the person concerned or an authorized representative. This involves verifying their identity through secure means, such as matching account details or requiring a secure login, before releasing any sensitive data.
Organizations must disclose the personal information they hold on the individual, fulfilling what personal information must be provided under Law 25 access rights. For portability specifically, this covers data collected from the applicant, but excludes data created or inferred by the organization.
Yes, Law 25 provide copy of personal information in electronic format rules require that computerized data collected from the applicant be delivered in a structured, commonly used technological format, unless doing so raises serious practical difficulties.
While the law does not explicitly list formats, standard industry practices for a structured commonly used technological format Law 25 include CSV, JSON, or XML. These formats allow the individual to easily read the data or transfer it to another service.
The Law 25 access request response time mandates that the person in charge of the protection of personal information must reply in writing promptly and no later than 30 days after the date the request is received.
Access to personal information must generally be free of charge. However, a reasonable charge may be required for the transcription, reproduction, or transmission of the information, provided the applicant is informed of the approximate amount in advance.
An organization may refuse access if disclosure would reveal personal information about a third party and seriously harm them, or if it would hinder a legal inquiry. Additionally, organizations can cite Law 25 access request exemptions practical difficulties if providing the data in a specific technological format is disproportionately burdensome.
Organizations should maintain a comprehensive data subject request log detailing the receipt date, identity verification steps, data sources queried, and the final response provided. This ensures an auditable Law 25 access request process for organizations.
To figure out how to export personal data for Law 25 portability requests securely, organizations should use encrypted channels, secure portals, or password-protected files. Delivering data securely prevents unauthorized access or confidentiality incidents during the fulfillment process.
A consistent access-request workflow requires tracking intake, identity verification, data sources searched, and response deadlines. Tools like WatchDog Security's Compliance Center can centralize evidence and task assignments so teams can demonstrate a repeatable, auditable process for §27 requests.
Delivering exports often involves transmitting sensitive data and proving it was shared securely to the right person. Tools like WatchDog Security's Secure File Sharing can help by providing encrypted delivery, requester verification, and audit logs that support secure fulfillment and auditability.
"Every person carrying on an enterprise who holds personal information on another person must, at the request of the person concerned, confirm the existence of the personal information, communicate it to the person and allow him to obtain a copy of it. At the applicant’s request, computerized personal information must be communicated in the form of a written and intelligible transcript. Unless doing so raises serious practical difficulties, computerized personal information collected from the applicant, and not created or inferred using personal information concerning him, must, at his request, be communicated to him in a structured, commonly used technological format."
| Version | Date | Author | Description |
|---|---|---|---|
| 1.0.0 | 2026-02-23 | WatchDog Security GRC Team | Initial publication |