{"id":108918,"date":"2022-03-16T09:00:00","date_gmt":"2022-03-16T16:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=108918"},"modified":"2023-05-15T23:04:55","modified_gmt":"2023-05-16T06:04:55","slug":"manage-subject-rights-requests-at-scale-with-microsoft-priva","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/03\/16\/manage-subject-rights-requests-at-scale-with-microsoft-priva\/","title":{"rendered":"Manage subject rights requests at scale with Microsoft Priva"},"content":{"rendered":"\n

Privacy is of increasing importance to our customers. In addition to the well-known European General Data Protection Regulation (GDPR), privacy regulations are emerging in nearly every region with more than 70 percent of countries now having data protection and privacy legislation.1<\/sup> <\/p>\n\n\n\n

As the number and scope of privacy standards have proliferated, privacy becomes an expectation of customers and stakeholders to enable a trusted business. Many of the large organizations I work with are mature in their privacy compliance processes. Some have had to be GDPR compliant since 2018. Even those without GDPR compliance obligations saw GDPR as a watershed event, recognizing that broader privacy regulation was coming. Organizations have now shifted their focus from privacy compliance to privacy leadership in order to provide value to their customers and their brands. To assist organizations on their privacy journey, we introduced Microsoft Priva<\/a> in October 2021 to help customers safeguard personal data and respect privacy rights.<\/p>\n\n\n\n

The concept of respecting an individual\u2019s privacy rights has been emphasized by the Organization for Economic Cooperation and Development (OECD) as \u201cThe Individual Participation Principle\u201d in the Fair Information Practice Principles (FIPPs) since 1980.2<\/sup> The principle includes an individual\u2019s right to access and control their own data. In some cases, they have the right to have this data corrected or deleted. Since GDPR went into effect, the concept has become more mainstream, known as data subject requests or subject rights requests. In the United States, 12 states have laws passed or active bills that mandate a subject\u2019s right to data access.3<\/sup><\/p>\n\n\n\n

Subject rights requests (SRRs) management is time-consuming and costly<\/h2>\n\n\n\n

Responding to subject rights requests (SRRs) can be resource-intensive, costly, and difficult to manage. There are challenging time frames for a response, with GDPR mandating a response time of 30 days and California Privacy Rights Act (CPRA) allowing 45 days. More than half of organizations handle SRRs manually, while one in three has automated the process.4<\/sup> According to Gartner\u00ae, most organizations process between 51 and 100 SRRs per month at a cost of more than USD1,500 per request.5<\/sup> As more privacy regulations come into force and the public becomes more informed about their rights, the volume of SRRs is expected to grow substantially, impacting organizations\u2019 resources even further.<\/p>\n\n\n\n

\"Pie<\/figure>\n\n\n\n

Figure 1. Approximately one in three organizations have partially automated subject rights requests.<\/em><\/p>\n\n\n\n

Scaling SRR management is challenging<\/h2>\n\n\n\n

To process an SRR, an organization must verify the data subject to make sure that the individual is who they say they are and has the rights to the information, then collect the information, review, redact where appropriate, and provide the response to the requester in an auditable manner.<\/p>\n\n\n\n

Most organizations have processes in place for SRR responses but rely on email for collaboration, eDiscovery tools for search, and manual reviews to identify data conflicts like a file containing multiple people\u2019s privacy relevant data. These processes can work but they don\u2019t scale. They also create data sprawl and additional security and compliance risk.<\/p>\n\n\n\n

Manage at scale and respond with confidence with Microsoft Priva<\/h2>\n\n\n\n

To help organizations deal with these challenges, Microsoft has created Microsoft Priva<\/a>, a privacy management solution that helps safeguard and respect privacy while streamlining the process for responding to SRRs.<\/p>\n\n\n\n

Microsoft Priva<\/a> SRRs helps gather a subject\u2019s data from the Microsoft 365 environment automatically, including emails, messages, documents, spreadsheets, and more that contain the requestor\u2019s personal data. It then detects and flags conflicts like the personal data of others or confidential information included in the collected files. Automated data collection and detection can help you capture conflicts more accurately to avoid any data leakage.<\/p>\n\n\n\n

Additionally, the solution allows collaboration in a protected platform for stakeholders to review, triage, and redact collected files in their native views. Unlike other solutions that might only provide you with a report of file paths, Microsoft Priva can bring the files to you and save you time and effort manually copying and pasting the file paths in your browser, or emailing and messaging files to others to review.<\/p>\n\n\n\n

\"Animated<\/figure>\n\n\n\n

Figure 2. Review, triage, and redact collected files in their native views when multiple people\u2019s data is detected<\/em>.<\/p>\n\n\n\n

Privacy admins can also leverage Microsoft Teams<\/a> and Power Automate<\/a>, integrated with the Microsoft Priva solution, to work with HR, legal, and other departments in an efficient, compliant, and auditable way. All your collaboration data is centralized in one platform that ensures security and compliance along the way. Microsoft Priva SRRs helps organizations manage SRRs at scale with confidence while avoiding personal data sprawl.<\/p>\n\n\n\n

\"Flow<\/figure>\n\n\n\n

Figure 3. Microsoft Priva SRRs helps manage requests at scale and with confidence.<\/em><\/p>\n\n\n\n

The solution dashboard provides visualization of SRR metrics and the ability to filter and manage requests to completion. This establishes to internal stakeholders and regulators that SRR responses were made with compliant processes in the required timeframe. <\/p>\n\n\n\n

\"Microsoft<\/figure>\n\n\n\n

Figure 4: Microsoft Priva SRRs helps provide insights on SRR progress and show trends over time.<\/em><\/p>\n\n\n\n

Integrate with your privacy solutions<\/h2>\n\n\n\n

Many organizations are using other tools to manage SRRs. We want to bring the value of Microsoft Priva and its native integration with Microsoft 365 to them as well to provide a better-together solution. Part of this is to integrate Microsoft Priva with the solutions of other software vendors and customers\u2019 homegrown solutions through our Microsoft Graph subject rights request API<\/a>. The API allows integration with privacy independent software vendors<\/a> (ISVs), like OneTrust, Securiti.ai, and WireWheel, to automate the SRR handling process and provide a response that encompasses the organization\u2019s entire data estate.<\/p>\n\n\n\n

For example, an organization can use the API to send a request they received in their homegrown application to Microsoft Priva, which then collects the subject\u2019s personal data automatically, enables collaboration to review and redact files, creates a link to the data package, and sends it back to the homegrown application through the API. The organization then can combine all the reports and data from various environments together to respond to the requestor.<\/p>\n\n\n\n

\"Microsoft<\/figure>\n\n\n\n

Figure 5. Microsoft Graph API enables organizations to leverage Microsoft Priva along with their existing privacy tools.<\/em><\/p>\n\n\n\n

Learn more<\/h2>\n\n\n\n

We are excited to help ease the complexity of SRR management. To learn more about how to manage SRRs at scale, download the e-book Five tips from Microsoft to automate your SRRs<\/a> or join our webinar<\/a> on April 19, 2022.<\/p>\n\n\n\n

Microsoft Priva<\/a> solutions are generally available for customers as an add-on to all Microsoft 365 or Office 365 enterprise subscriptions. You can try out Microsoft Priva SRRs<\/a> for 90 days or create up to 50 subject rights requests (whichever limit expires first) at no cost.<\/p>\n\n\n\n

To learn more about Microsoft Security solutions, visit our website<\/a>. Bookmark the Security blog<\/a> to keep up with our expert coverage on security matters. Also, follow us at @MSFTSecurity<\/a> for the latest news and updates on cybersecurity.<\/p>\n\n\n\n


\n\n\n\n

1<\/sup>UNCTAD Data Protection and Privacy Legislation Worldwide<\/a><\/p>\n\n\n\n

2<\/sup>OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data<\/a>, OECD. 2013.<\/p>\n\n\n\n

3<\/sup>US State Privacy Legislation Tracker<\/a>, Taylor Kay Lively, iapp. March 3, 2022.<\/p>\n\n\n\n

4<\/sup>IAPP-EY Consulting and Annual Privacy Governance Report for 2021<\/a>, iapp, EY. 2021.<\/p>\n\n\n\n

5<\/sup>Market Guide for Subject Rights Request Automation<\/a>, Gartner. November 2021.<\/p>\n","protected":false},"excerpt":{"rendered":"

Having the right technology and processes in place can make it possible to manage a large volume of SRRs efficiently and auditable. This post discusses SRR response use cases and how Microsoft Priva subject rights requests can be used for this purpose.<\/p>\n","protected":false},"author":215,"featured_media":109008,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3662],"topic":[3680],"products":[3707],"threat-intelligence":[],"tags":[3809],"coauthors":[2218,3356],"class_list":["post-108918","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-news","topic-privacy","products-microsoft-priva","tag-security-strategies"],"yoast_head":"\nManage subject rights requests at scale with Microsoft Priva | Microsoft Security Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/03\/16\/manage-subject-rights-requests-at-scale-with-microsoft-priva\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Manage subject rights requests at scale with Microsoft Priva | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"Having the right technology and processes in place can make it possible to manage a large volume of SRRs efficiently and auditable. This post discusses SRR response use cases and how Microsoft Priva subject rights requests can be used for this purpose.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/03\/16\/manage-subject-rights-requests-at-scale-with-microsoft-priva\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-16T16:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-16T06:04:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/03\/CLO22_TechOffice_042.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Steve Vandenberg, Abhilash Kankanawadi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/03\/CLO22_TechOffice_042.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Steve Vandenberg, Abhilash Kankanawadi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/03\/16\/manage-subject-rights-requests-at-scale-with-microsoft-priva\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/03\/16\/manage-subject-rights-requests-at-scale-with-microsoft-priva\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/steve-vandenberg\/\",\"@type\":\"Person\",\"@name\":\"Steve Vandenberg\"},{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/abhilashkankanawadi\/\",\"@type\":\"Person\",\"@name\":\"Abhilash Kankanawadi\"}],\"headline\":\"Manage subject rights requests at scale with Microsoft Priva\",\"datePublished\":\"2022-03-16T16:00:00+00:00\",\"dateModified\":\"2023-05-16T06:04:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/03\/16\/manage-subject-rights-requests-at-scale-with-microsoft-priva\/\"},\"wordCount\":1184,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/03\/16\/manage-subject-rights-requests-at-scale-with-microsoft-priva\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/03\/CLO22_TechOffice_042.jpg\",\"keywords\":[\"Security strategies\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/03\/16\/manage-subject-rights-requests-at-scale-with-microsoft-priva\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/03\/16\/manage-subject-rights-requests-at-scale-with-microsoft-priva\/\",\"name\":\"Manage subject rights requests at scale with Microsoft Priva | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/03\/16\/manage-subject-rights-requests-at-scale-with-microsoft-priva\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/03\/16\/manage-subject-rights-requests-at-scale-with-microsoft-priva\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/03\/CLO22_TechOffice_042.jpg\",\"datePublished\":\"2022-03-16T16:00:00+00:00\",\"dateModified\":\"2023-05-16T06:04:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/03\/16\/manage-subject-rights-requests-at-scale-with-microsoft-priva\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/03\/16\/manage-subject-rights-requests-at-scale-with-microsoft-priva\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/03\/16\/manage-subject-rights-requests-at-scale-with-microsoft-priva\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/03\/CLO22_TechOffice_042.jpg\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/03\/CLO22_TechOffice_042.jpg\",\"width\":1200,\"height\":800,\"caption\":\"C I S O presents to the board of executives on security status in a conference room setting.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/03\/16\/manage-subject-rights-requests-at-scale-with-microsoft-priva\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Manage subject rights requests at scale with Microsoft Priva\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Manage subject rights requests at scale with Microsoft Priva | Microsoft Security Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/03\/16\/manage-subject-rights-requests-at-scale-with-microsoft-priva\/","og_locale":"en_US","og_type":"article","og_title":"Manage subject rights requests at scale with Microsoft Priva | Microsoft Security Blog","og_description":"Having the right technology and processes in place can make it possible to manage a large volume of SRRs efficiently and auditable. This post discusses SRR response use cases and how Microsoft Priva subject rights requests can be used for this purpose.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/03\/16\/manage-subject-rights-requests-at-scale-with-microsoft-priva\/","og_site_name":"Microsoft Security Blog","article_published_time":"2022-03-16T16:00:00+00:00","article_modified_time":"2023-05-16T06:04:55+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/03\/CLO22_TechOffice_042.jpg","type":"image\/jpeg"}],"author":"Steve Vandenberg, Abhilash Kankanawadi","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/03\/CLO22_TechOffice_042.jpg","twitter_misc":{"Written by":"Steve Vandenberg, Abhilash Kankanawadi","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/03\/16\/manage-subject-rights-requests-at-scale-with-microsoft-priva\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/03\/16\/manage-subject-rights-requests-at-scale-with-microsoft-priva\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/steve-vandenberg\/","@type":"Person","@name":"Steve Vandenberg"},{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/abhilashkankanawadi\/","@type":"Person","@name":"Abhilash Kankanawadi"}],"headline":"Manage subject rights requests at scale with Microsoft Priva","datePublished":"2022-03-16T16:00:00+00:00","dateModified":"2023-05-16T06:04:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/03\/16\/manage-subject-rights-requests-at-scale-with-microsoft-priva\/"},"wordCount":1184,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/03\/16\/manage-subject-rights-requests-at-scale-with-microsoft-priva\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/03\/CLO22_TechOffice_042.jpg","keywords":["Security strategies"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/03\/16\/manage-subject-rights-requests-at-scale-with-microsoft-priva\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/03\/16\/manage-subject-rights-requests-at-scale-with-microsoft-priva\/","name":"Manage subject rights requests at scale with Microsoft Priva | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/03\/16\/manage-subject-rights-requests-at-scale-with-microsoft-priva\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/03\/16\/manage-subject-rights-requests-at-scale-with-microsoft-priva\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/03\/CLO22_TechOffice_042.jpg","datePublished":"2022-03-16T16:00:00+00:00","dateModified":"2023-05-16T06:04:55+00:00","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/03\/16\/manage-subject-rights-requests-at-scale-with-microsoft-priva\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/03\/16\/manage-subject-rights-requests-at-scale-with-microsoft-priva\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/03\/16\/manage-subject-rights-requests-at-scale-with-microsoft-priva\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/03\/CLO22_TechOffice_042.jpg","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/03\/CLO22_TechOffice_042.jpg","width":1200,"height":800,"caption":"C I S O presents to the board of executives on security status in a conference room setting."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/03\/16\/manage-subject-rights-requests-at-scale-with-microsoft-priva\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"Manage subject rights requests at scale with Microsoft Priva"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}}]}},"msxcm_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/108918"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/215"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=108918"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/108918\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/109008"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=108918"}],"wp:term":[{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=108918"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=108918"},{"taxonomy":"products","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/products?post=108918"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=108918"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/tags?post=108918"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=108918"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}