
does not give enough data based on its privacy policy.
The retention time (see Arts. 13 and 15) is typically
not given in the privacy policies. As outlined by (Mo-
han et al., 2019), the GDPR is vague in its interpreta-
tion of deletions (for example, concerning timeliness
and deletion method). We notice the results in the
DSARes, as visualized in Figure 1 (see Section 5).
6 CONCLUSION
The EU’s GDPR grants individuals rights to access
their data and have its usage explained in an elec-
tronic and understandable form. This paper provides
the first qualitative in-depth analysis of the requests
and responses from major online services by analyz-
ing their current data subject access requests and re-
sponses, comparing 2018 and 2023, and comparing
their privacy policies. Overall, the data subject access
process is satisfactory for nearly all services, but the
amount of data varies greatly between the different
services. Also, regarding the accessibility and under-
standability of responses, we experienced large differ-
ences between the services. Further, comparing the
responses from 2018 and 2023 revealed that Amazon
and Apple did not provide all the data in their earlier
responses. Finally, vague information made mapping
the responses with the privacy policies impossible.
REFERENCES
Alizadeh, F., Jakobi, T., Boden, A., Stevens, G., and
Boldt, J. (2020). GDPR Reality Check - Claiming
and Investigating Personally Identifiable Data from
Companies. In Proceedings of the IEEE European
Symposium on Security and Privacy Workshops (Eu-
roS&PW), Genoa, Italy, September 7–11, 2020, pages
120–129, New York, NY, USA.
Boeschoten, L., Ausloos, J., M
¨
oller, J. E., Araujo, T., and
Oberski, D. L. (2022). A framework for privacy
preserving digital trace data collection through data
donation. Computational Communication Research,
4(2):388–423.
Boeschoten, L., van den Goorbergh, R., and Oberski, D.
(2021a). A set of generated Instagram Data Down-
load Packages (DDPs) to investigate their structure
and content.
Boeschoten, L., Voorvaart, R., Van Den Goorbergh, R.,
Kaandorp, C., and De Vos, M. (2021b). Automatic
de-identification of data download packages. Data
Science, 4:101–120. 2.
Bowyer, A., Holt, J., Go Jefferies, J., Wilson, R., Kirk,
D., and David Smeddinck, J. (2022). Human-GDPR
Interaction: Practical Experiences of Accessing Per-
sonal Data. In Proceedings of the ACM Conference
on Human Factors in Computing Systems (CHI), New
Orleans, LA, USA, April 29 – May 5, 2022, New York,
NY, USA.
European Parliament (2016). Regulation 71, General Data
Protection Regulation (EU) 2016/679. https://eur-lex.
europa.eu/eli/reg/2016/679/oj. Accessed January 6,
2025.
Leschke, N., Kirsten, F., Pallas, F., and Gr
¨
unewald, E.
(2023). Streamlining Personal Data Access Re-
quests: From Obstructive Procedures to Automated
Web Workflows. In Garrig
´
os, I., Murillo Rodr
´
ıguez,
J. M., and Wimmer, M., editors, Web Engineering,
pages 111–125, Cham. Springer Nature Switzerland.
Leschke, N., P
¨
ohn, D., and Pallas, F. (2024). How to Drill
into Silos: Creating a Free-to-Use Dataset of Data
Subject Access Packages. In Jensen, M., Lauradoux,
C., and Rannenberg, K., editors, Privacy Technologies
and Policy, pages 132–155, Cham. Springer Nature
Switzerland.
Letty and Nocun, K. (2018). Arch
¨
aologische Stu-
dien im Datenm
¨
ull – Welche Daten spe-
ichert Amazon
¨
uber uns? https://media.ccc.
de/v/35c3-9858-archaologische\ studien\ im\
datenmull. accessed January 6, 2025.
LinkedIn (2024). About LinkedIn. https://about.linkedin.
com. Accessed January 6, 2025.
Mohan, J., Wasserman, M., and Chidambaram, V. (2019).
Analyzing gdpr compliance through the lens of pri-
vacy policy. In Gadepally, V., Mattson, T., Stone-
braker, M., Wang, F., Luo, G., Laing, Y., and Dubovit-
skaya, A., editors, Heterogeneous Data Management,
Polystores, and Analytics for Healthcare, pages 82–
95, Cham. Springer International Publishing.
Peters, Y., Nehls, P., and Thimm, C. (2023). Plat-
tformforschung mit Instagram-Daten – Eine
¨
Ubersicht
¨
uber analytische Zug
¨
ange, digitale Erhebungsver-
fahren und forschungsethische Perspektiven in Zeiten
der APIcalypse. Publizistik, 68(2):225–239.
P
¨
ohn, D., M
¨
orsdorf, N., and Hommel, W. (2023). Nee-
dle in the Haystack: Analyzing the Right of Access
According to GDPR Article 15 Five Years after the
Implementation. In Proceedings of the 18th Interna-
tional Conference on Availability, Reliability and Se-
curity, ARES ’23, New York, NY, USA. Association
for Computing Machinery.
van Driel, I. I., Giachanou, A., Pouwels, J. L., Boeschoten,
L., Beyens, I., and Valkenburg, P. M. (2022). Promises
and Pitfalls of Social Media Data Donations. Commu-
nication Methods and Measures, 16(4):266–282.
APPENDIX
Table 3 describes the path to the request and the re-
quest itself, while Table 4 contains the notification,
download, and data (without date and time).
ICISSP 2025 - 11th International Conference on Information Systems Security and Privacy
154