Abinaja is the legal operations lead at Sprintlaw. After completing a law degree and gaining experiencing in the technology industry, she has developed an interest in working in the intersection of law and tech.
If you run a business in New Zealand, chances are you’re collecting some form of personal information every day - customer contact details, delivery addresses, enquiry forms, email lists, CCTV footage, employee files, or even call recordings.
And as soon as you collect personal information, privacy compliance stops being a “nice to have” and becomes part of your legal foundations.
One of the most practical (and often overlooked) privacy tools is an access request form. It helps you respond properly when someone asks for access to their personal information - and it can save you a lot of time, confusion, and risk.
This article is updated to reflect current expectations and best practice for businesses operating under New Zealand’s Privacy Act 2020 and modern, digital-first workflows.
What Is An Access Request (And What Is An Access Request Form)?
An access request is when an individual asks your business for a copy of the personal information you hold about them.
In practice, this might be a customer saying:
- “Can you send me all the information you have about me?”
- “I want a copy of my account history and support tickets.”
- “Do you have CCTV footage of me from last Thursday?”
- “What notes did your staff record about my complaint?”
An access request form is simply a structured way to capture that request. It usually asks for:
- the requester’s identity details (so you don’t hand information to the wrong person),
- what information they want,
- the time period or context (to narrow the search),
- how they want to receive it (email, hard copy, secure portal), and
- any urgency or reasons (optional, but helpful).
It’s not that people must use your form - access requests can come in by email, DM, phone, or in person. The form is for you: it helps you standardise your process and respond consistently.
Many businesses pair this with a broader privacy framework, like a clear Privacy Policy and internal procedures, so staff know what to do when a request lands.
Why Access Requests Matter Under The Privacy Act 2020
New Zealand’s Privacy Act 2020 gives people rights over their personal information. One of the core rights is the ability to access personal information that an agency holds about them (where “agency” includes most businesses and organisations).
From a practical business point of view, that means you need to be able to:
- recognise when a request is an access request (even if it’s informal),
- verify the requester’s identity,
- locate the information across your systems,
- consider whether any legal reasons apply to withhold information, and
- respond within the required timeframe.
If you’re thinking, “That sounds like it could get messy fast,” you’re not wrong. Most small businesses store data in multiple places - email inboxes, CRM platforms, cloud drives, accounting software, booking tools, Slack messages, job management apps, and phones.
An access request form matters because it helps you get clarity early, so you don’t spend hours searching for “everything” when the individual really just wants “my invoice history from the last 12 months.”
Access Requests Often Appear When Relationships Are Strained
Access requests are common in “high emotion” moments, like:
- an employee dispute or termination,
- a customer complaint escalating,
- a contract dispute, or
- a sensitive service situation (health, counselling, childcare, etc.).
That’s exactly when you want a calm, repeatable process. A good form helps you stay consistent and professional - and reduces the risk of saying the wrong thing or disclosing the wrong material under pressure.
What Should A Good Access Request Form Include?
There’s no single “perfect” access request form, because it depends on what your business does and what data you hold. But most NZ businesses benefit from a form that covers a few essential areas.
1) Identity Verification (Without Collecting Too Much)
You need to be confident you’re giving personal information to the right person. At the same time, privacy compliance is also about data minimisation - only collecting what you reasonably need.
A balanced approach might include:
- full name and contact details,
- account number or customer reference (if relevant),
- a copy of ID only where necessary (and clear instructions on safe sending), and
- authority documents if someone is acting for another person (e.g. parent/guardian, agent, lawyer).
If your business regularly deals with authority documents, it can also help to have a consistent way to capture consent or authority, like an Access Request Form supported by internal verification steps.
2) Scope Of The Request (What They Want And When)
The biggest time-saver is getting the scope right from day one. Your form should let the person specify:
- what categories of information they want (e.g. messages, invoices, recordings, CCTV),
- relevant dates or time periods,
- which service, booking, job, or staff member it relates to, and
- any keywords or reference numbers that might help you search.
This isn’t about “making it hard” for the requester. It’s about making sure you can actually deliver what they need, accurately and efficiently.
3) Delivery Method And Security Preferences
How you provide access matters. Sending sensitive documents as an unencrypted email attachment can create new risks (including accidental disclosure).
Your form can ask:
- whether they prefer email, secure portal, or physical collection,
- the correct email address (double-checking this prevents mistakes), and
- any security steps (password-protected files, identity checks at collection).
4) A Clear Statement About Timeframes And Next Steps
People get frustrated when they feel ignored. Your form (or your auto-reply email after receiving the form) should clearly set expectations, such as:
- confirmation that the request has been received,
- what information you need to verify identity,
- when you expect to respond, and
- what happens if the request is broad or complex.
This is also where businesses often align their external process with internal privacy documentation, like a Privacy Collection Notice that explains how personal information is handled from the start.
How Do You Handle An Access Request In Practice? (A Step-By-Step Workflow)
Even with a good form, you need an internal workflow so the request doesn’t get lost in someone’s inbox.
Here’s a simple process many businesses use.
Step 1: Identify The Request And Log It
First, make sure your team can spot an access request even if the person doesn’t use legal language.
Create a basic log (a spreadsheet is fine) recording:
- date received,
- who received it,
- requester name,
- what they asked for, and
- deadline for response.
This is one of those small admin habits that can save you major headaches later.
Step 2: Verify Identity
Don’t hand over personal information until you’re satisfied you’re dealing with the right person (or their authorised representative).
If you’re unsure what’s “reasonable” for your situation, it’s worth getting tailored advice - the right approach depends on how sensitive the information is and what risks exist if it’s disclosed to the wrong person.
Step 3: Clarify Or Narrow The Scope (If Needed)
If the request is broad - for example, “everything you have about me” - you can usually respond by clarifying what they mean and helping them narrow it down.
This is where an access request form shines, because it naturally prompts the requester to be specific.
Step 4: Locate The Information Across Systems
Personal information can live in places you don’t expect, including:
- email correspondence,
- CRM notes,
- customer support platforms,
- shared drives,
- call recordings, and
- CCTV or security systems.
If your business uses call recordings, you also need to think about privacy compliance at the point of collection - for example, having appropriate notices and policies in place. (If you record calls, it’s worth checking your approach against New Zealand requirements around call recording.)
Step 5: Review Before You Release
This is the step people rush, and it’s where risk often sits.
Before you release anything, check for:
- information about other people (e.g. staff names, other customers, third-party opinions),
- commercially sensitive internal notes that might be subject to withholding grounds, and
- data that should be redacted (for example, another person’s phone number).
In many cases, you may be able to provide access by redacting third-party information, rather than refusing the request entirely.
Step 6: Provide The Response Securely And Keep A Record
Once you provide the information, keep a record of what you provided and when. If you refuse any part, document why.
Good record-keeping isn’t just about being “organised” - it’s a key part of being able to show you handled the request properly if a complaint is later made.
Common Privacy Risks (And How Access Request Forms Help You Avoid Them)
Access requests aren’t usually the problem. The problem is what happens when you respond quickly, informally, and without a process.
Here are some common traps for NZ business owners - and how a form (plus a workflow) can help.
Accidentally Disclosing The Wrong Person’s Information
This can happen when:
- you forward an email chain containing other customers’ details,
- you export CRM notes that mention third parties, or
- you share a file that includes internal comments not meant for external release.
An access request form forces you to slow down, identify what’s actually being requested, and conduct a proper review before releasing information.
Missing The Deadline Because No One Owned The Task
In a small business, “someone will get to it” often turns into “it slipped through the cracks.”
A form helps because it creates a formal intake point, which makes it easier to:
- assign responsibility internally, and
- track timelines.
Collecting Extra ID Or Data You Don’t Need
It’s tempting to ask for lots of identification “just in case”. But collecting unnecessary personal information can create its own privacy risk (because now you have more sensitive information to store and protect).
A well-drafted form gives you a consistent, minimal, and sensible verification approach.
Not Having A Data Breach Plan When Something Goes Wrong
Sometimes the privacy issue isn’t the request - it’s what you discover while responding (for example, that data was shared incorrectly or systems weren’t secure).
If you’re handling personal information, it’s smart to have a plan for incidents and notifications, such as a Data Breach Response Plan. That way, if you uncover a problem mid-process, you’re not scrambling.
Access Requests For Employees, Contractors, And Workplace Records
Access requests don’t just come from customers. They can also come from current or former employees, contractors, or job applicants.
Common examples include requests for:
- employment file notes, performance records, or disciplinary meeting notes,
- payroll information and leave records,
- workplace investigation material (where appropriate), and
- CCTV footage from the workplace.
This is where privacy overlaps with employment processes, confidentiality, and good documentation. If you’re already using clear employment documentation (like an Employment Contract and workplace policies), you’ll usually be in a better position to manage records consistently and reduce disputes about “who said what” later.
What About CCTV Footage Or Workplace Monitoring?
If you use cameras or monitoring tools, you should be upfront with staff and customers about it, and ensure it’s used for legitimate reasons (like safety and security). Workplace monitoring can raise both privacy and employment law issues, so it’s worth checking your approach early. (If cameras are part of your setup, this can intersect with what’s lawful in the workplace.)
When an access request is made for CCTV footage, the practical challenge is often that footage includes other people. You may need to consider:
- whether you can reasonably edit, blur, or redact third-party images,
- whether providing a still image is sufficient, and
- how you’ll securely provide the footage.
This is a classic situation where having a consistent intake form and review process reduces the chance of accidental over-disclosure.
Key Takeaways
- An access request is when someone asks for the personal information your business holds about them, and you need a reliable process to respond properly.
- An access request form helps you verify identity, clarify scope, set expectations, and respond consistently - especially when requests arrive in stressful or high-conflict situations.
- Under the Privacy Act 2020, access requests can come through informal channels (like email or social media), so staff training and a clear workflow matter.
- Common risks include disclosing third-party information, missing deadlines, and collecting unnecessary ID - a structured form and review process helps prevent these mistakes.
- Employee and workplace access requests (including for CCTV footage) often require extra care, because records can include sensitive content and information about other people.
- Strong privacy compliance works best when your access request process is supported by clear privacy documentation and internal incident planning.
If you’d like help putting privacy processes in place - including an access request form that matches how your business actually handles personal information - you can reach us at 0800 002 184 or team@sprintlaw.co.nz for a free, no-obligations chat.


