Identifying and authenticating personal data subjects is a fundamental step in fulfilling requests in accordance with the LGPD (Brazilian General Data Protection Law).
The purpose of identification and authentication is to ensure that the holder of personal data is who they claim to be, in order to protect their rights and prevent fraud.
What are identification and authentication?
Identification is the process of assigning a name or code to a person or thing. In the context of the LGPD (Brazilian General Data Protection Law), identification is the process of confirming the identity of a personal data subject. Authentication, in the context of the LGPD, is the process of confirming that the person requesting an action is indeed the data subject.
Why is it important to identify and authenticate data subjects, and how do you do it?
These actions are important within the scope of the LGPD (Brazilian General Data Protection Law) for two main reasons:
1. To protect the rights of data subjects: Identification and authentication help ensure that data subjects can exercise their rights, such as access, rectification, and erasure. By properly identifying and authenticating data subjects, organizations can prevent malicious individuals from making fraudulent requests on behalf of data subjects.
2. To prevent fraud: Identification and authentication help prevent malicious individuals from misusing data subjects' personal information. By properly identifying and authenticating data subjects, organizations can protect their personal data from unauthorized access, misuse, and disclosure.
Techniques for fraud prevention and data protection security
To ensure fraud prevention and the security of the data subject in identification and authentication processes, as stipulated in the LGPD (Brazilian General Data Protection Law), companies can adopt some common techniques, such as:
- Identification documents: Documents such as identity cards, passports, or driver's licenses can be used to identify holders.
- Personal information: Information such as name, date of birth, and address can also be used to identify policyholders.
- Two-factor authentication: Two-factor authentication requires the cardholder to enter a security code in addition to their login credentials.
In short, organizations must also be aware of the need for constant updating. Technology can be an important ally in this process, providing tools and resources that can help in these processes more effectively.
By adopting an updated and technology-supported approach, organizations can ensure they are complying with legal obligations and protecting the rights of data subjects.



















