1. Open up your secure portal. On the homepage find the request you wish to respond to and click on it. 

*Seeing encrypted data? Read our guide on setting up your team passphrase, or contact support@tapmydata.com.

2. You will be directed to the next screen where you will see details of the data request and requestor.

The two verified ticks show that the user has completed a confirmation process for the given data. Learn what steps are taken to verify our users.

4. Scroll down toward the bottom of the screen and you will see the 'Your Response' box. This is where you can submit your responses to the individual. Tap offers three ways to do this.

4.1. You can send a direct message to the individual. This may be to ask them for further verification such as photographic ID, or ask them what they specifically want to know about their personal data. You can message the individual as many times as you want, we encourage a data dialogue.

 4.2. You can send a single piece of information to the individual using the 'Enter Data You Hold' response. This may be useful if you hold just an email or postal address for instance. You can add multiple pieces of information by clicking on the '+ Add row' button in the bottom left. 

4.3. The final way you can respond is by attaching and sending a file to the individual. 

To attach a file (Tap supports all file formats) and send to the individual, click on attach file, type in the file label and browse for the file on your desktop or device. If you want to send multiple files to an individual click on '+ Add row'. Once you've labelled and added the file, click submit response to send the file/s straight to the individual. 

5. All responses will be sent straight to the subject's device using end-to-end encryption. When you have submitted your response  you will be able to see a record of all your responses. This provides an audit trail of all your interactions with the individual.

We do not collect any of this information. All responses will be sent straight to the subject's device using end-to-end encryption.