fbpx
Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Penetration Testing

          Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Completed DPIA Example: 7 Simple Helpful Steps To Create

Completed DPIA Example
A completed DPIA example is a key component of a ‘Privacy by design’ approach to a project or other personal data processing activity (hereafter referred to as an ‘initiative’).

Completed DPIA Example: 7 Simple Helpful Steps To Create

Data Protection Impact Assessments

A completed DPIA example is a key component of a ‘Privacy by design’ approach to a project or other personal data processing activity. ‘Privacy by design’ is an essential tool in building trust and minimizing privacy risks.

What is a Data Protection Impact Assessment (DPIA)?

A DPIA is a structured approach to identifying the privacy risks associated with the processing of personal data and for implementing appropriate controls to manage those risks. The process comprises the following six distinct steps and a parallel stream of consultation:

  1. Identify the need for a DPIA
  2. Describe the information flows
  3. Identify and assess the privacy risks
  4. Identify and approve controls
  5. Assign responsibility for implementing controls
  6. Reassess and accept the risks.

Why conduct a DPIA?

Key benefits of conducting a DPIA are:

  • Fulfilling the organisation’s legislative, statutory and contractual obligations, particularly those under data protection legislation in relation to data processing activities
  • Contributing towards effective risk management and increased privacy and data protection awareness across the organisation
  • Giving your stakeholders confidence that the organisation is taking steps to safeguard their privacy, and a better understanding of the ways in which their personal data is being used
  • Taking actions which are less likely to be privacy-intrusive and have a negative impact on individuals
  • Increasing the likelihood that the initiative is more successful because privacy risks are identified early, allowing controls to be designed at less cost and with less impact on delivery.

A completed DPIA example should be done for any initiative that involves the processing of personal data or any other activity that could impact the privacy of individuals.

Is a completed DPIA example required?

A completed DPIA example should be done for any initiative that involves the processing of personal data or any other activity that could impact the privacy of individuals. Examples are:

  • Building a new IT system for storing or accessing staff personal data
  • Implementing surveillance technology in a building, such as a CCTV system
  • Using a cloud service for the storage of research data
  • Developing policies or strategies that have privacy implications.

A completed DPIA example should be done for new initiatives or for changes to existing systems or processes. It may also be a recommended outcome from a formal investigation into an information security incident or weakness at the organisation.

The first step in conducting a completed DPIA example is a screening process to decide whether the detailed work in the subsequent steps will be required. A completed DPIA example must be done for all research projects that may impact the privacy of individuals and/or involve the use of personal data.

When should a DPIA be undertaken?

Ideally, a DPIA should be undertaken in the early stages of an initiative. The earlier a completed DPIA example is done, the easier it is likely to be to address any privacy risks identified.

Who should conduct a DPIA?

The organisation’s Data Protection Officer has overall accountability for ensuring that completed a DPIA example is done for high risk personal data processing initiatives.

Responsibility for ensuring that a specific completed DPIA example is done lies with the individual responsible for the initiative, such as:

  • The project sponsor,
  • The information asset owner
  • The lead for a research project

Who should hold the completed DPIA example?

The individual or team responsible for the initiative should retain the master copy of the completed DPIA example for audit purposes and to be able to demonstrate compliance with legislative requirements should a query be raised. The Data Protection Officer or Information Governance Unit may request copies of DPIAs for monitoring and reporting purposes.

There are templates available online showing how you can record your DPIA process and outcome. Understandably, it might get confusing if you are unsure what relevant questions to ask pertaining to your organisation’s data protection compliance. This is where your Data Protection Officer can step in to help you.

At Privacy Ninja, for instance, part of our outsourced Data Protection Officer Service already covers the DPIA as a “ready to use anytime” template within our DPMP documentation. We perform this together with our client on every new activity they have that collects or processes new personal data after being onboarded as our DPO-As-A-Service client.

A DPIA Criteria Example

Start to fill out the template at the beginning of any major project involving the use of personal data, or if you are making a significant change to an existing process. Integrate the final outcomes back into your project plan.

Also read: DPIA Completed Example

The individual responsible for the initiative should retain the master copy of the completed DPIA for audit purposes and to be able to demonstrate compliance with legislative requirements should a query be raised.

Step 1: Identify the need for a DPIA


Explain broadly what the project aims to achieve and what type of processing it involves. You may find it helpful to refer to or link to other documents, such as a project proposal. Summarize why you identified the need for a DPIA.

Step 2: Describe the process

Describe the nature of the process: How will you collect, use, store and delete personal data? What is the source of the data? Will you be sharing data with anyone? You might find it useful to refer to a flow diagram or another way of describing data flows. What types of processing identified as “likely high risk” are involved?

Describe the scope of the process: what is the nature of the data, and does it include special category or criminal offence data? How much data will you be collecting and using? How often? How long will you keep it? How many individuals are affected? What geographical area does it cover?

Describe the context of the process: What is the nature of your relationship with the individuals? How much control will they have? Would they expect you to use their data in this way? Do they include children or other vulnerable groups? Are there prior concerns over this type of processing or security flaws?

Is it novel in any way? What is the current state of technology in this area? Are there any current issues of public concern that you should factor in? Are you signed up to any approved code of conduct or certification scheme (once any have been approved)?

Describe the purposes of the process: What do you want to achieve? What is the intended effect on individuals? What are the benefits of the processing for you, and more broadly?

A section of the thorough list of assessment questions for your DPIA. Having a Data Protection Officer to discuss these questions with you helps to ensure you are on the right track.

Step 3: Consultation process

Consider how to consult with relevant stakeholders: Describe when and how you will seek individuals’ views – or justify why it’s not appropriate to do so. Who else do you need to involve within your organisation? Do you need to ask your processors to assist? Do you plan to consult information security experts, or any other experts?

Step 4: Identify and approve the controls

Identify controls to mitigate the risks and record them in the DPIA template. The aim is to identify sufficient controls to eliminate each of the risks identified in Step Three, or to reduce them to a level which is acceptable to the organisation. For some identified risks, no controls may be required because the likelihood is so low and/or the impact so small that the risks are acceptable to the organisation.

Controls may take many forms, such as:

  • Additional terms and conditions in a contract
  • A privacy notice
  • Documented operational procedures
  • Disabling certain product features
  • User training
  • Technical controls, such as encryption.

Once a control is identified, the expected result of its implementation should be recorded i.e. whether it is likely to:

  • Eliminate the risk
  • Reduce the risk to an acceptable level
  • Require acceptance as there is no reasonable control to eliminate or reduce it.

Proposed controls should then be approved by an appropriate individual. Normally this should be the information asset owner or their nominated delagate, but it could also be:

  • The project sponsor
  • The chair of the relevant committee.

Step 5: Assign responsibility for implementing controls

Allocate the controls to appropriate individuals and record an agreed deadline for implementation.

In the case of a company initiative, the implementation of many of the controls will fall within the scope of the initiative and should be managed in the same way as any other project task. However, the implementation of some controls will be beyond the scope of the project (such as a change to the organisation’s policy) so related tasks should be assigned through the organisation’s normal management processes and added to the list of project dependencies.

Where initiatives are being run informally, or as ‘business as usual’ activities, the organisation’s normal management processes should be used to identify who will implement the controls and agree an appropriate deadline. In all cases, a named individual and deadline for completion should be assigned and recorded.

In the absence of formal project management documentation, the DPIA should be used to record when controls are implemented.

An example of a DPIA Action Plan table. Be sure your Data Protection Officer walks you through the process.

Step 6: Reassess and accept the risks

After the controls have been implemented, reassess the risks and record the outcome in the DPIA template. The risks then need to be accepted by an appropriate individual. Normally this should be the information asset owner or their nominated delegate, but it could also be:

  • The project sponsor
  • The chair of the relevant committee.

The individual who signs off the risks should have a clear understanding of the initiative, particularly the privacy risks and how the controls address them. If any risk has not been reduced to an acceptable level after implementation of the controls identified in Step Four, additional controls will need to be identified and Step Five and Step Six will need to be repeated.

Consultation

Consultation serves many purposes throughout the DPIA process, such as:

  • Explaining the initiative to stakeholders
  • Explaining to stakeholders how the DPIA process will be used within the initiative to manage privacy risks
  • Establishing current working practices that the initiative aims to update or replace
  • Establishing how the new system or process is likely to be used in practice and in the case of general-purpose facilities, their likely purpose
  • Establishing the privacy concerns of stakeholders
  • Soliciting suggestions for controls
  • Explaining identified controls to stakeholders.

Key stakeholders are likely to include:

  • Individuals who understand the initiative from a technical point of view and in terms of personal data processing
  • Individuals who will be using the new system or process
  • Individuals whose personal data will be processed by the new system or process
  • Collaborative partners
  • The suppliers of a system
  • The organisation’s Data Protection Officer or Information Governance Unit, Computing and Information Services (CIS) and Legal Services.

In cases where the impact of a risk identified at Step Three is assessed to be either severe or major and likelihood is assessed to be either likely or very likely, the organisation’s Data Protection Officer must be consulted. If any risk remains at this level after the implementation of controls, the University may be required to consult the Information Commissioner’s Office.

Also read: What you need to know about appointing a Data Protection Officer in Singapore

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us