SlideShare a Scribd company logo
1 of 60
Download to read offline
All about a Data Protection
Impact Assessment (DPIA)
Andrey Prozorov, CISM, CIPP/E, CDPSE, LA 27001
www.patreon.com/AndreyProzorov
2.0, 18.05.2022
About me
• Linkedin.com/in/andreyprozorov
• Patreon.com/AndreyProzorov
Cybersecurity and Data Protection Expert
CISM, CIPP/E, CDPSE, LA 27001
Agenda
3
1. General Information 2. Risk factors 3. DPIA in practice
• GDPR
• What is a DPIA?
• Why is a DPIA needed?
• What are the benefits of
conducting a DPIA?
• Who get involved?
• When is it mandatory?
• What should a DPIA include?
• Other comments
• Guidelines and templates
• DPIA Process (models)
• Life Cycle by PDPC
• Main issues
• Whitelists and Blacklists
• High risk factors
• Other potential high risk factors
1. Evaluation or scoring
2. Automated decision making
3. Systematic monitoring
4. Sensitive data
5. Large scale
6. Combined data sets
7. Vulnerable data subjects
8. New technology
9. Preventing data subjects from
exercising a right
• My templates
• DPIA Lite
• DPIA and LIA Template
• ICO’s LIA Template and Checklist
• How to improve (complicate) the
template?
• DPIA Register
• DPIA awareness checklist by ICO
1. General Information
4
GDPR: DPIA
5
Article 35 Data protection impact assessment Article 36 Prior consultation
• Cases where a DPIA is required
• Seek the advice of the DPO
• Whitelists and Blacklists by SAs
• DPIA content
• Seek the views of data subjects or their
representatives
• The controller shall consult the SA prior
to processing where a DPIA indicates that
the processing would result in a high risk
in the absence of measures taken by the
controller to mitigate the risk.
• Written advice to the controller and
timescales
• Information to the SA
What is a DPIA?
• A Data Protection Impact Assessment (DPIA) is
a prior written assessment of the impact of
the planned processing operations on the
protection of personal data.
• DPIAs provide a structured way of thinking
about the risks posed to the people whose
data you process.
• DPIAs also help you to comply with the
requirement of data protection by design.
6
• To understand and mitigate risks to
people’s rights
• To comply with a legal obligation
7
Why is a DPIA needed?
What are the benefits of conducting a DPIA?
• Ensuring and demonstrating that your organisation complies with the GDPR and avoids
sanctions.
• Inspiring confidence in the public by improving communications about data protection
issues.
• Ensuring your users are not at risk of their data protection rights being violated.
• Enabling your organisation to incorporate “data protection by design” into new projects.
• Reducing operation costs by optimising information flows within a project and eliminating
unnecessary data collection and processing.
• Reducing data protection related risks to your organisation.
• Reducing the cost and disruption of data protection safeguards by integrating them into
project design at an early stage.
8
By DPC Ireland
• Start preparing it when designing a new
processing operation.
• Then review and update it regularly.
9
When to do a DPIA?
• Top management (accountable)
• Business owner
• DPO
• IT department
• Processors
• Privacy Committee
• CISO / IS Team
• Risk and Compliance
• Legal
• Representatives of the subjects
10
Who get involved?
A DPIA is mandatory for data processing operations
presenting high risks to data subjects such as
when two of the following criteria apply:
1. Systematic evaluation/profiling
2. Automated decision making
3. Systematic monitoring
4. Sensitive data processing
5. Large scale processing
6. Match/combine datasets with different purposes
7. Vulnerable data subjects
8. New technologies
9. Preventing people from exercising their rights or
entering into a service/contract
11
When is it mandatory?
• Description of the planned processing
and its purposes
• Necessity and proportionality
assessment
• Risk assessment to data subjects
• Measures to address the risks
12
What should a DPIA include?
Other comments
• Controller is accountable for the DPIA
• The controller shall seek the advice of the DPO, where designated, when carrying
out a DPIA
• DPIA is required for the accountability
• DPIA is an important part of the Data Protection by Design
• DPIA focusses on new processes and projects, but ongoing processes should also
be assessed
• There is no requirement to publish DPIA reports, but some provide brief versions
• Be aware of the purpose of the process and try to avoid unnecessary complication
• It is convenient to combine a DPIA with a LIA (legitimate interests assessment)
13
14
www.patreon.com/posts/31386523
Guidelines and templates
Supervisory Authorities
• WP 29 / EDPB: https://ec.europa.eu/newsroom/article29/items/611236/en
• ICO (UK): https://ico.org.uk/for-organisations/guide-to-data-protection/guide-to-the-general-data-
protection-regulation-gdpr/data-protection-impact-assessments-dpias and https://ico.org.uk/for-
organisations/guide-to-data-protection/guide-to-the-general-data-protection-regulation-gdpr/legitimate-
interests/how-do-we-apply-legitimate-interests-in-practice
• DPC (Ireland): https://www.dataprotection.ie/en/dpc-guidance/guide-data-protection-impact-
assessments
• CNIL (France): https://www.cnil.fr/en/privacy-impact-assessment-pia
• AEPD (Spain): https://www.aepd.es/en/guias-y-herramientas/herramientas/evalua-riesgo-rgpd
• DPO (Finland): https://tietosuoja.fi/en/impact-assessments
Other
• ISO/IEC 29134:2017 Guidelines for privacy impact assessment
• Brussels Laboratory for Data Protection & Privacy Impact Assessments (d.pia.lab) http://www.dpialab.org
• PDPC (Singapore) - https://www.pdpc.gov.sg/help-and-resources/2017/11/guide-to-data-protection-
impact-assessments 15
16
17
18
19
20
www.patreon.com/posts/63458468
Life Cycle by PDPC
21
Main issues
• Too many requirements and guidelines…
• Different methodologies, no “silver bullet”
• DPIA vs PIA (EU vs US/Other)
• No real examples
• Security Risks (business risks) vs DPIA (risks to subjects)
• Lawyers are usually bad at risk management. Business units, too…
• Consultants offers more sophisticated models (e.g., CNIL)
• Balance the complexity (detail) and value (adequacy) of the assessment
• Assessment should NOT be done by the DPO, he is advising
22
2. Risk Factors
23
Whitelists and Blacklists
• Data protection authorities of many EU member states have published
draft lists of data processing activities that would trigger the need for a
data protection impact assessment in that country.
• IAPP list - https://iapp.org/resources/article/eu-member-state-dpia-
whitelists-and-blacklists
• EDPB’s opinion - https://edpb.europa.eu/our-work-tools/consistency-
findings/opinions_en
• These lists are the basis for recommendations by SAs.
24
Examples (Finland, France, Irland)
25
High risk factors
GDPR Art. 35. Data protection impact assessment
1. Where a type of processing in particular using new
technologies, and taking into account the nature, scope,
context and purposes of the processing, is likely to result in a
high risk to the rights and freedoms of natural persons, the
controller shall, prior to the processing, carry out an
assessment of the impact of the envisaged processing
operations on the protection of personal data. A single
assessment may address a set of similar processing
operations that present similar high risks.
3. A data protection impact assessment referred to in paragraph 1 shall in particular be required in the case of:
(a) a systematic and extensive evaluation of personal aspects relating to natural persons which is based on automated
processing, including profiling, and on which decisions are based that produce legal effects concerning the natural
person or similarly significantly affect the natural person;
(b) processing on a large scale of special categories of data referred to in Article 9(1), or of personal data relating to criminal
convictions and offences referred to in Article 10; or
(c) a systematic monitoring of a publicly accessible area on a large scale. 26
Other potential high risk factors
27
Criteria
1. Evaluation or scoring
2. Automated decision making
3. Systematic monitoring
4. Sensitive data
5. Large scale
6. Combined data sets
7. Vulnerable data subjects
8. New technology
9. Preventing data subjects from exercising a right
10. International Transfer (optional)
If 2 are matched, a
full assessment
should be carried out
1. Evaluation or scoring
Evaluation or rating of data subjects’ performance at work, economic situation, health,
personal preferences, interests, reliability, behaviour, location or movements (including
profiling and predicting).
For example:
• Financial institutions that evaluate their customers in light of a reference database relating
to lending, a database relating to the prevention of money laundering and terrorist
financing or a database concerning fraud.
• Biotechnology companies that advertise genetic testing directly to consumers in order to
evaluate and predict the likelihood of diseases or health risks.
• Businesses that compile behavioural or marketing-related profiles that are based on the
use of their website or activities on their website.
28
2. Automated decision making
• Automated decision-making where the decisions produce legal effects or other
significant effects.
• Often goes together with profiling.
• Impact on subjects is important.
29
3. Systematic monitoring
Personal data are sometimes collected in circumstances where the data subjects do
not necessarily know who is collecting their data and how the data will be used.
Moreover, it can be impossible for individuals to prevent finding themselves in this
kind of a situation in public spaces or publicly accessible areas. Monitoring can refer
to, for example, access control, CCTV monitoring or similar measures.
For example:
• Processing of data for the purpose of observing, tracking or monitoring data
subjects and the collection of data via networks.
• Systematic monitoring of a publicly accessible area on a large scale.
30
4. Sensitive data
• Processing of personal data revealing racial or ethnic origin, political
opinions, religious or philosophical beliefs, or trade union membership,
and the processing of genetic data, biometric data for the purpose of
uniquely identifying a natural person, data concerning health or data
concerning a natural person's sex life or sexual orientation.
• Processing of personal data relating to criminal convictions and
offences.
31
5. Large scale
Assessments of scale should ideally take into account the following:
• the number of data subjects concerned, either as an exact number or a percentage
of a group, such as the population of a town or country
• the volume of the data to be processed and/or the number of individual units of
data
• the duration or permanence of the data processing operation
• the geographical scope of the processing operation.
Personal advisers (e.g., doctors) do NOT process data on a large scale.
32
6. Combined data sets
Coordinating or combining of data sets in a manner that is unforeseen and
unexpected from the perspective of data subjects.
For example:
• A controller combines data sets originating from two or more data processing
operations carried out for different purposes or by different controllers.
• Customer registers or two businesses are combined in connection with a merger.
It can be difficult for data subjects to, for example, prevent the processing of their
data or exercise their other rights if they are vulnerable in respect of the controller.
33
7. Vulnerable data subjects
Vulnerable individuals include, among others,
• children
• employees
• patients
• elderly people
• asylum seekers.
The reason is an imbalance of power between the data subject and the controller.
34
8. New technology
• The use of new technology can involve innovative ways of collecting and using
data, which can result in a high risk to the rights and freedoms of individuals. For
example, certain Internet-of-Things (IoT) applications can have a significant impact
on the daily lives and privacy of individuals, which is why a data protection impact
assessment is required.
• Facial recognition, IoT (internet of things), AI (artificial intelligence, machine
learning and deep learning), autonomous vehicles.
35
9. Preventing data subjects from exercising a right
• For example: Banks that evaluate their customers in light of a reference database
relating to lending in order to decide whether to give them a loan.
• Often linked to automated decision-making and profiling.
36
37
3. DPIA in practice
38
My templates
1. Privacy assessment questionnaire for new processes, projects and systems
(DPIA Lite), 2.3
2. DPIA and LIA Template, 2.1
3. DPIA Register Template, 1.1
What's new (2.0 and 2.1):
• The template was simplified
• DPIA Lite was highlighted
• Legitimate interests assessment (LIA) template was added
• Evaluation of privacy principles (similar to CNIL) was added
• Risk scale was aligned with ICO’s requirements
• Annexes to the template were reviewed
39
My cases: SIEM, CCTV, NGFW,
Time Tracking System, Site
register, Check-in system,
Online web form
DPIA Lite
• Short and simple template for preliminary analysis
and identification of risk factors
• To be completed by the project/process owner,
checked by the DPO/DPM
• Useful not only for a DPIA, but also for starting
other privacy initiatives (e.g., records of processing
activities, awareness, privacy by design)
• A great topic to talk to the business unit (problem
areas will be highlighted)
• If risk factors are identified, a full assessment (DPIA)
should be carried out
• To sum up: start with this template
40
DPIA and LIA Template
41
www.patreon.com/posts/31390422
Lite
42
43
44
45
46
Can be taken from ISO 27001/27002, CNIL or other frameworks
47
Assessed by the DPO
48
ICO’s LIA Template
49
ico.org.uk/for-organisations/guide-to-data-protection/guide-to-the-general-data-protection-
regulation-gdpr/legitimate-interests/how-do-we-apply-legitimate-interests-in-practice
ICO’s Checklist
❑We have checked that legitimate interests is the most appropriate basis.
❑We understand our responsibility to protect the individual’s interests.
❑We have conducted a legitimate interests assessment (LIA) and kept a record of it, to ensure that we can justify
our decision.
❑We have identified the relevant legitimate interests.
❑We have checked that the processing is necessary and there is no less intrusive way to achieve the same result.
❑We have done a balancing test, and are confident that the individual’s interests do not override those legitimate
interests.
❑We only use individuals’ data in ways they would reasonably expect, unless we have a very good reason.
❑We are not using people’s data in ways they would find intrusive or which could cause them harm, unless we
have a very good reason.
❑If we process children’s data, we take extra care to make sure we protect their interests.
❑We have considered safeguards to reduce the impact where possible.
❑We have considered whether we can offer an opt out.
❑If our LIA identifies a significant privacy impact, we have considered whether we also need to conduct a DPIA.
❑We keep our LIA under review, and repeat it if circumstances change.
❑We include information about our legitimate interests in our privacy information.
50
51
• The most difficult section in
any methodology
• We have tried different
approaches...
• We use the simplified version
as much as possible
• Business units were not ready
for more complex models and
self-description of risk
scenarios...
• Top level risks of impact on
subjects are enough for us
(the list is taken from the ICO)
Severity and Likelihood
52
Examples
53
54
55
Annexes to the template
• Annex A. Additional links
• Annex B. Comments by ICO (UK):
• Annex C. Examples of security controls by CNIL
• Annex D. ISO 27001 and ISO 27002. Information security controls, 2022
• Annex E. Potential Risks to Data Subjects by DPC
• Annex F. Side effects of processing by AEPD
• Annex G. Examples of risk mitigation measures by DPC and ICO
56
How to improve (complicate) the template?
• Use more specific risk scenarios
• Use more specificity on likelihood and harm assessment (taking into account the
experience of incidents)
• Use information security risk management methodologies (ISO 27005, EBIOS,
IRAM2, NIST RM, ISACA RM, OCTAVE, ENISA - www.enisa.europa.eu/risk-level-
tool )
• Align with the Enterprise Risk Management (risk owners, KRI, risk response
strategies (mitigation, transfer, avoidance, acceptance), review and approval)
регулярный пересмотр и пр.)
• Try CNIL and AEPD templates
57
DPIA Register
58
www.patreon.com/posts/47866831
DPIA awareness checklist by ICO
59
❑ We provide training so that our staff understand the need to consider a DPIA at
the early stages of any plan involving personal data.
❑ Our existing policies, processes and procedures include references to DPIA
requirements.
❑ We understand the types of processing that require a DPIA, and use the
screening checklist to identify the need for a DPIA, where necessary.
❑ We have created and documented a DPIA process.
❑ We provide training for relevant staff on how to carry out a DPIA.
Thanks!
• Linkedin.com/in/andreyprozorov
• Patreon.com/AndreyProzorov
• Prozorov.info@gmail.com
60

More Related Content

What's hot

ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to KnowISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
PECB
 
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
Reporting about Overview Summery  of ISO-27000 Se.(ISMS)Reporting about Overview Summery  of ISO-27000 Se.(ISMS)
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
AHM Pervej Kabir
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB
 

What's hot (20)

DPIA
DPIADPIA
DPIA
 
ISO 27001 In The Age Of Privacy
ISO 27001 In The Age Of PrivacyISO 27001 In The Age Of Privacy
ISO 27001 In The Age Of Privacy
 
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to KnowISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
 
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdfISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
 
ISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptx
 
ISO/IEC 27701 vs GDPR: What you need to know
ISO/IEC 27701 vs GDPR: What you need to knowISO/IEC 27701 vs GDPR: What you need to know
ISO/IEC 27701 vs GDPR: What you need to know
 
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
Reporting about Overview Summery  of ISO-27000 Se.(ISMS)Reporting about Overview Summery  of ISO-27000 Se.(ISMS)
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
 
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
 
ISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdfISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdf
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
 
ISO 27001:2022 Introduction
ISO 27001:2022 IntroductionISO 27001:2022 Introduction
ISO 27001:2022 Introduction
 
GDPR: Data Breach Notification and Communications
GDPR: Data Breach Notification and CommunicationsGDPR: Data Breach Notification and Communications
GDPR: Data Breach Notification and Communications
 
How can the ISO 27701 help to design, implement, operate and improve a privac...
How can the ISO 27701 help to design, implement, operate and improve a privac...How can the ISO 27701 help to design, implement, operate and improve a privac...
How can the ISO 27701 help to design, implement, operate and improve a privac...
 
What is iso 27001 isms
What is iso 27001 ismsWhat is iso 27001 isms
What is iso 27001 isms
 
NQA ISO 27701 Implementation Guide
NQA ISO 27701 Implementation GuideNQA ISO 27701 Implementation Guide
NQA ISO 27701 Implementation Guide
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
 
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
ISMS Part I
ISMS Part IISMS Part I
ISMS Part I
 

Similar to All about a DPIA by Andrey Prozorov 2.0, 220518.pdf

GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
PECB
 
How to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected DataHow to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected Data
Neo4j
 

Similar to All about a DPIA by Andrey Prozorov 2.0, 220518.pdf (20)

Assessing Risk: How Organizations Can Proactively Manage Privacy Risk
Assessing Risk: How Organizations Can Proactively Manage Privacy RiskAssessing Risk: How Organizations Can Proactively Manage Privacy Risk
Assessing Risk: How Organizations Can Proactively Manage Privacy Risk
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to compliance
 
Toreon adding privacy by design in secure application development oss18 v20...
Toreon adding privacy by design in secure application development   oss18 v20...Toreon adding privacy by design in secure application development   oss18 v20...
Toreon adding privacy by design in secure application development oss18 v20...
 
GDPR: The Application Security Twist
GDPR: The Application Security TwistGDPR: The Application Security Twist
GDPR: The Application Security Twist
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offer
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar Slides
 
TrustArc Webinar: DPIA Compliance
TrustArc Webinar: DPIA ComplianceTrustArc Webinar: DPIA Compliance
TrustArc Webinar: DPIA Compliance
 
How to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected DataHow to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected Data
 
What is a data protection impact assessment? what are the essential stages to...
What is a data protection impact assessment? what are the essential stages to...What is a data protection impact assessment? what are the essential stages to...
What is a data protection impact assessment? what are the essential stages to...
 
CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc SolutionsCCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
 
What is a data protection impact assessment?
What is a data protection impact assessment?What is a data protection impact assessment?
What is a data protection impact assessment?
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event
 
Presentation: Data Integrity – an international regulatory perspective
Presentation: Data Integrity – an international regulatory perspectivePresentation: Data Integrity – an international regulatory perspective
Presentation: Data Integrity – an international regulatory perspective
 
Analytics in Action - Data Protection
Analytics in Action - Data ProtectionAnalytics in Action - Data Protection
Analytics in Action - Data Protection
 
Mdds sundararaman 12th meeting
Mdds  sundararaman 12th meetingMdds  sundararaman 12th meeting
Mdds sundararaman 12th meeting
 
What is CT- DPO.pdf
What is CT- DPO.pdfWhat is CT- DPO.pdf
What is CT- DPO.pdf
 
Setting the right GDPR priorities
Setting the right GDPR prioritiesSetting the right GDPR priorities
Setting the right GDPR priorities
 
Business intelligence and big data
Business intelligence and big dataBusiness intelligence and big data
Business intelligence and big data
 

More from Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001

More from Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001 (20)

NIST Cybersecurity Framework (CSF) 2.0: What has changed?
NIST Cybersecurity Framework (CSF) 2.0: What has changed?NIST Cybersecurity Framework (CSF) 2.0: What has changed?
NIST Cybersecurity Framework (CSF) 2.0: What has changed?
 
pr ISMS Documented Information (lite).pdf
pr ISMS Documented Information (lite).pdfpr ISMS Documented Information (lite).pdf
pr ISMS Documented Information (lite).pdf
 
ISO Survey 2022: ISO 27001 certificates (ISMS)
ISO Survey 2022: ISO 27001 certificates (ISMS)ISO Survey 2022: ISO 27001 certificates (ISMS)
ISO Survey 2022: ISO 27001 certificates (ISMS)
 
12 Best Privacy Frameworks
12 Best Privacy Frameworks12 Best Privacy Frameworks
12 Best Privacy Frameworks
 
Cybersecurity Frameworks for DMZCON23 230905.pdf
Cybersecurity Frameworks for DMZCON23 230905.pdfCybersecurity Frameworks for DMZCON23 230905.pdf
Cybersecurity Frameworks for DMZCON23 230905.pdf
 
My 15 Years of Experience in Using Mind Maps for Business and Personal Purposes
My 15 Years of Experience in Using Mind Maps for Business and Personal PurposesMy 15 Years of Experience in Using Mind Maps for Business and Personal Purposes
My 15 Years of Experience in Using Mind Maps for Business and Personal Purposes
 
From NIST CSF 1.1 to 2.0.pdf
From NIST CSF 1.1 to 2.0.pdfFrom NIST CSF 1.1 to 2.0.pdf
From NIST CSF 1.1 to 2.0.pdf
 
ISO 27001 How to use the ISMS Implementation Toolkit.pdf
ISO 27001 How to use the ISMS Implementation Toolkit.pdfISO 27001 How to use the ISMS Implementation Toolkit.pdf
ISO 27001 How to use the ISMS Implementation Toolkit.pdf
 
ISO 27001 How to accelerate the implementation.pdf
ISO 27001 How to accelerate the implementation.pdfISO 27001 How to accelerate the implementation.pdf
ISO 27001 How to accelerate the implementation.pdf
 
How to use ChatGPT for an ISMS implementation.pdf
How to use ChatGPT for an ISMS implementation.pdfHow to use ChatGPT for an ISMS implementation.pdf
How to use ChatGPT for an ISMS implementation.pdf
 
pr Privacy Principles 230405 small.pdf
pr Privacy Principles 230405 small.pdfpr Privacy Principles 230405 small.pdf
pr Privacy Principles 230405 small.pdf
 
ISO 27005:2022 Overview 221028.pdf
ISO 27005:2022 Overview 221028.pdfISO 27005:2022 Overview 221028.pdf
ISO 27005:2022 Overview 221028.pdf
 
ISO 27001:2022 What has changed.pdf
ISO 27001:2022 What has changed.pdfISO 27001:2022 What has changed.pdf
ISO 27001:2022 What has changed.pdf
 
ISO Survey 2021: ISO 27001.pdf
ISO Survey 2021: ISO 27001.pdfISO Survey 2021: ISO 27001.pdf
ISO Survey 2021: ISO 27001.pdf
 
Supply management 1.1.pdf
Supply management 1.1.pdfSupply management 1.1.pdf
Supply management 1.1.pdf
 
Employee Monitoring and Privacy.pdf
Employee Monitoring and Privacy.pdfEmployee Monitoring and Privacy.pdf
Employee Monitoring and Privacy.pdf
 
GDPR and Personal Data Transfers 1.1.pdf
GDPR and Personal Data Transfers 1.1.pdfGDPR and Personal Data Transfers 1.1.pdf
GDPR and Personal Data Transfers 1.1.pdf
 
GDPR EU Institutions and bodies.pdf
GDPR EU Institutions and bodies.pdfGDPR EU Institutions and bodies.pdf
GDPR EU Institutions and bodies.pdf
 
Data protection RU vs EU
Data protection RU vs EUData protection RU vs EU
Data protection RU vs EU
 
IS Awareness in practice, isaca moscow 2019 10
IS Awareness in practice, isaca moscow 2019 10IS Awareness in practice, isaca moscow 2019 10
IS Awareness in practice, isaca moscow 2019 10
 

Recently uploaded

Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
MollyBrown86
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptx
ca2or2tx
 
Contract law. Indemnity
Contract law.                     IndemnityContract law.                     Indemnity
Contract law. Indemnity
mahikaanand16
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
Airst S
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
ShashankKumar441258
 
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
bd2c5966a56d
 
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
A AA
 

Recently uploaded (20)

IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
 
Clarifying Land Donation Issues Memo for
Clarifying Land Donation Issues Memo forClarifying Land Donation Issues Memo for
Clarifying Land Donation Issues Memo for
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
 
ARTICLE 370 PDF about the indian constitution.
ARTICLE 370 PDF about the  indian constitution.ARTICLE 370 PDF about the  indian constitution.
ARTICLE 370 PDF about the indian constitution.
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdf
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptx
 
Contract law. Indemnity
Contract law.                     IndemnityContract law.                     Indemnity
Contract law. Indemnity
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptx
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdf
 
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
 
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
 
Police Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. SteeringPolice Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. Steering
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 

All about a DPIA by Andrey Prozorov 2.0, 220518.pdf

  • 1. All about a Data Protection Impact Assessment (DPIA) Andrey Prozorov, CISM, CIPP/E, CDPSE, LA 27001 www.patreon.com/AndreyProzorov 2.0, 18.05.2022
  • 2. About me • Linkedin.com/in/andreyprozorov • Patreon.com/AndreyProzorov Cybersecurity and Data Protection Expert CISM, CIPP/E, CDPSE, LA 27001
  • 3. Agenda 3 1. General Information 2. Risk factors 3. DPIA in practice • GDPR • What is a DPIA? • Why is a DPIA needed? • What are the benefits of conducting a DPIA? • Who get involved? • When is it mandatory? • What should a DPIA include? • Other comments • Guidelines and templates • DPIA Process (models) • Life Cycle by PDPC • Main issues • Whitelists and Blacklists • High risk factors • Other potential high risk factors 1. Evaluation or scoring 2. Automated decision making 3. Systematic monitoring 4. Sensitive data 5. Large scale 6. Combined data sets 7. Vulnerable data subjects 8. New technology 9. Preventing data subjects from exercising a right • My templates • DPIA Lite • DPIA and LIA Template • ICO’s LIA Template and Checklist • How to improve (complicate) the template? • DPIA Register • DPIA awareness checklist by ICO
  • 5. GDPR: DPIA 5 Article 35 Data protection impact assessment Article 36 Prior consultation • Cases where a DPIA is required • Seek the advice of the DPO • Whitelists and Blacklists by SAs • DPIA content • Seek the views of data subjects or their representatives • The controller shall consult the SA prior to processing where a DPIA indicates that the processing would result in a high risk in the absence of measures taken by the controller to mitigate the risk. • Written advice to the controller and timescales • Information to the SA
  • 6. What is a DPIA? • A Data Protection Impact Assessment (DPIA) is a prior written assessment of the impact of the planned processing operations on the protection of personal data. • DPIAs provide a structured way of thinking about the risks posed to the people whose data you process. • DPIAs also help you to comply with the requirement of data protection by design. 6
  • 7. • To understand and mitigate risks to people’s rights • To comply with a legal obligation 7 Why is a DPIA needed?
  • 8. What are the benefits of conducting a DPIA? • Ensuring and demonstrating that your organisation complies with the GDPR and avoids sanctions. • Inspiring confidence in the public by improving communications about data protection issues. • Ensuring your users are not at risk of their data protection rights being violated. • Enabling your organisation to incorporate “data protection by design” into new projects. • Reducing operation costs by optimising information flows within a project and eliminating unnecessary data collection and processing. • Reducing data protection related risks to your organisation. • Reducing the cost and disruption of data protection safeguards by integrating them into project design at an early stage. 8 By DPC Ireland
  • 9. • Start preparing it when designing a new processing operation. • Then review and update it regularly. 9 When to do a DPIA?
  • 10. • Top management (accountable) • Business owner • DPO • IT department • Processors • Privacy Committee • CISO / IS Team • Risk and Compliance • Legal • Representatives of the subjects 10 Who get involved?
  • 11. A DPIA is mandatory for data processing operations presenting high risks to data subjects such as when two of the following criteria apply: 1. Systematic evaluation/profiling 2. Automated decision making 3. Systematic monitoring 4. Sensitive data processing 5. Large scale processing 6. Match/combine datasets with different purposes 7. Vulnerable data subjects 8. New technologies 9. Preventing people from exercising their rights or entering into a service/contract 11 When is it mandatory?
  • 12. • Description of the planned processing and its purposes • Necessity and proportionality assessment • Risk assessment to data subjects • Measures to address the risks 12 What should a DPIA include?
  • 13. Other comments • Controller is accountable for the DPIA • The controller shall seek the advice of the DPO, where designated, when carrying out a DPIA • DPIA is required for the accountability • DPIA is an important part of the Data Protection by Design • DPIA focusses on new processes and projects, but ongoing processes should also be assessed • There is no requirement to publish DPIA reports, but some provide brief versions • Be aware of the purpose of the process and try to avoid unnecessary complication • It is convenient to combine a DPIA with a LIA (legitimate interests assessment) 13
  • 15. Guidelines and templates Supervisory Authorities • WP 29 / EDPB: https://ec.europa.eu/newsroom/article29/items/611236/en • ICO (UK): https://ico.org.uk/for-organisations/guide-to-data-protection/guide-to-the-general-data- protection-regulation-gdpr/data-protection-impact-assessments-dpias and https://ico.org.uk/for- organisations/guide-to-data-protection/guide-to-the-general-data-protection-regulation-gdpr/legitimate- interests/how-do-we-apply-legitimate-interests-in-practice • DPC (Ireland): https://www.dataprotection.ie/en/dpc-guidance/guide-data-protection-impact- assessments • CNIL (France): https://www.cnil.fr/en/privacy-impact-assessment-pia • AEPD (Spain): https://www.aepd.es/en/guias-y-herramientas/herramientas/evalua-riesgo-rgpd • DPO (Finland): https://tietosuoja.fi/en/impact-assessments Other • ISO/IEC 29134:2017 Guidelines for privacy impact assessment • Brussels Laboratory for Data Protection & Privacy Impact Assessments (d.pia.lab) http://www.dpialab.org • PDPC (Singapore) - https://www.pdpc.gov.sg/help-and-resources/2017/11/guide-to-data-protection- impact-assessments 15
  • 16. 16
  • 17. 17
  • 18. 18
  • 19. 19
  • 21. Life Cycle by PDPC 21
  • 22. Main issues • Too many requirements and guidelines… • Different methodologies, no “silver bullet” • DPIA vs PIA (EU vs US/Other) • No real examples • Security Risks (business risks) vs DPIA (risks to subjects) • Lawyers are usually bad at risk management. Business units, too… • Consultants offers more sophisticated models (e.g., CNIL) • Balance the complexity (detail) and value (adequacy) of the assessment • Assessment should NOT be done by the DPO, he is advising 22
  • 24. Whitelists and Blacklists • Data protection authorities of many EU member states have published draft lists of data processing activities that would trigger the need for a data protection impact assessment in that country. • IAPP list - https://iapp.org/resources/article/eu-member-state-dpia- whitelists-and-blacklists • EDPB’s opinion - https://edpb.europa.eu/our-work-tools/consistency- findings/opinions_en • These lists are the basis for recommendations by SAs. 24
  • 26. High risk factors GDPR Art. 35. Data protection impact assessment 1. Where a type of processing in particular using new technologies, and taking into account the nature, scope, context and purposes of the processing, is likely to result in a high risk to the rights and freedoms of natural persons, the controller shall, prior to the processing, carry out an assessment of the impact of the envisaged processing operations on the protection of personal data. A single assessment may address a set of similar processing operations that present similar high risks. 3. A data protection impact assessment referred to in paragraph 1 shall in particular be required in the case of: (a) a systematic and extensive evaluation of personal aspects relating to natural persons which is based on automated processing, including profiling, and on which decisions are based that produce legal effects concerning the natural person or similarly significantly affect the natural person; (b) processing on a large scale of special categories of data referred to in Article 9(1), or of personal data relating to criminal convictions and offences referred to in Article 10; or (c) a systematic monitoring of a publicly accessible area on a large scale. 26
  • 27. Other potential high risk factors 27 Criteria 1. Evaluation or scoring 2. Automated decision making 3. Systematic monitoring 4. Sensitive data 5. Large scale 6. Combined data sets 7. Vulnerable data subjects 8. New technology 9. Preventing data subjects from exercising a right 10. International Transfer (optional) If 2 are matched, a full assessment should be carried out
  • 28. 1. Evaluation or scoring Evaluation or rating of data subjects’ performance at work, economic situation, health, personal preferences, interests, reliability, behaviour, location or movements (including profiling and predicting). For example: • Financial institutions that evaluate their customers in light of a reference database relating to lending, a database relating to the prevention of money laundering and terrorist financing or a database concerning fraud. • Biotechnology companies that advertise genetic testing directly to consumers in order to evaluate and predict the likelihood of diseases or health risks. • Businesses that compile behavioural or marketing-related profiles that are based on the use of their website or activities on their website. 28
  • 29. 2. Automated decision making • Automated decision-making where the decisions produce legal effects or other significant effects. • Often goes together with profiling. • Impact on subjects is important. 29
  • 30. 3. Systematic monitoring Personal data are sometimes collected in circumstances where the data subjects do not necessarily know who is collecting their data and how the data will be used. Moreover, it can be impossible for individuals to prevent finding themselves in this kind of a situation in public spaces or publicly accessible areas. Monitoring can refer to, for example, access control, CCTV monitoring or similar measures. For example: • Processing of data for the purpose of observing, tracking or monitoring data subjects and the collection of data via networks. • Systematic monitoring of a publicly accessible area on a large scale. 30
  • 31. 4. Sensitive data • Processing of personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership, and the processing of genetic data, biometric data for the purpose of uniquely identifying a natural person, data concerning health or data concerning a natural person's sex life or sexual orientation. • Processing of personal data relating to criminal convictions and offences. 31
  • 32. 5. Large scale Assessments of scale should ideally take into account the following: • the number of data subjects concerned, either as an exact number or a percentage of a group, such as the population of a town or country • the volume of the data to be processed and/or the number of individual units of data • the duration or permanence of the data processing operation • the geographical scope of the processing operation. Personal advisers (e.g., doctors) do NOT process data on a large scale. 32
  • 33. 6. Combined data sets Coordinating or combining of data sets in a manner that is unforeseen and unexpected from the perspective of data subjects. For example: • A controller combines data sets originating from two or more data processing operations carried out for different purposes or by different controllers. • Customer registers or two businesses are combined in connection with a merger. It can be difficult for data subjects to, for example, prevent the processing of their data or exercise their other rights if they are vulnerable in respect of the controller. 33
  • 34. 7. Vulnerable data subjects Vulnerable individuals include, among others, • children • employees • patients • elderly people • asylum seekers. The reason is an imbalance of power between the data subject and the controller. 34
  • 35. 8. New technology • The use of new technology can involve innovative ways of collecting and using data, which can result in a high risk to the rights and freedoms of individuals. For example, certain Internet-of-Things (IoT) applications can have a significant impact on the daily lives and privacy of individuals, which is why a data protection impact assessment is required. • Facial recognition, IoT (internet of things), AI (artificial intelligence, machine learning and deep learning), autonomous vehicles. 35
  • 36. 9. Preventing data subjects from exercising a right • For example: Banks that evaluate their customers in light of a reference database relating to lending in order to decide whether to give them a loan. • Often linked to automated decision-making and profiling. 36
  • 37. 37
  • 38. 3. DPIA in practice 38
  • 39. My templates 1. Privacy assessment questionnaire for new processes, projects and systems (DPIA Lite), 2.3 2. DPIA and LIA Template, 2.1 3. DPIA Register Template, 1.1 What's new (2.0 and 2.1): • The template was simplified • DPIA Lite was highlighted • Legitimate interests assessment (LIA) template was added • Evaluation of privacy principles (similar to CNIL) was added • Risk scale was aligned with ICO’s requirements • Annexes to the template were reviewed 39 My cases: SIEM, CCTV, NGFW, Time Tracking System, Site register, Check-in system, Online web form
  • 40. DPIA Lite • Short and simple template for preliminary analysis and identification of risk factors • To be completed by the project/process owner, checked by the DPO/DPM • Useful not only for a DPIA, but also for starting other privacy initiatives (e.g., records of processing activities, awareness, privacy by design) • A great topic to talk to the business unit (problem areas will be highlighted) • If risk factors are identified, a full assessment (DPIA) should be carried out • To sum up: start with this template 40
  • 41. DPIA and LIA Template 41 www.patreon.com/posts/31390422 Lite
  • 42. 42
  • 43. 43
  • 44. 44
  • 45. 45
  • 46. 46 Can be taken from ISO 27001/27002, CNIL or other frameworks
  • 48. 48
  • 50. ICO’s Checklist ❑We have checked that legitimate interests is the most appropriate basis. ❑We understand our responsibility to protect the individual’s interests. ❑We have conducted a legitimate interests assessment (LIA) and kept a record of it, to ensure that we can justify our decision. ❑We have identified the relevant legitimate interests. ❑We have checked that the processing is necessary and there is no less intrusive way to achieve the same result. ❑We have done a balancing test, and are confident that the individual’s interests do not override those legitimate interests. ❑We only use individuals’ data in ways they would reasonably expect, unless we have a very good reason. ❑We are not using people’s data in ways they would find intrusive or which could cause them harm, unless we have a very good reason. ❑If we process children’s data, we take extra care to make sure we protect their interests. ❑We have considered safeguards to reduce the impact where possible. ❑We have considered whether we can offer an opt out. ❑If our LIA identifies a significant privacy impact, we have considered whether we also need to conduct a DPIA. ❑We keep our LIA under review, and repeat it if circumstances change. ❑We include information about our legitimate interests in our privacy information. 50
  • 51. 51 • The most difficult section in any methodology • We have tried different approaches... • We use the simplified version as much as possible • Business units were not ready for more complex models and self-description of risk scenarios... • Top level risks of impact on subjects are enough for us (the list is taken from the ICO)
  • 54. 54
  • 55. 55
  • 56. Annexes to the template • Annex A. Additional links • Annex B. Comments by ICO (UK): • Annex C. Examples of security controls by CNIL • Annex D. ISO 27001 and ISO 27002. Information security controls, 2022 • Annex E. Potential Risks to Data Subjects by DPC • Annex F. Side effects of processing by AEPD • Annex G. Examples of risk mitigation measures by DPC and ICO 56
  • 57. How to improve (complicate) the template? • Use more specific risk scenarios • Use more specificity on likelihood and harm assessment (taking into account the experience of incidents) • Use information security risk management methodologies (ISO 27005, EBIOS, IRAM2, NIST RM, ISACA RM, OCTAVE, ENISA - www.enisa.europa.eu/risk-level- tool ) • Align with the Enterprise Risk Management (risk owners, KRI, risk response strategies (mitigation, transfer, avoidance, acceptance), review and approval) регулярный пересмотр и пр.) • Try CNIL and AEPD templates 57
  • 59. DPIA awareness checklist by ICO 59 ❑ We provide training so that our staff understand the need to consider a DPIA at the early stages of any plan involving personal data. ❑ Our existing policies, processes and procedures include references to DPIA requirements. ❑ We understand the types of processing that require a DPIA, and use the screening checklist to identify the need for a DPIA, where necessary. ❑ We have created and documented a DPIA process. ❑ We provide training for relevant staff on how to carry out a DPIA.