DATA PROTECTION IMPACT ASSESSMENT

DATA PROTECTION IMPACT ASSESSMENT

A data protection impact assessment DPIA is required any time that you make significant changes to process or systems, or there is a high-risk to the data subject, your are doing CCTV type monitoring or holding medical or special category data

WHAT IS IT

A data protection impact assessment DPIA is required any time that you make significant changes to process or systems, or there is a high-risk to the data subject, your are doing CCTV type monitoring or holding medical or special category data

WHAT IS THE PROCESS

Involve all the stakeholder and get consensus on the issues and necessary actions
Write-up the documentation and get feedback from DPO or nominated expert
Make sure that what-ever you do is formally agreed, perhaps in writing


EXAMPLE OF WHAT YOU MIGHT WRITE TO A SUPPLIER




Dear Supplier

Data Protection Impact Assessment

Under the Data Protection Jersey Law we are required to make sure we have done a Data Protection Impact Assessment in any of the following circumstances.

Article 16 of the Data Protection Jersey Law
(5) A data protection impact assessment is, in particular, required in the case of
(a) a systematic and extensive evaluation of personal aspects relating to natural persons that is based on automated processing, and on which decisions are based that produce legal effects concerning, or similarly significantly affecting, those persons
(b) the processing of special category data on a large scale or
(c) a systematic monitoring of a publicly accessible area on a large scale.

Data Sharing Agreement

We are also required to have a Data Sharing Agreement which makes clear the roles and responsibilities of the Data Controller [organisation name] and the Data Processor (your organisation). If you use any of the data for your own purposes (ie without explicit instruction from us) then you will be regarded as a Joint-Controller with all the responsibilities that entails.

Action Required

Since your system/product constitutes [add detail here] we need you to complete the attached Data Protection Impact Assessment. If you have access to any of the data (even for testing or support) we need you to complete the attached Data Sharing Agreement.

Please complete and return to us as soon as possible because without them we cannot commit to the project, indeed it would be a breach of Data Protection Jersey Law to do so.

Yours sincerely





TEMPLATE / EXAMPLE

Name of controllerAdd appropriate information here
Subject/title of DPO Add appropriate information here
Name of controller contact /DPO
(delete as appropriate)
Add appropriate information here


STEP 1: IDENTIFY THE NEED FOR A DPIA


Explain broadly what project aims to achieve and what type of processing it involves. You may find it helpful to refer or link to other documents, such as a project proposal. Summarise why you identified the need for a DPIA.
Add appropriate information here


STEP 2: DESCRIBE THE PROCESSING


Describe the nature of the processing: how will you collect, use, store and delete data? What is the source of the data? Will you be sharing data with anyone? You might find it useful to refer to a flow diagram or other way of describing data flows. What types of processing identified as likely high risk are involved?
Add appropriate information here
Describe the scope of the processing: what is the nature of the data, and does it include special category or criminal offence data? How much data will you be collecting and using? How often? How long will you keep it? How many individuals are affected? What geographical area does it cover?Add appropriate information here
Describe the context of the processing: what is the nature of your relationship with the individuals? How much control will they have? Would they expect you to use their data in this way? Do they include children or other vulnerable groups? Are there prior concerns over this type of processing or security flaws? Is it novel in any way? What is the current state of technology in this area? Are there any current issues of public concern that you should factor in? Are you signed up to any approved code of conduct or certification scheme (once any have been approved)?Add appropriate information here
Describe the purposes of the processing: what do you want to achieve? What is the intended effect on individuals? What are the benefits of the processing for you, and more broadly? Add appropriate information here


STEP 3: CONSULTATION PROCESS


Consider how to consult with relevant stakeholders: describe when and how you will seek individuals views or justify why its not appropriate to do so. Who else do you need to involve within your organisation? Do you need to ask your processors to assist? Do you plan to consult information security experts, or any other experts?
Add appropriate information here


STEP 4: ASSESS NECESSITY AND PROPORTIONALITY


Describe compliance and proportionality measures, in particular: what is your lawful basis for processing? Does the processing actually achieve your purpose? Is there another way to achieve the same outcome? How will you prevent function creep? How will you ensure data quality and data minimisation? What information will you give individuals? How will you help to support their rights? What measures do you take to ensure processors comply? How do you safeguard any international transfers?
Add appropriate information here


STEP 5: IDENTIFY AND ASSESS RISKS

IDENTIFY AND ASSESS RISKSLikelihood of harmSeverity of harmOverall risk
Describe source of risk and nature of potential impact on individuals. Include associated compliance and corporate risks as necessary. Remote, possible or probableMinimal, significant or severeLow, medium or high
add your data herepick from abovepick from abovepick from above
add your data herepick from abovepick from abovepick from above
add your data herepick from abovepick from abovepick from above
add your data herepick from abovepick from abovepick from above
add your data herepick from abovepick from abovepick from above
add your data herepick from abovepick from abovepick from above
add your data herepick from abovepick from abovepick from above






STEP 6: IDENTIFY MEASURES TO REDUCE RISK

IDENTIFY MEASURES TO REDUCE RISK Effect on riskResidual riskMeasure approved
Identify additional measures you could take to reduce or eliminate risks identified as medium or high risk in step 5
Options to reduce or eliminate risk
Eliminated reduced acceptedLow medium highYes/no
add your data herepick from abovepick from abovepick from above
add your data herepick from abovepick from abovepick from above
add your data herepick from abovepick from abovepick from above
add your data herepick from abovepick from abovepick from above
add your data herepick from abovepick from abovepick from above
add your data herepick from abovepick from abovepick from above
add your data herepick from abovepick from abovepick from above