Conduct of Privacy Impact Assessment
Conduct of Privacy Impact Assessment
Conduct of Privacy Impact Assessment
P.I.A.
-
August 18, 2017
CHED National Capital Region
CP Garcia Ave., UP Campus, Diliman, Quezon City
The forms indicated that the participants must enter their name, age,
address, name of child, proof of billing/ residence, government-issued
identification details and photo.
The sheets will be kept in a folder in the office of the Barangay Health
Officer. Around one hundred families plan to avail of the free
vaccination.
STAGE 1 Initial Screening Questions
factor that will have to be further analyzed to ensure those risks are identified, assessed
and fully mitigated.
Q Category Screening Yes/No
question
1.1 Identity Will the project involve the collection of new information
about individuals?
1.2 Identity Will the project compel individuals to provide information
about themselves? If you have
1.3 Multiple Will information about individuals be disclosed to answered
organizations organizations or people who have not previously had
routine access to the information?
1.4 Data Are you using information about individuals for a purpose it
is not currently used for, or in a way it is not currently used?
the questions
please proceed
1.5 Data Does the project involve using new technology which
might be perceived as being privacy intruding for and complete
example biometrics or facial recognition?
1.6 Data Will the project result in you making decisions or taking
stage 2. If
action against individuals in ways which could have a
significant impact on them?
1.7 Data Is the information about individuals of a kind particularly to stage 3 and
likely to raise privacy concerns or expectations? For
example health records, criminal records, or other sign off.
information that people are likely to consider as private?
1.8 Data Will the project require you to contact individuals in ways
which they may find intrusive?
PROCESS OWNER: As the owner of this process, I have called this meeting today to conduct
a privacy impact assessment. To get all of us on the same page, let us review the following:
1. What data is being collected by this
process (list all, including personal as Name of resident, age, address, proof of residence
well as non-personal)
2. Which data (if any) is considered Government-issued identification details and photo
sensitive personal information
(underline these)
Full name of child.
3. Who are we collecting this data
from
Residents who want to avail of free vaccination for
4. How are we collecting this data their children. Using DOH Form
5. Why is this data being collected
6. Will we use this data to make any
To provide vaccination benefit
decisions that have a legal effect on If not a valid resident, benefit will not be provided
the data subject
11. What things might happen if this data is used 1: slight inconvenience
for other purposes
12. How might this happen (describe scenario/s)
2: stressful inconvenience
3: major difficulties
1-2 telemarketers may use this
13. How much damage would this cause me (on a 4: extreme consequences information
scale of 1 to 4)
MAYOR/CEO/HoA: Allow me to recap the discussion so far:
The personal data is used to make decisions with legal effect about the data subject. T F D
The personal data that we process is scattered over several geographical sites. T F D Scoring
The personal data will be accessed by users outside of our organization. T F D 5 points for every T
5 points for every D
The personal data will be accessed by users from other parts of the world. T F D
The personal data will be accessed by programs not developed by us. T F D
The personal data must be accessible 24 hours a day, 7 days a week. T F D Technical Risk
The data and the system can be located in the premises of a service provider. T F D 0 to 35: LOW
40 to 70: MEDIUM
There is a sub-second response time requirement for access to our data. T F D Above 70: HIGH
The number of people who will have access to the personal data is more than 50. T F D
The number of people who will have access to the personal data is more than 250. T F D
There is a high risk of natural calamity in our area. T F D
The data we hold is considered an attractive target for hackers and identity thieves. T F D
The data and the system must be kept on-premise and cannot be moved to the cloud. T F D
TOTAL
DPO: As your DPO, I would like to support this process.
However, allow me to ask the following questions:
Cost/Effort
Is there a way we can increase the (H/M/L)
benefits provided? If yes, how? Give additional services M
Is there a way we can collect less data
and thus reduce the exposure level? Another method to prove L
residency
How can we reduce the privacy risks
related to someone unauthorized Locked filing cabinet L
getting this data?
How can we reduce the privacy risks
related to someone altering or Backup copy to refer to in M
changing the data?
case of doubt
How can we reduce the privacy risks
related to the data suddenly Backup copy in case M
becoming inaccessible?
original is lost
How can we reduce the privacy risks
related to re-using the data for other M
purposes? Anonymize the data
MAYOR/CEO: As Mayor/CEO, allow me to summarize the discussion:
Risk Solution (s) Result: Is the risk reduced, eliminated Describe the actions you
or accepted? could take to reduce the
risk and any future steps
which would be necessary
(e.g. new guidance)
Risk Approved Solution Solution Approved by Describe the actions you
could take to reduce the risk
and any future steps which
would be necessary (e.g.
new guidance)
Action to be taken Date for completion Responsibility for Action What solutions
need to be
implemented?
SIGN OFF SHEET
Data Protection Officer (DPO)
Name
Job Title
Signature
Date
Process Owner
Name
Job Title
Signature
Date
Summary
• This is not the OFFICIAL way to do a PIA or PbD. There are
many ways to do a PIA, such as a workshop, a workflow, a
survey, an interview. (See ISO 29134)
• This SIMULATION is meant to show the ROLES that need to be
included in a PIA, the CONCEPTS which must be considered,
and the essential ELEMENTS.
• PIAs submitted to the NPC will be reviewed for: stakeholder
involvement, thoroughness of risk analysis, and completeness
of controls framework.
• After six months, we will also review status of controls
implementation, as well as results of a breach drill for the
process.
Thank you! Any questions?
[email protected]