7.9 - Defradar - GDPR - Data Protection Impact Assessment Process - v2
7.9 - Defradar - GDPR - Data Protection Impact Assessment Process - v2
7.9 - Defradar - GDPR - Data Protection Impact Assessment Process - v2
Assessment Process
Contents
INTRODUCTION ................................................................................................................................................ 3
DEFINITIONS ....................................................................................................................................................... 3
Risk Classification....................................................................................................................................... 12
CONCLUSION ................................................................................................................................................... 18
List of Figures
FIGURE 1 – DATA PROTECTION IMPACT ASSESSMENT PROCESS DIAGRAM ............................................................... 6
List of Tables
Defradar Technologies is fully committed to protecting the personal data of its customers,
employees, suppliers and other stakeholders in accordance with the requirements of the
European Union General Data Protection Regulation 2016. We take the privacy of personal data
very seriously and have initiated a variety of methods and controls to ensure we know what
data we collect and hold and that we protect that data appropriately.
As part of this commitment, Defradar Technologies ensures that all business activities and
projects that involve the use of personal data are subject to a data protection impact
assessment. The purpose of this assessment is to ensure that our use of personal data is fully
understood, that the risks to that data are carefully examined and that all appropriate measures
are put in place to protect it throughout its lifecycle.
This document sets out our process for carrying out a data protection impact assessment and, in
conjunction with the associated forms and guidance, should be used to ensure that our
obligations and policies in this area are met.
DEFINITIONS
The following definitions of terms used within this process document are taken from the GDPR:
‘controller’ means the natural or legal person, public authority, agency or other body
which, alone or jointly with others, determines the purposes and means of
the processing of personal data; where the purposes and means of such
processing are determined by Union or Member State law, the controller or
the specific criteria for its nomination may be provided for by Union or
Member State law;
‘processor’ means a natural or legal person, public authority, agency or other body
which processes personal data on behalf of the controller;
DATA PROTECTION IMPACT ASSESSMENT PROCESS
PROCESS DIAGRAM
Define Risk
Treatment Plan
Obtain
Management
Approval for
Residual Risks
Implement Risk
Treatment Plan
Regular Review
FIGURE 1 – DATA PROTECTION IMPACT ASSESSMENT PROCESS DIAGRAM
There are a number of criteria that determine when a data protection impact assessment should
be carried out within [Organization Name]. The General Data Protection Regulation (Article 35)
specifies that an impact assessment shall be required where the proposed processing involves:
Note: Article 9(1) refers to processing of personal data revealing racial or ethnic origin, political
opinions, religious or philosophical beliefs, or trade union membership, and the processing of
genetic data, biometric data for the purpose of uniquely identifying a natural person, data
concerning health or data concerning a natural person’s sex life or sexual orientation.
In general, Defradar Technologies specifies that data protection impact assessments are
appropriate for projects where one or more of the following applies:
a) information about living individuals will be collected and processed for the first time
b) information about living individuals will be shared with people or organizations that
previously did not have access to it
c) change of use of existing personal data
d) the use of new technology that collects or uses data of a personal nature e.g. biometrics
e) existing personal data will be used to reach decisions as part of an automated process
f) it might reasonably be expected that an individual may find any aspect of the project
intrusive or the data involved private
If there is uncertainty regarding whether it is appropriate to carry out a data protection impact
assessment for a specific project, by default the project team should stay on the side of caution
and ensure that one is performed. The Data Protection Officer may be consulted for clarification
and further guidance may have been issued by the supervisory authority representing the EU
within the country or countries in which the processing will be carried out, in which case this
should be consulted also.
The overall environment in which the data protection impact assessment is carried out should
be described and the reasons for it explained. This should include a description of the internal
and external context of the project and its overall objectives.
The scope of the assessment should also be clearly defined. This may be expressed in terms of
the defined scope of the project itself and may include factors such as:
An appropriate level of detail should be gathered and documented regarding the personal data
that is relevant to the project, including:
The process of identifying risks to the personal data we collect, process and hold will consist of
the following steps.
The identification of risks to the identified personal data will be performed by a combination of
group discussion and interview with interested parties.
Identified risks will be recorded with as full a description as possible that allows the likelihood
and impact of the risk to be assessed. Each risk should also be allocated an owner.
Risk analysis within this process involves assigning a numerical value to the a) likelihood and b)
impact of a risk. These values are then multiplied to arrive at a classification level of high,
medium or low for the risk.
An estimate of the likelihood of a risk occurring must be made. This should take into account
whether it has happened before either to this organization or similar organizations in the same
industry or location and whether there exists sufficient motive, opportunity and capability for a
threat to be realized.
The likelihood of each risk should be graded on a numerical scale of 1 (low) to 5 (high). General
guidance for the meaning of each grade is given in table 1. When assessing the likelihood of a
risk, existing controls should be taken into account. This may require an assessment to be made
as to the effectiveness of existing controls.
More detailed guidance may be decided for each grade of likelihood, depending on the subject of
the risk assessment.
The rationale for allocating the grade given should be recorded to aid understanding and allow
repeatability in future assessments.
An estimate of the impact that the risk could have on the organization should be given. This
should take into account existing controls that lessen the impact, as long as these controls are
seen to be effective.
Customers
Finance
Health and Safety
Reputation
The impact of each risk should be graded on a numerical scale of 1 (low) to 5 (high). General
guidance for the meaning of each grade is given in table 2.
More detailed guidance may be defined for each grade of impact, depending on the subject of
the risk assessment.
The rationale for allocating the grade given should be recorded to aid understanding and allow
repeatability in future assessments.
Grade Description Customer Financial Health and Safety Impact on Legal impact
impact impact Reputation
Based on the assessment of the grade of likelihood and impact, a score is calculated for each risk
by multiplying the two numbers. This resulting score is then used to decide the classification of
the risk based on the matrix shown in figure 2.
HIGH – 12 or more
MEDIUM – 5 to 10 inclusive
LOW – 1 to 4 inclusive
[Note – you may decide to change the definition of high, medium and low classifications based
on your general risk appetite e.g. you may decide that only risks with a score of 16 or more will
be classified as high.]
RISK SCORE
5
HIGH
Risk 3 MEDIUM
Likelihood
LOW
1 2 3 4 5
Risk Impact
The classification of each risk will be recorded as input to the risk evaluation stage of the
process.
EVALUATE THE RISKS
The purpose of risk evaluation is to decide which risks can be accepted and which ones need to
be treated. This should take into account the risk acceptance criteria established for this specific
risk assessment (see Risk Acceptance Criteria, above).
The matrix in Figure 2 shows the classifications of risk, where green indicates that the risk is
below the acceptable threshold. The orange and red areas generally indicate that a risk does not
meet the acceptance criteria and so is a candidate for treatment.
Risks will be prioritized for treatment according to their score and classification so that very
high scoring risks are recommended to be addressed before those with lower levels of exposure
for the organization.
For those risks that are agreed to be above the threshold for acceptance by Defradar
Technologies, the options for treatment will then be explored.
The overall intention of risk treatment is to reduce the classification of a risk to an acceptable
level. This is not always possible as sometimes although the score is reduced, it remains in the
same classification e.g. reducing the score from 8 to 6 means it still remains a medium level risk.
The organization may decide to accept these risks even though they remain at a medium rating.
Such decisions should be recorded with a suitable explanation.
The following options may be applied to the treatment of the risks that have been agreed to be
unacceptable:
1. Modify the risk - apply appropriate controls to lessen the likelihood and/or impact of
the risk
Business strategy
Technical issues
The Risk Manager will ensure that all parties who have an interest or bearing on the treatment
of the risk are consulted, including the risk owner.
SELECTION OF CONTROLS
Appropriate controls will then be identified to reduce either the likelihood or impact (or both)
of each risk in order to bring it within acceptable bounds.
In accordance with Defradar Technologies’s adoption of the ISO/IEC 27001 standard, Annex A
of that document will be used as the starting point for the identification of appropriate controls
to address the risk treatment requirements identified as part of the risk assessment exercise.
The controls set out in Annex A will be supplemented by the extended and additional guidance
set out in the following codes of practice:
The last two of these provide specific application of the Annex A controls to a cloud service
provider scenario and address the area of the protection of PII more comprehensively than the
ISO/IEC 27001 standard on its own.
A description of the proposed processing operations and the personal data involved
The purposes of the processing including, where applicable the legitimate interest of the
controller of the personal data as defined by the GDPR
An assessment of the necessity and proportionality of the processing
The results of the assessment of the risks to the rights and freedoms of the data subjects
Risk owners
Control(s) to be implemented
At each stage of the data protection impact assessment process, management will be kept
informed of progress and decisions made, including formal signoff of the proposed residual
risks. Management will approve the data protection impact assessment report and will consider
to what extent the report should be made public, either in full or in summarized form.
In addition to overall management approval, the acceptance or treatment of each risk should be
signed off by the relevant risk owner.
The supervisory authority has eight weeks (extendable by a further six weeks) to provide a
judgement on the proposed processing and, if appropriate, give details of what must be done to
make the processing acceptable under the GDPR.
Once the risk treatment plan has been approved, the necessary actions should be tracked and
completed as part of the day to day control of the project. In the event that any actions are
delayed or cannot be completed, the implications of this to the protection of the personal data
involved must be assessed by management and a decision taken about what to do next. If the
untreated risk is sufficiently serious, this may have a significant impact on the viability of the
project from a compliance viewpoint and advice should be sought from the Data Protection
Officer and/or the supervisory authority in the country or countries affected.
As part of the implementation of new controls and the maintenance of existing ones, key
performance indicators will be identified which will allow the measurement of the success of
the controls in addressing the relevant risks.
These indicators will be reported on a regular basis and trend information produced so that
exception situations can be identified and dealt with as part of the management review process.
REGULAR REVIEW
In addition to a full annual review, risk assessments will be evaluated on a regular basis to
ensure that they remain current and the applied controls valid. The relevant risk assessments
will also be reviewed upon major changes to the business such as office moves, mergers and
acquisitions or introduction or new or changed IT services.
Within the process of risk assessment there are a number of key roles that play a part in
ensuring that all risks are identified, addressed and managed. These roles are shown in the RACI
table below, together with their relative responsibilities at each stage of the process.
RACI CHART
The table below clarifies the responsibilities at each step using the RACI model, i.e.:
CONCLUSION
For a cloud service provider, the regular assessment of risks to personal data and the
application of comprehensive controls is vital to the continuing confidence of its cloud service
customers and in meeting its obligations to protect personal data from all too common threats.
By following this process Defradar Technologies will go some way to ensuring that the risks that
it faces in the day to day operation of its business are effectively managed and controlled.