Data Protection Control Framework
Data Protection Control Framework
Document Ref.
Version: 1
Dated:
Document Author:
Document Owner:
Distribution
Name Title
Approval
1.1 Notice
The information lifecycle starts with informing the data subject about the usage of his personal data.
The entity provides notice about its data protection policies and procedures and identifies the
purposes for which personal information is collected, used, retained, and disclosed.
1.2 Choice
The entity describes the different choices available to the data subject with respect to the collection,
use, and disclosure of personal information by the entity.
1.3 Consent
The entity secures implicit or explicit consent of the data subject regarding the collection, use and
disclosure of the personal data.
1.4 Collect
Personal information is only collected by the entity for the purposes identified in the Notice phase.
The entity limits the use of personal information to the purposes identified in the Notice phase and
for which the data subject has provided implicit or explicit consent.
1.6 Disclose
The entity discloses personal information to third parties only for the purposes identified in the
Notice phase and with the implicit or explicit consent of the data subject.
1.7 Store
The entity stores personal information not longer than needed related to the purpose as defined in
the Notice phase or as required by laws and regulations. There is a possibility that personal data will
be re-used (secondary use) and flows back to the Use phase, only if the purposes for secondary use
are in line with those communicated in the Notice phase.
1.8 Dispose
Management sets the course (e.g., data protection strategy, data protection policy, etc.) and controls
how personally identifiable information moves through the various stages of the information lifecycle
(incl. monitoring and enforcement). To ensure that business processes are accurate, complete, and
timely, there are generally three prerequisites for personal data in the various phases of the
information lifecycle.
✓ Data quality;
✓ Data access;
✓ Data security.
Finally, the information lifecycle model also presents the various external stakeholders with regard to
the different phases in the processing of personal data.
Data Subjects
Data Protection Authorities
Governments;
Third parties (or data processors).
Management determines the direction and regulates the flow of personally identifiable information
through the many phases of the information lifecycle (e.g., data protection strategy, data protection
policy, etc). (incl. monitoring and enforcement). In the various phases of the information lifecycle,
there are often three requirements for personal data in order to ensure that business processes are
accurate, complete, and timely.
The table below summarises the Data Protection Control Framework. It contains 95 controls in total, divided over 32 subjects in 9
Lifecycle phases
The entity establishes and communicates a policy that states its objectives and responsibilities
PPO Data protection policy regarding data protection and is in line with accepted data protection principles and applicable 5
laws and regulations.
Definition of roles The entity establishes and implements clear roles and responsibilities regarding the
RRE 4
and responsibilities safeguarding of personal data and the achievement of data protection objectives.
The entity understands and documents which personal data is stored and processed and
Personal Data identifies and treats personal data appropriately.
PDI Identification and 4
classification Measures to safeguard personal data take into account the differences in sensitivity in personal
Management
data, leading to identification of risks and compliance with laws and regulations.
The entity systematically and periodically identifies, assesses, and mitigates factors that
RMA Risk management 4
endanger the achievement of data protection objectives.
Data protection The data protection-related impact of new products and services and their use within the entity
PIA 5
impact assessments is systematically identified, assessed and addressed.
Data protection The entity adequately detects and handles data protection-related incidents; data protection-
PIB incident and breach related incidents are responded to appropriately as to limit the consequences and to take 8
management measures to prevent future breaches.
Staff in positions with access to or control over personal data and personal data processes
SCO Staff competences 4
have the necessary data protection competences to adequately perform their duties.
Staff is sufficiently aware of data protection laws, regulations and organisational data
Staff awareness and
SAT protection policies and guidelines, and their individual responsibilities with regard to data 3
training
protection, and the entity engages in programs to establish and maintain awareness.
Legal review of
changes in regulatory Data protection risks associated with changes to the entity (structure and strategy) and to
LRC 1
and/or business regulatory requirements are adequately considered.
requirements
Data protection The entity transparently informs data subjects of the entity’s policy, requirements, and
Notice PST 2
statement practices regarding the collection, use, retention, disclosure and disposal of personal data.
Choice and The entity obtains data subject’s consent for processing personal data where required or
CFR Consent framework 4
Consent necessary.
Personal data is adequate, relevant, and limited to what is necessary in relation to the
Collect DMI Data minimisation 2
legitimate purposes for which it is processed.
Personal data is not disclosed, made available or otherwise used for other purposes than those
specified in the entity’s data protection statement except:
ULI Purpose limitation 2
a) with the consent of the data subject; or
Use, Store, and b) by the authority of law.
Dispose
Data protection
architecture (Data The entity takes into account solid data protection policies, principles, and/or applicable laws
PBD 3
protection by and regulations when designing or changing products, services, business systems or processes.
design and default
Personal data is retained no longer than the minimum time needed, as required by applicable
DRE Data retention 2
laws and regulations, or for the purposes for which it was collected.
Personal data is anonymised and/or disposed of within the entity where required. Identities
Disposal, destruction
DDA should not be identifiable and personal data should not be available once it is past its retention 2
and anonymisation
date.
Personal data is not used in case of the restriction of the data subject or in case of specific
URE Use and restriction legal restrictions by local government. Objections to processing by data subject will be handled 2
adequately.
Data subject access requests are responded to adequately, and data subjects are able to
DAR Data access requests 3
determine which personal data relating to her/him is processed and in what way.
Data subject correction requests are responded to adequately, and data subjects are able to
Data correction
DCR determine whether their personal data is correct/up-to-date, and are able to correct their 3
requests
personal data.
Data Access
and Data Data deletion Data deletion requests are responded to adequately and data subjects are able to have their
DDR 3
Quality requests personal data deleted if applicable criteria are met.
Data portability Data portability requests are responded to adequately and data subjects are able to have their
DPR 3
requests personal data transferred to another entity if applicable criteria are met.
Accuracy and Documented procedures for validation, editing and update of personal data assure accurate
ACD 2
completeness of data and complete personal data processing.
Third party
Personal data is not disclosed to third parties without a lawful basis or for other purposes than
TPD disclosure and 1
the data subject was informed about.
registration
Data protection considerations and requirements are adequately covered when procuring
Third party
Disclose TPA (personal data related) solutions or services from third parties resulting in appropriate 3
agreements
handling or protection of personal data.
Personal data is not transferred (i.e. movement, viewing, or printing of data in another
DTR Data transfers location) internationally to countries that have an inadequate legal data protection 2
regime.
Information security Personal data is adequately secured from accidental errors or loss, or from malicious acts such
ISP 7
program as hacking or deliberate theft, disclosure or loss.
Access rights are appropriately assigned, changed and withdrawn, thus decreasing the
Identity and access
IAM likelihood of unauthorised access to, or inappropriate handling of personal data, or data 1
management
breaches by internal employees, third parties or hackers.
Data Security Restricted access to personal data during transmission adequately prevents unauthorised
STR Secure transmission 1
disclosure, breach, altering or destruction of personal data.
Encryption and end- Encryption assures the prevention of a breach of personal data (accidental loss of personal
ENC 4
point security data, or malicious acts such as deliberate theft, disclosure or loss).
Access or access attempts to personal data by staff and third parties are logged and
LOG Logging of access 1
investigated to detect and prevent (attempts) to breach security of personal data.
Adequate oversight of the internal organisation and third parties ensures compliance with
Review of data
REV applicable data protection laws and regulatory requirements and decreases the risk of data 1
protection compliance
breaches or loss of personal data.
Monitoring and
Enforcement
Periodic monitoring Systematic and periodical assessments of data protection processes and controls assure
MON on data protection that they operate as designed, resulting in ongoing compliance with applicable laws and 3
controls regulatory requirements.
Controls Evidence/Testing
The privacy policy states the objectives of the entity regarding data
PPO03 Controller/Processor
protection.
a. For every instance of processing personal data, the entity
establishes alignment with legal data protection principles, and
documents the way in which adherence with these principles is Controller
achieved.
PPO04
b. For every instance of processing personal data, the entity makes
sure that documented instructions are in place for each
Processor
processing activity from contractual partners (controllers or
(other) processors)
Controls Evidence/Testing
Measures to safeguard personal data take into account the differences in sensitivity in personal data,
leading to identification of risks and compliance with laws and regulations.
Controls Evidence/Testing
Controls Evidence/Testing
When new or changed data protection risks are identified, the data
RMA02 protection risk assessment and the risk response strategies are Controller/Processor
reviewed and updated where needed.
Controls Evidence/Testing
All relevant stakeholders are involved in the DPIA, and specific guidelines
PIA03 of the supervisory authority regarding assessment criteria are adhered Controller
to.
The entity documents all systems and software that process personal
PIA04 Controller
data and a history of changes applied to them.
Controls Evidence/Testing
Controls Evidence/Testing
Controls Evidence/Testing
Controls Evidence/Testing
• Lawfulness of processing
Controls Evidence/Testing
Controls Evidence/Testing
The entity does not collect or process special categories of personal data,
unless it has a lawful basis to do.
If explicit consent of the data subject is the lawful basis for processing
special categories of personal data, the data subject has affirmatively
CFR03 Controller
agreed, through some action, to the use or disclosure of the special
categories of personal data. The entity obtains explicit consent directly
from the data subject and documents/retains evidence of the data
subject’s consent, for example, by requiring the individual to check a box
or sign a form.
Controls Evidence/Testing
Controls Evidence/Testing
Controls Evidence/Testing
Where the systems, services and products that process personal data
offer data protection related choices and options, the default setting
PBD03 Controller
for these choices and options will be as restrictive as possible in terms
of data protection.
Controls Evidence/Testing
The entity:
Controls Evidence/Testing
Controls Evidence/Testing
The entity has established whether local member state law imposes any
URE02 restrictions on data processing (e.g., to safeguard national or public Controller
security) and is demonstrably compliant with these restrictions.
Controls Evidence/Testing
The entity has a process in place to timely provide to the data subject, in
DAR02 a commonly used electronic form, a copy of the personal data Controller
undergoing processing.
The entity verifies the identity of the requesting data subject before
DAR03 Controller
responding.
Controls Evidence/Testing
The entity verifies the identity of the requesting data subject before
DCR02 Controller
acting on the request.
The entity notifies third parties, to whom personal data has been
DCR03 Controller
disclosed, of necessary corrections in personal data.
Controls Evidence/Testing
The entity verifies the identity of the requesting data subject before
DDR04 Controller
acting on the request.
Controls Evidence/Testing
If technically feasible, the entity will transfer the personal data directly to
DPR02 Controller
another (controlling) entity as instructed by the data subject.
The entity verifies the identity of the requesting data subject before
DPR04 Controller
acting on the request.
Controls Evidence/Testing
d. specify when and how the personal data is to be updated and the
ACD01 source for the update (for example, annual reconfirmation of Controller
information held and methods for individuals to proactively update
personal data);
Controls Evidence/Testing
• Lawfulness of processing
Controls Evidence/Testing
a. If the entity procures solutions from third parties/suppliers or
outsources processes to service providers, and processing of
personal data is (partially) contracted, the entity enters into
formal agreements that require from the third-party due care
and a level of protection of personal data equivalent to that of
Controller
the entity. In doing so, the entity limits the third party’s use of
personal data to purposes established by the entity.
TPA01
b. The entity ensures that subcontracting the processing of
personal data to another processor is only done after prior
authorisation of the controller. If the controller approves, the
entity enters into formal agreements that require from the
Processor
third-party due care and a level of protection of personal data
equivalent to that of the entity.
The entity ensures that the agreements will also address the following
obligations of the third party:
b. security requirements;
b. the third party self-certifies that its practices meet the entity’s
requirements based on internal audit reports or other
procedures;
• Security of processing
Controls Evidence/Testing
The entity has established any instances where personal data under
its responsibility is being transferred to and processed in third
DTR01 Controller/Processor
countries that possibly insufficiently guarantee the data protection
rights of data subjects.
The entity only transfers personal data to third countries, for which
a. an Adequacy Decision from the European Commission has been
issued, or
DTR02 Controller/Processor
b. a set of appropriate safeguards (e.g., binding corporate
rules or adopted standard data protection clauses) has been
implemented.
Controls Evidence/Testing
• Security of processing
Controls Evidence/Testing
• Security of processing
Controls Evidence/Testing
Controls Evidence/Testing
Procedures and systems exist for creation, transfer, storage, and disposal
ENC03 Controller/Processor
of media containing personal data used for backup and recovery.
Controls Evidence/Testing
Controls Evidence/Testing
Controls Evidence/Testing
b. trend analysis;
e. internal reviews;