ComplianceSeptember 20, 20233 min read
Conducting a Privacy Impact Assessment: A How-To Guide
Organizations face growing pressures to demonstrate proper stewardship of personal data they collect and process. An essential tool for identifying and addressing privacy risks is conducting a comprehensive privacy impact assessment (PIA). This post
Joah Park
Content Manager, Ethico
Share
Organizations face growing pressures to demonstrate proper stewardship of personal data they collect and process. An essential tool for identifying and addressing privacy risks is conducting a comprehensive privacy impact assessment (PIA). This post provides guidance on key steps to perform an effective PIA.
Catalog Personal Data and Systems
The starting point is documenting what personal information your organization handles and where it resides, including:- Types of data collected from customers, employees and other parties (names, addresses, SSNs, health details, financial information etc.)
- Systems, applications, and databases used to store and process personal data
- Any paper records containing sensitive information
Map How Data Flows Through Your Organization
Next, trace how data enters your systems, where it travels, who accesses it and how it ultimately exits the organization. Identify:- Points of data collection and sources
- Which systems and internal teams use, transmit or store data
- Any external parties like service providers or partners that access data
- How and when data gets deleted or archived
Classify Data and Define Protection Obligations
With flows mapped, classify data by sensitivity, based on the potential harm from unauthorized access or abuse. Common levels include:- Public - Minimal harm if disclosed
- Internal - Moderate proprietary or financial damage if breached
- Confidential - Severe reputational, legal, financial damage if breached
Assess Current Risks and Controls
Analyze potential threats and vulnerabilities that put data at risk given its sensitivity levels and obligations, including:- Cyber threats like malware, ransomware, insider and third party breaches
- System failures, outages or data corruption
- Improper access controls or retention policies
- Loss or theft of paper records and devices
- Encryption, access controls, firewalls, backups and other cyber defenses
- Security policies, procedures and training
- Badge access to facilities, locked storage for records, etc.
Address Gaps and Explore Alternatives
Where controls fall short, develop plans to implement missing safeguards aligned to data sensitivity and risk. Also consider data minimization options like:- Anonymizing or pseudonymizing data to remove direct identifiers
- Collecting/retaining less data or for shorter durations
- Using aggregated statistical data vs granular individual records
Document Findings in a Privacy Impact Assessment Report
Document details from the assessment in a report, including data maps, classifications, risks, current controls, gaps, and plans for new controls and minimization. Have a report formally approved by leadership to confirm commitment to acting on findings and maintain it as a living document requiring periodic updates as data, systems, regulations evolve.Final Thoughts
As threats and regulations expand, sound privacy practices are a must. Conducting PIAs provides in-depth understanding of an organization’s data landscape. Cataloging data, tracing flows, classifying sensitivity, assessing controls, and exploring minimization techniques positions organizations to identify and address privacy gaps before incidents occur. Keeping PIA findings current through updates enables adapting to shifting risks over time.Referenced Work
Conducting Privacy Impact Assessments. (2011, February 9). International Association of Privacy Professionals. https://iapp.org/resources/article/conducting-privacy-impact-assessments/ Guide to Privacy and Security of Electronic Health Information. (2015, April). Office for Civil Rights, United States Department of Health and Human Services. https://www.healthit.gov/sites/default/files/pdf/privacy/privacy-and-security-guide.pdf NIST Privacy Framework: A Tool for Improving Privacy Through Enterprise Risk Management, Version 1.0. (2020, January 16). National Institute of Standards and Technology. https://www.nist.gov/privacy-framework Privacy Impact Assessment (PIA). (2006, March). Center for Democracy and Technology. https://cdt.org/wp-content/uploads/2018/02/privacy-impact-assessment-final.pdfEnjoyed this article?
Subscribe to our newsletter for more insights on ethics and compliance.
View All Articles