Simplified DPIA
Simplified DPIA
Protection Impact
Assessment
FOR SMALL ORGANISATIONS
TABLE OF CONTENTS
Introduction.............................................................................................................. 3
• Credit scoring
STEP 01
• Profiling of customers
Description of the data
• Processing involving sensitive personal processing activities
data which is defined under the Data Pro-
tection Act to include: ‘data revealing the STEP 02
natural person’s race, health status, ethnic
Analysis of each processing
social origin, conscience, belief, genetic
activity
data, biometric data, property details,
marital status, family details including
STEP 03
names of the person’s children, parents,
spouse or spouses, sex or the sexual ori- Analysis of all the activities as a
entation of the data subject’ whole
3
A NOTE ON THE ACTORS IN A DATA PROTECTION
IMPACT ASSESSEMENT (DPIA)
4
STEP Describing Your Data Processing Activities
ONE
WHAT
Describe the data you are processing. This could include: employee
details, details of people who attend your legal aid clinic, lists of peo-
ple who attend your community workshops, details of your clientele
including their names, contact information, modes of payment et-
cetera.
WHY
List down all the reasons you require the data you are processing.
Some reasons could be: organisational management, human re-
source processes, programme management, accounting to donors.
HOW
For each data processing activity, describe the actual processing ac-
tivity e.g. how the data is collected, recorded, organised, stored, and
even used. Is the data ever shared, disseminated, altered, combined
with others, archived, or destroyed?
WHERE
For each data processing activity, list all the physical and virtual plac-
es that data is processed.
WHEN
Describe when data processing takes place. Are there any activities
that take place every month or every year or at the beginning of a
contract?
WHO
List all the people and companies involved in the data processing.
5
Table 1 shows an example of an accountability matrix:
Table 1: Responsibility matrix for a human resource management system
Business owner
Management
IT department
Finance
department
Human resources
department
Technology /
system provider
Employees
After going through the data protection impact analysis, the responsibility matrix may change.
For example, you may realise that employees need to be consulted in data processing activities
or that the IT department needs to be accountable for some data processing activities.
2 ICO, ‘Age Appropriate Design: A Code of Practice for Online Services’ <https://ico.org.uk/
for-organisations/guide-to-data-protection/key-data-protection-themes/age-appropriate-de-
sign-a-code-of-practice-for-online-services/>
6
STEP Analysing your data processing activities
TWO
There are different tests you could use to assess the impact of your data processing activities.
These include: principles analysis, the legitimate interest test, necessity and proportionality test,
privacy by design and default test, rights analysis, profiling, and risk mitigation.
7
A basic step for a DPIA is to assess your Some measures you would have to take
data processing activities against the after this analysis include:
data protection principles. The queries
in the principles test analysis include the • Redesigning data collection to in-
following: clude only relevant data for your
purpose
• Do you collect any data relating to
private or family affairs? • Explaining to clients your reasons for
collecting and processing their data
• For each data point, e.g. name, loca-
tion, date of birth, what is the specific • Creating mechanisms for your clients
reason for data collection and pro- to review whether the data you have
cessing? on them is accurate
3 For a more detailed set of questions for each principle, see Annex 1
8
2.2 Legitimate Interest Test
9
2.3 Necessity And Proportionality Test
10
2.4 Profiling Analysis
11
2.5 Privacy By Design And Default Test
12
2.6 Rights Analysis
13
Questions to guide the analysis include: • Who makes decisions related to data
requests from clients and others? Is it
• Do you collect or process sensitive data the system?
such as people’s race, health status,
ethnic social origin, conscience, belief, • What rights are affected in your data
genetic data, biometric data, property processing activities? This requires list-
details, marital status, family details in- ing of other rights and not just privacy.
cluding names of the person’s children, Examples of rights that could be affect-
parents, spouse or spouses, sex or the ed include rights of children, freedom
sexual orientation? of expression, freedom of association,
economic rights, family rights etc.
• Can sensitive information be inferred
from data that you have in your posses- Some steps to be taken after a rights analy-
sion? sis include:
14
STEP Analysis of all the activities as a whole
THREE
15
STEP Risk Determination
FOUR
Risk determination is an assessment on the • system failure, which could result in data
likelihood of a risk. Data processing comes being unavailable or exposed for longer
with reputational, financial, and rights than necessary
related risks. For example, data can be lost
or stolen, anonymised data can be re-iden- • unauthorised secondary use of data
tified, and sensitive data can be leaked, • corruption of data
leading to emotional damage.
• malicious interference by internal or
Process in risk assessment can involve: external actors
• identification of the risk • accidental human interference for ex-
• development of a risk classification ample inadvertent copying, erroneous
method deletion
Risk determination could either follow industry standards or be developed collaboratively in the
organisation.
16
Once a data processing activity is deter- Data Protection Impact
mined to be either high, medium or low risk,
the organisation needs to identify measures
STEP Assessement (DPIA)
FIVE
that will mitigate the risks. Examples of miti- Report
gation steps could include:
• Staff training to stop habits such Once a determination has been made, a DPIA
as data sharing report is prepared for consideration by man-
• Sunset clauses on data that does agement. It is important for management to
not require to be retained perpet- deliberate on the DPIA for:
ually l Overall accountability: The manage-
• User management ment needs to be aware of all data pro-
cessing activities as they have overall
• Separation of sensitive personal responsibility for data processing within
data from other data to spread the the organisation.
risk across different repositories
l Publication: Although this is not man-
l Repressive measures such as datory, some organisations publish the
• Monitoring processing operations DPIA for transparency.
to detect anomalies and breaches
l Prior consultation requirement: The
as soon as possible
Data Protection Act requires prior con-
• Procedures for revocation of com- sultation with the Data Protection Com-
promised credentials missioner, where data processing activi-
ties are determined to be high risk6 .
l Corrective measures for example:
17
STEP Monitoring and Evaluation
SIX
Data protection is not a one-off activity 7. Data practices in the organisation must be continually
assessed to inculcate a culture of privacy and data protection within the organisation and with
those the organisation interacts with.
Monitoring involves tracking data processing activities to anticipate incidences that could im-
pact on the rights of clients. Evaluation means testing how well data protection practices are
working.
Table 4: Monitoring and evaluation of the DPIA
Monitoring Evaluation
Conclusion
In summary, a DPIA is the process through which an organisation describes their processing
activities, assesses the risk those activities pose to the rights and freedoms of persons and puts
in place measures to address those risks.
While a DPIA should be carried out prior to data processing, many organisations in Kenya will
conduct the process on existing systems. We hope that this resource is useful in conducting
your DPIA as well as increasing your knowledge on Kenya’s data protection laws.
https://ec.europa.eu/newsroom/article29/item-detail.cfm?item_id=611236
18
Annex 1: Further questions for principles analysis
Fairness
• Can clients expect you to have the data you have on them, even if they did not read the
information you provided them with?
• If consent is your basis for data processing, did you give an explanation before it was
given? Was it freely given? How do you document that people gave it? How can they
revoke their consent?
• Could the data you have on your clients generate chilling effects?
• Could the data you have, lead to discrimination?
• Is it easy for your clients to exercise their rights to access, rectification, erasure etc.?
Transparency
Purpose Limitation
Data Minimisation
Accuracy
• How would inaccurate information affect your clients in your data processing?
• How do you ensure that the data you collect yourself is accurate?
19
• How do you ensure that data you obtain from third parties is accurate?
Storage Limitation
• Is there any law, e.g Data Protection Act, Insurance Act, Income Tax Act etc that defines
durations for which you must keep data?
• How long do you need to keep which data? For which purpose(s)?
• Can you distinguish storage periods for different parts of the data?
• If you cannot delete the data just yet, can you restrict access to it?
• Will your tools allow automated permanent erasure at the end of the storage period?
Security
• Do you have a procedure to perform an identification, analysis and evaluation of the in-
formation security risks potentially affecting personal data and the IT systems support-
ing their processing?
• Do you target the impact on people’s fundamental rights, freedoms and interests and
not only on the risks to the organisation?
• Do you take into consideration the nature, scope, context and purposes of processing
when assessing the risks?
• Do you manage your system vulnerabilities and threats for your data and systems?
• Do you have resources and staff with assigned roles to perform the risk assessment?
• Do you systematically review and update the security measures in relation to the context
of the processing and the risks?
20
Ole Sangale Rd, Madaraka Estate.
PO Box 59857-00200, Nairobi, Kenya.
Tel +254 (0)703 034612
Email: cipit@strathmore.edu
Website:www.cipit.strathmore.edu
© 2021 by Center of Intellectual Property and Technology Law (CIPIT). This work is licensed
under a Creative Commons Attribution – NonCommercial – ShareAlike 4.0 International
License (CC BY NC SA 4.0). This license allows you to distribute, remix, adapt, and build upon
this work for non – commercial purposes, as long as you credit CIPIT and distribute your
creations under the same license: https://creativecommons.org/licenses/by-nc-sa/4.0/