Template DPIA Full Word
Template DPIA Full Word
A data protection impact assessment (DPIA) will help you to identify and mitigate
potential data protection risks to an acceptable level before using or sharing
(processing) data that identifies individuals (personal data).
A DPIA will also help you meet a number of data protection legal requirements
including:
● Data protection by design - privacy and data protection issues must be
considered at the start, or in the design phase, of a new system, product or
process, then continuously while it exists.
● Accountability - your organisation is responsible for showing how it complies
with data protection laws.
● Transparency - personal data must be used and shared in a transparent way.
● Security - adequate measures need to be in place to protect data. This can
range from policies and procedures to technical security measures such as
encryption of data.
DPIAs are mandatory when there is a high risk to individuals, such as when using
the health and care data of a large number of people. However, health and care
organisations are strongly advised to complete a DPIA when using and sharing
personal data in a new or substantially changed way.
A DPIA is a live document - you must update it if there are any changes to:
● the purpose - why you are proposing to use or share personal data
● the manner - how you will use or share the data
● who is involved - the organisations using and sharing personal data
In the case of research, the sponsor is the controller. See Health Research Authority
(HRA) guidance on controllers and research. HRA guidance on DPIAs sets out that
sponsors should complete a DPIA for the broad range of health and care research
they sponsor and ensure that individual research projects are designed in
accordance with the DPIA. Individual DPIAs should only need to be completed for
individual research projects that involve activities beyond the generic research DPIA.
Where the study deviates from the established processes (for example, where it is
intended that a project uses a new technology for the processing of personal data, or
1
requires that safeguards set out in standing policies cannot be applied), the sponsor
should consider whether a study specific DPIA is appropriate to address the level of
risk, or whether updating existing DPIA(s) will be sufficient. Research sites should
not complete DPIAs or request researchers to complete individual DPIAs for each
research project, as they are not the controller.
Text in [square brackets and green highlight] is guidance only and should be
removed for the final version.
Text in yellow highlight is sample wording and should be edited according to your
local circumstances.
2
Table of contents
SECTION 7 – How long are you keeping the data and what will happen to it after
that time?...............................................................................................................16
SECTION 10 – What data protections are there and what mitigations will you put
in place?................................................................................................................ 22
3
Data protection impact assessment (DPIA)
Data protection impact assessment [add the name of the initiative,
(DPIA) title: programme, project or process]
4
SECTION 1 – Screening questions
If you think there is a low risk to individuals, you do not need to complete a
DPIA. However, if you feel there is a need to consider the risks further or
document your reasons for not completing a DPIA, set that out here, complete
questions 1a and 1b then skip to sections 10 and 11 - the other sections do
not need completing. Examples of where this may apply is where the
processing is not high risk because the project involves a small dataset and
the data is pseudonymised with the re-identification key held separately, or
only staff names and email addresses are to be used.
Note that research sponsors are expected to complete a DPIA for the overall
purpose of health and care research. Individual DPIAs for each research
project are not required, unless the project will not fall within the arrangements
set out in the generic research DPIA.]
5
Describe the way the data has been anonymised and whether it is
anonymised in the hands of those you will be sending it to. This should
include detail of whether the data has been aggregated with small
numbers suppressed. For example, if only two people in the area have
a rare condition it could be possible to identify them so this data would
need to be removed.
Where a DPIA is not required but you are documenting your decision
and the risks, skip to section 10 and 11 – the other sections do not
need completing.]
Multiple related purposes are acceptable for one DPIA, but where these are
unrelated, a separate DPIA should be completed for each one.]
[Set out the benefits of using and sharing the data. This should cover the
benefits to the individuals whose data is being used, the benefits to the
organisation(s), the wider public, or other groups if applicable.
For example, installing a new telephony system will help deliver a better
service to patients because they will be able to get through to the organisation
faster and the organisation will also have an audit trail to ensure better
management.]
4. Can you use anonymous data for your purposes? If not, explain why.
☐ Yes
☐ No
☐ Unsure [try to provide an explanation of what you think]
6
For example, we intend to use analytical tools to identify which individuals in
our local population are at high risk of diabetes so that their GP can offer them
early intervention treatments.]
[State why you need this personal data and embed a description of the
dataset if available.]
☐ Biometric information in
order to uniquely identify
7
an individual, for
example facial
recognition
☐ Information relating to an
individual’s sexual life or
sexual orientation
☐ Political opinions
☐ Religious or
philosophical beliefs
☐ Information relating to
criminal or suspected
criminal offences
7. Who are the individuals that can be identified from the data?
☐ Carers
☐ Staff
☐ Wider workforce
☐ Visitors
8
☐ Other [please state]
[This may be directly from the individuals or from a third party, such as
another health and care organisation. Note this should be a brief summary -
full details of the data flows are covered in section 4.]
[For example, combining data received from a local authority with data from
NHS organisations. If so, provide details of why this is necessary, for example
local authority data needs to be linked with data from local NHS organisations
so that we can understand admissions to care homes from different
organisations.]
☐ No
9
10. Describe the flows of data.
[You can use this table - some examples have been provided. Alternatively,
you can use a data flow map or a written description of the data flow. A simple
example of a map could be: patient - inputs blood pressure reading into app X
- reading uploaded into patient’s hospital record.]
11. Confirm that your organisation’s information asset register (IAR), record
of processing activities (ROPA) or your combined information assets
and flows register (IAFR) has been updated with the flows described
above.
☐ Yes
☐ No
☐ Unsure [add as a risk in section 10 with an action to find out]
10
overseas organisation. For countries without UK adequacy in place,
further checks on the organisation must be made before providing
them access to data to ensure the data will be handled appropriately.]
[You should consider seeking advice to help you complete this section if you are not
an IG professional.]
13. Under Article 6 of the UK General Data Protection Regulation (UK GDPR)
what is your lawful basis for processing personal data?
[The list below contains the most likely conditions applicable to health and
care services. Put an ✘ next to the one that applies. If a different lawful basis
applies for a different party, clearly indicate which lawful basis applies to
which party by adding in brackets after the selected lawful basis which party it
applies to e.g.
✘ e) We need it to perform a public task (GP practice)]
☐ (a) We have consent [this must be freely given, specific, informed and
unambiguous. It is not appropriate to rely on consent for individual care
or research, even if you have obtained consent for other reasons, but is
likely to be needed for the use of cookies on a website]
☐ (b) We have a contractual obligation [between a person and a
service, such as a service user and privately funded care home]
☐ (c) We have a legal obligation [the law requires us to do this, for
example where NHS England or the courts use their powers to require
the data. See this list for the most likely laws that apply when using and
sharing information in health and care.]
☐ (e) We need it to perform a public task [a public body, such as an
NHS organisation or Care Quality Commission (CQC) registered social
care organisation, is required to undertake particular activities. See this
list for the most likely laws that apply when using and sharing
information in health and care. This is mostly likely to be relevant for the
provision of NHS and social care services regulated by the CQC. See
HRA guidance on legal basis for processing data for research]
☐ (f) We have a legitimate interest [for example, a private care provider
making attempts to resolve an outstanding debt for one of its service
users. This cannot be relied on by public bodies in the performance of
their tasks.]
☐ Other [please state]
14. If you have indicated in question 6 that you are using special category
data, what is your lawful basis under Article 9 of the UK GDPR?
[The list below contains the most likely conditions applicable to health and
care services. Put an ✘ next to the one that applies.]
11
authority. See this list for the most likely laws that apply when using and
sharing information in health and care.]
☐ (f) We need it for legal claims, to seek legal advice or judicial acts
[the information is required to exercise, enforce or defend a legal right
or claim, for example a person bringing litigation against a health or
care organisation.]
15. What is your legal basis for using and sharing this health and care data
under the common law duty of confidentiality?
[The common law duty of confidentiality says that health and care information
about a person cannot be disclosed without that person’s consent. Implied
consent can be used when sharing relevant information with those who are
directly involved in providing care to an individual. Explicit consent is normally
required for purposes beyond individual care unless one of the other
conditions set out below applies, for example you have section 251 support.]
Implied consent [for individual care or local clinical or care audits. Skip
to question 16]
Explicit consent [a very clear and specific statement of consent. Go to
question 15a]
Section 251 support [this means you have support from the Secretary
12
of State for Health and Care or the HRA following an application to the
Confidentiality Advisory Group (CAG). CAG must be satisfied that it
isn’t possible or practical to seek consent. Go to question 15a]
Legal requirement [this includes where NHS England has directed an
organisation to share the data using its legal powers. State the legal
requirement in the further information section. Go to question 15a]
Overriding public interest [for example to prevent or detect a serious
crime or to prevent serious harm to another person. The justification to
disclose must be balanced against the public interest in maintaining
public confidence in health and care services. Routine use of this is
extremely rare in health and care, as it usually applies to individual
cases where decisions are made to share data. Go to question 15a]
Not applicable [you are not proposing to use identifiable health and
care data. Skip to question 16]
13
[You should describe the method for the collection, for example it is
collected by a team going through records and extracting relevant
information.]
19. How will you ensure that information is safe and secure?
[You need to have measures in place to ensure that the data is safe and it
won’t be used, either on purpose or accidentally, in ways that are unlawful.
The measures needed will be dependent upon, and proportionate to, the data
which is being used.]
14
Security measure Details (leave blank if not applicable)
Encryption [specify the level of encryption, such as AES
256]
Password protection
Role based access [where users only have access to the data held
controls (RBAC) digitally which is needed for their role (this
includes setting folder permissions)]
Restricted physical [where access to personal data is restricted to a
access small number of people, such as access cards
or keys to a restricted area]
Business continuity
plans
Security policies [embed these]
Other [please state]
20. How will you ensure the information will not be used for any other
purposes beyond those set out in question 2?
Specify the measures below which will be used to limit the purposes the data
is used for.
SECTION 7 – How long are you keeping the data and what will happen to
it after that time?
21. How long are you planning to use the data for?
We intend to start using the data on [add date] and will finish using the data on
[add the contract/project/programme end date or indicate if it is ongoing.]
15
22. How long do you intend to keep the data?
[The time you keep the data for may differ from the period of time you intend to
use the data, for example adult health records need to be kept for a minimum of 8
years from the time they were last used. The Records Management Code of
Practice sets out the retention period for health and care records. Appendix 2 of
the Code also includes guidance about setting a retention period for a record not
covered in the retention table of the Code.]
23. What will happen to the data at the end of this period?
[The Records Management Code of Practice provides detail about what happens
once a retention period has been reached.]
24. How will you comply with the following individual rights (where they
apply)?
[For joint controllers, indicate anything you have agreed, such as designating
one controller as a point of contact for patients and service users (data
subjects).
These rights will not always apply so you should review each one to see if it
applies. In particular, some rights do not apply when data is being used for
research purposes. The HRA has published guidance on research
exemptions.]
16
Individual right How you will comply (or state not
applicable if the right does not apply)
The right to be informed We have assessed how we should inform
The right to be informed about individuals about the use of data for [state
the collection and use of initiative/project/programme]. We consider
personal data. the communications methods below meet
this obligation because [add reasons to
justify your decision]
Posters
Letters
Emails
Texts
Not applicable
17
The right to rectification
The right to have inaccurate
personal data rectified or
completed if it is incomplete.
18
interests, but there are
exceptions. It is unlikely that an
objection would be upheld
where the data is processed for
individual care, but each request
must be considered on a case-
by-case basis. However, it is
important to note that there are
other routes in which an
individual can raise an objection
to processing.]
[The national data opt-out applies to the use of confidential patient information
for purposes beyond individual care, for planning and research. It will only
apply if your answer to question 15 is section 251 support, although there are
some exceptions in which it would not apply to programmes with section 251
support.]
26. Will any decisions be made in a purely automated way without any
human involvement (automated decision making)?
[For example, you provide people with an option to ask for a human
review of the decision. If the effect on people is not legally significant,
for example it will only have a minor impact upon them, state this here
to confirm this right is not applicable.]
19
b. Are you using any special category data as part of automated
decision making?
Yes [we are not currently aware of any examples in health and care. If
this is the case contact england.igpolicyteam@nhs.net for advice.]
No
27. Detail any stakeholder consultation that has taken place (if applicable).
28. List the organisation(s) that will decide why and how the data is being
used and shared (controllers).
[The organisation(s) listed here will be making the decisions for example:
● to collect the data in the first place
● what data is being collected
● what it is being used for
● who it is being collected from
The organisation(s) will also be likely to have a direct relationship with those
the data is being collected from, for example patients, service users or
employees.
There may be more than one organisation listed here. They may be
controllers for their own data, for example care homes would usually only be
controller for their own residents’ information even if they were all using the
same software supplier to manage their care records. In some instances,
organisations may be joint controllers. For example, this may apply where
organisations are using the data for the same purpose, where you share a
dataset with another organisation, or where you have designed a new
collection with another organisation. An example of where there may be joint
controllers in some instances is shared care records, where multiple health
and care organisations are contributing data for the same purpose.
In the case of research, the sponsor is the controller. See HRA guidance on
controllers and research]
29. List the organisation(s) that are being instructed to use or share the data
(processors).
20
[The organisation(s) listed here will be under instruction from those listed in
question 28, for example they are likely to be told:
For research, explain the sponsor’s policies and procedures for managing the
use of data by research sites]
30. List any organisations that have been subcontracted by your processor
to handle data
31. Explain the relationship between the organisations set out in questions
28, 29 and 30 and what activities they do
[Describe here how it has been agreed that the organisations (controllers,
processors and sub-processors) will work together. For example:
32. What due diligence measures and checks have been carried out on any
processors used?
[Put an ✘ next to all that apply. Where multiple processors are used, indicate
which option applies to which processor]
21
to check the latest DSPT score for any
organisation required to complete
DSPT]
Registered with the [any organisation using and sharing
Information Commissioner’s data should be registered - add the
Office (ICO) registration number]
Digital Technology [you should ask the processor for this -
Assessment Criteria (DTAC) see question 29]
assessment
Stated accreditations [for example, ISO accreditation]
SECTION 10 – What data protections are there and what mitigations will
you put in place?
33. Complete the risk assessment table. Use the risk scoring table to decide
on the risk score.
[Some examples have been added below. These should be amended and
added according to your local set up.
You must consider risks at each stage, for example when data is being
transferred, when it is stored and when it is no longer needed.
Consider whether there are any responses to questions in this DPIA that are
either inconclusive or insufficient.]
22
loss of availability of data
02 Information is stored in 8 Ensure project team have 2
unrestricted network dedicated network space
areas leading to with access restricted to
inappropriate access to team members
data
03 Data is not up to date 12 Controller A will send out 4
daily notifications of
updates
04
05
Impact (I)
Negligible Low Moderate Significant Catastrophic
(1) (2) (3) (4) (5)
Rare (1) 1 2 3 4 5
Unlikely 2 4 6 8 10
Likelihood (2)
(L) Possible 3 6 9 12 15
(3)
Likely (4) 4 8 12 16 20
Almost 5 10 15 20 25
certain
(5)
34. Detail any actions needed to mitigate any risks, who has approved the
action, who owns the action, when it is due and whether it is complete.
Risk Action needed Action Action owner Due date Status e.g.
ref approver outstanding/
no. complete
[Ensure the relevant staff review or sign off the DPIA according to your governance
structure. For example, this may be a more senior member of staff for higher risk
processing. Add additional entries for multiple reviewers / approvers.]
Reviewer sign-off
Reviewer name:
23
Reviewer job title: [For example, Senior Information Risk Owner,
Caldicott Guardian, Information Governance Lead,
Information Asset Owner, IT lead, Data Protection
Officer]
Reviewer contact details:
Date of review:
Comments:
Date for next review:
Approver sign-off
Approver name:
Approver job title:
Approver contact details:
Date of approval:
Comments:
24