OneTrust - Mastering PIAs and DPIAs
OneTrust - Mastering PIAs and DPIAs
2024
Table of Contents
the requirements and of privacy and data protection laws. For example, Article 55 of
the China Personal Information Protection Law (PIPL), which
to the processing, carry out an assessment of the impact of common goal: an assessment conducted on a new product
the envisaged processing operations on the protection of or service to evaluate the privacy risks associated with
personal data.” the envisaged product or service and the underlying data
processing activity, to choose and apply appropriate mitigating
measures or controls to address the identified risks, where
necessary.
But there is a notable distinction between the two. Many The term DPIA, or equivalent as shown below, is typically
organizations who have an existing PIA process in place may explicitly defined and/or required under any applicable law or
be complacent and incorrectly be under the impression that regulation and will include specific elements that need to be
they already meet new DPIA obligations. This is a dangerous captured while conducting the DPIA.
misconception.
Care should be taken to ensure that the difference between Because a DPIA must be conducted where there is a
a PIA and a DPIA, or equivalent, is well understood, and the “significant”, “high”, or “heightened” risk to the rights and
latter used only when the relevant DPIA triggers are met. freedoms of individuals and the results recorded in a specific
format, many organizations choose to implement a workflow
that contains an initial “Risk Analysis” or “Threshold”
questionnaire that is lightweight and can be performed
first to understand the overall risk and determine if a DPIA
is required. This threshold step, described in detail in this
handbook, is also beneficial to keep the overall process agile
and business friendly.
04.
Regulation and protect the rights of data subjects.”
Minimum DPIA inclusions
The PIA/DPIA is a critical operational and record keeping tool
to be able to demonstrate compliance with Article 25. The
05.
PIA must be operationalized and embedded into the product
lifecycle so that it is triggered during the design process of a
Seek views of the data subjects
product, and the PIA must include the proper set of questions
to help the product designers identify user-trust, and legal
and engineering issues to integrate all privacy by design
principles.
06. Demonstrate overall GDPA
accountability
1. A DPIA is required only when the processing Additional examples of processing that may result in high risk
activity is likely to result in a “substantial”, “high” or that would require a DPIA include:
“heightened” risk to individuals
• The sale of personal data
There is no definition of a “substantial”, “high”, or
• Using new technologies
“heightened” risk. Privacy and data protection laws and
regulations provide some examples of processing likely to • New kinds of data
result in risk: • Necessary consideration of the time elapsed since the
initial processing and/or assessment
GDPR Article 35 (3) Colorado privacy act §6-1-1309 (2) China PIPL Articles 55 – 56
Statutory exemptions
The reasonable expectations of individuals should be
DPIAs may not be necessary when a processing activity considered during the identification of risks, including the
is based on the necessity to comply with a legal obligation expectations arising from privacy notices.
(article 6(1)(c)) or performance of a task carried out in the
Not only should the DPIA identify the risk, but it should also
public interest or exercise of official authority (article 6(1)
assess the likelihood of the risk occurring, and the severity or
(e)), unless specifically required by the Member State law in
impact if it did.
question.
A description of the purposes for which the personal data 5. Seek the views of affected individuals during the
are being processed, including details of the legal basis, such DPIA process
as the legitimate interest pursued by the controller, where
As explained above, one of the main purposes of a DPIA is to
applicable.
identify and consider risks from the perspective of individuals
whose personal data is being processed. It is recommended to
consult with, or seek the views of, affected individuals during the
DPIA process, in order to ensure their feedback is included and
documented. Depending on the context, views can be sought in
a variety of ways.
consult with a relevant Supervisory or Regulatory Authority. ('ADGM') Data Protection Regulations Section 37(1)
It is therefore almost essential to keep track of them and take original version, but some of the noticeable changes include
them into account to the extent possible. Most of the time, the emphasis made on the importance of the risk-based
they are also very useful in helping understand the different approach to data protection, a few modifications to the list of
requirements from the GDPR, which can be unclear. criteria provided to help determine when a processing activity
is likely to result in a high risk, and a few additional practical
Article 29 Working Party guidance
examples to illustrate how to use those criteria in particular
The Articles 29 Working Party adopted on April 4, 2017 situations. The GDPR provides data controllers with flexibility
guidelines on Data Protection Impact Assessments (DPIAs) to determine the precise structure and form of the DPIA,
and determining whether processing is “likely to result in a but the DPIA must be a genuine assessment of risk, allowing
high risk” for the purposes of the GDPR. The guidelines were controllers to take measures to address them. It is designed
submitted for public consultation until May 23, 2017, and the to describe the processing activity, assess its necessity and
revised draft was adopted and published on October 4, 2017. proportionality, and to help manage any resulting risks to the
Overall, the revised guidelines do not differ much from the rights and freedoms of individuals.
The following figure illustrates the basic principles related to the DPIA in the GDPR:
No Yes
Exception?
(art. 35(5) and (10))
DPIA
[art. 35(7)]
No DPIA Needed
Yes No
No Yes
No Prior Prior
Figure extracted from the WP29 Guidance
Consultation Consultation
The guidance also includes nine criteria to determine whether • Evaluation or scoring
a DPIA should be conducted. A DPIA rule of thumb, so to
• Automated decision making with legal or similar significant
speak. A processing operation meeting fewer than two of the effect
following criteria may not require a DPIA due to a lower level
of risk. In most cases, processing operations which meet two • Systematic monitoring
or more of these criteria will require a DPIA. The more criteria • Sensitive data or data of a highly personal nature
are met by the processing, the more likely it is to present a
• Data processed on a large scale
high risk to the rights and freedoms of data subjects, and
therefore to require a DPIA, regardless of the measures which • Matching or combining datasets
the controller envisages to adopt.
• Data concerning vulnerable data subjects
In some cases, a processing activity meeting only one of
• Innovative use or applying new technological or
these criteria will require a DPIA. Conversely, if the controller organizational solutions
believes that even though the processing meets at least two
• When the processing itself prevents data subjects from
criteria, it is considered not to be “likely high risk,” then the
exercising a right or using a service or a contract
controller has to thoroughly document the reasons for not
carrying out the DPIA and include/record the views of the
data protection officer.
The guidance offers a few practical examples and the criteria to consider for each:
DPIA likely to
Examples of processing Possible relevant criteria
be required?
• Evaluation or scoring
The gathering of public social media data for generating • Data processed on a large scale
Yes
profiles. • Matching or combining of datasets
• Evaluation or scoring
• Sensitive data
Storage for archiving purpose of pseudonymized
personal sensitive data concerning vulnerable data • Data concerning vulnerable data subjects Yes
subjects of research projects or clinical trials. • Prevents data subjects from exercising a right or using
a service or a contract
A processing of “personal data from patients or clients by • Sensitive data or data of a highly personal nature
an individual physician, other health care professional or No
lawyer” (Recital 91). • Data concerning vulnerable data subjects
DPIA Whitelist
In addition, some regional supervisory authorities in Germany 2. Risk mitigation: These assessments enable organizations to
have published guidelines relevant to DPIAs, for instance: implement measures that mitigate identified risks, ensuring
that AI systems are designed and operated in a manner
• The Lower Saxony data protection authority ('LfD
that protects individual rights and freedoms. Mitigation
Niedersachsen') issued guidance (only available in German
here); strategies may include data minimization, anonymization,
and robust security measures.
• The Bremen data protection authority ('the Bremen
Commissioner') issued a list of processing operations 3. Transparency and accountability: Conducting DPIAs
subject to DPIAs (only available in German here); and enhances transparency and accountability in the use of AI
• The Data Protection Authority of Bavaria for the Private technologies, as organizations must document their data
Sector ('BayLDA') issued guidance (only available in processing activities and risk management strategies. This
German here). documentation is essential for demonstrating compliance
to regulatory authorities and building trust with users.
DPIAs in the context of the EU AI Adhering to the requirements of the AI Act through DPIAs
Act ensures legal compliance and fosters trust among users and
stakeholders by demonstrating a commitment to responsible
The EU Artificial Intelligence Act (EU AI Act) establishes a AI development and deployment. Regular updates and
comprehensive legal framework for AI systems, addressing reviews of these assessments will be necessary as AI
issues related to data protection, transparency, and technologies and their applications evolve.
accountability. As part of this regulation, organizations
Examples of AI applications requiring DPIAs:
deploying AI technologies need to conduct thorough risk
assessments to ensure compliance with data protection • Healthcare: AI systems used for diagnostic purposes or
standards. patient data analysis.
1. Risk identification: DPIAs help identify potential privacy 1. Initial assessment: Conduct a preliminary analysis to
risks posed by AI systems, especially those involving the determine if a DPIA is required based on the scope and
processing of personal data. This includes risks related nature of the AI system.
to automated decision-making, profiling, and the use of 2. Data mapping: Identify all data sources, flows, and
sensitive data. processing activities associated with the AI system.
• Templates
Knowledge bases
• Evalua Riesgo
• Gestiona Riesgo
the PIA and PTA ◦ Nature, scope, context, and purposes of the processing
are considered (GDPR recital 90);
• Necessity and proportionality are assessed (GDPR • Risks to the rights and freedoms of data subjects are
Article 35(7)(b)): managed (GDPR Article 35(7)(c)):
◦ Measures envisaged to comply with the Regulation ◦ Origin, nature, particularity, and severity of the risks are
are determined (GDPR Article 35(7)(d) and recital 90), appreciated (GDPR cf. recital 84) or, more specifically,
taking into account: for each risk (illegitimate access, undesired
modification, and disappearance of data) from the
– Measures contributing to the proportionality and the perspective of the data subjects:
necessity of the processing on the basis of:
– Risks sources are taken into account (GDPR recital
- Specified, explicit and legitimate purpose(s) 90);
(GDPR Article 5(1)(b));
– Potential impacts to the rights and freedoms of data
- Lawfulness of processing (GDPR Article 6); subjects are identified in case of events including
illegitimate access, undesired modification, and
- Adequate, relevant, and limited to what is
disappearance of data;
necessary data (GDPR Article 5(1)(c));
– Threats that could lead to illegitimate access,
- Limited storage duration (GDPR Article 5(1)(e)); undesired modification and disappearance of data
are identified;
– Measures contributing to the rights of the data
subjects: – Likelihood and severity are estimated (GDPR recital
- Information provided to the data subject (GDPR 90);
Articles 12, 13 and 14);
◦ Measures envisaged to treat those risks are
- Right of access and to data portability (GDPR determined (GDPR Article 35(7)(d) and recital 90);
Articles 15 and 20);
• Interested parties are involved:
- Right to rectification and to erasure (GDPR
◦ The advice of the DPO is sought (GDPR Article 35(2));
Articles 16, 17 and 19);
◦ The views of data subjects or their representatives are
- Right to object and to restriction of processing
sought, where appropriate (GDPR Article 35(9)).
(GDPR Articles 18, 19 and 21);
- Relationships with processors (GDPR Article 28); On the next page is a summary checklist of items to have in
mind when designing your questionnaire, which can be used
- Safeguards surrounding international transfer(s) not only for compliance with the GDPR, but also as a baseline
(GDPR Chapter V);
to review with your legal counsel for compliance with other
- Prior consultation (GDPR Article 36). privacy laws and regulations.
When assessing whether a Data Protection Impact Assessment meets requirements, start with the requirements in Article
35(7) and then dig deeper with the additional citations listed below. Article 35(7) requires (in part) that the assessment shall
contain at least: “(a) a systematic description of the envisaged processing operations and the purposes of the processing,
including, where applicable, the legitimate interest pursued by the controller;” This maps to the requirements of other laws
and regulations where DPIAs are also mandatory.
Description of the new project or product, including the data • Art. 35(7)(a) & Rec. 90 (nature, scope, context of the
processing activity associated with it processing)
Personal Data and special categories of personal data (sensitive • GDPR Art. 4(1) "Personal data"
data) • GDPR Art. 9 (processing of special categories of data)
Harm that could result from the processing activity • GDPR Rec. 75
Processing
Again, returning to the requirements in Article 35(7) ensure that the DPIA contains “(b) an assessment of the necessity and
proportionality of the processing operations in relation to the purposes;”
Individual rights the rights and legitimate interests of data subjects and other
persons concerned. Article 25 requires appropriate technical
Article 35(7) requires that the DPIA contains an assessment of
and organizational measures, acting as necessary safeguards
the risks to the rights and freedoms of data subjects referred to
to meet the requirements of this Regulation and protect the
in paragraph 1. This means that the DPIA considers the nature,
rights of data subjects
scope, context, and purposes of the processing that is likely to
result in a high risk to the rights and freedoms of individuals.
As part of the DPIA, it is essential to consider whether the
processing activity poses particular risks to an individual’s ability • CNIL PIA 1 Methodology & 2 tools
to exercise their rights and freedoms. Recording ◦ GDPR Rec. 84 Origin, nature,
of the risks, particularity and severity of the risks
According to the Article 29 Working Party guidelines, the controls, and
decision • GDPR Rec. 90 Risk sources and
reference to “the rights and freedoms” of data subjects measures envisaged to treat those
primarily concerns the rights to data protection and risks
privacy but may also involve other fundamental rights such
as freedom of speech, freedom of thought, freedom of
movement, prohibition of discrimination, and the right to
liberty, conscience, and religion. 2. Incorporate Article 30 processing records
requirements
Transfers
In addition to the GDPR components in item 1, many
Assessing a project for risk via a DPIA can also be a good time
organizations also choose to include the specific record
to assess whether cross border transfers are present and are
keeping requirements from Article 30 in the GDPR into their
being addressed correctly, since cross border data transfers
questionnaire as well.
are likely to increase the risk that may result from a particular
processing activity. There are only so many times that the Most organizations who have a GDPR based privacy program
privacy team can ask questions and collect information, so use Article 30 as the foundation of their data mapping
this is a good time to learn more. initiative.
3. Organize the questions in an overall framework As explained above, due to the fact a DPIA must be
conducted where there is a “significant”, “high” or
Once these questions from the above have been compiled,
“heightened” risk to the rights and freedoms of individuals
it is important to add some structure and organization to the
and the results recorded in a specific format, many
questionnaire. Below are two example ways of structuring and
organizations choose to implement a workflow that contains
organizing the questionnaire.
an initial “Risk Analysis” or “Threshold” questionnaire that
is lightweight and can be performed first to understand the
overall risk and determine if a DPIA is required. For further
Example 1 details, see the Create an Integrated “Threshold” step below:
Example 2 vs.
• Transfers will provide poor quality responses and the privacy team is
only as effective as the information they must work with.
• Disclosure to Other Parties
• Storage 6. Add conditional skip questions
• Destruction
PIAs and DPIAs are all about getting the right questions to
◦ Mapping to Principles (HIPAA, GDPR, etc.) the right people, and the fewest number of questions to those
people.
When designing your questionnaire, it is a best practice to Threshold assessments are the brief screen questions that
build in question skip logic or branching logic rules so that can be asked to determine whether risk is present, and more
questions that are not applicable to a specific project do not information is needed. Always remember that the PIA process
need to be presented to the business user. may be the only interaction that the privacy team has and
possibly will have with individuals within an organization and
7. Allow for flexible responses
it’s important to put your best foot forward. It’s important
Don’t force respondents to submit the wrong answer! that the privacy team gets what it needs and does not waste
Respondents may not have all the answers to your privacy anyone’s time.
questions and should be given the option to choose “Not
DPIA under the GDPR can be approached as a two-step
Sure” or “Other,” which allows them to fill in any additional
requirement by incorporating this threshold:
detail they can share. These options invite a conversation
with the privacy team that often reveals key details that would • Step 1: A privacy threshold assessment or simple privacy
have been left out. impact assessment which would aim to determine
whether a processing activity is likely to result in high risks
8. Incorporate a freeform text box to the rights and freedoms of data subjects
Structured responses are incredibly important. “Yes” or “No”, Companies should incorporate in their PIA the relevant
“A” or “B” are answers that can be connected to conditional elements necessary to assess the likelihood, severity or
logic and used to enhance automation. They also allow for impact of a “substantial”, “heightened”, or “high” risk occurring
comparative analyses. That said, in many cases, structured and ensure, in the event it decides not to conduct a DPIA, that
responses should not be the only response. the organization has sufficient evidence and documentation
In many cases, you will want to ask respondents to explain to demonstrate its choice not to conduct one.
their answer. This allows respondents to offer additional • Step 2: After the primary risk review and mitigation phase,
comments or provide explanations for complicated matters. if it appears that the type of processing activity is likely to
Offering both structured and unstructured answers to a result in a high risk to the rights and freedoms of the data
question allows the privacy team to get the best of both subjects, controller should then conduct a DPIA, which
worlds, great automation along with context and detail. should contemplate all the elements mentioned above.
9. Create an integrated “threshold” step 10. Do not ask “Do you collect personal data?”
It goes by many names: Gateway, Threshold, Pre-PIA, Privacy professionals talk about personal data all the time.
Screening, Risk Assessment, etc. Whether something is or is not personal data is incredibly
Regardless of what you call it, having a threshold step important and drives decisions within the privacy team.
is critical to keep your PIA process agile and usable in a Other individuals within the organization aren’t as focused on
business environment, and helps to prevent PIA fatigue within personal data and the word does not hold the same meaning
30%
90%
Part 3: Embedding 2. Select the right tools to implement the PIA process
Threshold
Business user or Some organizations choose to re-purpose existing tools for PIA /
questionnaire gets
privacy office initiates DPIA processes. It’s important to review your implementation of
distributed to the
a new project your homegrown solution with the checklists and best practices in
project owner
this document.
OneTrust Privacy Automation Full Threshold: Automate the threshold step to not require
any admin intervention or review if low risk processing is
OneTrust makes the leading enterprise grade platform for detected
privacy programs, including PIA and DPIA activities. The solution
is available to be installed in your data center, or in a cloud Full PIA: Automate the entire process with a robust set of
environment managed by OneTrust. Learn more at OneTrust.com. rules engine that is monitored and audited regularly
Many organizations may have an existing GRC tool they use for Different business teams have different ways they project
other compliance activities. Due to the complex nature assessing manage their work. The key is to go one at a time to each
personally identifiable information in context to business use, business team, understand their project management cycle,
and the unique record keeping required to prove compliance –
and find the appropriate way to integrate into that function.
organizations typically choose to leverage a privacy management
Below are some examples:
solution such as OneTrust and integrate the solution into the GRC
tool rather than attempting to re-build and keep up to date all the • IT teams sometimes follow a ITIL project management
privacy tasks themselves in the GRC. process that includes various review toll gates and
security architecture reviews. These toll gates are a great
opportunity to insert your PIA process.
3. Decide the level of automation that makes sense for • R&D engineering teams sometimes follow a release
process or a SDLC (System Development Lifecycle)
you
process that also includes toll gates and checkpoints that
There is no privacy team that has a bigger team or more can be integrated with.
resources than they need. Manually administering PIAs is • Procurement is another opportunity to insert your PIA
time-consuming, and time is wasted filling out the PIAs and process if your organization has a central procurement
assessing them. Worse yet, lack of automation also means function.
lack of consistency in storage and follow up which can mean
• Finance approval – many privacy programs have found
a lack of accountability down the road when it turns out that success in “following the money”. If you can identify how
the risks that were revealed by the assessments were never projects are funded, you can insert yourself into the funding
addressed or were only partially addressed. The more you can process of that project.
automate this process, the more likely your respondents are
to participate and the most likely the privacy team will be able 5. Enable self-service access to the business
to carry out its work effectively by focusing on what matters. Once you have identified the right toll gate to insert your PIA
There are different levels of automation available, and not all process, you can mature the process further by removing the
levels are appropriate for all organizations: requirement for a privacy team member to manually send a
questionnaire to the business.
A self-service portal can be enabled where the business can For example:
access the privacy review information themselves.
• SharePoint – many business teams have their home base
as SharePoint, and your PIA process can be inserted as
6. Roadmap the technical integrations with existing tools
a link into a team’s existing SharePoint site rather than
Having to log-in to a separate portal or remember which being a separate portal to log into.
intranet site to go to conduct a privacy review creates room for • JIRA – many R&D engineering teams use a tool called
error and missed process. JIRA that is essentially a to-do list for developers.
Integrating into this tool to help developers track their
The most effective privacy programs go beyond administrative/
follow up remediation tasks and feature requests can
operational integrations into business processes and integrate be the most highly effective way to integrate PbD into
at a more technical level to make privacy a reflex of the activities engineering teams.
that business teams are already doing.
• OneTrust Risk and Compliance – Compliance
professionals need to understand their posture
and execution in accordance with legal and privacy
framework requirements. Teams can generate a plan of
action and track the fulfillment of PIAs and DPIAs on a
cyclical basis according to the legislation or framework.
In addition, risk and compliance teams can leverage the
output risk analysis to direct and prioritize efforts on high-
risk practices or areas of the business.
9. Determine who will review the completed PIA 10. Generate valuable reports and metrics
Many organizations turn to a concept called “Privacy Reports and metrics are key to a successful program. Different
Champions” to help scale the processes of reviewing the PIA. stakeholders may require different views.
Privacy Champions are also called:
Accuracy tracking and change management reports
• Privacy Advisors
There are many reasons why someone would be uncertain
• Privacy Account Managers about their questionnaire responses. One reason might be
• Privacy Angels that the question is not clear. Analyzing answer changes on
a per question basis across multiple projects will give you
• Privacy Gurus
insight into the quality of your questions and lead to iterative
• Privacy Network improvements. Another reason for answer changes might be
respondent confusion because of the complexity of the project
The role and function of the privacy champions vary drastically.
or a misunderstanding about what is being asked. Respondent
Most commonly, these are business users who either are
confusion can lead to unhappy respondents and inaccurate
tapped or volunteer to become knowledgeable in privacy. The
information. Combat this by tracking any changes to their
Privacy Champions can be on point for helping their business
answers, which can identify reasoning for their hesitation.
teams complete the PIA, can be the first line of defense for
answering FAQs, and can also be inserted as reviewers of the
completed PIAs.
Privacy Impact
An approach to analyze the privacy risks of a project to apply appropriate mitigating measures and controls.
Assessment (PIA)
European Regulation governing the protection of natural persons with regard to the processing of personal
General Data Protection
data and laying down rules relating to the free movement of personal data. The GDPR was passed in May
Regulation (GDPR)
2016 and will take effect as from 25 May 2018.
HIPAA US law passed to create national standards for electronic healthcare transactions
Inherent risk Risk that an activity would pose if no controls or other mitigating factors were in place; gross risk
The Article 29 Working Party was replaced by the European Data Protection Board (EDPB) when the GDPR
European Data took effect on May 25, 2018. The EDPB is composed of:
Protection Board (EDPB)
• The heads of the national data protection authorities (Supervisory Authorities) of the countries in the
(previously Article 29 European Economic Area
Working Party)
• The European Data Protection Supervisor (EDPS)
assessment standards The European Union Agency for Network and Information
Security (ENISA) is a center of expertise for cyber security
and methodologies in Europe. The Agency works closely together with Member
States and the private sector to deliver network and information
security advice and solutions. ENISA’s risk management
Risk management frameworks methodology is outlined in the first 38 pages of the 168-
ISO 27005: Security Risk Assessment page report, including an extensive inventory of other risk
management methods and tools.
The ISO 27005 standard is not focused on privacy risk,
but rather information security risks. Implementation of The ENISA risk management methodology works well as a
the standard involves the entire management system and way of implementing a PIA and it addresses integration of its
supports the design, implementation, maintenance, and risk management methodology with other processes in the
improvement of risk management processes. One area where organization. ENISA makes a distinction between existing and
this standard is useful within the PIA context is guidance on emerging risks. Existing risks using a standard risk management
risk management techniques and procedures. approach and emerging risk require additional intention and
process.
ISO 31000:2009 Risk Management – Principles and
guidelines
Risk analysis frameworks
The ISO 31000:2009 standard is not focused on privacy risk,
Expression des Besoins et Identifications des Objectifs
but rather risk in general. Implementation of the standard
de Sécurité (EBIOS)
involves the entire management system and supports the
design, implementation, maintenance, and improvement of EBIOS is a high-level method for risk management. Its method
risk management processes.17 One area where this standard mainly addresses information security, but it can be leveraged
is useful within the PIA context is risk treatment. to address other types of risk. EBIOS is mainly used in France,
where it is recommended for use in the government as well as
Retaining, avoiding, reducing, and sharing the risk(s) and
private companies working with the government. Compatibility
preparing and implementing risk treatment plans is an
with other information security management and risk
essential step in the PIA process and following a standard
management including ISO 27001, ISO 27005, ISO Guide 73,
for risk management, such as 31000:2009, assists with
and ISO 31000.
operational efficiency, governance, and organizational
confidence in the process. A revision of 31000 is underway EBIOS views risk as a combination of:
with the goal of continuing to simplify the approach.
• Threat Source
• Threat
• Vulnerability
• Impact
EBIOS is not a great risk analysis methodology for companies • Relevant threats to organizations or threats directed
looking to build a large multijurisdictional program, but through organizations against other organizations;
the method works well in France, and it also is an excellent • Vulnerabilities both internal and external to organizations;
reference for those that are looking for some additional
context and background on risk analysis. • Impact (i.e., harm) to organizations that may occur given the
potential for threats exploiting vulnerabilities; and
Operationally Critical Threat, Asset, and Vulnerability
• Likelihood that harm will occur.”
Evaluation (OCTAVE)
This standard is security focused, but the assessment of
In 1999, Carnegie Mellon University published OCTAVE via
risk can be helpful in a PIA context if a focus on privacy is
the Software Engineering Institute19. The OCTAVE method is
introduced when developing an organizational program.
not a full risk management method but rather a risk evaluation
Without that introduction of privacy focus, harms to
method. This can be a useful approach for companies looking
individuals whose personal data are processed will not be
for a point in time analysis. Because this is not a full “Plan-
addressed and this will not be an adequate approach.
Do-Check-Act” approach it is not a perfect fit for adopting in
conjunction with PIAs but is helpful in developing structure
around risk analysis. Privacy risk management
ISO 27005:2022: Security Risk Assessment frameworks
ISO 27005:2022 is a standard for information security risk ISO 27701: Privacy Information Management
management details, an ongoing process for examining the
The ISO 27701 standards build on the the Information
external and internal context, identification, and assessment
Security Management System (ISMS) defined in ISO/
of risks, and then recommending how to address those risks.
IEC 27001 and is designed to permit the addition of sector
20 ISO 27005:2022 is aligned with the risk management
specific requirements, without the need to develop a new
standard ISO 31000, which makes it easy to integrate
Management System. It is designed to be used by PII
Enterprise Risk Management with information security
controllers (including those that are joint PII controllers)
risk management. Additionally, ISO 27005:2022 uses the
and PII processors (including those using subcontracted PII
concepts in common with ISO 27001 and ISO 27002 which
processors and those processing PII as subcontractors to
provides an effective framework for information security
PII processors) and requires the creation of documentary
management. PIAs fit well into the ISO 27005:2022 process
evidence of the processing of PII.
where risk identification and the application of appropriate
controls are carried out. ISO/IEC 29100:2024 Information technology – Security
Techniques
NIST SP 800-30 Guide for Conducting Risk
Assessments The ISO/IEC 29100:2024 standard provides the principles
and guidelines for managing, systematically and
As the NIST SP 800-30 standard states in the introduction,
transparently, any form of risk. The standard consists of
“The purpose of risk assessments is to inform decision
five main chapters: scope, terms and definitions, principles,
makers and support risk responses by identifying:
framework, and process. As it states in the introduction to the
standard:
“The privacy framework is intended to help organizations While NIST 800-122 is US-centric – and therefore not a
define their privacy safeguarding requirements related to PII great fit when solely relied upon for meeting GDPR DPIA
within an ICT environment by: requirements – it is an excellent guide to protecting personal
data through the usage of PIAs.
1. Specifying a common privacy terminology;
EDPB Guidelines 4/2019 on Article 25 Data Protection
2. Defining the actors and their roles in processing PII;
by Design & By Default
3. Describing privacy safeguarding requirements; and
The EDPB Guidelines 4/2019 focus on the implementation
4. Referencing known privacy principles.” of Data Protection by Design and by Default (DPbDD) as
mandated by Article 25 of the GDPR. They provide guidance
This standard is a popular risk management methodology but
for controllers on how to incorporate data protection
because it is a generic risk management methodology, it does
principles into their processing activities from the outset.
not address all the issues that should be covered in a PIA.
Additionally, the guidelines are beneficial for processors
NIST SP 800-122, Guide to Protecting the and producers of products, services, and applications,
Confidentiality of PII helping them create GDPR-compliant solutions that
enable controllers to meet their data protection obligations
NIST 800-122 covers the process and requirements for effectively.
PIAs to adequately address confidentiality risks and
applying appropriate safeguards. Whether personal data is IEEE 7002-2022 - Data Privacy Process
processed is an important determination and the standard
The IEEE 7002-2022 standard defines the requirements for
suggests using a “privacy threshold analyses” (PTAs), also
integrating privacy considerations into systems and software
known as “initial privacy assessments” (IPAs) to make this
engineering processes. It focuses on managing privacy issues
determination. If the PTA concludes that personal data is
throughout the entire lifecycle of products, services, and
involved, it triggers a PIA. Another helpful aspect of this
systems that handle personal data. This standard provides a
standard is the descriptions of safeguard and controls.
comprehensive framework, including procedures, diagrams,
In section 4.2.2 topics that are commonly addressed by a PIA and checklists, to help organizations assess and mitigate
are outlined: privacy risks effectively, ensuring compliance with privacy
regulations and enhancing the protection of personal data.
• What information is to be collected