The requirement for a data privacy impact assessment (DPIA) was introduced with the General Data Protection Regulation (Art. 35 of the GDPR). This refers to the obligation of the controller to conduct an impact assessment and to document it before starting the intended data processing. It’s also required when major changes or upgrades are made to systems processing personal data.
While various supervisory agencies have published checklists for questions how the data is collected, stored, shared etc, few really seem to deal with the necessary steps in preparing for the actual DPIA which is equally important. Here are some steps to consider before you start your assessment.
Posts
- Phishing Avoidance Tips for 2025 | DPO Solutions NY (February 19, 2025)
- How to Perform a DPIA | DPO Solutions NY (August 8, 2024)
- Steps to Performing a ROPA (May 9, 2024)
- Job Prospects in Data Privacy are Looking Brighter Than Ever (May 6, 2024)
- Best Privacy & Security Certifications in 2024 (May 5, 2024)
- DORA Regulation Primer (February 27, 2024)
- Top privacy risks to look for in 2024 (December 8, 2023)
- Industry Trends in Data Protection 2024 Outlook (November 8, 2023)
- Data Privacy & Security Awareness Training and how to Prepare for 2024 (October 2, 2023)
- Phishing Risk Awareness and What you need to Know in 2024 (September 24, 2023)
- Generative AI Privacy and What You Need to Know (September 24, 2023)
- What should be in your data privacy awareness training? (July 17, 2023)
- Tips on running a successful security awareness program (April 30, 2023)
- How to achieve privacy by design with some examples (February 13, 2023)
- What are the Key Qualities of a Good Data Protection Officer! (December 21, 2022)
- What is the Electronic Privacy Regulation (June 5, 2021)
- How to Secure Wordpress (May 4, 2021)
- GDPR Self Assessment Questionnaire (March 1, 2021)
- Data Privacy Policy Sample (GDPR) (January 25, 2021)
- Black Swan Day (May 14, 2020)
- DPO Solutions Payment Screen (May 1, 2019)
Pages
- My Account Page | DPO Solutions NY (February 23, 2025)
- Contact Us | DPO Solutions NY (February 20, 2025)
- Privacy Blog - DPO Solutions NY (February 20, 2025)
- Blog - DPO Solutions NY (February 18, 2025)
- Privacy & Security Awareness Presentation Training | DPO Solutions NY (February 12, 2025)
- No Access (February 1, 2025)
- Data Privacy & Security Resource Links to Follow in 2025 (January 21, 2025)
- Cookie policy (EU) (January 1, 2025)
- Refund Policy (November 2, 2024)
- Remote Corporate Cyber Trainer Service (August 7, 2024)
- Beta Learning Development Build Program (August 4, 2024)
- Investor Information (May 20, 2024)
- Security Policy Writer Service | DPO Solutions NY (November 5, 2023)
- Data Privacy Policy (September 25, 2023)
- Checkout (September 13, 2023)
- Shopping Cart (September 12, 2023)
- How to Share our Security PowerPoint Presentations (August 19, 2023)
- Data Privacy Awareness Quiz (June 25, 2023)
- Payment Failed (May 1, 2023)
- Payment Confirmation (May 1, 2023)
- Compliance Training Presentation Design Service (February 12, 2023)
- GDPR Data Request Form (October 28, 2022)
- Security Training and Templates Shop (April 28, 2022)
- My Account Page (October 31, 2021)
- Logout (October 31, 2021)
- Password Reset (October 31, 2021)
- Login (October 31, 2021)
- Register (October 31, 2021)
- Members (October 31, 2021)
- User (October 31, 2021)
- Browse Submissions (August 1, 2021)
- Submission Confirmed (August 1, 2021)
Products
- Data Privacy Awareness 4 Module Presentation Training Course (February 13, 2025)
- Cybersecurity Corporate Awareness Training - 4 Module Course (February 13, 2025)
- Data Privacy and Security Awareness Presentation Training Courses Combo (February 13, 2025)
- Phishing Awareness Training Presentation for Employees (February 13, 2025)
- Best DORA Regulation Training PPT Kit (February 10, 2025)
- Payment Card Handler Security Awareness Training Presentation (January 31, 2025)
- Data Privacy Awareness Training Presentation for Employees (January 25, 2025)
- California Data Privacy Awareness Training PPT (January 23, 2025)
- Data Privacy Corporate Business Reference Guide | DPO Solutions (January 20, 2025)
- Data Privacy Impact Assessment Template Kit XLS & VSDX Downloads (January 20, 2025)
- Data Privacy Awareness Tips Poster 2025 - Acrylic Print (January 15, 2025)
- GDPR 3rd Country Transfers Visio Template | DPO Solutions NY (January 14, 2025)
- Remote Working Corporate Security Awareness Training (January 12, 2025)
- GDPR Data Flow Visio Template (January 11, 2025)
- GDPR RoPA / PII Data Records Controller xls & vsdx Template Kit (January 4, 2025)
- Remote Working Security Awareness Tips Poster (January 2, 2025)
- Cybersecurity Awareness Tips Poster (January 2, 2025)
- How to Secure WordPress Training Course (January 2, 2025)
- Credit Card Handler Security Awareness Poster (January 2, 2025)
- Cyber Security Awareness Tips Poster 2025 - Acrylic Print (January 2, 2025)
- Payment Card Security Awareness Tips Poster 2025 - Acrylic Print (January 2, 2025)
- Remote Working Security Awareness Tips Poster 2025 - Acrylic Print (January 2, 2025)
- Phishing Awareness Poster and Screensaver (January 2, 2025)
- Data Privacy Awareness 2025 Tips Satin Poster - 300gsm (January 1, 2025)
- Security Awareness Posters PNG Pack (January 1, 2025)
- 30 Day All Access Membership Pass (November 12, 2024)
- Generative AI Security Awareness Training Presentation (October 14, 2024)
- Tape Encryption PCI Compliant Process Visio Template .vsdx (February 27, 2024)
- Media Handling Destruction Process Visio Template .vsdx (February 26, 2024)
- Call Center Recording PCI-DSS Compliance Visio Template .vsdx (February 25, 2024)
- 6 Steps of Personal Data Breach Notification Process Template (.ai format) (January 28, 2024)
- Data Privacy & Security Awareness Training Presentation Bundle (January 5, 2024)
- Data Privacy Awareness Training Instructor Led Course (January 3, 2024)
- Laptop Security Awareness Presentation Guide for Employees (January 2, 2024)
- Top 10 Steps to Data Privacy in 2025 Poster (January 2, 2024)
- Data privacy enterprise critical security controls (.ai format) (January 1, 2024)
- HIPAA Privacy Awareness Corporate Training (December 25, 2023)
- Payment Card Handling Security Awareness Tri-Fold Brochure (July 24, 2023)
- DPIA 8 Step Process Infographic (April 4, 2023)
- Connecticut (CTDPA) Data Privacy Awareness Training For Employees PPT (March 21, 2023)
- Data Privacy Automated Self Assessment Tool (February 19, 2023)
- Record of Processing Activities Template Kit (Processor ed) 2024 (December 10, 2022)
- Personal Data Breach Notification Template (December 8, 2022)
- Data Privacy Awareness for Employees Tri-Fold Brochure (May 15, 2022)
- Standard Contractual Clauses Template (January 13, 2022)
Portfolio
- Paul Rogers Cyber Graphics Portfolio (August 1, 2024)
- Data Privacy Awareness Training (June 24, 2021)
FAQs
- Who is this training for? (November 11, 2022)
- Why you need it (November 11, 2022)
- What are some of the features? (November 10, 2022)
- Product Benefits (November 10, 2022)
- Who Developed the Training and Why? (November 10, 2022)
- Do you have other training products? (November 10, 2022)
- Payments Infomation (November 10, 2022)
- Are there any discounts? (November 10, 2022)
- Usage Rights (November 10, 2022)
- Why isn't this training free? (November 10, 2022)
- Who is this training for? (November 9, 2022)
- Why you need it (November 9, 2022)
- What are some of the features? (November 9, 2022)
- Product Benefits (November 9, 2022)
- About the Tri-Fold Handout (November 9, 2022)
- Who Developed the Training and Why? (November 9, 2022)
- Do you have other training products? (November 9, 2022)
- Payments Infomation (November 9, 2022)
- Are there any discounts? (November 9, 2022)
- Usage Rights (November 9, 2022)
- Why isn't this training free? (November 9, 2022)
- Feedback (November 9, 2022)
- Why isn't this training free? (October 9, 2022)
- How are we different than competitors (June 16, 2021)
- How are services delivered? (June 14, 2021)
- Who are your clients? (June 13, 2021)
- Who will perform the work? (June 12, 2021)
- Where are you based? (June 11, 2021)
- Why was ISO27701:2019 Developed? (January 24, 2021)
- What are the Key Differences Between ISO27701 and NIST Privacy Framework (January 23, 2021)
- What Types of Controls Does ISO-27701 Include? (January 22, 2021)
- What is ISO 27701? (January 21, 2021)
Categories
Tags
- 2024
- 2024 data privacy readiness
- artificial intelligence privacy
- ccpa
- Consumer Data Protection Assessments
- cookie law
- cookies
- corporate security training tips
- covid-19
- covid-19 lockdown effects on the startup economy
- CPA
- cpra
- cybersecurity awareness training
- data loss prevention
- data privacy
- data privacy awareness training
- data privacy by design
- Data Privacy Impact Assessment
- data privacy jobs
- data privacy notice sample policy
- data protection industry outlook 2024
- data protection notice sample
- data protection officer
- Data Protection Self Assessment Questionnaire
- data protection trends
- data security
- Digital Operational Resilence Act
- DORA
- DORA Compliance
- DPIA
- DPO
- DPOaaS
- electronic privacy regulation
- epr
- front
- GDPR art 30
- GDPR Article 35
- GDPR sample data privacy policy
- GDPR SAQ
- GDPR training progamme requirements
- generative AI privacy
- how do i secure my website
- how to secure a website
- impact of covid-19 on startups
- information privacy officer
- malicious email
- NPI
- PbD implementation
- PbD Key Steps
- personal data management
- Personal Data Risk Assessment
- phishing
- phishing awareness
- phishing types
- PIA
- PII
- preventing phishing attacks
- privacy by design examples
- privacy careers
- privacy certifications 2024
- Privacy Impact Assessment
- privacy regulation
- privacy resources
- Questionnaire
- Record of Processing Activities
- ROPA
- sample privacy policy
- security awareness tips
- security certifications 2024
- security training success tips
- seo phishing
- smishing
- spear phishing
- startup layoffs
- top privacy risks
- Utah Consumer Protection Act
- vishing
- website security
- whaling
- wordpress security tips
Brands
Product categories
- 2024
- 2024 products
- 2025 Products
- Brochures
- Cybersecurity Awareness Training PPT
- Cybersecurity graphics templates
- Data Mapping
- Data Privacy Awareness Powerpoint Training
- Data Privacy Awareness Training
- Data Privacy Templates
- DORA
- DPIA
- GDPR 3rd Country Transfers
- GRC Presentations
- incident management process
- laptop security
- Medical Data Privacy Awareness
- NPI
- Payment Card Security Awareness Products
- Payment Card Security Awareness Training
- Phishing
- PII
- PowerPoint Security Training
- Privacy Assessment Kits
- Privacy Infographic Template Diagrams
- ROPA
- ROPA template
- Screensavers
- Securitty Visio Diagrams
- Security Awareness Training Slides
- Security Posters
- Security Training Products
- Templates
- tools
- video lectures
Product tags
- 2024
- 2025
- 3rd country transfers visio
- AI Security
- assessment kits
- Australia-OAIC
- brochures
- California data privacy training
- call center recording compliance visio
- CCPA awareness training
- CCPA scorecard
- consumer privacy awareness training
- Controller ROPA Template
- CPRA awareness training
- CTDPA privacy awareness training
- cybersecurity awareness poster
- cybersecurity awareness training
- cybersecurity awareness training ppt download
- data asset register iso27001
- data mapping diagram
- data privacy awareness course
- Data privacy awareness desktop brochure
- data privacy awareness poster
- data privacy awareness training
- data privacy impact assessment
- data privacy poster
- data privacy reference guide
- data privacy self assessment tool
- data privacy soecurity controls
- data privacy tools
- data privacy training
- data protection security flyer
- data protection training
- Digital Operational Resilience Act ppt
- DORA
- DORA Act training
- DORA assessment Kit
- DORA compliance training
- DORA regulation
- dpia process diagram
- DPIA Template
- DPIA visio template
- EHR Privacy Awareness Training
- electronic health records privacy training for employees ppt
- email security
- ePHI Privacy Awareness Training
- ePHI privacy powerpoint training
- flyers
- GDPR
- GDPR awareness training
- GDPR breach notification word template
- GDPR excel assessment
- GDPR media encryption
- gdpr media handling
- GDPR personal data breach notification sample
- GDPR Processor ROPA Template
- GDPR ROPA Template
- GDPR SCC Template
- GDPR scorecard assessment
- GDPR Visio
- Gen AI Visio
- Generative AI Security
- GRC presentation
- HIPAA security training
- incident management
- infographics
- information privacy awareness training
- information privacy reference guide
- information security training ppt download
- instructor led training
- iso media handling
- IT security awareness flyer
- IT security training
- kits
- KSA-PDPL
- laptop security guide
- M'/L Security Awareness
- media destruction process template
- medical records awareness training
- medical records privacy training powerpoint
- mobile workforce security awareness training
- mobile workforce security tips
- NPI
- Payment Card Security Presentation
- PCI compliance
- PCI-DSS 4.0 Security
- pci-dss call recording visio
- PCI-DSS Security Primer
- PDPL asset register
- PDPL RoPA
- Personal data breach notification template
- personal data flow mapping diagram template
- personal data inventory tool
- phishing awareness training
- phishing poster
- PIA infographic
- PIA Template
- PII
- PII data register
- PII data register template
- pii destruction process
- pii encryption
- PII protection training
- PII security controls diagram
- PIPEDA
- PIPEDA Data Processor Template
- poster pack
- posters
- powerpoints
- privacy awareness tips poster
- privacy bundle
- privacy compliance training
- privacy course
- privacy diagrams
- privacy guide for businesses ppt
- privacy impact assessment steps
- Privacy Impact Assessment Template
- privacy information powerpoint
- privacy powerpoint guide
- privacy powerpoint training
- privacy steps flyer
- privacy training for employees ppt
- privacy training guide for businesses
- privacy training powerpoint
- Processor ROPA Template
- ransomware training
- Record of Processing Activity Template
- remote worker security awareness training
- remote working security awareness poster
- ROPA
- ROPA Excel Tracking Spreadsheet
- ROPA management tool
- sample PIA assessment
- SCC
- SCC Template
- SCC visio
- security awareness handouts
- security awareness media
- security awareness posters
- security awareness training
- security awareness training for employees
- security posters
- security training
- security training powerpoint download
- smishing training
- Standard Contractual Clause Word Template
- tape encryption
- templates
- tklm encryption visio
- UK-GDPR. kits
- video on demand training
- visios
- wordpress security
- working from home security awareness training
How do I get ready for a privacy impact assessment?
The key 1st step in starting a PIA is to assemble network, application and any existing risk assessment documentation about the data or proposed data for assessment. This is important, as assessing privacy controls is dependent on technical and administrative controls that will govern the data. For example, if a new customer database with sensitive data is being provisioned on AWS in an existing database farm then you will want to have a detailed knowlege of the environment that it’s going to sit in and if there are any gaps. Things to look at in this scenario might include proposed or existing;
- Encryption controls (e.g. Database TDE, SSL, Security certificates & Key Vaults)
- Access controls: DBO accounts and other privileged access users, security groups, access lists, network access controls
- Remote access (VPN users and groups, vendor accounts, multi-factor authentication, access logs)
- Database access logging, server security event logging, access list deny logs, firewall logs
- Network segmentation and firewall rules
- Data retention settings and policies for personal records
- Data loss prevention controls
- Data minimization techniques at data collection points and transfers to 3rd parties
- Form validation controls
- API security (REST/SOAP/JSON/XML)
- Vulnerability management
- Change management controls
The objective at this stage is data collection and controls to check for before the assessment gets underway.
What Does a Data Mapping Diagram Look Like?
While there is no specfic template, it’s a good idea to keep it high-level to resonate with technical and non-technical audiences alike. Remember the main purpose is to demonstrate personal data flows are documented and data assets are accounted for. The visio diagram below is an example for a middle eastern multinational. Personal data flow types are color coded and country flags are used to show trans-border data flows.
Download a similar diagram here
Consulting with Data Subjects
Several data protection authorities recommend that data subjects be consulted on plans to process their data. This is a good practice in gaining trust with customers and identifying potential push back early on. A simple survey can often be used to good effect for this practice.
Describe the processing
Controllers must be able to describe waht the data processing is intended to accomplish (i.e., the primary purposes for which the data are collected and used). This can be a high-level description of the services. This can briefly describe the service, the data subjects whose personal data is processed as well as the purpose/value derived from the processing system. Put simply, why does this exist?
You should also be able to define how processing will be divided between the controller and the processor and whether any joint processing will take place.
Assess the necessity and proportionality of processing
Controllers and processors should first establish a ‘legal bases’ for processing data. Legal bases may fall into 1 of 6 categories listed in the chart below. The main themes of these categories is that businesses must have authorization to use the data and it must be kept to a minimum to enable processing. The correct legal basis/bases should be documented in the PIA.
Identify, Assess and Mitigate Risks
Businesses are expected to implement a risk management program for protecting personal data under the scope of GDPR. Particular attention should be given to risk relating to encryption, access management, breach detection, incident management, logging, application security, backup systems and data loss prevention. Consider the following points when assessing the environment and mitigating risks;
- Are the latest encryption algorithms in use regularly scanned for latest versions? Regular scanning and patching of the network estate should detect and remediate these issues (Think about server SSL certs, RDP, SSH versions, VPN software, key management systems, TDE encryption etc.
- Is encryption deployed at the database, application and transport layers for personal data being processed?
- Are application view controls such as data masking used to prevent full personal data from being shown on operator screeens?
- Are controls over personal data used in the DEV/QA environments secured using data de-identification techniques? One or more techniques should be used such as data substituion to protect personal data
- Are APIs secured appropriately e.g. REST, SOAP security controls? Several techniques including encryption, access controls, rate limiting and registering all services can be used to protected application layer personal data
- Is logging enabled for a all privileged access to databases, application and infrastructure servers and appliances. Are these logs protected from deletion or modification? Technology teams should have centralized logging services which can colate logs and present early warning to analysts of possible attacks.
- Are personal data breach notification procedures in place with parties to be notified and incident handling measures? Specific notifications within timeframes are required for GDPR and US state laws. Security. legal and corporate communciation teams should be aware of what the statutory requirements are
- Are data loss prevention systems in effect for all communication channels and setup for regular PII discovery?
- Are DLP incidents reviewed and actioned timely?
- Is there an automated vulnerability management program in place for all on-premise and 3rd party hosted nodes? Does this include network infrastructure (e.g. Cisco IOS, appliance O/S’s, Linux machines) and databases (Oracle, SQL, PeopleSoft)
DPIA Outcomes and Signoff
DPIA’s should identify threats and vulnerabilities by severity level at the end of the exercise. It’s important that the information is reported to stakeholders and action plans are drawn up and signed-off on. Data processing should not go ahead if high risks are not remediated. Any remediation performed should be checked in change management procedures.