Privacy Impact Assessment
Privacy Impact Assessment
Overview
A Privacy Impact Assessment (PIA) is an instrument for assessing the potential impacts on privacy of a
process, information system, program, software module, device or other initiative which processes personal
information and in consultation with stakeholders, for taking actions as necessary to treat privacy risk.
A PIA report may include documentation about measures taken for risk treatment, for example,
measures arising from the use of the information security management system (ISMS) in ISO/IEC
27001.
A PIA is more than a tool: its process that begins at the earliest possible stages of an initiative, when
there are still opportunities to influence its outcome and thereby ensure privacy by design. It is a
process that continues until, and even after, the project has been deployed. Initiatives vary substantially in
scale and impact.1
This document is intended to provide scalable guidance that can be applied to all initiatives. Since
guidance specific to all circumstances cannot be prescriptive, the guidance in this document should be
interpreted with respect to individual circumstance. A Personal Information Controller may have a
responsibility to conduct a PIA and may request a Personal Information Processor to assist in doing
this, acting on the Personal Information Controller’s behalf. A Personal Information Processor or a
third party may also wish to conduct their own PIA.
1
NPC PRIVACY TOOLKIT
1 ISO/IEC 29134:2017 Information technology — Security techniques — Guidelines for privacy impact assessment
2
A
PRIVACY IMPACT
ASSESSMENT GUIDE
I. Project/System Description
a.D escription
Describe the program, project, process, measure, system or technology product and its context.
Define and specify what it intends to achieve. Consider the pointers below to help you describe
the project.
a. Will the project or system involve the collection of new information about individuals?
O No O Yes
b. Is the information about individuals sensitive in nature and likely to raise privacy concerns or
expectations e.g. health records, criminal records or other information people would consider
particularly private?
O No O Yes
c. Are you using information about individuals for a purpose it is not currently used for, or in a
way it is not currently used?
O No O Yes
d. Will the initiative require you to contact individuals in ways which they may find intrusive?
O No O Yes
e. Will information about individuals be disclosed to organizations or people who have not
previously had routine access to the information?
O No O Yes
f. Does the initiative involve you using new technology which might be perceived as being
privacy intrusive (e.g. biometrics or facial recognition)?
A
O No O Yes
g. Will the initiative result in you making decisions or taking action against individuals in ways
which can have a significant impact on them?
O No O Yes
O No O Yes
State all project stakeholders, consulted in conducting PIA. Identify which part they were involved.
(Describe how stakeholders were engaged in the PIA process)
Collect
User PII Collect PII Provide
registration
Store PII
PII
Transfer
Legend P
Transfer Transfer II Receive
Data Flow
Instruction
Delete
Service
Delete Delete
Figure 1. Information flow of personal information can be visualized in a work flow diagram on
personal information processing.
• Actions: The person responsible for conducting a PIA should consult with others in the
organization and perhaps external to the organization to describe the personal information flows
and specifically:
– how personal information is collected and the related source;
– who is accountable and who is responsible within the organization for the personal
information processing;
– for what purpose personal information is processed;
– how personal information will be processed;
– personal information retention and disposal policy;
– how personal information will be managed and modified;
– how will personal information processors and application developers protect personal
information;
– identify any personal information transfer to jurisdictions where lower levels of personal
information protection apply;
– whether applicable, notify the relevant authorities of any new personal information
processing and seek the necessary approvals.
Output of this process in terms of the information flow of personal information should be documented
in the PIA report
• Implementation Guidance:
Use of personal information (or transfer of personal information) may include approved data
sharing flows of personal information to other parties.
As an input to the PIA, the organization should describe the information flow in as detailed a
manner as possible to help identify potential privacy risks. The assessor should consider the
impacts not only on information privacy, privacy related regulations, e.g. telecommunications
acts. The whole personal information life cycle should be considered.
Identify the personal data involved and describe the data flow from collection to disposal by answering
the following questions below:
List all personal data (e.g. Personal Full Name, address, gender, phone number, etc.,) and state which
is/ are the sensitive personal information (e.g. race, ethnicity, marital status, health, genetic, government
issued numbers).
Collection
1. State who collected or will be collecting the personal information and/or sensitive information.
2. How the personal information/sensitive personal information is collected and from whom it
was collected?
» If personal information is collected from some source other than the individual?
STORAGE
1. Where is it currently being stored?
» Specify if the storing process is being done in-house or is it handled by a service provider
USAGE
1. How will the data being used or what is the purpose of its processing?
» Specify the processing activities where the personal information is being used.
RETENTION
1. How long are the data being retained? And Why?
» What is the basis of retaining the data that long? Specify the reason(s)
» Specify if the data retention process is being done in-house or is it handled by a service provider
DISCLOSURE /SHARING
1. To whom it is being disclosed to?
DISPOSAL/DESTRUCTION
1. How will the data be disposed?
Each program, project or means for collecting personal information should be tested for consistency with the
following Data Privacy Principles (as identified in Rule IV, Implementing Rules and Regulations of Republic
Act No. 10173, known as the “Data Privacy Act of 2012”). Respond accordingly with the questions by
checking either the “Yes” or “No” column and/or listing the what the questions may indicate.
Not
Transparency Yes No
applicable
Right to be informed
Right to object
Right to access
Right to correct
Right to damages
Not
Legitimate Purpose Yes No
applicable
Not
Proportionality Yes No
applicable
A
5. Are all the personal data collected necessary for the program?
Not
Use and Disclosure Yes No
applicable
Not
Data Quality Yes No
applicable
1. Please identify all steps taken to ensure that all data that is
collected, used or disclosed will be accurate, complete and
up to date:
1.1 *Please identify all steps taken to ensure that all data that is
collected, used or disclosed will be accurate, complete and
up to date:
1.5 *Staff are trained in the use of the tools and receive
periodic updates
Not
Data Security Yes No
applicable
Not
Organizational Security Yes No
applicable
Not
Physical Security Yes No
applicable
Not
Technical Security Yes No
applicable
Not
Disposal Yes No
applicable
Not
Cross-border Data Flows (optional) Yes No
applicable
For the purpose of this section, a risk refers to the potential of an incident to result in harm or danger
to a data subject or organization. Risks are those that could lead to the unauthorized collection, use,
disclosure or access to personal data. It includes risks that the confidentiality, integrity and availability of
personal data will not be maintained, or the risk that processing will violate rights of data subjects or
privacy principles (transparency, legitimacy and proportionality).
The first step in managing risks is to identify them, including threats and vulnerabilities, and by
evaluating its impact and probability.
Risk - “the potential for loss, damage or destruction as a result of a threat exploiting a
vulnerability”;
Vulnerability - “a weakness of an asset or group of assets that can be exploited by one or more
threats”;
Impact - severity of the injuries that might arise if the event does occur (can be ranked from
trivial injuries to major injuries); and
Impact
Unlikely Not expected, but there is a slight possibility it may occur at some
1
time.
Select the appropriate level or criteria of impact and probability to better assess the risk. Kindly refer to the
table below for the criteria.
Note: Try to itemize your risks by designating a reference number. This will be used as
a basis on the next sections (VII. Recommended Privacy Solutions and VIII. Sign off and
Action Plan). Also, base the risks on the violation of privacy principles, rights of data
subjects and confidenti- ality, integrity and availability of personal data.
Threats/
Ref# Vulnerabilities Impact Probability Risk Rating
1 2 3 4 1 2 3 4
1 2 3 4 1 2 3 4
1 2 3 4 1 2 3 4
1 2 3 4 1 2 3 4
Kindly follow the formula below for getting the Risk Rating:
Rating Types
1 Negligible
A
2 to 4 Low Risk
6 to 9 Medium Risk
4 4 8 12 16
3 3 6 9 12
I
M
P 2 2 4 6 8
A
C
T 1 1 2 3 4
1 2 3 4
PROBABILITY
From the risks stated in the previous section, identify the recommended solution or mitigation
measures. You can cite your existing controls to treat the risks in the same column.