PrivacyOps Certification

Course content

Create Account

Log in / Create account to save progress and earn badges

PrivacyOps Certification
View course details →

Types of Assessments

Mark Complete Enroll now to save progress and earn badges. Click to continue.

Privacy laws are evolving continuously, and organizations need to develop their privacy programs accordingly. Although GDPR has been broadly accepted across the EU, some of its member states like the UK, Ireland have introduced customized local data protection laws in addition to the principles of GDPR. Many US states have or are expected to pass comprehensive privacy laws based on the principles of CCPA. Similarly, Brazil, Thailand, Singapore, New Zealand, China, and many other countries have passed new data protection laws or have materially amended existing ones. The lack of uniformity between these regulations makes it very difficult for organizations to keep track of changes in compliance requirements. To ensure compliance with these changing privacy regulations, organizations usually complete the following types of  assessments:

  • Readiness AssessmentA Readiness Assessment evaluates whether an organization has undertaken the right measures (i.e., administrative, legal, and technical) to comply with specific privacy regulations and all its current data protection capabilities. A Readiness Assessment is far more than a checklist; it engages stakeholders from all business areas and uses questions with their responses to identify risks caused by gaps between current organization policies and regulatory requiremen
  • Privacy Impact AssessmentA PIA helps organizations identify and minimize the privacy risks of new projects, processes, or policies. PIA ensures that potential problems and privacy risks are identified at an early stage of a project when addressing them will be simpler and less costly. PIA requires organizations to have written policies and procedures that the organization can implement in their projects effectively.

 PIA can assist organizations to:

  • describe how personal information flows in a project 
  • analyse the possible impacts on individuals’ privacy
  • identify and recommend options for avoiding, minimising or mitigating negative privacy impacts 
  • build privacy considerations into the design of a project 
  • achieve the project’s goals by enhancing the positive privacy impacts
  • ensure the project is compliant with privacy laws.

A Privacy Impact Assessment also demonstrates to stakeholders that the project has been designed with privacy in mind. Conducting a PIA is part of good governance and good business practice for organizations that deal with personal information.

 Data Protection Impact Assessment

DPIA is a process that helps organizations identify and minimize the data protection risks of a project. A DPIA enables organizations to incorporate data protection considerations into organizational planning and demonstrate compliance to regulatory authorities. Conducting a DPIA for any significant project that requires personal data processing is considered good practice for privacy compliance. In some cases, DPIAs might be a legal requirement. For instance, under Article 35 of GDPR, organizations must complete a DPIA for data processing projects that are likely to result in a high risk to individuals. A DPIA must include the following:

  • Identify the nature, scope, context, and purposes of data processing;
  • Assess necessity, proportionality, and compliance measures;
  • Identify and assess risks to individuals data privacy; and
  • Identify any additional steps to mitigate those risks, including safeguards, security measures, and mechanisms to ensure personal data protection

Organizations usually need to keep their DPIA under review. They may need to repeat it if there is a substantial change to the nature, scope, context, or purposes of their processing. Therefore, it would be right to say that it’s important that organizations embed DPIAs into their organizational processes.

Furthermore, there are other assessments like legitimate interest, cross-border transfer impact, etc., which organizations often complete to ensure regulatory compliance.  Legitimate interest is the most flexible lawful basis for processing, but organizations cannot assume it will always be the most appropriate one. Therefore, organizations must conduct a Legitimate Interest Assessment to determine its appropriateness. A Legitimate Interest Assessment includes the following steps: 

  • identifies a legitimate interest;
  • shows that the processing is necessary to achieve it; and
  • balances it against the individual’s interests, rights, and freedoms.

Under the GDPR, transfers of personal data to countries outside the European Economic Area may occur if these countries are deemed to ensure an adequate level of data protection. Therefore, the organization conducts Cross Border Transfer Impact Assessment which assesses individuals’ privacy risks and data protection risks arising from the cross-border transfer of personal data.

Organizations also conduct assessments to collect information that they use to create or enrich data catalog items with information from the assessment responses. Once they publish such an assessment, the information collected is added to the data catalog entry for the asset or process.

These assessments may also be updated regularly. Multiple stakeholders are usually involved in understanding gaps and tracking new controls that the organization must implement. For all these assessments, privacy teams, business owners, and auditors typically rely on word processing documents, spreadsheets, and simple forms that result in work that is inefficient and hard to monitor.

XML Sitemap

Gartner Customers Choice Gartner Cool Vendor Award Forrester Badge IDC Worldwide Leader Gigaom Badge RSAC Leader CBInsights Forbes Security Forbes Machine Learning G2 Users Most Likely To Recommend IAPP Innovation award 2020