PIA Handbook
PIA Handbook
Part 1 – Background
information
Part 2 – The PIA
process
Appendix 1 – The
PIA screening
questions
Appendix 2 – Data
protection
compliance checklist
template
Appendix 3 – PECR
compliance checklist
template
Appendix 4 – Privacy
strategies
Using this handbook
Back to ICO
homepage Advice on using this handbook
Because organisations vary greatly in size, the extent to which their
activities intrude on privacy, and their experience in dealing with privacy
issues makes it difficult to write a ‘one size fits all’ guide. The purpose of
this handbook is to be comprehensive. It is important to note now that not
all of the information provided in this handbook will be relevant to every
project that will be assessed.
The handbook is split into two distinct parts. Part I (Chapters I and II) are
designed to give background information on the privacy impact
assessment (PIA) process and privacy. Part II is a practical “how to” guide
on the PIA process. The handbook’s structure is intended to enable a
reader who is knowledgeable about privacy to quickly start working on the
PIA. Background information on privacy and PIAs is provided for other
readers who would like some general information prior to starting the PIA
process.
It is also important to note that some of the recommendations in this
handbook may overlap with work which is being done to satisfy other
requirements, such as information security and assurance, other forms of
impact assessment or requirements to carry out broader consultations
during the development of a project. A PIA does not have to be conducted
as a completely separate exercise and it can be useful to consider privacy
issues in a broader policy context.
The term ‘project’ is used in this handbook to refer to whatever the activity
or function is that the organisation is assessing. However, for the purposes
of this handbook it could equally refer to a system, database, program,
application, service or a scheme, or an enhancement to any of the above,
or an initiative, proposal or a review, or even draft legislation.
Finally, the information in this handbook is provided purely as guidance to
organisations, to assist them in making their own judgements for each
project that they undertake which has potential privacy impacts. Each
organisation is encouraged to use the handbook to devise and implement
a PIA process that is appropriate to their circumstances.
« Previous | Top of page | Next »
Why do a PIA ?
Back to ICO
homepage Organisations take considerable care to manage a variety of risks,
including competitive manoeuvres by other corporations, natural disasters,
environmental contamination, cyber-attacks, and the risk of
embarrassment to executives and Ministers. ‘Issues management’ has
emerged as a common activity based on contingency planning.
Government and corporate reputations can be fragile and easily
undermined. In order to maintain and enhance their reputations these
organisations need to act responsibly in relation to key issues like privacy,
and to be seen to be acting responsibly. Experience shows that once an
organisation’s reputation is damaged and trust is lost it is then very hard to
regain that trust.
For many organisations, privacy now poses risks which need to be
professionally managed in a similar way to other categories of risk.
Organisations that handle personal data need to monitor their ongoing
operations, whether they are dealing with clients, employees, or the public
in general.
In summary, the reasons an organisation undertakes a PIA are as follows.
Identifying and managing risks.
Avoiding unnecessary costs.
Inadequate solutions
Avoiding loss of trust and reputation.
Informing the organisation’s communications strategy.
Meeting and exceeding legal requirements.
Identifying and managing risks
At senior levels of organisations, a PIA is part of good governance and
good business practice. A PIA is a means of addressing project risk as
part of overall project management. Risk management has considerably
broader scope than privacy alone, so organisations may find it appropriate
to plan a PIA within the context of risk management.
Avoiding unnecessary costs
By performing a PIA early in a project, an organisation avoids problems
being discovered at a later stage, when the costs of making significant
changes will be much greater. Making clear a project’s objectives, the
organisation’s requirements and the justifications for particular design
features all have important benefits for project management generally,
rather than just as part of a privacy impact assessment.
A further benefit of building privacy-sensitivity into the design from the
outset is that it could provide a foundation for a flexible and adaptable
system, reducing the cost of future changes and ensuring a longer life for
the application.
Inadequate solutions
Another problem which arises with privacy risks being discovered at a later
stage is that the solutions that are devised at this stage are often not as
effective at addressing and managing the privacy risks as solutions that
are designed into the project from the start.
Designing in privacy solutions can make a project more resistant to a
failure around individual privacy and better able to recover if a failure does
occur. Bolt-on solutions devised only after a project is up and running can
often be a sticking plaster on an open wound, providing neither the same
level of protection for the individual nor the confidence for the organisation
that privacy risks have been identified and adequately addressed.
Avoiding loss of trust and reputation
Customers value privacy. A PIA is a means of ensuring that systems are
not deployed with privacy flaws which will attract the attention of the
media, competitors, public interest advocacy groups or regulators, or give
rise to concerns among customers. In this context a PIA will help to
maintain or enhance an organisation’s reputation.
Addressing privacy issues raised in a PIA can mitigate the risks of low
adoption rates (or poor participation in the implemented scheme) due to a
poor perception of the scheme as a whole, or particular features of its
design or a loss of public credibility as a result of perceived harm to
privacy or a failure to meet expectations with regard to the protection of
personal information. It also helps mitigate the risk of retrospective
imposition of regulatory conditions as a response to public concerns about
the project, with inevitable additional and unbudgeted costs or even the
entire project being put at risk of being in non-compliance with the new
laws.
A PIA provides an organisation with an opportunity to obtain a commitment
from stakeholder representatives and advocates to support the project
from an early stage, in order to avoid the emergence of opposition at a late
and expensive stage in the design process.
Informing the organisation’s communications strategy
Linked to the importance of a loss of trust and reputation is the importance
of a PIA to an organisation’s media and communications strategy. As
stated above there is a risk of the collapse of a project as a result of
adverse publicity and/ or withdrawal of support by the organisation or one
or more key stakeholders.
Carrying out a PIA should enable the organisation to ensure that the
representative and advocacy organisations achieve an understanding of
the project and assess it from their own perspectives. It enables an
organisation to understand the perspectives of other stakeholders and
make the aims of the project better understood. It also provides
stakeholders the opportunity to have their perspectives reflected in the
project design.
By actively seeking out and engaging the concerns of stakeholders, even
those who are expected to oppose a particular project, you can discover
the reasoning behind their position and identify where further information
needs to be provided and pre-empt any possible misinformation
campaigns by opponents of the project.
Meeting and exceeding legal requirements
The Data Protection Act already stipulates eight data protection principles,
but these only address certain aspects of privacy. There are a range of
other pieces of legislation which have an impact on privacy and either
empower or prohibit certain acts which may intrude upon the privacy of the
individual. These are explored in more depth in the privacy law
compliance check in Chapter VI.
The Government has accepted their value and they will be used in all
Departments. Future Gateway reviews of ICT projects will check that they
have been carried out as an integral part of the risk management
assessment.
« Previous | Top of page | Next »
Part I Background information
Chapter I – Overview
When to do a PIA ?
Back to ICO
homepage Making any change to specifications, and fixing any error, requires re-work
which incurs delays and costs, and because it is error-prone it risks even
more work afterwards. The cost of making changes increases rapidly the
later in the project they are made. Therefore, privacy protective features
should be designed into a system, rather than bolted-on later.
In order to achieve that, the following guidelines are suggested.
Start early to ensure that project risks are identified and
appreciated before the problems become embedded in the design.
Commence a PIA as part of the project initiation phase (or its
equivalent in whichever project method the organisation uses).
If the project is already under way, start today, so that any major
issues are identified with the minimum possible delay.
While a PIA should be conducted at an early stage of a project,
compliance checks, on the other hand, are usually performed later, after
business processes and rules have been specified sufficiently so that they
can be assessed for their compliance with the law. Organisations are likely
to find it more effective to integrate the PIA within the project plan as a
whole, or within broader risk assessment and risk management activities.
The most beneficial and cost-effective approach may be to conceive of the
PIA as:
a cyclical process;
linked to the project’s own life-cycle; and
re-visited in each new project phase.
Each version can then take account of both the more detailed
specifications that are currently available for the scheme, and the
outcomes of previous phases of the PIA. More specifically, later versions
can correspond with the later phases of the project (eg requirements
analysis, logical design, physical design, construction, integration and
deployment of the new system, or their equivalents in whichever project
method the organisation uses).
« Previous | Top of page | Next »
Managing a PIA
Back to ICO
homepage This section provides some further guidance on managing the PIA
process, who should take responsibility, who carries out the PIA and the
role of the organisation’s data protection/ privacy officer.
Who should take responsibility for a PIA?
Responsibility for conducting a PIA should be placed at senior executive
level. A PIA has strategic significance, and therefore, direct responsibility
for the PIA must be assumed by a senior executive. It might also be
advisable to assign this responsibility to a senior executive with lead
responsibility for risk management, audit or compliance.
At an executive level, the following are suggested as appropriate
objectives for a PIA:
ensure effective management of the privacy impacts arising from
the project;
ensure effective management of the project risks arising from the
project’s privacy impacts; and
avoid expensive re-work and retro-fitting of features, by
discovering issues early, devising solutions at an early stage in the
project life-cycle, and ensuring that they are implemented.
Who should carry out a PIA?
In delegating responsibility for conducting a PIA, senior executives have
three alternatives:
an appointment within the overall project-team;
someone who is outside the project; or
an external consultant.
Where responsibility is delegated to a senior member of the project team,
this person must have a clear mandate to actively participate in the project
design decisions to ensure that those decisions reflect the outcomes from
the PIA process.
If the executive delegates responsibility for the PIA to someone outside the
project team, it may be difficult for that person to ensure a balanced
appreciation of the views of all stakeholders and to assimilate the
information generated. There is a possibility that the project team might
resist the conclusions and recommendations that result from the PIA
process.
Some organisations have decided to employ external consultants to carry
out a PIA, either because they feel that they do not have the necessary
skills in-house, or they want the PIA to be as independent as possible from
potential influences within the organisation. While there are sometimes
good reasons for ensuring the independence of the PIA process, this
handbook has been designed as a self-assessment tool. The advantages
of employing an independent consultant need to be weighed against the
disadvantages of resistance to the conclusions reached during the PIA,
the potential lack of understanding or appreciation of the organisation’s
needs and the business case for the project. As stated above, a PIA is
distinct from an audit process and so there is not as great a need for
independence throughout the process.
Regardless of who is asked to complete the PIA, the organisation must
take direct responsibility for the PIA team’s work, rather than delegating it.
Other involved organisations are likely to wish to participate in, and make
contributions to, the development of the project plan. In many cases, the
most appropriate approach to project governance will involve the formation
of a project steering committee.
The PIA project steering committee
A common approach is to establish a project steering committee (a group
that has directive powers), or a project advisory committee or project
reference or consultative group (a representative group whose function is
to discuss, advise and assist, but which has no formal powers to direct the
process).
A project steering committee normally has the power to give directions to
the project, whereas an advisory, reference or consultative group does
not. The title of any such body, however, is the choice of the organisation
concerned and should be consistent with terms used for similar groups.
With smaller projects, such arrangements are not practical, but measures
are needed that achieve clear communications among the three groups:
senior management;
the project team; and
representatives of, and advocates for, the various stakeholders.
Whether or not formal governance arrangements are adopted, it is
generally advisable for terms of reference for the PIA to be prepared and
agreed. Important elements of the terms of reference include:
the functions to be performed;
the deliverables;
the desired outcomes;
the scope of the assessment; and
the roles and responsibilities of various parties involved in the PIA.
The terms of reference should document the governance structure and
processes, including the nature of the delegation of responsibility and
authority provided to the person(s) or team(s) who are involved in the PIA.
Role of the organisation’s data protection/ privacy officer or
team
Often an organisation will delegate responsibility for conducting a PIA to
their data protection or privacy officer. While the ICO recommends that
this person is given a role in the steering committee or consultative group,
responsibility should only be delegated to the data protection or privacy
officer where they have sufficient authority to influence the design and
development of a project and participate fully in the project design
decisions.
Resourcing a PIA
Sufficient resources must be made available to enable effective and
efficient performance of the PIA. There are two aspects to this.
The members of the PIA team itself need to be provided adequate
time to carry out the PIA. The senior executive with overall
responsibility for the project may need to temporarily reallocate
responsibilities to devote sufficient time to conduct the PIA
thoroughly.
In addition, the time of staff outside the PIA team needs to be
considered and committed. The categories of employees who
need to be involved may come from executive, managerial and
operational levels, and include policy, technical, business process
design and legal staff.
Role of the Information Commissioner’s Office
The Information Commissioner’s Office provides information and guidance
to support the organisations that carry out PIAs, in particular through
publication of this handbook. In addition, the ICO may be available for
consultation on particular projects.
However, it needs to be emphasised that PIAs have been designed as a
self-assessment tool for organisations and the ICO does not have a formal
role in conducting them, approving or signing off any final report which is
produced.
« Previous | Top of page | Next »
What is privacy ?
Back to ICO
homepage Interpreted most broadly, privacy is about the integrity of the individual. It
therefore encompasses many aspects of the individual’s social needs.
However, for the purposes of completing a privacy impact assessment
(PIA) , it is more useful to examine different aspects of privacy. A PIA
could consider:
the privacy of personal information;
the privacy of the person;
the privacy of personal behaviour; and
the privacy of personal communications.
These four aspects of privacy will obviously overlap and should be seen as
working guides to the issues a PIA should explore, rather than strict
definitions.
Privacy of personal information is referred to variously as ‘data privacy’
and ‘information privacy’. Individuals generally do not want data about
themselves to be automatically available to other individuals and
organisations. Even where data is possessed by another party, the
individual should be able to exercise a substantial degree of control over
that data and its use. The last six decades have seen the application of
information technologies in many ways that have had substantial impacts
on information privacy.
Privacy of the person, sometimes referred to as ‘bodily privacy’, is
concerned with the integrity of the individual’s body. At its broadest, it
could be interpreted as extending to freedom from torture and right to
medical treatment, but these are more commonly seen as separate human
rights rather than as aspects of privacy. Issues that are more readily
associated with privacy include body searches, compulsory immunisation,
blood transfusion without consent, compulsory provision of samples of
body fluids and body tissue, and requirements for submission to biometric
measurement.
Privacy of personal behaviour relates to the observation of what
individuals do, and includes such issues as optical surveillance and ‘media
privacy’. It could relate to matters such as sexual preferences and habits,
political or trade union activities and religious practices. But the notion of
‘private space’ is vital to all aspects of behaviour, is relevant in ‘private
places’ such as the home and toilet cubicle, and is also relevant in ‘public
places’, where casual observation by the few people in the vicinity is very
different from systematic observation, the recording or transmission of
images and sounds.
Privacy of personal communications could include various means of
analysing or recording communications such as mail ‘covers’, the use of
directional microphones and ‘bugs’ with or without recording apparatus
and telephonic interception and recording. In recent years, concerns have
arisen about third party access to email messages. Individuals generally
desire the freedom to communicate among themselves, using various
media, without routine monitoring of their communications by other
persons or organisations.
« Previous | Top of page | Next »
Part I - Background information
Chapter II – Privacy, risks and solutions
Privacy risks
Back to ICO
homepage What do we mean by ‘privacy risks’?
The enormous increases in the collection, storage, use and disclosure of
personal data, and the imposition of many intrusive technologies, have
caused increased concern about individual privacy.
Privacy risks fall into two categories.
i. Risks to the individual as a result of contravention of their rights in
relation to privacy, or loss, damage, misuse or abuse of their personal
information.
ii. Risks to the organisation as a result of:
perceived harm to privacy;
a failure to meet public expectations on the protection of personal
information;
retrospective imposition of regulatory conditions;
low adoption rates or poor participation in the scheme from both
the public and partner organisations;
the costs of redesigning the system or retro-fitting solutions;
collapse of a project or completed system;
withdrawal of support from key supporting organisations due to
perceived privacy harms; and/ or
failure to comply with the law, leading to:
enforcement action from the regulator; or
compensation claims from individuals.
Recognising privacy risks
It is important to note that any collection, use or disclosure of personal
information has the potential to have a risk to personal privacy. Sometimes
those risks are not obvious and as a result it can be easy to overlook or
not adequately address them.
If the project design has reflected a strong understanding of privacy
issues, it is possible that the participants in the consultation processes
may agree to the design. However, because of project complexities and
the diversity of interests among stakeholders, the consultation processes
may sometimes create the need for parts of the project and its design to
be re-considered.
This section provides some guidance on the type of risks, impacts and
vulnerabilities you might look for when designing a project or conducting a
PIA.
Broad personal information issues, including:
The nature of the personal information. This could include
“sensitive personal data” as defined by the Data Protection Act
1998, but also personal financial information, family structures,
home and personal email addresses, information about persons
considered “at risk”, travel plans etc.
The quality of personal information. This includes characteristics of
the information itself, such as accuracy, relevance and adequacy.
The further personal information moves from its original context,
the greater the likelihood it can be misinterpreted. The quality of
information also raises questions about data matching and mining,
whether you are matching like with like and the number of false
matches which may be produced.
The meaning behind terms used in personal information. This
takes into account that terms used can be context or sector
specific. Variations in meaning of apparently similar terms may
give rise to misunderstandings or error which in turn could result in
harm or disadvantage to the individual. This area would also
include examining metadata attached to personal information.
The retention, deletion and destruction of personal information.
How long do your business needs require retention of information?
Are there legal obligations to dispose of or retain data? Do you
need to keep information to counter legal claims or for audit and
inspection purposes? Can your organisation make better use of
‘soft deletion’, where after the original purpose has been met,
access to the information is much more tightly controlled until the
organisation can permanently delete it?
The protection of personal information. This includes the
effectiveness of privacy protections. An effective privacy protection
regime requires all of the following to be in place:
clear specifications of privacy protections;
clear prohibitions against breaches of protections;
clear sanctions or penalties for breaches of
protections;
mechanisms in place to detect and report breaches;
and
resources for investigating breaches and applying
sanctions.
Issues around identification of the individual, including:
the multiple use of different identifiers;
the denial of anonymity, identifying individuals where it is only
necessary to authenticate rights to benefits, access and services;
identifiers that directly disclose personal data, for example
embedded date-of-birth;
identifiers linked with authenticators, such as credit card number
plus additional details, because that creates the risk of identity
fraud and in extreme cases even identity theft; and
the use of biometric identifiers.
Function creep, beyond the original context of use, in relation to the use
of personal information or the use of identifiers.
Registration and authentication processes, including the burden such
processes impose, their intrusiveness, and the exercise of power by
government over individuals.
Surveillance, whether audio, visual, by means of data, whether
electronically supported or not, and whether the observations are recorded
or not.
Location and tracking, whether within geographical space or on
networks, even where it is performed incidentally, and especially where it
gives rise to a record. From the perspective of privacy protection, there are
considerable privacy benefits in decentralisation rather than centralisation.
The benefits include:
reducing the risk of function creep;
enabling the application of access controls;
encouraging a focus on relevancy;
reducing the misinterpretation of data due to a loss of context; and
increasing the likelihood of prompt data destruction when it is no
longer required.
Where a project involves centralising information, it is important that there
is clear justification. Further, those who want to use information in a more
speculative manner (such as ‘statistical analysis’, ‘management reporting’
and ‘data mining’) need to be challenged for greater detail, and to show
that benefits will be achievable. Once a case for centralisation has been
established, it is necessary to identify, assess and balance the
disadvantages.
Intrusions into the privacy of the person, especially compulsory or
pseudo-voluntary (such as in employment relationships) yielding of tissue
and body-fluid samples, and biometric measurement. It is highly advisable
to document the issues which are identified.
Persons at risk, and vulnerable populations
Some people, in some circumstances, face particularly serious risks if their
personal data is disclosed. This applies especially to their physical
location or data that may result in disclosure of their physical location. It
may also apply to, for example, health care or financial data. Useful
generic terms for people to whom this applies are ‘persons at risk’ and
‘vulnerable populations’.
Categories of persons whose physical safety is at risk include:
people who are under the direct threat of violence, including:
people concealing themselves from previous
criminal associates;
victims of domestic violence;
protected witnesses;
people who have been the subject of threats to their
safety.
celebrities, notorieties and VIPs, including:
politicians;
entertainers and sportspeople;
people ‘in the public eye’, such as lottery winners;
or
those who publicly promote controversial views.
people in security-sensitive roles, such as:
national security operatives;
undercover police;
prison warders;
staff in psychiatric institutions.
Even where physical safety is not under threat, care may still be needed in
respect of ‘vulnerable populations’, some of whom may find it difficult to
exercise control over their personal data. Examples might include younger
children or adults who lack capacity to provide consent. Your organisation
might also want to consider the difficulties faced by individuals who are
homeless, those who are or have been recently been in prison or
refugees. Certain health conditions might also put individuals at risk if
inappropriately disclosed.
Issues around the exercise of rights by individuals, such as whether
personal information can be quickly and expediently identified, accessed,
corrected or deleted. You should also consider whether an individual is
disadvantaged in any way if they choose to assert their rights.
Future economic and social developments can also be considered.
Relevant legal considerations need to be taken into account, including
liabilities that may arise and changes to regulatory impositions which may
be necessitated by the project or by the public reaction to your project.
The conclusions regarding design features should be documented in the
‘issues register’, and provided to the project team as a whole. This is
described in the later activities of the consultation and analysis phase.
« Previous | Top of page | Next »
2. Preparation phase
Back to ICO
homepage This is phase two of the five-phase PIA process.
The purpose of this phase is to make the arrangements needed to enable
the critical phase three to run smoothly.
The suggested deliverables are a stakeholder analysis, a consultation
strategy and plan, and the establishment of a PIA consultative group
(PCG). The following tasks are suggested:
Develop a consultation plan to ensure that discussions with
stakeholders are effective.
Form a PIA consultative group (PCG). This comprises
representatives of stakeholder groups.
Distribute the project background paper to the PCG. This ensures
that the PCG members can understand the nature of the proposal.
Developing a consultation plan
Any project that is sufficiently complex and potentially privacy-threatening
that it requires a full-scale PIA is likely to affect many parties. To ensure
you make the most of the consultation and analysis phase, it is useful to
put a consultation plan in place.
Remember that any consultation should be appropriate to the scale, scope
and nature of the project for which a PIA is being completed. Large-scale
projects that embody significant privacy risks, might use most or all of the
methods described below. In small-scale projects it may not be necessary
to use all of these. Some organisations might already have a well-
developed consultation strategy in place and there is no reason why any
PIA consultation cannot be completed within this strategy. For those
organisations who do not have a consultation strategy in place, further
advice is provided below.
Effective consultation depends on all stakeholders being sufficiently well-
informed about the project, having the opportunity to convey their
perspectives and their concerns, and developing confidence that their
perspectives are being reflected in the design.
It is common for consultation processes to result in changes to the project
and to its design. In order to make the maximum contribution to risk
management in return for the smallest cost, consultation therefore needs
to commence early and continue throughout the project life-cycle. Some
useful ways of ensuring effective consultation include:
priming of discussions by providing some initial information about
the project;
making sure there is ongoing dialogue with consultees throughout
the PIA process;
participation of representatives of, and advocates for, stakeholder
groups who have appropriate background in the technologies,
systems and privacy impacts involved;
facilitated interactions among the participants;
making sure that there is sufficient diversity among those groups
or individuals being consulted, to ensure that all relevant
perspectives are represented, and all relevant information is
gathered;
making sure that each group has the opportunity to provide
information and comment, even including multiple rounds of
consultation where necessary;
making sure that the method of consultation suits the consultation
group, for example using workshops or focus groups as an
alternative to, or even as well as, formal written consultation;
making sure that the information provided by all parties to the
consultation is fed into the subsequent rounds of design and
implementation activities; and
ensuring that the perspectives, concerns and issues raised during
the consultation process are seen to be reflected in the outcomes
of the PIA process.
Devise communication processes that will enable the effective interchange
of ideas. This may involve workshops and meetings, perhaps
supplemented by formal submissions.
Where security considerations or indeed other privacy concerns prevent
the consultation processes from being fully open, it is suggested that:
the PIA be undertaken in as open a manner as is possible;
parts which have security concerns be separated into closed or
confidential appendices and separate, relatively closed discussion
sessions; and
where security considerations result in the suppression of
information, proxy measures be devised that are as effective and
credible as possible. (For example, the security-sensitive
information could be provided to a trusted third party who could
then deliver to PCG members evaluative comments that avoid
exposing the information).
« Previous | Top of page | Next »
4. Documentation phase
Back to ICO
homepage This is phase four of the five-phase PIA process.
A privacy impact assessment is a process. The benefits to the
organisation that conducts it arise mainly from that process, in the form of
learning and adaptation, partly by the stakeholders, and partly by the
organisation and the team responsible for the project.
There are, however, advantages in generating a final document towards
the end of the PIA process. The purpose of this phase is to document the
PIA process and the outcomes. The suggested deliverable is a PIA report.
The following tasks are suggested:
Consolidate the decisions on avoidance and mitigation measures
into a final version of the issues register and/ or privacy design
features paper.
Produce a PIA report.
Make the PIA report available to the PCG.
Publish the PIA report (withholding any security-sensitive
information in confidential, or closed, appendices).
The reasons for preparation of a PIA report are:
as an element of accountability, in order to demonstrate that the
PIA process was performed appropriately;
to provide a basis for post-implementation review;
to provide a basis for audit;
to provide corporate memory, ensuring that the experience gained
during the project is available to those completeing new PIAs if
original staff have left; and
to enable the experience gained during the project to be shared
with future PIA teams and others outside the organisation.
The following are key elements of a PIA report:
A description of the project.
An analysis of the privacy issues arising from it.
The business case justifying privacy intrusion and its implications.
Discussion of alternatives considered and the rationale for the
decisions made.
A description of the privacy design features adopted to reduce and
avoid privacy intrusion and their implications of these design
features.
An analysis of the public acceptability of the scheme and its
applications.
Possible sources for the content of the PIA report include:
A summary of the consultative processes undertaken.
Contact details of organisations and individuals with whom
consultations were undertaken.
The project background paper(s) provided to those consulted.
The PIA project plan.
The issues register and/ or privacy design features paper(s).
References to relevant laws, codes and guidelines.
At a late stage, once the design has been checked for legal compliance, it
may be appropriate to add the following as appendices to the PIA report:
the Privacy law compliance study; and
the Data Protection Act compliance study.
A PIA report should be written with the expectation that it will be published,
or at least be widely distributed. If so, the report can fulfil the functions
listed above: accountability, post-implementation review, audit, input into
future iterations of the PIA, and background information for people
conducting PIAs in the future.
Some of the information gathered during a PIA process may be subject to
security or commercial sensitivities. In such cases, it may be appropriate
for the detailed information to be in confidential, or closed, appendices.
Such information suppression, however, needs to be limited to only that
which is justified. Sufficient information needs to be included within the PIA
report to ensure that the arguments and assessments are complete,
informative and comprehensible.
« Previous | Top of page | Next »
Overview
Back to ICO
homepage Projects with potentially substantial privacy impacts warrant a full-scale
privacy impact assessment (PIA) process. Other projects require attention,
but do not warrant as great an investment of time and resources. A small-
scale PIA involves analysis of the privacy issues arising from the aspect or
aspects that the screening process in Chapter III has highlighted through
the application of the criteria for small-scale PIA in Appendix 1, Step 2.
A small-scale PIA process differs considerably from a full-scale PIA. In
particular:
it is less formalised;
it involves less investment;
it calls for less exhaustive analysis and information-gathering, and
it is more likely to be focused on specific aspects of a large-scale
project rather than the project as a whole.
Because projects vary greatly, a process should be devised that fits the
need, is as comprehensive as it needs to be, but is only as resource-
intensive as is appropriate in the circumstances. This part draws on the
full-scale privacy impact assessment process described in Chapter IV of
this handbook, but is much briefer. The guidance is in two parts:
Background information intended to assist organisations to gain an
appreciation of the kinds of projects for which a small-scale PIA is
appropriate, and its key characteristics.
The PIA process:
preliminary phase;
preparation phase;
consultation and analysis phase(s);
documentation phase;
review and audit phase.
« Previous | Top of page | Next »
Responsibilities
Back to ICO
homepage The organisation proposing the project is responsible for undertaking a
survey of the law relevant to the project and to the data processing and
business processes it gives rise to. All participating organisations should
do the same in connection with their involvement in the project.
Professionals with relevant expertise should be consulted as part of
checking compliance with privacy law and other legal obligations. If your
organisation has an in-house compliance unit or established compliance
process, it might be useful to ensure that the compliance checking process
takes full account of privacy law obligations and adds to the compliance
checking process if necessary.
« Previous | Top of page | Next »
Compliance checking
Back to ICO
homepage The organisation must evaluate the project process and the resulting
design, in order to ensure that it is compliant with the Data Protection Act.
Unlike a privacy impact assessment (PIA), which is best commenced early
in the project life-cycle, compliance checking is normally conducted later,
once the design has reached a detailed stage.
Each participating organisation must evaluate the activities it will
undertake as part of the resulting system or scheme, in order to ensure
that it is compliant with the Data Protection Act.
A detailed template is provided in Appendix 2 to assist in checking the
compliance of a design against the data protection principles. There is a
further template in Appendix 3 to assess compliance with PECR. These
templates are not comprehensive compliance tools in themselves, but do
point to the issues you need to address as part of your own organisation’s
compliance checking procedures. They can be a useful starting point for
developing in-house compliance checking procedures or quality assuring
existing compliance tools your organisation already has in place.
Postponing or redesigning a project
To the extent that the design is not compliant with data protection law, it
may be necessary to change the design prior to deployment, in order to
achieve compliance.
« Previous | Top of page | Next »
ICO publications
Back to ICO
homepage Further information is available on the ICO website on topics including:
Privacy by Design
Empowering individuals to control their personal information
Information Sharing
CCTV
Data security tip
Marketing
In addition, the ICO have produced a range of guidance on data protection
and the Privacy and Electronic Communications Regulations
Other sources of help and advice
Further guidance on data protection is available from the Ministry of
Justice.
In addition the Cabinet Office Central Sponsor for Information Assurance
completed their Data Handling Review in 2008 and have published core
mandatory minimum measures to protect personal data, including the use
of privacy impact assessments.
« Previous | Top of page | Next »
Back to ICO
homepage Appendix 1
PIA screening process
Step 1 – Criteria for full- scale PIA
This section provides guidance for evaluating whether a full-scale PIA
should be conducted. The evaluation depends on sufficient information
about the project having been collected during the previous step.
The evaluation process involves answering the following set of 11
questions about key characteristics of the project and the system that the
project will deliver.
The answers to the questions need to be considered as a whole, in order
to decide whether the overall impact, and the related risk, warrant
investment in a full-scale PIA. The questions are shown below in bold.
Guidance in relation to the interpretation of each question is provided in
plain text.
Following the series of screening questions, further guidance is given on
undertaking this analysis
The 11 questions about key project characteristics
Technology
(1) Does the project apply new or additional information
technologies that have substantial potential for privacy
intrusion ?
Examples include, but are not limited to, smart cards, radio frequency
identification (RFID) tags, biometrics, locator technologies (including
mobile phone location, applications of global positioning systems (GPS)
and intelligent transportation systems), visual surveillance, digital image
and video recording, profiling, data mining, and logging of electronic traffic.
Identity
(2) Does the project involve new identifiers, re -use of existing
identifiers, or intrusive identification, identity authentication or
identity management processes ?
Examples of relevant project features include a digital signature initiative, a
multi-purpose identifier, interviews and the presentation of identity
documents as part of a registration scheme, and an intrusive identifier
such as biometrics. All schemes of this nature have considerable potential
for privacy impact and give rise to substantial public concern and hence
project risk.
(3) Might the project have the effect of denying anonymity and
pseudonymity, or converting transactions that could previously
be conducted anonymously or pseudonymously into identified
transactions ?
Many agency functions cannot be effectively performed without access to
the client's identity. On the other hand, many others do not require
identity. An important aspect of privacy protection is sustaining the right to
interact with organisations without declaring one's identity.
Multiple organisations
(4) Does the project involve multiple organisations, whether they
are government agencies (eg in 'joined-up government'
initiatives) or private sector organisations (eg as outsourced
service providers or as 'business partners')?
Schemes of this nature often involve the breakdown of personal data silos
and identity silos, and may raise questions about how to comply with data
protection legislation. This breakdown may be desirable for fraud detection
and prevention, and in some cases for business process efficiency.
However, data silos and identity silos are of long standing, and have in
many cases provided effective privacy protection. Particular care is
therefore needed in relation to preparation of a business case that justifies
the privacy invasions of projects involving multiple organisations.
Compensatory protection measures should be considered.
Data
(5) Does the project involve new or significantly changed
handling of personal data that is of particular concern to
individuals ?
The Data Protection Act at s.2 identifies a number of categories of
'sensitive personal data' that require special care. These include racial and
ethnic origin, political opinions, religious beliefs, trade union membership,
health conditions, sexual life, offences and court proceedings.
There are other categories of personal data that may give rise to
concerns, including financial data, particular data about vulnerable
individuals, and data which can enable identity theft.
Further important examples apply in particular circumstances. The
addresses and phone-numbers of a small proportion of the population
need to be suppressed, at least at particular times in their lives, because
such 'persons at risk' may suffer physical harm if they are found.
(6) Does the project involve new or significantly changed
handling of a considerable amount of personal data about each
individual in the database ?
Examples include intensive data processing such as welfare
administration, healthcare, consumer credit, and consumer marketing
based on intensive profiles.
(7) Does the project involve new or significantly changed
handling of personal data about a large number of individuals ?
Any data processing of this nature is attractive to organisations and
individuals seeking to locate people, or to build or enhance profiles of
them.
(8) Does the project involve new or significantly changed
consolidation, inter -linking, cross -referencing or matching of
personal data from multiple sources?
This is an especially important factor. Issues arise in relation to data
quality, the diverse meanings of superficially similar data-items, and the
retention of data beyond the very short term.
Exemptions and exceptions
(9) Does the project relate to data processing which is in any
way exempt from legislative privacy protections?
Examples include law enforcement and national security information
systems and also other schemes where some or all of the privacy
protections have been negated by legislative exemptions or exceptions.
(10) Does the project's justification include significant
contributions to public security measures ?
Measures to address concerns about critical infrastructure and the
physical safety of the population usually have a substantial impact on
privacy. Yet there have been tendencies in recent years not to give
privacy its due weight. This has resulted in tensions with privacy interests,
and creates the risk of public opposition and non-adoption of the
programme or scheme.
(11) Does the project involve systematic disclosure of personal
data to, or access by, third parties that are not subject to
comparable privacy regulation ?
Disclosure may arise through various mechanisms such as sale,
exchange, unprotected publication in hard-copy or electronically-
accessible form, or outsourcing of aspects of the data-handling to sub-
contractors.
Third parties may not be subject to comparable privacy regulation because
they are not subject to the provisions of the Data Protection Act or other
relevant statutory provisions, such as where they are in a foreign
jurisdiction. Concern may also arise in the case of organisations within the
UK which are subsidiaries of organisations headquartered outside the UK.
Facing facts early
The key characteristics addressed here represent significant risk factors
for the project and their seriousness should not be downplayed. It should
also be remembered that the later the problems are addressed, the higher
the costs will be to overcome them.
Perspectives to consider
It is important to appreciate that the various stakeholder groups may have
different perspectives on these factors. If the analysis is undertaken solely
from the viewpoint of the organisation itself, it is likely that risks will be
overlooked. It is therefore recommended that stakeholder perspectives are
also considered as each question is answered.
In relation to the individuals affected by the project, the focus needs to be
more precise than simply citizens or residents generally, or the population
as a whole. In order to ensure a full understanding of the various
segments of the population that have an interest in, or are affected by, the
project, the stakeholder analysis that was undertaken as part of the
preparation step may need to be refined. For example, there are often
differential impacts and implications for people living in remote locations,
for the educationally disadvantaged, for itinerants, for people whose first
language is not English, and for ethnic and religious minorities.
Applying the criteria
Once each of the 11 questions has been answered individually, the set of
answers needs to be considered as a whole, in order to reach a
conclusion as to whether a full-scale PIA is warranted. If it is, a conclusion
is also needed as to whether the scope of the PIA should be wide-ranging,
or focused on particular aspects of the project. The full-scale PIA is
described in detail in chapter IV. Before proceeding to that part, however,
it is necessary to continue with steps three and four of the screening
process, to determine whether compliance checking should also be
included in the project schedule.
Step 2 – Criteria for small- scale PIA
This section provides guidance for evaluating whether a small-scale PIA
should be conducted.
The evaluation depends on sufficient information about the project having
been collected when preparing for the PIA screening process. If a prior
PIA has been performed in relation to the existing system, this will also
provide useful input to the process. The evaluation process involves
answering a set of questions about characteristics of the project or the
system that the project will deliver. These are factors that tend to give rise
to concern among at least some parts of the general public, and
accordingly may be judged to represent project risk factors. The questions
are shown below in bold. Where guidance is provided in relation to the
interpretation of a question, it is provided in plain text.
The 15 questions about project characteristics
Technology
(1) Does the project involve new or inherently privacy-invasive
technologies?
Examples of such technologies include, but are not limited to, smart cards,
radio frequency identification (RFID) tags, biometrics, locator technologies
(including mobile phone location, applications of global positioning
systems (GPS) and intelligent transportation systems), visual surveillance,
digital image and video recording, profiling, data mining, and logging of
electronic traffic. Technologies that are inherently intrusive, and
technologies that are new and sound threatening, excite considerable
public concern, and hence represent project risk.
In order to answer this question, considerations include:
whether all of the information technologies that are to be applied in
the project are already well-understood by the public;
whether their privacy impacts are all well-understood by the
organisation, and by the public;
whether there are established measures that avoid negative
privacy impacts, or at least reduce them to the satisfaction of those
whose privacy is affected; and
whether all of those measures are being applied in the design of
the project.
Justification
(2) Is the justification for the new data-handling unclear or
unpublished ?
Individuals are generally much more accepting of measures, even
measures that are somewhat privacy-intrusive, if they can see that the
loss of privacy is balanced by some other benefits to themselves or society
as a whole. On the other hand, vague assertions that the measures are
needed 'for security reasons', or 'to prevent fraud', are much less likely to
calm public disquiet.
Identity
(3) Does the project involve an additional use of an existing
identifier ?
(4) Does the project involve use of a new identifier for multiple
purposes?
(5) Does the project involve new or substantially changed
identity authentication requirements that may be intrusive or
onerous ?
The public understands that an identifier enables an organisation to collate
data about an individual, and that identifiers that are used for multiple
purposes enable data consolidation. They are also aware of the
increasingly onerous registration processes and document production
requirements imposed by organisations in recent years. From the
perspective of the project manager, these are warning signs of potential
privacy risks.
Data
(6) Will the project result in the handling of a significant amount
of new data about each person, or significant change in existing
data-holdings ?
(7) Will the project result in the handling of new data about a
significant number of people, or a significant change in the
population coverage?
(8) Does the project involve new linkage of personal data with
data in other collections, or significant change in data linkages ?
The degree of concern about a project is higher where data is transferred
out of its original context. The term 'linkage' encompasses many kinds of
activities, such as the transfer of data, the consolidation of data-holdings,
the storage of identifiers used in other systems in order to facilitate the
future searches of the current content of records, the act of fetching data
from another location (eg to support so-called 'front-end verification'), and
the matching of personal data from multiple sources.
Data handling
(9) Does the project involve new or changed data collection
policies or practices that may be unclear or intrusive?
(10) Does the project involve new or changed data quality
assurance processes and standards that may be unclear or
unsatisfactory?
(11) Does the project involve new or changed data security
arrangements that may be unclear or unsatisfactory?
(12) Does the project involve new or changed data access or
disclosure arrangements that may be unclear or permissive ?
(13) Does the project involve new or changed data retention
arrangements that may be unclear or extensive ?
(14) Does the project involve changing the medium of disclosure
for publicly available information in such a way that the data
becomes more readily accessible than before?
Exemptions
(15) Will the project give rise to new or changed data-handling
that is in any way exempt from legislative privacy protections?
Perspectives to consider
As with the criteria for full-scale PIA, risks may be overlooked unless
these questions are considered from the various perspectives of each of
the stakeholder groups, rather than just from the viewpoint of the
organisation that is conducting the project.
Similarly, in relation to the individuals affected by the project, it may not be
adequate to think in terms of citizens or residents generally, or the
population as a whole. In order to ensure a full understanding of the
various segments of the population that have an interest in, or are affected
by, the project, the stakeholder analysis that was undertaken as part of the
preparation step may need to be refined. There are often different impacts
and implications for different sections of the population, especially
disadvantaged groups.
Applying the criteria
Where the answers to questions are “Yes”, consideration should be given
to the extent of the privacy impact and the resulting project risk. The
greater the significance, the more likely that a small-scale PIA is
warranted.
If only one or two aspects give rise to privacy concerns, a small-scale PIA
may still be justified. In these circumstances the PIA process should be
designed to focus on the areas of concern. If, on the other hand, multiple
questions are answered “Yes”, a more comprehensive assessment is
appropriate.
The small-scale PIA is described in chapter V. Before proceeding to that
part, however, it is necessary to continue with steps three and four of the
screening process, to determine whether compliance checking should also
be included in the project schedule.
Step 3 – Criteria for privacy law compliance checks
Senior executives of government agencies and company directors must
ensure that the operations for which they are responsible comply with all
relevant laws. The purpose of this section of the handbook is to assist
organisations in complying with privacy-related laws. The services of a
legal professional with relevant expertise may be needed. If any of the
following questions are answered "Yes", then a privacy law compliance
check should be conducted:
1. Does the project involve any activities (including any data handling),
that are subject to privacy or related provisions of any statute or other
forms of regulation, other than the Data Protection Act?
In particular, the following laws and other forms of regulation should be
considered, but the list may not be exhaustive.
The Human Rights Act, in particular Schedule 1, Article 8 (right to
respect for private and family life) and Article 14 (prohibition of
discrimination).
The Regulation of Investigatory Powers Act 2000 (RIPA) and
Lawful Business Practice Regulations 2000.
The Privacy and Electronic Communications Regulations 2003
(PECR).
The Data Retention (EC Directive) Regulations 2007.
In the case of government agencies, the statutes under which the
agency or programme operates.
Statutes that impose regulatory conditions on the manner in which
the organisation operates.
Sectoral legislation, eg Financial Services and Markets Act 2000.
Statutory codes, eg the Information Commissioner’s CCTV code of
practice.
Where projects are cross-jurisdictional the law of more than one country
may be involved and other legal provisions may also need to be
considered.
2. Does the project involve any activities (including any data handling) that
are subject to common law constraints relevant to privacy?
In particular, the following should be considered:
confidential data relating to a person, as that term would be
understood under the common law of confidence;
the tort of privacy as it develops through case law.
3. Does the project involve any activities (including any data handling) that
are subject to less formal good practice requirements relevant to privacy?
In particular, the following should be considered:
industry standards, eg the BS ISO / IEC 17799:2005 Information
Security Standard;
industry codes, eg the NHS Code of Practice on Confidentiality.
Privacy law compliance checking is described in chapter VI of this
handbook. Before proceeding to that part, however, organisations must
continue with step four of the screening process, to determine whether
Data Protection Act compliance checking also needs to be included in the
project schedule. Note that compliance checking activities are usually
conducted reasonably late in the overall project schedule, once detailed
information about business processes and business rules is available.
Step 4 – Criteria for Data Protection Act compliance checks
Senior executives of government agencies and company directors must
ensure that the operations for which they are responsible comply with all
relevant laws. The purpose of this section of the handbook is to assist
organisations in that endeavour.
The services of a professional with relevant legal expertise may be
needed.
If the following question is answered ”Yes”, then a Data Protection Act
compliance check should be conducted:
Does the project involve the handling of any data that is personal data, as
that term is used in the Data Protection Act?
‘Personal data’ means data which relate to a living individual who can be
identified:
(a) from those data, or
(b) from those data and other information which is in the possession of, or
is likely to come into the possession of, the data controller, and includes
any expression of opinion about the individual and any indication of the
intentions of the data controller or any other person in respect of the
individual (Data Protection Act, s.1).
Data Protection Act compliance checking is described in chapter VII.
Before proceeding to that part, however, it is advisable to return to the
screening process and review the outcomes of the four steps.
Note that, where a PIA is needed, it should be commenced at an early
stage of the overall project, whereas compliance checking activities are
usually conducted only once a fairly mature stage of business process
design has been reached.
« Previous | Top of page | Next »
Appendix 2
Back to ICO
homepage Data Protection Act Compliance Check Template
This checklist aims to assist organisations proposing change to investigate
whether the personal information aspects of their project comply with the
Principles in Schedule 1 of the Data Protection Act (DPA).
It has been designed as a template to be deployed on desktops, portable
computers (provided they are secure) or internal websites for use by any
employee proposing change. Where so adopted by agencies, the template
may need to be modified to add organisation-specific details.
It should be noted that many terms used in the Schedule 1 Principles have
meanings specific to the Data Protection Act, and it would be prudent to
refer to the Act for definition for those terms. Another useful reference in
this regard is the Information Commissioner's Legal Guidance. Users are
also encouraged to seek guidance from sources such as the organisation’s
Data Protection Officer, legal unit or external lawyers/ consultants.
I BASIC INFORMATION – New or existing Project, System, Technology
or Legislation
1. Organisation and Project
Organisation
Branch / Division
Project
*IMPORTANT NOTE:
‘Personal data’ means data which relate to a living individual who
can be identified:
(a) from those data, or
(b) from those data and other information which is in the
possession of, or is likely to come into the possession of, the data
controller,
and includes any expression of opinion about the individual and
any indication of the intentions of the data controller or any other
person in respect of the individual.
(Data Protection Act, section 1)
1.1 Preliminary
1.1.1 What type of personal data are you processing?
Please give examples of any sensitive personal data that you are
processing.
1.1.2 Are sensitive personal data being differentiated from other forms of
personal data?
Yes No
If yes, please specify procedures. If no, please indicate why not.
1.2.2 Have you identified the purposes for which you will be
processing personal data and how?
Yes No
If yes, please list them. If no, please indicate why not.
1.2.3 Have you identified which of the grounds in Schedule 2 you will be
relying on as providing a legitimate basis for processing personal data?
Yes No
If yes, please list them. If no, please indicate why not.
1.3.2 Have you identified the purposes for which you will be processing
sensitive personal data?
Yes No
If yes, can you list them. If no, please indicate why not.
1.3.3 Have you identified which of the grounds in Schedule 3 you will be
relying on as providing a legitimate basis for processing sensitive personal
data?
Yes No
If yes, can you list them. If no, please indicate why not.
1.4.2 For the processing of sensitive personal data, are you relying on
explicit consent as specified in Schedule 3, s1 of the Data Protection Act?
Yes No
If so, when and how will that consent obtained?
1.5.2 How is compliance with the Human Rights Act being assessed?
b. All organisations:
1.5.3 Are you assessing whether any of the personal data being
processed is held under a duty of confidentiality?
Yes No
If yes, how will that assessment made? If no, please indicate why not.
1.5.5 Are you assessing whether your processing is subject to any other
legal or regulatory duties?
Yes No
If yes, how is that assessment being made? If no, please indicate why not.
1.5.6 How are you ensuring that those legal duties are being complied
with?
1.6.2 How are individuals being made aware of how their personal data is
being used?
1.6.3 How are individuals offered the opportunity to restrict processing for
other purposes?
1.7.1 Do you provide individuals with all of the information in the box
above?
Personal data shall be obtained only for one or more specified and
lawful purposes, and shall not be further processed in any manner
incompatible with that purpose or those purposes.
For the Information Commissioner’s guidance in relation to this
DPP, see Legal Guidance pp 35-6
2.1.3 Does the record cover processing carried out on your behalf (eg by a
subcontractor)?
Yes No
2.1.4 What is the procedure for notifying (where necessary) the data
subject of the purpose for processing their personal data?
(Cross reference with section 1.6, Fair Processing)
2.2.3 What checks are being made to ensure that further processing is not
incompatible with its original purpose?
2.3.4 Do you assess the compatibility of a 3rd party’s use of the personal
data to be disclosed?
Yes No
If no, go to section 3.1
If yes, how do you make the assessment?
3.1.3 What procedures are in place for periodically checking that data
collection procedures are adequate, relevant and not excessive in relation
to the purpose for which data are being processed?
3.1.4 Are there procedures for assessing the amount and type of personal
data collected for a particular purpose?
Yes No
If yes, please describe. If no, please indicate why not.
3.1.5 Are items of personal data held in every case which are only relevant
to a subset of those cases?
Yes No
4.1.4 Are the sources of personal data (i.e. Data Subject, Data User, or
third party) identified in the record?
Yes No
4.1.5 Is there any facility to record notifications received from the data
subject if they believe their data to be inaccurate?
Yes No
If no, please indicate why not.
4.2.3 Are there procedures to monitor the factual relevance, accuracy and
timeliness of free text options or other comments about individuals?
Yes No
5.1.2 Does the project(s) include the facility to set retention periods?
Yes No
5.1.3 Is the project subject to any statutory / sectoral requirements on
retention?
Yes No
If yes, please state relevant requirements:
5.2.2 When data is no longer necessary for the purposes for which it was
collected:
(a) How is a review made to determine whether the data should be
deleted?
(b) How often is the review be conducted?
(c) Who is responsible for determining the review?
(d) If the data is held on a computer, does the application include a facility
to flag records for review / deletion?
Yes No
5.2.3 Are there be any exceptional circumstances for retaining certain data
for longer than the normal period?
Yes No
If yes, please give justification:
6.1.2 How do you locate all personal data relevant to a request (including
any appropriate ‘accessible’ records)?
6.3.2 Do you take into account the possibility that such damage or distress
to the individual could leave your organisation vulnerable to a
compensation claim in a civil court?
Yes No
6.4 Right to Object
6.4.1 Is there a procedure for complying with an individual’s request to
prevent processing for the purposes of direct marketing?
Yes No
6.5 Automated Decision- Taking
6.5.1 Are any decisions affecting individuals made solely on processing by
automatic means?
Yes No
If yes, what will be the procedure(s) for notifying an individual that an
automated decision making process has been used?
7.1.2 If yes, who / which department(s) are responsible for drafting and
enforcing the Data Security Policy within the organisation?
7.1.3 Does the Data Security Policy specifically address data protection
issues?
Yes No
7.1.4 What are the procedures for monitoring compliance with the Data
Security Policy within the organisation?
7.1.5 Does the level of security that has been set take into account the
state of technological development in security products and the cost of
deploying or updating these?
7.1.6 Is the level of security appropriate for the type of personal data
processed?
7.1.7 How does the level of security compare to industry standards, if any?
8.1.2 What are the types of data are transferred? (eg contact details,
employee records)
8.1.4 What are the main risks involved in the transfer of personal data to
countries outside the EEA?
8.1.6 Have you checked whether any non-EEA states to which data is to
be transferred have been deemed as having adequate protection?
8.2.3 What are the criteria set by your organisation, which must be
satisfied before a decision is made about whether the transfer is exempt
from the Eighth Principle?
Eg consent, (See DPA 1998, Schedule 4, for a full list)
8.3 Choosing a Data Processor
8.3.1 What reasonable steps did you take to ensure that the Data
Processor complies with data protection requirements?
8.3.3 How do you ensure that the Data Processor complies with these
measures?
Appendix 3
Back to ICO
homepage Privacy and Electronic Communications Regulations Direct
Marketing Compliance Check Template
This Checklist aims to assist organisations proposing change to marketing
arrangements to investigate whether their project complies with the
requirements of the Privacy and Electronic Communications Regulations
2003 (PECR). The Regulations are designed to be technology neutral, so
will apply to most electronic communications.
I BASIC INFORMATION – New or existing Project, System, Technology
or Legislation
1. Organisation and Project
Organisation
Branch / Division
Project
IMPORTANT NOTE
The PEC Regulations only apply to messages sent over a public
electronic communications network and Bluetooth messages are
not sent using such a network.
(PECR 2003 section 2)
IMPORTANT NOTE:
‘Personal data’ means data which relate to a living individual who
can be identified:
(a) from those data, or
(b) from those data and other information which is in the
possession of, or is likely to come into the possession of, the data
controller,
and includes any expression of opinion about the individual and
any indication of the intentions of the data controller or any other
person in respect of the individual.
(Data Protection Act, section 1)
IMPORTANT NOTE
The PEC Regulations apply different rules to individual subscribers
and corporate subscribers, although some rules apply to both.
Where personal data is used the Data Protection Act 1998 always
applies.
IMPORTANT NOTE
The e-Commerce Regulations 2002 require that the recipient of a
e-Commerce service, including direct marketing, must be provided,
in a form and manner that is easily, directly and permanently
accessible certain information including:
the name of the service provider
the geographic address at which the service provider is established
the details of the service provider, including his email address,
which make it possible to contact him rapidly and communicate
with him in a direct and effective manner
The Regulations do not prescribe how the requirement to make
information “easily, directly and permanently accessible” should be
met.
II INDIVIDUAL SUBSCRIBERS
1. Are your marketing communications directly invited or
unsolicited?
Directly Invited Unsolicited
2. By what mechanism have subscriber details been
obtained?
How do you determine whether the details have been provided with the
intention that you should send the subscriber direct marketing
communications
IMPORTANT NOTE
If your marketing communications are directly invited (solicited) by
the individual subscriber to whom they are sent, i.e. they have
asked you to send them marketing communications then many of
the PEC Regulations do not apply.
IMPORTANT NOTE
In order to use Automated Calling Systems for marketing
communications to individual subscribers you must have prior
consent. Prior consent on the other hand means that the
subscriber has given some positive indication of intention; this does
not necessarily require a tick box "opt-in" e.g. if the subscriber has
clearly indicated their consent to the purposes and to the receipt of
marketing communications in some other fashion i.e. clicking on an
“Accept” button at the end of a marketing notice.
IMPORTANT NOTE
In order to use faxes for marketing communications to individual
subscribers you must have prior consent, and check with the FPS
on a regular basis unless the subscriber has notified you that such
communications can be sent ‘for the time being’.
IMPORTANT NOTE
In order to use live voice telephone calls for marketing
communications to individual subscribers you must honour
subscriber “Do not Call” requests, and check with the TPS on a
regular basis unless the subscriber has notified you that such
communications can be sent ‘for the time being’.
IMPORTANT NOTE
In order to use e-mail/SMS for marketing communications to
individual subscribers you have the opt-in consent of subscribers
OR’ meet the soft-opt-in test:
Contact details are obtained during negotiation or sale of goods or
services to the recipient;
AND
marketing is conducted by the same entity as previous dealings
with the individual;
AND
marketing relates to "similar products and services";
AND
an opt-out mechanism is provided at the point of data collection
and is provided with each new communication.
IMPORTANT NOTE
If your marketing communications are directly invited (solicited) by
the corporate subscriber to whom they are sent, i.e. they have
asked you to send them marketing communications then many of
the PEC Regulations do not apply.
IMPORTANT NOTE
In order to use Automated Calling Systems for marketing
communications to corporate subscribers you must have prior
consent.
IMPORTANT NOTE
In order to use faxes for marketing communications to corporate
subscribers you must honour subscriber “Do not Fax” requests, and
check with the FPS on a regular basis unless the subscriber has
notified you that such communications can be sent ‘for the time
being’.
IMPORTANT NOTE
In order to use live voice telephone calls for marketing
communications to corporate subscribers you must honour
subscriber “Do not Call” requests, and check with the TPS on a
regular basis unless the subscriber has notified you that such
communications can be sent ‘for the time being’.
IMPORTANT NOTE
There are currently no consent requirements applicable to the
sending of e-mail/SMS marketing communications to corporate
subscribers. However, it is good practice to provide and opt-out
mechanism.
Privacy strategies
Back to ICO
homepage What is a privacy strategy ?
For many organisations that depend upon personal data, privacy has
become a strategic factor. Completing a PIA can be much easier, quicker,
less expensive and more effective, if the organisation’s overall strategy
encompasses privacy.
To deliver value to an organisation, a PIA is best approached not as a
standalone activity, but rather integrated into the organisation through two
levels. The role of PIAs must be defined within the organisation’s privacy
strategy and the privacy strategy must be part of the organisation’s
broader strategic planning.
However, a privacy strategy must be broader than PIAs and help to
address potential media controversies which might occur and the need to
respond to enquiries from individuals, their representatives, or elected
officials.
A privacy strategy works best when it is expressly stated and is proactive
and articulated into a plan, with adequate resources and effective
monitoring of performance against the plan.
Why have a privacy strategy ?
Organisations will find starting and completing a PIA much easier when a
privacy strategy is in place. This is because staff will be more aware of the
kinds of issues, implications, public concerns and risks. Organisations
whose operations have considerable impacts on the privacy of their
customers, their staff, or indeed any other categories of people, may find
that they need to undertake PIAs more frequently. A privacy strategy helps
to manage multiple PIAs being conducted within an organisation and
ensure consistency in relation to the type of projects which are subject to a
PIA.
Different types of privacy strategy
The scope of a privacy strategy should reflect the nature of the
organisation and its mission. This section should help determine the
appropriate scope of the strategy depending on the organisation’s needs.
It identifies four broad approaches, ranging from the very narrow to the
very broad.
A minimalist information privacy strategy.
A comprehensive information privacy strategy.
A broad privacy strategy.
A social impacts or public policy strategy.
A minimalist privacy strategy
The most basic approach is to develop a privacy strategy which helps the
organisation to meet legal requirements and obligations in relation to
information privacy. A minimalist information privacy strategy will have the
following basic aims.
To develop an organisational understanding of privacy and data
protection, and of the key privacy issues that arise in the
organisation’s relationships with individuals (generally its staff and
customers)
To conduct a review of the organisation’s holdings of personal
data and the processes relating to that data.
To build recognition of privacy matters into its project processes
(eg as a component of project scoping documents, or budget
approvals). This should include:
a requirement that PIAs be considered where
appropriate;
a requirement that legal compliance checks are
completed; and
a requirement that data protection compliance
checks are completed.
A comprehensive information privacy strategy
Organisations that recognise privacy as being a strategic factor in trust
relationships with their staff or customers, or that recognise privacy as a
matter of corporate responsibility, often implement a much more
comprehensive strategy.
A comprehensive information privacy strategy is likely to encompass the
following aims in additions to those in a minimalist information privacy
strategy.
Protections for all categories of people, without restrictions such as
‘citizen’, ‘resident’ or ‘customer’, and with provisions related to the
interests of deceased persons and their relatives.
Recognition of the benefits as well as the inefficiencies involved in
‘identity silos’, by avoiding the use of the same identifier in multiple
organisations, systems and programmes.
An active commitment to avoid the consolidation of data from
multiple sources into a single virtual databank, the use of personal
data for additional purposes, ‘function creep’ from one business
function to another, data warehousing and data mining.
A commitment to use of authentication rather than identification in
determining an individual’s entitlement to services, benefits or
access.
Approval for and facilitation of anonymous and pseudonymous
transaction services in all circumstances where appropriate.
Avoidance of prejudice to the person’s access to services, or their
ability to exercise other rights, because of the exercise of privacy
rights.
Individual control over identification and authentication
mechanisms, such as chip-cards and digital signature keys.
A broad privacy strategy
People are concerned about other dimensions of privacy other than just
information privacy, and organisations may judge it to be advantageous to
define the scope of their privacy strategy to reflect broader concerns.
A broad enterprise privacy strategy would also encompass impacts on
other types of privacy, such as privacy of the person, personal behaviour
and personal communications.
A social impacts/ public policy strategy
Some organisations may judge it to be advantageous to adopt a scope
that is broader than privacy alone, but encompasses it. A social impacts or
public policy strategy would also encompass impacts (both positive and
negative) on such matters as:
the availability and quality of services;
the accessibility and equity of services;
the allocation of effort, costs and risks, particularly where they are
shifted in the direction of citizens;
choice in relation to the use of the project as a whole, including
benefits foregone if it is not used, and penalties for non-use;
consent in relation to participation in the project as a whole, and in
particular features of it, rather than legal compulsion, or other
forms of coercion;
job-market and industry structure impacts;
geographical equity impacts, e.g. differential service depending on
location or access to facilities;
social equity impacts, e.g. differential service depending on ethnic
background, lingual skills, education or physical limitations;
the human rights of clients, employees and contractors; and
the accessibility of information.
One of the advantages of a social impacts/public policy strategy which
includes privacy is that the privacy elements of your strategy are part of
the fabric of policy-making.
Meeting the requirements of a privacy strategy
A successful privacy strategy needs direction and leadership from a senior
executive level. The following measures are advised in order to ensure
that any privacy strategy is met and exceeded.
Establish and maintain a focal point that ensures executive
attention to the matter, including commitment by senior executives
to a privacy programme.
Appoint a Chief Privacy Officer at a senior level within the
organisation.
Regular inclusion of privacy matters in executive committee
agendas.
Ensure that business process engineering and re-engineering
activities have privacy sensitivity embedded into them. This could
involve changing:
provisions within supplier contracts;
the organisation’s project management framework
and methodology; and
the organisation’s audit processes.
Structure a programme that builds privacy respect into the
organisation’s philosophy, mindset and business processes. This
programme could include:
staff training schemes;
internal audit of personal data practices.
Establish and maintain an internal communications programme.
Establish and maintain an external communications programme,
which may include targeting your organisation’s privacy messages
at:
affected individuals (including staff as well as
clients);
relevant representative and advocacy organisations.
Create channels to and from relevant representative and advocacy
organisations; and
Ensure your organisation has the capacity to receive and handle
incoming communications, through procedures for handling
incidents, enquiries, submissions and complaints.