Data Protection Impact Assessment and Data Breach
Data Protection Impact Assessment and Data Breach
Department of Law
Even though a DPIA could be required in other circumstances, Article 35(3) provides some
examples when a processing operation is “likely to result in high risks”:
A. a systematic and extensive evaluation of personal aspects relating to natural persons which
is based on automated processing, including profiling, and on which decisions are based that
produce legal effects concerning the natural person or similarly significantly affect the
natural person;
B. processing on a large scale of special categories of data referred to in Article 9(1), or of
personal data relating to criminal convictions and offences referred to in Article 1013; or
C. a systematic monitoring of a publicly accessible area on a large scale”.
DPIA - Criteria
In order to provide a more concrete set of processing operations that require a DPIA due
to their inherent high risk, taking into account the particular elements of Articles 35(1)
and 35(3)(a) to (c), the list to be adopted at the national level under article 35(4) and
recitals 71, 75 and 91, and other GDPR references to “likely to result in a high risk”
processing operations, the following nine criteria should be considered.
1. Evaluation or scoring;
2. Automated-decision making with legal or similar significant effect;
3. Systematic monitoring;
4. Sensitive data or data of a highly personal nature;
DPIA - Criteria
In most cases, a data controller can consider that a processing meeting two criteria
would require a DPIA to be carried out.
However, in some cases, a data controller can consider that a processing meeting only
one of these criteria requires a DPIA.
DPIA - Examples
Examples of processing Possible Relevant criteria DPIA likely to be
required?
A hospital processing its patients’ genetic and - Sensitive data or data of a highly YES
health data (hospital information system). personal nature.
- Data concerning vulnerable data
subjects.
- Data processed on a large-scale.
The gathering of public social media data for - Evaluation or scoring. YES
generating profiles. - Data processed on a large scale.
- Matching or combining of
datasets.
- Sensitive data or data of a highly
personal nature:
DPIA - Examples
Examples of processing Possible Relevant criteria DPIA likely to be
required?
Who is obliged to carry out the DPIA? The controller, with the DPO and processors. The
controller is responsible for ensuring that the DPIA is carried out (Article 35(2)). Carrying
out the DPIA may be done by someone else, inside or outside the organization, but the
controller remains ultimately accountable for that task.
Role of the DPO in a DPIA
The WP29 recommends that the controller should seek the advice of the DPO, on the
following issues, amongst others 35:
• whether or not to carry out a DPIA
• what methodology to follow when carrying out a DPIA
• whether to carry out the DPIA in-house or whether to outsource it
• what safeguards (including technical and organisational measures) to apply to mitigate
any risks to the rights and interests of the data subjects
• whether or not the data protection impact assessment has been correctly carried out
and whether its conclusions (whether or not to go ahead with the processing and
what safeguards to apply) are in compliance with the GDPR.
DPIA Template
Step 1: Identify the need for a DPIA
Step 2: Describe the processing
• Describe the nature of the processing;
• Describe the scope of the processing;
• Describe the context of the processing;
• Describe the purposes of the processing.
Step 3: Consultation process
Step 4: Assess necessity and proportionality
DPIA Template
The GDPR introduces the requirement for a personal data breach to be notified to the
competent national supervisory authority (hereinafter “SA”) and, in certain cases, to
communicate the breach to the individuals whose personal data have been affected by
the breach (Articles 33 and 34).
As part of any attempt to address a breach the controller should first be able to recognise
one. The GDPR defines a “personal data breach” in Article 4 as: “a breach of security
leading to the accidental or unlawful destruction, loss, alteration, unauthorised
disclosure of, or access to, personal data transmitted, stored or otherwise processed.”
Exfiltration of job application data from a website
An employment agency was the victim of a cyber-attack, which placed a malicious code
on its website. This malicious code made personal information submitted through online
job application forms and stored on the webserver accessible to unauthorized person(s).
213 such forms are possibly affected, after analysing the affected data it was determined
that no special categories of data were affected in the breach. The particular malware
toolkit installed had functionalities that allowed the attacker to remove any history of
exfiltration and also allowed processing on the server to be monitored and to have
personal data captured. The toolkit was discovered only a month after its installation.
Organizational and technical measures for
preventing / mitigating the impacts of hacker
attacks
1. State-of-the-art encryption and key management;
2. Keeping the system up to date (software and firmware);
3. Use of strong authentication methods;
4. Secure development standards;
5. Strong user privileges and access control management policy in place.
6. Use of appropriate firewall;
7. Penetration testing;
8. Backups testing
Stolen material storing encrypted personal data
During a break-in into a children’s day-care centre, two tablets were stolen. The tablets
contained an app which held personal data about the children attending the day-care
centre. Name, date of birth, personal data about the education of the children were
concerned. Both the encrypted tablets which were turned off at the time of the break-in,
and the app were protected by a strong password. Back-up data was effectively and
readily available to the controller. After becoming aware of the break-in, the day-care
remotely issued a command to wipe the tablets shortly after the discovery of the break-
in.
Organizational and technical measures for
preventing / mitigating the impacts of
loss or theft of devices
1. Turn on device’s encryption;
2. Use passcode/password on all devices;
3. Use multi-factor authentication;
4. Use MDM;
5. save personal data;
6. Use of appropriate firewall;
7. Use a secure VPN;