PIA-Toolkit
PIA-Toolkit
Contents
Overview ................................................................................................................................................. 3
The basic steps in every PIA: ............................................................................................................... 3
Other steps that may be useful ........................................................................................................... 3
Ques�ons to answer before you start..................................................................................................... 3
When to do a PIA ................................................................................................................................ 3
Build checkpoints into your project plan ........................................................................................ 3
Who do I need to talk to? ................................................................................................................... 5
People who might need to be involved: ......................................................................................... 5
Who should do the PIA?...................................................................................................................... 5
Do I need to involve the Privacy Commissioner? ................................................................................ 5
A step-by-step guide to comple�ng a PIA ............................................................................................... 6
Step 1. Gather all the informa�on you need ...................................................................................... 6
Describe the project – especially the purpose of changing what happens with personal
informa�on ..................................................................................................................................... 6
Describe the personal informa�on involved and what will happen with it .................................... 6
Describe the flow of personal informa�on through its lifecycle in your organisa�on.................... 6
Describe the organisa�onal context ............................................................................................... 7
Step 2. Check against the privacy principles ....................................................................................... 8
Consider the personal informa�on involved in the project and how the privacy principles apply. 8
Step 3. Iden�fy any real privacy risks and how to mi�gate them ....................................................... 9
What is a privacy risk?..................................................................................................................... 9
How far do I have to go? ................................................................................................................. 9
How to iden�fy the risks ................................................................................................................. 9
Step 4. Produce a PIA report ............................................................................................................. 13
Step 5. Take ac�on ............................................................................................................................ 14
Step 6. Review the PIA and use it as a checkpoint once things are in opera�on ............................. 15
Other steps that may be useful ............................................................................................................. 16
Get an external view of your PIA ...................................................................................................... 16
Consult with stakeholders ................................................................................................................. 16
Establish beter governance structures for managing personal informa�on ................................... 16
Manage any risks with using third-party contractors ....................................................................... 16
Align the PIA with the organisa�on’s exis�ng project-management methodologies ....................... 17
Publish your PIA ................................................................................................................................ 17
1
At paragraphs 5.19, 7.68, 8.6, 8.72--78 and 8.86-89of
the Cabinet Manual.
Privacy Impact Assessment Toolkit 5
A step-by-step guide to comple�ng a A major key to success is having a clear understanding
of what the change is aiming to achieve, and how it
PIA will support your organisa�on’s work.
It’s about covering all the bases – not the order of
the steps. Key points to cover
As you work through the key PIA steps we discuss in • Describe the project briefly.
this sec�on, remember that it’s the content of each • Describe the purpose of changing what
step that maters – not the order you do them in. happens with personal informa�on – what is
the business aim in making the change?
So don’t be concerned if you find yourself doing things • Is the project a one-off ac�vity, or does it
in a slightly different order from how we’ve set out the involve a change to your ongoing informa�on-
steps below. management systems?
1. Gather all the informa�on you need Describe the personal informa�on involved and
The informa�on you put together when you were what will happen with it
deciding whether to do the PIA will be a good start for The focus of any PIA is the personal informa�on
doing the PIA itself. Now is the �me to gather all the involved in the project and the posi�ve or nega�ve
details about what personal informa�on the proposal effects that the project may have on the privacy of the
involves and what is going to happen to it. individuals affected by it.
The key tasks here are: It’s important to think about the whole lifecycle of the
personal informa�on. For instance, the PIA will need
• Describe the project – focus on what happens
to consider how that informa�on is going to be stored,
with personal informa�on.
who’s going to use it and why, how it’s going to be
• Describe the personal informa�on involved
kept up to date, how long it will be kept for, and what
and what will happen with it.
will happen if the individual whose informa�on it is
• Describe the organisa�onal context.
asks to see it. Without considering the whole lifecycle
As you complete each of those tasks, add the of the informa�on, you won’t be able to spot where
informa�on to a dra� Privacy impact assessment the problems or the opportuni�es occur.
report. You can use our “Privacy impact assessment
You’ll also need to consider a broader range of
report” template on our website as the basis for the
informa�on-management ques�ons if, for example,
report (adjust it as necessary to fit your organisa�on
your project involves sharing informa�on with another
and project).
organisa�on so that the individuals can receive a
You can use the report either as a briefing document service more efficiently. You’ll need to consider
for managers or other decision-makers, or – if the whether the sharing of informa�on will take the
decision is your own – as a record of what you decided individual by surprise – perhaps because it’s different
to do and why. from what they were told when you collected the
informa�on from them? If so, will you need to tell
Describe the project – especially the purpose of them what’s going on? Also, how will you make sure
changing what happens with personal the informa�on is kept secure when it’s being sent to
informa�on the other agency, and that it won’t be accessible to
A PIA is a tool to help you achieve the aims of your people who could misuse it?
project or your organisa�on more generally while also
protec�ng personal informa�on. There is o�en more Describe the flow of personal informa�on
than one way of designing a project to accomplish through its lifecycle in your organisa�on
what is intended – a PIA will help to iden�fy the least Key ques�ons to answer:
intrusive way of achieving that aim.
Example
A new mobile app
Consider not only the direct risks from the proposal, • a workshop including the key people involved
but also any knock-on effects. If you take too narrow a • a further desk-top review of documenta�on
lens, you may miss an important, wider effect on the • interviews with key people involved.
individuals you deal with.
Common examples of mi�ga�ons include:
How far do I have to go? • minimising the amount of personal
A PIA doesn’t set out to iden�fy and eliminate every informa�on collected
possible risk to an individual from using their personal
• beter and clearer communica�on with the
informa�on or impac�ng on their privacy. However, it
individuals
should:
• allowing individuals to opt in instead or
• iden�fy any genuine risks to the individual making it easy to opt out
(that is, risks that aren’t unrealis�cally remote • designing the system to provide beter
or trivial) security
• assess how serious those risks are. • providing training and support for staff to help
them get it right.
Next:
Aspects of informa�on What informa�on the app collects Third party providing adver�sing through
assessed the app needs access to informa�on (age,
gender)
Descrip�on of the risk The app will collect more Third par�es may misuse this informa�on
informa�on than specified in the for their own purposes (spamming,
privacy statement hacking, etc)
Ra�onale and The app will have greater Data is never truly de-iden�fied so may
consequences for the func�onality and lead to increased be misused exposing individuals to
agency or individual mone�sa�on, but app users may unexpected impacts. Individuals distrust
object to collec�on beyond the unexpected disclosures to third par�es.
current privacy statement
Third party access to user informa�on is a
source of revenue.
Exis�ng controls that The business has a clear purpose De-iden�fy data as much as
contribute to manage for collec�ng the personal possible. Contract with third party also
risks iden�fied informa�on (but app policy does specifies what can and can’t be done with
not currently reflect it) informa�on
Recommended addi�onal Put a process in place to manage Extend contract with third party
ac�on reduce or mi�gate clear no�fica�on and consent for to disallow re-iden�fica�on or reuse of
risk addi�onal collec�on by the app in data for different purposes
line with the new purpose
Descrip�on of the risk Behavioural informa�on is Some users use one password across
collected over �me, in addi�on to mul�ple accounts, which could reduce
personal informa�on collected at the security of the system elsewhere
download/ registra�on
Ra�onale and There is an administra�ve need, as Hard to prevent people from recycling
consequences for the the app won’t work without a passwords. If an external account is
agency or individual persistent account. But app users compromised, all other accounts using
might object to more behavioural the same username and password are
informa�on being collected, and vulnerable, including the app
might abandon it for this reason
Exis�ng controls that Privacy no�ce clearly outlines what Creden�al informa�on is encrypted;
contribute to manage informa�on can be used for (e.g. process to change/reset passwords is
risks iden�fied account persistence, and customer secure; hashed passwords are salted, but
service – which covers targeted this won’t prevent use
adver�sing)
Recommended addi�onal Amend reten�on policy to ensure Require users to create a unique
ac�on reduce or mi�gate that app user logs are deleted password for the app, changed regularly,
risk when they are no longer needed using criteria unlikely to have been
(easy addi�onal protec�on) demanded by other accounts
• what’s changed
• what the new impact is
• how to address any new risk (or take
advantage of any new opportunity).