SlideShare a Scribd company logo
1 of 9
Privacy Impact Assessments
and Information Risk
Management – Roundtable
Andrew Rose, Senior Policy Officer, ICO
Leeds
January 2017
Who has
been
involved in
doing
a PIA?
Was the
process
useful?
Who sees it
as a tick box
exercise?
Who would
willingly do
another one?
0
5
10
15
20
25
PIA concerns
PIA concerns
A detailed
assessment of
privacy risks
What? When?
Throughout
the project
Who?
Senior level
staff
Privacy impact assessments - a
risk based, proportionate
approach
The PIA process
1
• Identify need for a PIA
2
• Describe information flows
3
• Identify privacy risks – DPA compliance check
4
• Identify privacy solutions
5
• Record PIA outcomes, and sign-off
6
• Integrate PIA outcomes into project plan
Consultation
Initiation
• Identify the
need for a PIA
Definition
• Describe
information
flows
• Identify
privacy risks
• Identify
solutions
• Record PIA
outcomes
Development
• Integrating
outcomes into
project plan
• Monitor any
actions from
the PIA and
ensure they are
completed
Consultation
Implementation
• Integrating outcomes
into project plan
• Monitor any actions
from the PIA and
ensure they are
completed
Handover &
sign off
• Ensuring any
identified risks in
the PIA have been
signed off
Closure &
review
• Record what you
have learnt from
the PIA for future
projects.
Consultation
Continue to Review
Implement data protection by
design and default (Art 25).
• Pseudonymisation
• Transparency
• Data minimisation
Use data protection impact
assessments where
appropriate (Art 35).
Necessary where
• …the processing is likely to result
in a high risk to the rights and
freedoms of individuals,
especially where the processing
activity involves the use of new
technologies.
• where processing involves a high
level of profiling, or large scale
use of surveillance,
• Where processing involves large
scale processing of special
categories of PD, or data relating
to crime

More Related Content

Viewers also liked

Integrated Privacy Impact Assessment
Integrated Privacy Impact AssessmentIntegrated Privacy Impact Assessment
Integrated Privacy Impact AssessmentJeremy Hilton
 
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...Lilian Edwards
 
What Do You Do with a Problem Like AI?
What Do You Do with a Problem Like AI?What Do You Do with a Problem Like AI?
What Do You Do with a Problem Like AI?Lilian Edwards
 
PIA CASE STUDY
PIA CASE STUDYPIA CASE STUDY
PIA CASE STUDYASAD ALI
 
Pia revival strategy
Pia revival strategyPia revival strategy
Pia revival strategyMaqbool Ahmed
 
Privacy Impact Assessment Methodologies for Protection of Personal Data
Privacy Impact Assessment Methodologies for Protection of Personal DataPrivacy Impact Assessment Methodologies for Protection of Personal Data
Privacy Impact Assessment Methodologies for Protection of Personal DataH. T. Besik
 
Secure Data Workflow
Secure Data WorkflowSecure Data Workflow
Secure Data WorkflowOPSWAT
 
PIA (Pakistan Jnternational Airlines)
PIA (Pakistan Jnternational Airlines)PIA (Pakistan Jnternational Airlines)
PIA (Pakistan Jnternational Airlines)Mubashar Maqbool
 
Wayne richard - pia risk management - atlseccon2011
Wayne richard - pia risk management - atlseccon2011Wayne richard - pia risk management - atlseccon2011
Wayne richard - pia risk management - atlseccon2011Atlantic Security Conference
 
Pia Intership Report
Pia Intership ReportPia Intership Report
Pia Intership ReportHunain Shuja
 
financial statements of PIA
financial statements of PIAfinancial statements of PIA
financial statements of PIANeha Advani
 
Lean Thinking in IT by Marie-Pia Ignace, Lean IT Summit 2014
Lean Thinking in IT by Marie-Pia Ignace, Lean IT Summit 2014Lean Thinking in IT by Marie-Pia Ignace, Lean IT Summit 2014
Lean Thinking in IT by Marie-Pia Ignace, Lean IT Summit 2014Institut Lean France
 

Viewers also liked (14)

Integrated Privacy Impact Assessment
Integrated Privacy Impact AssessmentIntegrated Privacy Impact Assessment
Integrated Privacy Impact Assessment
 
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
 
What Do You Do with a Problem Like AI?
What Do You Do with a Problem Like AI?What Do You Do with a Problem Like AI?
What Do You Do with a Problem Like AI?
 
PIA CASE STUDY
PIA CASE STUDYPIA CASE STUDY
PIA CASE STUDY
 
Introduction to Social Impact Assessment for REDD+ Projects, Nairobi, 10 - 12...
Introduction to Social Impact Assessment for REDD+ Projects, Nairobi, 10 - 12...Introduction to Social Impact Assessment for REDD+ Projects, Nairobi, 10 - 12...
Introduction to Social Impact Assessment for REDD+ Projects, Nairobi, 10 - 12...
 
Pia revival strategy
Pia revival strategyPia revival strategy
Pia revival strategy
 
Privacy Impact Assessment Methodologies for Protection of Personal Data
Privacy Impact Assessment Methodologies for Protection of Personal DataPrivacy Impact Assessment Methodologies for Protection of Personal Data
Privacy Impact Assessment Methodologies for Protection of Personal Data
 
Secure Data Workflow
Secure Data WorkflowSecure Data Workflow
Secure Data Workflow
 
PIA (Pakistan Jnternational Airlines)
PIA (Pakistan Jnternational Airlines)PIA (Pakistan Jnternational Airlines)
PIA (Pakistan Jnternational Airlines)
 
PIA
PIAPIA
PIA
 
Wayne richard - pia risk management - atlseccon2011
Wayne richard - pia risk management - atlseccon2011Wayne richard - pia risk management - atlseccon2011
Wayne richard - pia risk management - atlseccon2011
 
Pia Intership Report
Pia Intership ReportPia Intership Report
Pia Intership Report
 
financial statements of PIA
financial statements of PIAfinancial statements of PIA
financial statements of PIA
 
Lean Thinking in IT by Marie-Pia Ignace, Lean IT Summit 2014
Lean Thinking in IT by Marie-Pia Ignace, Lean IT Summit 2014Lean Thinking in IT by Marie-Pia Ignace, Lean IT Summit 2014
Lean Thinking in IT by Marie-Pia Ignace, Lean IT Summit 2014
 

Similar to Housing sector forum pia slides - 20170131

Building an Effective Data Privacy Program – 6 Steps from TRUSTe
Building an Effective Data Privacy Program – 6 Steps from TRUSTeBuilding an Effective Data Privacy Program – 6 Steps from TRUSTe
Building an Effective Data Privacy Program – 6 Steps from TRUSTeTrustArc
 
FINAL_OracleGuident-PPT
FINAL_OracleGuident-PPTFINAL_OracleGuident-PPT
FINAL_OracleGuident-PPTCarolyn Reid
 
SROI - Moving the conversation from cost to value - SiMPACT
SROI  - Moving the conversation from cost to value - SiMPACTSROI  - Moving the conversation from cost to value - SiMPACT
SROI - Moving the conversation from cost to value - SiMPACTCesToronto
 
13.1 Identify Stakeholders
13.1 Identify Stakeholders13.1 Identify Stakeholders
13.1 Identify StakeholdersDavidMcLachlan1
 
Enterprise Risk Management for Projects, Programs and Portfolios: A Primer
Enterprise Risk Management for Projects, Programs and Portfolios: A PrimerEnterprise Risk Management for Projects, Programs and Portfolios: A Primer
Enterprise Risk Management for Projects, Programs and Portfolios: A PrimerSeshadri Venkataraman
 
Wayne.brantley
Wayne.brantleyWayne.brantley
Wayne.brantleyNASAPMC
 
Managing Risk And Opportunity In IT Projects
Managing Risk And Opportunity In IT ProjectsManaging Risk And Opportunity In IT Projects
Managing Risk And Opportunity In IT Projectsslideshare_venr
 
AEC product presentation EN 1.4
AEC product presentation EN 1.4AEC product presentation EN 1.4
AEC product presentation EN 1.4Kees Wiegmans
 
Positive Community Norms Communication Webinar: Oregon PGS / OHA - January 2018
Positive Community Norms Communication Webinar: Oregon PGS / OHA - January 2018Positive Community Norms Communication Webinar: Oregon PGS / OHA - January 2018
Positive Community Norms Communication Webinar: Oregon PGS / OHA - January 2018Oregon Problem Gambling Services
 
NCET Biz Bite | Project Management Tips and Tools | January 2018
NCET Biz Bite | Project Management Tips and Tools | January 2018NCET Biz Bite | Project Management Tips and Tools | January 2018
NCET Biz Bite | Project Management Tips and Tools | January 2018Archersan
 
Lecture 1
Lecture 1Lecture 1
Lecture 19anm12
 
A Guide to Risk Management
A Guide to Risk ManagementA Guide to Risk Management
A Guide to Risk ManagementProjectCon
 
13.4 Monitor Stakeholder Engagement
13.4 Monitor Stakeholder Engagement13.4 Monitor Stakeholder Engagement
13.4 Monitor Stakeholder EngagementDavidMcLachlan1
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016Shannon G., MBA
 
Evaluability Assessments and Choice of Evaluation Methods
Evaluability Assessments and Choice of Evaluation MethodsEvaluability Assessments and Choice of Evaluation Methods
Evaluability Assessments and Choice of Evaluation MethodsDebbie_at_IDS
 
13.0 Project Stakeholder Management Overview
13.0 Project Stakeholder Management Overview13.0 Project Stakeholder Management Overview
13.0 Project Stakeholder Management OverviewDavidMcLachlan1
 
Your project selected_for_audit_sip18_project_auditors
Your project selected_for_audit_sip18_project_auditorsYour project selected_for_audit_sip18_project_auditors
Your project selected_for_audit_sip18_project_auditorsJoy Gumz
 

Similar to Housing sector forum pia slides - 20170131 (20)

Building an Effective Data Privacy Program – 6 Steps from TRUSTe
Building an Effective Data Privacy Program – 6 Steps from TRUSTeBuilding an Effective Data Privacy Program – 6 Steps from TRUSTe
Building an Effective Data Privacy Program – 6 Steps from TRUSTe
 
ODI: Methods for M&E of Policy Advocacy
ODI: Methods for M&E of Policy AdvocacyODI: Methods for M&E of Policy Advocacy
ODI: Methods for M&E of Policy Advocacy
 
FINAL_OracleGuident-PPT
FINAL_OracleGuident-PPTFINAL_OracleGuident-PPT
FINAL_OracleGuident-PPT
 
SROI - Moving the conversation from cost to value - SiMPACT
SROI  - Moving the conversation from cost to value - SiMPACTSROI  - Moving the conversation from cost to value - SiMPACT
SROI - Moving the conversation from cost to value - SiMPACT
 
13.1 Identify Stakeholders
13.1 Identify Stakeholders13.1 Identify Stakeholders
13.1 Identify Stakeholders
 
Enterprise Risk Management for Projects, Programs and Portfolios: A Primer
Enterprise Risk Management for Projects, Programs and Portfolios: A PrimerEnterprise Risk Management for Projects, Programs and Portfolios: A Primer
Enterprise Risk Management for Projects, Programs and Portfolios: A Primer
 
Wayne.brantley
Wayne.brantleyWayne.brantley
Wayne.brantley
 
Managing Risk And Opportunity In IT Projects
Managing Risk And Opportunity In IT ProjectsManaging Risk And Opportunity In IT Projects
Managing Risk And Opportunity In IT Projects
 
AEC product presentation EN 1.4
AEC product presentation EN 1.4AEC product presentation EN 1.4
AEC product presentation EN 1.4
 
Positive Community Norms Communication Webinar: Oregon PGS / OHA - January 2018
Positive Community Norms Communication Webinar: Oregon PGS / OHA - January 2018Positive Community Norms Communication Webinar: Oregon PGS / OHA - January 2018
Positive Community Norms Communication Webinar: Oregon PGS / OHA - January 2018
 
NCET Biz Bite | Project Management Tips and Tools | January 2018
NCET Biz Bite | Project Management Tips and Tools | January 2018NCET Biz Bite | Project Management Tips and Tools | January 2018
NCET Biz Bite | Project Management Tips and Tools | January 2018
 
Lecture 1
Lecture 1Lecture 1
Lecture 1
 
02.pptx
02.pptx02.pptx
02.pptx
 
A Guide to Risk Management
A Guide to Risk ManagementA Guide to Risk Management
A Guide to Risk Management
 
13.4 Monitor Stakeholder Engagement
13.4 Monitor Stakeholder Engagement13.4 Monitor Stakeholder Engagement
13.4 Monitor Stakeholder Engagement
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016
 
Akolade DMF14
Akolade DMF14Akolade DMF14
Akolade DMF14
 
Evaluability Assessments and Choice of Evaluation Methods
Evaluability Assessments and Choice of Evaluation MethodsEvaluability Assessments and Choice of Evaluation Methods
Evaluability Assessments and Choice of Evaluation Methods
 
13.0 Project Stakeholder Management Overview
13.0 Project Stakeholder Management Overview13.0 Project Stakeholder Management Overview
13.0 Project Stakeholder Management Overview
 
Your project selected_for_audit_sip18_project_auditors
Your project selected_for_audit_sip18_project_auditorsYour project selected_for_audit_sip18_project_auditors
Your project selected_for_audit_sip18_project_auditors
 

Recently uploaded

一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理bd2c5966a56d
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategyJong Hyuk Choi
 
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理F La
 
Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Abdul-Hakim Shabazz
 
Career As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsCareer As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsNilendra Kumar
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理Airst S
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理F La
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSCssSpamx
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYJulian Scutts
 
Types of Agricultural markets LLB- SEM I
Types of Agricultural markets LLB- SEM ITypes of Agricultural markets LLB- SEM I
Types of Agricultural markets LLB- SEM Iyogita9398
 
ARTICLE 370 PDF about the indian constitution.
ARTICLE 370 PDF about the  indian constitution.ARTICLE 370 PDF about the  indian constitution.
ARTICLE 370 PDF about the indian constitution.tanughoshal0
 
一比一原版(McMaster毕业证书)麦克马斯特大学毕业证学历认证可查认证
一比一原版(McMaster毕业证书)麦克马斯特大学毕业证学历认证可查认证一比一原版(McMaster毕业证书)麦克马斯特大学毕业证学历认证可查认证
一比一原版(McMaster毕业证书)麦克马斯特大学毕业证学历认证可查认证trryfxkn
 
Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in LawNilendra Kumar
 
CASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptx
CASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptxCASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptx
CASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptxMUKUL TYAGI
 
一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理e9733fc35af6
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理e9733fc35af6
 
一比一原版(AUT毕业证书)新西兰奥克兰理工大学毕业证如何办理
一比一原版(AUT毕业证书)新西兰奥克兰理工大学毕业证如何办理一比一原版(AUT毕业证书)新西兰奥克兰理工大学毕业证如何办理
一比一原版(AUT毕业证书)新西兰奥克兰理工大学毕业证如何办理e9733fc35af6
 
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理e9733fc35af6
 
5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdf5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdfTodd Spodek
 
Understanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective BargainingUnderstanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective Bargainingbartzlawgroup1
 

Recently uploaded (20)

一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
 
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
 
Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?
 
Career As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsCareer As Legal Reporters for Law Students
Career As Legal Reporters for Law Students
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
Types of Agricultural markets LLB- SEM I
Types of Agricultural markets LLB- SEM ITypes of Agricultural markets LLB- SEM I
Types of Agricultural markets LLB- SEM I
 
ARTICLE 370 PDF about the indian constitution.
ARTICLE 370 PDF about the  indian constitution.ARTICLE 370 PDF about the  indian constitution.
ARTICLE 370 PDF about the indian constitution.
 
一比一原版(McMaster毕业证书)麦克马斯特大学毕业证学历认证可查认证
一比一原版(McMaster毕业证书)麦克马斯特大学毕业证学历认证可查认证一比一原版(McMaster毕业证书)麦克马斯特大学毕业证学历认证可查认证
一比一原版(McMaster毕业证书)麦克马斯特大学毕业证学历认证可查认证
 
Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in Law
 
CASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptx
CASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptxCASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptx
CASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptx
 
一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
 
一比一原版(AUT毕业证书)新西兰奥克兰理工大学毕业证如何办理
一比一原版(AUT毕业证书)新西兰奥克兰理工大学毕业证如何办理一比一原版(AUT毕业证书)新西兰奥克兰理工大学毕业证如何办理
一比一原版(AUT毕业证书)新西兰奥克兰理工大学毕业证如何办理
 
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
 
5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdf5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdf
 
Understanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective BargainingUnderstanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective Bargaining
 

Housing sector forum pia slides - 20170131

  • 1. Privacy Impact Assessments and Information Risk Management – Roundtable Andrew Rose, Senior Policy Officer, ICO Leeds January 2017
  • 2. Who has been involved in doing a PIA? Was the process useful? Who sees it as a tick box exercise? Who would willingly do another one?
  • 4. A detailed assessment of privacy risks What? When? Throughout the project Who? Senior level staff Privacy impact assessments - a risk based, proportionate approach
  • 5. The PIA process 1 • Identify need for a PIA 2 • Describe information flows 3 • Identify privacy risks – DPA compliance check 4 • Identify privacy solutions 5 • Record PIA outcomes, and sign-off 6 • Integrate PIA outcomes into project plan Consultation
  • 6. Initiation • Identify the need for a PIA Definition • Describe information flows • Identify privacy risks • Identify solutions • Record PIA outcomes Development • Integrating outcomes into project plan • Monitor any actions from the PIA and ensure they are completed Consultation
  • 7. Implementation • Integrating outcomes into project plan • Monitor any actions from the PIA and ensure they are completed Handover & sign off • Ensuring any identified risks in the PIA have been signed off Closure & review • Record what you have learnt from the PIA for future projects. Consultation Continue to Review
  • 8. Implement data protection by design and default (Art 25). • Pseudonymisation • Transparency • Data minimisation
  • 9. Use data protection impact assessments where appropriate (Art 35). Necessary where • …the processing is likely to result in a high risk to the rights and freedoms of individuals, especially where the processing activity involves the use of new technologies. • where processing involves a high level of profiling, or large scale use of surveillance, • Where processing involves large scale processing of special categories of PD, or data relating to crime