Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

DPIA example: Understanding the 6 phases of its life cycle

DPIA example
DPIA example for organisations to follow and understanding the 6 phases of its life cycle

DPIA example: Understanding the 6 phases of its life cycle

The Data Protection Provisions of the Personal Data Protection Act (PDPA) include 11 major obligations that organisations must follow while collecting, using, or disclosing personal data. In order to meet these obligations, organisations must design and execute policies and practises essential for the organisation to comply with the PDPA. These policies and practices should eventually be visible through the Data Protection Management Program of organisations (DPMP). 

Organizations are advised to complete a Data Protection Impact Assessment (DPIA), which comes in 6 phases, in order to decide on the policies and procedures to be implemented in accordance with the these 11 obligations under the PDPA. It entails identifying, assessing, and managing personal data protection threats based on the organization’s functions, needs, and operations. 

With this, understanding the DPIA’s 6 phases would position any organisation to assess whether it’s handling of personal data complies with the PDPA or data protection best practises, allowing them to structure the necessary technological or organisational steps to protect individuals from data protection risks.

Also Read: Completed DPIA Example: 7 Simple Helpful Steps To Create

Understanding the 6 phases of the DPIA life cycle

A DPIA typically comprises 6 phases

PHASE 1 — Assess need for DPIA

Organizations should evaluate the following elements before conducting a DPIA to decide whether a DPIA is required. To begin, the DPIA lead and DPO must assess if a DPIA is necessary by determining whether the project incorporates personal data (i.e. the collection, use, transfer, disclosure, or storage of personal data). If the project does not involve personal data, a DPIA is not necessary. 

If it is found that the project will involve personal data, the threshold questions listed below can be utilised to determine the necessity for a DPIA:

  1. Are you introducing, developing, or implementing a new system or process? For example, new information technology systems or manual processes involving the handling of personal data (e.g. receptionist collecting personal data from visitors, disposal of physical documents containing personal data, submitting of physical medical claims). 
  2. Is a current system or process being examined or significantly redesigned? A redesign of an operational process workflow involving multiple groups of users managing personal data, for example. 
  3. Is the company beginning to collect new sorts of data? A change in business model, for example, may require gathering new sorts of personal data about existing clients.

If the answer is “yes” to any of these questions, a DPIA should be performed; if the answer is “no” to all of the questions, the DPIA lead should reassess when there is a change in risks connected with the project’s management of personal data. 

Once the decision to conduct a DPIA has been reached, the DPIA lead should begin planning the DPIA in cooperation with the DPO. Throughout the DPIA, the DPO should also advise the DPIA lead.

PHASE 2 — Plan DPIA 

The DPIA lead should cover the following areas while developing the essential activities or steps required to undertake the DPIA: 

  • Project description – An overview of the project (e.g., objective/background, organisational department/functions involved, timeframe), why a DPIA is required, and any significant concerns related to the DPIA. 
  • DPIA Scope – Describe in detail the exact system or process for which a DPIA is required. 
  • Define the risk assessment framework or technique – This includes defining risk assessment criteria and risk calculation procedures. 
  • Parties involved – Identify relevant internal departments/functions or external stakeholders (e.g. subject matter experts, consultants, regulatory authorities, or customers) whose inputs or opinions must be sought during consultation or interview sessions, and describe how their opinions will be sought. 
  • DPIA timeline – Estimate the time required for major tasks and provide an overall timeframe for conducting the DPIA.

PHASE 3 — Identify personal data and personal data flows 

To identify and map personal data involved in the project, the DPIA lead would need to gather and examine project documents to determine how personal data is acquired, utilised, or disclosed as part of the project. 

Documentation examples include the project plan, contracts with third parties, assessment reports, and system functional requirements. To ensure completeness and correctness, the DPIA lead should consult with the project team and appropriate departments or functions. On-site project inspections involving ground staff should be undertaken whenever practicable.

The DPIA lead can then: 

  1. Identify the various types of personal data handled (or anticipated to be handled) in relation to the specific project and determine the organization’s purposes for collecting, using, or disclosing them; and 
  2. Map the way personal data flows through various stages or touchpoints of the project (e.g., considering operational workflows or business processes) across its life cycle (i.e., from collection to storage and/or disposal).

PHASE 4 — Identify and assess data protection risks

Once the DPIA lead has recorded how personal data is handled, the DPIA lead can proceed to identify and assess personal data protection risks by: 

  1. completing a DPIA questionnaire to assess the project against PDPA requirements and/or data protection best practises; 
  2. identifying locations in the personal data flow that could lead to a PDPA violation (e.g., personal data loss) or are gaps when compared to industry best practises; and 
  3. analysing the potential impact and likelihood of detected gaps and risks based on the pre-defined risk framework.

Because projects differ in terms of type (e.g., systems, digital or manual processes) and project stage (e.g., new projects, current projects undergoing major modifications), there is no one-size-fits-all strategy for identifying, assessing, and mitigating data protection risks. DPIA leads would need to assess data protection risks while taking into account the organization’s specific circumstances. They may also need to retrace earlier steps or activities completed in earlier phases to obtain more information or clarify certain data handling processes at various stages of the project.

Organizations are advised to complete a Data Protection Impact Assessment (DPIA), which comes in 6 phases.

PHASE 5 — Create an action plan

During this phase, the DPIA lead would need to propose how the identified data protection concerns should be addressed. The DPIA lead should also designate the action owner(s) accountable for the implementation of specific suggestions (such as technical or organisational measures), monitoring of implementation outcomes, and implementation dates in the form of an action plan. As a best practise, the action plan should include a point of contact for responding to questions about the DPIA process or implementing the action plan. 

The risk assessment (in Phase 4), as well as the organization’s specific circumstances, should guide an organization’s approach to formulating an action plan (e.g. operational or resource constraints and other legal or regulatory requirements). This would have an impact on how the identified data protection risks would be addressed (e.g., removing the source of risk, spreading the risk with another party via risk financing and contracts, taking the risk based on an informed decision), as well as the timeline for implementing proposed solutions in the action plan.

Instead of implementing all of the recommendations at once, data protection risks could be prioritised depending on their likelihood and effect levels. Nonetheless, all proposals and arguments should be documented for future reference.

PHASE 6 — Implement the action plan and monitor outcomes 

The DPIA lead is now ready to describe the entire DPIA process (including how the DPIA was scoped, planned, and carried out, as well as the findings and the action plan) in a DPIA report. The DPO of the organisation should assess this report to ensure that the proposed action plan is consistent with the organization’s rules and includes proper data protection practises. After the DPO has read the report, the DPIA lead should submit it to the Project Steering Committee for approval to implement the action plan. 

Once accepted, the action owners can begin implementing the action plan. The project owner should additionally evaluate the action plan’s outcomes to ensure that identified personal data protection risks are addressed as intended, and personal data risks are managed responsibly.

When the risks connected with the project’s handling of personal data change, the existing DPIA (particularly the action plan outcomes) must be evaluated and amended as appropriate to meet any new gaps or risks to persons’ personal data. Here are some examples of when dangers can change: 

  1. Subsequent project developments (e.g., changes to the purposes or context for the project, the type of personal data collected, and how the processing is conducted) 
  2. Technological or security advancements (e.g., when a system may face new security vulnerabilities)  
  3. More widespread environmental changes (e.g., legislative amendments)

Conclusion

Conducting a DPIA ensures that the policies and procedures to be implemented comply with the obligations stated in the PDPA. With this, organisations in Singapore should see to it that whenever there are changes in the policies implemented or changes in general to the functions and services of the organisation, a DPIA must be first conducted to ensure that any possible loopholes or vulnerabilities are covered and acknowledged. 

Conducting a DPIA also highlights the importance of having a Data Protection Officer (DPO), as it facilitates the phases of the DPIA and ensures that the policies made responds to the needs of the organisation. Aside from the fact that it is mandated, having a DPO plays an integral part in having a healthy posture of your organisation’s cybersecurity. 

In the process of conducting a DPIA, a DPO can ensure that the path forward is for faithful compliance with the PDPA and avoidance of liabilities such as a financial penalty that the PDPC can impose in case of breach.

Also Read: Data Protection Impact Assessments: 5 Elements You Should Know

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us