View Template - International Association of Privacy Professionals

NL Centre for Health Information
Full PIA Report Template v2.2 2013-01-03 FINAL
Update cover page and header.
2
NL Centre for Health Information
Full PIA Report Template v2.2 2013-01-03 FINAL
Preamble
A Privacy Impact Assessment (PIA) is an assessment tool used to evaluate the impact
on privacy that results from change to a system, environment, or process; for example,
such change might take the form of a revised policy, a software upgrade, or the
introduction of new technology. A PIA is conducted by considering the system,
environment, or process in the context of privacy principles, best practices, codes of
conduct, legislation, and relevant directives.
The following sections constitute a template that has been created to support the writing
of full PIA reports by the Centre. The Centre also maintains a template for “short form”
PIAs, the results of which may lead to the need for a full PIA report.
This section should be removed from the final PIA report, as well as the table of
contents.
3
NL Centre for Health Information
Full PIA Report Template v2.2 2013-01-03 FINAL
Executive Summary
Brief commentary to summarize PIA.




Introduce subject
Timeframe/Scope
Other relevant points
Conclusion
List risks identified through PIA.
Privacy Risk 1: The possible locations of personal information in the System are
not well understood. (Risk Level: High)
Proposed Strategy
Mitigate by ….
Privacy Risk 2: Personal information is being retained in the System for longer
than it needs to be retained. (Moderate)
Proposed Strategy
Accept the risk.
4
NL Centre for Health Information
Full PIA Report Template v2.2 2013-01-03 FINAL
Table of Contents
Preamble......................................................................................................................... 3
Executive Summary ........................................................................................................ 4
1
2
3
Introduction.............................................................................................................. 6
1.1
What is a Privacy Impact Assessment?............................................................. 6
1.2
About this Privacy Impact Assessment.............................................................. 6
1.2.1
Timeline ..................................................................................................... 6
1.2.2
Scope......................................................................................................... 6
1.2.3
Methodology .............................................................................................. 6
General Description ................................................................................................. 7
2.1
Uses.................................................................................................................. 7
2.2
Support Tiers .................................................................................................... 7
2.3
Lifecycle ............................................................................................................ 7
2.4
Users and Roles ............................................................................................... 7
2.5
Personal Information ......................................................................................... 7
2.6
Architecture ....................................................................................................... 7
Privacy Analysis ...................................................................................................... 8
3.1
Accountability .................................................................................................... 8
3.2
Identifying Purpose ........................................................................................... 8
3.3
Consent ............................................................................................................ 8
3.4
Limiting Collection ............................................................................................. 8
3.5
Limiting Use, Disclosure, and Retention ............................................................ 9
3.6
Accuracy and Integrity ....................................................................................... 9
3.7
Security Safeguards .......................................................................................... 9
3.8
Openness ......................................................................................................... 9
3.9
Individual Access .............................................................................................. 9
3.10
Challenging Compliance ................................................................................ 9
4
Risks and Recommendations ................................................................................ 11
5
Conclusion............................................................................................................. 12
Appendix A
Risk Assessment Methodology ............................................................. 13
Appendix B
Sources of Information.......................................................................... 14
Appendix C
Additional appendices .......................................................................... 15
5
NL Centre for Health Information
Full PIA Report Template v2.2 2013-01-03 FINAL
1 Introduction
The Centre for Health Information (the “Centre”) provides quality information to health
professionals, the public, researchers, and health system decision-makers. Through
collaboration with the health system, the Centre supports the development of data and
technical standards, maintains key health databases, prepares and distributes health
reports and supports and carries out applied health research and benefits evaluations.
The Centre's mandate also includes the development and implementation of a
confidential and secure provincial Electronic Health Record, including the change
management required to support adoption by end user clinicians.
A line or two to describe subject of PIA. This report presents the results of a Privacy
Impact Assessment conducted on the subject.
1.1
What is a Privacy Impact Assessment?
A Privacy Impact Assessment (PIA) is an assessment tool used to evaluate the impact
on privacy that results from change to a system, environment, or process; for example,
such change might take the form of a revised policy, a software upgrade, or the
introduction of new technology. A PIA is conducted by considering the system,
environment, or process in the context of privacy principles, best practices, codes of
conduct, legislation, and relevant directives.
PIAs serve to inform relevant stakeholders and decision-makers on privacy
considerations pertaining to the system, environment, or process; as such, PIAs should
be timed so as to allow the findings of the assessment to factor into decision-making
processes.
PIAs are “living” documents that should be revisited whenever there is further change to
the system, environment, or process.
1.2
1.2.1
About this Privacy Impact Assessment
Timeline
The PIA was conducted between insert dates.
1.2.2
Scope
Describe scope.
1.2.3
Methodology
Add relevant commentary about methodology.
Sources of information that supported this PIA can be found in Sources of Information.
6
NL Centre for Health Information
Full PIA Report Template v2.2 2013-01-03 FINAL
2 General Description
Brief introduction to subject.
The subheadings found in this section are flexible – whatever is required to provide
sufficient context to perform a privacy analysis. Possible subheading might include











Uses of system
User accounts/roles
User registration
Personal Information sources
Data flows
Information Lifecycles
Architecture
Known Safeguards
Existing risk documentation
Support models
Collections, uses, and disclosures
2.1
Uses
2.2
Support Tiers
2.3
Lifecycle
2.4
Users and Roles
2.5
Personal Information
2.6
Architecture
7
NL Centre for Health Information
Full PIA Report Template v2.2 2013-01-03 FINAL
3 Privacy Analysis
The privacy analysis conducted as part of this PIA is centered on the principles of the
Canadian Standards Association Model Code for the Protection of Personal Information
(“Model Code”), which forms the basis for the Centre’s privacy program.
In addition to the principles found in the Model Code, the analysis will consider all
applicable legislation, codes of conduct, best practice, and directives. Specifically the
analysis will consider mention any specific legislation/codes (and whether or not they
align with the Model Code).
The focus of the analysis should be on the privacy principles found in the Model Code,
not legislation (discussion of specific legislative considerations should be woven through
the analysis of the principles).
3.1
Accountability
An organization is responsible for personal information under its control and shall
designate an individual or individuals who are accountable for the organization's
compliance [with the principles of the Model Code].1
Insert analysis on the principle.
3.2
Identifying Purpose
The purposes for which personal information is collected shall be identified by the
organization at or before the time the information is collected.2
Insert analysis on the principle.
3.3
Consent
The knowledge and consent of the individual are required for the collection, use, or
disclosure of personal information, except where inappropriate.3
Insert analysis on the principle.
3.4
Limiting Collection
The collection of personal information shall be limited to that which is necessary for the
purposes identified by the organization. Information shall be collected by fair and lawful
means.4
Insert analysis on the principle.
1
Canadian Standards Association Model Code for the Protection of Personal Information
2
Canadian Standards Association Model Code for the Protection of Personal Information
3
Canadian Standards Association Model Code for the Protection of Personal Information
4
Canadian Standards Association Model Code for the Protection of Personal Information
8
NL Centre for Health Information
3.5
Full PIA Report Template v2.2 2013-01-03 FINAL
Limiting Use, Disclosure, and Retention
Personal information shall not be used or disclosed for purposes other than those for
which it was collected, except with the consent of the individual or as required by law.
Personal information shall be retained only as long as necessary for the fulfillment of
those purposes.5
Insert analysis on the principle.
3.6
Accuracy and Integrity
Personal information shall be as accurate, complete, and up-to-date as is necessary for
the purposes for which it is to be used.6
Insert analysis on the principle.
3.7
Security Safeguards
Personal information shall be protected by security safeguards appropriate to the
sensitivity of the information. 7
Insert analysis on the principle, with specific attention to any security documentation,
such as Threat Risk Assessments and Vulnerability Assessments.
3.8
Openness
An organization shall make readily available to individuals specific information about its
policies and practices relating to the management of personal information. 8
Insert analysis on the principle.
3.9
Individual Access
Upon request, an individual shall be informed of the existence, use, and disclosure of his
or her personal information and shall be given access to that information. An individual
shall be able to challenge the accuracy and completeness of the information and have it
amended as appropriate. 9
Insert analysis on the principle.
3.10 Challenging Compliance
An individual shall be able to address a challenge concerning compliance [with the
principles of the Model Code] to the designated individual or individuals accountable for
the organization's compliance. 10
5
Canadian Standards Association Model Code for the Protection of Personal Information
6
Canadian Standards Association Model Code for the Protection of Personal Information
7
Canadian Standards Association Model Code for the Protection of Personal Information
8
Canadian Standards Association Model Code for the Protection of Personal Information
9
Canadian Standards Association Model Code for the Protection of Personal Information
10
Canadian Standards Association Model Code for the Protection of Personal Information
9
NL Centre for Health Information
Full PIA Report Template v2.2 2013-01-03 FINAL
Insert analysis on the principle.
10
NL Centre for Health Information
Full PIA Report Template v2.2 2013-01-03 FINAL
4 Risks and Recommendations
The Centre has not developed a risk management process explicitly for subject, but has
established an information protection risk management process for the entire
organization which is integrated into the Centre’s Enterprise Risk Management activities.
For details on the Centre’s risk assessment methodology, see Risk Assessment
Methodology.
There were insert numbers risks identified through the PIA.
Insert risks that have been identified
Privacy Risk 1: The possible locations of personal information in the System are
not well understood.
Brief explanation of risk.
Evaluation




Likelihood: Likely (4)
o List factors that contribute to scoring.
Impact: Major (4)
o List factors that contribute to scoring.
Risk Level: High (16)
Additional Notes:
o List any addition context that might be of benefit.
Proposed Strategy
Briefly describe proposed strategy (mitigate by, accept…).
Privacy Risk 2: Personal information is being retained in the System for longer
than it needs to be retained.
Brief explanation of risk.
Evaluation




Likelihood: Likely (4)
o List factors that contribute to scoring.
Impact: Major (4)
o List factors that contribute to scoring.
Risk Level: High (16)
Additional Notes:
o List any addition context that might be of benefit.
Proposed Strategy
Briefly describe proposed strategy (mitigate by, accept…).
11
NL Centre for Health Information
Full PIA Report Template v2.2 2013-01-03 FINAL
5 Conclusion
Brief conclusion.
12
NL Centre for Health Information
Appendix A
Full PIA Report Template v2.2 2013-01-03 FINAL
Risk Assessment Methodology
The Centre’s Risk Assessment approach rates both the likelihood of an adverse event,
and the impact of that event, on a scale of one to five, as illustrated in Table 1 and
Table 2. The overall score attributed to the risk of that such an adverse event occurring
is calculated as the product of the likelihood and impact ratings to produce a score and
risk level, as illustrated in Table 3. Once risks have been identified and qualified, a
decision must be made on how to manage the risk. Risks can be avoided, transferred,
mitigated or accepted.
LIKELIHOOD of Event
Level
Descriptor
5
Almost Certain
4
Likely
3
Possible
2
Unlikely
1
Rare
Table 1: Event Likelihood
IMPACT of Event
Level
Descriptor
5
Catastrophic
4
Major
3
Moderate
2
Minor
1
Insignificant
Table 2: Event Impact
Overall Risk
Level
Descriptor
20+
Extreme
11-19
High
5-10
Moderate
1-4
Low
Table 3: Overall Risk
13
NL Centre for Health Information
Appendix B
Full PIA Report Template v2.2 2013-01-03 FINAL
Sources of Information
The following sources were consulted or used in conducting the Privacy Impact
Assessment.

List sources
Some of the key informants for this PIA include the following.

List key informants
14
NL Centre for Health Information
Appendix C
Full PIA Report Template v2.2 2013-01-03 FINAL
Additional appendices
Insert additional appendices as required. Please use appendix styles for headers.
15