25.01.2015 Views

privacy risk assessment - short form — confidential - International ...

privacy risk assessment - short form — confidential - International ...

privacy risk assessment - short form — confidential - International ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Question Background in<strong>form</strong>ation, questions to address Requirement Solution / Mitigation Action or Approval (Refer to<br />

Appendix A)<br />

3. What PI is<br />

collected, used,<br />

retained or disclosed<br />

Feel free to use Appendix B as an initial reference, and then be sure<br />

and document any addition data elements here that may be<br />

considered sensitive in the country(s) of concern.<br />

Can the <strong>risk</strong> of unauthorized access be mitigated by de-identifying the PI, in whole<br />

or part<br />

*For each sensitive<br />

data element, please<br />

describe the need for<br />

collecting or using it..<br />

Can each data element be linked to a valid business or legal reason for collection<br />

and use<br />

Comment [A1]: Why are we asking<br />

them if a data element is sensitive<br />

4. Data flow: Please<br />

describe the flow of<br />

PI (between client,<br />

ourselves, any<br />

vendors or third<br />

parties).<br />

5. Are there any client<br />

contractual<br />

requirements<br />

affecting or requiring<br />

this collection, use or<br />

disclosure of PI<br />

6. Will any third party<br />

be collecting,<br />

managing or<br />

processing PI<br />

provided by<br />

[Company] Please<br />

attach any relevant<br />

agreement.<br />

7. To whom is the PI<br />

disclosed Why (i.e.,<br />

business, legal, or<br />

regulatory reason)<br />

8. Where is the PI<br />

stored (physical<br />

location)<br />

Data flows are very helpful to understand how PI moves and with<br />

whom it’s shared: this is a template to use:<br />

Attach relevant contract terms.<br />

If PI is being shared with a third party or being processed by a<br />

vendor, please complete the data flow above.<br />

Include where appropriate, PI shared with employers, vendors of the<br />

client, or other third parties.<br />

Are there any new vendors involved Have the vendor(s) gone through the Vendor<br />

Security & Privacy Risk Assessment<br />

Page 2 of 8

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!