Completed DPIA Example: 7 Simple Helpful Steps To Create

Completed DPIA Example: 7 Simple Helpful Steps To Create

Data Protection Impact Assessments

A completed DPIA example is a key component of a ‘Privacy by design’ approach to a project or other personal data processing activity (hereafter referred to as an ‘initiative’). ‘Privacy by design’ is an essential tool in minimizing privacy risks and building trust.

What is a Data Protection Impact Assessment (DPIA)?

A DPIA is a structured approach to identifying the privacy risks associated with the processing of personal data and for implementing appropriate controls to manage those risks. The process comprises the following six distinct steps and a parallel stream of consultation:

  1. Identify the need for a DPIA
  2. Describe the information flows
  3. Identify and assess the privacy risks
  4. Identify and approve controls
  5. Assign responsibility for implementing controls
  6. Re-assess and accept the risks.

Why conduct a DPIA?

Key benefits of conducting a DPIA are:

  • Fulfilling the University’s legislative, statutory and contractual obligations, particularly those under data protection legislation in relation to data processing activities
  • Contributing towards effective risk management and increased privacy and data protection awareness across the institution
  • Giving individuals confidence that the University is taking steps to safeguard their privacy, and a better understanding of the ways in which their personal data are being used
  • Taking actions which are less likely to be privacy intrusive and have a negative impact on individuals
  • Increasing the likelihood that the initiative is more successful because privacy risks are identified early, allowing controls to be designed in at less cost and with less impact on delivery.

Is a completed DPIA example required?

A completed DPIA example should be done for any initiative that involves the processing of personal data or any other activity that could impact the privacy of individuals. Examples are:

  • Building a new IT system for storing or accessing staff personal data
  • Implementing surveillance technology in a building, such as a CCTV system
  • Using a cloud service for the storage of research data
  • Developing policies or strategies that have privacy implications.

A completed DPIA example should be done for new initiatives or for changes to existing systems or processes. It may also be a recommended outcome from a formal investigation into an information security incident or weakness at the University.

The first step in conducting a completed DPIA example is a screening process to decide whether the detailed work in the subsequent steps will be required. A completed DPIA example must be done for all research projects that may impact the privacy of individuals and/or involve the use of personal data.

When should a DPIA be undertaken?

Ideally, a DPIA should be undertaken in the early stages of an initiative. The earlier a completed DPIA example is done, the easier it is likely to be to address any privacy risks identified.

Who should conduct a DPIA?

The University Data Protection Officer has overall accountability for ensuring that completed DPIA example are done for high risk personal data processing initiatives.

Responsibility for ensuring that a specific completed DPIA example is done lies with the individual responsible for the initiative, such as:

  • The project sponsor
  • The information asset owner
  • The lead for a research project.

Who should hold the completed DPIA example?

The individual responsible for the initiative should retain the master copy of the completed DPIA example for audit purposes and to be able to demonstrate compliance with legislative requirements should a query be raised. The University’s Data Protection Officer or Information Governance Unit may request copies of DPIAs for monitoring and reporting purposes.

This template is an example of how you can record your DPIA process and
outcome. It follows the process set out in our DPIA guidance, and you should read it alongside that guidance and the Criteria for an acceptable DPIA set out in Singaporean guidelines on DPIAs.

Start to fill out the template at the beginning of any major project involving the use of personal data, or if you are making a significant change to an existing process. Integrate the final outcomes back into your project plan.

Also read: Dpia Completed Example

Step 1: Identify the need for a DPIA

Explain broadly what the project aims to achieve and what type of processing it involves. You may find it helpful to refer or link to other documents, such as a project proposal. Summarize why you identified the need for a DPIA.

Step 2: Describe the processing

Describe the nature of the processing: how will you collect, use, store and
delete data? What is the source of the data? Will you be sharing data with anyone? You might find it useful to refer to a flow diagram or another way of describing data flows. What types of processing identified as likely high risk are involved?

Describe the scope of the processing: what is the nature of the data, and does it include special category or criminal offence data? How much data will you be collecting and using? How often? How long will you keep it? How many individuals are affected? What geographical area does it cover?

Describe the context of the processing: what is the nature of your relationship with the individuals? How much control will they have? Would they expect you to use their data in this way? Do they include children or other vulnerable groups? Are there prior concerns over this type of processing or security flaws?

Is it novel in any way? What is the current state of technology in this area? Are there any current issues of public concern that you should factor in? Are you signed up to any approved code of conduct or certification scheme (once any have been approved)?

Describe the purposes of the processing: what do you want to achieve? What is the intended effect on individuals? What are the benefits of the processing for you, and more broadly?

Step 3: Consultation process

Consider how to consult with relevant stakeholders: describe when and how you will seek individuals’ views — or justify why it’s not appropriate to do so. Who else do you need to involve within your organization? Do you need to ask your processors to assist? Do you plan to consult information security experts, or any other experts?

Step 4: Identify and approve the controls

Identify controls to mitigate the risks and record them in the DPIA template. The aim is to identify sufficient controls to eliminate each of the risks identified in Step Three, or to reduce them to a level which is acceptable to the University. For some identified risks, no controls may be required because the likelihood is so low and/or the impact so small that the risks are acceptable to the University.

Controls may take many forms, such as:

  • Additional terms and conditions in a contract
  • A privacy notice
  • Documented operational procedures
  • Disabling certain product features
  • User training
  • Technical controls, such as encryption.

Once a control is identified, the expected result of its implementation should be recorded i.e. whether it is likely to:

  • Eliminate the risk
  • Reduce the risk to an acceptable level
  • Require acceptance as there is no reasonable control to eliminate or reduce it.

Proposed controls should then be approved by an appropriate individual. Normally this should be the information asset owner or their nominated delegate, but it could also be:

  • The project sponsor
  • The chair of a relevant committee.

Step 5: Assign responsibility for implementing controls

Allocate the controls to appropriate individuals and record an agreed deadline for implementation.

In the case of formal University projects, the implementation of many of the controls will fall within the scope of the project, so should be managed in the same way as any other project task. However, the implementation of some controls will be beyond the scope of the project (such as a change to University policy) so related tasks should be assigned through the University’s normal management processes and added to the list of project dependencies.

Where initiatives are being run informally, or as ‘business as usual’ activities, the University’s normal management processes should be used to identify who will implement the controls and agree an appropriate deadline. In all cases, a named individual and deadline for completion should be assigned and recorded.

In the absence of formal project management documentation, the DPIA should be used to record when controls are implemented.

Step 6: Re-assess and accept the risks

After the controls have been implemented, re-assess the risks and record the outcome in the DPIA template. The risks then need to be accepted by an appropriate individual. Normally this should be the information asset owner or their nominated delegate, but it could also be:

  • The project sponsor
  • The chair of a relevant committee.

The individual who signs off the risks should have a clear understanding of the initiative, particularly the privacy risks and how the controls address them. If any risk has not been reduced to an acceptable level after implementation of the controls identified in Step Four, additional controls will need to be identified and Step Five and Step Six will need to be repeated.


Consultation serves many purposes throughout the DPIA process, such as:

  • Explaining the initiative to stakeholders
  • Explaining to stakeholders how the DPIA process will be used within the initiative to manage privacy risks
  • Establishing current working practices that the initiative aims to update or replace
  • Establishing how the new system or process is likely to be used in practice and in the case of general purpose facilities, their likely purpose
  • Establishing the privacy concerns of stakeholders
  • Soliciting suggestions for controls
  • Explaining identified controls to stakeholders.

Key stakeholders are likely to include:

  • Individuals who understand the initiative from a technical point of view and in terms of personal data processing
  • Individuals who will be using the new system or process
  • Individuals whose personal data will be processed by the new system or process
  • Collaborative partners
  • The suppliers of a system
  • The University’s Information Governance Unit, Computing and Information Services (CIS) and Legal Services.

In cases where the impact of a risk identified at Step Three is assessed to be either severe or major and likelihood is assessed to be either likely or very likely, the University’s Data Protection Officer must be consulted. If any risk remains at this level after the implementation of controls, the University may be required to consult the Information Commissioner’s Office.

Also read: What you need to know about appointing a Data Protection Officer in Singapore

Originally published at Follow us on the following pages for more updates! Facebook | Twitter | LinkedIn | YouTube | Website



Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Privacy Ninja

Privacy Ninja

Privacy Ninja is Singapore’s leading cybersecurity & data protection firm offering the most affordable services, like outsourced Data Protection Service & VAPT.