Audit modelPIA (CNIL) - Privacy Impact Analysis
1. Context
1. General Information
Present in a synthetic way: its name, its purpose(s), its stakes (expected contributions), its context of use
Describe the responsibilities of the stakeholders: the controller, the processors and the joint controllers if applicable
Indicate here which benchmarks are applicable to the data processing activity. The benchmarks are normative frameworks and are used to assist in conducting the analysis.
2. Description
List the data collected and processed, indicating the retention periods, the recipients and the persons who can access them.
Describe the life cycle of the data here.
You may include a flow diagram as an attachment to your response.
Detail here the medium (or carriers) of the data. For example, the application or software used to process the data.
2. Basic principles
1. Proportionality Assessment and Data Need
Explain how the purposes of the processing are specified, explicit and legitimate.
Specify the legal basis associated with your processing. For example, consent, legal obligation or legitimate interests.
Explain how each piece of data is necessary to accomplish the purposes of the processing.
Describe the measures implemented to ensure data quality.
Explain why the retention period for each data item is necessary to achieve the purposes of the processing.
2. Measures to protect rights
Indicate here the modalities of information of the persons (data charter, forms...) and the content of the information.
Indicate here how consent was obtained.
Indicate here how you can exercise these rights.
Indicate here how you can exercise these rights.
Indicate here how you can exercise these rights.
A subcontracting agreement must be concluded with each of the subcontractors, specifying all the elements provided for in art. 28 of the GDPR.
Indicate the country of transfer and the tool used.
3. Risks related to data security
1. Security measures implemented
2. Illegitimate access to data
3. Unwanted modification of data
4. Disappearance of data
4. Measures envisaged to reduce risks
1. Measures to reduce the risk of unauthorized access
2. Measures to reduce the risk of unwanted data modification
3. Measures to reduce the risk of data loss
5. Review and validation
1. Reviews of the persons concerned
2. Review of the DPO
3. Validation
The analysis must be signed by the data controller. In this case it will be the legal responsible of the organization or his representative.
Attribution / Pas d'utilisation commerciale
CC-BY-NC