Data Privacy Manual: Privacy Impact Assessment (Pia)
Data Privacy Manual: Privacy Impact Assessment (Pia)
Data Privacy Manual: Privacy Impact Assessment (Pia)
i. INSTRUCTION
a. Complete this form when performing an overall privacy impact assessment of identified Program, Project,
Process, Measure, System or Technology (PPPMST). All fields must be accomplished, unless not
applicable. Provide all the necessary information or indicate “N/A” if not applicable.
i) Ensure to complete Section I: Program, Project, Process, Measure, System or Technology (PPPMST)
Summary and Section II: Threshold Analysis.
ii) If there is no personal data exposure based on your answers in Section II, no need to accomplish Sections
III-XI. Sign and submit this form (See item d below).
iii) If there is personal data exposure based on your answers in Section II, accomplish all succeeding
Sections. Sign and submit this form (See item d below).
b. Attach data flow diagram/ data map to illustrate flow of personal data in the data processing operation
covered by this privacy impact assessment (PIA).
c. To facilitate the review of the PIA, attach or email all relevant documents such, but not limited to, the following:
Project charter
Contract
Presentation materials about the PPPMST
d. After completing this form, submit/ email to the following:
Data Protection Officer (DPO) at Email
Compliance Officer for Privacy (COP) at Email; cc DPO at Email
Page 1 of 17
Insert Logo DATA PRIVACY MANUAL
• Personal Information Controller (PIC) – refers to a natural or juridical person, or any other body who controls
the processing of personal data, or instructs another to process personal data on its behalf. The terms
excludes (i) a natural or juridical person, or any other body, who performs such functions as instructed by
another person or organization; or (ii) a natural person who processes personal data in connection with his
personal, family, or household affairs.
• Personal Information Processor (PIP) – refers to any natural or juridical person or any other body to whom a
personal information controller may outsource or instruct the processing of personal data pertaining to a data
subject.
• PPPMST - Program, Project, Process, Measure, System or Technology
• Privacy Impact Assessment - is a process undertaken and used to evaluate and manage impacts on privacy
of a particular program, project, process, measure, system or technology product of a PIC or PIP. It takes
into account the nature of the personal data to be protected, the personal data flow, the risks to privacy and
security posed by the processing, current data privacy best practices, the cost of security implementation,
and, where applicable, the size of the organization, its resources, and the complexity of its operations.
• Sensitive Personal Information – refers to personal information about an individual’s race, ethnic origin,
marital status, age, color, and religious, philosophical or political affiliations; about an individual’s health,
education, genetic or sexual life of a person, or to any proceeding for any offense committed or alleged to
have been committed by such individual, the disposal of such proceedings, or the sentence of any court in
such proceedings; issued by government agencies peculiar to an individual which includes, but is not limited
to, social security numbers, previous or current health records, licenses or its denials, suspension or
revocation, and tax returns; and specifically established by an executive order or an act of Congress to be
kept classified.
• Third Party – natural or legal person, public authority, agency or body, other than the data subject, the
controller, the processor and the persons who, under the direct authority of the controller or the processor
are authorized to process the data
• Unique Identifier – may refer to a numeric or alphanumeric string that provides the capability to uniquely
identify a wide variety of items. For example, an employee number matched with a corresponding unique
employee is considered as a unique identifier.
Page 2 of 17
Insert Logo DATA PRIVACY MANUAL
I. PPPMST SUMMARY
If the following information is available in the project charter, contract, or other materials that you have submitted
together with the PIA Form, no need to fill out the table below. In each field, just indicate the reference
document(s).
Objective of the PPPMST To evaluate candidates’ qualifications for any job vacancies,
To commence of deployment of employees,
For performance evaluation and career development,
To process data necessary for employment such as timekeeping and
benefits application,
To assist loan application of employees, and
To facilitate resignation and retirement of employees
Is this PPPMST part of No
(another/ a separate)
PPPMST?
Page 3 of 17
Insert Logo DATA PRIVACY MANUAL
Page 4 of 17
Insert Logo DATA PRIVACY MANUAL
Page 5 of 17
Insert Logo DATA PRIVACY MANUAL
Page 6 of 17
Insert Logo DATA PRIVACY MANUAL
2 Who collected or will be collecting the personal Human Resources team collects the personal
information and/ or sensitive personal information and sensitive personal information of
information? both applicants and employees.
3 How will the personal information/ sensitive Personal information and sensitive personal
personal information be collected? information are collected through resume, CV, and
application form.
4 What is the purpose of collecting the personal Personal information and sensitive personal
information/ sensitive personal information? information are used for overall evaluation of job
applicant’s qualifications, as well as maintaining
Notes: and updating current employee’s 201 records.
• Purpose must not be contrary to law,
morals, or public policy.
• The collection of personal data must be for
a declared, specified, and legitimate
purpose.
• Collection of personal data should be
adequate, relevant, suitable, necessary, and
not excessive in relation to a declared and
specified purpose.
5 Is consent obtained? If yes, in what manner? No, privacy notice is not indicated in the
“application form”.
Notes:
• There must be express consent from the
individual.
• Consent should be time-bound in relation to
the declared, specified, and legitimate
purpose.
Page 7 of 17
Insert Logo DATA PRIVACY MANUAL
6 Are the data subjects made aware of the Yes, a “declaration clause” is present in the
nature, purpose, and extent of the processing application form stating that the candidate
of their personal data, including the risks and authorizes TDI HRDD to make verifications if
safeguards involved in the processing of their necessary on the information he/she furnished and
personal data? that any misrepresentation, misinformation and/or
material omission made in relation with this
Describe how they were made aware. application for employment would render him/her
undesirable and enough basis for the immediate
termination of his/her employment in the event that
he/she was hired. Commented [ECSA2]: Kindly update this once you’ve received
7 Are the data subjects made aware of their No, privacy notice is not indicated in the their application form.
rights as data subjects and how these can be “application form”.
exercised?
8 Are the data subjects aware of the identity of No, identity and contact information of PIC and
the Personal Information Controller (PIC) or DPO are not indicated in the “application form”.
the Personal Information Processor (PIP)?
Page 8 of 17
Insert Logo DATA PRIVACY MANUAL
2 Is it being stored or will it be stored in other No, personal data is and will not be stored in other
countries? If yes, specify. countries.
3 Is the storage of personal data being or will be No, storage of personal data is and will not be
outsourced? outsourced.
Page 9 of 17
Insert Logo DATA PRIVACY MANUAL
2 How will the accuracy and completeness of Employees fills out the HR Personal Data Sheet
the personal data be maintained? should there any changes in their personal
information such as marital status, number of
dependents, etc.
3 Who is responsible for granting access to the Human Resource team is responsible for granting
personal data and keeping it up-to-date? access to the personal data and keeping them up-
to-date.
4 What is the process for withdrawing access N/A
rights when access is no longer needed (e.g.,
if an employee leaves Company or moves to
another role for which access is no longer
required)?
Page 10 of 17
Insert Logo DATA PRIVACY MANUAL
Item
Question Answer
No.
3 To whom are the personal data being N/A
disclosed to or shared with (internal and/ or
external)?
4 Are there protocols/ procedures to prevent No, data retention and disposal policies and
accidental or unauthorized destruction of files procedures are currently not in place.
generated by the data processing operation?
Page 11 of 17
Insert Logo DATA PRIVACY MANUAL
5 Will the data processing take reasonable Yes, though data retention and disposal policies
steps to destroy or de-identify personal data if and procedures are currently not in place, physical
they are no longer needed for any purpose? files are shredded once job candidate has been
rejected or employee has already resigned.
Briefly describe.
X. DATA SECURITY
Provide your answers to all the questions below or cross-refer to relevant document(s) and include as attachment to
this form. Indicate “N/A” for the fields that are not applicable. Do not leave any item blank.
Item
Question Answer
No.
1 Have you consulted IT and/ or Information N/A, HR manually processes the information.
Security Office regarding the PPPMST?
3 Who has physical and/or logical access to the Anyone from the Human Resources group has a
personal data? physical access to the personal data.
Page 12 of 17
Insert Logo DATA PRIVACY MANUAL
Item
Question Answer
No.
4 Are there protocols/ procedures to administer, Retention and disposal policy and procedures not
monitor and limit the physical and/or logical in place.
personal data access related to this
PPPMST?
5 Are the duties and responsibilities of the Duties and responsibilities of personnels involved
individuals, who will handle the processing of in personal data processing is not documented.
personal data, clearly defined and
documented?
Briefly describe.
6 Are the users/ staff, who will process personal Yes, Non-disclosure agreement (NDA) are being
data, under strict confidentiality if the personal signed by all personnel from Human Resources
data are not intended for public disclosure? Group upon contract signing.
7 Are there protocols/ procedures to restore the No, retention and disposal policy and procedures
availability of personal data and/ or access to are not in place.
personal data when an incident happens?
8 Has the PPPMST taken reasonable steps to Data privacy policies and procedures are not in
protect the personal data it holds from misuse, place.
loss, and from unauthorized access,
modification or disclosure?
9 Is it possible to extract a personal profile Data sharing policies and procedures are not in
should there be a request to do so? place.
Briefly describe.
10 Will this data processing operation utilize No servers will be utilized as Human Resources
servers? group manually processes the personal
information.
Page 13 of 17
Insert Logo DATA PRIVACY MANUAL
Item
Question Answer
No.
Where are the servers housed (e.g.,
Philippines, US, etc.)?
11 Will the PPPMST transfer personal data to an No, personal data will not be transferred to an
organization or person outside of the organization or person outside of the Philippines.
Philippines?
Describe briefly.
Page 14 of 17
Insert Logo DATA PRIVACY MANUAL
Moderate
(Casual occurrence or it might
happen at some time since the Low Moderate High
threat source is not significantly
motivated)
Low
(Not expected but there is a slight
possibility it may occur at some Low Low Moderate
time and inaction will result to
eventual data leakage.)
High
(All or majority of data subjects will
Low
Moderate be affected or may encounter that
(A small minority of data subjects
(A subset of data subjects will be could result to discrimination,
will be affected or may encounter a
affected or may encounter identity theft or fraud, reputational
few minor and acceptable
significant inconveniences.) damage public shaming, or any
inconveniences)
other significant economic or social
disadvantage)
Impact
Page 15 of 17
Insert Logo DATA PRIVACY MANUAL
B. Risk Summary
Summarize your risk assessment in the table below using the criteria in Item XI-A. Use the privacy risk map to grade the risk(s) found during PIA. To get the
risk rating: Risk = Impact x Likelihood.
Litigation or Complaint Absence of privacy notice High Incorporate privacy notice in the Low
from the data subject. in the application form. application form.
Identity Theft, Identity Data retention and High Establish data retention and disposal Low
Fraud or Hacking disposal policies and policies and procedures for electronic
procedures are not in and physical records.
place.
Incomplete and/or Absence of privacy notice High Incorporate privacy notice in the Low
inaccurate personal in the personal information personal information form (PIF).
information form (PIF) in Human
Resources group‘s bi-
annual program to update
employees’ personal
information.
(i) Considering existing controls/ mitigating measures that are already implemented.
(ii) Considering planned controls/ mitigating measures that will be implemented.
Page 16 of 17
Insert Logo DATA PRIVACY MANUAL
Page 17 of 17