Dpia Iot
Dpia Iot
Dpia Iot
Contents
Foreword .............................................................................................................. 1
1 Study of the context ............................................................................................... 2
1.1 Overview of the processing ................................................................................................... 2
1.2 Data, processes and supporting assets .................................................................................. 3
2 Study of the fundamental principles ..................................................................... 6
2.1 Controls guaranteeing the proportionality and necessity of the processing ........................ 6
2.2 Controls protecting data subjects’ rights ............................................................................ 12
2.3 Assessment of compliance with the fundamental principles .............................................. 19
3 Study of data security risks ................................................................................. 20
3.1 Assessment of existing or planned controls ........................................................................20
3.2 Risk assessment: potential privacy breaches ...................................................................... 27
4 Validation of the PIA ........................................................................................... 32
4.1 Preparation of the material required for validation............................................................ 32
4.2 Formal validation of the PIA ...............................................................................................38
Appendices ................................................................................................................ 39
1. Data minimization controls..........................................................................................................39
2. Risk sources ................................................................................................................................ 40
3. Severity scale and examples of impacts ....................................................................................... 41
4. Likelihood scale and examples of threats .................................................................................... 43
5. Scales for the action plan .............................................................................................................48
6. Typology of objectives to address the risks..................................................................................48
PIA, application to connected objects February 2018 edition
Foreword
This document is an application of the PIA guides published by the CNIL to the specific
sector of the IoT devices (connected objects).
Performed in principle by a controller or provider, the purpose of a PIA is to build and demonstrate
the implementation of privacy protection principles so as to empower data subjects.
This is an iterative methodology, which should guarantee a reasoned, reliable use of such data during
processing.
This document is based upon the PIA method of the French Data Protection Authority (CNIL)
The methodology comprises three guides, one setting out the approach, a second containing facts that
could be used for formalizing the analysis and a third providing knowledge bases (a catalogue of
controls aimed at complying with the legal requirements and treating the risks, and examples):
These can be downloaded from the CNIL website and will be useful for completing this document:
https://www.cnil.fr/en/privacy-impact-assessments-cnil-publishes-its-pia-manual
This document is laid out like a PIA report – the deliverable of the PIA 1.
Some parts of this document [grey shaded areas] have been filled in for illustrative purposes, taking
as an example a fictional generic product comprising an interactive toy which can also be used as a
babyphone, a mobile app and an online service, for which personal data are stored by a third-party
hosting provider which calls on service providers (interactivity, analysis of uses, advertising
company).
In addition, there are notes giving advice or highlighting points to be vigilant about in the specific
context of connected objects.
Lastly, insets [beige areas] provide methodological support throughout the document to inform the
planned assessments.
1
PIA, application to connected objects February 2018 edition
Generally
aspects .
carried out by the project owner , with the help of a person in charge of “Data protection”
3
2
Objective: gain a clear overview of the personal data processing operations under consideration.
2 In the business sense. This may be delegated, represented or processed by another stakeholder.
3 Such as the data protection officer for example.
4 Answer the question "What are the expected benefits (for the organization, for the data subjects, for society in
general, etc.)?"
5 Depending on the case, they will particularly be useful to demonstrate compliance with fundamental
principles, justify controls or prove that they correspond to the state of the art.
6 Other examples: security policy, sector-specific legal standards, etc.
2
PIA, application to connected objects February 2018 edition
3
PIA, application to connected objects February 2018 edition
Persons with
Personal data Categories Recipients
access thereto
Sensitive data (in the The firm Héb +
meaning of the GDPR):
Analysis of uses and targeted Authorized staff at
data relating to minors
advertising the firms Fab and
Héb
Below you will find a table for listing in detail all the data processing operations carried out.
4
PIA, application to connected objects February 2018 edition
To show how to use it, it has been completed with our example of a fictional toy.
Processes Detailed description of the process
1. Open an account The user provides identification data to open his or her account
2. Capture the data Data are recorded via sensors
The data are transferred to the mobile app, directly via the device or through
3. Transfer to the mobile
the cloud servers
4. Enter the data Data are entered into the mobile app
5. Store in the mobile The data are stored in the mobile app
6. Send the data to the The data are sent to the cloud servers, via the device directly or the mobile
servers app
The interactive platform in the cloud generates the response data on the
7. Generate interactivity
basis of previous dialogues and the interests detected
The interactive data are sent back to the device, directly or through the
8. Send the data to the toy
mobile app
9. Store the data on the
The captured and calculated data are stored on the cloud servers
servers
Data analysis algorithms are run on the cloud servers to produce statistics on
10. Analyze the data
use and advertising targeting
11. Consult the cloud server Part of the captured and calculated data can be consulted via the mobile app
data or on a personal Web space
Some data can be passed on to third-party apps or posted on social media
12. Share the data
websites
NB: the whole of Part 1 "Context" must be read through by the DPO to make sure that it is exhaustive
and properly reflects the way things really are.
This is all the more necessary given that this part describes the key aspects and notions on which the
following chapters are based.
10 Can be broken down into hardware (and electronic data media), software and computer channels.
11 Can be broken down into people, paper documents and paper transmission channels.
5
PIA, application to connected objects February 2018 edition
Generally performed by the project owner and then assessed by a person in charge of "Data
Protection".
Objective: build the system that ensures compliance with privacy principles.
Note: In Para. 2.3 below, you will find a table for summarizing the justifications for all these points
and for recording their assessment and any corrective controls.
Note: remember to explain the purposes of sharing with third parties, in particular for advertising
and "partner offers", as well as the data processing purposes for improving the service.
Note: remember to explain the specific conditions under which the processing will take place,
particularly by clarifying data matching where applicable.
12
See Article 5.1 (b) of the [GDPR].
13On the legitimacy of the purpose, see opinion WP 203 of the Article 29 Data Protection Working Party -
http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-
recommendation/files/2013/wp203_en.pdf.
6
PIA, application to connected objects February 2018 edition
NB 14 : on account of a child's general vulnerability and the fact that personal data must be processed
fairly and lawfully, the controllers of a processing operation targeting children must comply even
more strictly with the principles of purpose limitation.
More particularly, the controllers must not use the child's data for profiling purposes (e.g. for
targeted advertising), whether directly or indirectly, insofar as it is not possible for a child to
understand the implications of this, and it therefore goes beyond what can be considered fair
processing.
Note: where processing is carried out in accordance with a legal obligation or where processing is
necessary for the performance of a task carried out in the public interest or in the exercise of official
authority, clarify in the justification the legal basis for the processing in Union law or the law of the
Member State to which the controller is subject.
Note: there can be several types of basis for a processing operation: for example, a contract associated
with the purchase of a product for using it for its primary purpose and consent for its secondary
purposes (improving the service, marketing, etc.) which will be obtained when the product is
activated.
NB: Where the processing for a purpose other than that for which the personal data have been
collected is not based on the data subject's consent or on a Union or Member State law, the controller
7
PIA, application to connected objects February 2018 edition
shall, in order to ascertain whether processing for another purpose is compatible with the purpose
for which the personal data are initially collected, take into account, inter alia:
any link between the purposes for which the personal data have been collected and the
purposes of the intended further processing;
the context in which the personal data have been collected, in particular regarding the
relationship between data subjects and the controller;
the nature of the personal data, in particular whether special categories of personal data are
processed, or whether personal data related to criminal convictions and offences are
processed 18;
the possible consequences of the intended further processing for data subjects;
the existence of appropriate safeguards, which may include encryption or pseudonymization.
Below you will find a table for listing the data processed, reduced to what is strictly necessary,
alongside the justification of the need and any additional minimization controls.
To show how to use it, it has been completed with the data from our example of a fictional toy.
Justification of the
Details about the data Minimization
Data types Data categories need and relevance of
processed controls
the data
Separate storage of
identifying data in
an encrypted base
Texts/messages, sounds, Aspects that are part
Common images, movements, of the
data Personal life (living temperature, humidity communication
habits, marital Answers to children's features
status, excluding questions and
sensitive or identification of
dangerous data, etc.) interests to help make
answers more relevant,
targeted advertising
Professional life Not collected
(résumé, education
and professional
training, awards,
etc.)
8
PIA, application to connected objects February 2018 edition
Justification of the
Details about the data Minimization
Data types Data categories need and relevance of
processed controls
the data
Opinions bearing on Not collected but can Aspects that are part
philosophy, politics, appear directly or of the
religion, trade union indirectly in the text, communication
involvement, audio and video data features
Sensitive sexuality, health
data in the data, racial or ethnic
meaning origin, data
of the concerning health or
[DP-Act] 20 sexuality
Notes: remember to clearly justify the collection of certain data (location, date of birth, age, weight,
etc.) and clearly distinguish between anonymous and pseudonymous data.
Tip: avoid free text input fields (like "comments" fields), because of the risk of users noting down
there information that does not comply with the minimization principles. Preference should
therefore be given to scroll-down list type fields. If free-form text fields cannot be avoided, users'
awareness must be raised in how to use such fields, with regard to the standard terms & conditions
for service and the law (no offensive words, no undeclared sensitive data, etc.).
NB: for processing of minors' details, the data are considered overall to be sensitive pursuant to the
[GDPR].
20 Also see Articles 9 & 10 of the [GDPR]. Restrictions of use and special formalities are to be taken into account.
9
PIA, application to connected objects February 2018 edition
NB 21 : on account of a child's general vulnerability and the fact that personal data must be processed
fairly and lawfully, the controllers of a processing operation targeting children must comply even
more strictly with the principles of data minimization and purpose limitation.
The data controllers should also specifically refrain from any collection of data relating to the parents
or family members of the child user, such as financial information or information about special
categories of information, such as medical data.
Notes: By reducing the amount of available and processed data, archiving and purging help to limit
the impacts in the event of theft or accidental dissemination of the database.
In order to ensure that these storage durations are effective, it is recommended to set up an automatic
mechanism based on the date on which the data are created or last used.
NB: For sensitive data and high-risk data, use should be made of secure erasure tools that make the
data irretrievable.
10
PIA, application to connected objects February 2018 edition
The storage durations, their justification and purge mechanisms can be presented in the table below.
Justification of the Erasure mechanism at the end
Data types Storage duration
storage duration of the storage duration
Common data
Archived data
Functional traces
Technical logs
11
PIA, application to connected objects February 2018 edition
2.2.1 Information for the data subjects (fair and transparent processing)24
If the processing benefits from an exemption from the right to information, as provided for in Articles
12, 13 & 14 of the [GDPR], you will need to justify this below.
Exemption from having to inform the data subjects Justification
Otherwise, below you will find a list of controls intended to provide information to users (or their
parents) 25.
You need to describe how they are implemented (preferably by attaching screenshots and document
extracts) on the device, mobile app and personal account, and justify the arrangements for or
impossibility of implementing them.
Personal
Controls for the right to information Device Mobile app Justification
account
24
See Articles 12, 13 & 14 of the [GDPR].
25See the CNIL's website: "Editeurs de sites pour enfants : n’oubliez pas vos obligations !" (Publishers of
websites for children: remember your obligations!).
12
PIA, application to connected objects February 2018 edition
Personal
Controls for the right to information Device Mobile app Justification
account
NB: in the event that data are transmitted to third-party bodies in relation to the data controller
(subsidiaries, members, intra-group, partners, etc.), it is necessary to supply the list of recipients (in
a dedicated information section), clarifying the data categories transmitted and the transfer purpose,
and providing a hyperlink to the data protection policy of the respective recipients. An internal
process must also be planned so as to be able to update this list in the event of changes.
NB 26: App developers, in collaboration with app stores and operating system and device
manufacturers, should present the relevant information in a simple manner, in age specific language
adapted to young children – possibly via a sound message.
Recommendation: place an information “QR Code" on the device and make the users (or their
parents) aware of their responsibility to inform third parties that their data are likely to be collected
(e.g. the other children conversing with the device or featured on the shared photos).
13
PIA, application to connected objects February 2018 edition
Personal
Controls for obtaining consent Device Mobile app Justification
account
NB 30: the GDPR has strengthened the legal basis regarding consent for any direct provision of
information society services to minors, and the burden of proof (unambiguous) lies with the data
controller or processor.
In practice, the consent of the holder of parental responsibility is required for children under 16 years
of age, with Member States able to determine a lower age, as long as this is not below 13 years of age.
The data controller must make reasonable efforts to check that the holder of parental responsibility
has indeed consented, in view of the technological means available.
NB 31: When consent can legally be obtained from a minor, and the app is intended to be used by a
child or a minor, the data controller should pay attention to the minor’s potentially limited
understanding of and attention for information about data processing.
App developers, in collaboration with app stores and operating system and device manufacturers,
should present the relevant information in a simple manner, in age specific language.
14
PIA, application to connected objects February 2018 edition
Otherwise, below you will find a list of the controls intended to ensure users' (or their parents') right
of access to all personal data concerning them.
You will have to describe their implementation on the device, the mobile app and the personal
account, as well as a justification on the arrangements for or impossibility of implementing them.
Personal
Controls for the right of access Device Mobile app Justification
account
Lastly, where the right to data portability applies to processing pursuant to Article 20 of the [GDPR],
you will have to describe its implementation below.
Personal
Controls for the right to data portability Device Mobile app Justification
account
32
See Article 39 of the [DP-Act] and Article 15 of the [GDPR].
33 See Article 48 of Act 2016-1321 of 7 October 2016 for a digital Republic and Article 20 of the [GDPR].
15
PIA, application to connected objects February 2018 edition
Otherwise, below you will find a list of controls intended to ensure the right to rectification or erasure
of data of users (or their parents 35) who request this.
You will have to describe their implementation on the device, the mobile app and the personal
account, as well as a justification on the arrangements for or impossibility of implementing them.
Controls for the rights to rectification and Personal
Device Mobile app Justification
erasure account
NB 36: The data controller has one month in which to erase the data or respond to the data subject;
beyond this time limit, the data subject can refer the case to its Data Protection Authority (the CNIL
in France). There are exceptions, particularly in the event the information published is necessary for
the freedom of information, on the grounds of public interest or to comply with a legal obligation.
An Internet user under 18 years of age at the time of publication or creation of an online account can
directly and without the need for an explanation, ask the website to erase data concerning him/her
at the earliest possible opportunity.
34
See Articles 40 & 41 of the [DP-Act] and Articles 16, 17 & 19 of the [GDPR].
35 See on CNIL website: "Editeurs de sites pour enfants : n’oubliez pas vos obligations !" (Publishers of websites
for children: remember your obligations!).
36 See Act 2016-1321 of 7 October 2016 for a digital Republic amending Article 40 of the [DP-Act], which rounds
16
PIA, application to connected objects February 2018 edition
Otherwise, below you will find a list of controls intended to ensure the right to object and to restriction
either concerning the different purposes or the whole of a processing operation.
You will have to describe their implementation on the device, the mobile app and the personal
account, as well as a justification on the arrangements for or impossibility of implementing them.
Controls for the rights to restriction and to Personal
Device Mobile app Justification
object account
37
See Articles 18 & 21 of the [GDPR].
17
PIA, application to connected objects February 2018 edition
Note: the right to restriction allows the data subject to call for processing of his/her data to be
“frozen”, as a protective control while its legitimacy is being checked, for example.
2.2.7 Transfers: compliance with the obligations bearing on transfer of data outside the
European Union39
Below you will find a table for setting out in detail the geographic storage location of the device, mobile
app and personal account data in the cloud.
Depending on the country in question, you will have to justify the choice of remote hosting and
indicate the legal supervision arrangements implemented in order to ensure adequate protection of
the data subject to a cross-border transfer.
Country Justification and supervision
recognized as Other (standard contractual
European providing country clauses, internal corporate
Data storage location France
Union adequate regulations)
protection by
the EU
Device data
18
PIA, application to connected objects February 2018 edition
Obtaining consent
19
PIA, application to connected objects February 2018 edition
Generally
aspects .
performed by the prime contractor
42
41, then assessed by a person in charge of “Data security”
Identify or determine the existing or planned controls (already undertaken), which can
take three different forms:
1. controls bearing specifically on the data being processed: encryption,
anonymization, partitioning, access control, traceability, etc.;
2. general security controls regarding the system in which the processing is
carried out: operating security, backups, hardware security, etc.;
3. organizational controls (governance): policy, project management, personnel
management, management of incidents and breaches, relations with third parties, etc.
Check that improving each control and its description, pursuant to best security practice, is
either not necessary or not possible.
Where applicable, review their description or propose additional controls.
Notes: The security control categories below correspond to the CNIL's recommended good
practices 43.
You will also need to take account of the sector-specific standards applicable to your processing 44
(general security policy, PIA Framework, code of conduct, etc.).
Note: In Para. 3.1.4 below, you will find a table for summarizing the implementation of all these
controls and for recording their assessment and any corrective controls.
20
PIA, application to connected objects February 2018 edition
Encryption
Describe here the means implemented for ensuring the confidentiality of data stored (in
the database, in flat files, backups, etc.), as well as the procedure for managing encryption keys
(creation, storage, change in the event of suspected cases of data compromise, etc.).
Describe the encryption means employed for data flows (VPN, TLS, etc.) implemented in the
processing.
Anonymization
Indicate here whether anonymization mechanisms are implemented, which ones and for what
purpose.
Where applicable, specify the rules applicable to passwords (minimum length, required
characters, validity duration, number of failed attempts before access to account is locked, etc.).
Notes: think about the security of the user's password, whether on the device, smartphone or in the
cloud. Passwords must be stored properly hashed by a robust algorithm with a salt applied
beforehand.
Think about protecting access to the app on the smartphone with a specific password.
Think about securing peering between the device, mobile app and personal account.
Think about protecting the data, including metadata (including Exif) and technical traces in the event
of direct access via physical connection to the device or smartphone.
45See the CNIL deliberation no. 017-012 of 19 January 2017 on the adoption of a recommendation relating to
passwords.
21
PIA, application to connected objects February 2018 edition
Traceability (logging)
Indicate here whether events are logged and how long these traces are stored for.
Integrity monitoring
Where applicable, indicate here whether mechanisms are implemented for integrity monitoring of
stored data, which ones and for what purpose.
Specify which integrity control mechanisms are implemented on data flows.
Archiving
Where applicable, describe here the processes of archive management (delivery, storage,
consultation, etc.) under your responsibility. Specify the archiving roles (offices of origin,
transferring agencies, etc.) and the archiving policy.
State if data may fall within the scope of public archives.
3.1.2 General security controls regarding the system in which the processing is carried
out
The following controls generally concern the security of the whole body. They can particularly be
formally documented in a cybersecurity policy (PSSI) or equivalent.
Operating security
Describe here how the software updates (operating systems, applications, etc.) and application
of security patches are carried out.
Website security
Indicate here whether ANSSI's "Recommendations for securing websites" have been implemented.
22
PIA, application to connected objects February 2018 edition
Backups
Indicate here how backups are managed. Clarify whether they are stored in a safe place.
Maintenance
Describe here how physical maintenance of hardware is managed, and state whether this is
contracted out.
Indicate whether the remote maintenance of apps is authorized, and according to what
arrangements.
Specify whether defective equipment is managed in a specific manner.
Monitoring
Indicate here whether real-time monitoring of local network is implemented and with what means.
Indicate whether monitoring of hardware and software configurations is carried out and by what
means.
Hardware security
Indicate here the controls bearing on the physical security of servers and workstations
(secure storage, security cables, confidentiality filters, secure erasure prior to scrapping, etc.).
Organization
Indicate if the roles and responsibilities for data protection are defined.
Specify whether a person is responsible for the enforcement of privacy laws and regulations.
Specify whether there is a monitoring committee (or equivalent) responsible for the guidance
and follow-up of actions concerning the protection of privacy.
Risk management
Indicate here whether the privacy risks posed by new treatments on data subjects are assessed,
whether or not it is systematic and, if applicable, according to which method.
Specify whether an organization-level mapping of privacy risks is established.
Project management
Indicate here whether device tests are performed on non-real/anonymous data.
Personnel management
Indicate here what awareness-raising controls are carried out with regard to a new recruit.
Indicate what controls are carried out when persons who have been accessing data leave their job.
Supervision
Indicate here whether the effectiveness and adequacy of privacy controls are monitored.
24
PIA, application to connected objects February 2018 edition
Acceptable/c
Controls bearing specifically on the data Implementation or an be
Corrective controls
being processed justification why not improved
on?
Encryption
Anonymization
Data partitioning (in relation to the rest of
the information system)
Logical access control
Traceability (logging)
Integrity monitoring
Archiving
Paper document security
Acceptable/c
General security controls regarding the
Implementation or an be
system in which the processing is carried Corrective controls
justification why not improved
out
on?
Operating security
Managing workstations and clamping
down on malicious software
Website security
Backups
Maintenance
Security of computer channels (networks)
Monitoring
Physical access control
Hardware security
Avoiding sources of risk
Protecting against non-human sources of
risks
25
PIA, application to connected objects February 2018 edition
Acceptable/c
Implementation or an be
Organizational controls (governance) Corrective controls
justification why not improved
on?
Organization
Policy (management of rules)
Risk management
Project management
Management of incidents and data
breaches
Personnel management
Relations with third parties
Supervision
26
PIA, application to connected objects February 2018 edition
Generally
aspects.
performed by the project owner, then assessed by a person in charge of “Data protection”
For each feared event (illegitimate access to personal data 46, unwanted change of personal
data 47, and disappearance of personal data48) :
o determine the potential impacts 49 on data subjects' privacy if it occurred 50 ;
o estimate its severity, particularly depending on the prejudicial nature of the potential
impacts and, where applicable, controls likely to modify them;
o Identify the threats51 to personal data supporting assets that could lead to this feared
event 52 and the risk sources 53 that could cause it;
o estimate its likelihood, particularly depending on the level of vulnerabilities of
personal data supporting assets, the level of capabilities of the risk sources to exploit
them and the controls likely to modify them;
Determine whether the risks identified in this way 54 can be considered acceptable in view of
the existing or planned controls (already undertaken).
If not, propose additional controls and re-assess the level of each of the risks in view of the
latter, so as to determine the residual risks 55.
NB: since the existing or planned controls (already undertaken) are taken on board in the risk
assessment, before moving on to Part 3.2, the controls identified in Para. 2 (legal) and Para. 3.1
(security) must first have been assessed to ensure that their list is exhaustive and properly reflects the
way things really are.
NB: any corrective controls suggested by the assessor in Paras 2.3 and 3.1.4 must be taken into account
during the residual risk calculation in Paras 3.2.1, 3.2.2 and 3.2.3, at the same time as the corrective
controls specific to each of the risks.
All of the corrective controls will be set out in the action plan in Para. 4.1.
27
PIA, application to connected objects February 2018 edition
To show how to use it, it has been completed with the data from our example of a fictional toy.
Main controls
Main risk Main potential
Risk Main threats 57 reducing the severity Severity 60 Likelihood 61
sources 56 impacts 58
and likelihood 59
Rogue Minimization
acquaintances Storage durations
Consequences
Rogue of the Logical access control
neighbor disclosure of Stream encryption
Data potentially
theft/consultation (SSL)
sensitive
Rogue on the server information Hardware
Illegitimate employee (discrimination, authentication
access to threats, attacks, Private cloud
Account theft (via Significant Maximum
personal loss of Logical access control
Authorized a smartphone)
data employment,
third-party Employee clearance
company loss of access to
Recovery of a services, etc.) Access logging
scrapped device Log audits
Phishing
Hacker Notification of data
targeting a Targeted
advertising subject violations and
user or one of recommendation of
the suitable preventive
companies controls
Describe here a few representative scenarios of the risk of illegitimate data access, by spelling out
the sources, threats and impacts.
Below you will find an illustration based on our example of a fictional toy:
Data could be stolen by an employee with a profit motive or malicious intent, consulted by family
or friends taking over the account via the smartphone, or retrieved on a scrapped device by
neighbors or a hacker with a view to characterizing a situation bearing on the data subjects' private
life.
56 Relevant sources for this risk, among those identified in the context of the processing (see Appendix 2 – Risk
sources).
57 See Appendix 4 – Likelihood scale and examples of threats.
58 See Appendix 3 – Severity scale and examples of impacts.
59 Controls among those identified in Para. 2 (legal) and Para. 3.1 (security).
60 See Appendix 3 – Severity scale and examples of impacts.
61 See Appendix 4 – Likelihood scale and examples of threats.
28
PIA, application to connected objects February 2018 edition
Corrective controls:
Where applicable, he shall indicate here any additional controls that would prove necessary.
Residual risks:
The assessor will indicate here the residual risk for the processing once the aforementioned
additional controls have been implemented, by determining the severity and likelihood in view of
these controls.
Severity: Likelihood:
NB: an additional control carried out to deal with one of the risks can also have a positive or negative
effect on the other risks.
Below you will find an illustration based on our example of a fictional toy:
Can be improved on:
The planned controls do not sufficiently reduce this risk for it to be deemed acceptable.
Corrective controls:
- carry out encryption of the data stored in the base;
- inform the user of the good practices to follow when scrapping the device;
- supply a charter on using IT equipment and a confidentiality undertaking for employees.
Residual risks:
Data could be consulted by family or friends, taking over the account via the smartphone.
Severity: Significant Likelihood: Negligible
29
PIA, application to connected objects February 2018 edition
Negligent
or rogue
user Backup of the cloud server
/family
member Stream encryption (SSL)
/friend Hardware authentication
Identity theft Private cloud
Rogue Logical access control
Unwanted neighbor Alteration of
change of data on the Deterioration in Employee clearance Limited Limited
data server the service Access logging
Negligent
quality Log audits
or rogue
employee Notification of data subject
violations and
recommendation of
Hacker suitable preventive
targeting controls
one of the
companies
Describe here a few representative scenarios of the risk of an unwanted change of data by spelling
out the sources, threats and impacts.
30
PIA, application to connected objects February 2018 edition
Negligent
or rogue
user
Backup of the cloud server
/family
member
/friend Need to recreate Private cloud
Erasure of data a user account Physical protection of the
Negligent (via the app or cloud servers
or rogue server) Loss of history Maintenance
Disappearance employee Deterioration of and personal Temporary on-premises
Limited Limited
of data servers service settings data retention
Hacker Physical Logical access control
targeting a damage to the Deterioration in Employee clearance
user or device the service Strong authentication of
one of the quality employees
companies
Access logging
Warranty for the device
Damage at
one of the
companies
Describe here a few representative scenarios of the risk of data disappearing, by spelling out the
sources, threats and impacts.
31
PIA, application to connected objects February 2018 edition
Generally
aspects.
performed by the controller, with the help of a person in charge of "Data Protection"
Objective: decide whether or not to accept the PIA in light of the study's findings.
Note: The spaces for noting down the assessment of controls and risks are inserted directly into the
previous parts, as near to the aspects to be assessed as possible.
All of the parts must be assessed before deciding on whether the PIA can be validated or not.
32
PIA, application to connected objects February 2018 edition
Graph scale:
0. Non applicable
1. Can be improved on
2. Acceptable
3. Good practices
33
PIA, application to connected objects February 2018 edition
Encryption
Supervision Anonymization
Relations with third parties Data partitioning (in…
Personnel management Logical access control
Graph scale:
0. Non applicable
1. Can be improved on
2. Acceptable
3. Good practices
34
PIA, application to connected objects February 2018 edition
Severity
4. Maximum
Illegitimate Illegitimate
3. Significant
access to data access to data
Unwanted Unwanted
change to data change to data
2. Limited
Disappearance Disappearance
of data of data
1. Negligible
Likelihood
35
PIA, application to connected objects February 2018 edition
Customer
Inform the user of the good practices to
service and Month Low Nil Not started
follow when scrapping the hardware
CISO
Prime
Carry out encryption of the data stored in Moder
contractor Quarter Moderate Not started
the base ate
and CISO
NB: all of the controls specified under the action plan will have to be formally documented, set up
and monitored at regular intervals and subject to continuous improvement.
Note: this view may be against the processing being implemented, without restricting the decision of
the data controller for all that.
On dd/mm/yyyy, the Data Protection Officer of the company X issued the following opinion
concerning the compliance of the processing and PIA study carried out:
[Signature]
36
PIA, application to connected objects February 2018 edition
NB 67: the data controller must seek the views of the data subjects or their representatives, where
applicable.
These views may be gathered by diverse means, depending on the context (internal or external study
on the processing methods and purpose, question for the attention of staff representatives or trade
unions, survey among future customers of the data processor).
Where the data controller decides to go against the views of the data subjects, he must note down the
justification for this decision.
Where the data controller considers that gathering the views of the data subjects is not relevant, he
must also note down the justification thereof.
The data subjects [were/were not] consulted [and expressed the following view on the compliance of
the processing in light of the study performed]:
37
PIA, application to connected objects February 2018 edition
Where necessary, repeat the previous steps so that the PIA can be validated 68.
Note: this decision does not prejudge the compliance assessment which may be carried out, where
applicable, by the Data Protection Authority (the CNIL in France), as part of preliminary formalities
or checks for example.
Below you will find a PIA formal validation example, illustrated using the information from our
example of a fictional toy.
On dd/mm/yyyy, the Managing Director of the company X validates the PIA for the processing of the
connected toy, in light of the study carried out, in his capacity as data controller.
The purposes of the processing are to provide interactivity to the child, through the possibility of
dialogue with the toy (questions/answers in natural language by voice recognition), enable the child
to communicate online (send voice messages, texts and photos) with his/her friends and/or parents
and feed information back to the parents (surveillance device).
The controls planned for complying with the fundamental principles underpinning privacy protection
and for addressing the risks to the privacy of data subjects have indeed been deemed acceptable in
light of these stakes. The implementation of additional controls will nevertheless have to be
demonstrated, as will continuous improvement of the PIA.
[Signature]
38
PIA, application to connected objects February 2018 edition
Appendices
Filtering and removal When data are being imported, different types of metadata (such as EXIF data
attached with an image file) can unintentionally be collected.
Such metadata must be identified and eliminated if they are unnecessary for the
purposes specified.
Reducing sensitivity Once sensitive data have been received, as part of a series of general information
via conversion or transmitted for statistical purposes only, these can be converted into a less
sensitive form or pseudonymized.
For example, if the system collects the IP address to determine the user's location
for a statistical purpose, the IP address can be deleted once the city or district has
been deduced.
If the system receives video data from surveillance cameras, it can recognize
people who are standing or moving in the scene and blur them.
If the system is a smart meter, it can aggregate the use of energy over a certain
period, without recording it in real time.
The choice of a method from the list above must be made on the basis of the
threats identified. For some types of threat to privacy, pseudonymization will be
more appropriate than anonymization (for example, if there is a traceability need).
In addition, some threats to privacy will be addressed using a combination of
methods.
Reducing data The system can be organized into independent parts with separate access control
accumulation functions. The data can also be divided between these independent sub-systems
and controlled by each sub-system using different access control mechanisms. If a
sub-system is compromised, the impacts on all of the data can thus be reduced.
Restricting data The system can limit data access according to the "need to know" principle. The
access system can separate the sensitive data and apply specific access control policies.
The system can also encrypt sensitive data to protect their confidentiality during
transmission and storage. Access to temporary shadow files which are produced
during the data processing must also be protected.
39
PIA, application to connected objects February 2018 edition
2. Risk sources
By way of an example, the table below describes the risk sources and their capabilities, which are
relevant in the context of our example of our fictional toy.
40
PIA, application to connected objects February 2018 edition
Generic description of
Examples of Examples of material Examples of moral
Levels impacts (direct and
physical impacts 69 impacts 70 impacts 71
indirect)
Mere annoyance caused by
information received or
Loss of time in repeating requested
formalities or waiting for Fear of losing control over
Lack of adequate them to be fulfilled one’s data
care for a Receipt of unsolicited mail Feeling of invasion of
Data subjects either will dependent person (e.g.: spams) privacy without real or
not be affected or may (minor, person Reuse of data published on objective harm (e.g.
1. encounter a few under websites for the purpose of commercial intrusion)
Negligible inconveniences, which guardianship)
they will overcome targeted advertising Loss of time in configuring
without any problem (information to social one’s data
Transient networks, reuse for paper Lack of respect for the
headaches mailing) freedom of online
Targeted advertising for movement due to the denial
common consumer products of access to a commercial
site (e.g. alcohol because of
the wrong age)
Unanticipated payments
(e.g.: fines imposed
erroneously), additional costs
(e.g.: bank charges, legal
fees), payment defaults Refusal to continue using
Minor physical Denial of access to information systems
ailments (e.g.: administrative services or (whistleblowing, social
minor illness due to commercial services networks)
disregard of
contraindications) Lost opportunities of comfort Minor but objective
(e.g.: cancellation of leisure, psychological ailments
Data subjects may purchases, holiday, (defamation, reputation)
encounter significant Lack of care leading termination of an online Relationship problems with
inconveniences, which to a minor but real account)
2. Limited personal or professional
they will be able to harm (e.g. Missed career promotion acquaintances (e.g.: image,
overcome despite a few disability)
Blocked online services tarnished reputation, loss
difficulties
account (e.g.: games, of recognition)
Defamation administration) Feeling of invasion of
resulting in Receipt of unsolicited privacy without irreversible
physical or targeted mailings likely to damage
psychological damage the reputation of Intimidation on social
retaliation data subjects networks
Cost rise (e.g.: increased
insurance prices)
Non-updated data (e.g.:
position held previously)
41
PIA, application to connected objects February 2018 edition
Generic description of
Examples of Examples of material Examples of moral
Levels impacts (direct and
physical impacts 69 impacts 70 impacts 71
indirect)
Processing of incorrect data
creating for example account
malfunctions (bank,
customers, with social
organizations, etc.)
Targeted online advertising
on a private aspect that the
individual wanted to keep
confidential (e.g. pregnancy
advertising, drug treatment)
Inaccurate or inappropriate
profiling
Misappropriation of money
not compensated
Non-temporary financial
difficulties (e.g.: obligation to
take a loan) Serious psychological
Serious physical Targeted, unique and non- ailments (e.g.: depression,
ailments causing recurring, lost opportunities development of a phobia)
long-term harm (e.g.: home loan, refusal of Feeling of invasion of
(e.g.: worsening of studies, internships or privacy with irreversible
Data subjects may health due to
encounter significant employment, examination damage
improper care, or ban)
consequences, which Feeling of vulnerability
3. disregard of
they should be able to Prohibition on the holding of after a summons to court
Significant contraindications)
overcome albeit with bank accounts Feeling of violation of
real and serious Alteration of
Damage to property fundamental rights (e.g.:
difficulties physical integrity
Loss of housing discrimination, freedom of
for example
expression)
following an Loss of employment
assault, an accident Victim of blackmailing
Separation or divorce
at home, work, etc. Cyberbullying and
Financial loss as a result of a harassment
fraud (e.g.: after an
attempted phishing)
Blocked abroad
Loss of customer data
Long-term or
permanent physical Financial risk Long-term or permanent
ailments (e.g.: due Substantial debts psychological ailments
Data subjects may to disregard of Inability to work Criminal penalty
encounter significant, or contraindications) Inability to relocate Abduction
4.
even irreversible, Death (e.g.: Loss of evidence in the Loss of family ties
Maximum
consequences, which murder, suicide, context of litigation Inability to sue
they may not overcome fatal accident)
Loss of access to vital Change of administrative
Permanent infrastructure (water, status and/or loss of legal
impairment of electricity) autonomy (guardianship)
physical integrity
42
PIA, application to connected objects February 2018 edition
The action of risk sources on the supporting assets constitutes a threat. The supporting assets can be:
used inappropriately: supporting assets are used outside or even diverted from their intended
context of use without being altered or damaged;
observed: supporting assets are observed or spied upon without being damaged;
overloaded: the limits of operation of supporting assets are exceeded, supporting assets are
overloaded, over-exploited or used under conditions not permitting them to function properly;
damaged: supporting assets are partially or completely damaged;
altered: supporting assets are transformed;
lost: supporting assets are lost, stolen, sold or given away, so it is no longer possible to exercise
property rights.
The generic threats that follow are designed to be exhaustive, independent and applied to the specific
features of privacy protection.
43
PIA, application to connected objects February 2018 edition
Types of
Examples of supporting asset
supporting Actions Examples of threats
vulnerabilities
assets
components; connection of devices substituted via connectors (ports,
(such as: USB flash drives) to launch slots); allows components to be
an operating system or retrieve data disabled (USB port)
Theft of a laptop from a hotel room;
theft of a work cell phone by a
Hardware Lost pickpocket; retrieval of a discarded Small, appealing targets (market value)
storage device or hardware; loss of an
electronic storage device
Content scanning; illegitimate cross- Makes data accessible for viewing or
Used referencing of data; raising of manipulation (deletion, modification,
Software inappropriat privileges, erasure of tracks; sending movement); may be used for other
ely of spam via an e-mail program; than normal purposes; allows the use
misuse of network functions of advanced functionalities
Scanning of network addresses and
ports; collection of configuration
Possibility of observing the functioning
data; analysis of source codes in order
Software Observed of software; access to and reading of
to locate exploitable flaws; testing of
source codes
how databases respond to malicious
queries
Tracking by a software-based key
logger; infection by malicious code; Editable (improvable, configurable);
installation of a remote insufficiently skilled developers or
administration tool; substitution of maintainers (incomplete
Software Altered
components during an update, a specifications, few internal resources);
maintenance operation or installation does not function properly or as
(code-bits or applications are expected
installed or replaced)
Permeable (generation of emanations
Interception of Ethernet traffic;
Computer that may or may not be
Observed acquisition of data sent over a Wi-Fi
channels compromising); allows interpretable
network
data to be observed
Unintentional disclosure of People who cannot keep things to
information while talking; use of themselves, are predictable (with
People Observed
listening devices to eavesdrop on routine lives that make repeated
meetings espionage easy)
Easily influenced (naive, gullible,
Influence (phishing, social
obtuse, low self-esteem, little loyalty),
engineering, bribery), pressure
People Manipulated easily manipulated (vulnerable to
(blackmail, psychological
pressure placed on themselves or their
harassment)
circle of family and friends)
Employee poaching; assignment Little loyalty to the organization;
People Lost changes; takeover of all or part of the personal needs that are largely unmet;
organization easy breach of contractual obligations
Paper Reading, photocopying,
Observed Allows interpretable data to be seen
documents photographing
Theft of files from offices; theft of
Paper
Lost mail from mailboxes; retrieval of Portable
documents
discarded documents
Paper Reading of signature books in
transmissio Observed circulation; reproduction of Observable
n channels documents in transit
44
PIA, application to connected objects February 2018 edition
45
PIA, application to connected objects February 2018 edition
46
PIA, application to connected objects February 2018 edition
Types of
Examples of supporting asset
supporting Actions Examples of threats
vulnerabilities
assets
Alterable (fragile, breakable, poor
Computer Cut wiring, poor Wi-Fi reception,
Damaged cable structure, bare cables,
channels corrosion of cables
disproportionate sheath), sole
Appealing targets (market value of
Computer cables), transportable (lightweight,
Lost Theft of copper cables
channels may be hidden); inconspicuous (easily
forgotten, trivial, do not stand out)
Insufficient resources for assigned
High workload, stress or negative
tasks; capacities not suited to working
changes in working conditions;
People Overloaded conditions; insufficient skills for
assignment of staff to tasks beyond
carrying out duties; inability to adapt
their abilities; poor use of skills
to change
Occupational accident; occupational
disease; other injury or disease; death; Physical, psychological or mental
People Damaged
neurological, psychological or limits
psychiatric ailment
Death, retirement, reassignment;
Little loyalty to the organization;
contract termination or dismissal;
People Lost personal needs that are largely unmet;
takeover of all or part of the
easy breach of contractual obligations
organization
Gradual erasure over time; deliberate
erasure of portions of a document,
Used Editable (paper document with
Paper reuse of paper to take notes not
inappropria erasable content, thermal papers not
documents related to the processing, to make a
tely resistant to temperature changes)
shopping list, use of notebooks for
something else
Poor-quality components (fragile,
Paper Aging of archived documents; burning easily flammable, poor aging
Damaged
documents of files during a fire resistance); not suited to the
conditions of use
Paper Theft of documents; loss of files
Lost Portable
documents during a move; disposal
Paper
Mail overload; overburdened Existence of quantitative or
transmission Overloaded
validation process qualitative limits
channels
Paper End of workflow following a
transmission Damaged reorganization; mail delivery halted by Unstable, sole
channels a strike
Change in how mail is sent;
Paper
reassignment of offices or premises;
transmission Altered Editable (replaceable)
reorganization of paper transmission
channels
channels; change in working language
Paper Elimination of a process following a
transmission Lost reorganization; loss of a document Unrecognized need
channels delivery company, vacancy
47
PIA, application to connected objects February 2018 edition
Notes: The risks can generally be reduced, transferred or retained. However, some risks cannot be
taken, especially when sensitive data are processed or when the damages that data subjects may
sustain are very significant. In such cases it may be necessary to avoid them, for example by not
implementing all or part of the processing.
48