Auditing Data Protection
Auditing Data Protection
Auditing Data Protection
protection
a guide to ICO
data protection audits
Contents
Executive summary 3
2. Audit approach 6
Gathering evidence
Audit visit
Draft and final reports
Publication
5. Appendices 13
1. Scope areas
2. Example letter of engagement
3. Example audit report
4. Example follow up report
The ICO proactively publishes its audit programme on the ICO website and
as such the identity of organisations that agree to an audit are published.
This only has basic details and does not include the agreed scope of the
audit.
The ICO will make recommendations on how to mitigate the risks of non
compliance, reducing the chance of damage and distress to individuals and
regulatory action being taken against the organisation for a breach of the
DPA.
The ICO also has the power to conduct compulsory audits, under section
41a of the DPA. This enables the Information Commissioner to serve
government departments, designated public authorities and other
categories of designated persons with a compulsory ‘assessment notice’ to
evaluate their compliance with the data protection principles. The
assessment notices code of practice provides further guidance on
compulsory audits.
These organisations are also considered on a risk basis taking into account
the factors outlined above.
2. Audit approach
Once an organisation has consented to an audit, an introductory meeting
will be arranged to discuss the audit process and the ICO audit programme
will be updated on the ICO website. A provisional time for the audit site
visit will also be agreed by working with organisations to fit with their other
commitments and to minimise the impact on their day to day work. A draft
letter of engagement will be used as an agenda at the initial meeting to
develop the scope of the audit and set appropriate timescales (see
Appendix 2).
The scope will be agreed in consultation with the organisation. It will take
into account both generic data protection issues as well as any organisation
specific concerns there may be about its data protection policies and
procedures. It will also identify relevant data protection risks within the
organisation.
Prior to the meeting the audit team will liaise with ICO colleagues to gain
background and information on general themes/complaints about the
organisation that may affect the scope of the audit.
Within two days of the meeting we will issue a formal letter of engagement
(Appendix 2).
Gathering evidence
Prior to the audit visit we will request as necessary policies and procedures
that cover the scope areas from the organisation being audited. These may
include data protection policy documents; operational guidance or manuals
for staff processing sensitive data; data protection training modules; risk
registers; information asset registers; information governance structures
and similar. These will be used to inform the direction of the audit visit and
are reviewed at the ICO’s offices prior to the site visit.
We will work with the organisation to ensure that the audit visit will be
productive by identifying appropriate key stakeholders to interview and
relevant processes to examine. These interviews will be agreed in a
schedule, drawn up by the organisation in consultation with the audit team.
The audit site visit usually takes between two and three days. At the start
of the visit, we will arrange for an opening meeting with appropriate
members of the senior management of the organisation to explain the
process to them. This provides an opportunity to discuss any issues and
answer any questions about the process.
The methodology used by the audit team during the actual visit is primarily
a question/interview based approach. This is supplemented by visual
inspections and examinations of selected uses of personal data within the
organisation. During the visit all auditors will make notes from interviews,
observations and testing.
The most important element of an audit from the perspective of the audit
team is that access to key systems and data is provided by the auditee and
that questions posed by the audit team are answered comprehensively and
accurately.
Upon completion of the audit visit, the audit team will hold a meeting with
the organisation’s key stakeholders. If any major concerns have been
identified by the audit team, they will be highlighted at this point. As far as
possible, a general overview of the audit progress will also be given.
As detailed in the letter of engagement, the first draft report will be issued
within 10 working days of the site visit. The report will define and grade
risks, detail findings and issues identified against those risks and provide
an overall audit opinion. The overall audit opinion is provided following a
review of each individual scope area assessed during the visit.
The organisation will be required to check the first draft for factual
accuracy and return their approval and/or any amendments to the audit
team.
Following return of the first draft by the organisation, the second draft
report will encompass these amendments and also include
recommendations. The recommendations made will mitigate the risks of
non compliance, reducing the chance of damage and distress to individuals
and/or the chance of regulatory action being taken against the organisation
for a breach of the DPA. The ICO will complete and deliver the second draft
within the timescales detailed in the letter of engagement.
The report will then be issued to the organisation with a draft executive
summary. The executive summary will be a template of high level sections
taken from the report and produced in a different format for publication.
The organisation will be given 10 working days to agree the summary.
Publication
[Date]
The ICO has carried out a data protection audit of [name of org] with its
consent.
Read the executive summary of the audit report [link]
Read more about the audit on the [name of org] website [link]
[Date]
The ICO has carried out a data protection audit of [name of org] with its
consent. [Name of org] has asked us not to publish the executive summary
of the audit report.
Read more about the audit on the [name of org] website [link]
The ICO will not proactively publicise details of consensual audit reports.
However, there may be instances in which publicising a report would help
to educate other data controllers, prevent further breaches, or be of
3. Audit follow up
Wherever possible the lead auditor of the original data protection audit will
be responsible for any follow up activity undertaken. A review of the initial
audit will be undertaken, considering the actions required and taking into
account the previous audit opinion.
Generally the likelihood of follow up action will conform to the rules below,
taking into account individual completion dates of required action.
Audits rated red – we will require three monthly updates from the
organisation and a full update from them at 12 months. A follow up site
visit will be required covering the same scope areas. A full follow up
report will be produced.
Follow up reporting
The draft follow up report (appendix 4) for red, ‘very limited assurance’
reports, will be produced in the same way as the original audit report.
Similar to the process of publishing the original report, we will seek
permission to publish an executive summary of the follow up report.
In order to ensure that our processes are relevant and efficient we will
issue a feedback questionnaire to the organisation after each audit. The
ICO will use this information to improve our procedures and inform
subsequent audits.
The ICO may receive requests under the Freedom of Information Act 2000
to disclose specific audit reports. All requests for information are looked at
on a case by case basis. We would always consult with the organisation in
question before responding to a request for information.
The basis for this approach is in section 59 of the DPA which relates to
information provided to the Information Commissioner and his staff. This
states that ICO staff shall not disclose information:
For consensual audits, we will not publish the executive summary without
permission. This is a high level document and contains only the background
to the audit, the overall audit opinion and the areas of good
practice/needing improvement. The detailed findings contained in the back
of the report are not published.
Any member of the ICO is legally bound, under section 59 of the DPA, not
to disclose any information given to it for the purposes of the DPA.
Paragraph three of that section stipulates that if we were to do so it would
be a criminal offence and we would be liable to prosecution.
Audits are supposed to be educative and not punitive and it is not intended
that audits will lead to formal enforcement action – they are seen as a way
of encouraging compliance and good practice. However, we do reserve the
right to use our enforcement powers in case of any identified major non
compliance where the data controller refuses to address a recommendation
within an acceptable timescale.
The ICO audit team are all IIA (Institute of Internal Auditors) qualified and
hold the ISEB (Information Systems Examination Board) certificate in data
protection (or are working towards those qualifications), as well as having
a range of skills and backgrounds including data protection casework, the
banking sector, IT services and financial audit.
Policies and Training Policies procedures Policies and procedures Policies and procedures Policies and Introduction of new Policy and procedures
procedures presentation and training records procedures policies, systems or
IT security licenses Templates revised ISA Organisational
Intranet site e-learning module Data collection forms Training materials structure, roles and
Incident logs SAR log Job descriptions, responsibilities
Organisation charts Central training Fair processing Data sharing organisational charts,
records notices Security standard Training materials agreement logs project management FOI log
Job descriptions clauses responsibilities
Refresh training Records management Performance reports Responses to Risk registers,
Terms of reference material and systems detail Home working risk requests Examples of reports
Minutes of meetings records assessment Minutes of meetings screening or staged
RM roles and team Sharing protocols sign off of projects. Observations
Internal and external IT user profile structure Asset registers Copies of responses to
reports requests requests Roles and Documented Job descriptions
Information asset Structures and responsibilities consultation and
Audit reports register responsibilities System review results Performance data
Letter of Engagement
1. Background
1.3 [If appropriate add detail of circumstances that led to the audit – undertakings,
self reported breaches, risk assessment leading to letter to insurance
companies/council/NHS etc.]
1.4 XXX has agreed to a consensual audit by the ICO of its processing of personal
data.
2. Purpose
2.1 The primary purpose of the audit is to provide the ICO and XXX with an
independent opinion of the extent to which they (within the scope of this agreed
audit) are complying with the DPA and highlight any areas of risk to their
compliance.
2.2 The audit will also review the extent to which XXX (within the scope of the audit)
demonstrates good practice in their data protection governance and management
of personal data.
15
2.3 Where appropriate and with the agreement of both parties, the audit may also
assess compliance with obligations under both the Freedom of Information Act
2000 (FOIA) and the Environmental Information Regulations 2004 (EIR).
2.4 Good data protection practice is promoted by the ICO through its website and
‘The Guide to Data Protection’ document, the issue of good practice notes, codes
of practice and technical guidance notes. The ICO will use such guidance when
delivering an audit opinion on ‘good data protection practice’. In addition the ICO
will use the experience gained from other data protection audits, appropriate
sector standards and enforcement activity.
3. Scope
3.1 The audit scope is limited to the XXX departments/sections of XXX and will
assess the risk of non compliance with appropriate data protection principles, the
utilisation of ICO guidance and good practice notes and the effectiveness of data
protection activities with specific reference to:
f. Data sharing - The design and operation of controls to ensure the sharing of
personal data complies with the principles of the Data Protection Act 1998
and the good practice recommendations set out in the Information
Commissioner’s Data Sharing Code of Practice.
16
thoroughly analyse how a particular project or system will affect the privacy
of the individuals involved.
As per section 2.3 above, the following scope area may also be included in the
audit (see also the associated risk in section 4):
Out of Scope
3.2 The ICO will restrict its audit activity to the departments and locations detailed
and agreed within the scope.
3.3 The audit will not review and provide a commentary on individual cases, other
than to the extent that such work may demonstrate the extent to which XXX is
fulfilling its obligations and demonstrating good practice.
3.5 The ICO, however, retains the right to comment on any other weaknesses
observed in the course of the audit that could compromise good data protection
practice.
4. Risks
The ICO has identified broad risk areas applicable to the agreed audit scope. The
ICO believes that the absence of appropriate arrangements in these areas
threatens the organisation’s ability to meet its data protection obligations.
17
d. Without robust controls to ensure that personal data records are held
securely in compliance with the DPA, there is a risk that they may be lost or
used inappropriately, resulting in regulatory action against, and/or
reputational damage to, the organisation, and damage and distress to
individuals.
f. The failure to design and operate appropriate data sharing controls is likely
to contravene the principles of the DPA, which may result in regulatory
action, reputational damage to the organisation and damage or distress for
those individuals who are the subject of the data.
5.1 The Audit Team Manager responsible for the audit will meet with representatives
of XXX prior to the audit:
• To appropriately refine and agree the 3 scope areas for the audit.
• To discuss locations for the visits and the duration of on site work required for
each site.
• To identify and agree any policies and procedures that could be provided in
advance of the audit site visits, to adequately inform the audit process.
5.2 The ICO will seek to visit key departments and sites within the scope of the audit
and organisation as arranged with XXX.
18
5.3 In identifying appropriate scope and locations the ICO will consider the following:
• Current and historical complaint information obtained from the ICO’s case
handling department.
• Common risks identified from other audits, casework and enforcement action
with similar data controllers.
5.4 A schedule of meetings and audit activities will be agreed with the nominated
single point of contact for the audit and the identified business areas. This will be
reviewed in a meeting/call in advance of the audit to ensure that the interviews
are with an appropriate mix of managerial and operational staff and cover all of
the control areas necessary to establish an assurance rating. A draft schedule and
list of the controls to be covered will be provided in advance.
5.5 While on site the audit team will meet with staff to establish if controls are in
place to ensure the organisation complies with its data protection responsibilities.
This will be achieved through interviews with staff, reviewing relevant records
and observing procedures being implemented in practice.
5.6 The ICO will require access to relevant staff ‘desk side’ where possible to
understand how staff process personal data (limited to the scope provided).
5.7 Space will be usually be allocated in the schedule of interviews for testing and
evidence gathering.
5.8 The ICO will consider the extent to which the Internal Audit department includes
data protection audits in their programmes of audit or compliance work to avoid
duplication of work.
5.9 As far as is practicable and appropriate the ICO will provide regular feedback on
audit progress to the nominated single point of contact at the end of the first and
second day and at the end of the audit in a closing meeting. The ICO believes
that regular feedback should assist both the ICO and the organisation to quickly
understand and address emerging issues and concerns and help to avoid any
misunderstanding.
6. Audit team
6.1 The following people will be part of the audit team. It is envisaged that 2 auditors
will be used.
19
7. Reporting
7.1 Initially a first draft report will be issued detailing the audit findings but without
the assurance ratings and recommendations. Input will be sought from the
nominated single point of contact to ensure that the report is factually accurate.
7.2 Following any amendments for accuracy a second draft report will be issued
complete with any appropriate recommendations. This draft will be returned by
XXX accepting or rejecting each of the recommendations and including an action
plan that shows an owner for each recommendation and the date that the action
will be implemented.
7.3 The final report and an executive summary will be issued to agreed recipients.
7.4 The report will provide XXX with an overall assurance opinion based on the work
undertaken, using a framework of four categories of assurance, from high level
of assurance to very limited assurance. The overall opinion will be based on the
effectiveness of the processes, policies, procedures and practices operating to
mitigate any identified risks to complying with the DPA.
7.5 Each of the scope areas/risks identified in sections 3 and 4 will be similarly
categorised. The rating will take into account the impact of the risk and the
probability that the risk will occur.
7.6 The identity of organisations that are being audited is published on the ICO
website as part of proactively communicating the audit work programme.
However, the ICO will not proactively publish details of the scope and findings of
a consensual audit prior to the completion of the audit. The ICO has an operating
memorandum of understanding (MOU) with the Care Quality Commission (CQC).
In the case of NHS audits, the ICO will share audit scheduling information with
the CQC prior to audits. Where, during the course of conducting an audit the ICO
identifies any significant failings which may significantly impact upon patient
care, it may also share these with the CQC. This will help ensure regulatory
resources are targeted appropriately and that work is not duplicated.
7.7 Once the audit report and executive summary have been completed and agreed
the ICO will publish a statement on its website to indicate that a data protection
audit has been completed and will seek agreement from the organisation to
publish the executive summary with a 10 working day deadline for response.
7.8 If XXX do not respond within the 10 working day timeframe it will be perceived
as consent being withheld and the ICO website will be updated to say that the
audit took place but permission to publish the executive summary was withheld.
7.9 XXX will be informed in advance of the publication date and will be provided with
the opportunity to provide a link to its own website for any further organisational
comments it wishes make.
20
7.10 Dependent on the findings of the final audit report, the ICO may wish to schedule
follow up – this would be discussed and agreed with XXX as appropriate.
7.11 The type of follow up activity undertaken will be determined by the overall
assurance provided by the initial audit. A follow up report will not be produced
where the original assurance level is either high or reasonable. Where the initial
assurance is reasonable, the ICO will request a progress update signed off at
Board level within XXX. We will review this and reserve the right to comment on
priority recommendations which we feel have not been adequately addressed
within the update.
7.12 Follow up of reports that are limited assurance will be based solely on a progress
update signed off at Board level. We will produce a short report summarising
progress against the recommendations although this will not include a revised
assurance rating. We will however express any serious concerns we have
regarding lack of progress against the recommendations.
7.13 Where the initial assurance is very limited, the ICO and XXX commit to conduct a
follow up audit of the same scope areas as the original. Following this, the ICO
will produce a second audit report including a new assurance rating. No further
action or follow up will take place after this and mitigation of the risks identified
will be the sole responsibility of XXX.
7.14 Where appropriate, the ICO will also produce a follow up executive summary
which it will agree with XXX.
7.15 Once the follow up report and follow up executive summary have been
completed and agreed, the ICO will publish a statement on its website to
indicate that a follow up has been completed and will seek agreement from the
organisation to publish the follow up executive summary with a 10 working day
deadline for response.
7.16 If XXX do not respond within the 10 working day timeframe it will be perceived
as consent being withheld and the ICO website will be updated to say that the
follow up took place but permission to publish the executive summary was
withheld.
7.17 XXX will be informed in advance of the publication date and will be provided with
the opportunity to provide a link to its own website for any further organisational
comments it wishes make.
8. Timescales
Responsibilities of Responsibilities of
the ICO XXX
Date the letter of Within two working
engagement and the days from date of
list of required initial meeting.
documents issued: XX/XX/XX
21
Date the signed Within 10 working days
letter of of receipt of the LoE.
engagement is XX/XX/XX
returned:
Date the blank Six weeks before the
schedule is issued audit. XX/XX/XX
for completion:
The
DateICO commits
the policy substantial planning and resources
Oneinto arranging
month before the
the audit. Postponem
documents and draft audit. XX/XX/XX
schedule are
returned:
Date the final Two weeks before the
schedule is returned audit. XX/XX/XX
after review against
controls:
Date of the on-site XX – XX XXX 201X.
visits:
Date on which the Within 10 working days
first draft report is from auditors return to
issued: office.
XX/XX/XX
Date on which the Within 10 working days
comments on the from receipt.
first draft are XX/XX/XX
provided:
9. Contacts
22
Key Contact at ICO: XXX – Lead Auditor
10. Administration
10.1 Individual site arrangements for access and audit will be organised through XXX
at XXX.
10.2 Where possible interviews will be carried out ‘desk side’. With the exception of
reviews and interviews undertaken at specialist technical sites which may be
conducted at a pre agreed location.
11.1 All ICO staff including the Audit Team are legally bound by Section 59 of the DPA
which creates a specific criminal offence for them to knowingly and recklessly
disclose any information given to the ICO for the purposes of the fulfilling it’s
functions (which includes audit). ICO staff are made aware of the obligation on
them and the potential consequences.
11.2 All auditors are security cleared to SC level through the Ministry of Justice.
12.1 The ICO audit team all have, or are working towards, an Institute of
Internal Auditors qualification as well as the Information Systems
Examination Board certificate in data protection, as well as having a range of
skills and backgrounds.
12.2 The provision of an independent opinion in relation to compliance with the DPA
and progress towards the implementation of good practice.
12.3 The opportunities for staff to discuss and exchange actual data protection issues
and examples of good practice with the members of the Information
Commissioner’s audit team.
12.4 The data protection knowledge and experience of the auditors enables a
proportionate consideration of the risk and impact of non-compliance to be
taken.
12.5 An improved understanding by the ICO of XXX, its structure and data protection
governance and the sector that it operates in to help inform it’s decision making
and approach to guidance.
23
Client Comments
I agree the scope of the audit as set out in this Letter of Engagement.
Agreed by Client
Signed:
Position:
Date:
24
Appendix 3 - Example audit report
Organisation name
Data protection audit report
Auditors: XXXX
Distribution:
The matters arising in this report are only those that came to our attention
during the course of the audit and are not necessarily a comprehensive
statement of all the areas requiring improvement.
The responsibility for ensuring that there are adequate risk management,
governance and internal control arrangements in place rest with the
management of data controller.
We take all reasonable care to ensure that our audit report is fair and accurate
but cannot accept any liability to any person or organisation, including any
third party, for any loss or damage suffered or costs incurred by it arising out
of, or in connection with, the use of this report, however such loss or damage is
caused. We cannot accept liability for loss occasioned to any person or
organisation, including any third party, acting or refraining from acting as a
result of any information contained in this report.
1. Background page XX
8. Appendix A page XX
1.2 The Information Commissioner’s Office (ICO) sees auditing as a constructive process with real benefits for
data controllers and so aims to establish a participative approach.
1.4 <name> has agreed to a consensual audit by the ICO of its processing of personal data.
1.5 An introductory meeting was held on <date> with representatives of <name> to identify and discuss the
scope of the audit and after that on <date> to agree the schedule of interviews.
a. Data protection governance – The extent to which data protection responsibility, policies and procedures,
performance measurement controls, and reporting mechanisms to monitor DPA compliance are in place and
in operation throughout the organisation.
b. Training and awareness – The provision and monitoring of staff data protection training and the
awareness of data protection requirements relating to their roles and responsibilities.
c. Records management (manual and electronic) – The processes in place for managing both manual and
electronic records containing personal data. This will include controls in place to monitor the creation,
maintenance, storage, movement, retention and destruction of personal data records.
d. Security of personal data – The technical and organisational measures in place to ensure that there is
adequate security over personal data held in manual or electronic form.
e. Subject access requests - The procedures in operation for recognising and responding to individuals’
requests for access to their personal data.
f. Data sharing - The design and operation of controls to ensure the sharing of personal data complies with
the principles of the Data Protection Act 1998 and the good practice recommendations set out in the
Information Commissioner’s Data Sharing Code of Practice.
g. Privacy Impact Assessments - An effective PIA will be used throughout the development and
implementation of a project, using existing project management processes. A PIA enables an organisation to
systematically and thoroughly analyse how a particular project or system will affect the privacy of the
individuals involved.
3. Audit opinion
3.1 The purpose of the audit is to provide the Information Commissioner and <Name> with an independent
assurance of the extent to which <Name>, within the scope of this agreed audit is complying with the DPA.
3.2 The recommendations made are primarily around enhancing existing processes to facilitate compliance with
the DPA.
5.2 The audit field work was undertaken at <location/s> between <dates>.
Risk: Without a robust governance process for evaluating a6. Finding. Finding where there was good practice.
the effectiveness of data protection policies and procedures *******************************************.
there is a risk that personal data may not be processed in
compliance with the Data Protection Act 1998 resulting in a7. Finding. ***********************************
regulatory action and/or reputational damage. ***********************************************
7.X Any queries regarding this report should be directed to <name>, Engagement lead auditor, ICO Audit.
7.X During our audit, all the employees that we interviewed were helpful and co-operative. This assisted the audit team
in developing an understanding of working practices, policies and procedures. The following staff members were
particularly helpful in organising the audit:
Organisation name
Follow-up data protection audit
report
Auditors: XXXX
Distribution:
The matters arising in this report are only those that came to our attention
during the course of the audit and are not necessarily a comprehensive
statement of all the areas requiring improvement.
The responsibility for ensuring that there are adequate risk management,
governance and internal control arrangements in place rest with the
management of data controller.
We take all reasonable care to ensure that our audit report is fair and accurate
but cannot accept any liability to any person or organisation, including any
third party, for any loss or damage suffered or costs incurred by it arising out
of, or in connection with, the use of this report, however such loss or damage is
caused. We cannot accept liability for loss occasioned to any person or
organisation, including any third party, acting or refraining from acting as a
result of any information contained in this report.
1.2 The Information Commissioner’s Office (ICO) sees auditing as a constructive process with real benefits for data
controllers and so aims to establish a participative approach.
1.3 The original audit took place at <name> premises on [insert date] and covered [insert scope areas]. The ICO’s
overall opinion was that there was [High/Reasonable/Limited/Very Limited] assurance that processes and procedures
are in place and being adhered to. The ICO identified some scope for improvement in existing arrangements in order
to achieve the objective of compliance with the DPA.
1.4 XXX recommendations were made in the original audit report. <name> responded to these recommendations
[positively, agreeing to formally document procedures and implement further compliance measures].
1.5 The objective of a follow-up audit assessment is to provide the ICO with a level of assurance that the agreed audit
recommendations have been appropriately implemented to mitigate the identified risks and thereby support
compliance with data protection legislation and implement good practice.
1.6 A desk based follow-up took place in [insert date] to provide the ICO with a measure of the extent to which <name>
had implemented the agreed recommendations This was based on management updates from <name> signed off at
Board Level
Section 3 below summarises the main findings of this review and highlights any residual high risk areas.
3.2 xxx
3.3 xxx
3.4 Any queries regarding this report should be directed to, XXX Lead Auditor.
3.5 Thanks are given to XXX who was / were instrumental in providing the information to complete the follow-up audit.