Data Protection Impact Assessment (DPIA) for Cloud-Based Health Organizations
Abstract
:1. Introduction
2. Description of the DPIA Steps
- Define in detail the context of the processing of personal data under consideration. Provide a brief description of the project including its nature, scope, content, and purposes. Moreover, the data controller must identify the data processors, if any. In addition, the precise personal data that will be collected and processed must be defined together with their recipients, the duration of storage, and the processing activities from their collection to their deletion. This step also contains the identification of the personal data supporting assets for the under-examination system. Summarizing, this step aims to define the outline of the personal data processing process, such as the categories of the personal data, the purpose of processing, the way data are processed, the personal data supporting assets, the data subjects, etc.
- Identify the existing and planned controls (procedural/technical/organizational) that are necessary for protecting the data, treating privacy risks in a proportionate manner, and achieving compliance with legal requirements. Justify and explain the choices made regarding the purpose for which the data are collected, their storage period, and their quality. More specifically, a clear description/documentation of the way that the following legal requirements are satisfied, is necessary: 1. Clear description of the purpose of personal data processing, 2. Data minimization (only the absolutely necessary data for serving the specific purpose of processing are collected), 3. Quality of data (data are correct and kept up-to-date), 4. Retention periods (for how long are the data stored), 5. Information (ensure that the data subjects are informed about the way their data are processed), 6. Ensure that the processing is performed legally, identifying the appropriate legal basis (for instance, the consent of the data subjects), 7. Right to object (respect the data subjects’ right of opposition), 8. Right of access (respect the data subjects’ right to access all the data stored for her), 9. Right to rectification, 10. Transfers (ensure compliance with obligations relating to the transfer of data outside the European Union). Finally, the existing controls are identified and classified in three categories: Organizational Procedural, Logical Security, and Physical Security controls.
- Assess the privacy risks associated with the data processing and ensure they are properly treated. In this step, the Sources of Risks should be identified in the specific context under consideration as well as the Description of the capabilities of these sources of risks. In addition to this, in this step, the Feared events should be defined and more specifically, for each feared event (illegitimate access to personal data, unwanted change of personal data, and disappearance of personal data): The Determination of the potential impacts on the data subjects’ privacy (if it occurred) and the Estimation of its severity, depending especially on the prejudicial effect of the potential impacts. Then, in this step, the Threats should be defined, and more specifically the Threats to personal data supporting assets that could lead to each feared event. Thus, for each identified threat the Selection of the risk sources that could cause it and the Estimation of its likelihood, particularly depending on (the level of vulnerabilities of personal data supporting assets, the level of capabilities of the risk sources to exploit them, and the controls likely to modify them) should be analyzed. Finally, in this step, the Risks should be identified and more specifically, the Determination of the risk level: Its severity equals that of the feared event concerned by the risk and its likelihood equals the highest likelihood value of the threats associated with the feared event.
- The objective of this step (Risk management decisions) is the review of the results of the preceding steps, the evaluation of the risk level and the already existing controls, and the determination of whether or not they are acceptable. In case modifications are needed, an action plan is developed for the improvement of this state. In this step, the already existing controls are evaluated for the satisfaction of legal requirements and decisions are made on whether existing controls are satisfactory. When not, an action plan is prepared and validated.
3. Case Study: A Cloud-Based Hospital Information System
3.1. Context of Personal Data Processing
3.2. Description of Personal Data Processing in a Hospital
- PP1: Personnel Management
- PP2: Financial Management
- PP3: Business Development
- PP4: Provision of Patients Care-Services (Patients Monitoring Service)
3.3. Personal Data Required for the Data Processing
3.3.1. Personal Data for the Purpose of Processing PP1: Personnel Management
3.3.2. Personal Data for the Purpose of Processing PP2: Financial Management
3.3.3. Personal Data for the Purpose of Processing PP3: Business Development
3.3.4. Personal Data for the Purpose of Processing PP4: Provision of Patients Care-Services
3.4. Existing and Planned Controls (Procedural/Technical/Organizational)
3.5. Remaining DPIA Steps
4. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95/46/EC (General Data Protection Regulation). OJ L 119. 4 May 2016. p. 1. Available online: https://eur-lex.europa.eu/eli/reg/2016/679/oj (accessed on 12 September 2020).
- ARTICLE 29 DATA PROTECTION WORKING PARTY. Guidelines on Data Protection Impact Assessment (DPIA) and Determining whether Processing Is “Likely to Result in A High Risk” for the Purposes of Regulation 2016/679. Available online: https://ec.europa.eu/newsroom/article29/item-detail.cfm?item_id=611236 (accessed on 1 August 2020).
- Shabani, M.; Borry, P. Rules for processing genetic data for research purposes in view of the new EU General Data Protection Regulation. Eur. J. Hum. Genet. 2018, 26, 149–156. [Google Scholar] [CrossRef] [PubMed]
- Recital 84 EU GDPR. Available online: https://www.privacy-regulation.eu/en/recital-84-GDPR.htm (accessed on 11 September 2020).
- Article 35 Regulation (EU) 2018/1725 of the European Parliament and of the Council of 23 October 2018 on the Protection of Natural Persons with Regard to the Processing of Personal Data by the Union Institutions, Bodies, Offices and Agencies and on the Free Movement of Such Data, and Repealing Regulation (EC) No 45/2001 and Decision No 1247/2002/EC. Available online: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32018R1725 (accessed on 15 October 2020).
- French Data Protection Authority Privacy Impact Assessment (PIA). Available online: https://www.cnil.fr/en/privacy-impact-assessment-pia (accessed on 3 March 2021).
- Art. 5 GDPR Principles Relating to Processing of Personal Data. Available online: https://gdpr-info.eu/art-5-gdpr/ (accessed on 16 December 2020).
- Art. 12–23 Rights of the Data Subject 7. Available online: https://gdpr-info.eu/art-5-gdpr/ (accessed on 20 December 2020).
Purpose of Processing | Processing Activities | |
---|---|---|
PP1 | Personnel Management | HR management |
Health and Safety management | ||
PP2 | Financial Management | Payroll |
Co-funded Projects–Government Grants | ||
PP3 | Business development | Business development |
PP4 | Provision of Patients Care-Services | Hospital administration |
User management |
Personal Data | |
Data Categories | Indicative Data |
Personal data | Employees’ personal data (name, surname, father’s name, mother’s name, SSN, Police ID card number, TIN, postal address, telephone, CVs and copies of diplomas, work related data) |
Special Categories of Personal Data | |
Data Categories | Data |
Special categories of personal data | Employees’ health data (serious illnesses or handicaps etc.), work accidents |
Personal Data | |
Data Categories | Indicative Data |
Personal data | Accountants’ personal data (name, surname) Employees’ personal data (name, surname, father’s name, mother’s name, SSN, Police ID card number, postal address, telephone, salary, work hours, project work related data) |
Special Categories of Personal Data | |
Data Categories | Data |
Special categories of personal data | Employees’ health data for illness leaves |
Personal Data | |
Data Categories | Indicative Data |
Personal data | Business contacts’ personal data (name, surname, gender, postal address, telephone, e-mail, age group, education level) Business contacts’ profiling data: Personality-Attitude towards hospital, Hierarchy level, Job title/responsibilities, Department/medical unit of work, Therapy addressed/knowhow, Accessed route addressed/practice, Infusion method/practice/choice, Number of patients treated/managed per year |
Personal Data | |
Data Categories | Data |
Personal data | Patients’ personal data (First name, Last name, Date of birth—age, Gender, Phone number, Email address, Login email, Mobile phone) Healthcare professionals’ personal data (First name, Last name, Specialty, Phone number, Email address, Login email, Mobile phone) Patient portal users’ personal data (First name, Last name, Phone number, Email address, Login email, Mobile phone, Relation to patient) Sales staff/Distributors’ sales staff (First name, Last name, Phone number, Email address, Login email, Mobile phone) Activity Log of access/actions of users related to a patient therapy Users (i.e., Healthcare professionals, staff, personal data (First name, Last name, Phone number, Email address, Login email, Mobile phone) |
Special Categories of Personal Data | |
Data Categories | Data |
Special categories of personal data | Patients’ health data: Treatments (pain management, chemotherapies) Treatment information: Start date, Prescriptions, Administered medications, Infusion data (e.g., volume delivered, pump alarms), Clinical observations (e.g., pain level) |
Regulation’s Article [1] | Article’s Subject | Compliance Activities/Demands | Activities Status | Compliance |
---|---|---|---|---|
Article 5 | “Principles relating to processing of personal data (a) lawfulness, fairness, and transparency (b) purpose limitation (c) data minimization (d) accuracy (e) storage limitation (f) integrity and confidentiality” | Conduct a DPIA (a) lawfulness, fairness, and transparency (b) purpose limitation (c) data minimization (f) integrity and confidentiality | IN PROGRESS | NO |
Data Protection Policy Process to maintain data quality (d) accuracy | NOT IMPLEMENTED | |||
Data Protection Policy Process for data retention period (e) storage limitation | NOT IMPLEMENTED | |||
Maintain records of processing activities | IN PROGRESS | |||
Maintain documents as a proof of compliance | NOT IMPLEMENTED | |||
Article 6 | Lawfulness of processing | Conduct a DPIA Lawfulness of processing | IN PROGRESS | NO |
Maintain documents to prove the lawfulness of processing (Law, contracts, consent forms, etc.) | NOT IMPLEMENTED | |||
Data Protection Policy Process for acquiring data subjects’ consent | NOT IMPLEMENTED | |||
Data Protection Policy Process for secondary use of personal data | NOT APPLICABLE | |||
Article 7 | Conditions for consent | Data Protection Policy Process for acquiring data subjects’ consent | NOT IMPLEMENTED | NO |
Data Protection Policy Process for managing/satisfying the rights of the data subjects | NOT IMPLEMENTED | |||
Article 8 | Conditions applicable to child’s consent in relation to information society services | Data Protection Policy Process for acquiring child’s consent through the approval of the child’s parental responsibility | NOT APPLICABLE | YES |
Article 9 | Processing special categories of personal data | Conduct a DPIA Lawfulness of processing special categories of personal data | IN PROGRESS | NO |
Maintain documents to prove the lawfulness of processing special categories of personal data (Law, contracts, consent forms, etc.) | NOT IMPLEMENTED | |||
Data Protection Policy Process for acquiring and using data (including special categories of personal data) | NOT IMPLEMENTED | |||
Article 10 | Processing personal data relating to criminal convictions and offences | Conduct a DPIA Lawfulness of processing | NOT APPLICABLE | YES |
Maintain documents (Law, contracts, consent forms etc.) to prove the lawfulness of processing personal data relating to criminal convictions and offences | NOT APPLICABLE | |||
Data Protection Policy Process for acquiring and using data (including personal data relating to criminal convictions and offences) | NOT APPLICABLE | |||
Article 12 | Transparent information, communication, and modalities for the exercise of the rights of the data subject | Data Protection Policy Process for informing data subjects about the ways of processing their data | NOT IMPLEMENTED | NO |
Data Protection Policy Process for managing/satisfying the rights of the data subjects | NOT IMPLEMENTED | |||
Data Protection Policy Process for notifying the supervisory authority/data subjects about a personal data breach | NOT IMPLEMENTED | |||
Article 13 | Information to be provided where personal data are collected from the data subject | Data Protection Policy Process for informing data subjects about the ways of processing their data | NOT IMPLEMENTED | NO |
Data Protection Policy Process for managing/satisfying the rights of the data subjects | NOT IMPLEMENTED | |||
Data Protection Policy Process for acquiring and using data | NOT IMPLEMENTED | |||
Data Protection Policy Process for secondary use of personal data | NOT APPLICABLE | |||
Data Protection Policy Process for notifying the supervisory authority/data subjects about a personal data breach | NOT IMPLEMENTED | |||
Article 14 | Information to be provided where personal data have not been obtained from the data subject | Data Protection Policy Process for informing data subjects about the ways of processing their data | NOT APPLICABLE | YES |
Data Protection Policy Process for managing/satisfying the rights of the data subjects | NOT APPLICABLE | |||
Data Protection Policy Process for acquiring and using data | NOT APPLICABLE | |||
Data Protection Policy Process for secondary use of personal data | NOT APPLICABLE | |||
Data Protection Policy Process for notifying the supervisory authority/data subjects about a personal data breach | NOT APPLICABLE | |||
Article 15 | Right of access by the data subject | Data Protection Policy Process for managing/satisfying the rights of the data subjects | NOT IMPLEMENTED | NO |
Article 16 | Right to rectification | Data Protection Policy Process for managing/satisfying the rights of the data subjects | NOT IMPLEMENTED | NO |
Article 17 | Right to erasure (“right to be forgotten”) | Data Protection Policy Process for managing/satisfying the rights of the data subjects | NOT IMPLEMENTED | NO |
Article 18 | Right to restriction of processing | Data Protection Policy Process for managing/satisfying the rights of the data subjects | NOT IMPLEMENTED | NO |
Article 19 | Notification obligation regarding rectification or erasure of personal data or restriction of processing | Data Protection Policy Process for management/satisfaction of the rights of the data subjects (including process of informing the subjects of changes made by the organization) | NOT IMPLEMENTED | NO |
Article 20 | Right to data portability | Data Protection Policy Process for managing/satisfying the rights of the data subjects | NOT APPLICABLE | YES |
Article 21 | Right to object | Data Protection Policy Process for managing/satisfying the rights of the data subjects | NOT IMPLEMENTED | NO |
Article 22 | Automated individual decision-making, including profiling | Data Protection Policy Process for managing/satisfying the rights of the data subjects | NOT IMPLEMENTED | NO |
Article 24 | Responsibility of the controller | Conduct a DPIA (if required) | IN PROGRESS | NO |
Data Protection Policy | NOT IMPLEMENTED | |||
Data Protection Policy Process for determining the obligations of processors (if any) | NOT APPLICABLE | |||
Data Protection Policy Process for internal review/auditing of policy implementation | NOT IMPLEMENTED | |||
Maintain documents as a proof of compliance | NOT IMPLEMENTED | |||
Article 25 | Data protection by design and by default | Conduct a DPIA (if required) | IN PROGRESS | NO |
Data Protection Policy Process for accommodating data protection by design and by default specifications | NOT IMPLEMENTED | |||
Article 26 | Joint controllers | As for Data Controller (Articles 24 and 25) | NOT APPLICABLE | YES |
Maintain documents to define the obligations as to the lawfulness of data processing and satisfaction of the rights of the data subjects | NOT APPLICABLE | |||
Article 27 | Representatives of controllers or processors not established in the Union | Data Protection Policy Process for immediate notification of the controller and the data subjects (if necessary) about a personal data breach | NOT IMPLEMENTED | NO |
Article 28 | Processor | Data Protection Policy Process for checking the compliance of the processors with the obligations set by the controller | NOT APPLICABLE | YES |
Data Protection Policy Process for immediate notification of the controller and the data subjects (if necessary) about a personal data breach | NOT APPLICABLE | |||
Article 29 | Processing under the authority of the controller or processor | Data Protection Policy Process for checking the compliance of those involved (subcontractors) with the data processing with the terms that the controller or the processor has included in their contracts | NOT APPLICABLE | YES |
Article 30 | Records of processing activities | Maintain records of processing activities | IN PROGRESS | NO |
Article 32 | Security of processing | Conduct a risk analysis study | IN PROGRESS | NO |
Security measures based on the risk level (e.g., pseudonymization, encryption, access control, firewall, network intrusion detection, logs, etc.) | IN PROGRESS | |||
Data Protection Policy Process for Aligning Data Protection Policy with Security Policy | NOT IMPLEMENTED | |||
Article 33 | Notification of a personal data breach to the supervisory authority | Data Protection Policy Process for notifying the supervisory authority/data subjects about a personal data breach | NOT IMPLEMENTED | NO |
Maintain a record of incidents/breaches | NOT IMPLEMENTED | |||
Maintain the list of notifications to the supervisory authority/data subjects about a personal data breach | NOT IMPLEMENTED | |||
Maintain a record/log of actions when dealing with a data breach | NOT IMPLEMENTED | |||
Article 34 | Communication of a personal data breach to the data subject | Data Protection Policy Process for notifying the supervisory authority/data subjects about a personal data breach | NOT IMPLEMENTED | NO |
Maintain a record of incidents/breaches | NOT IMPLEMENTED | |||
Maintain the list of notifications to the supervisory authority/data subjects about a personal data breach | NOT IMPLEMENTED | |||
Maintain a record/log of actions when dealing with a data breach | NOT IMPLEMENTED | |||
Article 35 | Data protection impact assessment | Conduct a DPIA (if required) | IN PROGRESS | NO |
Article 36 | Prior consultation | Consultation of PIAs results with the Supervisory Authority (if required) | NOT APPLICABLE | YES |
Article 37 | Designation of the data protection officer | Designation of the Data Protection Officer (DPO) (if required) | IMPLEMENTED | YES |
Article 38 | Position of the data protection officer | Independence, regular communication/collaboration, accountability of DPO with the management | IMPLEMENTED | YES |
Confirmation of non-conflict of interest of the DPO with other duties and obligations of the organization | IMPLEMENTED | |||
Article 39 | Tasks of the data protection officer | Is the DPO designated (if required) with her duties set? | IMPLEMENTED | YES |
Article 44 | General principle for transfers | Maintain Documentation to Confirm the lawfulness of Personal Data transfers to Third Countries or International Organizations (e.g., Law, Consent forms, Public Interest, Standard Contractual Clauses, Binding Company Rules, Regulatory Approvals, etc.) Depending on the legal basis, check the required evidence in Articles 45 to 49. | NOT APPLICABLE | YES |
Article 45 | Transfers on the basis of an adequacy decision | Control of data transfer mechanism | NOT APPLICABLE | YES |
Article 46 | Transfers subject to appropriate safeguards | Control of data transfer mechanism | NOT APPLICABLE | YES |
Article 47 | Binding corporate rules | Control of data transfer mechanism (Binding Corporate Rules (BCRs)) | NOT APPLICABLE | YES |
Article 48 | Transfers or disclosures not authorised by Union law | Control of data transfer mechanism | NOT APPLICABLE | YES |
Article 49 | Derogations for specific situations | Control of data transfer mechanism | NOT APPLICABLE | YES |
Article 89 | Safeguards and derogations relating to processing for archiving purposes in the public interest, scientific or historical research purposes or statistical purposes | Data Protection Policy Procedure for data anonymization for processing related to scientific research/statistical research | NOT IMPLEMENTED | NO |
Keeping documentation for deviations from the GDPR due to special processing cases (if required) | NOT APPLICABLE | |||
Article 91 | Existing data protection rules of churches and religious associations | Data Protection Policy | NOT APPLICABLE | YES |
Organizational/Legal Requirements | |
---|---|
Requirement ID | Requirement |
GDPR-01 | Conduct a Data Protection Impact Assessment regarding the processing of personal data |
GDPR-02 | Conduct a Data Protection Impact Assessment regarding the lawfulness of processing |
GDPR-03 | Conduct a Data Protection Impact Assessment regarding the Lawfulness of processing of special categories of personal data |
GDPR-04 | Conduct a Data Protection Impact Assessment regarding the Responsibility of the controller |
GDPR-05 | Conduct a Data Protection Impact Assessment regarding the Data protection by design and by default principle |
GDPR-06 | Conduct a Data Protection Impact Assessment regarding the security of processing |
GDPR-07 | Conduct a Data Protection Impact Assessment as demanded by Article 35 of the GDPR regulation |
GDPR-08 | Define a Data Protection Policy for describing the process to maintain data quality |
GDPR-09 | Define a Data Protection Policy for describing the process for data retention period |
GDPR-10 | Define a Data Protection Policy for describing the process for acquiring data subjects’ consent |
GDPR-11 | Define a Data Protection Policy for describing the process for managing/satisfying the rights of the data subjects |
GDPR-12 | Define a Data Protection Policy for describing the process for acquiring and using data (including special categories of personal data) |
GDPR-13 | Define a Data Protection Policy for describing the process for informing data subjects about the ways of processing their data |
GDPR-14 | Define a Data Protection Policy for describing the process for notifying the supervisory authority/data subjects about a personal data breach |
GDPR-15 | Define a Data Protection Policy for describing the process for internal review/auditing of policy implementation |
GDPR-16 | Define a Data Protection Policy for describing the process for accommodating data protection by design and by default specifications |
GDPR-17 | Define a Data Protection Policy for describing the process for immediate notification of the controller and the data subjects (if necessary) about a personal data breach |
GDPR-18 | Define a Data Protection Policy for describing the process for Aligning Data Protection Policy with Security Policy |
GDPR-19 | Define a Data Protection Policy for describing the process for data anonymization for processing related to scientific research/statistical research |
GDPR-20 | Maintain records of processing activities |
GDPR-21 | Maintain documents as a proof of compliance |
GDPR-22 | Maintain documents to prove the lawfulness of processing |
GDPR-23 | Maintain documents to prove the lawfulness of processing of special categories of personal data |
GDPR-24 | Maintain a record of incidents/breaches |
GDPR-25 | Maintain the list of notifications to the supervisory authority/data subjects about a personal data breach |
GDPR-26 | Maintain a record/log of actions when dealing with a data breach |
GDPR-27 | Conduct a Risk Analysis Study |
GDPR-28 | Define security measures based on the risk level (e.g., pseudonymization, encryption, access control, firewall, network intrusion detection, logs, etc.) |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Georgiou, D.; Lambrinoudakis, C. Data Protection Impact Assessment (DPIA) for Cloud-Based Health Organizations. Future Internet 2021, 13, 66. https://doi.org/10.3390/fi13030066
Georgiou D, Lambrinoudakis C. Data Protection Impact Assessment (DPIA) for Cloud-Based Health Organizations. Future Internet. 2021; 13(3):66. https://doi.org/10.3390/fi13030066
Chicago/Turabian StyleGeorgiou, Dimitra, and Costas Lambrinoudakis. 2021. "Data Protection Impact Assessment (DPIA) for Cloud-Based Health Organizations" Future Internet 13, no. 3: 66. https://doi.org/10.3390/fi13030066
APA StyleGeorgiou, D., & Lambrinoudakis, C. (2021). Data Protection Impact Assessment (DPIA) for Cloud-Based Health Organizations. Future Internet, 13(3), 66. https://doi.org/10.3390/fi13030066