




版權說明:本文檔由用戶提供并上傳,收益歸屬內容提供方,若內容存在侵權,請進行舉報或認領
文檔簡介
1、Insert Agency NameInsert DateInsert Project or System NameAttachment B. Privacy Impact AssessmentAttachment BPrivacy Impact Assessment for theProject or System Name:Publication Date:Contact Point for Project or System Contact Person:Agency and Division:Contact Phone:Contact E-mailData Privacy Point
2、of Contact (DPPOC)Name of DPPOC:Title of DPPOC:Agency and Division of DPPOC:State of OhioThe purpose of a Privacy Impact Assessment is to determine the privacy implications of collecting Personally Identifiable Information (PII), including why PII is collected and how it will be used and secured. PI
3、I is defined as "personally identifiable information" and is information that can be used directly or in combination with other information to identify a particular individual. It includes:· a name, identifying number, symbol, or other identifier assigned to a person, · any infor
4、mation that describes anything about a person, · any information that indicates actions done by or to a person, · any information that indicates that a person possesses certain personal characteristics.This document helps identify PII in a given information system. The Ohio Office of Infor
5、mation Technology designed and tested this document in Microsoft Word 2007. Agencies should complete the shaded portions of this document and then submit a copy to your agencys Data Privacy Point of Contact.Abstract The abstract should be no longer than five sentences and should address the followin
6、g three items: The name of the component and system. A brief description of the system and its function. An explanation as to why the PIA is being conducted. Overview The overview is the most important section of the PIA. A thorough and clear overview gives the reader the appropriate context to unde
7、rstand the responses in the PIA. The overview should contain the following elements: · The system name and the name of the agency who own(s) the system; · The purpose of the program, system, or technology and how it relates to the agencys mission; · A general description of the inform
8、ation in the system; · A description of a typical transaction conducted on the system;· Any information sharing conducted by the program or system; · A general description of the modules and subsystems, where relevant, and their functions; and · A citation to the legal authority
9、to operate the program or system. Section 1.0 Characterization of the Information The following questions are intended to define the scope of the information requested and/or collected as well as reasons for its collection as part of the program, system, rule, or technology being developed. 1.1 What
10、 information is collected, used, disseminated, or maintained in the system?1.2 What are the sources of the information in the system?1.3 Why is the information being collected, used, disseminated, or maintained? Is there a specific legal mandate or business purpose that requires the use of this info
11、rmation?1.4 How is the information collected?1.5 What specific legal authorities, arrangements, and/or agreements defined the collection of information?1.6 Conclusion: Given the amount and type of data collected, discuss the privacy risks identified and how they were mitigated.Section 2.0 Uses of th
12、e Information The following questions are intended to delineate clearly the use of information and the accuracy of the data being used. 2.1 Describe all the uses of information. 2.2 How will the information be checked for accuracy? 2.3 What types of tools are used to analyze data and what type of da
13、ta may be produced? 2.4 If the system uses commercial or publicly available data please explain why and how it is used. 2.5 Conclusion: Describe any types of controls that may be in place to ensure that information is handled in accordance with the described uses in 2.1. Section 3.0 Retention The fo
14、llowing questions are intended to outline how long information will be retained after the initial collection. 3.1 What information will be retained? 3.2 How long will information need to be retained? 3.3 Has the retention schedule been approved through the state records program? 3.4 Is the informati
15、on deleted in a secure manner, i.e., in accordance with Ohio IT Policy ITP-E.1, “Disposal, Servicing and Transfer of IT Equipment,” once the retention period is over?3.5 Conclusion: Please discuss the privacy risks associated with the length of time data is retained and how those risks are mitigated
16、. Section 4.0 Internal Sharing and Disclosure The following questions are intended to define the scope of sharing within the agency.4.1 With which internal organization(s) is the information shared, what information is shared and for what purpose? 4.2 How is the information transmitted or disclosed?
17、 4.3 Conclusion: Considering the extent of internal information sharing, discuss the privacy risks associated with the sharing and how they were mitigated. Section 5.0 External Sharing and Disclosure The following questions are intended to define the content, scope, and authority for external inform
18、ation sharing, including sharing with other state agencies in Ohio, agencies in other states, the Federal government, local governments, and private sector entities. 5.1 With which external organization(s) is the information shared, what information is shared, and for what purpose? 5.2 Is the sharin
19、g of personally identifiable information outside the agency compatible with the original collection? If so, is it addressed in a data-sharing agreement? If so, please describe. If not, please describe under what legal mechanism the program or system is allowed to share the personally identifiable in
20、formation outside of the agency. 5.3 How is the information shared outside the agency and what security measures safeguard its transmission? 5.4 How does the agency verify that an external organization has adequate security controls in place to safeguard information? For example, is the external org
21、anization able to demonstrate compliance with SAS 70-II?5.5 Conclusion: Given the external sharing, explain the privacy risks identified and describe how they were mitigated. Section 6.0 Notice The following questions are directed at notice to the individual who is the subject of information collect
22、ed, the right to consent to uses of his or her information, and the right to decline to provide information. 6.1 Was notice provided to the individual prior to collection of information? 6.2 Do individuals have the opportunity and/or right to decline to provide information? 6.3 Do individuals have t
23、he right to consent to particular uses of the information? If so, how does the individual exercise the right? 6.4 Conclusion: Describe how notice is provided to individuals, and how the privacy risks associated with individuals being unaware of the collection are mitigated. Section 7.0 Access, Redre
24、ss and Correction The following questions are directed at an individuals ability to ensure the accuracy of the information collected about him or her. 7.1 What are the procedures that allow individuals to gain access to their information? 7.2 What are the procedures for correcting inaccurate or erro
25、neous information? 7.3 How are individuals notified of the procedures for correcting their information? 7.4 If no formal redress is provided, what alternatives are available to the individual? 7.5 Conclusion: Please discuss the privacy risks associated with the redress available to individuals and h
26、ow those risks are mitigated. Section 8.0 Security ImplementationThe following questions are intended to describe technical safeguards and security measures. 8.1 What procedures are in place to determine which users may access the system and are they documented? 8.2 Will contractors have access to t
27、he system? 8.3 Describe what privacy training is provided to users either generally or specifically relevant to the program or system? 8.4 What auditing measures and technical safeguards are in place to prevent misuse of data? 8.5 Does the project employ technologies which may raise privacy concerns
28、? If so please discuss their implementation.8.6 Conclusion: Given the sensitivity and scope of the information collected, as well as any information sharing conducted on the system, what privacy risks were identified and how do the security controls mitigate them?Section 9.0 Protection of “Confident
29、ial Personal Information” The following questions are directed at assisting agencies with compliance with section 1347.15 of the Ohio Revised Code. 9.1 Has the agency evaluated the personal information and the system it is in for application of ORC 1347.15?a) Is the information the agency maintains
30、“personal information” as defined by ORC 1347.01?b) Is the information part of a “system” as defined by ORC 1347.01?c) Is the information “maintained” in the system as defined by ORC 1347.01?d) Is the information not a public record for purposes of Section 149.43 of the Revised Code?If the answer is
31、 “yes” to all 4 questions, then the system contains CPI. If the answer is “no” to any of the 4 questions, the system does not contain CPI and you have completed Section 9.9.2 Has the agency documented and labeled the confidential personal information in this system? If so, please provide the name an
32、d date of the documentation and a point of contact (name, e-mail, phone). 9.3 Does the agency maintain a set of criteria for determining which employees of the state agency may access, and which supervisory employees of the state agency may authorize those employees to access, confidential personal
33、information in this information system? Please provide the name and date of the documentation with the criteria and a point of contact (name, e-mail, phone).9.4 Is there a written policy that specifically addresses a list of the valid reasons, directly related to the state agencys exercise of its po
34、wers or duties, for which only employees of the state agency may access the confidential personal information found in this information system? 9.5 Has the agency cataloged the federal or state statutes or administrative rules that make the confidential personal information confidential? If so, plea
35、se provide the name and date of the catalogue and a point of contact (name, e-mail, phone). 9.6 Does this information system have a mechanism for recording specific access by employees of the state agency to confidential personal information? This procedure should include two exceptions for manual l
36、ogging: a) where access both (i) results from research, routine office procedures or incidental contact and (ii) results from conduct not specifically directed toward a specifically named individual or a group of specifically named individuals; and b) where access occurs as a result of a request by the individual for CPI about that individual. 9.7 Is the CPI in this information system available for inspection by the subjects of the information? 9.8 Is there a procedure for notif
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯系上傳者。文件的所有權益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網頁內容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經權益所有人同意不得將文件中的內容挪作商業或盈利用途。
- 5. 人人文庫網僅提供信息存儲空間,僅對用戶上傳內容的表現方式做保護處理,對用戶上傳分享的文檔內容本身不做任何修改或編輯,并不能對任何下載內容負責。
- 6. 下載文件中如有侵權或不適當內容,請與我們聯系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 2024內蒙古藝術學院輔導員招聘筆試真題
- 2024云南工貿職業技術學院輔導員招聘筆試真題
- 2024保山學院輔導員招聘筆試真題
- 自行車英語課件
- 自由課件教學課件
- 離婚協議中子女監護權變更及教育費用分擔細則
- 車輛租賃安全責任及事故處理合同
- 餐飲股份戰略合作框架協議
- 常州消防工程安全監督與現場管理合同
- 高新技術企業部分股權出讓協議范本
- GB/T 18255-2022焦化粘油類產品餾程的測定方法
- GB/T 11832-2002翻斗式雨量計
- 防損培訓課程之一防損基礎知識
- GA/T 1147-2014車輛駕駛人員血液酒精含量檢驗實驗室規范
- 學前兒童心理學論文
- 輪機英語詞匯匯總
- 溝通秘訣-報聯商課件
- 充電樁檢測報告模板
- 吊車施工專項施工方案
- 英語詞匯的奧秘·升級英語版-蔣爭
- NBT 10739-2021 井工煤礦輔助運輸安全管理規范
評論
0/150
提交評論