← Back to Policies

Data Protection Impact Assessment (DPIA) Template

UK GDPR Article 35 Compliance

⚠️ When to Use This Template: A DPIA is required for processing that is likely to result in a high risk to individuals' rights and freedoms. This includes:
  • New technologies or systems processing personal data
  • Large-scale processing of special category data (e.g., health data)
  • Systematic monitoring or profiling
  • Processing that could result in discrimination or exclusion

Assessment Details

[Enter project or system name]
[E.g., DPIA-2024-001]
[Date]
[Name and role]
[Yes/No - Date of consultation]

Step 1: Identify the Need for a DPIA

Screening Questions

Answer these questions to determine if a DPIA is required:

Does the processing involve special category data (e.g., health data) or criminal conviction data on a large scale?
Does the processing involve systematic monitoring of publicly accessible areas on a large scale?
Does the processing use new technologies or innovative applications?
Does the processing involve profiling or automated decision-making with significant effects?
Does the processing involve processing children's data on a large scale?
Does the processing prevent data subjects from exercising their rights or accessing services?
Does the processing combine or match datasets from different sources?
Does the processing involve data about vulnerable data subjects?
[If YES to 2+ questions, a DPIA is likely required. Document reasoning here.]

Step 2: Describe the Processing

2.1 Nature of Processing

[Describe what you're trying to achieve and why]
[Describe how data will be collected, used, stored, deleted]
[How much data? How many individuals? Geographic scope? Duration?]
[Relationship with data subjects, nature of data, expectations, prior collection, sensitivity]

2.2 Data Categories

[e.g., • Contact details (name, email, phone) • Demographic data (age, gender, location) • Special category data (health information, etc.)]
[Health data, racial/ethnic origin, religious beliefs, etc.]
[Employees, customers, service users, children, vulnerable individuals, etc.]

2.3 Legal Basis

[Consent / Contract / Legal obligation / Vital interests / Public task / Legitimate interests]
[Explicit consent / Health/social care / etc.]
[Document legitimate interest and balancing against data subject rights]

Step 3: Consultation Process

3.1 Internal Consultation

[e.g., • Data Protection Officer - [Date] • IT Security Team - [Date] • Clinical Director - [Date] • Project stakeholders - [Date]]
[Key concerns, suggestions, recommendations]

3.2 Data Subject Consultation

[Surveys, focus groups, user testing, feedback mechanisms]
[Justification if data subjects not consulted]
[Summary of feedback, concerns, suggestions]

Step 4: Assess Necessity and Proportionality

Necessity and Proportionality Assessment

[Justify why processing is necessary and proportionate]
[Demonstrate data minimisation]
[Processes for keeping data accurate and up to date]
[Retention periods and justification]

Step 5: Identify and Assess Risks

Assessing Risk: Consider risks to individuals' rights and freedoms, not just organisational risks. Think about:
  • Physical, material, or non-material damage
  • Loss of control over personal data
  • Discrimination or identity theft
  • Financial loss or damage to reputation
  • Loss of confidentiality
  • Unauthorised reversal of pseudonymisation
  • Economic or social disadvantage

Risk Assessment Matrix

Likelihood: Low / Medium / High

Severity: Minimal / Significant / Severe

Overall Risk: Low / Medium / High

Risk Description Likelihood Severity Overall Risk Affected Individuals
[e.g., Unauthorized access to sensitive health data] [Low/Med/High] [Min/Sig/Sev] [Low/Med/High] [Service users]
[Risk 2]
[Risk 3]
[Add more rows as needed]

Step 6: Identify Measures to Mitigate Risks

Risk Mitigation Measures

For each risk identified above, document mitigation measures:

Risk Mitigation Measures Responsible Person Residual Risk Status
[Risk 1] [e.g., Encryption, access controls, MFA, security monitoring] [Name/Role] [Low/Med/High] [Planned/ In Progress/ Complete]
[Risk 2]
[Risk 3]

Security Measures

Specific technical and organisational measures to protect personal data:

Encryption in transit (TLS 1.3)
Encryption at rest (AES-256)
Multi-factor authentication
Role-based access controls
Regular security audits/penetration testing
Staff training on data protection and security
Incident response procedures
Regular backups with secure storage
Secure disposal procedures
[Document any additional measures specific to this processing]

Step 7: Sign Off and Record Outcomes

Outcome of DPIA

[YES / NO - Explanation]
[If YES, you must consult the ICO before proceeding]
[APPROVED / APPROVED WITH CONDITIONS / REJECTED / REFER TO ICO]
[Any conditions that must be met before proceeding]

Approvals

Role Name Date Signature/Approval
Prepared By: [Name] [Date]
Data Protection Officer: [DPO Name] [Date]
Approved By (Senior Management): [Name & Title] [Date]

Step 8: Integrate Outcomes into Project Plan

Integration and Monitoring

[Document how recommendations will be implemented]
[Names and roles]
[Key milestones and dates]
[Monitoring approach and frequency]
[Review date - should be reviewed if major changes occur or at least annually]

Appendices

Supporting Documentation

Attach or reference supporting documents:

  • Data flow diagrams
  • System architecture diagrams
  • Consultation responses
  • Security assessment reports
  • Privacy notices
  • Data Processing Agreements
  • Other relevant documentation