Sunteți pe pagina 1din 13

Family Links Network

Code of Conduct for Data Protection


Template for Data Protection Impact Assessment (DPIA)

Prior to conducting a DPIA, the following questions should be considered by National Societies:
- Have any consultations with internal stakeholders taken place with regard to risks arising from the processing operation and risks of non-compliance
with the Code of Conduct?
- Have any consultations with external stakeholders taken place? If yes, who, when and for what purpose?
- In addition to identifying risks, have the consultations involved consideration of measures for avoiding or minimising the risks?

Data protection issue Code of conduct Assessment of risks Mitigation measures Conclusion
Purpose specification 2.1 Specified Example: “Function creep” – Examples: Risk sufficiently
Purpose National Societies may want  Specify/document the mitigated
Is the data to be collected to be used to gain more value from the purposes for which personal 1
only for a specified purpose? data they collect. data will be collected/used Risk not necessarily
 Raise awareness on RFL Code mitigated but accepted
Will the data collected be used for In practice: National of Conduct that provides for
anything other than the specified Societies may ignore or are the purpose specification Risk neither mitigated
purpose? not aware that they cannot principle and for further nor acceptable
repurpose personal data processing only if for purposes
(i.e., to use the data they compatible with the original
originally collected for some purpose of data collection.
additional purposes) without  Improve training of staff
seeking consent again. regarding purpose
specification/compatible
 The National Society further processing.
may not comply with the  Use of database: As part of a
RFL Code of Conduct privacy-by-design approach,
insert reference in the file to
ensure the purpose of the data
Data protection issue Code of conduct Assessment of risks Mitigation measures Conclusion
processing operations is always
specified. Where applicable,
also link the purpose of the
data processing operations to
the consent that may have
been provided.
Data limitation 2.3.2 Processing Example: National Societies Examples: Risk sufficiently
adequate may collect more personal  Ensure the staff collects only mitigated
Is all the personal data collected relevant and data than necessary for the the pieces of data which are
necessary for the RFL activity? updated data specified purpose. necessary to achieve the Risk not necessarily
purpose specified originally mitigated but accepted
2.3.1 In practice: National  If possible, give people prior
Responsibility Societies may suffer notice regarding the Risk neither mitigated
When people engage with you seeking and reputational damage when it modalities/purposes of the nor acceptable
help, are they told how the personal accountability becomes publicly known that data collection and processing.
information they supply will be used? 2.2.1 Consent staff are collecting more Give individuals an opportunity 2
3.1 Information personal data than they to question the manner and
and access actually need. purpose for which their data is
collected and processed.
 The additional personal
data collected creates a
bigger risk for the
beneficiaries/ their
families/witnesses/ or
others if the system is
hacked or otherwise
compromised
(unauthorized
use/disclosure or
security breach.)
 Collecting more detail
than needed also
Data protection issue Code of conduct Assessment of risks Mitigation measures Conclusion
increases the risk of
identity fraud or theft.
Right to information 3.1 Information Example: National Societies Examples: Risk sufficiently
and access do not provide individuals  Should National Societies have mitigated
Are individuals explicitly informed with clear and easily a dedicated web page, they
about why their personal data is being accessible information could have a tab that links the Risk not necessarily
collected and how it may be used? regarding their policies, individual with the RFL Code of mitigated but accepted
procedures and practices on Conduct.
the collection of information.  Alternatively, National Risk neither mitigated
Societies could develop Q&A nor acceptable
In practice: An individual summarizing the RFL Code of
would like to trace his/her Conduct and make hard copies
relative but does not feel at available to data subjects.
ease in doing so as he/she is  In addition, a link should be
not fully aware of data created on the Family Links
processing/sharing website or national websites to 3
procedures implemented by present general activities as
the National Society. well as general data
collection/processing
 If data modalities.
collection/processing
standards and procedure
are not transparent,
individuals may not trust
the Organization and
refrain from sharing
their personal data.
 The National Society
may not be compliant
with the RFL Code of
Conduct
Data protection issue Code of conduct Assessment of risks Mitigation measures Conclusion
Legal basis for data 2.1 Purpose Example: Example: Risk sufficiently
processing/transfer specification  One or more individuals  Review the process by which mitigated
threaten to announce consent is sought. Explain to
Consent 2.2 Lawful and publicly that they did not beneficiaries or their families, Risk not necessarily
Are individuals able to appreciate the fair processing give their consent to the witnesses or other relevant mitigated but accepted
most likely consequences (including National Society's third parties the implications of
negative)? Does the processing 2.2.1 Consent collection of their registering with the National Risk neither mitigated
involve complex technologies? Does personal data. Society, how their data could nor acceptable
the person have a genuine free choice 3.1 Information  An advocacy be used in the database and to
as to whether to consent? and access organization might whom it could be further
discover instances where transferred.
Are they able to refuse to provide the National Society did  Attempt, where possible, to
some or all information without being not get the consent of get a signed informed consent
penalised in any way or deprived of the individual. form.
any assistance that your organisation  A rogue employee leaks  It would be worthwhile having
might otherwise provide? memos showing that the a tab dedicated to what is 4
National Society does informed consent on the
not get informed National Society web page
How do individuals provide consent consent.  Ensure that the consent form is
for their information to be collected? consistent and accessible
If consent is not written, do you see In practice: across all methods of
any risks involved?  The National Society collection, including hard-
does not routinely copy/online forms and via
Is consent limited to a specified obtain a signed form telephone.
purpose? If the personal data were to from the individual  Ensure that the consent form is
be used for a purpose other than that consenting to the available in an appropriate
originally specified (a secondary collection and use of his range of languages for the
purpose), will a new consent be or her personal data. target group.
sought from the individual?
 Damage to the National
Has the individual explicitly agreed to Society's reputation.
how their information can be used, or
Data protection issue Code of conduct Assessment of risks Mitigation measures Conclusion
that it can be shared with other  Other potential
agencies? informants decide it is
not prudent or safe to
Are there instances or circumstances talk to the National
where an individual has consented to Society.
the sharing or disclosure of personal
information, but where the staff in
charge does not think it is wise to do  If it is not possible to obtain an
so? informed consent:
process/transfer personal data
Alternative legal basis on an alternative legal basis
(vital interest , public interest ,
Is data also collected of individuals legitimate interest, compliance
who are not present? with a legal obligation)

Right to access / Rectification / 3.1 Information Example: Some individuals Examples: Risk sufficiently
Deletion and access may complain about how  Should National Societies have mitigated
difficult it is to see and, if a dedicated web page, they
could have a tab that links the
Data protection issue Code of conduct Assessment of risks Mitigation measures Conclusion
Are individuals provided with the 3.3 Rectification necessary, amend (or even individual with the assurance Risk not necessarily
possibility to access and correct their and deletion delete) their personal data. that they will help individuals mitigated but accepted
personal information? in their requests for sight of
In practice: National their data. Risk neither mitigated
Societies may not have  The web page could also nor acceptable
Can they request the deletion of some specific/transparent specify the modalities of access
or all of their personal information? procedures to provide data (without prejudice to the
subjects access to their confidentiality which may
Is it necessary to restrict access to personal data. apply to certain pieces of
data? If so, are these restrictions information.)
adequately circumscribed and  Reputation damage
explained?  individuals’ complaints
could reach the media or
advocacy organizations.
Information quality and accuracy Example: Examples: Risk sufficiently
 National Societies’ staff  Ensure a process of quality mitigated 6
What processes are in place for 2.3.2 Processing do not have enough time control to minimize errors or
ensuring information quality, i.e., that adequate, to check the reliability of unauthorized modifications Risk not necessarily
the information is relevant, reliable, relevant and the information they prior to recording the data. mitigated but accepted
accurate, actionable? updated data receive from the  Where possible, cross-check
beneficiaries, their information received from an Risk neither mitigated
Is there a policy or procedure in place 3.3 Rectification families or witnesses. individual with other nor acceptable
to correct data that has already been and deletion  Few or no people organizations who may also
shared with partners, or to notify actually witness an event have interviewed the individual
partners about updates? 3.4 Objection or only see individuals or other witnesses.
taken away, but with no  Establish procedures to
knowledge of what determine when and how
happens to them. often personal information
National Society staff should be reviewed and/or
have to rely on updated and when data should
incomplete information be deleted or archived
or are unable to verify
Data protection issue Code of conduct Assessment of risks Mitigation measures Conclusion
information. Staff have  Establish a procedure to notify
insufficient resources to recipients of your data of
verify claims. subsequent corrections to the
 Some staff are of the data.
view that people should  Distinguish between primary
be given assistance and secondary sources of data
anyway even if it is not and reflect this distinction in a
possible to verify claims. caveat in the file.

In practice: Migrating paper


records to a digital or online
format by transcribing data
increases the risk of
introducing inaccuracies.

 National Societies may 7


take decisions based on
incomplete, unreliable or
false information.
 Poor quality information
may lead to
inappropriate decisions
that have a negative
impact on the individuals
concerned.
Appropriate security measures 2.3.7 Security Example: Examples: Risk sufficiently
 External hackers and  Encourage (warn) employees mitigated
What personal information is to be 2.3.8 Data rogue employees may to avoid use of unsecured
collected? Could disclosure of this breaches seek to exploit personal portable storage devices, such Risk not necessarily
information put the person in danger data. as memory sticks. mitigated but accepted
(for example information relating to 2.3.1  Host governments may  Develop robust access control
ethnicity, religion, sexual orientation, Responsibility want details of all people protocols which limit access on
Data protection issue Code of conduct Assessment of risks Mitigation measures Conclusion
political views, trade union and to whom the ICRC a ‘need to know’ basis. Users Risk neither mitigated
membership, etc.) accountability provides assistance. should only have access to that nor acceptable
 In a situation of violence portion of data they need to
Is there a risk of information being 6. Application of offices of National carry out their legitimate
stolen / lost / altered / rendered the Code of Societies may be functions.
unavailable / system hacked / Conduct ransacked.  Ensure clarity re who has the
organisation subject to surveillance? authority to assign, change or
What preventative measures are in In practice: revoke access privileges.
place?  The National Society  Ensure all accesses to the
may not impart to databases are logged into a
Does the processing involve external employees good information register of processing
organisations or third parties? Does security practices. operations.
this increase the risk of surveillance /  It may not put in place  Set-up data breach notification
disclosure by the processor (whether strong controls for access to procedures to inform the data
lawfully or not) / hacking / data theft / its database subjects.
availability?  Employees may use 8
weak passwords or may not
Is information limited to others on a encrypt data.
“need to know” basis? How is this  Some data
implemented in practice? (e.g., notebooks) in paper
form is not backed up and
may be found only in offices.
Are staff reminded to keep paper files,
CDs and/or memory sticks locked up  The security controls of
or with them at all times when they the National Society’s
are not in use? Are staff encouraged system are breached and
to encrypt memory sticks? personal data is
compromised.
Is training given to all staff on good  The National Society
data protection and information does not know when the
security practices? personal data it holds is
compromised.
Data protection issue Code of conduct Assessment of risks Mitigation measures Conclusion
 It suffers damage to its
Are e-mails encrypted? What kind of reputation.
encryption is used?  Compromised data puts
lives at risk.
What action will be taken if there is a
data breach? Are individuals informed
if their personal data is lost, stolen or
other compromised? Will any other
organisations be informed?

Have you considered some worst-case


scenarios regarding what might
happen if the personal data collected
by your organisation was
compromised or deleted either by
accident or purposely? 9

How would you decide which risks are


the most likely and those that are
likely to have the greatest impact if
the personal information were stolen,
hacked, altered or stolen?

Data sharing, disclosure/publication 4. Transfers Example: Staff may share Examples: Risk sufficiently
and/or transfer personal data with other  Share personal information mitigated
2.3.1 organizations or authorities with other organizations or
Will the personal information be Accountability over which they have no authorities only if a specific Risk not necessarily
shared with or disclosed to other and control regarding how the legal basis exists (consent, mitigated but accepted
organisations, including other Responsibility other organizations or public interest etc.)
National Societies? Why? authorities may use that Additionally, share personal Risk neither mitigated
1.4.3 data or further share it. information with other nor acceptable
Confidentiality organizations or authorities
Data protection issue Code of conduct Assessment of risks Mitigation measures Conclusion
Have they provided written In practice: Publications of only if they observe adequate
assurances that they will safeguard 2.3.2 Processing photos of unaccompanied data protection to at least the
the information and not share it Adequate minors could attract same standard as the RFL Code
further? Does the organisation have Relevant and attention of child traffickers of Conduct.
an adequate data protection policy? Updated Data  Only publish the photo and a
 The data subject/family central phone number, no
Has the individual data subject 2.3.7 Data can be put at risk if the other details. Cross check
explicitly agreed to the sharing of their Security organisation does not reliability of alleged relatives
data? process the data against other data available
according to adequate and the beneficiaries
Where your organisation develops 5. Publication data protection themselves before accepting to
promotional videos, brochures or standards restore contact
press stories, has your organisation  Individuals may
anonymised personal information so complain about the
that even if it were linked to other disclosure of their data
data, it would not be possible to 10
identify the person?

Data retention 2.3.6 Data Examples: The personal data Examples: Risk sufficiently
Retention originally collected is  Limiting the retention of mitigated
Is personal information being entered collected without specifying personal data to what is
into databases? the retention period and is necessary to fulfil specific, Risk not necessarily
kept for an unlimited period. explicit and legitimate mitigated but accepted
Is it necessary to keep all of the data purposes.
that is being processed? In practice: Large amounts  Use of database: As part of a Risk neither mitigated
of data are recorded in the privacy-by-design approach, nor acceptable
Are there procedures for reviewing National Societies’ databases insert reference in the file to
how long data should be retained? but are not necessary ensure the data retention
anymore to fulfil the period is always specified. Also
Data protection issue Code of conduct Assessment of risks Mitigation measures Conclusion
Is there a policy, procedure, rationale purpose for which they link the data retention period
for archiving personal information? were originally collected to the purpose of the data
processing operations. An
Is too much data being kept for  Information-overload: initial retention period could
auditing purposes? Could this be data management in this be extended if it is considered
minimised? context is time- necessary to keep the data to
consuming for the case fulfil the purpose for which it
worker and might not be was originally collected.
worth it if the data is not
necessary to carry out
RFLactivities
 The National Society
does not comply with
the RFL Code of Conduct

11

Risks to individuals other than the


risks identified above:

Is the activity in question, in and of


itself, likely to give rise to risks to the
physical or moral integrity of the
individuals concerned?
Accountability/Oversight mechanism: 6. Application of Example: Insider threat -- Example: A data protection focal Risk sufficiently
the RFL Code of Since no one may have the point is entrusted with the specific mitigated
Are data protection standards and Conduct specific responsibility for responsibility for ensuring the
procedures effectively implemented? safeguarding personal data, adequacy of national societies' Risk not necessarily
the National Society staff mitigated but accepted
Data protection issue Code of conduct Assessment of risks Mitigation measures Conclusion
Are oversight mechanisms in place to may collect and use personal policies, procedures and practices
overview existing practices and to data without any concerns with the RFL Code of Conduct. Risk neither mitigated
provide guidance to the national about the consequences of nor acceptable
society? their actions.

In practice:
 The National Society
may not have assigned
accountability to anyone
for data protection
 No one has documented
and communicated the
data protection policies,
procedures and practices
 The National Society has
not assigned 12
responsibility to a
specific staff member for
the transfer of personal
data to a third party and
does not verify that the
organizations with
whom it shares personal
data comply with data
protection standards to
the same degree as the
RFL Code of Conduct.

 Lack of trust/confidence
regarding activities
carried out by National
Society
13

S-ar putea să vă placă și