Privacy Impact Assessment Part 2 FA
Privacy Impact Assessment Part 2 FA
HOW TO DO
A PRIVACY
IMPACT
ASSESSMENT
(PIA)
Part 2: Contents
Part 2: Appendices 18
The scale and complexity of your PIA will depend on the • Establish better governance structures to manage
scale and complexity of your project. Only go as far as you personal information
need to for your particular project. For simple projects, • Manage any risks with using third-party contractors
the PIA process may be very quick and the PIA report may • Align the PIA with the organisation’s existing
end up being only a couple of pages long. If your project project-management methodologies
is more complex, the resulting PIA report may be long,
• Publish your PIA.
detailed and highly technical – but if that’s the tool you
need to do the job successfully, then it’s likely to be worth See page 16 for more detail.
the investment.
IDEA
Decide whether
to do a PIA
DEFINITION
DESIGN
TEST
USE Review
Developing clear terms of reference for the PIA is a useful If the PIA will be particularly complex, or particularly
way to tease out the scope of the PIA. central to the success of the project, it’s worth thinking
about hiring an external expert. Even where an external
Here are some of the key questions you’ll probably need specialist is brought in, though, it’s good practice to involve
to answer about the size and scope of the PIA: internal staff as well – this builds knowledge inside the
organisation, and will make it easier to do future PIAs
without outside help.
If you’re a small organisation, there will only be a few Otherwise, it’s not compulsory to come and talk to us.
people in the organisation you’ll need to look to – the However, many organisations find it useful to use us as a
information might even all sit on one person’s desk. In sounding board for projects that are larger, or that could
these cases, think about whether there are people outside result in serious harm to individuals if not done properly,
your organisation who you can get some advice from – or that use technology to collect or use of large quantities
for example, business colleagues, the local Chamber of personal information.
of Commerce or the Privacy Commissioner. We won’t do the PIA for you, but we can give you some
basic advice and point out possible misconceptions or
danger areas.
PEOPLE WHO MIGHT NEED TO BE
At what stage should you talk to us?
INVOLVED OR WHO CAN PROVIDE ADVICE:
It’s best if you start your PIA early on the life of your project,
• People who are familiar with privacy, particularly the and then consult with us as soon as you’ve completed a
organisation’s privacy officer reasonably full draft PIA report, but while the project is still
• People who deal with security in your organisation – at the concept stage.
they’re likely to be familiar with what you’re trying
In this way we may be able to give you a heads-up early
to achieve
on about some potential areas that tend to raise concerns
• Business analysts and other project staff who will
with the public, or that lead to complaints, or that we, as
understand the business aims, what’s being put in
the regulator, may have a problem with later on.
place, and when various steps need to be taken
• IT advisers who’ll be able to provide information on Having a reasonably full draft PIA report to look at will give
the systems being used, how the personal information us a clearer view about what your project will do and why,
will flow through the system (including how it will and what personal information is involved. We can then
be stored and processed), and whether there are any discuss whether the project looks like it will comply with
security implications the privacy principles, or whether there are other resources
or examples that you might be able to refer to for help.
• Marketing and communications advisers who will
help in understanding how the organisation uses By doing your PIA early in your project, you’ll be able to
information and can help coordinate any consultation consider whether you should adjust your project based on
needed for the PIA the advice we provide. If we hear about your project only
• Risk and assurance people who can help you identify at the last minute, we can still give you advice – but your
risks, controls and other actions ability to act on it may be more limited, especially if there
• Specialist staff groups who are affected by any are already a lot of sunk costs in the system.
proposals for handling personal information, such as call
centre staff, information management staff, or human
resources – they can give you the best information about
how things will work on the ground
• Customer or consumer groups.
1. The Cabinet Manual requires government agencies to consult with the Privacy Commissioner when putting forward policy proposals or draft legislation that affects
personal information. Part 9A of the Privacy Act (approved information-sharing agreements) and Part 10 (authorised information-matching programmes) specify when and
how the Privacy Commissioner has to be consulted.
You’ll also need to consider a broader range of – If the project involves information your organisation
information-management questions if, for example, already holds, will you be using the information for
your project involves sharing information with another a different purpose? If so, why and how?
organisation so that the individuals can receive a service – What measures are in place to ensure the information
more efficiently. You’ll need to consider whether the is accurate and up to date?
sharing of information will take the individual by surprise – – Will your organisation tell the individuals what’s
perhaps because it’s different from what they were told happening to their information? If so, how will
when you collected the information from them? If so, will it tell them?
you need to tell them what’s going on? Also, how will you
– Who will have access to the information inside your
make sure the information is kept secure when it’s being
organisation? Who will have access to it outside the
sent to the other agency, and that it won’t be accessible
organisation?
to people who could misuse it?
– How long will the information be kept for? How will
it be disposed of?
It’s important to consider privacy implications in the • How privacy fits in with risk management in your
context of the project as a whole, and in light of how your organisation (for example, does your risk management
organisation works – particularly its existing approach to framework consider risks to the people whose
handling personal information. For example, you’ll need to information you hold, rather than just risks to
know whether any risk mitigation or other change that you the organisation?)
recommend for the project is likely to be workable in the • Overall processes and controls that affect privacy,
context of the organisation as a whole. such as disposal processes
• Security controls, such as how access to your
Considering the organisational context will also help you
information systems is managed
be aware of the likely downstream effect of the project in
your organisation and enable you to predict and address • Training and awareness programmes on privacy
potential privacy risks. For example, if your project involves and security
one division of your organisation collecting a new piece of • Monitoring and auditing of any incidents that occur,
personal information for a particular purpose, how long will and how these are dealt with.
it be before another division decides they could use it too?
Anticipating this kind of potential “scope creep” is an
important part of any PIA.
• destroying the information. • Will anyone else have access to the information?
• Will it be shared with third-party providers to run
A summary of the privacy principles is included in the
ads in the app, for instance?
template for a Privacy Impact Assessment Report at
• How will users know the information is being
Appendix A (see page 18), and more information about
collected and why?
common risks relevant to each of the principles is included
in Appendix C (page 18). The full text of the principles is • What will happen if users don’t agree to provide
section 6 of the Privacy Act. More detailed advice about the information? Do they have to consent in order
what the privacy principles entail is available on our website. to download the app? If so, is this reasonable?
Can the user opt out (even if at the cost of some
of the functionality)?
• Can the user change their mind and opt out of
CONSIDER THE PERSONAL INFORMATION sharing location later? What will happen to the
INVOLVED IN THE PROJECT AND HOW THE information the agency has collected if they do so?
PRIVACY PRINCIPLES APPLY. • Is the user specifically and clearly asked for
Key points to cover permission? How clear is the privacy statement?
For each privacy principle: • How long is user location information kept for?
Is it aggregated, or linked to the user by information
• Is it relevant? (if not, simply note that it is not relevant
obtained from elsewhere or from the user?
and why)
• How is the information going to be protected
• Identify the personal information that is relevant
against misuse and loss?
to that principle
• Is the change consistent with the privacy principle? It’s important that the PIA take a critical and
If so, how? Or will it enhance compliance? independent approach to these types of questions,
• Does the change create more risks of harm to the as they will drive the design choices the business
individual? If so, how might it adversely affect the makes. It’s easy to get enthusiastic about the business
individual? Or does the change eliminate risks in opportunities resulting from collecting and using
the existing system? personal information, but consideration of how the
individual concerned could be affected leads to better
design in the long run – and a greater chance that the
product will succeed and not be scuppered by
concerns over privacy.2
2. If your organisation is developing an app, you should look at our guidance for app development. It covers many of the privacy issues specific to the mobile environment: see
www.privacy.org.nz/news-and-publications/guidance-resources/apps-guidance/
What is a privacy risk? Populate your risk table with the risks you already know
A “privacy risk” is the risk that a proposal will fail to meet about from step 2 (see page 11), and identify the likely
individuals’ reasonable expectations of privacy – for impact on the individuals. You can then use that as a basis
instance because it breaches the Privacy Act, or for a more thorough analysis. Make sure you talk to other
unreasonably intrudes into their personal space and people involved in the project, or get a view from an
personal affairs, or runs contrary to what your relationship external person who may be able to see risks that you have
with your clients suggests should happen. missed. Other possible steps, depending on your project,
could be:
Calculating risk is not simply about assessing whether the
• a workshop including the key people involved
project will be legally compliant. It’s possible to comply
with the law and for the behaviour still to affect whether • a further desk-top review of documentation
your particular clients’ reasonable privacy expectations • interviews with key people involved.
are met. The nature of your relationship with them may
suggest that you should give even better protection than Common examples of mitigations include:
the law requires. The privacy principles provide a good • minimising the amount of personal information
framework for asking yourself the right questions – both collected
legal and non-legal – about the impact on your clients. • better and clearer communication with the individuals
Risks to an individual will often directly equate to risks • allowing individuals to opt in instead or making it easy
for your organisation. Privacy breaches will have a direct to opt out
impact on the organisation’s reputation, and loss of trust • designing the system to provide better security
can make it harder and more expensive to meet the aims • providing training and support for staff to help them
of the project. get it right.
Consider not only the direct risks from the proposal, but Try to ensure that your mitigation solution is practical and
also any knock-on effects. If you take too narrow a lens, sustainable. Reviewing the project once it is operating will
you may miss an important, wider effect on the individuals help to identify whether the mitigations are actually
you deal with. working as you’ve planned.
ASPECTS OF INFORMATION What information the app collects Third party providing advertising
ASSESSED through the app needs access to
information (age, gender)
DESCRIPTION OF THE RISK The app will collect more information Third parties may misuse this
than specified in the privacy information for their own purposes
statement (spamming, hacking, etc)
RATIONALE AND The app will have greater functionality Data is never truly de-identified so
CONSEQUENCES FOR THE and lead to increased monetisation, may be misused exposing individuals
AGENCY OR INDIVIDUAL but app users may object to collection to unexpected impacts. Individuals
beyond the current privacy statement distrust unexpected disclosures to
third parties
EXISTING CONTROLS The business has a clear purpose for De-identify data as much as
THAT CONTRIBUTE TO collecting the personal information possible. Contract with third party also
MANAGE RISKS IDENTIFIED (but app policy does not currently specifies what can and can’t be done
reflect it) with information
RECOMMENDED Put a process in place to manage clear Extend contract with third party
ADDITIONAL ACTIONS TO notification and consent for additional to disallow re-identification or reuse
REDUCE OR MITIGATE RISK collection by the app in line with the of data for different purposes
new purpose
ASPECTS OF INFORMATION To function the app requires Username and password are collected
ASSESSED a persistent account, tied to by the app
an individual
DESCRIPTION OF THE RISK Behavioural information is collected Some users use one password
over time, in addition to personal across multiple accounts, which
information collected at download/ could reduce the security of the
registration system elsewhere
RATIONALE AND There is an administrative need, as the Hard to prevent people from recycling
CONSEQUENCES FOR THE app won’t work without a persistent passwords. If an external account is
AGENCY OR INDIVIDUAL account. But app users might object compromised, all other accounts using
to more behavioural information being the same username and password are
collected, and might abandon it for vulnerable, including the app
this reason
EXISTING CONTROLS Privacy notice clearly outlines what Credential information is encrypted;
THAT CONTRIBUTE TO information can be used for (e.g. process to change/reset passwords
MANAGE RISKS IDENTIFIED account persistence, and customer is secure; hashed passwords are
service – which covers targeted salted, but this won’t prevent use
advertising) of recycled passwords
RECOMMENDED Amend retention policy to ensure that Require users to create a unique
ADDITIONAL ACTIONS TO app user logs are deleted when they password for the app, changed
REDUCE OR MITIGATE RISK are no longer needed (easy additional regularly, using criteria unlikely to have
protection) been demanded by other accounts
Using the privacy principles to follow the • operational controls – such as organisational policies
or procedures, staff training, and oversight and
information lifecycle
accountability measures
Each privacy principle deals with a different aspect of
• communication strategies – such as privacy notices,
information management. Addressing each principle in
and consent-based collection processes.
turn will therefore help your organisation make sure it takes
proper care of the information entrusted to it.
Examples of risk and mitigation
However, the principles are best viewed as an integrated
The following pages provide some examples of strategies
whole rather than a set of separate rules.
you may want to use to address and mitigate common
Each principle links with the others. For example: privacy risks. It is arranged by privacy principle.
• disclosure by one agency often involves collection
by another agency
• unnecessary collection increases risks of unwarranted
use or access
• poor security or unjustified retention of information
creates risks of having inaccurate or outdated records.
Where an agency collects personal information, • Who will you collect the information from – directly from
the agency shall collect the information directly the person concerned or indirectly from a third party?
from the individual concerned, unless one of the If a third party, then who?
listed exceptions applies. • If you’re collecting it from a third party, why won’t
it work to get it directly from the individual?
• Will this differ from the way you already collect
information? If so, how?
What Principle 2 means in practice
• Do you need to positively identify the individual
Be direct – get it from the people concerned, concerned, to check it’s the individual who’s entitled
wherever possible to deal with you?
When you collect information about someone, you should
get it from them directly wherever possible, and you Common risk examples (Source)
should tell them why you need it and what it will be used • Individuals may not be aware that information is being
for. Then what you do after that won’t be a surprise to collected, who will use it or what it’s being used for. If
them. Also, it’s often the people themselves who are best they become aware only later, they may be surprised
placed to provide accurate information. and upset
• Collecting the information from a third party could
You can collect information from another source if you
perpetuate and compound any errors that are already
believe that one of the exceptions to the principle applies.
in the data
These include:
• if the individual concerned has authorised you to collect • Information may be out of date or irrelevant for the
the information from someone else intended purposes if it’s used outside the original
context in which it was collected
• if the information is already publicly available
• Individuals won’t be able to update their information
• if getting it from another source wouldn’t prejudice
if they don’t know you have it.
the individual’s interests
• if the information won’t be used in a way that identifies Possible mitigations to enhance privacy (Source)
the individual concerned (including where it will only • Change your system to collect information directly from
be used for statistical or research purposes and the the individual, unless you have a good reason not to do
individual won’t be identified) so. It’s much better customer service to let the individual
• if collecting it from another source is necessary to know what’s going on
enforce the law, or for court proceedings, or to protect • If you’re collecting information from a third party,
public revenue, or make sure the individual that the information relates
• if collecting it from the individual concerned isn’t to knows you’re going to do that, unless there’s a good
reasonably practicable in the circumstances. reason not to
• Have a clear privacy statement saying where you get
personal information from
• Provide people with a way to see the information you
hold about them (like a dashboard) and give them the
opportunity to correct it if it’s wrong
• Include a check box as a quick way for an individual
to confirm their identity or to give authority for you to
act on their behalf
• If you’re getting only verbal consent, make sure you have
a good system to record or document that consent.
Be open – tell people why you need it and • People often don’t read privacy statements – if your
what you’ll do with it organisation acts on the basis that the individual has
knowingly consented, this could lead to clients losing
When you collect information from an individual, whether
trust in you
this is voluntary or compulsory, you should tell them what
you need it for, and what you’re going to do with it. If they • The individual’s consent for collection may not be
don’t have a choice about giving information to you, spell supported by a valid, clearly explained purpose
out what statutory provisions require them to do this, and • Individuals may be surprised by information being
any limits on how those provisions can apply. collected that wasn’t required previously
• If they’re not given advance notice, individuals may feel
As with principle 2, there are some exceptions that allow
a loss of control over their information
you to not spell out what you’re doing – for instance
because it: • The individual may lose trust in dealing with your
• would frustrate the lawful purpose of collecting the organisation, ultimately leading to a lack of engagement
information that may affect your ability to meet your objectives.
ii) access, use, modification, or disclosure, except Common risk examples (Storage and security)
with the authority of the agency that holds the
Electronic and technical security measures
information; and
• Failing to limit edit-access to data, or to limit or monitor
iii) other misuse; and
access or enforce access controls, can lead to misuse
b) that if it is necessary for the information to be given or unauthorised disclosure
to a person in connection with the provision of a service
• Devices in shared work areas, or portable devices, can
to the agency, everything reasonably within the power
provide for inappropriate access
of the agency is done to prevent unauthorised use or
unauthorised disclosure of the information. • Providing online log-in access to client records raises
the risk of session cross-overs, or automated scams
• The system can’t trace who has accessed a file –
so you can’t tell whether there are problems with
What Principle 5 means in practice unauthorised access
Take care – keep it safe • Unwarranted access to personal information may
You need to ensure that personal information is lead to identity theft
protected against misuse, loss or theft. Security is going • The organisation doesn’t comply with basic
to be relevant to you whether you’re maintaining or standards and expectations for information security
upgrading an existing database of client information, and records management.
moving information into a new application or other system,
Physical and operational security measures
or developing a new business process or access model that
changes how personal information is used or who has • Staff are unaware of their obligations, leading
access to information. to accidents, careless actions or mishandling
of information, which in turn results in
There are some additional things to consider if you’re using unauthorised disclosures
a third party to support IT systems or business processes
• Co-located offices, shared workstations, uncontrolled
and giving them access to the system that holds the
building access and offices open to the public can pose
information. You’ll need to check that the third party has
a risk of unauthorised access to personal information
reasonable security safeguards in place.
• Failing to recognise the high-risk nature of information,
including the need to implement a higher degree of
security to protect particularly sensitive financial or
Key questions to ask (Storage and security) health information
• What personal information will be stored by the • Failing to include contracted service providers in
organisation and how will that change? an agency’s data-management strategy, elevating the
risk of external breaches of data security, in particular,
• What format will the personal information be stored
where contracted service providers are located outside
in (paper, or electronic), where will it be stored, and
New Zealand giving rise to jurisdictional issues
who will be responsible for its safe-keeping?
• Allowing workplace use of portable storage devices
• What security and access controls will protect personal
(such as USB sticks, mobile phones, personal laptops)
information against misuse, accidental loss, unauthorised
without proper security protections
use or disclosure – whether in transit or when the
information is stored and used? • Using regular post to send highly sensitive personal
information may raise the risks that it could be sent
• Who can access the information now, and how will
to the wrong address or go missing
that change?
• Testing and training environments may expose personal
• Are you using a different contractor from before?
information to risk
• When did you last look at your security controls?
• Hacking, system failures, data compromise or breaches
Do they need updating?
result in unauthorised access.
a) to obtain from the agency confirmation of whether or • Individuals aren’t able to easily access their personal
not the agency holds such personal information; and information
• What metadata is kept to allow personal information • Inform users of their data access and correction rights,
to be readily identified and located? and who to contact if they want to request access
• Will all of the information about an individual be in one • Have a standard process for people to use
place or clearly linked to ensure a complete record can to demonstrate that they have authorisation
be identified? to get information on someone else’s behalf.
Where an agency holds personal information, • Correction may be hampered if the data is held
by contracted service providers
the individual concerned shall be entitled:
• Failing to correct personal information that has been
a) to request correction of the information; and
disclosed in the past can lead to inaccurate information,
b) to request that there be attached to the information affecting the individual and the organisation’s services
a statement of the correction sought but not made.
• Computer systems aren’t built to allow statements
of correction to be added, or for a flag to signal that
there is further information a decision-maker needs
What Principle 7 means in practice to consider
Make it right – let them correct it if you have got it wrong • Poor quality information is passed to other
agencies, compounding the errors and the problems
If you hold information about an individual that they think
for the individual
is wrong, they’re entitled to ask you to correct it. If it really
is wrong, it’s in everyone’s interests to get it right. • Information is duplicated in different parts of the
organisation, but corrected only in one.
Sometimes, the person’s opinion of what is right may differ
from your own. In that case, you don’t have to delete or Possible mitigations to enhance privacy
correct the information. However, if the person wants you (Correction)
to, you have to add a statement of what the person thinks • Ensure there’s a clearly defined process by which an
is correct to your file, in such a way that anyone reading it individual can discuss or dispute the accuracy of the
later will know what that person’s view of the information personal information you hold about them
is, as well as your own. • Ensure you have policies setting out how your
If you correct information, but you’ve already passed organisation can action routine or simple correction
the original information on to another organisation, requests (such as a client’s formally notified change
you should, if possible, notify the other organisation of address), and who can determine more complex
that the information has been changed. requests (for example, when a client disputes your
decision on their eligibility for services)
• Design your system to allow a statement of correction
to appear beside the original information – or at the
Key questions to ask (Correction) least for the system to display a clear flag showing that
• How do you accommodate individuals who believe there is other relevant information to consider
that the information you hold is inaccurate? • Ensure a record is kept of correction requests, and the
• Does your system or process allow information decisions on those requests
to be modified if it’s wrong? • If you have to keep the original information (for example
• How do you verify the accuracy of information before because of statutory or record-keeping obligations),
you change it? design your system to do so
• How do you monitor changes to ensure • Where services are contracted out, consider which
they’re authorised? organisation will have the most current and accurate
data, and how any corrections will be communicated
• If information can’t be changed or appended,
to the other organisation
what mechanism is in place to attach a statement
of correction? • Specify whether correction requests are to be mediated
by your organisation, or handled directly by the
• Will your system track who you’ve sent information to,
contracted service provider
so that you can let them know if the information was
inaccurate and had to be changed? • Let users know about their access and correction
rights, and ensure they know who to contact if they
have a request.
An agency that holds personal information • Is the purpose of disclosure directly related to the
original purpose of collection?
shall not disclose the information to a person
or body or agency unless the agency believes, • Will information be disclosed as individual records,
on reasonable grounds, the specified or in bulk files or aggregated?
exceptions apply. • Will personal information be disclosed routinely?
For what purpose?
• Is that purpose required, enabled or authorised
by any law?
What Principle 11 means in practice
• Whose information will be disclosed or exchanged,
Keep the control – only share information and how might that affect them?
if that’s why you got it
• Will the subject be aware their personal information
You can disclose information for a particular purpose if will be disclosed for this purpose?
that’s one of the purposes you originally collected it for.
• Would other disclosures also be contemplated from
However, if you’re being asked to disclose for a different
time to time?
purpose, check that you have a good reason and legal
authority to do so. • How will information be exchanged, and what security
measures will ensure it’s transferred safely?
Nobody can use principle 11 to force you to disclose
• If information matching may be required, what
information. Only other statutes or court orders (such
databases would be involved?
as warrants) can make you give information to anybody
other than the individual whose information it is. However, • What information will be retained in the system once
principle 11 allows you to disclose information to other it’s transferred?
organisations if one of the exceptions applies. Common risk examples (Disclosure)
The exceptions include: • Incorrect or inaccurate information is shared with
• where you need to disclose information to an other agencies
appropriate authority to protect someone (for instance • Non-compliance with statutory or contractual
a child who may be at risk) obligations or implied confidentiality undertakings
• where the individual concerned has authorised you results in breach of trust
to disclose the information to someone else (or you’re • De-identification of personal information before
disclosing it to them) disclosure doesn’t prevent re-identification
• where the original source of the information is already • Information with negative connotations is shared
publicly available with another party leading to embarrassment, stigma,
• where it is for statistical or research purposes and the or damage to a person’s reputation
individual concerned won’t be identified • Risk aversion means you don’t share information
• where disclosing the information is necessary to that you should be sharing, for instance to protect
enforce the law or for court proceedings, or to protect someone’s safety
public revenue. • Concerns over personal safety arise if sensitive
information about a person’s activities or whereabouts
However, as with the use of information (principle 10),
could fall into the wrong hands
these exceptions should be applied on a case-by-case
basis and shouldn’t be used to justify bulk or regular • Secondary disclosure is not necessary or
information-sharing. legally justifiable
• Individuals don’t have an opportunity to question the
manner in which data received from another agency
has been processed to arrive at an adverse decision
• People are unaware of, or have failed to opt out
of a voluntary secondary disclosure
• Information is disclosed for a use not directly related
to the primary purpose of collection
• Individuals may be surprised or upset by an
unanticipated disclosure for secondary use.
An agency shall not assign a unique identifier • Unrelated information about an individual can be linked
by association through the use of another agency’s
to an individual unless the assignment of that
unique identifier
identifier is necessary to enable the agency to
carry out any 1 or more of its functions efficiently. • Use of the same unique identifier by different agencies
Where a unique identifier is to be assigned it must creates a de-facto universal unique identifier.
comply with specific conditions. Possible mitigations to enhance privacy
(Unique identifiers)
• Only collect a unique identifier provided by another
What Principle 12 means in practice organisation if you have specific legal authority to
collect it and you need a record of the number to
Be unique – don’t use other agencies’ personal identifiers
perform your functions
A unique identifier (usually a number) is a record assigned
• Check that the unique identifier has been designed
by an organisation to uniquely identify an individual in
with your intended purposes in mind – is it fit for the
their interactions with the organisation. You should only
purpose to which you’re putting it?
assign unique identifiers where this is expressly permitted
and necessary for you to carry out your functions efficiently. • If you need to verify eligibility by using identifiers issued
You should not use unique identifiers that have been by another organisation, note that the identification has
developed by another organisation, or for another purpose, been sighted but do not assign the number to the
unless there is an explicit authority to do this and it’s individual for your own use
necessary for the purpose of your project. • Ensure that your records-management systems
are not designed to use unique identifiers issued
Limiting the use of unique identifiers reduces the risk that
by another organisation as the primary means of
a universal identifier will be established that could be used
identifying the individual (for example, as part of
to link a wide range of information about an individual
an a matching algorithm)
without their knowledge or control. It also decreases the
risk of identity fraud. • Use agency-specific unique identifiers when working
across different business units within an organisation
to minimise the use of identifying personal information
• Minimise the amount of human-readable or attributable
Key questions to ask (Unique identifiers) information by use of unique identifiers and other
identification methods such as bar codes
• How will individuals be identified? Will a unique number
or other identification device be used? • If using another agency’s unique identifier to match
data, use it as an attribute, not as your primary identifier
• Could the method of identifying individuals result
for your organisation’s processes.
in more than one person being assigned the same
information (for example, through information on
identities being inappropriately merged)?
• Are you using the same unique identifier as another
organisation, such as a tax number, or student number?
If so, where is your authority to do so?
• Will any identifying number create a unique record
across the population that could be used to link
other unrelated personal information to expand
an individual’s visible profile?