Data Protection Impact Assessment
Specification
Conduct a Data Protection Impact Assessment (DPIA) to evaluate the origin, nature, particularity and severity of the risks upon the processing of personal data, according to any applicable laws, regulations and industry best practices.
Threat coverage
Architectural relevance
Lifecycle
Data collection, Data curation, Team and expertise
Design, Guardrails
Evaluation, Validation/Red Teaming
Orchestration, AI Services supply chain
Operations, Maintenance, Continuous monitoring
Data deletion, Archiving
Ownership / SSRM
PI
Owned by the Customer (AIC)
The Customer (AIC) is responsible and accountable for the design, development, implementation, and enforcement of the control to mitigate security, privacy, or compliance risks associated with Large Language Model (LLM)/GenAI technologies services or products they consume.
Model
Owned by the Customer (AIC)
The Customer (AIC) is responsible and accountable for the design, development, implementation, and enforcement of the control to mitigate security, privacy, or compliance risks associated with Large Language Model (LLM)/GenAI technologies services or products they consume.
Orchestrated
Owned by the Customer (AIC)
The Customer (AIC) is responsible and accountable for the design, development, implementation, and enforcement of the control to mitigate security, privacy, or compliance risks associated with Large Language Model (LLM)/GenAI technologies services or products they consume.
Application
Owned by the Customer (AIC)
The Customer (AIC) is responsible and accountable for the design, development, implementation, and enforcement of the control to mitigate security, privacy, or compliance risks associated with Large Language Model (LLM)/GenAI technologies services or products they consume.
Implementation guidelines
Auditing guidelines
1. Examine procedures related to DPIA risk assessment and determine whether, once a requirement has been established, the CSP identifies and grades the associated risks, reports, and prioritizes the remediation of risks and non-compliance activities. 2. Examine whether the DPIA process and templates align with the CSP’s risk methodology and taxonomy. 3. Determine if the risks' origin, nature, particularity, and severity are evaluated according to the applicable laws, regulations, and industry best practices for the CSP. 4. Establish whether the CSP has documented the roles and responsibilities for this process. 5. Select a sample of DPIAs and examine evidence to confirm that each assessment was performed to identify associated risks. Further, verify that any action plans were determined and carried out appropriately. Confirm that all relevant evidence was formally documented. 6. Verify that AI systems used in PII processing are included in the DPIA evaluation process. 7. Verify identification and assessment of risks specific to AI systems, such as bias, transparency, and accountability. 8. Verify that the DPIA includes evaluating profiling based on AI systems' data. 9. Verify that records inform the DPIA process for AI systems and are kept up-to-date. 10. Determine if the DPIA includes third-party providers and how identified risks are remediated. 11. Verify that the CSP has procedures to provide information regarding data storage locations, cross-border data flows, and infrastructure security controls when requested by customers conducting DPIAs. 3. Assess if the CSP offers documentation on technical measures implemented at the infrastructure level to support customers' DPIA requirements. 4. Review whether the CSP has a process to notify customers of significant infrastructure changes that might affect existing DPIAs.
Standards mappings
42001: A.2.3 Alignment with other organizational policies 42001: A.5.2 AI system impact assessment process 42001: A.5.3 Documentation of AI system impact assessments 42001: A.5.4 Assessing AI system impact on individuals or groups of individuals 42001: A.7.5 Data Provenance 27001: 6.1.1 General - Planning 27001: 8.2 - Information security risk assessment 27001: 8.3 - Information security risk treatment 27001: A.5.34 - Privacy and protection of personal identifiable information (PII) 27002: 5.34 - Privacy and protection of personal identifiable information (PII)
Addendum
N/A
Article 9 Article 27
Addendum
N/A
No Mapping
Addendum
Include need for performing a Data Protection Impact Assessment (DPIA).
BC-06
Addendum
N/A
AI-CAIQ questions (1)
Are Data Protection Impact Assessments (DPIAs) conducted to evaluate the origin, nature, particularity, and severity of the risks upon the processing of personal data, according to any applicable laws, regulations, and industry best practices?