Our website uses cookies so we can analyse our site usage and give you the best experience. Click "Accept" if you’re happy with this, or click "More" for information about cookies on our site, how to opt out, and how to disable cookies altogether.
We respect your Do Not Track preference.
Privacy by Design is a methodology that includes privacy as a key requirement in the design of any new system, product, service, process, or initiative. This methodology also ensures a more meaningful risk management process, by requiring engagement with your organisation’s privacy function throughout the lifecycle of a project, rather than at a single point in the process when it may be too late.
Principles of the Privacy by Design methodology include:
Proactive not reactive, preventative not remedial
Privacy must be considered at the beginning of a project and throughout its lifecycle. Privacy considerations should help drive the design and prevent or mitigate privacy risks, rather than being tacked on at the end of the project design phase.
Privacy as the default
The default setting of any design should protect individual privacy, which means privacy protective settings should be the starting point. For example, minimising the collection of data to only what’s necessary to achieve your lawful purpose, and limiting the use of that data to the purpose it was collected for.
Privacy embedded into design
Privacy should be a foundational piece in the design of a product, system, process or initiative and should be so essential to the design that it won’t function if the privacy settings are changed or removed.
Full functionality
Privacy requirements should not be delivered at the expense of other core functionality. It shouldn’t be a trade-off. Privacy requirements should support and enable the delivery of other requirements.
End-to-end security
Data must be protected at every stage of the information lifecycle for a new product, system, or process. This includes the collection, storage, use, disclosure, and disposal of personal information.
Visibility and transparency
There should be visibility of the privacy risk assessments, design decisions, and privacy controls that have been established for the product, system, or process. This will increase trust in the project.
Respect for user privacy
If the product, system, or process will be used by people (such as customers) then those people and their experience should be central to design decisions.
Some of the things you’ll need to do to successfully embed a privacy by design approach are:
As outlined in the Governance pou, your organisation must clearly define roles and responsibilities, accountability and ownership, and escalation processes. The privacy function and the project team need to know:
If these aren’t clearly defined, there’s a risk that all responsibility and accountability will be placed on the privacy function alone. This isn’t an appropriate or sustainable approach.
Your privacy function needs to be involved at the right times in the project lifecycle. Most importantly, they need to be engaged early in the design stage of a project to make sure that privacy requirements can be properly considered and embedded into the product, system, or process from the start.
For projects with high privacy risks (for example, new biometrics, AI, or automated decision-making projects) your privacy function should attend design meetings and be part of early design conversations. They also need to be involved at critical stages of the project’s lifecycle, such as testing and launch. At the start of a project, the privacy advice can be general and theoretical, but at the later stages it should be more detailed and practical.
Your organisation’s leaders need to ensure your privacy function is capable and available to the project. Delays in providing privacy advice in time for important project decisions could result in the project team thinking it’s okay to bypass privacy requirements. This will increase risk. It’s important to note that the capability of your privacy function relies on adequate resourcing and allocation of priorities.
Over the course of a project, requirements may change. Deliverables may be updated according to changing project objectives or new design limitations, timeframes may be shortened or lengthened, or external factors may alter the project risks. Your privacy function will need timely updates on any changes to project deliverables to adapt their advice or risk assessments.
Your privacy team should help a project team to get privacy right by providing clear and practical guidance on how to put privacy principles into practice. Privacy training for key project team members could further enable positive privacy outcomes and provide important relationship building opportunities for your privacy function.
Privacy impact/risk assessments should consider the breadth of privacy issues raised by a project. They should include issues such as ethical considerations, indigenous and/or cultural privacy considerations, and the importance of data ownership and governance. This could include working with other subject matter experts, such as information security and data governance experts, and leveraging the capabilities of other internal teams.
Engagement with the privacy function, and any recommended privacy controls, should be targeted based on clearly defined thresholds and risks. For example, you may consider some initiatives higher risk if they will involve a large amount of personal information, use of a novel technology (e.g. biometrics), or if the risk of harm is high, should a privacy breach occur.
Privacy impact/risk assessments will inform your organisation of both risks and opportunities for a project. Generally, good privacy practices will assist rather than prevent the achievement of a project’s goals. Often a risk for privacy is also a risk in other areas of the project. It’s just as important for a privacy impact/risk assessment to identify and highlight privacy opportunities and improvements as it is to call out the risks.
Privacy advice should be communicated in a way that is meaningful and understandable to the target audience. Documents should be succinct and easy to understand, with risks and recommendations clearly outlined. Privacy messaging to operational staff should be practical and detailed, whereas privacy messaging to senior leaders may be more strategic and high-level.
Internal privacy impact/risk assessments and controls are important to ensure privacy is protected, but if they’re not visible to the people concerned, they do nothing to build trust and confidence in a product or process. Visibility could mean making privacy assessments public or, if this isn’t appropriate, making efforts to provide the public with assurances that privacy has been designed into the product or process, and how this has been achieved.
A privacy impact assessment (PIA), also known as a privacy risk assessment, is an essential part of many projects and proposals and can be used to help your organisation identify the potential risks arising from the collection, use, or handling of personal information, and to find out if you’re meeting your legal obligations.
PIAs focus on identifying the ways a new proposal or operating system, or changes to an existing process, may impact personal information. This helps organisations make more informed decisions and better manage privacy risks.
It’s important to decide whether to do a PIA early on in a project or new initiative. OPC’s brief privacy analysis template(external link) can help you assess whether a full PIA is appropriate. If you fail to identify how your project is likely to impact the individuals whose information you are collecting and using, there are real risks for your organisation and for the success of the project. In many projects, it may be that privacy advice is provided throughout the design phase and a PIA is done at a suitable stage further down the track.
A PIA is a practical analytical tool you can use to:
For full guidance on whether you should do a PIA, and step-by-step templates and tools on how to do one, check out our PIA toolkit.
Completing your privacy analysis using this guidance is part of ensuring you’ve undertaken a robust policy process and built privacy considerations into the design of the proposal.
As the independent privacy regulator in New Zealand, our Office cannot endorse or approve your privacy analysis. However, we may be able to provide you with advice and direction to support your analysis of privacy during your policy development process.
If the policy proposal progresses, we expect the team in charge of delivering or implementing the project will also complete a privacy impact assessment and cover all the Information Privacy Principles(external link) to ensure the project meets the legal obligations set out in the Privacy Act.
The high-level decisions about the proposal will likely have been made during the policy process, for example, what personal information is collected and for what purpose. Therefore, the privacy impact assessment for the implementation phase should have a greater focus on identifying and mitigating specific privacy risks associated with the project.
Doing a privacy impact assessment will also enable the team to work through important privacy decisions, like addressing how the information will be kept safe, how long to retain the information for, and how to ensure individuals can request access to their personal information.
We’ve included some use cases based on fictional organisations to demonstrate each of the pou in practice. Read more of the background on our Organisation Examples page.
Fern Leaf has an established privacy review process in place. As a large organisation it accepts that not every new initiative or change to a process can be reviewed in full by the privacy team. It has created a privacy threshold assessment which is based on key risk areas from its use of personal information. These have been built online and, depending on the answers, will indicate whether the business needs to conduct a fuller privacy impact assessment. Where they do need to, the business is asked several other questions which are then reviewed by the privacy team, who completes the PIA. At the end of the PIA, the privacy team set a date that the business should re-review the PIA by to ensure that it is kept accurate.
As Fern Leaf has been around for a long time, it accepts that there may be processes that have not had a privacy review or that have not had one conducted for a while. It uses the PIA to also identify key business processes that it should investigate, even if there isn’t a specific change to the use of personal information. This is good privacy practice. The privacy team also creates stats from the number of threshold assessments and PIAs completed, regularly reporting upwards.
Reach High has developed a simple PIA checklist to assess any changes to the way it handles personal information about its clients. The template runs through the information privacy principles and reminds staff to think about privacy when designing and implementing the changes. This is easy for Reach High to implement because of its size and the fact that the Director of Support Services must sign off any changes that impact on client information anyway.
As a small organisation with a minimal budget, Reach High relies heavily on service providers, and particularly on cloud-based software solutions, including document management systems and productivity applications. The Reach High PIA checklist includes questions about any new service providers, to ensure that the contracts contain the right assurances.
For larger projects, where Reach High may not have the privacy expertise to properly identify and assess all the privacy risks, it uses external privacy experts to complete a more in-depth PIA.
As a SaaS platform, Swiftstart NZ was aware from the outset that it would be important to document a PIA for the proposed platform. Swiftstart NZ considered this would be necessary, not just to ensure the platform was fully compliant with privacy requirements, but also because they anticipated this would be an important piece of collateral for demonstrating to potential clients that they had taken appropriate steps to consider privacy and address potential risks.
The founders of Swiftstart NZ worked with their software developers to complete an initial draft PIA document, based on the OPC template. Once they obtained seed funding, they passed the draft document to an external privacy consultant to review and prepare a finalised PIA document which would be suitable to be shared with clients on request.
Swiftstart NZ’s Operations Manager is conscious however that, while the platform fundamentals are unlikely to change significantly, the Swiftstart NZ software developers are continuously working on improvements – the founders keep having great ideas to improve functionality for clients! To make sure the PIA remains accurate, the Operations Manager decides to review it on a 6 monthly basis and provides all employees with an introduction to privacy by design concepts and the importance of assessing any new ideas for consistency against the existing PIA – and making any changes as necessary.