Our website uses cookies so we can analyse our site usage and give you the best experience. Click "Accept" if you’re happy with this, or click "More" for information about cookies on our site, how to opt out, and how to disable cookies altogether.
We respect your Do Not Track preference.
Monitoring your privacy programme is a key part of ensuring continuous improvement in your organisation’s privacy practices. Monitoring can provide you with a holistic picture of your programme and identify areas where training, culture, and processes may need to be improved.
Monitoring activities will look different in different organisations. However, we consider there are some ‘must-dos’ for all organisations.
These are:
Other monitoring activities may include:
Your monitoring activities should give you the data you need to be able to measure the effectiveness of your privacy programme over time. For example, keeping an incident log of breaches and near misses enables you to report on the number and types of incidents, and identify and analyse trends.
Collecting data is a useful way to communicate the current state of your organisation’s privacy practices and the effectiveness of your privacy programme over time. It’s also a useful tool to monitor compliance with certain privacy obligations, including the management of privacy requests.
The table below (attached as PDF) provides you with examples of useful ways to measure different aspects of your privacy programme, including what they might tell you, and things to look out for.
You will need to consider which measures will help you achieve your organisation’s privacy goals and outcomes. These should be based on the key objectives and actions you have committed to in your privacy management plan.
Note: If you’re a public sector organisation then you will be required to complete the Privacy Maturity Assessment Framework (PMAF) to measure, and report on, your privacy programme.
View the table of examples [PDF, 134 KB].
We’ve included some use cases based on fictional organisations to demonstrate each of the pou in practice. Read more of the background on our Organisation Examples page.
As a large business, Fern Leaf adopts a three line of defence model. This is a risk governance framework that splits responsibility for operational risk management across three areas. People in the first ‘line’ own and manage risk directly. The second line oversees the first line, setting policies, defining risk tolerances, and making sure they’re met.
The third line, consisting of internal audit, provides independent assurance of the first two lines. Privacy risks are part of Fern Leaf’s overall risk strategy. This greatly assists the workload of the privacy team as they can collaboratively work with the risk function to document what they decide to measure and how they will do so. Results of assurance reporting are regularly reported to Fern Leaf’s Board and incorporated into their risk strategy conversations.
Reach High has developed a Privacy Risk Register to capture all its privacy risks and events. The register is an excel spreadsheet with tabs for the following privacy-related activities or events:
The director of support services manages the register and reports on this to the CEO and other senior leaders monthly. As a small business, this approach is appropriate, and ensures that the CEO has oversight of key privacy metrics.
Given their size and limited resources, Swiftstart NZ decides to adopt a streamlined approach to privacy measurements. The operations manager produces quarterly documentation of key measurements to ensure Swiftstart NZ’s founders maintain visibility of its privacy practices without overwhelming their capacity.
Measurements include the number of reported incidents or breaches, response time to incidents, and effectiveness of remediation measures. Additionally, the operations manager confirms completion rates of staff privacy training. These minimal yet essential measurements not only demonstrate accountability but also enable Swiftstart NZ to efficiently report to clients if necessary, fostering trust and transparency in its operations.