LightBeam Documentation
Installer GuidesData SourcesPlaybooksInsightsPrivacyOpsGovernance
  • 💡What is LightBeam?
  • 🚀Getting Started
    • ⚙️Installer Guides
      • Pre-Requisites / Security Configurations
        • Firewall Requirements
        • Securing LightBeam on EKS with AWS Certificate Manager on Elastic Load Balancer
        • Configure HTTPS for LightBeam Endpoint FQDN Standalone deployment
        • Using Custom Certificates with LightBeam
        • Securing LightBeam on GKE with Google Certificate Manager and GCE Ingress
      • Core
        • LightBeam Deployment Instructions
        • LightBeam Installer
        • Web App Deployment
        • LightBeam Diagnostics
        • LightBeam Cluster Backup & Restore using Velero
      • Platform Specific
        • AWS
        • Microsoft Azure
        • Google Cloud (GKE)
        • Standalone Virtual Machine
        • Deployment on an Existing Managed Kubernetes Cluster
        • Azure Marketplace Deployment
      • Integration and Setup
        • Setting Up AWS PrivateLink for RDS-EKS Interaction
        • Twingate and LightBeam Integration Guide
        • Data Subject Request Web Application Server
        • Generate CSR for LightBeam
  • 🧠Core Features
    • 🔦Spectra AI
      • 🔗Data Sources
        • Cloud Platforms
          • AWS Auto Discovery
          • GCP Auto Discovery
        • Databases and Datalakes
          • PostgreSQL
          • Aurora (PostgreSQL)
          • Snowflake
          • MS SQL
          • MySQL
          • Aurora (MySQL)
          • BigQuery
          • AWS Redshift
          • Oracle
          • DynamoDB
          • MongoDB
          • CosmosDB (PostgreSQL)
          • CosmosDB (MongoDB)
          • CosmosDB (NoSQL)
          • Looker
          • AWS Glue
          • Databricks
          • SAP HANA
          • CSV Files as a Datasource
        • Messaging
          • Gmail
          • Slack
          • MS Teams
          • MS Outlook
        • Developer Tools
          • Zendesk
          • ServiceNow
          • Jira
          • GitHub
          • Confluence
        • File Repositories
          • NetDocuments
          • AWS S3
          • Azure Blob
          • Google Drive
          • OneDrive
          • SharePoint
          • Viva Engage
          • Dropbox
          • Box
          • SMB
        • CRM
          • Hubspot
          • Salesforce
          • Automated Data Processing (ADP)
          • Marketo
          • Iterable
          • MS Dynamics 365 Sales
          • Salesforce Marketing Cloud
      • 🔔PlayBooks
        • What is LightBeam Playbooks?
        • Policy and Alerts
          • Types of Policies
          • How to create a rule set
            • File Extension Filter
          • Configuring Retention Policies
          • Viewing Alerts
          • Sub Alerts
            • Reassigning Sub-Alerts
            • Sub-alert States
          • Levels of Actions on Alerts
          • User Roles and Permissions
            • Admin View
            • Alert Owner View
            • Onboarding New Users
              • User Management
              • Okta Integration
              • Alert Assignment Settings
              • Email Notifications
            • Planned Enhancements
          • Audit Logs
          • No Scan List
          • Permit List
          • Policy in read-only mode
      • 📊Insights
        • Entity Workflow
        • Document Classification
        • Attribute Management Overview
          • Attributes Page View
          • Attribute Sets
          • Creating Custom Attribute
          • Attributes List
        • Template Builder
        • Label Management
          • MIP Integration
          • Google Labels Integration
      • 🗃️Reporting
        • Delta Reporting
        • Executive Report
        • LightBeam Lens
      • Scanning and Redaction of Files
        • On-demand scanning
      • How-to Guides
        • Leveraging LightBeam insights for structured data sources
      • LightBeam Dashboard Outlay
      • Risk Score
    • 🏛️PrivacyOps
      • Data Subject Request (DSR)
        • What is DSR?
        • Accessing the DSR Module
        • DSR Form Builder (DPO View)
          • Creating a New DSR Form
            • Using a Predefined Template
            • Creating a Custom Form
          • Form Configuration
          • Form Preview and Publishing
          • Multi-Form Management
          • Messaging Templates
        • Form Submission & Email Verification (Data Subject View)
        • DSR Management Dashboard (DPO View)
        • Processing DSR Requests
          • Data Protection Officer (DPO) Workflow
          • Self Service Workflow (Direct Validation)
          • Data Source Owner (DSO) Workflow
        • DSR Report
      • 🚧Consent Management
        • Overview
        • Consent Logs
        • Preference Centre
        • Settings
      • 🍪Cookie Consent
        • Dashboard
        • Banners
        • Domains
        • Settings
        • CMP Deployment Guide for Google Tag Manager
        • FAQs
      • 🔏Privacy Impact Assessment (PIA)
        • PIA Templates
        • PIA Assessment Workflow
        • Collaborator View
        • Process Owner Login View (With Collaborator)
        • Filling questionnaire without collaborator
        • Submitting the assessment for DPO review
        • DPO review process
        • Marking the assessment as reviewed
        • Editing and resubmitting assessments after DPO review
        • Revoke review request
        • Edit Reviewer
        • PIA Reports
      • ⏺️Records of Processing Activity (RoPA)
        • Creating a RoPA Template
          • How to clone a template
          • How to use a template
        • How to create a process
          • Adding Process Details
          • Adding Data Elements
          • Adding Data Subjects
          • Adding Data Retention
          • Adding Safeguards
          • Adding Transfers
          • Adding a Custom Section
          • Setting a Review Schedule
          • Data Flow Diagram
        • How to add a collaborator
        • Overview Section
        • Generating a RoPA Report Using LightBeam
        • Collaborator working on a ticket
    • 🛡️Governance
      • Access
        • Dashboard
        • Users
        • Groups
        • Objects
        • Active Directory Settings
        • Access Governance at a Data Source Level
        • Policies and Alerting
        • Access Governance Statistics
        • Governance Module Dashboard
      • Privacy At Partners
  • 📊Tools & Resources
    • 🔀API Documentation
      • API to Create Reports for Structured Datasource
    • ❓Onboarding Assessments
      • Structured Datasource Onboarding Questionnaire
        • MongoDB/CosmosDB Questionnaire
        • Oracle Datasource Questionnaire
      • SMB Questionnaire
    • 🛠️Administration
      • Audit Logs
      • SMTP
        • Basic and oAuth Configuration
      • User Management
        • SAML Identity Providers
          • Okta
            • LightBeam Okta SAML Configuration Guide
          • Azure
            • Azure AD SAML Configuration for LightBeam
          • Google
            • Google IDP
        • Local User Management
          • Adding a User to the LightBeam Dashboard
          • Reset Default Admin Password
  • 📚Support & Reference
    • 📅Release Notes
      • LightBeam v2.2.0
      • Reporting Release Notes
      • Q1 2024 Key Enhancements
      • Q2 2024 Key Enhancements
      • Q3 2024 Key Enhancements
      • Q4 2024 Key Enhancements
    • 📖Glossary
Powered by GitBook
On this page
  1. Core Features
  2. PrivacyOps
  3. Privacy Impact Assessment (PIA)

Submitting the assessment for DPO review

PreviousFilling questionnaire without collaboratorNextDPO review process

Last updated 10 months ago

  • The process owner submits the completed assessment for Data Protection Officer (DPO) review.

  • Once you've completed all sections:

    • Review your answers for completeness and accuracy.

    • Scroll to the bottom of the assessment.

    • Locate the "Proceed to Risk Review" button.

  • Clicking this button will send the assessment to the designated Data Protection Officer (DPO) for review.

  • The assessment status will change to "Review Pending".

Risk Assessment Review

  • After clicking "Proceed to Risk Review", you'll be taken to a summary page of all risk assessments.

  • This page displays:

  • Individual Risks:

    • A breakdown of risk levels for each section (Process Details, Data Elements, Data Subjects, etc.).

    • You can click on the section name to adjust the risk evaluation if necessary.

  • Overall Risks:

  • This section provides a high-level summary of the entire assessment's risk profile.

It includes:

  • Select Overall Risk:

    • An overall risk level for the entire assessment (e.g., High, Medium, Low) in the form of an editable line graph.

    • To increase or reduce the Overall Risk, the user can click on any risk-level point to increase or decrease the length of the line.

  • Overall Likeliness of Occurrence:

    • This is represented by another editable line graph.

    • It allows you to indicate how likely it is for the identified risks to actually occur.

    • Similar to the Overall Risk graph, you can click on any risk-level point to increase or decrease the length of the line.

Note: When evaluating the likeliness of occurrence, consider the following key elements:

  1. Type of Data:

    • Sensitive personal data (e.g., health information, financial records, biometric data) generally carries a higher likelihood of risk if compromised.

    • Consider the volume and sensitivity of the personal data being processed.

  2. Method of Data Processing:

    • Automated processing, especially those involving profiling or decision-making, may increase risk likelihood.

    • Complex processing operations involving multiple stages or parties could elevate risk probability.

  3. Data Storage Location:

    • Cloud storage vs. on-premises solutions may affect risk likelihood differently.

    • Geographic location of data storage, especially if outside your jurisdiction, can impact risk probability.

  4. Security Measures:

    • The robustness of your encryption, access controls, and other security protocols influences risk likelihood.

    • Regular security audits and updates may lower the probability of risks occurring.

  5. Data Transfers:

    • Frequent transfers of data, especially across borders, may increase the likelihood of privacy risks.

    • The security measures of third parties involved in data processing affect risk probability.

  6. Staff Training and Awareness:

    • The level of privacy awareness and training among staff handling the data impacts risk likelihood.

    • Clear policies and procedures for data handling can mitigate risk probability.

  7. Historical Incidents:

    • Past privacy breaches or near-misses in similar processing activities may indicate a higher likelihood of future risks.

  • View the Key risk indicators or areas of concern highlighted for quick reference.

  • Once you're satisfied with your risk assessment review, locate the "Submit for Review" button at the bottom of the page.

  • In the pop-up window, enter the details:

    • Data Protection Officer(DPO) or Reviewer

    • Email body

    • Due Date

  • Click on Submit to finalize your assessment and risk evaluation, sending it to the Data Protection Officer for review.

Once the assessment is submitted, the Review Status will be updated to Review Pending from Not Submitted.

This is one complete cycle of filling out and submitting of assessment. The same assessment can be modified and the Process Owner can get it reviewed multiple times.

🧠
🏛️
🔏