Data Protection Impact Assessment (DPIA) (AL)

Ready to Edit

DATA PROTECTION IMPACT ASSESSMENT (DPIA)

(State overlay: AL)

1. Project Overview

  • Project name/ID: [name]; owner: [business owner]; sponsor: [executive].
  • Purpose and objectives: [describe].
  • Timeline and launch date: [dates].

2. Scope of Processing

  • Data subjects: [customers/employees/vendors/end users].
  • Personal data categories: [contact, IDs, financial, location, biometric, health, minors].
  • Sensitive data (state definition): [list per state law if applicable]; lawful basis/consent requirements: [insert].
  • Volume and retention: [records/year], [retention schedule and deletion triggers].
  • Processing activities: [collection, storage, analysis, sharing/sale/sharing status].

3. Legal Basis, Notices, and Rights

  • No comprehensive consumer privacy law. Alabama has breach notification statute only.
  • Applicability: Covered entities that own/license/maintain computerized data with PI of AL residents.
  • Consumer rights: No state-mandated access, correction, deletion, or opt-out rights (apply federal laws: GDPR, COPPA, GLBA, HIPAA if applicable).
  • Primary compliance obligation: Breach notification under Ala. Code § 8-38.
  • Security standard: Reasonable security measures to protect PI (industry best practices).

4. Data Flow and Transfers

  • Source systems: [list]; storage/hosting locations: [cloud region/data centers].
  • Cross-border transfers: [EU/UK/other]; transfer tool: [SCCs/IDTA/CBPR if applicable].
  • Recipients/vendors: [processors/subprocessors/controllers]; due diligence status and DPAs in place.
  • Access controls: RBAC groups, least privilege, joiner/mover/leaver process.

5. Security and Controls

  • Technical controls: encryption in transit/at rest [specify], key management, network segmentation, endpoint protections, logging/monitoring, DLP, backups, vulnerability management.
  • Organizational controls: policies, training cadence, vendor due diligence, incident response playbook, change management.
  • Authentication/authorization: [MFA/SAML/SSO]; session timeouts; privileged access reviews cadence.

6. Risks and Impact Assessment

  • Risks/threats: [unauthorized access, data minimization failure, purpose creep, profiling risk, transfer risk, children/minors risk].
  • Likelihood: [low/medium/high]; Impact: [low/medium/high]; Risk rating matrix: [insert].
  • POWR/State-specific equal employment or anti-discrimination considerations (if applicable): [insert].

7. Mitigations and Residual Risk

  • Planned mitigations: [controls, timelines, owners].
  • Testing/validation: [pen test, DPIA/ROPA updates, privacy-by-design checklist].
  • Residual risk after mitigations: [rating]; decision: [accept/mitigate further/block].

8. Incident Response and Breach Notification

  • Statute: Ala. Code § 8-38 (Data Breach Notification Act of 2018); effective June 1, 2018; signed March 28, 2018.
  • Timeline: 45 days max after discovery or receipt of notice from third-party agent. Third-party agents: 10 days to notify covered entity. Most expeditious time without unreasonable delay.
  • AG notice: If 1,000+ residents, notify AL AG within 45 days (no later than 45 days after notification or close of investigation).
  • CRA notice: If 1,000+ residents, notify major CRAs without unreasonable delay (timing, distribution, content).
  • Triggers: Breach of security involving PI. PI = first name/initial + last name + (SSN, DL, financial account, health info).
  • Exception: Law enforcement delay permitted (written request). Document for 5 years.
  • No private right of action. AG exclusive enforcement. Unlawful trade practice under Deceptive Trade Practices Act.
  • Coordination with other states/GLBA/HIPAA requirements if multi-state: [plan].

9. State Overlay Checklist (AL) - Breach Notification Only

  • No comprehensive privacy law. Breach notification statute only (Ala. Code § 8-38).
  • Applicability: Covered entities that own/license/maintain computerized data with PI of AL residents.
  • Sensitive data/Consumer rights: No state-specific definitions or mandated rights. Apply federal laws (GDPR, COPPA, GLBA, HIPAA) as applicable.
  • Security: Reasonable security measures to protect PI (industry best practices).
  • Breach notice: 45 days max. Third-party agents: 10 days. If 1,000+, notify AG + CRAs. Document for 5 years.
  • No private action. AG exclusive enforcement. Unlawful trade practice under Deceptive Trade Practices Act.
  • Recordkeeping: 5-year retention of written determination.
  • Children: COPPA compliance for children under 13.
  • DPA/ROPA: Not required by state law (apply GDPR/industry standards if applicable).

10. Approvals and Accountability

  • Privacy lead/DPO review: [name/date].
  • Security review: [name/date].
  • Legal review (state law overlay): [name/date].
  • Business owner certification: [name/date].
  • Executive approver: [name/title/date].

11. Attachments

  • Data flow diagrams/architecture.
  • Records of processing activities entry.
  • Vendor list and DPAs/SCCs.
  • Legitimate interests assessment or risk assessment (if applicable).
  • Testing summaries and pen test reports (if applicable).
  • State-specific notices/links and breach templates.
Ezel AI
Hi! Need help customizing this document? I can tailor every section to your specific case in minutes.
AI Legal Assistant
Ezel AI
Hi! Need help customizing this document? I can tailor every section to your specific case in minutes.

Insert Image

Insert Table

Watch Ezel in action (sample case)

All changes saved
Save
Export
Export as DOCX
Export as PDF
Generating PDF...
data_protection_impact_assessment_al.pdf
Ready to export as PDF or Word
AI is editing...
Chat
Review

Customize this document with Ezel

  • Deep Legal Knowledge
    Understands case law, statutes, and legal doctrine specific to Alabama.
  • Court-Ready Formatting
    Proper captions, certificates of service, and local rule compliance.
  • AI-Powered Editing on Your Timeline
    Edit as many times as you need. Tailor every section to your specific case.
  • Export as PDF & Word
    Download your finished document in professional PDF or DOCX format, ready to file or send.
Secure checkout via Stripe
Need to customize this document?

About This Template

Compliance documents are what regulated businesses use to prove they follow the rules that apply to their industry, whether that is privacy, anti-money-laundering, consumer protection, or sector-specific requirements. Regulators look for consistent policies, up-to-date records, and clear evidence of employee training. The cost of getting compliance paperwork right is almost always smaller than the cost of an enforcement action, fine, or public disclosure.

Important Notice

This template is provided for informational purposes. It is not legal advice. We recommend having an attorney review any legal document before signing, especially for high-value or complex matters.

Last updated: February 2026