DATA PROTECTION IMPACT ASSESSMENT (DPIA)
(State overlay: MN)
1. Project Overview
- Project name/ID: [name]; owner: [business owner]; sponsor: [executive].
- Purpose and objectives: [describe].
- Timeline and launch date: [dates].
2. Scope of Processing
- Data subjects: [customers/employees/vendors/end users].
- Personal data categories: [contact, IDs, financial, location, biometric, health, minors].
- Sensitive data (MCDPA): ☐ Racial/ethnic origin; ☐ Religious beliefs; ☐ Mental/physical health diagnosis; ☐ Sexual orientation; ☐ Citizenship/immigration; ☐ Genetic/biometric; ☐ Child (under 13); ☐ Precise geolocation. Opt-in consent required.
- Volume and retention: [records/year], [retention schedule and deletion triggers].
- Processing activities: [collection, storage, analysis, sharing/sale status]. "Sale" = exchange for monetary/other consideration; "Targeted advertising" = ads based on cross-site activities; "Profiling" = automated processing for decisions.
3. Legal Basis, Notices, and Rights
- Primary law: Minnesota Consumer Data Privacy Act (MCDPA), effective July 31, 2025.
- Thresholds: 100,000+ MN consumers (excl. payment-only) OR 25,000+ + >25% revenue from sale. NO revenue minimum. Small business exempt (SBA definition), BUT liable if selling sensitive data without consent.
- Exemptions: GLBA (data-level), HIPAA (data-level). NO entity exemptions for nonprofits.
- Rights: Confirm/access, correct, delete, portability, opt-out of sale/targeted ads/profiling, question profiling decisions (unique right). Response: 45 days + 45-day extension.
- 2026: 30-day cure ends Jan 31, 2026. After Feb 1, 2026, enforcement without notice. Higher ed institutions (Office of Higher Education) have until July 31, 2029.
- DPA: Required for targeted ads, sales, profiling, sensitive data, or heightened risk processing.
- Processor contracts: Instructions, data type, duration, obligations, deletion/return, consumer rights assistance.
4. Data Flow and Transfers
- Source systems: [list]; storage/hosting locations: [cloud region/data centers].
- Cross-border transfers: [EU/UK/other]; transfer tool: [SCCs/IDTA/CBPR if applicable].
- Recipients/vendors: [processors/subprocessors/controllers]; due diligence status and DPAs in place.
- Access controls: RBAC groups, least privilege, joiner/mover/leaver process.
5. Security and Controls
- Technical controls: encryption in transit/at rest [specify], key management, network segmentation, endpoint protections, logging/monitoring, DLP, backups, vulnerability management.
- Organizational controls: policies, training cadence, vendor due diligence, incident response playbook, change management.
- Authentication/authorization: [MFA/SAML/SSO]; session timeouts; privileged access reviews cadence.
6. Risks and Impact Assessment
- Risks/threats: [unauthorized access, data minimization failure, purpose creep, profiling risk, transfer risk, children/minors risk].
- Likelihood: [low/medium/high]; Impact: [low/medium/high]; Risk rating matrix: [insert].
- POWR/State-specific equal employment or anti-discrimination considerations (if applicable): [insert].
7. Mitigations and Residual Risk
- Planned mitigations: [controls, timelines, owners].
- Testing/validation: [pen test, DPIA/ROPA updates, privacy-by-design checklist].
- Residual risk after mitigations: [rating]; decision: [accept/mitigate further/block].
8. Incident Response and Breach Notification
- Statute: Minn. Stat. § 325E.61 (private entities); § 13.055 (government entities). Effective 2005; amended 2014, 2018.
- Timeline: Most expedient time possible without unreasonable delay. If 500+ residents, notify consumer reporting agencies within 48 hours of consumer notice. Private right of action exists.
- Triggers: Unauthorized acquisition compromising security/confidentiality/integrity. PI = first name/initial + last name + (SSN, DL, financial account, health insurance number).
- Exception: Good-faith acquisition by employee/agent for entity purposes (not further disclosed). Law enforcement delay permitted.
- Content: Timing, distribution, and content required for CRA notice.
- Coordination with other states/GLBA/HIPAA requirements if multi-state: [plan].
9. State Overlay Checklist (MN)
- Applicability: 100,000+ consumers (excl. payment-only) OR 25,000+ + >25% sale revenue. NO revenue minimum. Small business exempt (SBA), BUT liable if selling sensitive data. Exemptions: GLBA/HIPAA data-level; NO nonprofit exemption.
- Sensitive data: 8 categories with opt-in: racial/ethnic origin, religious beliefs, health diagnosis, sexual orientation, citizenship/immigration, genetic/biometric, child (under 13), precise geolocation.
- Consumer rights: Confirm/access, correct, delete, portability, opt-out, question profiling decisions (unique right - understand reasoning and different outcomes). Response: 45 days + extension.
- Opt-out: Sale, targeted advertising, profiling.
- Processor contracts: Instructions, data type, duration, obligations, deletion/return, consumer rights assistance.
- DPA triggers: Required for targeted ads, sales, profiling, sensitive data, or heightened risk processing.
- Security: Reasonable administrative, technical, physical safeguards.
- Breach notice: Most expedient time. If 500+, notify CRAs within 48 hours of consumer notice. Private right of action.
- Children: Under 13 data is sensitive requiring opt-in. COPPA compliance.
- Non-discrimination: Cannot deny services, charge different prices, or provide different quality for exercising rights.
- Recordkeeping: 30-day cure ends Jan 31, 2026. After Feb 1, 2026, enforcement without notice. Higher ed until July 31, 2029. AG exclusive enforcement. Penalties up to $7,500 per violation. No private action under MCDPA (but private action for breach).
10. Approvals and Accountability
- Privacy lead/DPO review: [name/date].
- Security review: [name/date].
- Legal review (state law overlay): [name/date].
- Business owner certification: [name/date].
- Executive approver: [name/title/date].
11. Attachments
- Data flow diagrams/architecture.
- Records of processing activities entry.
- Vendor list and DPAs/SCCs.
- Legitimate interests assessment or risk assessment (if applicable).
- Testing summaries and pen test reports (if applicable).
- State-specific notices/links and breach templates.