Templates Compliance Regulatory New Jersey Data Protection Impact Assessment
Ready to Edit
New Jersey Data Protection Impact Assessment - Free Editor

NEW JERSEY DATA PROTECTION IMPACT ASSESSMENT (DPIA)

Prepared Pursuant to the New Jersey Data Privacy Act (NJDPA), N.J. Stat. § 56:8-166 et seq.


COVER PAGE

Field Details
Organization Name [________________________________]
Organization Address [________________________________]
Assessment Title [________________________________]
Assessment Reference Number DPIA-NJ-[____]-[________________________________]
Version Number [____]
Assessment Date [__/__/____]
Processing Activity Described [________________________________]
Business Unit / Department [________________________________]
Assessment Prepared By [________________________________]
Title / Role [________________________________]
Data Protection Officer (DPO) [________________________________]
Chief Information Security Officer [________________________________]
Legal Counsel Reviewer [________________________________]
Executive Approver [________________________________]
Approval Date [__/__/____]
Next Scheduled Review Date [__/__/____]

Document Classification

☐ Confidential — Attorney-Client Privileged
☐ Confidential — Internal Use Only
☐ Restricted Distribution
☐ Other: [________________________________]

NJDPA Privilege Note: Data protection assessments disclosed to the New Jersey Division of Consumer Affairs or the Attorney General's office are confidential and exempt from public inspection, copying, or disclosure. Disclosure does not constitute a waiver of attorney-client privilege or work-product protection that might otherwise apply.


EXECUTIVE SUMMARY

Overview of Processing Activity

[________________________________]

Provide a concise description of the data processing activity under assessment, including its business purpose, the categories of consumers affected, and the nature of personal data involved.

Overall Risk Level

☐ Low Risk — Processing activity presents minimal risk to consumer rights
☐ Moderate Risk — Processing activity presents some risk requiring standard mitigation
☐ High Risk — Processing activity presents heightened risk requiring enhanced safeguards
☐ Critical Risk — Processing activity presents severe risk; recommend cessation or fundamental redesign

Summary of Key Findings

[________________________________]

Recommendation

☐ Approve processing activity as described with current safeguards
☐ Approve processing activity subject to implementation of recommended mitigation measures
☐ Defer approval pending further analysis or consultation
☐ Do not approve — risks outweigh benefits

NJDPA DPIA Trigger Assessment

This DPIA is required because the processing activity involves one or more of the following heightened-risk activities under the NJDPA:

☐ Processing of personal data for purposes of targeted advertising
☐ Sale of personal data
☐ Processing of personal data for purposes of profiling, where profiling presents a reasonably foreseeable risk of:
☐ Unfair or deceptive treatment of, or unlawful disparate impact on, consumers
☐ Financial, physical, or reputational injury to consumers
☐ An intrusion upon the solitude or seclusion, or the private affairs or concerns, of consumers where such intrusion would be offensive to a reasonable person
☐ Processing of sensitive data
☐ Any other processing activity presenting a heightened risk of harm to consumers


SECTION 1: PROCESSING ACTIVITY DESCRIPTION

1.1 Nature of Processing

What personal data is being processed?

Data Category Description Example Data Elements
Contact Information [________________________________] [________________________________]
Identity Data [________________________________] [________________________________]
Financial Data [________________________________] [________________________________]
Location Data [________________________________] [________________________________]
Biometric Data [________________________________] [________________________________]
Health Data [________________________________] [________________________________]
Online Activity / Browsing Data [________________________________] [________________________________]
Employment Data [________________________________] [________________________________]
Education Data [________________________________] [________________________________]
Inferences and Profiles [________________________________] [________________________________]
Other [________________________________] [________________________________]

1.2 Whose Data Is Processed?

☐ New Jersey consumers (residents)
☐ Employees / job applicants
☐ Customers / clients
☐ Website visitors / app users
☐ Vendors / contractors
☐ Minors (under 13)
☐ Minors (13-17)
☐ Other: [________________________________]

Estimated number of NJ data subjects affected: [________________________________]

1.3 Purpose of Processing

Purpose Description Legal Justification
[________________________________] [________________________________] [________________________________]
[________________________________] [________________________________] [________________________________]
[________________________________] [________________________________] [________________________________]

1.4 How Is Data Processed?

☐ Collection (direct from consumer)
☐ Collection (from third-party sources)
☐ Storage (electronic)
☐ Storage (physical records)
☐ Organization / structuring
☐ Analysis / profiling
☐ Automated decision-making
☐ Targeted advertising
☐ Sale to third parties
☐ Sharing with service providers / processors
☐ Cross-border or interstate transfer
☐ Deletion / destruction
☐ Other: [________________________________]

1.5 Retention Period

Data Category Retention Period Justification Deletion Method
[________________________________] [________________________________] [________________________________] [________________________________]
[________________________________] [________________________________] [________________________________] [________________________________]

1.6 Data Storage Locations

System / Platform Location (State/Country) Cloud / On-Premise Encryption Status
[________________________________] [________________________________] [________________________________] [________________________________]
[________________________________] [________________________________] [________________________________] [________________________________]

SECTION 2: LEGAL BASIS AND NECESSITY

2.1 Lawful Basis for Processing Under NJDPA

The NJDPA requires controllers to limit the collection of personal data to what is adequate, relevant, and reasonably necessary in relation to the purposes for which such data is processed. The controller must provide a reasonably accessible, clear, and meaningful privacy notice.

Primary legal justification for this processing activity:

☐ Consumer consent (opt-in) — required for sensitive data
☐ Performance of a contract or provision of a requested product/service
☐ Compliance with federal or state legal obligation
☐ Legitimate business purpose within the reasonable expectations of the consumer
☐ Protection of vital interests
☐ Internal operations reasonably aligned with the consumer's expectations based on the consumer's existing relationship with the controller
☐ Other: [________________________________]

2.2 Purpose Limitation Assessment

  • Is processing limited to purposes disclosed in the privacy notice? ☐ Yes ☐ No
  • Are there secondary uses of the data not disclosed to consumers? ☐ Yes ☐ No
  • If secondary uses exist, have consumers been notified and/or consent obtained? ☐ Yes ☐ No ☐ N/A
  • Is processing compatible with the context in which data was originally collected? ☐ Yes ☐ No

2.3 Data Minimization Assessment

  • Is only the minimum necessary personal data collected? ☐ Yes ☐ No
  • Could the processing purpose be achieved with less data? ☐ Yes ☐ No
  • Could the processing purpose be achieved with de-identified data? ☐ Yes ☐ No
  • Could the processing purpose be achieved with aggregated data? ☐ Yes ☐ No
  • Has a formal data minimization review been conducted? ☐ Yes ☐ No

2.4 NJ-Specific Legal Requirements

NJDPA Applicability Thresholds:
- Does the organization control or process personal data of 100,000 or more NJ consumers (excluding data processed solely for completing payment transactions)? ☐ Yes ☐ No
- Does the organization control or process personal data of 25,000 or more NJ consumers AND derive revenue or receive a discount on the price of goods or services from the sale of personal data? ☐ Yes ☐ No
- Note: There is no revenue minimum. The NJDPA applies to nonprofit organizations (unlike most other state privacy laws).

NJDPA Exemptions:
☐ Organization is exempt as a financial institution subject to GLBA (Title V) — exemption applies to activities, not the entity
☐ Organization is exempt as a covered entity or business associate under HIPAA — exemption applies to PHI only
☐ Organization is exempt as a government entity
☐ Data is exempt: data processed under FCRA, DPPA, FERPA, or Farm Credit Act
☐ Data is exempt: employment data processed in the employment context
☐ None — NJDPA applies in full

Important: The NJDPA does NOT exempt higher education institutions or nonprofits.


SECTION 3: DATA INVENTORY

3.1 Categories of Personal Data

Category Collected? Source Recipients Retention
Name / Contact Information ☐ Yes ☐ No [________________________________] [________________________________] [________________________________]
Government Identifiers (SSN, DL) ☐ Yes ☐ No [________________________________] [________________________________] [________________________________]
Financial / Payment Data ☐ Yes ☐ No [________________________________] [________________________________] [________________________________]
Precise Geolocation Data ☐ Yes ☐ No [________________________________] [________________________________] [________________________________]
Biometric Data ☐ Yes ☐ No [________________________________] [________________________________] [________________________________]
Health / Medical Data ☐ Yes ☐ No [________________________________] [________________________________] [________________________________]
Online Identifiers / Browsing Data ☐ Yes ☐ No [________________________________] [________________________________] [________________________________]
Inferences / Consumer Profiles ☐ Yes ☐ No [________________________________] [________________________________] [________________________________]

3.2 Sensitive Data Under NJDPA

The NJDPA defines the following categories of sensitive data requiring opt-in consent before processing:

Sensitive Data Category Processed? Consent Obtained? Method of Consent
Racial or ethnic origin ☐ Yes ☐ No ☐ Yes ☐ No ☐ N/A [________________________________]
Religious beliefs ☐ Yes ☐ No ☐ Yes ☐ No ☐ N/A [________________________________]
Mental or physical health condition or diagnosis ☐ Yes ☐ No ☐ Yes ☐ No ☐ N/A [________________________________]
Sexual orientation ☐ Yes ☐ No ☐ Yes ☐ No ☐ N/A [________________________________]
Citizenship or immigration status ☐ Yes ☐ No ☐ Yes ☐ No ☐ N/A [________________________________]
Genetic data ☐ Yes ☐ No ☐ Yes ☐ No ☐ N/A [________________________________]
Biometric data used for identification ☐ Yes ☐ No ☐ Yes ☐ No ☐ N/A [________________________________]
Personal data of a known child under age 13 ☐ Yes ☐ No ☐ Yes ☐ No ☐ N/A [________________________________]
Precise geolocation data ☐ Yes ☐ No ☐ Yes ☐ No ☐ N/A [________________________________]

3.3 Data Sources

Source Type Consent / Notice Provided?
[________________________________] ☐ Direct from consumer ☐ Third party ☐ Public source ☐ Yes ☐ No
[________________________________] ☐ Direct from consumer ☐ Third party ☐ Public source ☐ Yes ☐ No

3.4 Data Recipients and Sharing

Recipient Relationship Purpose DPA in Place?
[________________________________] ☐ Processor ☐ Controller ☐ Third Party [________________________________] ☐ Yes ☐ No
[________________________________] ☐ Processor ☐ Controller ☐ Third Party [________________________________] ☐ Yes ☐ No

3.5 Cross-Border and Interstate Transfers

Destination Transfer Mechanism Safeguards
[________________________________] [________________________________] [________________________________]

SECTION 4: STAKEHOLDER CONSULTATION

4.1 Data Subject Consultation

Consultation Method Date Summary of Input Changes Made
[________________________________] [__/__/____] [________________________________] [________________________________]
  • Were consumers or their representatives consulted? ☐ Yes ☐ No
  • If no, explain why consultation was not feasible: [________________________________]

4.2 Data Protection Officer (DPO) Input

DPO Name Date Consulted Recommendations
[________________________________] [__/__/____] [________________________________]

4.3 Business Stakeholder Input

Stakeholder Name / Role Date Consulted Input Provided
[________________________________] [__/__/____] [________________________________]
[________________________________] [__/__/____] [________________________________]

4.4 Legal Counsel Review

Attorney Name Firm / In-House Date Reviewed Advice Summary
[________________________________] [________________________________] [__/__/____] [________________________________]

SECTION 5: NECESSITY AND PROPORTIONALITY

5.1 Necessity Assessment

The NJDPA requires that data protection assessments identify and weigh the benefits that may flow, directly and indirectly, from the processing to the controller, the consumer, other stakeholders, and the public against the potential risks to the rights of the consumer associated with such processing, as mitigated by safeguards the controller can employ.

Is the processing necessary for the stated purpose?
☐ Yes — processing is essential and cannot reasonably be achieved otherwise
☐ Partially — some aspects of processing could be reduced or eliminated
☐ No — less intrusive alternatives exist that would achieve the stated purpose

Explanation: [________________________________]

5.2 Less Intrusive Alternatives

Alternative Considered Why Rejected or Adopted Data Impact
[________________________________] [________________________________] [________________________________]
[________________________________] [________________________________] [________________________________]

5.3 Benefits vs. Risks Weighing

Benefits to Controller:
[________________________________]

Benefits to Consumer:
[________________________________]

Benefits to Other Stakeholders / Public:
[________________________________]

Risks to Consumer Rights:
[________________________________]

Safeguards Employed to Reduce Risks:
[________________________________]

5.4 Proportionality Factors

  • Use of de-identified data: ☐ Evaluated ☐ Not Evaluated
  • Reasonable expectations of consumers given context: ☐ Evaluated ☐ Not Evaluated
  • Relationship between controller and consumer: ☐ Evaluated ☐ Not Evaluated
  • Whether processing involves minors: ☐ Evaluated ☐ Not Evaluated
  • Whether processing involves sensitive data: ☐ Evaluated ☐ Not Evaluated

SECTION 6: RISK ASSESSMENT

6.1 Risk Likelihood and Severity Matrix

Likelihood / Severity Negligible Limited Significant Severe
Remote Low Low Moderate Moderate
Unlikely Low Moderate Moderate High
Possible Moderate Moderate High High
Likely Moderate High High Critical
Almost Certain High High Critical Critical

6.2 Identified Risks to Data Subjects

Risk ID Risk Description Likelihood Severity Risk Score Affected Rights
R-001 Unauthorized access to personal data ☐ Remote ☐ Unlikely ☐ Possible ☐ Likely ☐ Almost Certain ☐ Negligible ☐ Limited ☐ Significant ☐ Severe [____] Confidentiality
R-002 Unfair or deceptive treatment through profiling ☐ Remote ☐ Unlikely ☐ Possible ☐ Likely ☐ Almost Certain ☐ Negligible ☐ Limited ☐ Significant ☐ Severe [____] Non-discrimination
R-003 Unlawful disparate impact on consumers ☐ Remote ☐ Unlikely ☐ Possible ☐ Likely ☐ Almost Certain ☐ Negligible ☐ Limited ☐ Significant ☐ Severe [____] Equal treatment
R-004 Financial injury to consumers ☐ Remote ☐ Unlikely ☐ Possible ☐ Likely ☐ Almost Certain ☐ Negligible ☐ Limited ☐ Significant ☐ Severe [____] Financial security
R-005 Physical injury to consumers ☐ Remote ☐ Unlikely ☐ Possible ☐ Likely ☐ Almost Certain ☐ Negligible ☐ Limited ☐ Significant ☐ Severe [____] Physical safety
R-006 Reputational harm to consumers ☐ Remote ☐ Unlikely ☐ Possible ☐ Likely ☐ Almost Certain ☐ Negligible ☐ Limited ☐ Significant ☐ Severe [____] Reputation / dignity
R-007 Intrusion upon solitude or seclusion ☐ Remote ☐ Unlikely ☐ Possible ☐ Likely ☐ Almost Certain ☐ Negligible ☐ Limited ☐ Significant ☐ Severe [____] Privacy / seclusion
R-008 Loss of confidentiality of sensitive data ☐ Remote ☐ Unlikely ☐ Possible ☐ Likely ☐ Almost Certain ☐ Negligible ☐ Limited ☐ Significant ☐ Severe [____] Sensitive data privacy
R-009 Re-identification of de-identified data ☐ Remote ☐ Unlikely ☐ Possible ☐ Likely ☐ Almost Certain ☐ Negligible ☐ Limited ☐ Significant ☐ Severe [____] Anonymity
R-010 [________________________________] ☐ Remote ☐ Unlikely ☐ Possible ☐ Likely ☐ Almost Certain ☐ Negligible ☐ Limited ☐ Significant ☐ Severe [____] [________________________________]

6.3 Overall Risk Rating

☐ Low ☐ Moderate ☐ High ☐ Critical

Justification: [________________________________]


SECTION 7: RISK MITIGATION MEASURES

7.1 Technical Measures

Measure Status Owner Target Date
Encryption at rest (AES-256 or equivalent) ☐ Implemented ☐ Planned ☐ N/A [________________________________] [__/__/____]
Encryption in transit (TLS 1.2+) ☐ Implemented ☐ Planned ☐ N/A [________________________________] [__/__/____]
Role-based access controls (RBAC) ☐ Implemented ☐ Planned ☐ N/A [________________________________] [__/__/____]
Multi-factor authentication (MFA) ☐ Implemented ☐ Planned ☐ N/A [________________________________] [__/__/____]
Pseudonymization / tokenization ☐ Implemented ☐ Planned ☐ N/A [________________________________] [__/__/____]
Audit logging and monitoring ☐ Implemented ☐ Planned ☐ N/A [________________________________] [__/__/____]
Data loss prevention (DLP) ☐ Implemented ☐ Planned ☐ N/A [________________________________] [__/__/____]
Network segmentation / firewall ☐ Implemented ☐ Planned ☐ N/A [________________________________] [__/__/____]
Vulnerability scanning / penetration testing ☐ Implemented ☐ Planned ☐ N/A [________________________________] [__/__/____]
Automated data retention enforcement ☐ Implemented ☐ Planned ☐ N/A [________________________________] [__/__/____]
Intrusion detection / prevention systems ☐ Implemented ☐ Planned ☐ N/A [________________________________] [__/__/____]
Backup and disaster recovery ☐ Implemented ☐ Planned ☐ N/A [________________________________] [__/__/____]

7.2 Organizational Measures

Measure Status Owner Target Date
Privacy and data protection training ☐ Implemented ☐ Planned ☐ N/A [________________________________] [__/__/____]
Written information security policies ☐ Implemented ☐ Planned ☐ N/A [________________________________] [__/__/____]
Incident response plan (NJ-specific) ☐ Implemented ☐ Planned ☐ N/A [________________________________] [__/__/____]
Privacy-by-design and default practices ☐ Implemented ☐ Planned ☐ N/A [________________________________] [__/__/____]
Consumer rights request procedures ☐ Implemented ☐ Planned ☐ N/A [________________________________] [__/__/____]
Data mapping and inventory ☐ Implemented ☐ Planned ☐ N/A [________________________________] [__/__/____]
Periodic access reviews ☐ Implemented ☐ Planned ☐ N/A [________________________________] [__/__/____]
Background checks for privileged users ☐ Implemented ☐ Planned ☐ N/A [________________________________] [__/__/____]

7.3 Contractual Measures

Measure Status Owner Target Date
Data processing agreements (DPAs) ☐ Implemented ☐ Planned ☐ N/A [________________________________] [__/__/____]
Vendor security assessment program ☐ Implemented ☐ Planned ☐ N/A [________________________________] [__/__/____]
Data sharing agreements ☐ Implemented ☐ Planned ☐ N/A [________________________________] [__/__/____]
Subprocessor restrictions ☐ Implemented ☐ Planned ☐ N/A [________________________________] [__/__/____]
Breach notification clauses ☐ Implemented ☐ Planned ☐ N/A [________________________________] [__/__/____]
Data deletion / return provisions ☐ Implemented ☐ Planned ☐ N/A [________________________________] [__/__/____]

7.4 Residual Risk After Mitigation

Risk ID Original Score Mitigation Applied Residual Score Acceptable?
R-001 [____] [________________________________] [____] ☐ Yes ☐ No
R-002 [____] [________________________________] [____] ☐ Yes ☐ No
R-003 [____] [________________________________] [____] ☐ Yes ☐ No
R-004 [____] [________________________________] [____] ☐ Yes ☐ No
R-005 [____] [________________________________] [____] ☐ Yes ☐ No

SECTION 8: NEW JERSEY-SPECIFIC COMPLIANCE CHECKLIST

8.1 NJDPA Consumer Rights Compliance

Requirement Status Notes
Right to confirm whether data is being processed ☐ Compliant ☐ In Progress ☐ Non-Compliant [________________________________]
Right to access personal data ☐ Compliant ☐ In Progress ☐ Non-Compliant [________________________________]
Right to correct inaccuracies ☐ Compliant ☐ In Progress ☐ Non-Compliant [________________________________]
Right to delete personal data ☐ Compliant ☐ In Progress ☐ Non-Compliant [________________________________]
Right to data portability (machine-readable format) ☐ Compliant ☐ In Progress ☐ Non-Compliant [________________________________]
Right to opt out of sale of personal data ☐ Compliant ☐ In Progress ☐ Non-Compliant [________________________________]
Right to opt out of targeted advertising ☐ Compliant ☐ In Progress ☐ Non-Compliant [________________________________]
Right to opt out of profiling with significant effects ☐ Compliant ☐ In Progress ☐ Non-Compliant [________________________________]
Response within 45 days (+ extension if needed) ☐ Compliant ☐ In Progress ☐ Non-Compliant [________________________________]
Appeal mechanism for denied requests ☐ Compliant ☐ In Progress ☐ Non-Compliant [________________________________]
Non-discrimination for exercising rights ☐ Compliant ☐ In Progress ☐ Non-Compliant [________________________________]

8.2 Universal Opt-Out Mechanism (Effective July 15, 2025)

CRITICAL: The NJDPA requires recognition of universal opt-out mechanisms (such as Global Privacy Control) as of July 15, 2025.

☐ Universal opt-out mechanism recognized and honored (GPC, etc.)
☐ Technical implementation verified
☐ No requirement for consumer to submit separate request when universal signal detected
☐ Documentation of opt-out signal processing

8.3 Cure Period Status

NJDPA Cure Period Timeline:
- January 15, 2025 — July 15, 2026: 18-month cure period available
- After July 16, 2026: Cure period expires; AG has discretion to offer cure

☐ Organization is aware of cure period sunset date (July 16, 2026)
☐ Compliance remediation processes are in place to address violations within cure period
☐ Organization is prepared for post-cure enforcement environment

8.4 Privacy Notice Requirements

Requirement Status Notes
Reasonably accessible, clear, and meaningful privacy notice ☐ Compliant ☐ In Progress ☐ Non-Compliant [________________________________]
Categories of personal data processed ☐ Disclosed ☐ Not Disclosed [________________________________]
Purpose of processing ☐ Disclosed ☐ Not Disclosed [________________________________]
Consumer rights and how to exercise them ☐ Disclosed ☐ Not Disclosed [________________________________]
Categories of third parties with whom data is shared ☐ Disclosed ☐ Not Disclosed [________________________________]
Whether data is sold or used for targeted advertising ☐ Disclosed ☐ Not Disclosed [________________________________]
Appeal process ☐ Disclosed ☐ Not Disclosed [________________________________]

8.5 Breach Notification Requirements (N.J. Stat. § 56:8-163)

Requirement Status Notes
Breach detection and investigation procedures ☐ In Place ☐ In Progress ☐ Not In Place [________________________________]
Report to NJ State Police before consumer notice ☐ Documented ☐ Not Documented [________________________________]
Consumer notification in "most expedient time without unreasonable delay" ☐ Documented ☐ Not Documented [________________________________]
Consumer reporting agency notification (if 1,000+ affected) ☐ Documented ☐ Not Documented [________________________________]
Written determination retained 5 years if no notice required (no reasonable misuse) ☐ Documented ☐ Not Documented [________________________________]
PI definition: name + SSN, DL, account number, medical information ☐ Reviewed ☐ Not Reviewed [________________________________]

8.6 Penalties Under NJDPA

  • $10,000 per first violation
  • $20,000 per subsequent violation
  • AG/Division of Consumer Affairs has exclusive enforcement authority
  • No private right of action under the NJDPA
  • Violations may also constitute unfair practices under the Consumer Fraud Act (N.J. Stat. § 56:8-1 et seq.)

SECTION 9: THIRD-PARTY AND VENDOR ASSESSMENT

9.1 Sub-Processors

Sub-Processor Name Services Provided Data Accessed DPA Executed? Security Assessment Date
[________________________________] [________________________________] [________________________________] ☐ Yes ☐ No [__/__/____]
[________________________________] [________________________________] [________________________________] ☐ Yes ☐ No [__/__/____]

9.2 Processor Contract Requirements Under NJDPA

For each processor, verify the following contractual provisions:

☐ Clear instructions for processing personal data
☐ Nature and purpose of processing
☐ Type of data subject to processing
☐ Duration of processing
☐ Rights and obligations of both parties
☐ Confidentiality obligations
☐ Requirement to delete or return personal data at end of service
☐ Obligation to make available all information to demonstrate compliance
☐ Subprocessor engagement restrictions and notification obligations
☐ Assistance with consumer rights requests

9.3 Vendor Security Assessment

For each vendor processing NJ consumer personal data:

☐ SOC 2 Type II report reviewed (or equivalent certification)
☐ Encryption standards meet or exceed requirements
☐ Access controls verified
☐ Incident response capabilities confirmed
☐ Data deletion / return procedures documented
☐ Subprocessor restrictions documented
☐ Insurance coverage verified
☐ NJ-specific breach notification cooperation clause included


SECTION 10: AUTOMATED DECISION-MAKING AND PROFILING

10.1 Profiling Activities

  • Does this processing involve profiling? ☐ Yes ☐ No

NJDPA Profiling Definition: Any form of automated processing performed on personal data to evaluate, analyze, or predict personal aspects related to an identified or identifiable individual's economic situation, health, personal preferences, interests, reliability, behavior, location, or movements.

Profiling Activity Purpose Data Used Opt-Out Available?
[________________________________] [________________________________] [________________________________] ☐ Yes ☐ No

10.2 Heightened Risk Profiling Assessment

Under the NJDPA, profiling presents heightened risk when it creates a reasonably foreseeable risk of:

☐ Unfair or deceptive treatment of consumers
☐ Unlawful disparate impact on consumers
☐ Financial, physical, or reputational injury to consumers
☐ Physical or other intrusion upon the solitude or seclusion of consumers

Assessment of whether this profiling activity meets heightened-risk threshold:
[________________________________]

10.3 Automated Decision-Making

  • Are decisions made solely through automated means with legal or similarly significant effects? ☐ Yes ☐ No
  • If yes, describe the decision-making logic: [________________________________]
  • Human review / override mechanism: [________________________________]
  • Has the algorithm been tested for bias? ☐ Yes ☐ No
  • Has the algorithm been tested for accuracy? ☐ Yes ☐ No

SECTION 11: CHILDREN'S DATA

11.1 COPPA and NJDPA Children's Data Requirements

Under the NJDPA, personal data of a known child under the age of 13 is classified as sensitive data requiring opt-in consent.

  • Does this processing involve data of individuals known to be under 13? ☐ Yes ☐ No
  • If yes, is verifiable parental consent obtained per COPPA (15 U.S.C. § 6501 et seq.)? ☐ Yes ☐ No ☐ N/A
  • Does the organization have a COPPA-compliant privacy policy? ☐ Yes ☐ No
  • Are age-gating mechanisms in place? ☐ Yes ☐ No
  • Is data of minors aged 13-17 processed? ☐ Yes ☐ No
  • If yes, describe additional protections: [________________________________]

11.2 Children's Data Safeguards

Safeguard Status
Age verification mechanism ☐ Implemented ☐ Planned ☐ N/A
Parental consent workflow (COPPA) ☐ Implemented ☐ Planned ☐ N/A
Restricted data collection for children ☐ Implemented ☐ Planned ☐ N/A
No targeted advertising to known children ☐ Implemented ☐ Planned ☐ N/A
No sale of known children's data ☐ Implemented ☐ Planned ☐ N/A
Expedited deletion upon parental request ☐ Implemented ☐ Planned ☐ N/A

SECTION 12: MONITORING AND REVIEW

12.1 Review Schedule

Review Type Frequency Next Review Date Responsible Party
Full DPIA reassessment ☐ Annual ☐ Biannual ☐ Other: [____] [__/__/____] [________________________________]
Processing activity review ☐ Quarterly ☐ Semi-annual ☐ Annual [__/__/____] [________________________________]
Risk mitigation effectiveness ☐ Quarterly ☐ Semi-annual ☐ Annual [__/__/____] [________________________________]
Vendor / third-party review ☐ Annual ☐ Biannual ☐ Other: [____] [__/__/____] [________________________________]
NJ regulatory landscape review ☐ Quarterly ☐ Semi-annual ☐ Annual [__/__/____] [________________________________]

12.2 Trigger Events for Reassessment

☐ Material change in the processing activity
☐ New categories of personal data collected
☐ New categories of data subjects
☐ Change in purpose of processing
☐ New sub-processor or third-party data recipient
☐ Geographic expansion (new jurisdictions)
☐ Security incident or data breach
☐ Regulatory inquiry from NJ AG or Division of Consumer Affairs
☐ Legislative amendment to the NJDPA
☐ Final regulations published by the Division of Consumer Affairs
☐ Consumer complaints related to this processing activity
☐ Organizational changes (M&A, restructuring)
☐ Significant change in data volume (increase > 25%)
☐ Cure period expiration (July 16, 2026)

12.3 Version Control

Version Date Author Summary of Changes
[____] [__/__/____] [________________________________] [________________________________]
[____] [__/__/____] [________________________________] [________________________________]

SECTION 13: APPROVAL AND SIGN-OFF

Data Protection Officer / Privacy Lead

Name [________________________________]
Title [________________________________]
Signature [________________________________]
Date [__/__/____]
Recommendation ☐ Approve ☐ Approve with Conditions ☐ Reject
Comments [________________________________]

Chief Information Security Officer (CISO)

Name [________________________________]
Title [________________________________]
Signature [________________________________]
Date [__/__/____]
Recommendation ☐ Approve ☐ Approve with Conditions ☐ Reject
Comments [________________________________]

Legal Counsel

Name [________________________________]
Title [________________________________]
Firm (if external) [________________________________]
Signature [________________________________]
Date [__/__/____]
Recommendation ☐ Approve ☐ Approve with Conditions ☐ Reject
Comments [________________________________]

Business Owner / Executive Approver

Name [________________________________]
Title [________________________________]
Signature [________________________________]
Date [__/__/____]
Decision ☐ Approved ☐ Approved with Conditions ☐ Rejected ☐ Deferred
Conditions (if applicable) [________________________________]

APPENDIX A: DATA FLOW DIAGRAM

[Data Subject] ---> [Collection Point] ---> [Primary Storage]
|
[Processing System]
|
+---------------+---------------+
| | |
[Analytics] [Third Party] [Backup/DR]
| | |
[Reporting] [Sub-Processor] [Archive]
Instructions: Replace the above placeholder with an actual data flow diagram specific to the processing activity. The diagram must show all collection points, storage systems, processors, sub-processors, third-party recipients, and data lifecycle endpoints.


APPENDIX B: RISK MATRIX TEMPLATE

Negligible Impact Limited Impact Significant Impact Severe Impact
Almost Certain High High Critical Critical
Likely Moderate High High Critical
Possible Moderate Moderate High High
Unlikely Low Moderate Moderate High
Remote Low Low Moderate Moderate

Scoring Guide:
- Critical (16-25): Immediate escalation; processing must not proceed without executive approval
- High (10-15): Senior management review required; implement additional mitigations
- Moderate (5-9): Standard mitigation measures; document and monitor
- Low (1-4): Acceptable risk; routine monitoring


APPENDIX C: GLOSSARY OF TERMS

Term Definition
Consumer A natural person who is a NJ resident acting only in an individual or household context; excludes persons acting in a commercial or employment context (NJDPA)
Controller A natural or legal person that, alone or jointly with others, determines the purpose and means of processing personal data (NJDPA)
Processor A natural or legal entity that processes personal data on behalf of a controller (NJDPA)
Personal Data Any information that is linked or reasonably linkable to an identified or identifiable natural person; excludes de-identified data and publicly available information (NJDPA)
Sensitive Data Categories requiring opt-in consent: racial/ethnic origin, religious beliefs, health diagnosis, sexual orientation, citizenship/immigration, genetic data, biometric data, children under 13, precise geolocation (NJDPA)
Sale Exchange of personal data for monetary or other valuable consideration by the controller to a third party (NJDPA)
Targeted Advertising Displaying advertisements to a consumer based on personal data obtained from the consumer's activities across nonaffiliated websites or online applications to predict preferences or interests (NJDPA)
Profiling Any form of automated processing to evaluate, analyze, or predict personal aspects of an identified or identifiable individual (NJDPA)
Universal Opt-Out Mechanism A browser or device setting, technology, or other mechanism that sends a signal indicating the consumer's intent to opt out of the processing of personal data for targeted advertising or sale (NJDPA)

NEW JERSEY-SPECIFIC COMPLIANCE NOTES

Unique NJDPA Features

  1. Nonprofit Applicability: Unlike most state privacy laws, the NJDPA applies to nonprofit organizations, making it one of the broadest in scope among US state privacy laws.

  2. Universal Opt-Out Requirement (July 15, 2025): Controllers must recognize and honor universal opt-out mechanisms such as Global Privacy Control (GPC). This requirement took effect six months after the law's effective date.

  3. 18-Month Cure Period: The NJDPA provides an 18-month cure period from its effective date (January 15, 2025 through July 15, 2026). After July 16, 2026, cure is at the discretion of the Division of Consumer Affairs.

  4. Draft Regulations Expected: The Division of Consumer Affairs was authorized to issue draft regulations beginning June 2, 2025, with final regulations expected in 2026. These regulations will provide detailed guidance on DPIA requirements, consumer rights request processes, and opt-out mechanisms.

  5. NJ State Police Notification First: Under the breach notification statute (N.J. Stat. § 56:8-163), entities must report breaches to the NJ State Police before notifying affected consumers, a unique requirement among US states.

  6. Broad Definition of Personal Information for Breach: New Jersey's breach notification law covers a broad range of data elements including medical information and health insurance information in addition to traditional categories.

  7. DPIA Confidentiality: Data protection assessments are confidential and exempt from public inspection, and disclosure to the AG does not waive privilege protections.

  8. Heightened Penalty Structure: The NJDPA imposes $10,000 for first violations and $20,000 for subsequent violations, with no cap on total penalties, creating significant financial exposure for organizations with widespread non-compliance.


SOURCES AND REFERENCES

  1. New Jersey Data Privacy Act (NJDPA), S332, codified at N.J. Stat. § 56:8-166 et seq. — https://www.njleg.state.nj.us/bill-search/2022/S332/bill-text?f=S0500&n=332_R6
  2. N.J. Stat. § 56:8-163, Security Breach Notification — https://www.njleg.state.nj.us
  3. NJ Cyber.gov, "New Jersey Enacts Comprehensive Data Privacy Law" — https://www.cyber.nj.gov/guidance-and-best-practices/identity-theft-privacy/data-privacy/nj-data-privacy-prevention-act
  4. White & Case, "New Jersey Enacts Comprehensive Data Privacy Law" — https://www.whitecase.com/insight-alert/new-jersey-enacts-comprehensive-data-privacy-law
  5. SecurePrivacy, "New Jersey Data Privacy Act (S332) Complete Guide for 2025" — https://secureprivacy.ai/blog/new-jersey-s332-privacy-bill-guide
  6. BigID, "NJ Data Privacy Legislation SB 332" — https://bigid.com/blog/nj-sb-332-data-privacy-legislation/
  7. Children's Online Privacy Protection Act (COPPA), 15 U.S.C. § 6501 et seq.
  8. IAPP, US State Privacy Legislation Tracker — https://iapp.org/resources/article/us-state-privacy-legislation-tracker
  9. Centraleyes, "New Jersey Privacy Act 2025: What to Expect" — https://www.centraleyes.com/new-jersey-privacy-act/
AI Legal Assistant
$49 one-time

Need help customizing this document?

Get 3 days of intelligent editing. Tailor every section to your specific case.

See how AI customizes your document (DEMO)

New Jersey Data Protection ...
All changes saved
Save
Export
Export as DOCX
Export as PDF
Generating PDF...
data_protection_impact_assessment_nj.pdf
Ready to export as PDF or Word
AI is editing...

DATA PROTECTION IMPACT ASSESSMENT

STATE OF NEW JERSEY


Effective Date: [DATE]
Party A: [PARTY A NAME]
Address: [PARTY A ADDRESS]
Party B: [PARTY B NAME]
Address: [PARTY B ADDRESS]
Governing Law: [GOVERNING STATE]

This document is entered into by and between [PARTY A NAME] and [PARTY B NAME], effective as of the date set forth above, subject to the terms and conditions outlined herein and the laws of [GOVERNING STATE].
Chat
Review

Customize this document with Ezel

$49 one-time · No subscription

  • AI-Powered Editing
    Tell the AI what to change and watch it edit your document in real time.
  • 3 Days of Access
    Revise as many times as you need. Download as Word or PDF.
  • State-Specific Law
    AI understands New Jersey legal requirements.
Secure checkout via Stripe
Need to customize this document?

Do more with Ezel

This free template is just the beginning. See how Ezel helps legal teams draft, research, and collaborate faster.

AI Document Editor

AI that drafts while you watch

Tell the AI what you need and watch your document transform in real-time. No more copy-pasting between tools or manually formatting changes.

  • Natural language commands: "Add a force majeure clause"
  • Context-aware suggestions based on document type
  • Real-time streaming shows edits as they happen
  • Milestone tracking and version comparison
Learn more about the Editor
AI Chat for legal research
AI Chat Workspace

Research and draft in one conversation

Ask questions, attach documents, and get answers grounded in case law. Link chats to matters so the AI remembers your context.

  • Pull statutes, case law, and secondary sources
  • Attach and analyze contracts mid-conversation
  • Link chats to matters for automatic context
  • Your data never trains AI models
Learn more about AI Chat
Case law search interface
Case Law Search

Search like you think

Describe your legal question in plain English. Filter by jurisdiction, date, and court level. Read full opinions without leaving Ezel.

  • All 50 states plus federal courts
  • Natural language queries - no boolean syntax
  • Citation analysis and network exploration
  • Copy quotes with automatic citation generation
Learn more about Case Law Search

Ready to transform your legal workflow?

Join legal teams using Ezel to draft documents, research case law, and organize matters — all in one workspace.

Request a Demo