Templates Compliance Regulatory Data Protection Impact Assessment (DPIA) (WA)
Data Protection Impact Assessment (DPIA) (WA)
Ready to Edit
Data Protection Impact Assessment (DPIA) (WA) - Free Editor

DATA PROTECTION IMPACT ASSESSMENT (DPIA)

(State overlay: WA)

1. Project Overview

  • Project name/ID: [name]; owner: [business owner]; sponsor: [executive].
  • Purpose and objectives: [describe].
  • Timeline and launch date: [dates].

2. Scope of Processing

  • Data subjects: [customers/employees/vendors/end users].
  • Personal data categories: [contact, IDs, financial, location, biometric, health, minors].
  • Sensitive data (state definition): [list per state law if applicable]; lawful basis/consent requirements: [insert].
  • Volume and retention: [records/year], [retention schedule and deletion triggers].
  • Processing activities: [collection, storage, analysis, sharing/sale/sharing status].

3. Legal Basis, Notices, and Rights

  • No comprehensive consumer privacy law. Washington has breach notification statute only.
  • Applicability: Persons/entities conducting business in WA owning/licensing PI of WA residents; state/local agencies.
  • Consumer rights: No mandated access, correction, deletion, or opt-out rights (apply federal laws).
  • Primary compliance obligation: Breach notification under RCW 19.255.010 (businesses) and RCW 42.56.590 (state/local agencies).
  • Security standard: Reasonable security measures to protect PI.

4. Data Flow and Transfers

  • Source systems: [list]; storage/hosting locations: [cloud region/data centers].
  • Cross-border transfers: [EU/UK/other]; transfer tool: [SCCs/IDTA/CBPR if applicable].
  • Recipients/vendors: [processors/subprocessors/controllers]; due diligence status and DPAs in place.
  • Access controls: RBAC groups, least privilege, joiner/mover/leaver process.

5. Security and Controls

  • Technical controls: encryption in transit/at rest [specify], key management, network segmentation, endpoint protections, logging/monitoring, DLP, backups, vulnerability management.
  • Organizational controls: policies, training cadence, vendor due diligence, incident response playbook, change management.
  • Authentication/authorization: [MFA/SAML/SSO]; session timeouts; privileged access reviews cadence.

6. Risks and Impact Assessment

  • Risks/threats: [unauthorized access, data minimization failure, purpose creep, profiling risk, transfer risk, children/minors risk].
  • Likelihood: [low/medium/high]; Impact: [low/medium/high]; Risk rating matrix: [insert].
  • POWR/State-specific equal employment or anti-discrimination considerations (if applicable): [insert].

7. Mitigations and Residual Risk

  • Planned mitigations: [controls, timelines, owners].
  • Testing/validation: [pen test, DPIA/ROPA updates, privacy-by-design checklist].
  • Residual risk after mitigations: [rating]; decision: [accept/mitigate further/block].

8. Incident Response and Breach Notification

  • Statute: RCW 19.255.010 (businesses); RCW 42.56.590 (state/local agencies). Originally enacted 2015; amended by HB 1071, effective March 1, 2020 (reduced timeline from 45 to 30 days + expanded PI definition).
  • Timeline: Most expedient time possible and within 30 days after discovery of breach (reduced from 45 days in 2020).
  • AG notification: If 500+ WA residents affected. Electronically via Data Breach Notification Web Form. Within 30 days of discovery. HIPAA/federal banking entities still must notify AG (even if exempt from consumer notice).
  • State agencies: May delay up to additional 14 days to allow translation into primary language of affected resident.
  • Private right of action: Allowed. Consumer injured by violation may institute civil action to recover damages.
  • Enforcement: AG may bring action on behalf of state or residents. Violations = unfair or deceptive act + unfair method of competition.
  • Triggers: Breach of security = unauthorized acquisition of PI. PI = first name/initial + last name + (SSN, DL/state ID, financial account + security/access code, biometric, username/email + password/security question, medical/health insurance, student/military ID, passport).
  • Exception: Good-faith employee acquisition. Law enforcement delay permitted (must document reason). Encryption safe harbor.
  • Coordination with other states/GLBA/HIPAA requirements if multi-state: [plan].

9. State Overlay Checklist (WA) - Breach Notification Only

  • No comprehensive privacy law. Breach notification statute only (RCW 19.255.010 + RCW 42.56.590).
  • Applicability: Persons/entities conducting business in WA + state/local agencies owning/licensing PI of WA residents.
  • Sensitive data/Consumer rights: No mandated rights.
  • Security: Reasonable security measures.
  • Breach notice: 30 days (effective March 2020; reduced from 45). AG if 500+ (even HIPAA/banking entities). Private right of action. Unfair/deceptive practices enforcement. State agencies: +14 days for translation.
  • Children: COPPA compliance.
  • DPA/ROPA: Not required by law.

10. Approvals and Accountability

  • Privacy lead/DPO review: [name/date].
  • Security review: [name/date].
  • Legal review (state law overlay): [name/date].
  • Business owner certification: [name/date].
  • Executive approver: [name/title/date].

11. Attachments

  • Data flow diagrams/architecture.
  • Records of processing activities entry.
  • Vendor list and DPAs/SCCs.
  • Legitimate interests assessment or risk assessment (if applicable).
  • Testing summaries and pen test reports (if applicable).
  • State-specific notices/links and breach templates.
AI Legal Assistant

Welcome to Data Protection Impact Assessment (DPIA) (WA)

You're viewing a professional legal template that you can edit directly in your browser.

What's included:

  • Professional legal document formatting
  • Washington jurisdiction-specific content
  • Editable text with legal guidance
  • Free DOCX download

Upgrade to AI Editor for:

  • 🤖 Real-time AI legal assistance
  • 🔍 Intelligent document review
  • ⏰ Unlimited editing time
  • 📄 PDF exports
  • 💾 Auto-save & cloud sync