Data Protection Impact Assessment

A structured process for identifying, evaluating, and mitigating the privacy risks of a project, feature, or system before it is built — turning data protection from an abstract legal requirement into concrete design decisions.


What is it?

A Data Protection Impact Assessment (DPIA) is the formal tool that connects data governance principles to engineering practice. It’s a structured analysis you conduct before building a feature that processes personal data, asking: what could go wrong, how likely is it, and what will I do to prevent it?

Under the GDPR (Art. 35) and Swiss nDSG (Art. 16), a DPIA is legally required when processing is “likely to result in a high risk to the rights and freedoms of natural persons.” But even when not legally mandated, a DPIA is valuable as a design tool — it forces you to think through data flows, identify risks, and document decisions before writing code.1

A DPIA is not a bureaucratic exercise. Done well, it produces specific, actionable architectural requirements: minimum aggregation thresholds, encryption standards, retention periods, access controls, and user-facing transparency features. It’s the bridge between “we should respect privacy” and “here’s exactly how we’ll do it in this system.”2

In plain terms

A DPIA is like an environmental impact assessment before building a factory. Before construction begins, you study what the factory will emit, who will be affected, and what safeguards will prevent harm. You don’t build first and assess later — by then, the damage is done and retrofitting is expensive.


At a glance


How does it work?

When is a DPIA required?

Under GDPR Art. 35, a DPIA is mandatory when processing involves:1

TriggerExample
Systematic evaluation of personal aspects (profiling)Recommendation engine based on user behaviour
Large-scale processing of sensitive dataHealth data, political opinions, biometric data
Systematic monitoring of public areasCCTV, location tracking
New technologies with unknown risksAI-powered decision-making
Combining datasets in unexpected waysMerging user analytics with public records
Processing that could prevent rights exerciseBlocking access based on automated scoring

Developer rule of thumb

If you’re uncertain whether a DPIA is required, do one anyway. A DPIA that finds low risk takes a few hours and documents your due diligence. Skipping one that should have been done can cost millions.

The seven stages

Stage 1 — Describe the processing

Document what you’re planning to build:

  • What personal data will be processed?
  • Why? (Purpose and legal basis)
  • How? (Technical architecture, data flows)
  • Who? (Data subjects, data processors, recipients)
  • Where? (Storage locations, cross-border transfers)
  • How long? (Retention periods)

Think of it like...

A doctor taking a patient history before prescribing treatment. You need the full picture before you can diagnose risks.

Stage 2 — Assess necessity and proportionality

For each piece of data and each processing activity, ask:3

  • Is this necessary? Could we achieve the purpose with less data?
  • Is this proportionate? Does the benefit justify the privacy intrusion?
  • Is there a less invasive alternative? Could we use anonymised or aggregated data instead?

Stage 3 — Identify risks

Map out what could go wrong. Think from the data subject’s perspective:

Risk categoryExample risks
ConfidentialityData breach, unauthorised access, accidental disclosure
IntegrityData corruption, inaccurate records, wrong recommendations
AvailabilitySystem failure preventing data access or deletion
Re-identificationAggregated data enabling individual identification
Function creepData collected for one purpose used for another
DiscriminationBiased algorithms producing unfair outcomes
Chilling effectUsers avoiding legitimate activities due to surveillance fears

Stage 4 — Evaluate risk level

For each risk, assess:

DimensionScale
LikelihoodUnlikely — Possible — Likely — Almost certain
SeverityNegligible — Limited — Significant — Maximum

The combination produces a risk level:

Risk Level = Likelihood x Severity

              Negligible  Limited  Significant  Maximum
Unlikely      Low         Low      Medium       Medium
Possible      Low         Medium   Medium       High
Likely        Medium      Medium   High         High
Almost cert.  Medium      High     High         Critical

Stage 5 — Define mitigations

For each medium/high/critical risk, specify concrete mitigations:

RiskMitigationArchitecture implication
Re-identification via small countsMinimum display threshold of 10WHERE count >= 10 in queries; suppress results below threshold
Geographic re-identificationAggregate at canton level, not communeGeographic data model uses canton-level granularity
Unauthorised accessField-level encryption for PIIEncrypt columns containing personal data at rest
Function creepPurpose-separated databasesSeparate schemas for analytics vs user data
Inaccurate AI recommendationsDisclaimers + human reviewPre-output disclaimer component; review queue for edge cases

Stage 6 — Document and approve

The DPIA document should be:

  • Signed off by the project lead or data protection officer
  • Stored as a project artefact (version-controlled)
  • Referenced in the system’s privacy notice
  • Updated when the processing changes

Stage 7 — Monitor and review

A DPIA is not a one-time document. Review it:

  • When the feature changes significantly
  • When new data sources are added
  • When the regulatory environment changes
  • At regular intervals (annually minimum)

Concept to explore

The DPIA’s risk identification step draws heavily on re-identification-risk analysis. If your processing involves aggregated or anonymised data, re-identification risk is often the highest-priority risk to assess.


Why do we use it?

Key reasons

1. Legal requirement. GDPR Art. 35 and nDSG Art. 16 mandate DPIAs for high-risk processing. Failure to conduct one when required is a regulatory violation in itself — regardless of whether harm actually occurs.

2. Design tool. A DPIA turns abstract privacy principles into concrete architecture requirements. It tells you exactly what thresholds to set, what to encrypt, what to log, and what to suppress.

3. Defensibility. If a complaint or incident occurs, a completed DPIA demonstrates that you identified risks and took reasonable steps to mitigate them. It’s your evidence of due diligence.


When do we use it?

  • Before building any feature that processes personal data at scale
  • Before deploying AI systems that make decisions about or affecting individuals
  • Before combining datasets that could enable re-identification
  • Before processing sensitive data (health, politics, religion, ethnicity)
  • Before using new technologies whose privacy impact is unclear
  • When a regulator or data protection officer requests one
  • When an existing feature’s processing changes significantly

Rule of thumb

A DPIA should happen during the design phase, not after launch. If you’re already writing code, you’ve waited too long. The best time for a DPIA is when you’re drawing architecture diagrams and writing specifications.


How can I think about it?

The pre-flight checklist analogy

Pilots run pre-flight checklists before every flight. They don’t skip it because “the plane was fine yesterday.” They check fuel, instruments, controls, weather — systematically, every time.

A DPIA is your pre-flight checklist for data processing:

  • Fuel = legal basis (do you have a valid reason?)
  • Instruments = data flows (do you know where data goes?)
  • Controls = mitigations (can you respond to risks?)
  • Weather = threat landscape (what could go wrong?)

Flying without a pre-flight check is reckless. Processing personal data without a DPIA is the same.

The fire safety assessment analogy

Before a building is occupied, a fire safety assessment identifies risks (flammable materials, overcrowding, blocked exits) and requires mitigations (sprinklers, fire doors, emergency lighting, evacuation plans).

The assessment doesn’t prevent all fires. But it ensures that when a fire occurs, the damage is minimised and the building owner can prove they took reasonable precautions.

  • Risk identification = fire hazards = data risks
  • Mitigations = sprinklers = encryption, thresholds, access controls
  • Documentation = fire safety certificate = DPIA report
  • Regular review = annual inspection = DPIA update cycle

Concepts to explore next

ConceptWhat it coversStatus
re-identification-riskThe most common high-risk finding in DPIAscomplete
privacy-by-designThe architectural principle that DPIAs operationalisecomplete
personal-data-protectionThe legal framework that triggers DPIA requirementscomplete

Some cards don't exist yet

A broken link is a placeholder for future learning, not an error.


Check your understanding


Where this concept fits

Position in the knowledge graph

graph TD
    A[Data Governance] --> B[DPIA]
    A --> C[Privacy by Design]
    A --> D[Personal Data Protection]
    B --> E[Risk Assessment Methodology]
    B --> F[Processing Records]
    B --> G[Data Protection Officer]
    style B fill:#4a9ede,color:#fff

Related concepts:


Sources


Further reading

Resources

Footnotes

  1. GDPR Local. (2026). Data Protection Impact Assessment (DPIA): Complete Guide. GDPR Local. 2

  2. Bastion. (2026). Data Protection Impact Assessments (DPIA): When and How. Bastion.

  3. IT Governance. (2025). 7 Key Stages of the Data Protection Impact Assessment (DPIA). IT Governance.