{"id":11485,"date":"2022-09-14T16:02:10","date_gmt":"2022-09-14T14:02:10","guid":{"rendered":"https:\/\/azlp.mk\/methodology-for-implementation-of-pvzlp\/"},"modified":"2022-11-29T12:48:59","modified_gmt":"2022-11-29T10:48:59","slug":"methodology-for-implementation-of-pvzlp","status":"publish","type":"page","link":"https:\/\/azlp.mk\/en\/controllers\/directions\/personal-data-protection-impact-assessment-pdpa\/methodology-for-implementation-of-pvzlp\/","title":{"rendered":"Methodology for implementation of PVZLP"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"background-color: #f2f2f2;background-position: center center;background-repeat: no-repeat;border-width: 0px 0px 0px 0px;border-color:#eae9e9;border-style:solid;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-text fusion-text-1\"><p>The controller must adopt an appropriate methodology for the implementation of the PVZLP.<\/p>\n<p>The controller can choose different methodologies for implementing the PVZLP. The following are the criteria that the controller can use to assess whether the GDPR or the methodology for implementing the GDPR is comprehensive enough to comply with the personal data protection regulations:<\/p>\n<ul>\n<li><u>the assessment contains a systematic description of the processing<\/u> :\n<ul>\n<li>the nature, scope, context and purposes of the processing are taken into account;<\/li>\n<li>personal data, recipients and the period of storage of personal data are recorded;<\/li>\n<li>a functional description of the processing operation is given;<\/li>\n<li>assets on which personal data depend are identified (equipment, software programs, networks, persons, documents in paper form or channels for sending documents in paper form);<\/li>\n<li>compliance with approved codes of conduct is also taken into account;<\/li>\n<\/ul>\n<\/li>\n<li><u>the need and proportionality have been assessed<\/u> :\n<ul>\n<li>the measures provided for compliance with the regulations for the protection of personal data have been determined, taking into account:\n<ul>\n<li>measures contributing to the proportionality and necessity of processing based on:\n<ul>\n<li>specific, clear and legitimate goals;<\/li>\n<li>lawfulness of processing;<\/li>\n<li>adequate and relevant personal data and limited to what is necessary;<\/li>\n<li>limited storage period;<\/li>\n<\/ul>\n<\/li>\n<li>measures that contribute to the rights of the subjects of personal data:\n<ul>\n<li>information provided to the subject of personal data;<\/li>\n<li>right of access and portability of data;<\/li>\n<li>right to rectification and erasure;<\/li>\n<li>right to object and restriction of processing;<\/li>\n<li>relations with processors;<\/li>\n<li>safeguards relating to transmission;<\/li>\n<li>prior consultation.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><u>the risks for the rights and freedoms of the respondents are controlled:<\/u>\n<ul>\n<li>the source, nature, particularity and severity of the risk are assessed, in more detail for each risk (unauthorized access, unwanted changes and missing data) from the point of view of the subjects of the personal data:\n<ul>\n<li>the sources of risk are taken into account;<\/li>\n<li>the possible effects on the rights and freedoms of the subjects of personal data have been determined, among other things, in case of unauthorized access, unwanted changes and missing data;<\/li>\n<li>threats that could lead to unauthorized access, unwanted change and missing data are identified;<\/li>\n<li>probability and severity are assessed;<\/li>\n<\/ul>\n<\/li>\n<li>certain measures are foreseen to eliminate these risks;<\/li>\n<\/ul>\n<\/li>\n<li><u>stakeholders are included<\/u> :\n<ul>\n<li>the officer&#8217;s advice was sought;<\/li>\n<li>where appropriate, the opinions of the subjects of the personal data or their representatives have been requested.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>The following are examples of methodological approaches for the implementation of PVZLP.<\/p>\n<p>Examples of general frameworks of PVZLP in the EU:<\/p>\n<ul>\n<li>Germany: Standard Data Protection Model, V.1.0 &#8211; Trial version, 2016 (Standard Data Protection Model, V.1.0 \u2013 Trial version, 2016).<\/li>\n<\/ul>\n<p><span style=\"color: #00ccff;\"><a style=\"color: #00ccff;\" href=\"https:\/\/www.datenschutzzentrum.de\/uploads\/SDM-Methodology_V1_EN1.pdf\">https:\/\/www.datenschutzzentrum.de\/uploads\/SDM<\/a> <a style=\"color: #00ccff;\" href=\"https:\/\/www.datenschutzzentrum.de\/uploads\/SDM-Methodology_V1_EN1.pdf\">&#8211;<\/a> <a style=\"color: #00ccff;\" href=\"https:\/\/www.datenschutzzentrum.de\/uploads\/SDM-Methodology_V1_EN1.pdf\">Methodology_V1_EN1.pdf<\/a><\/span><\/p>\n<ul>\n<li>Spain: Gu\u00eda para una Evaluaci\u00f3n de Impacto en la Protecci\u00f3n de Datos Personales (EIPD), Agencia espa\u00f1ola de protecci\u00f3n de datos (AGPD), 2014.<\/li>\n<\/ul>\n<p><span style=\"color: #00ccff;\"><a style=\"color: #00ccff;\" href=\"https:\/\/www.agpd.es\/portalwebAGPD\/canaldocumentacion\/publicaciones\/common\/Guias\/Guia_EIPD.pdf\">https:\/\/www.agpd.es\/portalwebAGPD\/canaldocumentacion\/publicaciones\/common\/Guias\/Gui<\/a> <a style=\"color: #00ccff;\" href=\"https:\/\/www.agpd.es\/portalwebAGPD\/canaldocumentacion\/publicaciones\/common\/Guias\/Guia_EIPD.pdf\">a_EIPD.pdf<\/a><\/span><\/p>\n<ul>\n<li>France: Privacy Impact Assessment (PIA), Commission nationale de l&#8217;informatique et des libert\u00e9s (CNIL), 2015. <span style=\"color: #00ccff;\"><a style=\"color: #00ccff;\" href=\"https:\/\/www.cnil.fr\/fr\/node\/15798\">https:\/\/www.cnil.fr\/fr\/node\/15798<\/a>  <\/span><\/li>\n<li>United Kingdom: Implementing a Privacy Impact Assessment Code of Practice, Information Commissioner&#8217;s Office (ICO), 2014. (Conducting privacy impact assessments code of practice, Information Commissioner&#8217;s Office (ICO), 2014). <span style=\"color: #00ccff;\"><a style=\"color: #00ccff;\" href=\"https:\/\/ico.org.uk\/media\/for-organisations\/documents\/1595\/pia-code-of-practice.pdf\">https:\/\/ico.org.uk\/media\/for<\/a> <a style=\"color: #00ccff;\" href=\"https:\/\/ico.org.uk\/media\/for-organisations\/documents\/1595\/pia-code-of-practice.pdf\">&#8211;<\/a> <a style=\"color: #00ccff;\" href=\"https:\/\/ico.org.uk\/media\/for-organisations\/documents\/1595\/pia-code-of-practice.pdf\">organizations\/documents\/1595\/pia<\/a> <a style=\"color: #00ccff;\" href=\"https:\/\/ico.org.uk\/media\/for-organisations\/documents\/1595\/pia-code-of-practice.pdf\">&#8211;<\/a> <a style=\"color: #00ccff;\" href=\"https:\/\/ico.org.uk\/media\/for-organisations\/documents\/1595\/pia-code-of-practice.pdf\">code<\/a> <a style=\"color: #00ccff;\" href=\"https:\/\/ico.org.uk\/media\/for-organisations\/documents\/1595\/pia-code-of-practice.pdf\">&#8211;<\/a> <a style=\"color: #00ccff;\" href=\"https:\/\/ico.org.uk\/media\/for-organisations\/documents\/1595\/pia-code-of-practice.pdf\">of<\/a> <a style=\"color: #00ccff;\" href=\"https:\/\/ico.org.uk\/media\/for-organisations\/documents\/1595\/pia-code-of-practice.pdf\">&#8211;<\/a> <a style=\"color: #00ccff;\" href=\"https:\/\/ico.org.uk\/media\/for-organisations\/documents\/1595\/pia-code-of-practice.pdf\">practice.pdf<\/a><\/span><\/li>\n<li>Czech Republic: Metodika obecneho beszkom vlivu na ochranu osnych odstavnia, 23.10.2019, \u00da\u0159ad pro ochranu osnych osnych d\u0105iago (UOOU) <span style=\"color: #00ccff;\"><a style=\"color: #00ccff;\" href=\"https:\/\/www.uoou.cz\/assets\/File.ashx?id_org=200144&amp;id_dokumenty=38693\">https:\/\/www.uoou.cz\/assets\/File.ashx?id_org=200144&amp;id_dokumenty=38693<\/a> .<\/span><\/li>\n<\/ul>\n<p>Examples of the sectoral framework of the PVZLP in the EU:<\/p>\n<ul>\n<li>Privacy Impact Assessment Framework and Personal Data Protection for RFID Applications<\/li>\n<\/ul>\n<p><span style=\"color: #00ccff;\"><a style=\"color: #00ccff;\" href=\"http:\/\/ec.europa.eu\/justice\/data\">http:\/\/ec.europa.eu\/justice\/data<\/a> <a style=\"color: #00ccff;\" href=\"http:\/\/ec.europa.eu\/justice\/data-protection\/article-29\/documentation\/opinion-recommendation\/files\/2011\/wp180_annex_en.pdf\">&#8211;<\/a> <a style=\"color: #00ccff;\" href=\"http:\/\/ec.europa.eu\/justice\/data-protection\/article-29\/documentation\/opinion-recommendation\/files\/2011\/wp180_annex_en.pdf\">protection\/article<\/a> <a style=\"color: #00ccff;\" href=\"http:\/\/ec.europa.eu\/justice\/data-protection\/article-29\/documentation\/opinion-recommendation\/files\/2011\/wp180_annex_en.pdf\">&#8211;<\/a> <a style=\"color: #00ccff;\" href=\"http:\/\/ec.europa.eu\/justice\/data-protection\/article-29\/documentation\/opinion-recommendation\/files\/2011\/wp180_annex_en.pdf\">29\/documentation\/opinion<\/a> <a style=\"color: #00ccff;\" href=\"http:\/\/ec.europa.eu\/justice\/data-protection\/article-29\/documentation\/opinion-recommendation\/files\/2011\/wp180_annex_en.pdf\">recommendation\/files\/2011\/wp180_annex_en.pdf<\/a><\/span><\/p>\n<ul>\n<li>Personal Data Protection Impact Assessment Form for Smart Grid and Smart Metering Systems <span style=\"color: #00ccff;\"><a style=\"color: #00ccff;\" href=\"http:\/\/ec.europa.eu\/energy\/sites\/ener\/files\/documents\/2014_dpia_smart_grids_forces.pdf\">http:\/\/ec.europa.eu\/energy\/sites\/ener\/files\/documents\/2014_dpia_smart_grids_forces.pdf<\/a><\/span> <\/li>\n<\/ul>\n<p>International standard<\/p>\n<ul>\n<li>ISO\/IEC 291343: <span style=\"color: #00ccff;\"><a style=\"color: #00ccff;\" href=\"https:\/\/www.iso.org\/obp\/ui\/#iso:std:iso-iec:29134:ed-1:v1:en\">https:\/\/www.iso.org\/obp\/ui\/#iso:std:iso-iec:29134:ed-1:v1:en<\/a><\/span><\/li>\n<\/ul>\n<p>Compliance with the code of conduct should also be taken into account when implementing the Personal Data Protection Act ( <span style=\"color: #00ccff;\"><a style=\"color: #00ccff;\" href=\"https:\/\/azlp.mk\/wp-content\/uploads\/2022\/09\/zakon_za_zastita_na_licnite_podatoci.pdf\">Article 44 of the Law on Personal Data Protection<\/a><\/span> ). In this way, the controller can demonstrate that he has applied appropriate measures, provided that the code of conduct corresponds to the processing process ( <span style=\"color: #00ccff;\"><a style=\"color: #00ccff;\" href=\"https:\/\/azlp.mk\/wp-content\/uploads\/2022\/09\/zakon_za_zastita_na_licnite_podatoci.pdf\">Article 46 of the Law on Personal Data Protection<\/a><\/span> ).<\/p>\n<p>Also, during the implementation of PVZLP, certificates, as well as seals and marks for the protection of personal data (privacy seals) should be taken into account in order to demonstrate compliance with the regulations for the protection of personal data by the controller.<\/p>\n<\/div><\/div><style type=\"text\/css\">.fusion-body .fusion-builder-column-0{width:100% !important;margin-top : 0px;margin-bottom : 20px;}.fusion-builder-column-0 > .fusion-column-wrapper {padding-top : 0px !important;padding-right : 0px !important;margin-right : 1.92%;padding-bottom : 0px !important;padding-left : 0px !important;margin-left : 1.92%;}@media only screen and (max-width:1024px) {.fusion-body .fusion-builder-column-0{width:100% !important;order : 0;}.fusion-builder-column-0 > .fusion-column-wrapper {margin-right : 1.92%;margin-left : 1.92%;}}@media only screen and (max-width:640px) {.fusion-body .fusion-builder-column-0{width:100% !important;order : 0;}.fusion-builder-column-0 > .fusion-column-wrapper {margin-right : 1.92%;margin-left : 1.92%;}}<\/style><\/div><\/div><style type=\"text\/css\">.fusion-body .fusion-flex-container.fusion-builder-row-1{ padding-top : 0px;margin-top : 0px;padding-right : 0px;padding-bottom : 0px;margin-bottom : 0px;padding-left : 0px;}<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":6454,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Methodology for implementation of PVZLP - \u0410\u0433\u0435\u043d\u0446\u0438\u0458\u0430 \u0437\u0430 \u0437\u0430\u0448\u0442\u0438\u0442\u0430 \u043d\u0430 \u043b\u0438\u0447\u043d\u0438\u0442\u0435 \u043f\u043e\u0434\u0430\u0442\u043e\u0446\u0438<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/azlp.mk\/en\/controllers\/directions\/personal-data-protection-impact-assessment-pdpa\/methodology-for-implementation-of-pvzlp\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Methodology for implementation of PVZLP - \u0410\u0433\u0435\u043d\u0446\u0438\u0458\u0430 \u0437\u0430 \u0437\u0430\u0448\u0442\u0438\u0442\u0430 \u043d\u0430 \u043b\u0438\u0447\u043d\u0438\u0442\u0435 \u043f\u043e\u0434\u0430\u0442\u043e\u0446\u0438\" \/>\n<meta property=\"og:url\" content=\"https:\/\/azlp.mk\/en\/controllers\/directions\/personal-data-protection-impact-assessment-pdpa\/methodology-for-implementation-of-pvzlp\/\" \/>\n<meta property=\"og:site_name\" content=\"\u0410\u0433\u0435\u043d\u0446\u0438\u0458\u0430 \u0437\u0430 \u0437\u0430\u0448\u0442\u0438\u0442\u0430 \u043d\u0430 \u043b\u0438\u0447\u043d\u0438\u0442\u0435 \u043f\u043e\u0434\u0430\u0442\u043e\u0446\u0438\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-29T10:48:59+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/azlp.mk\/en\/controllers\/directions\/personal-data-protection-impact-assessment-pdpa\/methodology-for-implementation-of-pvzlp\/\",\"url\":\"https:\/\/azlp.mk\/en\/controllers\/directions\/personal-data-protection-impact-assessment-pdpa\/methodology-for-implementation-of-pvzlp\/\",\"name\":\"Methodology for implementation of PVZLP - \u0410\u0433\u0435\u043d\u0446\u0438\u0458\u0430 \u0437\u0430 \u0437\u0430\u0448\u0442\u0438\u0442\u0430 \u043d\u0430 \u043b\u0438\u0447\u043d\u0438\u0442\u0435 \u043f\u043e\u0434\u0430\u0442\u043e\u0446\u0438\",\"isPartOf\":{\"@id\":\"https:\/\/azlp.mk\/#website\"},\"datePublished\":\"2022-09-14T14:02:10+00:00\",\"dateModified\":\"2022-11-29T10:48:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/azlp.mk\/en\/controllers\/directions\/personal-data-protection-impact-assessment-pdpa\/methodology-for-implementation-of-pvzlp\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/azlp.mk\/en\/controllers\/directions\/personal-data-protection-impact-assessment-pdpa\/methodology-for-implementation-of-pvzlp\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/azlp.mk\/en\/controllers\/directions\/personal-data-protection-impact-assessment-pdpa\/methodology-for-implementation-of-pvzlp\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/azlp.mk\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Controllers\",\"item\":\"https:\/\/azlp.mk\/en\/controllers\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Directions\",\"item\":\"https:\/\/azlp.mk\/en\/controllers\/directions\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Personal Data Protection Impact Assessment (PDPA)\",\"item\":\"https:\/\/azlp.mk\/en\/controllers\/directions\/personal-data-protection-impact-assessment-pdpa\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Methodology for implementation of PVZLP\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/azlp.mk\/#website\",\"url\":\"https:\/\/azlp.mk\/\",\"name\":\"\u0410\u0433\u0435\u043d\u0446\u0438\u0458\u0430 \u0437\u0430 \u0437\u0430\u0448\u0442\u0438\u0442\u0430 \u043d\u0430 \u043b\u0438\u0447\u043d\u0438\u0442\u0435 \u043f\u043e\u0434\u0430\u0442\u043e\u0446\u0438\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/azlp.mk\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Methodology for implementation of PVZLP - \u0410\u0433\u0435\u043d\u0446\u0438\u0458\u0430 \u0437\u0430 \u0437\u0430\u0448\u0442\u0438\u0442\u0430 \u043d\u0430 \u043b\u0438\u0447\u043d\u0438\u0442\u0435 \u043f\u043e\u0434\u0430\u0442\u043e\u0446\u0438","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/azlp.mk\/en\/controllers\/directions\/personal-data-protection-impact-assessment-pdpa\/methodology-for-implementation-of-pvzlp\/","og_locale":"en_US","og_type":"article","og_title":"Methodology for implementation of PVZLP - \u0410\u0433\u0435\u043d\u0446\u0438\u0458\u0430 \u0437\u0430 \u0437\u0430\u0448\u0442\u0438\u0442\u0430 \u043d\u0430 \u043b\u0438\u0447\u043d\u0438\u0442\u0435 \u043f\u043e\u0434\u0430\u0442\u043e\u0446\u0438","og_url":"https:\/\/azlp.mk\/en\/controllers\/directions\/personal-data-protection-impact-assessment-pdpa\/methodology-for-implementation-of-pvzlp\/","og_site_name":"\u0410\u0433\u0435\u043d\u0446\u0438\u0458\u0430 \u0437\u0430 \u0437\u0430\u0448\u0442\u0438\u0442\u0430 \u043d\u0430 \u043b\u0438\u0447\u043d\u0438\u0442\u0435 \u043f\u043e\u0434\u0430\u0442\u043e\u0446\u0438","article_modified_time":"2022-11-29T10:48:59+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/azlp.mk\/en\/controllers\/directions\/personal-data-protection-impact-assessment-pdpa\/methodology-for-implementation-of-pvzlp\/","url":"https:\/\/azlp.mk\/en\/controllers\/directions\/personal-data-protection-impact-assessment-pdpa\/methodology-for-implementation-of-pvzlp\/","name":"Methodology for implementation of PVZLP - \u0410\u0433\u0435\u043d\u0446\u0438\u0458\u0430 \u0437\u0430 \u0437\u0430\u0448\u0442\u0438\u0442\u0430 \u043d\u0430 \u043b\u0438\u0447\u043d\u0438\u0442\u0435 \u043f\u043e\u0434\u0430\u0442\u043e\u0446\u0438","isPartOf":{"@id":"https:\/\/azlp.mk\/#website"},"datePublished":"2022-09-14T14:02:10+00:00","dateModified":"2022-11-29T10:48:59+00:00","breadcrumb":{"@id":"https:\/\/azlp.mk\/en\/controllers\/directions\/personal-data-protection-impact-assessment-pdpa\/methodology-for-implementation-of-pvzlp\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/azlp.mk\/en\/controllers\/directions\/personal-data-protection-impact-assessment-pdpa\/methodology-for-implementation-of-pvzlp\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/azlp.mk\/en\/controllers\/directions\/personal-data-protection-impact-assessment-pdpa\/methodology-for-implementation-of-pvzlp\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/azlp.mk\/en\/"},{"@type":"ListItem","position":2,"name":"Controllers","item":"https:\/\/azlp.mk\/en\/controllers\/"},{"@type":"ListItem","position":3,"name":"Directions","item":"https:\/\/azlp.mk\/en\/controllers\/directions\/"},{"@type":"ListItem","position":4,"name":"Personal Data Protection Impact Assessment (PDPA)","item":"https:\/\/azlp.mk\/en\/controllers\/directions\/personal-data-protection-impact-assessment-pdpa\/"},{"@type":"ListItem","position":5,"name":"Methodology for implementation of PVZLP"}]},{"@type":"WebSite","@id":"https:\/\/azlp.mk\/#website","url":"https:\/\/azlp.mk\/","name":"\u0410\u0433\u0435\u043d\u0446\u0438\u0458\u0430 \u0437\u0430 \u0437\u0430\u0448\u0442\u0438\u0442\u0430 \u043d\u0430 \u043b\u0438\u0447\u043d\u0438\u0442\u0435 \u043f\u043e\u0434\u0430\u0442\u043e\u0446\u0438","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/azlp.mk\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/azlp.mk\/en\/wp-json\/wp\/v2\/pages\/11485"}],"collection":[{"href":"https:\/\/azlp.mk\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/azlp.mk\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/azlp.mk\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/azlp.mk\/en\/wp-json\/wp\/v2\/comments?post=11485"}],"version-history":[{"count":1,"href":"https:\/\/azlp.mk\/en\/wp-json\/wp\/v2\/pages\/11485\/revisions"}],"predecessor-version":[{"id":11488,"href":"https:\/\/azlp.mk\/en\/wp-json\/wp\/v2\/pages\/11485\/revisions\/11488"}],"up":[{"embeddable":true,"href":"https:\/\/azlp.mk\/en\/wp-json\/wp\/v2\/pages\/6454"}],"wp:attachment":[{"href":"https:\/\/azlp.mk\/en\/wp-json\/wp\/v2\/media?parent=11485"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}