{"id":11489,"date":"2022-09-14T16:06:38","date_gmt":"2022-09-14T14:06:38","guid":{"rendered":"https:\/\/azlp.mk\/phases-of-implementation-of-pvzlp\/"},"modified":"2022-11-29T12:48:59","modified_gmt":"2022-11-29T10:48:59","slug":"phases-of-implementation-of-pvzlp","status":"publish","type":"page","link":"https:\/\/azlp.mk\/en\/controllers\/directions\/personal-data-protection-impact-assessment-pdpa\/phases-of-implementation-of-pvzlp\/","title":{"rendered":"Phases of implementation of PVZLP"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"background-color: #f2f2f2;background-position: center center;background-repeat: no-repeat;border-width: 0px 0px 0px 0px;border-color:#eae9e9;border-style:solid;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-text fusion-text-1\"><p><strong>1. Defining the context<\/strong> &#8211; In the first stage, the context of processing is defined and the following information is stated or described:<\/p>\n<ul>\n<li>collection of personal data,<\/li>\n<li>purpose of the processing,<\/li>\n<li>data movement,<\/li>\n<li>method(s) of obtaining the data,<\/li>\n<li>method and means of data processing (used equipment, networks, human resources, etc.),<\/li>\n<li>entities involved in the processing (controllers, processors, users, etc.),<\/li>\n<li>storage period.<\/li>\n<\/ul>\n<p><strong>2. Risk analysis<\/strong> \u2013 In the second phase, the threats (unwanted outcomes) are identified, and the probability and impact (consequence) of the realization of each risk is determined.<\/p>\n<p>Risk is expressed as a function of the probability that the undesired outcome (threat) will occur and the impact (consequence) of the undesired outcome if it occurs.<\/p>\n<div>\n<p><strong><em>Risk = (Probability of the threat occurring) x (Degree of impact)<\/em><\/strong><\/p>\n<\/div>\n<p>The impact can be:<\/p>\n<ul>\n<li>Low, when individuals can face several minor inconveniences, which they will overcome without a problem <em>(for example: lost time to re-enter data, anxiety, irritation, etc.)<\/em><\/li>\n<li>Medium, when natural persons can face significant inconveniences, which they will be able to overcome despite certain difficulties, <em>(for example: additional costs, refusal of access to certain business services, fear, lack of understanding, stress, minor physical ailments etc.)<\/em><\/li>\n<li>High, when natural persons can face significant consequences, which they should be able to overcome, but with serious difficulties, <em>(for example: misappropriation of funds, blacklisting by financial institutions, damage to property, loss of employment, subpoena, deterioration of health, etc.)<\/em><\/li>\n<li>Very high, when natural persons can face significant and even irreversible consequences, which they are unlikely to be able to overcome <em>(for example: inability to work, long-term psychological or physical illness, death, etc.)<\/em> <em>.<\/em><\/li>\n<\/ul>\n<p>The risk assessment is carried out according to the basic principles of personal data protection.<\/p>\n<p><strong>3. Risk management<\/strong> &#8211; The third phase should include protective measures, security measures and mechanisms designed to reduce the risk to an acceptable level, ensure the protection of personal data and demonstrate compliance with the regulations for the protection of personal data.<\/p>\n<p>The measures, just like the risk assessment, should be divided according to the basic principles of personal data protection.<\/p>\n<p><strong>4. Compilation of a report from an implemented EPA<\/strong> &#8211; The controller documents all stages of implementation of the EPA, after which he prepares a report.<\/p>\n<p>The report of the implemented PPE contains in particular: description of the processing process, internal and external persons involved in the process of implementation of the PPE, risk analysis, defined risk management measures, summary\/conclusion, action plan, opinion of the officer and other persons involved in the process, approval of the PVZLP by the responsible person at the controller.<\/p>\n<\/div><\/div><style type=\"text\/css\">.fusion-body .fusion-builder-column-0{width:100% !important;margin-top : 0px;margin-bottom : 20px;}.fusion-builder-column-0 > .fusion-column-wrapper {padding-top : 0px !important;padding-right : 0px !important;margin-right : 1.92%;padding-bottom : 0px !important;padding-left : 0px !important;margin-left : 1.92%;}@media only screen and (max-width:1024px) {.fusion-body .fusion-builder-column-0{width:100% !important;order : 0;}.fusion-builder-column-0 > .fusion-column-wrapper {margin-right : 1.92%;margin-left : 1.92%;}}@media only screen and (max-width:640px) {.fusion-body .fusion-builder-column-0{width:100% !important;order : 0;}.fusion-builder-column-0 > .fusion-column-wrapper {margin-right : 1.92%;margin-left : 1.92%;}}<\/style><\/div><\/div><style type=\"text\/css\">.fusion-body .fusion-flex-container.fusion-builder-row-1{ padding-top : 0px;margin-top : 0px;padding-right : 0px;padding-bottom : 0px;margin-bottom : 0px;padding-left : 0px;}<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":6454,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Phases of implementation of PVZLP - \u0410\u0433\u0435\u043d\u0446\u0438\u0458\u0430 \u0437\u0430 \u0437\u0430\u0448\u0442\u0438\u0442\u0430 \u043d\u0430 \u043b\u0438\u0447\u043d\u0438\u0442\u0435 \u043f\u043e\u0434\u0430\u0442\u043e\u0446\u0438<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/azlp.mk\/en\/controllers\/directions\/personal-data-protection-impact-assessment-pdpa\/phases-of-implementation-of-pvzlp\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phases of implementation of PVZLP - \u0410\u0433\u0435\u043d\u0446\u0438\u0458\u0430 \u0437\u0430 \u0437\u0430\u0448\u0442\u0438\u0442\u0430 \u043d\u0430 \u043b\u0438\u0447\u043d\u0438\u0442\u0435 \u043f\u043e\u0434\u0430\u0442\u043e\u0446\u0438\" \/>\n<meta property=\"og:url\" content=\"https:\/\/azlp.mk\/en\/controllers\/directions\/personal-data-protection-impact-assessment-pdpa\/phases-of-implementation-of-pvzlp\/\" \/>\n<meta property=\"og:site_name\" content=\"\u0410\u0433\u0435\u043d\u0446\u0438\u0458\u0430 \u0437\u0430 \u0437\u0430\u0448\u0442\u0438\u0442\u0430 \u043d\u0430 \u043b\u0438\u0447\u043d\u0438\u0442\u0435 \u043f\u043e\u0434\u0430\u0442\u043e\u0446\u0438\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-29T10:48:59+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/azlp.mk\/en\/controllers\/directions\/personal-data-protection-impact-assessment-pdpa\/phases-of-implementation-of-pvzlp\/\",\"url\":\"https:\/\/azlp.mk\/en\/controllers\/directions\/personal-data-protection-impact-assessment-pdpa\/phases-of-implementation-of-pvzlp\/\",\"name\":\"Phases of implementation of PVZLP - \u0410\u0433\u0435\u043d\u0446\u0438\u0458\u0430 \u0437\u0430 \u0437\u0430\u0448\u0442\u0438\u0442\u0430 \u043d\u0430 \u043b\u0438\u0447\u043d\u0438\u0442\u0435 \u043f\u043e\u0434\u0430\u0442\u043e\u0446\u0438\",\"isPartOf\":{\"@id\":\"https:\/\/azlp.mk\/#website\"},\"datePublished\":\"2022-09-14T14:06:38+00:00\",\"dateModified\":\"2022-11-29T10:48:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/azlp.mk\/en\/controllers\/directions\/personal-data-protection-impact-assessment-pdpa\/phases-of-implementation-of-pvzlp\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/azlp.mk\/en\/controllers\/directions\/personal-data-protection-impact-assessment-pdpa\/phases-of-implementation-of-pvzlp\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/azlp.mk\/en\/controllers\/directions\/personal-data-protection-impact-assessment-pdpa\/phases-of-implementation-of-pvzlp\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/azlp.mk\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Controllers\",\"item\":\"https:\/\/azlp.mk\/en\/controllers\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Directions\",\"item\":\"https:\/\/azlp.mk\/en\/controllers\/directions\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Personal Data Protection Impact Assessment (PDPA)\",\"item\":\"https:\/\/azlp.mk\/en\/controllers\/directions\/personal-data-protection-impact-assessment-pdpa\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Phases of implementation of PVZLP\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/azlp.mk\/#website\",\"url\":\"https:\/\/azlp.mk\/\",\"name\":\"\u0410\u0433\u0435\u043d\u0446\u0438\u0458\u0430 \u0437\u0430 \u0437\u0430\u0448\u0442\u0438\u0442\u0430 \u043d\u0430 \u043b\u0438\u0447\u043d\u0438\u0442\u0435 \u043f\u043e\u0434\u0430\u0442\u043e\u0446\u0438\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/azlp.mk\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Phases of implementation of PVZLP - \u0410\u0433\u0435\u043d\u0446\u0438\u0458\u0430 \u0437\u0430 \u0437\u0430\u0448\u0442\u0438\u0442\u0430 \u043d\u0430 \u043b\u0438\u0447\u043d\u0438\u0442\u0435 \u043f\u043e\u0434\u0430\u0442\u043e\u0446\u0438","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/azlp.mk\/en\/controllers\/directions\/personal-data-protection-impact-assessment-pdpa\/phases-of-implementation-of-pvzlp\/","og_locale":"en_US","og_type":"article","og_title":"Phases of implementation of PVZLP - \u0410\u0433\u0435\u043d\u0446\u0438\u0458\u0430 \u0437\u0430 \u0437\u0430\u0448\u0442\u0438\u0442\u0430 \u043d\u0430 \u043b\u0438\u0447\u043d\u0438\u0442\u0435 \u043f\u043e\u0434\u0430\u0442\u043e\u0446\u0438","og_url":"https:\/\/azlp.mk\/en\/controllers\/directions\/personal-data-protection-impact-assessment-pdpa\/phases-of-implementation-of-pvzlp\/","og_site_name":"\u0410\u0433\u0435\u043d\u0446\u0438\u0458\u0430 \u0437\u0430 \u0437\u0430\u0448\u0442\u0438\u0442\u0430 \u043d\u0430 \u043b\u0438\u0447\u043d\u0438\u0442\u0435 \u043f\u043e\u0434\u0430\u0442\u043e\u0446\u0438","article_modified_time":"2022-11-29T10:48:59+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/azlp.mk\/en\/controllers\/directions\/personal-data-protection-impact-assessment-pdpa\/phases-of-implementation-of-pvzlp\/","url":"https:\/\/azlp.mk\/en\/controllers\/directions\/personal-data-protection-impact-assessment-pdpa\/phases-of-implementation-of-pvzlp\/","name":"Phases of implementation of PVZLP - \u0410\u0433\u0435\u043d\u0446\u0438\u0458\u0430 \u0437\u0430 \u0437\u0430\u0448\u0442\u0438\u0442\u0430 \u043d\u0430 \u043b\u0438\u0447\u043d\u0438\u0442\u0435 \u043f\u043e\u0434\u0430\u0442\u043e\u0446\u0438","isPartOf":{"@id":"https:\/\/azlp.mk\/#website"},"datePublished":"2022-09-14T14:06:38+00:00","dateModified":"2022-11-29T10:48:59+00:00","breadcrumb":{"@id":"https:\/\/azlp.mk\/en\/controllers\/directions\/personal-data-protection-impact-assessment-pdpa\/phases-of-implementation-of-pvzlp\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/azlp.mk\/en\/controllers\/directions\/personal-data-protection-impact-assessment-pdpa\/phases-of-implementation-of-pvzlp\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/azlp.mk\/en\/controllers\/directions\/personal-data-protection-impact-assessment-pdpa\/phases-of-implementation-of-pvzlp\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/azlp.mk\/en\/"},{"@type":"ListItem","position":2,"name":"Controllers","item":"https:\/\/azlp.mk\/en\/controllers\/"},{"@type":"ListItem","position":3,"name":"Directions","item":"https:\/\/azlp.mk\/en\/controllers\/directions\/"},{"@type":"ListItem","position":4,"name":"Personal Data Protection Impact Assessment (PDPA)","item":"https:\/\/azlp.mk\/en\/controllers\/directions\/personal-data-protection-impact-assessment-pdpa\/"},{"@type":"ListItem","position":5,"name":"Phases of implementation of PVZLP"}]},{"@type":"WebSite","@id":"https:\/\/azlp.mk\/#website","url":"https:\/\/azlp.mk\/","name":"\u0410\u0433\u0435\u043d\u0446\u0438\u0458\u0430 \u0437\u0430 \u0437\u0430\u0448\u0442\u0438\u0442\u0430 \u043d\u0430 \u043b\u0438\u0447\u043d\u0438\u0442\u0435 \u043f\u043e\u0434\u0430\u0442\u043e\u0446\u0438","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/azlp.mk\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/azlp.mk\/en\/wp-json\/wp\/v2\/pages\/11489"}],"collection":[{"href":"https:\/\/azlp.mk\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/azlp.mk\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/azlp.mk\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/azlp.mk\/en\/wp-json\/wp\/v2\/comments?post=11489"}],"version-history":[{"count":1,"href":"https:\/\/azlp.mk\/en\/wp-json\/wp\/v2\/pages\/11489\/revisions"}],"predecessor-version":[{"id":11492,"href":"https:\/\/azlp.mk\/en\/wp-json\/wp\/v2\/pages\/11489\/revisions\/11492"}],"up":[{"embeddable":true,"href":"https:\/\/azlp.mk\/en\/wp-json\/wp\/v2\/pages\/6454"}],"wp:attachment":[{"href":"https:\/\/azlp.mk\/en\/wp-json\/wp\/v2\/media?parent=11489"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}