Privacy Impact Assessment
Description: A Privacy Impact Assessment (PIA) is a tool that can be used to assess the privacy impacts of a new project and where necessary, identify ways in which the obligations set out in privacy legislations.
Reasons to use this framework:
> Identify risks to personal identifiable information during projects.
> Establishing a ‘privacy by design approach’ to information handling.
Publisher: Hawkstream
Jurisdiction: Global
Attribution: https://hawkstream.io
Consumer Data Rights Privacy safeguard checklist
Description: The Consumer Data Right is designed to keep your data secure and protect your privacy. The Consumer Data Right privacy safeguards in the Australian Competition and Consumer Act 2010 set out your privacy rights and the strict obligations on businesses collecting and handling your data. There are 13 legally binding privacy safeguards.
Reasons to use this framework:
> Ensure your company can interact and collect customer information inline with privacy legislation requirements.
> Identify privacy risk control gaps.
> Suitable for organisations of all sizes*.
Publisher: Adapted by Hawkstream from Office of the Australian Information Commissioner (OAIC) under Creative Commons Licence.
Jurisdiction: Australia
Original content attribution: https://www.oaic.gov.au/
ICO Data Protection - Checklist
Description: The checklist covers a range of data protection controls broadly useful to controlling risks relevant to smaller organisations.
Reasons to use this framework:
> Simple and practical data protection controls.
> Identify risk control gaps.> Suitable for small and medium sized organisations.
> Complementary to other cyber security control frameworks.
Publisher: Adapted by Hawkstream from Information Commissioner’s Office (ICO) under Open Government Licence.
Jurisdiction: United Kingdom
Original content attribution: https://ico.org.uk/
NIST - CSF Checklist for Small & Medium Organisations
Description: Based on NIST Cyber Security Framework; a simple and high level cyber risk assessment.
Reasons to use this framework:
> Simple and practical cyber risk assessment.
> Suitable for small and medium organisations*.
Publisher: Adapted by Hawkstream from National Institute of Standards and Technology (NIST) - cyber security framework.
Jurisdiction: United States
Attribution: https://www.nist.gov/
Third party Cyber Security Risk Assessment
Description: Third party cyber risk assessments help to understand the risks to data when utilising third party vendors' products and services.Assessing vendors routinely can help to keep informed about changes to security postures and work with vendors to remediate
Reasons to use this framework:
> Identify specific gaps in vendors' cyber and privacy risk controls.
> Suitable for organisations of all sizes*.
Publisher: Hawkstream
Jurisdiction: Global
Cloud Computing Security Checklist
Description: The checklist questions are intended to identify and manage relevant information security risks associated with the evolving field of cloud computing.
Reasons to use this framework:
> Evaluate cloud risk controls.
> Suitable for organisations of all sizes*.
Publisher: Adapted by Hawkstream from Australian Cyber Security Centre (ACSC) under Creative Commons Licence.
Jurisdiction: Australia
Attribution: https://www.cyber.gov.au/
Identity & Access Management Checklist
Description: Identity and access management is a key part of cyber security as it ensures the right people have access to an organisation’s information.
Reasons to use this framework:
> Ensure your organisation has the fundamental risk controls.
Publisher: Hawkstream
Jurisdiction: Global
Australian Privacy Principles (APP)
Description: The Australian Privacy Principles are the cornerstone of the Privacy Act 1988.
Reasons to use this framework:
> Comply with Australian Privacy Act 1988 (legislation).
Publisher: Adapted by Hawkstream from Office of the Australian Information Commissioner (OAIC) under Creative Commons Licence.
Jurisdiction: Australia
Attribution: https://www.oaic.gov.au/
Data Protection Impact Assessment (DPIA)
Description: A Data Protection Impact Assessment (DPIA) is required when processing activities are likely to result in a high risk to the rights and freedoms of individuals. This requirement is outlined in Article 35 of the General Data Protection Regulation (GDPR). DPIAs help organisations assess, identify, and minimise risks related to data processing activities.
Reasons to use this framework:
> Comply with GDPR.
> Identify Data Protection Risks
Publisher: Hawkstream
Jurisdiction: EU
Cyber Security Principles Maturity Checklist
Description: The purpose of the cyber security principles is to provide strategic guidance on how an organisation can protect their systems and data from cyber threats.
Reasons to use this framework:
> Align your cyber security program around guiding principles.
> Suitable for organisations of all sizes.
Publisher: Adapted by Hawkstream from Australian Cyber Security Centre (ACSC) under Creative Commons Licence.
Jurisdiction: Australia
Attribution: https://www.cyber.gov.au/