clearwatersecurity.com
Open in
urlscan Pro
2620:12a:8000::1
Public Scan
Submitted URL: https://go.clearwatersecurity.com/e3t/Ctc/5A+113/ckHKD04/MXdG9s4w4PqW4BVvNc5lkJsPW4KxtYX58rBrwN15bQXx3lYMRW7Y8-PT6lZ3lmW6f9kMC8h4f...
Effective URL: https://clearwatersecurity.com/blog/the-privacy-impact-assessment/?utm_medium=email&_hsmi=290563300&_hsenc=p2ANqtz-_ZDE1kcUU3KU...
Submission: On January 19 via api from US — Scanned from DE
Effective URL: https://clearwatersecurity.com/blog/the-privacy-impact-assessment/?utm_medium=email&_hsmi=290563300&_hsenc=p2ANqtz-_ZDE1kcUU3KU...
Submission: On January 19 via api from US — Scanned from DE
Form analysis
3 forms found in the DOMGET https://clearwatersecurity.com/
<form role="search" method="get" class="et-search-form" action="https://clearwatersecurity.com/">
<input type="search" class="et-search-field" placeholder="Search …" value="" name="s" title="Search for:">
</form>
POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/2783949/4be93bc2-0e8c-4e4b-915a-5dac5d057bb6
<form id="hsForm_4be93bc2-0e8c-4e4b-915a-5dac5d057bb6" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/2783949/4be93bc2-0e8c-4e4b-915a-5dac5d057bb6"
class="hs-form-private hsForm_4be93bc2-0e8c-4e4b-915a-5dac5d057bb6 hs-form-4be93bc2-0e8c-4e4b-915a-5dac5d057bb6 hs-form-4be93bc2-0e8c-4e4b-915a-5dac5d057bb6_231ca143-00e4-4a3a-95b8-b8a556f16f6a hs-form stacked"
target="target_iframe_4be93bc2-0e8c-4e4b-915a-5dac5d057bb6" data-instance-id="231ca143-00e4-4a3a-95b8-b8a556f16f6a" data-form-id="4be93bc2-0e8c-4e4b-915a-5dac5d057bb6" data-portal-id="2783949"
data-test-id="hsForm_4be93bc2-0e8c-4e4b-915a-5dac5d057bb6">
<div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-4be93bc2-0e8c-4e4b-915a-5dac5d057bb6" class="" placeholder="Enter your Email" for="email-4be93bc2-0e8c-4e4b-915a-5dac5d057bb6"><span>Email</span><span
class="hs-form-required">*</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="email-4be93bc2-0e8c-4e4b-915a-5dac5d057bb6" name="email" required="" placeholder="" type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
</div>
<div class="hs_firstname hs-firstname hs-fieldtype-text field hs-form-field"><label id="label-firstname-4be93bc2-0e8c-4e4b-915a-5dac5d057bb6" class="" placeholder="Enter your First name"
for="firstname-4be93bc2-0e8c-4e4b-915a-5dac5d057bb6"><span>First name</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="firstname-4be93bc2-0e8c-4e4b-915a-5dac5d057bb6" name="firstname" placeholder="" type="text" class="hs-input" inputmode="text" autocomplete="given-name" value=""></div>
</div>
<div class="hs_lastname hs-lastname hs-fieldtype-text field hs-form-field"><label id="label-lastname-4be93bc2-0e8c-4e4b-915a-5dac5d057bb6" class="" placeholder="Enter your Last name" for="lastname-4be93bc2-0e8c-4e4b-915a-5dac5d057bb6"><span>Last
name</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="lastname-4be93bc2-0e8c-4e4b-915a-5dac5d057bb6" name="lastname" placeholder="" type="text" class="hs-input" inputmode="text" autocomplete="family-name" value=""></div>
</div>
<div class="hs_company hs-company hs-fieldtype-text field hs-form-field"><label id="label-company-4be93bc2-0e8c-4e4b-915a-5dac5d057bb6" class="" placeholder="Enter your Company name" for="company-4be93bc2-0e8c-4e4b-915a-5dac5d057bb6"><span>Company
name</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="company-4be93bc2-0e8c-4e4b-915a-5dac5d057bb6" name="company" placeholder="" type="text" class="hs-input" inputmode="text" autocomplete="organization" value=""></div>
</div>
<div class="legal-consent-container">
<div class="hs-richtext">
<p>By clicking the submit button I agree that I have read and agree to the terms of Clearwater's privacy policy. </p>
</div>
</div>
<div class="hs_submit hs-submit">
<div class="hs-field-desc" style="display: none;"></div>
<div class="actions"><input type="submit" class="hs-button primary large" value="Submit"></div>
</div><input name="hs_context" type="hidden"
value="{"embedAtTimestamp":"1705632672478","formDefinitionUpdatedAt":"1689342030535","lang":"en","legalConsentOptions":"{\"legitimateInterestSubscriptionTypes\":[3182929,1257793],\"communicationConsentCheckboxes\":[{\"communicationTypeId\":3183534,\"label\":\"I agree to receive other communications from Clearwater Compliance.\",\"required\":false}],\"legitimateInterestLegalBasis\":\"LEGITIMATE_INTEREST_PQL\",\"communicationConsentText\":\"<p>Clearwater is committed to protecting and respecting your privacy, and we’ll only use your personal information to administer your account and to provide the products and services you requested from us. From time to time, we would like to contact you about our products and services, as well as other content that may be of interest to you. If you consent to us contacting you for this purpose, please tick below to say how you would like us to contact you:</p>\",\"processingConsentType\":\"IMPLICIT\",\"processingConsentText\":\"In order to provide you the content requested, we need to store and process your personal data. If you consent to us storing your personal data for this purpose, please tick the checkbox below.\",\"processingConsentCheckboxLabel\":\"<p>I agree to allow Clearwater to store and process my personal data.</p>\",\"privacyPolicyText\":\"<p>By clicking the submit button I agree that I have read and agree to the terms of Clearwater's privacy policy.&nbsp;</p>\",\"isLegitimateInterest\":true}","embedType":"REGULAR","disableCookieSubmission":"true","clonedFromForm":"6dd1de4f-21fc-4047-b3e8-1de18058c63b","renderRawHtml":"true","userAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.224 Safari/537.36","pageTitle":"Why You Need A Privacy Impact Assessment For Your Business - Clearwater","pageUrl":"https://clearwatersecurity.com/blog/the-privacy-impact-assessment/?utm_medium=email&_hsmi=290563300&_hsenc=p2ANqtz-_ZDE1kcUU3KUsot2h90XZn7aLHoKwCWrXeEwFOfC80Yw-gn3bNskM6RO3s5XsLwNOIjO0IhMtsOpCzIm6YfirYL8EWekvAm5FCZsmjU6eSnDLNDOA&utm_content=290563300&utm_source=hs_email","urlParams":{"utm_medium":"email","_hsmi":"290563300","_hsenc":"p2ANqtz-_ZDE1kcUU3KUsot2h90XZn7aLHoKwCWrXeEwFOfC80Yw-gn3bNskM6RO3s5XsLwNOIjO0IhMtsOpCzIm6YfirYL8EWekvAm5FCZsmjU6eSnDLNDOA","utm_content":"290563300","utm_source":"hs_email"},"isHubSpotCmsGeneratedPage":false,"hutk":"a8558f7312f33630f444819a4d86bed8","__hsfp":3725600676,"__hssc":"185014134.1.1705632673582","__hstc":"185014134.a8558f7312f33630f444819a4d86bed8.1705632673582.1705632673582.1705632673582.1","formTarget":"#hbspt-form-231ca143-00e4-4a3a-95b8-b8a556f16f6a","sfdcCampaignId":"701C0000000sX9FIAU","rumScriptExecuteTime":1918.599998474121,"rumTotalRequestTime":2190.2999954223633,"rumTotalRenderTime":2252.3999938964844,"rumServiceResponseTime":271.6999969482422,"rumFormRenderTime":62.099998474121094,"connectionType":"4g","firstContentfulPaint":0,"largestContentfulPaint":0,"locale":"en","timestamp":1705632673590,"originalEmbedContext":{"portalId":"2783949","formId":"4be93bc2-0e8c-4e4b-915a-5dac5d057bb6","region":"na1","target":"#hbspt-form-231ca143-00e4-4a3a-95b8-b8a556f16f6a","isBuilder":false,"isTestPage":false,"isPreview":false,"isMobileResponsive":true,"sfdcCampaignId":"701C0000000sX9FIAU"},"correlationId":"231ca143-00e4-4a3a-95b8-b8a556f16f6a","renderedFieldsIds":["email","firstname","lastname","company"],"captchaStatus":"NOT_APPLICABLE","emailResubscribeStatus":"NOT_APPLICABLE","isInsideCrossOriginFrame":false,"source":"forms-embed-1.4529","sourceName":"forms-embed","sourceVersion":"1.4529","sourceVersionMajor":"1","sourceVersionMinor":"4529","allPageIds":{},"_debug_embedLogLines":[{"clientTimestamp":1705632672579,"level":"INFO","message":"Retrieved pageContext values which may be overriden by the embed context: {\"pageTitle\":\"Why You Need A Privacy Impact Assessment For Your Business - Clearwater\",\"pageUrl\":\"https://clearwatersecurity.com/blog/the-privacy-impact-assessment/?utm_medium=email&_hsmi=290563300&_hsenc=p2ANqtz-_ZDE1kcUU3KUsot2h90XZn7aLHoKwCWrXeEwFOfC80Yw-gn3bNskM6RO3s5XsLwNOIjO0IhMtsOpCzIm6YfirYL8EWekvAm5FCZsmjU6eSnDLNDOA&utm_content=290563300&utm_source=hs_email\",\"userAgent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.224 Safari/537.36\",\"urlParams\":{\"utm_medium\":\"email\",\"_hsmi\":\"290563300\",\"_hsenc\":\"p2ANqtz-_ZDE1kcUU3KUsot2h90XZn7aLHoKwCWrXeEwFOfC80Yw-gn3bNskM6RO3s5XsLwNOIjO0IhMtsOpCzIm6YfirYL8EWekvAm5FCZsmjU6eSnDLNDOA\",\"utm_content\":\"290563300\",\"utm_source\":\"hs_email\"},\"isHubSpotCmsGeneratedPage\":false}"},{"clientTimestamp":1705632672582,"level":"INFO","message":"Retrieved countryCode property from normalized embed definition response: \"DE\""},{"clientTimestamp":1705632673587,"level":"INFO","message":"Retrieved analytics values from API response which may be overriden by the embed context: {\"hutk\":\"a8558f7312f33630f444819a4d86bed8\"}"}]}"><iframe
name="target_iframe_4be93bc2-0e8c-4e4b-915a-5dac5d057bb6" style="display: none;"></iframe>
</form>
POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/2783949/7ac86f62-e08c-402c-bace-dc5734256d95
<form id="hsForm_7ac86f62-e08c-402c-bace-dc5734256d95" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/2783949/7ac86f62-e08c-402c-bace-dc5734256d95"
class="hs-form-private hsForm_7ac86f62-e08c-402c-bace-dc5734256d95 hs-form-7ac86f62-e08c-402c-bace-dc5734256d95 hs-form-7ac86f62-e08c-402c-bace-dc5734256d95_a3a6f39d-82ce-497d-bace-32641844a72e hs-form stacked"
target="target_iframe_7ac86f62-e08c-402c-bace-dc5734256d95" data-instance-id="a3a6f39d-82ce-497d-bace-32641844a72e" data-form-id="7ac86f62-e08c-402c-bace-dc5734256d95" data-portal-id="2783949"
data-test-id="hsForm_7ac86f62-e08c-402c-bace-dc5734256d95">
<fieldset class="form-columns-2">
<div class="hs_firstname hs-firstname hs-fieldtype-text field hs-form-field"><label id="label-firstname-7ac86f62-e08c-402c-bace-dc5734256d95" class="" placeholder="Enter your First Name"
for="firstname-7ac86f62-e08c-402c-bace-dc5734256d95"><span>First Name</span><span class="hs-form-required">*</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="firstname-7ac86f62-e08c-402c-bace-dc5734256d95" name="firstname" required="" placeholder="" type="text" class="hs-input" inputmode="text" autocomplete="given-name" value=""></div>
</div>
<div class="hs_lastname hs-lastname hs-fieldtype-text field hs-form-field"><label id="label-lastname-7ac86f62-e08c-402c-bace-dc5734256d95" class="" placeholder="Enter your Last Name" for="lastname-7ac86f62-e08c-402c-bace-dc5734256d95"><span>Last
Name</span><span class="hs-form-required">*</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="lastname-7ac86f62-e08c-402c-bace-dc5734256d95" name="lastname" required="" placeholder="" type="text" class="hs-input" inputmode="text" autocomplete="family-name" value=""></div>
</div>
</fieldset>
<fieldset class="form-columns-2">
<div class="hs_company hs-company hs-fieldtype-text field hs-form-field"><label id="label-company-7ac86f62-e08c-402c-bace-dc5734256d95" class="" placeholder="Enter your Company Name"
for="company-7ac86f62-e08c-402c-bace-dc5734256d95"><span>Company Name</span><span class="hs-form-required">*</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="company-7ac86f62-e08c-402c-bace-dc5734256d95" name="company" required="" placeholder="" type="text" class="hs-input" inputmode="text" autocomplete="organization" value=""></div>
</div>
<div class="hs_jobtitle hs-jobtitle hs-fieldtype-text field hs-form-field"><label id="label-jobtitle-7ac86f62-e08c-402c-bace-dc5734256d95" class="" placeholder="Enter your Job Title" for="jobtitle-7ac86f62-e08c-402c-bace-dc5734256d95"><span>Job
Title</span><span class="hs-form-required">*</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="jobtitle-7ac86f62-e08c-402c-bace-dc5734256d95" name="jobtitle" required="" placeholder="" type="text" class="hs-input" inputmode="text" autocomplete="organization-title" value=""></div>
</div>
</fieldset>
<fieldset class="form-columns-2">
<div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-7ac86f62-e08c-402c-bace-dc5734256d95" class="" placeholder="Enter your Email" for="email-7ac86f62-e08c-402c-bace-dc5734256d95"><span>Email</span><span
class="hs-form-required">*</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="email-7ac86f62-e08c-402c-bace-dc5734256d95" name="email" required="" placeholder="" type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
</div>
<div class="hs_phone hs-phone hs-fieldtype-phonenumber field hs-form-field"><label id="label-phone-7ac86f62-e08c-402c-bace-dc5734256d95" class="" placeholder="Enter your Phone Number" for="phone-7ac86f62-e08c-402c-bace-dc5734256d95"><span>Phone
Number</span><span class="hs-form-required">*</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="phone-7ac86f62-e08c-402c-bace-dc5734256d95" name="phone" required="" placeholder="" type="tel" class="hs-input" inputmode="tel" autocomplete="tel" value=""></div>
</div>
</fieldset>
<fieldset class="form-columns-1">
<div class="hs_what_are_you_interested_in_discussing_ hs-what_are_you_interested_in_discussing_ hs-fieldtype-textarea field hs-form-field"><label id="label-what_are_you_interested_in_discussing_-7ac86f62-e08c-402c-bace-dc5734256d95" class=""
placeholder="Enter your Please let us know a few details about what are you interested in discussing?" for="what_are_you_interested_in_discussing_-7ac86f62-e08c-402c-bace-dc5734256d95"><span>Please let us know a few details about what are you
interested in discussing?</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><textarea id="what_are_you_interested_in_discussing_-7ac86f62-e08c-402c-bace-dc5734256d95" class="hs-input hs-fieldtype-textarea" name="what_are_you_interested_in_discussing_" placeholder=""></textarea></div>
</div>
</fieldset>
<fieldset class="form-columns-1">
<div class="hs_how_did_you_about_clearwater_ hs-how_did_you_about_clearwater_ hs-fieldtype-text field hs-form-field"><label id="label-how_did_you_about_clearwater_-7ac86f62-e08c-402c-bace-dc5734256d95" class=""
placeholder="Enter your How did you about Clearwater?" for="how_did_you_about_clearwater_-7ac86f62-e08c-402c-bace-dc5734256d95"><span>How did you about Clearwater?</span><span class="hs-form-required">*</span></label>
<legend class="hs-field-desc" style="display: block;">Let us know who referred you, if you went to an event, found us in search, or liked one of our LinkedIn posts. </legend>
<div class="input"><input id="how_did_you_about_clearwater_-7ac86f62-e08c-402c-bace-dc5734256d95" name="how_did_you_about_clearwater_" required="" placeholder="" type="text" class="hs-input" inputmode="text" value=""></div>
</div>
</fieldset>
<fieldset class="form-columns-1">
<div class="legal-consent-container">
<div class="hs-richtext">
<p>By clicking the “Submit” button below, I agree that I have read and agree to the terms of Clearwater’s <strong><a href="https://clearwatercompliance.com/privacy-policy/">Privacy Policy</a></strong>.</p>
</div>
</div>
</fieldset>
<div class="hs_submit hs-submit">
<div class="hs-field-desc" style="display: none;"></div>
<div class="actions"><input type="submit" class="hs-button primary large" value="Submit"></div>
</div><input name="hs_context" type="hidden"
value="{"embedAtTimestamp":"1705632672480","formDefinitionUpdatedAt":"1704379658612","legalConsentOptions":"{\"legitimateInterestSubscriptionTypes\":[3182929,3183534],\"communicationConsentCheckboxes\":[{\"communicationTypeId\":3183534,\"label\":\"I agree to receive other communications from Clearwater Compliance.\",\"required\":false}],\"legitimateInterestLegalBasis\":\"LEGITIMATE_INTEREST_PQL\",\"communicationConsentText\":\"Clearwater Compliance is committed to protecting and respecting your privacy, and we’ll only use your personal information to administer your account and to provide the products and services you requested from us. From time to time, we would like to contact you about our products and services, as well as other content that may be of interest to you. If you consent to us contacting you for this purpose, please tick below to say how you would like us to contact you:\",\"processingConsentType\":\"IMPLICIT\",\"processingConsentText\":\"In order to provide you the content requested, we need to store and process your personal data. If you consent to us storing your personal data for this purpose, please tick the checkbox below.\",\"processingConsentCheckboxLabel\":\"I agree to allow Clearwater Compliance to store and process my personal data.\",\"privacyPolicyText\":\"<p>By clicking the “Submit” button below, I agree that I have read and agree to the terms of Clearwater’s <strong><a href=\\\"https://clearwatercompliance.com/privacy-policy/\\\">Privacy Policy</a></strong>.</p>\",\"isLegitimateInterest\":true}","clonedFromForm":"1ae9638e-a577-4ab3-bd78-8a73221aebad","renderRawHtml":"true","userAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.224 Safari/537.36","pageTitle":"Why You Need A Privacy Impact Assessment For Your Business - Clearwater","pageUrl":"https://clearwatersecurity.com/blog/the-privacy-impact-assessment/?utm_medium=email&_hsmi=290563300&_hsenc=p2ANqtz-_ZDE1kcUU3KUsot2h90XZn7aLHoKwCWrXeEwFOfC80Yw-gn3bNskM6RO3s5XsLwNOIjO0IhMtsOpCzIm6YfirYL8EWekvAm5FCZsmjU6eSnDLNDOA&utm_content=290563300&utm_source=hs_email","urlParams":{"utm_medium":"email","_hsmi":"290563300","_hsenc":"p2ANqtz-_ZDE1kcUU3KUsot2h90XZn7aLHoKwCWrXeEwFOfC80Yw-gn3bNskM6RO3s5XsLwNOIjO0IhMtsOpCzIm6YfirYL8EWekvAm5FCZsmjU6eSnDLNDOA","utm_content":"290563300","utm_source":"hs_email"},"isHubSpotCmsGeneratedPage":false,"hutk":"a8558f7312f33630f444819a4d86bed8","__hsfp":3725600676,"__hssc":"185014134.1.1705632673582","__hstc":"185014134.a8558f7312f33630f444819a4d86bed8.1705632673582.1705632673582.1705632673582.1","formTarget":"#hbspt-form-a3a6f39d-82ce-497d-bace-32641844a72e","sfdcCampaignId":"7013c000000uC1HAAU","rumScriptExecuteTime":1949.7999954223633,"rumTotalRequestTime":2200.7999954223633,"rumTotalRenderTime":2257.599998474121,"rumServiceResponseTime":251,"rumFormRenderTime":56.80000305175781,"connectionType":"4g","firstContentfulPaint":0,"largestContentfulPaint":0,"locale":"en","timestamp":1705632673594,"originalEmbedContext":{"portalId":"2783949","formId":"7ac86f62-e08c-402c-bace-dc5734256d95","region":"na1","target":"#hbspt-form-a3a6f39d-82ce-497d-bace-32641844a72e","isBuilder":false,"isTestPage":false,"isPreview":false,"isMobileResponsive":true,"sfdcCampaignId":"7013c000000uC1HAAU"},"correlationId":"a3a6f39d-82ce-497d-bace-32641844a72e","renderedFieldsIds":["firstname","lastname","company","jobtitle","email","phone","what_are_you_interested_in_discussing_","how_did_you_about_clearwater_"],"captchaStatus":"NOT_APPLICABLE","emailResubscribeStatus":"NOT_APPLICABLE","isInsideCrossOriginFrame":false,"source":"forms-embed-1.4529","sourceName":"forms-embed","sourceVersion":"1.4529","sourceVersionMajor":"1","sourceVersionMinor":"4529","allPageIds":{},"_debug_embedLogLines":[{"clientTimestamp":1705632672591,"level":"INFO","message":"Retrieved pageContext values which may be overriden by the embed context: {\"pageTitle\":\"Why You Need A Privacy Impact Assessment For Your Business - Clearwater\",\"pageUrl\":\"https://clearwatersecurity.com/blog/the-privacy-impact-assessment/?utm_medium=email&_hsmi=290563300&_hsenc=p2ANqtz-_ZDE1kcUU3KUsot2h90XZn7aLHoKwCWrXeEwFOfC80Yw-gn3bNskM6RO3s5XsLwNOIjO0IhMtsOpCzIm6YfirYL8EWekvAm5FCZsmjU6eSnDLNDOA&utm_content=290563300&utm_source=hs_email\",\"userAgent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.224 Safari/537.36\",\"urlParams\":{\"utm_medium\":\"email\",\"_hsmi\":\"290563300\",\"_hsenc\":\"p2ANqtz-_ZDE1kcUU3KUsot2h90XZn7aLHoKwCWrXeEwFOfC80Yw-gn3bNskM6RO3s5XsLwNOIjO0IhMtsOpCzIm6YfirYL8EWekvAm5FCZsmjU6eSnDLNDOA\",\"utm_content\":\"290563300\",\"utm_source\":\"hs_email\"},\"isHubSpotCmsGeneratedPage\":false}"},{"clientTimestamp":1705632672592,"level":"INFO","message":"Retrieved countryCode property from normalized embed definition response: \"DE\""},{"clientTimestamp":1705632673591,"level":"INFO","message":"Retrieved analytics values from API response which may be overriden by the embed context: {\"hutk\":\"a8558f7312f33630f444819a4d86bed8\"}"}]}"><iframe
name="target_iframe_7ac86f62-e08c-402c-bace-dc5734256d95" style="display: none;"></iframe>
</form>
Text Content
× This site uses cookies to provide you with a more personalized experience and to improve our website. By using our website you agree to our use of cookies in accordance with our updated Privacy Policy I Agree Decline * Managed Services * ClearAdvantage® Program * ClearConfidence™ Program * Managed Security Services * Patient Privacy Monitoring Services * Vendor Risk Management as a Service * Cybersecurity Assist Partner Program (CAPP) * Cybersecurity * Program Leadership & Transformation * OCR-Quality® Risk Analysis * OCR-Quality® Risk Response * Resiliency Services * Security Engineering * Technical Testing * NIST CSF Maturity Assessment * Vendor Risk Management * Cloud Security * Medical Device Security * 405(d) HICP Assessment * Security Controls Validation Assessment * Compliance * HIPAA * SOC 2 Readiness * HITRUST * Additional Privacy & Compliance Assessments * CMMC * IRM|Pro® Software * IRM|Analysis® * IRM|Privacy® * IRM|Security® * IRM|405(d) HICP™ * Who We Serve * Hospitals & Health Systems * Regional & Critical Access Hospitals * Physician Practice Management Groups * Digital Health * Medical Devices/MedTech * Healthcare Business Service Providers * Health Plans * Healthcare Attorneys * Healthcare Investors * About Us * Company Overview * Leadership * Mission & Values * Careers * News * Resources * Blog * Webinars & Events * Case Studies * On-Demand Webinars * White Papers * eBooks * Podcasts * Book: Stop the Cyber Bleeding * Contact Select Page * Managed Services * ClearAdvantage® Program * ClearConfidence™ Program * Managed Security Services * Patient Privacy Monitoring Services * Vendor Risk Management as a Service * Cybersecurity Assist Partner Program (CAPP) * Cybersecurity * Program Leadership & Transformation * OCR-Quality® Risk Analysis * OCR-Quality® Risk Response * Resiliency Services * Security Engineering * Technical Testing * NIST CSF Maturity Assessment * Vendor Risk Management * Cloud Security * Medical Device Security * 405(d) HICP Assessment * Security Controls Validation Assessment * Compliance * HIPAA * SOC 2 Readiness * HITRUST * Additional Privacy & Compliance Assessments * CMMC * IRM|Pro® Software * IRM|Analysis® * IRM|Privacy® * IRM|Security® * IRM|405(d) HICP™ * Who We Serve * Hospitals & Health Systems * Regional & Critical Access Hospitals * Physician Practice Management Groups * Digital Health * Medical Devices/MedTech * Healthcare Business Service Providers * Health Plans * Healthcare Attorneys * Healthcare Investors * About Us * Company Overview * Leadership * Mission & Values * Careers * News * Resources * Blog * Webinars & Events * Case Studies * On-Demand Webinars * White Papers * eBooks * Podcasts * Book: Stop the Cyber Bleeding * Contact Blog THE PRIVACY IMPACT ASSESSMENT: IDENTIFYING AND MINIMIZING RISKS OF PII EXPOSURE As regulators and consumers alike apply greater scrutiny to how patient data is being shared across the healthcare ecosystem, privacy impact assessments (PIA) have become an important tool for organizations to identify and address risks to personally identifiable information (PII) and demonstrate transparency in collecting and processing practices. What is Personally Identifiable Information (PII)? PII is information that can be used to distinguish or trace an individual’s identity alone or when combined with other information that may be linked to a specific individual. Examples of PII could be identifiable numbers (e.g., social security, passport, driver’s license, vehicle identification, etc.), general personal information (e.g., names, addresses), employment information, biometrics, and/or medical information. Protected health information, or PHI, is a subset of PII, specifically referring to health information shared with HIPAA covered entities. Medical records, lab reports, and hospital bills are PHI, along with any information relating to an individual’s past, present, or future physical or mental health. In this blog, we will focus on the broader category of PII. The Purpose of a PIA A PIA analyzes how PII is collected, used, shared, and maintained. Organizations and government agencies perform and document PIAs to identify the effect that implementing technology, programs, and practices might have on PII. The assessment demonstrates that an organization has consciously incorporated privacy protections throughout the lifecycle of a system or program. Mature PIA processes incorporate recommendations for managing, minimizing, or eliminating risks. The PIA also provides decision-makers with the information necessary to make informed decisions based on an understanding of the privacy risks and the options available for mitigating those risks. The Relationship Between Privacy Impact Assessments and Security Risk Assessments Organizations routinely perform data security risk assessments that evaluate the security of information technology systems to protect against and respond to cybersecurity events. Organizations should implement adequate security controls to assure the confidentiality of PII, in addition to the other benefits of performing security risk assessments. While PIAs and security risk assessments may sometimes overlap, each assessment serves distinct purposes and addresses different organizational concerns. PIAs focus on more than security. As described later in this blog, PIAs address procedures for providing the individual with notice, obtaining consent for collecting and processing PII, responding to rights requests, and identifying the purpose for collecting and processing PII. A security risk assessment addresses security and technology infrastructure and the controls implemented to protect the organization’s technology environment. The PIA and the security risk assessment play important roles in identifying risks for organizations in different ways. The PIA Process The first step in a PIA is determining whether implementing technology, programs, or practices requires collecting, storing, analyzing, sharing, or destroying PII. Determining whether a project meets this threshold requires a thorough understanding of all aspects of a project. Questions to consider at this stage of the project include: * What PII is collected? How is the information collected? How will the PII be used? Who will have access to the PII? To whom will the PII be shared? What safeguards are in place to secure PII? How long will the PII be retained? How will the PII be decommissioned and disposed of? * What categories of PII are to be collected (e.g., general identifying information, health information, employment information, etc.)? * Does the collecting or processing of PII present risks to the privacy of the person, personal behavior, personal communications, and personal data? How will those risks be mitigated? * Are there opportunities for individuals to decline to provide information (i.e., where providing information is voluntary) or to consent to the use of the information? Organizations should develop a formal process to document PIAs and record the following information: * Types of PII collected and processed * The purpose of collecting the PII * The intended uses of the PII * Whether PII will be shared with third parties and the types of third parties that may receive or have access to the PII * Opportunities individuals will have to opt out of the collecting or processing of their PII * A description of security and protections for how PII will be secured * The life cycle of the PII Ideally, PIAs should be completed before implementing a project, product, or service and should be ongoing through the lifecycle of the project, technology, programs, or practices. A PIA should be completed early enough in the project so that its findings can influence the overall design or outcome. Failure to undertake a PIA at this point may expose organizations to risks such as privacy breaches, negative publicity, and loss of public trust. PIA Requirements and Outcomes Organizations should consider whether they have regulatory requirements to implement PIA processes, such as the General Data Protection Regulation (GDPR) in the European Union, government contract requirements in the United States (U.S.), and different U.S. data privacy laws passed by multiple states in recent years. Although organizations may be mandated by laws or regulations to complete PIAs, the PIA has also become a best practice for identifying, evaluating, and mitigating privacy risks even when there is no legal or regulatory requirement to do so. The PIA process from the various regulatory requirements and guidelines can be summarized in the following components: * Project Initiation: This is where the actual scope of the PIA process is determined and defined. * Data Flow Analysis: This is where a detailed data mapping is analyzed to determine how the PII flows through the organization. * Privacy Analysis: This is the due diligence process in which questionnaires are used to interview workforce members about the purpose of the technology, program, or practices, the categories of PII that may be impacted, and to identify privacy risks and issues associated with the intended project. * Privacy Impact Assessment Report: This report formally documents the privacy risks, associated implications of those risks, and possible remedies or mitigation plans. Decision-makers should review and approve the report. The approved PIA report serves as an effective communications tool that demonstrates a commitment to transparency and shows that the project has been designed with privacy in mind. The PIA report should include the following: * Recommendations on how to manage or mitigate privacy risks, as well as any privacy risks that cannot be mitigated * The outcome of privacy impact analysis and compliance checks * A description of the information flows involved in the project A PIA can reveal where organizations have weaknesses regarding the PII it collects and processes. Assessment findings can serve as helpful reminders to collect PII only for the specific purposes disclosed to individuals, inform the individual about the purposes for collecting and processing PII, respond to individuals’ requests about their PII, and safely dispose of the PII when it has served that purpose. Demonstrating your commitment to privacy by conducting a PIA may be reputationally, legally, and financially important if a breach of PII occurs. View All Resources NEWSLETTER SIGN UP TO RECEIVE OUR MONTHLY NEWSLETTER FEATURING RESOURCES CURATED SPECIFICALLY TO YOUR CONCERNS. Email* First name Last name Company name By clicking the submit button I agree that I have read and agree to the terms of Clearwater's privacy policy. RELATED BLOGS A LOOK AT HITRUST VERSION 11: EVERYTHING YOU NEED TO KNOW Blog As organizations that are HITRUST certified, pursuing certification, or have been making plans to do so review the ... Read More ACTIVE INCIDENT RESPONSE PLANNING: FIND IT, FIX IT, AND GO FORWARD Blog As healthcare continues to top the list of industries targeted by cyberattacks—and has the highest cost of a ... Read More 10 MUST-HAVE CYBER DEFENSES TO HELP YOU GET—AND KEEP—CYBER INSURANCE COVERAGE Blog Driven largely by an ongoing increase in ransomware attacks and payouts, cyber insurance carriers today require ... Read More CONNECT WITH US First Name* Last Name* Company Name* Job Title* Email* Phone Number* Please let us know a few details about what are you interested in discussing? How did you about Clearwater?*Let us know who referred you, if you went to an event, found us in search, or liked one of our LinkedIn posts. By clicking the “Submit” button below, I agree that I have read and agree to the terms of Clearwater’s Privacy Policy. * Managed Services * ClearAdvantage® * ClearConfidence™ * Managed Security Services * Patient Privacy Monitoring Services * Vendor Risk Management as a Service * Cybersecurity Assist Partner Program (CAPP) * Cybersecurity * Program Leadership & Management * OCR-Quality® Risk Analysis * OCR-Quality® Risk Response * Resiliency Services * Security Engineering * Technical Testing * NIST CSF Maturity Assessment * Vendor Risk Management * Cloud Security * Medical Device Security * 405(d) HICP Assessment * Security Controls Validation Assessment * Compliance * HIPAA * SOC 2 Readiness * HITRUST * Additional Privacy & Compliance Assessments * CMMC * IRM|Pro® Software * IRM|Analysis® * IRM|Privacy® * IRM|Security® * IRM|405(d) HICP™ * Who We Serve * Hospitals & Health Systems * Regional & Critical Access Hospitals * Physician Practice Management Groups * Digital Health * Medical Devices/MedTech * Health Plans * Healthcare Attorneys * Healthcare Investors * Healthcare Business Service Providers * Resources * Blog * Case Studies * Webinars & Events * On-Demand Webinars * White Papers * eBooks * Podcasts * Book: Stop the Cyber Bleeding * About Us * Company Overview * Leadership * Mission & Values * Careers * News * Contact * Managed Services * ClearAdvantage® * ClearConfidence™ * Managed Security Services * Patient Privacy Monitoring Services * Vendor Risk Management as a Service * Cybersecurity Assist Partner Program (CAPP) * Cybersecurity * Program Leadership & Management * OCR-Quality® Risk Analysis * OCR-Quality® Risk Response * Resiliency Services * Security Engineering * Technical Testing * NIST CSF Maturity Assessment * Vendor Risk Management * Cloud Security * Medical Device Security * 405(d) HICP Assessment * Security Controls Validation Assessment * Compliance * HIPAA * SOC 2 Readiness * HITRUST * Additional Privacy & Compliance Assessments * CMMC * IRM|Pro® Software * IRM|Analysis® * IRM|Privacy® * IRM|Security® * IRM|405(d) HICP™ * Who We Serve * Hospitals & Health Systems * Regional & Critical Access Hospitals * Physician Practice Management Groups * Digital Health * Medical Devices/MedTech * Health Plans * Healthcare Attorneys * Healthcare Investors * Healthcare Business Service Providers * Resources * Blog * Case Studies * Webinars & Events * On-Demand Webinars * White Papers * eBooks * Podcasts * Book: Stop the Cyber Bleeding * About Us * Company Overview * Leadership * Mission & Values * Careers * News * Contact Terms of Use | Privacy Policy ©2024 Clearwater Security & Compliance LLC