Privacy Impact Assessment (APIA) System
The AvePoint Privacy Impact Assessment (APIA) System can help you automate the process of evaluating, assessing and reporting on the privacy implications of your enterprise IT systems. Exclusively available through the IAPP, the APIA System allows you to select questions from the prepopulated bank of PIA questions or create your own, meaning you can build and save PIA templates to be reused and reported out.
- Comply with Privacy Regulations
- Automate Privacy Impact Assessments
- Report on PIAs for Stakeholder Review
- Extend to Security and Vulnerability Assessments
Notes on Installing and Configuring APIA
- APIA is a web application that is designed to be installed and run on a web server. It is recommended that the installation be performed by an IT professional familiar with configuring Services, Websites, and Databases.
- Most laptop or desktop PCs will not have all the required software services installed or enabled in order to allow the application to be successfully installed. However, APIA will automatically detect any missing components in the environment, and will also automatically install and enable all such required components and services.
- If installing to a non-server laptop or desktop computer, you will not have the ability to provide access to the system to others participating in the assessment (i.e., it will be limited to local access on the machine on which it is installed).
Free Web Conference Recording
Installing and Configuring the APIA System
TAKE AN UP-CLOSE LOOK
Click here for the full list and to download templates that suit your needs.
Connect with other privacy experts, get insight and share ideas on the APIA Forum, a community discussion board.
Click here to go to the AvePoint support site.
Help Make APIA Better
Have you created a PIA question set that you think others would find useful? Use this submission form to share your PIA and help others in the industry. It’s as simple as answering a few questions, like the applicable industry and region, and attaching your PIA. And thanks for being a productive part of the IAPP community!
Download PIA Templates Contributed by the Privacy Community
Third Party Vendor Assessment TemplateThe Third party vendor assessment is a collection of sample questions designed to allow a company to build a consistent and repeatable process for managing due diligence procedures for value-added resellers, solutions partners, perpetual referral partners, and all Intermediaries that interact with government officials, customers, or investors on an ongoing basis behalf of the Company. This template is provided “as-is” with no warranties or assumptions of liability of any kind and as with all APIA templates should be modified to meet the compliance practices of each user and organization.
Cloud Readiness Assessment TemplateThe Cloud Readiness assessment is acollection of sample questions designed to allow a company to understandcurrent “data discovery and classification” practices as part building an informed decision about readiness for and migration of data and applications to a cloud provider. This template is provided “as-is” with no warranties or assumptions of liability of any kind and as with all APIA templates should be modified to meet the compliance practices of each user and organization.
ISO/IEC 27002 Code of Practice for Information Security Controls TemplateISO/IEC 27002:2013 is an international best practice standard for a set of commonly used information security controls. Whilst none of the controls are mandatory or exhaustive, the standard is commonly used as a “cross check” to ensure organizations have not overlooked any important security areas. It is also referenced by ISO 27001, which requires that an organization undertake an information security risk assessment and, as part of that process, looks to ISO 27002 controls as a basis for risk treatment and to produce a “statement of applicability” that references the controls chosen for selection based on the organization’s risk appetite.Here
This APIA template is designed to list the controls found in ISO 27002 and turn them into a set of questions to allow security managers to “self-assess” any gaps in their control framework. However it is recommended that organizations first perform a risk assessment to determine the applicability of the controls.
ISO/IEC 27001 Information Security Management TemplateISO/IEC 27001:2013 is the international standard for creating an information security management system. The standard is designed to be a framework and an approach for organizations regardless of size, industry or location and aims to ensure an organization has an effective, continually improving management regime and focuses on planning a level of security “appropriate” to the organisation's legal, regulatory and contractual requirements and management risk appetite. Here
This APIA template takes the requirements of ISO 27001 and turns them into a set of questions, so that organisations, security managers and auditors can “self-assess” themselves or their partners against the requirements for assurance of compliance.
UK Information Commissioner's Office PIA TemplateThis template was created to align with PIA guidance issued by the UK Information Commissioner's Office.
Singapore PDPC Privacy Impact Assessment TemplateThis template was created to align with PIA guidance issued by the Personal Data Protection Commission of Singapore.