ํ•ญํ•ด
GDPR > ์ œ35์กฐ. ๊ฐœ์ธ์ •๋ณด๋ณดํ˜ธ ์˜ํ–ฅํ‰๊ฐ€
๋‹ค์šด๋กœ๋“œ PDF

์ œ35์กฐ GDPR. ๊ฐœ์ธ์ •๋ณด๋ณดํ˜ธ ์˜ํ–ฅํ‰๊ฐ€

Article 35 GDPR. Data protection impact assessment

1. ์ฒ˜๋ฆฌ์˜ ์„ฑ๊ฒฉ๊ณผ ๋ฒ”์œ„, ์ƒํ™ฉ, ๋ชฉ์ ์„ ์ฐธ์ž‘ํ•˜์—ฌ, ํŠนํžˆ ์‹ ๊ธฐ์ˆ ์„ ์‚ฌ์šฉํ•˜๋Š” ์ฒ˜๋ฆฌ ์œ ํ˜•์ด ๊ฐœ์ธ์˜ ๊ถŒ๋ฆฌ์™€ ์ž์œ ์— ์ค‘๋Œ€ํ•œ ์œ„ํ—˜์„ ์ดˆ๋ž˜ํ•  ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒ๋˜๋Š” ๊ฒฝ์šฐ, ์ปจํŠธ๋กค๋Ÿฌ๋Š” ์ฒ˜๋ฆฌ ์ด์ „์—, ์˜ˆ์ •๋œ ์ฒ˜๋ฆฌ ์ž‘์—…์ด ๊ฐœ์ธ์ •๋ณด ๋ณดํ˜ธ์— ๋ฏธ์น˜๋Š” ์˜ํ–ฅ์— ๋Œ€ํ•œ ํ‰๊ฐ€๋ฅผ ์ˆ˜ํ–‰ํ•ด์•ผ ํ•œ๋‹ค. ํ•œ ๋ฒˆ์˜ ํ‰๊ฐ€๋กœ ์œ ์‚ฌํ•œ ์ค‘๋Œ€ํ•œ ์œ„ํ—˜์„ ์ดˆ๋ž˜ํ•˜๋Š” ์ผ๋ จ์˜ ์œ ์‚ฌ ์ฒ˜๋ฆฌ ์ž‘์—…์„ ๋‹ค๋ฃฐ ์ˆ˜ ์žˆ๋‹ค.

1. Where a type of processing in particular using new technologies, and taking into account the nature, scope, context and purposes of the processing, is likely to result in a high risk to the rights and freedoms of natural persons, the controller shall, prior to the processing, carry out an assessment of the impact of the envisaged processing operations on the protection of personal data. A single assessment may address a set of similar processing operations that present similar high risks.

ISO 27701

(EN) ISO/IEC 27701, adopted in 2019, added additional ISO/IEC 27002 guidance for PII processors.

Here is the relevant paragraph to articles 35(1) GDPR:

8.2.1 Customer agreement

Control

The organization should ensure, where relevant, that the contract to process PII addresses the organizationโ€™s role in providing assistance with the customerโ€™s obligations (taking into account the nature of processing and the information available to the organization).

Implementation guidance

The contract between the organization and the customer should include the following wherever relevant, and depending on the customer’s role (PII controller or PII processor) (this list is neither definitive nor exhaustive):


์ „์ฒด ํ…์ŠคํŠธ์— ์•ก์„ธ์Šคํ•˜๋ ค๋ฉด

๊ด€๋ จ ๊ต๊ณผ์„œ

2. ์ปจํŠธ๋กค๋Ÿฌ๋Š” ๋ฐ์ดํ„ฐ๋ณดํ˜ธ๋‹ด๋‹น๊ด€์ด ์ง€์ •๋œ ๊ฒฝ์šฐ, ๊ฐœ์ธ์ •๋ณด๋ณดํ˜ธ ์˜ํ–ฅํ‰๊ฐ€๋ฅผ ์ˆ˜ํ–‰ํ•  ๋•Œ, ๋‹ด๋‹น๊ด€์˜ ์ž๋ฌธ์„ ๊ตฌํ•ด์•ผ ํ•œ๋‹ค.

2. The controller shall seek the advice of the data protection officer, where designated, when carrying out a data protection impact assessment.

3. ์ œ1ํ•ญ์— ๊ทœ์ •๋œ ๊ฐœ์ธ์ •๋ณด๋ณดํ˜ธ ์˜ํ–ฅํ‰๊ฐ€๋Š” ํŠนํžˆ ๋‹ค์Œ ๊ฐ ํ˜ธ์˜ ๊ฒฝ์šฐ ์š”๊ตฌ๋˜์–ด์•ผ ํ•œ๋‹ค.

3. A data protection impact assessment referred to in paragraphย 1 shall in particular be required in the case of:

(a) ํ”„๋กœํŒŒ์ผ๋ง ๋“ฑ์˜ ์ž๋™ํ™”๋œ ์ฒ˜๋ฆฌ์— ๊ทผ๊ฑฐํ•œ, ๊ฐœ์ธ์— ๊ด€ํ•œ ๊ฐœ์ธ์  ์ธก๋ฉด์„ ์ฒด๊ณ„์ ์ด๊ณ  ๊ด‘๋ฒ”์œ„ํ•˜๊ฒŒ ํ‰๊ฐ€ํ•˜๋Š” ๊ฒƒ์œผ๋กœ ํ•ด๋‹น ํ‰๊ฐ€์— ๊ทผ๊ฑฐํ•œ ๊ฒฐ์ •์ด ํ•ด๋‹น ๊ฐœ์ธ์—๊ฒŒ ๋ฒ•์  ํšจ๋ ฅ์„ ๋ฏธ์น˜๊ฑฐ๋‚˜ ์ด์™€ ์œ ์‚ฌํ•˜๊ฒŒ ๊ฐœ์ธ์—๊ฒŒ ์ค‘๋Œ€ํ•œ ์˜ํ–ฅ์„ ๋ฏธ์น˜๋Š” ๊ฒฝ์šฐ

(a)ย a systematic and extensive evaluation of personal aspects relating to natural persons which is based on automated processing, including profiling, and on which decisions are based that produce legal effects concerning the natural person or similarly significantly affect the natural person;

(b) ์ œ9์กฐ(1)์— ๊ทœ์ •๋œ ํŠน๋ณ„ ๋ฒ”์ฃผ์˜ ๊ฐœ์ธ์ •๋ณด์— ๋Œ€ํ•œ ๋Œ€๊ทœ๋ชจ ์ฒ˜๋ฆฌ๋‚˜ ์ œ10์กฐ์— ๊ทœ์ •๋œ ๋ฒ”์ฃ„๊ฒฝ๋ ฅ ๋ฐ ๋ฒ”์ฃ„ ํ–‰์œ„์— ๊ด€๋ จ๋œ ๊ฐœ์ธ์ •๋ณด์— ๋Œ€ํ•œ ์ฒ˜๋ฆฌ

(b)ย processing on a large scale of special categories of data referred to in Articleย 9(1), or of personal data relating to criminal convictions and offences referred to in Articleย 10; or

๊ด€๋ จ ๊ต๊ณผ์„œ

(c) ๊ณต๊ฐœ์ ์œผ๋กœ ์ ‘๊ทผ ๊ฐ€๋Šฅํ•œ ์ง€์—ญ์— ๋Œ€ํ•œ ๋Œ€๊ทœ๋ชจ์˜ ์ฒด๊ณ„์  ๋ชจ๋‹ˆํ„ฐ๋ง

(c)ย a systematic monitoring of a publicly accessible area on a large scale.

4. ๊ฐ๋…๊ธฐ๊ด€์€ ์ œ1ํ•ญ์— ๋”ฐ๋ผ ๊ฐœ์ธ์ •๋ณด๋ณดํ˜ธ ์˜ํ–ฅํ‰๊ฐ€์˜ ์š”๊ฑด์ด ์ ์šฉ๋˜๋Š” ์ฒ˜๋ฆฌ ์ž‘์—…์˜ ์ข…๋ฅ˜์˜ ๋ชฉ๋ก์„ ์ž‘์„ฑ ๋ฐ ๊ณต๊ฐœํ•ด์•ผ ํ•œ๋‹ค. ๊ฐ๋…๊ธฐ๊ด€์€ ์ œ68์กฐ์— ๊ทœ์ •๋œ ์œ ๋Ÿฝ ๋ฐ์ดํ„ฐ๋ณดํ˜ธ์ด์‚ฌํšŒ์— ํ•ด๋‹น ๋ชฉ๋ก์„ ํ†ต๋ณดํ•ด์•ผ ํ•œ๋‹ค.

4. The supervisory authority shall establish and make public a list of the kind of processing operations which are subject to the requirement for a data protection impact assessment pursuant to paragraphย 1. The supervisory authority shall communicate those lists to theย Board referred to in Article 68.

๊ด€๋ จ ๊ต๊ณผ์„œ

5. ๊ฐ๋…๊ธฐ๊ด€์€ ๊ฐœ์ธ์ •๋ณด๋ณดํ˜ธ ์˜ํ–ฅํ‰๊ฐ€๊ฐ€ ์š”๊ตฌ๋˜์ง€ ์•Š๋Š” ์ฒ˜๋ฆฌ ์ž‘์—…์˜ ์ข…๋ฅ˜์˜ ๋ชฉ๋ก ๋˜ํ•œ ์ž‘์„ฑํ•˜์—ฌ ๊ณต๊ฐœํ•  ์ˆ˜ ์žˆ๋‹ค. ๊ฐ๋…๊ธฐ๊ด€์€ ์œ ๋Ÿฝ ๋ฐ์ดํ„ฐ๋ณดํ˜ธ์ด์‚ฌํšŒ์— ํ•ด๋‹น ๋ชฉ๋ก์„ ํ†ต๋ณดํ•ด์•ผ ํ•œ๋‹ค.

5. The supervisory authority may also establish and make public a list of the kind of processing operations for which no data protection impact assessment is required. The supervisory authority shall communicate those lists to the Board.

6. ์ œ4ํ•ญ ๋ฐ ์ œ5ํ•ญ์— ๊ทœ์ •๋œ ๋ชฉ๋ก์„ ์ฑ„ํƒํ•˜๊ธฐ ์ด์ „์—, ๊ด€๋ จ ๊ฐ๋…๊ธฐ๊ด€์€ ํ•ด๋‹น ๋ชฉ๋ก์ด ๋ณต์ˆ˜์˜ ํšŒ์›๊ตญ ๋‚ด์˜ ์ •๋ณด์ฃผ์ฒด์—๊ฒŒ ์žฌํ™”์™€ ์„œ๋น„์Šค๋ฅผ ์ œ๊ณตํ•˜๊ฑฐ๋‚˜ ๊ทธ๋“ค์˜ ํ–‰๋™์„ ๋ชจ๋‹ˆํ„ฐ๋ง ํ•˜๋Š” ๊ฒƒ๊ณผ ๊ด€๋ จ๋œ ์ฒ˜๋ฆฌํ™œ๋™์— ๊ด€๊ณ„๊ฐ€ ์žˆ๋Š” ๊ฒฝ์šฐ, ๋˜๋Š” ์œ ๋Ÿฝ์—ฐํ•ฉ ๋‚ด ๊ฐœ์ธ์ •๋ณด์˜ ์ž์œ ๋กœ์šด ์ด๋™์— ์ƒ๋‹นํ•œ ์˜ํ–ฅ์„ ๋ฏธ์น  ์ˆ˜ ์žˆ๋Š” ์ฒ˜๋ฆฌํ™œ๋™๊ณผ ๊ด€๋ จ ์žˆ๋Š” ๊ฒฝ์šฐ, ์ œ63์กฐ์— ๊ทœ์ •๋œ ์ผ๊ด€์„ฑ ๋ฉ”์ปค๋‹ˆ์ฆ˜์„ ์ ์šฉํ•ด์•ผ ํ•œ๋‹ค.

6. Prior to the adoption of the lists referred to in paragraphs 4 and 5, the competent supervisory authority shall apply the consistency mechanism referred to in Articleย 63 where such lists involve processing activities which are related to the offering of goods or services to data subjects or to the monitoring of their behaviour in several Memberย States, or may substantially affect the free movement of personal data within the Union.

๊ด€๋ จ ๊ต๊ณผ์„œ

7. ํ‰๊ฐ€๋Š” ์ตœ์†Œํ•œ ๋‹ค์Œ์˜ ๊ฐ ํ˜ธ๋ฅผ ํฌํ•จํ•ด์•ผ ํ•œ๋‹ค.

7. The assessment shall contain at least:

(a) ์˜ˆ์ƒ๋˜๋Š” ์ฒ˜๋ฆฌ ์ž‘์—… ๋ฐ ์ปจํŠธ๋กค๋Ÿฌ์˜ ์ •๋‹นํ•œ ์ด์ต ๋“ฑ ๊ฐœ์ธ์ •๋ณด ์ฒ˜๋ฆฌ์˜ ๋ชฉ์ ์— ๋Œ€ํ•œ ์ฒด๊ณ„์ ์ธ ์„ค๋ช…

(a)ย a systematic description of the envisaged processing operations and the purposes of the processing, including, where applicable, the legitimate interest pursued by the controller;

(b) ๋ชฉ์ ๊ณผ ๊ด€๋ จํ•œ ์ฒ˜๋ฆฌ ์ž‘์—…์˜ ํ•„์š”์„ฑ ๋ฐ ๋น„๋ก€์„ฑ์— ๋Œ€ํ•œ ํ‰๊ฐ€

(b)ย an assessment of the necessity and proportionality of the processing operations in relation to the purposes;

(c) ์ œ1ํ•ญ์— ๊ทœ์ •๋œ ์ •๋ณด์ฃผ์ฒด์˜ ๊ถŒ๋ฆฌ์™€ ์ž์œ ์— ๋Œ€ํ•œ ์œ„ํ—˜์„ฑ ํ‰๊ฐ€;

(c)ย an assessment of the risks to the rights and freedoms of data subjects referred to in paragraphย 1; and

(d) ์ •๋ณด์ฃผ์ฒด์™€ ๊ธฐํƒ€ ๊ด€๋ จ์ธ์˜ ๊ถŒ๋ฆฌ ๋ฐ ์ •๋‹นํ•œ ์ด์ต์„ ๊ณ ๋ คํ•˜์—ฌ ๊ฐœ์ธ์ •๋ณด์˜ ๋ณดํ˜ธ๋ฅผ ๋ณด์žฅํ•˜๊ณ  ๋ณธ ๊ทœ์ •์˜ ์ค€์ˆ˜๋ฅผ ์ž…์ฆํ•˜๊ธฐ ์œ„ํ•œ ์•ˆ์ „์กฐ์น˜, ๋ณด์•ˆ์กฐ์น˜, ๋ฉ”์ปค๋‹ˆ์ฆ˜ ๋“ฑ ์œ„ํ—˜์„ฑ ์ฒ˜๋ฆฌ์— ์˜ˆ์ƒ๋˜๋Š” ์กฐ์น˜

(d)ย the measures envisaged to address the risks, including safeguards, security measures and mechanisms to ensure the protection of personal data and to demonstrate compliance with this Regulation taking into account the rights and legitimate interests of data subjects and other persons concerned.

8. ํŠนํžˆ ๊ฐœ์ธ์ •๋ณด๋ณดํ˜ธ ์˜ํ–ฅํ‰๊ฐ€๋ฅผ ์œ„ํ•ด ๊ด€๋ จ ์ปจํŠธ๋กค๋Ÿฌ๋‚˜ ํ”„๋กœ์„ธ์„œ๊ฐ€ ์ˆ˜ํ–‰ํ•˜๋Š” ์ฒ˜๋ฆฌ ์ž‘์—…์˜ ์˜ํ–ฅ์„ ํ‰๊ฐ€ํ•  ๋•Œ๋Š” ํ•ด๋‹น ์ปจํŠธ๋กค๋Ÿฌ๋‚˜ ํ”„๋กœ์„ธ์„œ๊ฐ€ ์ œ40์กฐ์˜ ์Šน์ธ๋œ ํ–‰๋™๊ฐ•๋ น์„ ์ค€์ˆ˜ํ•˜๋Š” ๊ฒƒ์„ ๊ณ ๋ คํ•ด์•ผ ํ•œ๋‹ค.

8. Compliance with approved codes of conduct referred to in Articleย 40 by the relevant controllers or processors shall be taken into due account in assessing the impact of the processing operations performed by such controllers or processors, in particular for the purposes of a data protection impact assessment.

9. ์ ์ ˆํ•œ ๊ฒฝ์šฐ, ์ปจํŠธ๋กค๋Ÿฌ๋Š” ์ƒ์—…์  ์ด์ต์ด๋‚˜ ๊ณต์ต์˜ ๋ณดํ˜ธ ๋˜๋Š” ์ฒ˜๋ฆฌ ์ž‘์—…์˜ ๋ณด์•ˆ์„ ์นจํ•ดํ•˜์ง€ ์•Š๊ณ , ์˜ˆ์ •๋œ ์ฒ˜๋ฆฌ์— ๋Œ€ํ•œ ์ •๋ณด์ฃผ์ฒด ๋˜๋Š” ๊ทธ ๋Œ€๋ฆฌ์ธ์˜ ์˜๊ฒฌ์„ ๊ตฌํ•ด์•ผ ํ•œ๋‹ค.

9. Where appropriate, the controller shall seek the views of data subjects or their representatives on the intended processing, without prejudice to the protection of commercial or public interests or the security of processing operations.

ISO 27701

(EN) ISO/IEC 27701, adopted in 2019, added a requirement additional to ISO/IEC 27001, section 4.2.

Here is the relevant paragraph to article 35(9) GDPR:

5.2.2 Understanding the needs and expectations of interested parties

The organization shall include among its interested parties (see ISO/IEC 27001:2013, 4.2), those parties having interests or responsibilities associated with the processing of PII, including the PII principals.


์ „์ฒด ํ…์ŠคํŠธ์— ์•ก์„ธ์Šคํ•˜๋ ค๋ฉด

10. ์ œ6์กฐ(1)์˜ (c)ํ˜ธ ๋˜๋Š” (e)ํ˜ธ์— ๋”ฐ๋ฅธ ์ฒ˜๋ฆฌ๊ฐ€ ์ปจํŠธ๋กค๋Ÿฌ์— ์ ์šฉ๋˜๋Š” ์œ ๋Ÿฝ์—ฐํ•ฉ ๋˜๋Š” ํšŒ์›๊ตญ ๋ฒ•๋ฅ  ๋‚ด์— ๋ฒ•์  ๊ทผ๊ฑฐ๋ฅผ ๋‘๊ณ  ์žˆ๋Š” ๊ฒฝ์šฐ๋กœ์„œ, ํ•ด๋‹น ๋ฒ•๋ฅ ์ด ํŠน์ • ์ฒ˜๋ฆฌ ์ž‘์—…์ด๋‚˜ ์ผ๋ จ์˜ ๊ด€๋ จ ์ž‘์—…์„ ๊ทœ์ œํ•˜๊ณ  ๊ฐœ์ธ์ •๋ณด๋ณดํ˜ธ ์˜ํ–ฅํ‰๊ฐ€๊ฐ€ ์ด๋ฏธ ๊ทธ ๋ฒ•์  ๊ทผ๊ฑฐ๋ฅผ ์ฑ„ํƒํ•˜๋Š” ์ค‘์— ์ผ๋ฐ˜์  ์˜ํ–ฅํ‰๊ฐ€์˜ ์ผํ™˜์œผ๋กœ ์‹œํ–‰๋œ ๊ฒฝ์šฐ, ์ œ1ํ•ญ์—์„œ ์ œ7ํ•ญ๊นŒ์ง€ ์ ์šฉ๋˜์ง€ ์•Š๋Š”๋‹ค. ๋‹จ, ํšŒ์›๊ตญ์ด ์ฒ˜๋ฆฌํ™œ๋™ ์ด์ „์— ์ด๋Ÿฌํ•œ ์˜ํ–ฅํ‰๊ฐ€์˜ ์ˆ˜ํ–‰์ด ํ•„์š”ํ•˜๋‹ค๊ณ  ๊ณ ๋ คํ•˜๋Š” ๊ฒฝ์šฐ๋Š” ์˜ˆ์™ธ๋กœ ํ•œ๋‹ค.

10. Where processing pursuant to point (c) or (e) of Article 6(1) has a legal basis in Union law or in the law of the Memberย State to which the controller is subject, that law regulates the specific processing operation or set of operations in question, and a data protection impact assessment has already been carried out as part of a general impact assessment in the context of the adoption of that legal basis, paragraphsย 1 to 7 shall not apply unless Memberย States deem it to be necessary to carry out such an assessment prior to processing activities.

๊ด€๋ จ ๊ต๊ณผ์„œ

11. ํ•„์š”ํ•˜๋‹ค๋ฉด, ์ปจํŠธ๋กค๋Ÿฌ๋Š” ์ ์–ด๋„ ์ฒ˜๋ฆฌ ์ž‘์—…์œผ๋กœ ์ดˆ๋ž˜๋˜๋Š” ์œ„ํ—˜์— ๋ณ€ํ™”๊ฐ€ ์žˆ์„ ์‹œ์—๋Š” ์ฒ˜๋ฆฌ๊ฐ€ ๊ฐœ์ธ์ •๋ณด๋ณดํ˜ธ ์˜ํ–ฅํ‰๊ฐ€์— ๋”ฐ๋ผ ์‹ค์‹œ๋˜๋Š”์ง€๋ฅผ ํ‰๊ฐ€ํ•˜๊ธฐ ์œ„ํ•œ ๊ฒ€ํ† ๋ฅผ ์‹œํ–‰ํ•ด์•ผ ํ•œ๋‹ค.

11. Where necessary, the controller shall carry out a review to assess if processing is performed in accordance with the data protection impact assessment at least when there is a change of the risk represented by processing operations.

ISO 27701 ์ „๋ฌธ (Recitals) ์ง€์นจ ๋ฐ ์‚ฌ๋ก€ ๋ฒ•๋ฅ  ์ฝ”๋ฉ˜ํŠธ๋ฅผ ๋‚จ๊ฒจ์ฃผ์„ธ์š”
ISO 27701

(EN) ISO/IEC 27701, adopted in 2019, added additional ISO/IEC 27002 guidance for PII controllers.

Here is the relevant paragraph to article 35 GDPR:

7.2.5 Privacy impact assessment

Control

The organization should assess the need for, and implement where appropriate, a privacy impact assessment whenever new processing of PII or changes to existing processing of PII is planned.

Implementation guidance

PII processing generates risks for PII principals. These risks should be assessed through a privacy impact assessment.


์ „์ฒด ํ…์ŠคํŠธ์— ์•ก์„ธ์Šคํ•˜๋ ค๋ฉด

์ „๋ฌธ (Recitals)

(75) ๊ฐœ์ธ์˜ ๊ถŒ๋ฆฌ์™€ ์ž์œ ์— ์ดˆ๋ž˜๋˜๋Š” ์œ„ํ—˜์€, ๋‹ค์–‘ํ•œ ๋ฐœ์ƒ๊ฐ€๋Šฅ์„ฑ๊ณผ ์‹ฌ๊ฐ์„ฑ์œผ๋กœ ๋‚˜ํƒ€๋‚˜๋Š”๋ฐ ์ด๋Š”, ๊ฐœ์ธ์ •๋ณด ์ฒ˜๋ฆฌ๋กœ ์ธํ•ด ๋ฐœ์ƒํ•  ์ˆ˜ ์žˆ์œผ๋ฉฐ, ์ด๋Š” ์‹ ์ฒด์ (physical), ๋ฌผ์งˆ์ (material) ํ˜น์€ ๋น„-๋ฌผ์งˆ์ (non-material) ์†ํ•ด๋ฅผ ์ดˆ๋ž˜ํ•  ์ˆ˜ ์žˆ๋‹ค. ํŠนํžˆ, ์ฒ˜๋ฆฌ๋กœ ์ธํ•ด ์ฐจ๋ณ„, ์‹ ์šฉ๋„์šฉ ๋ฐ ์‚ฌ๊ธฐ, ์žฌ์ •์  ์†์‹ค, ๋ช…์˜ˆํ›ผ์†, ์ง๋ฌด์ƒ์˜ ๊ธฐ๋ฐ€๋กœ ๋ณดํ˜ธ๋˜๋˜ ๊ฐœ์ธ์ •๋ณด์˜ ๊ธฐ๋ฐ€์„ฑ ์ƒ์‹ค, ๊ฐ€๋ช…์ •๋ณด์— ๋Œ€ํ•œ ๋ฌด๋‹จ ์žฌ์‹๋ณ„ ์ฒ˜๋ฆฌ, ๋˜๋Š” ๊ธฐํƒ€์˜ ์‹ฌ๊ฐํ•œ ๊ฒฝ์ œ์  ๋˜๋Š” ์‚ฌํšŒ์  ๋ถˆ์ด์ต์ด ์ดˆ๋ž˜๋  ์ˆ˜ ์žˆ๋Š” ๊ฒฝ์šฐ ๊ทธ๋Ÿฌํ•˜๋‹ค. ๋˜ํ•œ, ์ •๋ณด์ฃผ์ฒด๊ฐ€ ๋ณธ์ธ์˜ ๊ถŒ๋ฆฌ์™€ ์ž์œ ๋ฅผ ๋นผ์•—๊ธธ ์ˆ˜ ์žˆ๋Š” ๊ฒฝ์šฐ๋‚˜, ๋ณธ์ธ์˜ ๊ฐœ์ธ์ •๋ณด์— ๋Œ€ํ•œ ์ž๊ธฐ๊ฒฐ์ •๊ถŒ(right to control) ํ–‰์‚ฌํ•˜์ง€ ๋ชปํ•˜๊ฒŒ ๋˜๋Š” ๊ฒฝ์šฐ, ํ˜น์€ ๊ฐœ์ธ์ •๋ณด๊ฐ€ ์ธ์ข… ๋ฐ ๋ฏผ์กฑ์˜ ์ถœ์‹ , ์ •๊ฒฌ, ์ข…๊ต ๋ฐ ์ฒ ํ•™์  ์‹ ๋…, ๋…ธ๋™์กฐํ•ฉ์˜ ๊ฐ€์ž…์—ฌ๋ถ€์™€ ์œ ์ „์ž์ •๋ณด, ๊ฑด๊ฐ•์ •๋ณด ๋˜๋Š” ์„ฑ์ƒํ™œ ๊ด€๋ จ ์ •๋ณด๋‚˜ ๋ฒ”์ฃ„ ๊ธฐ์†Œ ๋ฐ ๋ฒ”์ฃ„๊ด€๋ จ ๊ฐœ์ธ์ •๋ณด์— ๋Œ€ํ•œ ์ฒ˜๋ฆฌ ๋˜๋Š” ๊ด€๋ จํ•œ ๋ณด์•ˆ ์กฐ์น˜๋ฅผ ๋“œ๋Ÿฌ๋‚ด๋Š” ๋ฐฉ์‹์œผ๋กœ ์ฒ˜๋ฆฌ๋˜๋Š” ๊ฒฝ์šฐ. ๋˜๋Š” ๊ฐœ์ธ์ ์ธ ์ธก๋ฉด์— ํ‰๊ฐ€๋˜๋Š” ๊ฒฝ์šฐ๋กœ ํŠนํžˆ ์—…๋ฌด๋Šฅ๋ ฅ, ๊ฒฝ์ œ์  ์ƒํ™ฉ, ๊ฑด๊ฐ•์ƒํƒœ, ๊ฐœ์ธ์˜ ์„ฑํ–ฅ ๋ฐ ๊ด€์‹ฌ์‚ฌ, ์‹ ๋ขฐ์„ฑ์ด๋‚˜ ํ–‰๋™, ์œ„์น˜ ๋ฐ ์ด๋™๊ฒฝ๋กœ์™€ ๊ด€๋ จ๋œ ์ธก๋ฉด์„ ๊ฐœ์ธํ”„๋กœํ•„ ์ƒ์„ฑ ๋ฐ ์ด์šฉ์„ ์œ„ํ•ด ๋ถ„์„ํ•˜๊ฑฐ๋‚˜ ์˜ˆ์ธกํ•˜๋Š” ๊ฒฝ์šฐ. ํ˜น์€ ์•„๋™ ๋“ฑ ์ทจ์•ฝํ•œ ๊ฐœ์ธ์˜ ๊ฐœ์ธ์ •๋ณด๊ฐ€ ์ฒ˜๋ฆฌ๋˜๋Š” ๊ฒฝ์šฐ๋‚˜ ์ฒ˜๋ฆฌ๊ฐ€ ๋ฐฉ๋Œ€ํ•œ ์–‘์˜ ๊ฐœ์ธ์ •๋ณด์™€ ๊ด€๋ จ ์žˆ๊ฑฐ๋‚˜, ์ˆ˜๋งŽ์€ ์ •๋ณด์ฃผ์ฒด์—๊ฒŒ ์˜ํ–ฅ์„ ๋ฏธ์น˜๋Š” ๊ฒฝ์šฐ๊ฐ€ ๊ทธ๋Ÿฌํ•˜๋‹ค.

(75) The risk to the rights and freedoms of natural persons, of varying likelihood and severity, may result from personal data processing which could lead to physical, material or non-material damage, in particular: where the processing may give rise to discrimination, identity theft or fraud, financial loss, damage to the reputation, loss of confidentiality of personal data protected by professional secrecy, unauthorised reversal of pseudonymisation, or any other significant economic or social disadvantage; where data subjects might be deprived of their rights and freedoms or prevented from exercising control over their personal data; where personal data are processed which reveal racial or ethnic origin, political opinions, religion or philosophical beliefs, trade union membership, and the processing of genetic data, data concerning health or data concerning sex life or criminal convictions and offences or related security measures; where personal aspects are evaluated, in particular analysing or predicting aspects concerning performance at work, economic situation, health, personal preferences or interests, reliability or behaviour, location or movements, in order to create or use personal profiles; where personal data of vulnerable natural persons, in particular of children, are processed; or where processing involves a large amount of personal data and affects a large number of data subjects.

(84) ์ฒ˜๋ฆฌ ๋ฐฉ๋ฒ•์ด ๊ฐœ์ธ์˜ ๊ถŒ๋ฆฌ์™€ ์ž์œ ์— ๊ด€ํ•ด ๋†’์€ ์ˆ˜์ค€์˜ ์œ„ํ—˜์„ ์ดˆ๋ž˜ํ•  ๊ฐ€๋Šฅ์„ฑ์ด ์žˆ๋Š” ๊ฒฝ์šฐ ์ด ๊ทœ์ •์„ ๋ณด๋‹ค ๋” ์ž˜ ์ค€์ˆ˜ํ•˜๊ธฐ ์œ„ํ•ด์„œ, ์ปจํŠธ๋กค๋Ÿฌ๋Š” ํŠนํžˆ ๊ด€๋ จ ์œ„ํ—˜์˜ ์ถœ์ฒ˜, ์„ฑ๊ฒฉ, ํŠน์„ฑ ๊ทธ๋ฆฌ๊ณ  ์‹ฌ๊ฐ์„ฑ์„ ํ‰๊ฐ€ํ•˜๋Š” ๊ฐœ์ธ์ •๋ณด๋ณดํ˜ธ ์˜ํ–ฅํ‰๊ฐ€(DPIA)๋ฅผ ์ˆ˜ํ–‰ํ•  ์ฑ…์ž„์ด ์žˆ๋‹ค. ํ‰๊ฐ€๊ฒฐ๊ณผ๋Š”, ์ด ๊ทœ์ •์— ๋”ฐ๋ผ ๊ฐœ์ธ์ •๋ณด๊ฐ€ ์ฒ˜๋ฆฌ๋˜์—ˆ์Œ์„ ์ž…์ฆํ•˜๊ธฐ ์œ„ํ•ด ์ ์ ˆํ•œ ์กฐ์น˜๋ฅผ ๊ฒฐ์ •ํ•  ๋•Œ, ๊ณ ๋ ค๋˜์–ด์•ผ ํ•œ๋‹ค. ๊ฐœ์ธ์ •๋ณด๋ณดํ˜ธ ์˜ํ–ฅํ‰๊ฐ€ ๊ฒฐ๊ณผ๋ฅผ ํ†ตํ•ด, ์ปจํŠธ๋กค๋Ÿฌ๊ฐ€ ์ด์šฉํ•  ์ˆ˜ ์žˆ๋Š” ๊ธฐ์ˆ ๊ณผ ๊ธฐ์ˆ ์‹œํ–‰ ๋น„์šฉ์„ ๊ณ ๋ คํ–ˆ์„ ๋•Œ, ์ ์ ˆํ•œ ์กฐ์น˜๋กœ ๊ณ ์œ„ํ—˜์„ ์™„ํ™”ํ•  ์ˆ˜ ์—†๋Š” ์ฒ˜๋ฆฌ ์ž‘์—…์ž„์ด ํŒ๋‹จ๋˜๋Š” ๊ฒฝ์šฐ, ์ฒ˜๋ฆฌ ์ด์ „์— ๊ฐ๋…๊ธฐ๊ด€์— ์ž๋ฌธ์„ ๊ตฌํ•ด์•ผ ํ•œ๋‹ค.

(84) In order to enhance compliance with this Regulation where processing operations are likely to result in a high risk to the rights and freedoms of natural persons, the controller should be responsible for the carrying-out of a data protection impact assessment to evaluate, in particular, the origin, nature, particularity and severity of that risk. The outcome of the assessment should be taken into account when determining the appropriate measures to be taken in order to demonstrate that the processing of personal data complies with this Regulation. Where a data-protection impact assessment indicates that processing operations involve a high risk which the controller cannot mitigate by appropriate measures in terms of available technology and costs of implementation, a consultation of the supervisory authority should take place prior to the processing.

(89) ์ง€์นจ 95/46/EC์—์„œ๋Š” ๊ฐ๋…๊ธฐ๊ด€์— ๊ฐœ์ธ์ •๋ณด์ฒ˜๋ฆฌ๋ฅผ ํ†ต์ง€ํ•˜๋ผ๋Š” ์ผ๋ฐ˜์ ์ธ ์˜๋ฌด์กฐ๊ฑด์„ ๊ทœ์ •ํ•˜๊ณ  ์žˆ์—ˆ๋‹ค. ์ด๋Ÿฌํ•œ ์˜๋ฌด๋Š” ํ–‰์ •์ , ์žฌ์ •์  ๋ถ€๋‹ด์„ ์ฃผ๋Š” ๋ฐ˜๋ฉด, ํ•ญ์ƒ ๊ฐœ์ธ์ •๋ณด๋ณดํ˜ธ ๊ฐœ์„ ์— ๋„์›€์ด ๋œ ๊ฒƒ์€ ์•„๋‹ˆ์—ˆ๋‹ค. ๋”ฐ๋ผ์„œ ์ด๋Ÿฌํ•œ ๋ฌด์ฐจ๋ณ„์ ์ธ ์ผ๋ฐ˜์ ์ธ ํ†ต์ง€์˜ ์˜๋ฌด๋Š” ์ฒ ํ๋˜์–ด์•ผ ํ•˜๋ฉฐ, ๋Œ€์‹  ์ฒ˜๋ฆฌ ์ž‘์—…์˜ ์„ฑ๊ฒฉยท๋ฒ”์œ„ยท์ƒํ™ฉยท๋ชฉ์ ์— ๋”ฐ๋ผ ๊ฐœ์ธ์˜ ๊ถŒ๋ฆฌ์™€ ์ž์œ ์— ๊ณ ์œ„ํ—˜์„ ์ดˆ๋ž˜ํ•  ๊ฐ€๋Šฅ์„ฑ์ด ์žˆ๋Š” ์ฒ˜๋ฆฌ์ž‘์—… ์œ ํ˜•์„ ์ค‘์ ์ ์œผ๋กœ ํ†ต์ง€ํ•˜๋Š”, ํšจ๊ณผ์ ์ธ ์ ˆ์ฐจ์™€ ๋ฉ”์ปค๋‹ˆ์ฆ˜์œผ๋กœ ๋Œ€์ฒด๋˜์–ด์•ผ ํ•œ๋‹ค. ์—ฌ๊ธฐ์— ํ•ด๋‹น๋˜๋Š” ์ฒ˜๋ฆฌ์ž‘์—…์˜ ์œ ํ˜•์€ ์‹ ๊ธฐ์ˆ ์„ ์‚ฌ์šฉํ•˜๋Š” ๊ฒฝ์šฐ๋‚˜ ์ƒˆ๋กœ์šด ์ข…๋ฅ˜์˜ ์ฒ˜๋ฆฌ์ธ ๊ฒฝ์šฐ, ์ปจํŠธ๋กค๋Ÿฌ๊ฐ€ ์ด์ „์— ๊ฐœ์ธ์ •๋ณด ์˜ํ–ฅํ‰๊ฐ€๋ฅผ ์‹œํ–‰ํ•œ ์ ์ด ์—†๋Š” ๊ฒฝ์šฐ๋‚˜ ํ˜น์€ ์ตœ์ดˆ์˜ ์ฒ˜๋ฆฌ ์ดํ›„ ์‹œ๊ฐ„์ด ํ˜๋Ÿฌ ๊ฐœ์ธ์ •๋ณด ์˜ํ–ฅํ‰๊ฐ€๊ฐ€ ํ•„์š”ํ•˜๊ฒŒ ๋œ ๊ฒฝ์šฐ๊ฐ€ ํฌํ•จ๋œ๋‹ค.

(89) Directive 95/46/EC provided for a general obligation to notify the processing of personal data to the supervisory authorities. While that obligation produces administrative and financial burdens, it did not in all cases contribute to improving the protection of personal data. Such indiscriminate general notification obligations should therefore be abolished, and replaced by effective procedures and mechanisms which focus instead on those types of processing operations which are likely to result in a high risk to the rights and freedoms of natural persons by virtue of their nature, scope, context and purposes. Such types of processing operations may be those which in, particular, involve using new technologies, or are of a new kind and where no data protection impact assessment has been carried out before by the controller, or where they become necessary in the light of the time that has elapsed since the initial processing.

(90) ์ด๋Ÿฌํ•œ ๊ฒฝ์šฐ, ๊ณ ์œ„ํ—˜์˜ ๊ฐ€๋Šฅ์„ฑ ๋ฐ ๊ฐ•๋„๋ฅผ ํ‰๊ฐ€ํ•˜๊ธฐ ์œ„ํ•ด ์ฒ˜๋ฆฌ์˜ ์„ฑ๊ฒฉยท๋ฒ”์œ„ยท์ƒํ™ฉยท๋ชฉ์  ๊ทธ๋ฆฌ๊ณ  ์œ„ํ—˜์š”์†Œ์˜ ์ถœ์ฒ˜๋ฅผ ๊ณ ๋ คํ•˜์—ฌ, ์ฒ˜๋ฆฌ ์ด์ „์— ๊ฐœ์ธ์ •๋ณด๋ณดํ˜ธ ์˜ํ–ฅํ‰๊ฐ€๊ฐ€ ์ปจํŠธ๋กค๋Ÿฌ์— ์˜ํ•ด ์ˆ˜ํ–‰๋  ์ˆ˜ ์žˆ์–ด์•ผ ํ•œ๋‹ค. ์ด๋Ÿฌํ•œ ๊ฐœ์ธ์ •๋ณด๋ณดํ˜ธ์˜ํ–ฅํ‰๊ฐ€๋Š” ํ•ด๋‹น ์œ„ํ—˜์„ ์™„ํ™”ํ•˜๊ณ  ๊ฐœ์ธ์ •๋ณด๋ฅผ ๋ณดํ˜ธํ•˜๋ฉฐ, ๋ณธ ๊ทœ์ •์˜ ์ค€์ˆ˜์—ฌ๋ถ€๋ฅผ ์ž…์ฆํ•˜๊ธฐ ์œ„ํ•œ ์กฐ์น˜, ์•ˆ์ „์žฅ์น˜ ๋ฐ ๋ฉ”์ปค๋‹ˆ์ฆ˜์„ ํŠนํžˆ ํฌํ•จํ•ด์•ผ ํ•œ๋‹ค.

(90) In such cases, a data protection impact assessment should be carried out by the controller prior to the processing in order to assess the particular likelihood and severity of the high risk, taking into account the nature, scope, context and purposes of the processing and the sources of the risk. That impact assessment should include, in particular, the measures, safeguards and mechanisms envisaged for mitigating that risk, ensuring the protection of personal data and demonstrating compliance with this Regulation.

(91) ์ด๋Š” ํŠนํžˆ ์ƒ๋‹นํ•œ ์–‘์˜ ๊ฐœ์ธ์ •๋ณด๋ฅผ ์ง€์—ญ์ , ๊ตญ๊ฐ€์ , ์ดˆ๊ตญ๊ฐ€์  ์ฐจ์›์—์„œ ์ฒ˜๋ฆฌํ•˜๊ณ ์ž ํ•˜๋Š” ๋Œ€๊ทœ๋ชจ์˜ ์ฒ˜๋ฆฌ์ž‘์—…๊ณผ ์ˆ˜๋งŽ์€ ์ •๋ณด์ฃผ์ฒด์—๊ฒŒ ์˜ํ–ฅ์„ ๋ฏธ์น  ์ˆ˜ ์žˆ๋Š” ์ฒ˜๋ฆฌ์ž‘์—…, ๊ทธ๋ฆฌ๊ณ  ํ˜„์žฌ์˜ ๊ธฐ์ˆ ์  ์ง€์‹ ์ˆ˜์ค€์—์„œ ์‹ ๊ธฐ์ˆ ์„ ๋Œ€๊ทœ๋ชจ ์ฒ˜๋ฆฌ์— ์‚ฌ์šฉํ•˜๋Š” ๊ฒฝ์šฐ ๋“ฑ, ๊ทธ ๋ฏผ๊ฐ์„ฑ ๋•Œ๋ฌธ์— ๊ณ ์œ„ํ—˜์„ ์ดˆ๋ž˜ํ•  ์ˆ˜ ์žˆ๋Š” ์ฒ˜๋ฆฌ์ž‘์—…๋ฟ ์•„๋‹ˆ๋ผ ์ •๋ณด์ฃผ์ฒด๊ฐ€ ๊ถŒ๋ฆฌ๋ฅผ ํ–‰์‚ฌํ•˜๊ธฐ ์–ด๋ ค์šด ์ƒํ™ฉ ๋“ฑ, ์ •๋ณด์ฃผ์ฒด์˜ ๊ถŒ๋ฆฌ์™€ ์ž์œ ์— ๊ณ ์œ„ํ—˜์„ ์ดˆ๋ž˜ํ•  ์ˆ˜ ์žˆ๋Š” ๊ธฐํƒ€ ์ฒ˜๋ฆฌ ๋ฐฉ์‹์— ์ ์šฉ๋˜์–ด์•ผ ํ•œ๋‹ค. ๋˜ํ•œ, ๊ด€๋ จ ๊ฐœ์ธ์ •๋ณด์˜ ํ”„๋กœํŒŒ์ผ๋ง์— ๊ทผ๊ฑฐํ•˜์—ฌ ๊ฐœ์ธ์˜ ๊ฐœ์ธ์ ์ธ ์ธก๋ฉด์— ๋Œ€ํ•œ ์ฒด๊ณ„์ ์ด๊ณ  ๊ด‘๋ฒ”์œ„ํ•œ ์ผ์ฒด์˜ ํ‰๊ฐ€๋ฅผ ๋”ฐ๋ผ ํŠน์ • ๊ฐœ์ธ์— ๋Œ€ํ•œ ๊ฒฐ์ •์„ ๋‚ด๋ฆฌ๊ธฐ ์œ„ํ•ด ๊ฐœ์ธ์ •๋ณด๋ฅผ ์ฒ˜๋ฆฌํ•˜๋Š” ๊ฒฝ์šฐ, ํ˜น์€ ํŠน๋ณ„๋ฒ”์ฃผ์˜ ๊ฐœ์ธ์ •๋ณด, ์ƒ์ฒด์ •๋ณด ๋˜๋Š” ํ˜•์‚ฌ๊ธฐ์†Œ ๋ฐ ๋ฒ”์ฃ„๋‚˜ ๊ด€๋ จ๋ณด์•ˆ์กฐ์น˜์— ๋Œ€ํ•œ ์ •๋ณด์ฒ˜๋ฆฌ์— ๋”ฐ๋ผ ํŠน์ • ๊ฐœ์ธ์— ๋Œ€ํ•œ ๊ฒฐ์ •์„ ๋‚ด๋ฆฌ๊ธฐ ์œ„ํ•ด ๊ฐœ์ธ์ •๋ณด๋ฅผ ์ฒ˜๋ฆฌํ•˜๋Š” ๊ฒฝ์šฐ, ๊ฐœ์ธ์ •๋ณด๋ณดํ˜ธ ์˜ํ–ฅํ‰๊ฐ€๊ฐ€ ์ด๋ฃจ์–ด์ ธ์•ผ ํ•œ๋‹ค. ํŠนํžˆ ์‹œ๊ฐ์  ์ „์ž๊ธฐ๊ธฐ๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ ๊ณต๊ณต์žฅ์†Œ๋ฅผ ๋Œ€๊ทœ๋ชจ๋กœ ๊ฐ์‹œํ•  ๋•Œ๋‚˜, ๊ด€ํ•  ๊ฐ๋…๊ธฐ๊ด€์ด ํŒ๋‹จํ•˜๊ธฐ์— ํ•ด๋‹น ์ฒ˜๋ฆฌ๊ฐ€ ํŠนํžˆ ์ •๋ณด์ฃผ์ฒด๊ฐ€ ๊ถŒ๋ฆฌ๋ฅผ ํ–‰์‚ฌํ•˜์ง€ ๋ชปํ•˜๊ฒŒ ํ•˜๊ฑฐ๋‚˜ ์„œ๋น„์Šค ํ˜น์€ ๊ณ„์•ฝ์„ ์ด์šฉํ•˜์ง€ ๋ชปํ•˜๊ฒŒ ํ•˜๊ฑฐ๋‚˜, ์ฒด๊ณ„์ ์œผ๋กœ ๋Œ€๊ทœ๋ชจ๋กœ ์ˆ˜ํ–‰๋˜์–ด ์ •๋ณด์ฃผ์ฒด์˜ ๊ถŒ๋ฆฌ์™€ ์ž์œ ์— ๊ณ ์œ„ํ—˜์„ ์ดˆ๋ž˜ํ•  ๊ฐ€๋Šฅ์„ฑ์ด ์žˆ๋‹ค๊ณ  ๊ฐ„์ฃผ๋˜๋Š” ์ฒ˜๋ฆฌ์ž‘์—…์— ๋ชจ๋‘ ๊ฐœ์ธ์ •๋ณด๋ณดํ˜ธ ์˜ํ–ฅํ‰๊ฐ€๋Š” ๋™์ผํ•˜๊ฒŒ ํ•„์š”ํ•˜๋‹ค. ํ•ด๋‹น ๊ฐœ์ธ์ •๋ณด ์ฒ˜๋ฆฌ๊ฐ€ ๊ฐœ์ธ ๋‚ด๊ณผ ์˜์‚ฌ๋‚˜ ๊ธฐํƒ€ ์˜๋ฃŒ์ „๋ฌธ์ธ ๋˜๋Š” ๋ณ€ํ˜ธ์‚ฌ์˜ ํ™˜์ž๋‚˜ ๊ณ ๊ฐ์œผ๋กœ๋ถ€ํ„ฐ์˜ ๊ฐœ์ธ์ •๋ณด๊ฐ€ ๊ด€๋ จ๋œ ์ฒ˜๋ฆฌ์ธ ๊ฒฝ์šฐ, ๋Œ€๊ทœ๋ชจ์˜ ์ฒ˜๋ฆฌ๋ผ๊ณ  ๊ฐ„์ฃผ๋˜์–ด์„œ๋Š” ์•ˆ ๋œ๋‹ค. ์ด ๊ฒฝ์šฐ, ๊ฐœ์ธ์ •๋ณด๋ณดํ˜ธ ์˜ํ–ฅํ‰๊ฐ€๋Š” ์˜๋ฌด์—ฌ์„œ๋Š” ์•ˆ๋œ๋‹ค.

(91) This should in particular apply to large-scale processing operations which aim to process a considerable amount of personal data at regional, national or supranational level and which could affect a large number of data subjects and which are likely to result in a high risk, for example, on account of their sensitivity, where in accordance with the achieved state of technological knowledge a new technology is used on a large scale as well as to other processing operations which result in a high risk to the rights and freedoms of data subjects, in particular where those operations render it more difficult for data subjects to exercise their rights. A data protection impact assessment should also be made where personal data are processed for taking decisions regarding specific natural persons following any systematic and extensive evaluation of personal aspects relating to natural persons based on profiling those data or following the processing of special categories of personal data, biometric data, or data on criminal convictions and offences or related security measures. A data protection impact assessment is equally required for monitoring publicly accessible areas on a large scale, especially when using optic-electronic devices or for any other operations where the competent supervisory authority considers that the processing is likely to result in a high risk to the rights and freedoms of data subjects, in particular because they prevent data subjects from exercising a right or using a service or a contract, or because they are carried out systematically on a large scale. The processing of personal data should not be considered to be on a large scale if the processing concerns personal data from patients or clients by an individual physician, other health care professional or lawyer. In such cases, a data protection impact assessment should not be mandatory.

(92) ๊ฐœ์ธ์ •๋ณด๋ณดํ˜ธ ์˜ํ–ฅํ‰๊ฐ€๊ฐ€ ๋‹จ์ผ ํ”„๋กœ์ ํŠธ๋ณด๋‹ค ๊ด‘๋ฒ”์œ„ํ•˜๊ฒŒ ์ ์šฉ๋˜์–ด์•ผ, ํ•ฉ๋ฆฌ์ ์ด๊ณ  ๊ฒฝ์ œ์ ์ด๋ผ๊ณ  ์ƒ๊ฐ๋˜๋Š” ์ƒํ™ฉ์ด ์žˆ๋‹ค. ์˜ˆ๋ฅผ ๋“ค์–ด, ๊ณต๊ณต๊ธฐ๊ด€์ด๋‚˜ ๊ณต๊ณต๊ธฐ๊ตฌ๊ฐ€ ๋™์ผํ•œ ์ ์šฉ ํ”Œ๋žซํผ์ด๋‚˜ ์ฒ˜๋ฆฌ ํ”Œ๋žซํผ์„ ์ˆ˜๋ฆฝํ•  ๊ณ„ํš์ธ ๊ฒฝ์šฐ, ๋˜๋Š” ์—ฌ๋Ÿฌ ๋ช…์˜ ์ปจํŠธ๋กค๋Ÿฌ๊ฐ€ ์‚ฐ์—…๋ถ„์•ผ๋‚˜ ๋ถ€๋ฌธ ์ „๋ฐ˜์ด๋‚˜ ๋น„์Šทํ•œ ์ˆ˜์ค€์˜ ํ™œ๋™(horizontal activity)์— ๊ด‘๋ฒ”์œ„ํ•˜๊ฒŒ ์‚ฌ์šฉ๋˜๋Š” ๋™์ผํ•œ ์ ์šฉํ™˜๊ฒฝ์ด๋‚˜ ์ฒ˜๋ฆฌํ™˜๊ฒฝ์„ ๋„์ž…ํ•˜๋ ค๋Š” ๊ฒฝ์šฐ๊ฐ€ ์žˆ๋‹ค.

(92) There are circumstances under which it may be reasonable and economical for the subject of a data protection impact assessment to be broader than a single project, for example where public authorities or bodies intend to establish a common application or processing platform or where several controllers plan to introduce a common application or processing environment across an industry sector or segment or for a widely used horizontal activity.

(93) ๊ณต๊ณต๊ธฐ๊ด€์ด๋‚˜ ๊ณต๊ณต๊ธฐ๊ตฌ์˜ ์—…๋ฌด์ˆ˜ํ–‰ ๊ทœ์ •ํ•˜๋Š” ํšŒ์›๊ตญ ๋ฒ•๋ฅ  ํ˜น์€ ๊ตฌ์ฒด์ ์ธ ์ฒ˜๋ฆฌ์ž‘์—…์ด๋‚˜ ์ผ๋ จ์˜ ์ฒ˜๋ฆฌ์ž‘์—…์„ ๊ทœ์ œํ•˜๋Š” ํšŒ์›๊ตญ ๋ฒ•๋ฅ ์„ ์ฑ„ํƒํ•  ๋•Œ, ํšŒ์›๊ตญ์€ ์ฒ˜๋ฆฌํ™œ๋™์„ ํ•˜๊ธฐ ์ „์— ์ด๋Ÿฌํ•œ ํ‰๊ฐ€์˜ ์ˆ˜ํ–‰์ด ํ•„์š”ํ•˜๋‹ค๊ณ  ์ƒ๊ฐํ•  ์ˆ˜ ์žˆ๋‹ค.

(93) In the context of the adoption of the Member State law on which the performance of the tasks of the public authority or public body is based and which regulates the specific processing operation or set of operations in question, Member States may deem it necessary to carry out such assessment prior to the processing activities.

์ง€์นจ ๋ฐ ์‚ฌ๋ก€ ๋ฒ•๋ฅ  ์ฝ”๋ฉ˜ํŠธ๋ฅผ ๋‚จ๊ฒจ์ฃผ์„ธ์š”
[js-disqus]